Academic literature on the topic 'Star Trek (Programa de televisión)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Star Trek (Programa de televisión).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Star Trek (Programa de televisión)"

1

Sánchez-Navarro, Jordi. "¡Teletranspórtame!" COMeIN, no. 61 (December 15, 2016). http://dx.doi.org/10.7238/c.n61.1680.

Full text
Abstract:
Este 2016 que está a punto de terminar ha sido el año de celebración del 50º aniversario del nacimiento de Star Trek, la serie de televisión de aventuras en el espacio que, con el tiempo, se ha convertido en el referente universal de la ciencia ficción televisiva. Han sido cincuenta años de influencia en al menos dos generaciones de personas de toda clase y condición, entre las que se cuentan artistas y figuras esenciales de la industria del entretenimiento, pero también científicos e ingenieros, que, a su vez, han contribuido a modelar nuestra cultura.
APA, Harvard, Vancouver, ISO, and other styles
2

Kraak, Vivica I. "Star Trek Offers Insights That Illuminate Actor Engagement in Global Nutrition Governance Comment on "Towards Preventing and Managing Conflict of Interest in Nutrition Policy? An Analysis of Submissions to a Consultation on a Draft WHO Tool"." International Journal of Health Policy and Management, August 24, 2020. http://dx.doi.org/10.34172/ijhpm.2020.158.

Full text
Abstract:
This commentary describes insights from Star Trek’s fictional television series to understand how state and non-state actors address conflicts of interest (COIs) through global nutrition governance. I examine the findings of Ralston and colleagues for 44 state and non-state actors who responded to the World Health Organization’s (WHO’s) consultation for a COI risk-assessment tool, developed for member states to engage effectively with non-state actors to address malnutrition in all forms. Star Trek reveals that actor engagement is inevitable in a shared universe. The Prime Directive is a non-interference principle reflecting a moral commitment to reduce harm, respect autonomy and protect rights. Engagement principles are relevant to all actors who influence nutrition policies and programs, and must be held accountable when their actions undermine healthy and sustainable food systems. Certain actors use COI to justify non-engagement with commercial actors yet competing interests, biases, corruption and regulatory capture are distinct challenges to manage. Finally, Star Trek’s characters serve as allegories to understand actors’ motives and actions to promote healthy and sustainable food systems. Unlike non-state actors, states are legally required to achieve their commitments and targets in the United Nations’ (UN) Decade of Action on Nutrition (2016-2025) and Sustainable Development Goals (SDGs) 2030 Agenda.
APA, Harvard, Vancouver, ISO, and other styles
3

Medina-Moles, Montserrat, and Manuel del-Castillo-López. "«Buen provecho»: television in the workshop-classroom to a cookery and pastry workshop." Comunicar 13, no. 25 (October 1, 2005). http://dx.doi.org/10.3916/c25-2005-206.

Full text
Abstract:
The big interest which raises the gastronomic culture is well-known everywhere. Now more than never people write, publish and read about this subject but what is really surprising is the amazing rating audience reached by the TV programmes which deal with popularizing recipes for traditional, regional, market, season or author cooking. Some of them have stayed on the air for quite a long time and have contributed to the appearance of the «star cook» who is appreciated not only by his/her solid professional career or by his/her refined culinary technique, but also and especially by his/her impact as a communicator. Every TV channel has a programme about the subject so as to engage and keep a wide and diverse section of audience. You can see how students have become interested in these subjects –not only those who are studying a Cookery Vocational Training Course- due to the influence of television. They ask their teacher about a certain programme, the teacher´s opinion about the cook´s work, they even suggest preparing a certain dish which has drawn their attention or want to know if the technique the cook has used is the most suitable. The teacher has so the opportunity of applying a new methodology with a flexible approach by making use of these topics as didactic strategies to foster and develop the students´ learning motivation. The problem arises when we consider the value these kind of TV programmes have as a learning tool. Are they useful for the educational purposes according to a professional profile? Do they refer to the professional performance and are they suitable for the units of competence which are part of the professional abilities? Do they fit in the general abilities which are common to the educative vocational level? What about the general goals and purposes of the Cookery Vocational Training Course and the final abilities of every subject? It is obvious they don´t. Regarding the suitability of the gastronomic-culinary contents of these TV programmes we come to the conclusion that it is not quite satisfactory: the contents which refer to concepts may be suitable (especially those which have to do with facts, but not always those notions or empiric rules) Finally, it is worth taking into a special consideration the attitude knowledge. As whole, the kind of attitude which is spread by TV cooking programmes would be appropriate as contents in the teaching-learning process: importance of healthy and balanced food, suitability of natural and season products, etc. So the problem we approach in this paper deals with the way teachers and students could take advantage of TV programmes though the teaching-learning process by making up for the lack of some suitable contents which may be related to the Cookery Vocational Training Course curriculum. A nadie escapa el enorme interés que despierta la cultura gastronómica. Y aunque se escribe, edita y lee más que nunca sobre esta materia, lo realmente sorprendente es la tremenda audiencia alcanzada por programas de televisión dedicados a divulgar recetas de cocina, tradicional, regional, de mercado, de temporada, de autor, etc.; algunos se mantienen en antena desde hace bastantes años y han contribuido al surgimiento de la figura del «cocinero estrella», del que se aprecia no sólo la solidez de su trayectoria profesional o una depurada técnica culinaria sino también, y sobre todo, su impacto como comunicador... No hay cadena televisiva que no dedique al tema en cuestión un espacio en su parrilla, consciente de poder así atraer y mantener a un amplio y variopinto sector de audiencia. De manera cotidiana se constata el interés del alumnado en general, no sólo del que cursa un Ciclo Formativo de Cocina, por estos temas; algo lógico dado el alcance mediático de la televisión: se pregunta al profesor si ha visto tal o cual programa, la opinión que le merece el cocinero que lo realiza, proponiendo confeccionar en el aula determinado plato que ha llamado poderosamente su atención o si la técnica empleada en el mismo es la correcta. El profesor, a su vez, tiene la oportunidad de ampliar la metodología empleada, adoptando un planteamiento flexible, al usar este tipo de cuestiones como estrategias didácticas en el desarrollo de las capacidades terminales de los alumnos y alumnas y, lo que es muy importante, favoreciendo y potenciando la motivación por el aprendizaje. El problema se plantea cuando se analiza el valor como instrumento de aprendizaje que pueda tener los programas de cocina emitidos por televisión. ¿Sirven a las intenciones educativas referidas al perfil profesional?, ¿expresan acciones o realizaciones profesionales propias de las unidades de competencia en que se desglosa la capacidad profesional?, ¿se adecuan a las capacidades generales comunes del nivel formativo?, ¿y a las finalidades y objetivos generales del Ciclo Formativo de Cocina y capacidades terminales de cada uno de sus módulos? Es evidente que no. Si se analiza la idoneidad o legitimidad de los contenidos gastronómico-culinarios de los programas televisivos, la conclusión a la que se llega no es del todo satisfactoria: podría existir idoneidad en los contenidos de tipo conceptual (en especial hechos y datos, así como en los conceptos; menos, o no siempre, en cuanto a principios o reglas empíricas). Por último, merece la pena detenerse algo más frente a los conocimientos actitudinales. En general, las actitudes que difunden los programas de cocina en televisión resultarían trasladables como contenidos al proceso de enseñanza y aprendizaje: la importancia de una alimentación sana y equilibrada, la idoneidad de los productos naturales y de temporada, etc. El problema que aborda esta comunicación sería, pues, cómo aprovechar las indudables ventajas que la televisión pone a disposición de profesores y profesoras, alumnos y alumnas en el desarrollo del proceso de enseñanza y aprendizaje, siendo capaces, al mismo tiempo, de subsanar las carencias del material que ofrecen los espacios televisivos para el desarrollo curricular de la materia objeto de las enseñanzas correspondientes al Ciclo Formativo de Grado Medio de Cocina.
APA, Harvard, Vancouver, ISO, and other styles
4

Marshall, P. David. "Seriality and Persona." M/C Journal 17, no. 3 (June 11, 2014). http://dx.doi.org/10.5204/mcj.802.

Full text
Abstract:
No man [...] can wear one face to himself and another to the multitude, without finally getting bewildered as to which one may be true. (Nathaniel Hawthorne Scarlet Letter – as seen and pondered by Tony Soprano at Bowdoin College, The Sopranos, Season 1, Episode 5: “College”)The fictitious is a particular and varied source of insight into the everyday world. The idea of seriality—with its variations of the serial, series, seriated—is very much connected to our patterns of entertainment. In this essay, I want to begin the process of testing what values and meanings can be drawn from the idea of seriality into comprehending the play of persona in contemporary culture. From a brief overview of the intersection of persona and seriality as well as a review of the deployment of seriality in popular culture, the article focuses on the character/ person-actor relationship to demonstrate how seriality produces persona. The French term for character—personnage—will be used to underline the clear relations between characterisation, person, and persona which have been developed by the recent work by Lenain and Wiame. Personnage, through its variation on the word person helps push the analysis into fully understanding the particular and integrated configuration between a public persona and the fictional role that an actor inhabits (Heinich).There are several qualities related to persona that allow this movement from the fictional world to the everyday world to be profitable. Persona, in terms of origins, in and of itself implies performance and display. Jung, for instance, calls persona a mask where one is “acting a role” (167); while Goffman considers that performance and roles are at the centre of everyday life and everyday forms and patterns of communication. In recent work, I have use persona to describe how online culture pushes most people to construct a public identity that resembles what celebrities have had to construct for their livelihood for at least the last century (“Persona”; “Self”). My work has expanded to an investigation of how online persona relates to individual agency (“Agency”) and professional postures and positioning (Barbour and Marshall).The fictive constructions then are intensified versions of what persona is addressing: the fabrication of a role for particular directions and ends. Characters or personnages are constructed personas for very directed ends. Their limitation to the study of persona as a dimension of public culture is that they are not real; however, when one thinks of the actor who takes on this fictive identity, there is clearly a relationship between the real personality and that of the character. Moreover, as Nayar’s analysis of highly famous characters that are fictitious reveals, these celebrated characters, such as Harry Potter or Wolverine, sometime take on a public presence in and of themselves. To capture this public movement of a fictional character, Nayar blends the terms celebrity with fiction and calls these semi-public/semi-real entities “celefiction”: the characters are famous, highly visible, and move across media, information, and cultural platforms with ease and speed (18-20). Their celebrity status underlines their power to move outside of their primary text into public discourse and through public spaces—an extra-textual movement which fundamentally defines what a celebrity embodies.Seriality has to be seen as fundamental to a personnage’s power of and extension into the public world. For instance with Harry Potter again, at least some of his recognition is dependent on the linking or seriating the related books and movies. Seriality helps organise our sense of affective connection to our popular culture. The familiarity of some element of repetition is both comforting for audiences and provides at least a sense of guarantee or warranty that they will enjoy the future text as much as they enjoyed the past related text. Seriality, though, also produces a myriad of other effects and affects which provides a useful background to understand its utility in both the understanding of character and its value in investigating contemporary public persona. Etymologically, the words “series” and seriality are from the Latin and refer to “succession” in classical usage and are identified with ancestry and the patterns of identification and linking descendants (Oxford English Dictionary). The original use of the seriality highlights its value in understanding the formation of the constitution of person and persona and how the past and ancestry connect in series to the current or contemporary self. Its current usage, however, has broadened metaphorically outwards to identify anything that is in sequence or linked or joined: it can be a series of lectures and arguments or a related mark of cars manufactured in a manner that are stylistically linked. It has since been deployed to capture the production process of various cultural forms and one of the key origins of this usage came from the 19th century novel. There are many examples where the 19th century novel was sold and presented in serial form that are too numerous to even summarise here. It is useful to use Dickens’ serial production as a defining example of how seriality moved into popular culture and the entertainment industry more broadly. Part of the reason for the sheer length of many of Charles Dickens’ works related to their original distribution as serials. In fact, all his novels were first distributed in chapters in monthly form in magazines or newspapers. A number of related consequences from Dickens’ serialisation are relevant to understanding seriality in entertainment culture more widely (Hayward). First, his novel serialisation established a continuous connection to his readers over years. Thus Dickens’ name itself became synonymous and connected to an international reading public. Second, his use of seriality established a production form that was seen to be more affordable to its audience: seriality has to be understood as a form that is closely connected to economies and markets as cultural commodities kneaded their way into the structure of everyday life. And third, seriality established through repetition not only the author’s name but also the name of the key characters that populated the cultural form. Although not wholly attributable to the serial nature of the delivery, the characters such as Oliver Twist, Ebenezer Scrooge or David Copperfield along with a host of other major and minor players in his many books become integrated into everyday discourse because of their ever-presence and delayed delivery over stories over time (see Allen 78-79). In the same way that newspapers became part of the vernacular of contemporary culture, fictional characters from novels lived for years at a time in the consciousness of this large reading public. The characters or personnages themselves became personalities that through usage became a way of describing other behaviours. One can think of Uriah Heep and his sheer obsequiousness in David Copperfield as a character-type that became part of popular culture thinking and expressing a clear negative sentiment about a personality trait. In the twentieth century, serials became associated much more with book series. One of the more successful serial genres was the murder mystery. It developed what could be described as recognisable personnages that were both fictional and real. Thus, the real Agatha Christie with her consistent and prodigious production of short who-dunnit novels was linked to her Belgian fictional detective Hercule Poirot. Variations of these serial constructions occurred in children’s fiction, the emerging science fiction genre, and westerns with authors and characters rising to related prominence.In a similar vein, early to mid-twentieth century film produced the film serial. In its production and exhibition, the film serial was a déclassé genre in its overt emphasis on the economic quality of seriality. Thus, the film serial was generally a filler genre that was interspersed before and after a feature film in screenings (Dixon). As well as producing a familiarity with characters such as Flash Gordon, it was also instrumental in producing actors with a public profile that grew from this repetition. Flash Gordon was not just a character; he was also the actor Buster Crabbe and, over time, the association became indissoluble for audiences and actor alike. Feature film serials also developed in the first half-century of American cinema in particular with child actors like Shirley Temple, Mickey Rooney and Judy Garland often reprising variations of their previous roles. Seriality more or less became the standard form of delivery of broadcast media for most of the last 70 years and this was driven by the economies of production it developed. Whether the production was news, comedy, or drama, most radio and television forms were and are variation of serials. As well as being the zenith of seriality, television serials have been the most studied form of seriality of all cultural forms and are thus the greatest source of research into what serials actually produced. The classic serial that began on radio and migrated to television was the soap opera. Although most of the long-running soap operas have now disappeared, many have endured for more than 30 years with the American series The Guiding Light lasting 72 years and the British soap Coronation Street now in its 64th year. Australian nighttime soap operas have managed a similar longevity: Neighbours is in its 30th year, while Home and Away is in its 27th year. Much of the analyses of soap operas and serials deals with the narrative and the potential long narrative arcs related to characters and storylines. In contrast to most evening television serials historically, soap operas maintain the continuity from one episode to the next in an unbroken continuity narrative. Evening television serials, such as situation comedies, while maintaining long arcs over their run are episodic in nature: the structure of the story is generally concluded in the given episode with at least partial closure in a manner that is never engaged with in the never-ending soap opera serials.Although there are other cultural forms that deploy seriality in their structures—one can think of comic books and manga as two obvious other connected and highly visible serial sources—online and video games represent the other key media platform of serials in contemporary culture. Once again, a “horizon of expectation” (Jauss and De Man 23) motivates the iteration of new versions of games by the industry. New versions of games are designed to build on gamer loyalties while augmenting the quality and possibilities of the particular game. Game culture and gamers have a different structural relationship to serials which at least Denson and Jahn-Sudmann describe as digital seriality: a new version of a game is also imagined to be technologically more sophisticated in its production values and this transformation of the similitude of game structure with innovation drives the economy of what are often described as “franchises.” New versions of Minecraft as online upgrades or Call of Duty launches draw the literal reinvestment of the gamer. New consoles provide a further push to serialisation of games as they accentuate some transformed quality in gameplay, interaction, or quality of animated graphics. Sports franchises are perhaps the most serialised form of game: to replicate new professional seasons in each major sport, the sports game transforms with a new coterie of players each year.From these various venues, one can see the centrality of seriality in cultural forms. There is no question that one of the dimensions of seriality that transcends these cultural forms is its coordination and intersection with the development of the industrialisation of culture and this understanding of the economic motivation behind series has been explored from some of the earliest analyses of seriality (see Hagedorn; Browne). Also, seriality has been mined extensively in terms of its production of the pleasure of repetition and transformation. The exploration of the popular, whether in studies of readers of romance fiction (Radway), or fans of science fiction television (Tulloch and Jenkins; Jenkins), serials have provided the resource for the exploration of the power of the audience to connect, engage and reconstruct texts.The analysis of the serialisation of character—the production of a public personnage—and its relation to persona surprisingly has been understudied. While certain writers have remarked on the longevity of a certain character, such as Vicky Lord’s 40 year character on the soap opera One Life to Live, and the interesting capacity to maintain both complicated and hidden storylines (de Kosnik), and fan audience studies have looked at the parasocial-familiar relationship that fan and character construct, less has been developed about the relationship of the serial character, the actor and a form of twinned public identity. Seriality does produce a patterning of personnage, a structure of familiarity for the audience, but also a structure of performance for the actor. For instance, in a longitudinal analysis of the character of Fu Manchu, Mayer is able to discern how a patterning of iconic form shapes, replicates, and reiterates the look of Fu Manchu across decades of films (Mayer). Similarly, there has been a certain work on the “taxonomy of character” where the serial character of a television program is analysed in terms of 6 parts: physical traits/appearance; speech patterns, psychological traits/habitual behaviours; interaction with other characters; environment; biography (Pearson quoted in Lotz).From seriality what emerges is a particular kind of “type-casting” where the actor becomes wedded to the specific iteration of the taxonomy of performance. As with other elements related to seriality, serial character performance is also closely aligned to the economic. Previously I have described this economic patterning of performance the “John Wayne Syndrome.” Wayne’s career developed into a form of serial performance where the individual born as Marion Morrison becomes structured into a cultural and economic category that determines the next film role. The economic weight of type also constructs the limits and range of the actor. Type or typage as a form of casting has always been an element of film and theatrical performance; but it is the seriality of performance—the actual construction of a personnage that flows between the fictional and real person—that allows an actor to claim a persona that can be exchanged within the industry. Even 15 years after his death, Wayne remained one of the most popular performers in the United States, his status unrivalled in its close definition of American value that became wedded with a conservative masculinity and politics (Wills).Type and typecasting have an interesting relationship to seriality. From Eisenstein’s original use of the term typage, where the character is chosen to fit into the meaning of the film and the image was placed into its sequence to make that meaning, it generally describes the circumscribing of the actor into their look. As Wojcik’s analysis reveals, typecasting in various periods of theatre and film acting has been seen as something to be fought for by actors (in the 1850s) and actively resisted in Hollywood in 1950 by the Screen Actors Guild in support of more range of roles for each actor. It is also seen as something that leads to cultural stereotypes that can reinforce the racial profiling that has haunted diverse cultures and the dangers of law enforcement for centuries (Wojcik 169-71). Early writers in the study of film acting, emphasised that its difference from theatre was that in film the actor and character converged in terms of connected reality and a physicality: the film actor was less a mask and more a sense of “being”(Kracauer). Cavell’s work suggested film over stage performance allowed an individuality over type to emerge (34). Thompson’s semiotic “commutation” test was another way of assessing the power of the individual “star” actor to be seen as elemental to the construction and meaning of the film role Television produced with regularity character-actors where performance and identity became indissoluble partly because of the sheer repetition and the massive visibility of these seriated performances.One of the most typecast individuals in television history was Leonard Nimoy as Spock in Star Trek: although the original Star Trek series ran for only three seasons, the physical caricature of Spock in the series as a half-Vulcan and half-human made it difficult for the actor Nimoy to exit the role (Laws). Indeed, his famous autobiography riffed on this mis-identity with the forceful but still economically powerful title I am Not Spock in 1975. When Nimoy perceived that his fans thought that he was unhappy in his role as Spock, he published a further tome—I Am Spock—that righted his relationship to his fictional identity and its continued source of roles for the previous 30 years. Although it is usually perceived as quite different in its constitution of a public identity, a very similar structure of persona developed around the American CBS news anchor Walter Cronkite. With his status as anchor confirmed in its power and centrality to American culture in his desk reportage of the assassination and death of President Kennedy in November 1963, Cronkite went on to inhabit a persona as the most trusted man in the United States by the sheer gravitas of hosting the Evening News stripped across every weeknight at 6:30pm for the next 19 years. In contrast to Nimoy, Cronkite became Cronkite the television news anchor, where persona, actor, and professional identity merged—at least in terms of almost all forms of the man’s visibility.From this vantage point of understanding the seriality of character/personnage and how it informs the idea of the actor, I want to provide a longer conclusion about how seriality informs the concept of persona in the contemporary moment. First of all, what this study reveals is the way in which the production of identity is overlaid onto any conception of identity itself. If we can understand persona not in any negative formulation, but rather as a form of productive performance of a public self, then it becomes very useful to see that these very visible public blendings of performance and the actor-self can make sense more generally as to how the public self is produced and constituted. My final and concluding examples will try and elucidate this insight further.In 2013, Netflix launched into the production of original drama with its release of House of Cards. The series itself was remarkable for a number of reasons. First among them, it was positioned as a quality series and clearly connected to the lineage of recent American subscription television programs such as The Sopranos, Six Feet Under, Dexter, Madmen, The Wire, Deadwood, and True Blood among a few others. House of Cards was an Americanised version of a celebrated British mini-series. In the American version, an ambitious party whip, Frank Underwood, manoeuvres with ruthlessness and the calculating support of his wife closer to the presidency and the heart and soul of American power. How the series expressed quality was at least partially in its choice of actors. The role of Frank Underwood was played by the respected film actor Kevin Spacey. His wife, Clare, was played by the equally high profile Robin Warren. Quality was also expressed through the connection of the audience of viewers to an anti-hero: a personnage that was not filled with virtue but moved with Machiavellian acuity towards his objective of ultimate power. This idea of quality emerged in many ways from the successful construction of the character of Tony Soprano by James Gandolfini in the acclaimed HBO television series The Sopranos that reconstructed the very conception of the family in organised crime. Tony Soprano was enacted as complex and conflicted with a sense of right and justice, but embedded in the personnage were psychological tropes and scars, and an understanding of the need for violence to maintain influence power and a perverse but natural sense of order (Martin).The new television serial character now embodied a larger code and coterie of acting: from The Sopranos, there is the underlying sense and sensibility of method acting (see Vineberg; Stanislavski). Gandolfini inhabited the role of Tony Soprano and used the inner and hidden drives and motivations to become the source for the display of the character. Likewise, Spacey inhabits Frank Underwood. In that new habitus of television character, the actor becomes subsumed by the role. Gandolfini becomes both over-determined by the role and his own identity as an actor becomes melded to the role. Kevin Spacey, despite his longer and highly visible history as a film actor is overwhelmed by the televisual role of Frank Underwood. Its serial power, where audiences connect for hours and hours, where the actor commits to weeks and weeks of shoots, and years and years of being the character—a serious character with emotional depth, with psychological motivation that rivals the most visceral of film roles—transforms the actor into a blended public person and the related personnage.This blend of fictional and public life is complex as much for the producing actor as it is for the audience that makes the habitus real. What Kevin Spacey/Frank Underwood inhabit is a blended persona, whose power is dependent on the constructed identity that is at source the actor’s production as much as any institutional form or any writer or director connected to making House of Cards “real.” There is no question that this serial public identity will be difficult for Kevin Spacey to disentangle when the series ends; in many ways it will be an elemental part of his continuing public identity. This is the economic power and risk of seriality.One can see similar blendings in the persona in popular music and its own form of contemporary seriality in performance. For example, Eminem is a stage name for a person sometimes called Marshall Mathers; but Eminem takes this a step further and produces beyond a character in its integration of the personal—a real personnage, Slim Shady, to inhabit his music and its stories. To further complexify this construction, Eminem relies on the production of his stories with elements that appear to be from his everyday life (Dawkins). His characterisations because of the emotional depth he inhabits through his rapped stories betray a connection to his own psychological state. Following in the history of popular music performance where the singer-songwriter’s work is seen by all to present a version of the public self that is closer emotionally to the private self, we once again see how the seriality of performance begins to produce a blended public persona. Rap music has inherited this seriality of produced identity from twentieth century icons of the singer/songwriter and its display of the public/private self—in reverse order from grunge to punk, from folk to blues.Finally, it is worthwhile to think of online culture in similar ways in the production of public personas. Seriality is elemental to online culture. Social media encourage the production of public identities through forms of repetition of that identity. In order to establish a public profile, social media users establish an identity with some consistency over time. The everydayness in the production of the public self online thus resembles the production and performance of seriality in fiction. Professional social media sites such as LinkedIn encourage the consistency of public identity and this is very important in understanding the new versions of the public self that are deployed in contemporary culture. However, much like the new psychological depth that is part of the meaning of serial characters such as Frank Underwood in House of Cards, Slim Shady in Eminem, or Tony Soprano in The Sopranos, social media seriality also encourages greater revelations of the private self via Instagram and Facebook walls and images. We are collectively reconstituted as personas online, seriated by the continuing presence of our online sites and regularly drawn to reveal more and greater depths of our character. In other words, the online persona resembles the new depth of the quality television serial personnage with elaborate arcs and great complexity. Seriality in our public identity is also uncovered in the production of our game avatars where, in order to develop trust and connection to friends in online settings, we maintain our identity and our patterns of gameplay. At the core of this online identity is a desire for visibility, and we are drawn to be “picked up” and shared in some repeatable form across what we each perceive as a meaningful dimension of culture. Through the circulation of viral images, texts, and videos we engage in a circulation and repetition of meaning that feeds back into the constancy and value of an online identity. Through memes we replicate and seriate content that at some level seriates personas in terms of humour, connection and value.Seriality is central to understanding the formation of our masks of public identity and is at least one valuable analytical way to understand the development of the contemporary persona. This essay represents the first foray in thinking through the relationship between seriality and persona.ReferencesBarbour, Kim, and P. David Marshall. “The Academic Online Constructing Persona.” First Monday 17.9 (2012).Browne, Nick. “The Political Economy of the (Super)Text.” Quarterly Review of Film Studies 9.3 (1984): 174-82. Cavell, Stanley. “Reflections on the Ontology of Film.” Movie Acting: The Film Reader. Ed. Wojcik and Pamela Robertson. London: Routledge, 2004 (1979). 29-35.Dawkins, Marcia Alesan. “Close to the Edge: Representational Tactics of Eminem.” The Journal of Popular Culture 43.3 (2010): 463-85.De Kosnik, Abigail. “One Life to Live: Soap Opera Storytelling.” How to Watch Television. Ed. Ethan Thompson and Jason Mittell. New York: New York University Press, 2013. 355-63.Denson, Shane, and Andreas Jahn-Sudmann. “Digital Seriality: On the Serial Aesthetics and Practice of Digital Games.” Journal of Computer Game Culture 7.1 (2013): 1-32.Dixon, Wheeler Winston. “Flash Gordon and the 1930s and 40s Science Fiction Serial.” Screening the Past 11 (2011). 20 May 2014.Goffman, Erving. The Presentation of Self in Everyday Life. Woodstock, New York: The Overlook Press, 1973.Hagedorn, Roger “Technology and Economic Exploitation: The Serial as a Form of Narrative Presentation.” Wide Angle 10. 4 (1988): 4-12.Hayward, Jennifer Poole. Consuming Pleasures: Active Audiences and Serial Fictions from Dickens to Soap Opera. Lexington: University Press of Kentucky, 1997.Heinrich, Nathalie. “Personne, Personnage, Personalité: L'acteur a L'ère De Sa Reproductibilité Technique.” Personne/Personnage. Eds. Thierry Lenain and Aline Wiame. Paris: Librairie Philosophique J. Vrin, 2011. 77-101.Jauss, Hans Robert, and Paul De Man. Toward an Aesthetic of Reception. Brighton: Harvester, 1982.Jenkins, Henry. Textual Poachers: Television Fans & Participatory Culture. New York: Routledge, 1992.Jung, C. G., et al. Two Essays on Analytical Psychology. 2nd ed. Princeton, N.J.: Princeton University Press, 1966.Kracauer, Siegfried. “Remarks on the Actor.” Movie Acting, the Film Reader. Ed. Pamela Robertson Wojcik. London: Routledge, 2004 (1960). 19-27.Leonard Nimoy & Pharrell Williams: Star Trek & Creating Spock. Ep. 12. Reserve Channel. December 2013. Lenain, Thierry, and Aline Wiame (eds.). Personne/Personnage. Librairie Philosophiques J. VRIN, 2011.Lotz, Amanda D. “House: Narrative Complexity.” How to Watch TV. Ed. Ethan Thompson and Jason Mittell. New York: New York University Press, 2013. 22-29.Marshall, P. David. “The Cate Blanchett Persona and the Allure of the Oscar.” The Conversation (2014). 4 April 2014.Marshall, P. David “Persona Studies: Mapping the Proliferation of the Public Self.” Journalism 15.2 (2014): 153-70.Marshall, P. David. “Personifying Agency: The Public–Persona–Place–Issue Continuum.” Celebrity Studies 4.3 (2013): 369-71.Marshall, P. David. “The Promotion and Presentation of the Self: Celebrity as Marker of Presentational Media.” Celebrity Studies 1.1 (2010): 35-48.Marshall, P. David. Celebrity and Power: Fame in Contemporary Culture. 2nd Ed. Minneapolis: University of Minnesota Press, 2014.Martin, Brett. Difficult Men: Behind the Scenes of a Creative Revolution: From The Sopranos and The Wire to Mad Men and Breaking Bad. London: Faber and Faber, 2013.Mayer, R. “Image Power: Seriality, Iconicity and the Mask of Fu Manchu.” Screen 53.4 (2012): 398-417.Nayar, Pramod K. Seeing Stars: Spectacle, Society, and Celebrity Culture. New Delhi; Thousand Oaks, California: Sage Publications, 2009.Nimoy, Leonard. I Am Not Spock. Milbrae, California: Celestial Arts, 1975.Nimoy, Leonard. I Am Spock. 1st ed. New York: Hyperion, 1995.Radway, Janice A. Reading the Romance: Women, Patriarchy, and Popular Literature. Chapel Hill: University of North Carolina Press, 1984.Stanislavski, Constantin. Creating a Role. New York: Routledge, 1989 (1961).Thompson, John O. “Screen Acting and the Commutation Test.” Movie Acting: The Film Reader. Ed. Pamela Robertson Wojcik. London: Routledge, 2004 (1978). 37-48.Tulloch, John, and Henry Jenkins. Science Fiction Audiences: Watching Doctor Who and Star Trek. London; New York: Routledge, 1995.Vineberg, Steve. Method Actors: Three Generations of an American Acting Style. New York; Toronto: Schirmer Books, 1991.Wills, Garry. John Wayne’s America: The Politics of Celebrity. New York: Simon & Schuster, 1997.Wojcik, Pamela Robertson. “Typecasting.” Movie Acting: The Film Reader. Ed. Pamela Robertson Wojcik. London: Routledge, 2004. 169-89.
APA, Harvard, Vancouver, ISO, and other styles
5

Cover, Rob. "Reading the Remix: Methods for Researching and Analysing the Interactive Textuality of Remix." M/C Journal 16, no. 4 (August 12, 2013). http://dx.doi.org/10.5204/mcj.686.

Full text
Abstract:
IntroductionWith the proliferation of remixed (audio-visual) texts such as fan music videos, slash video, mash-ups and digital stories utilising existing and new visual and audio material on sites such as YouTube, questions are opened as to the efficacy of current forms of media textual analysis. Remixed texts have been positioned as a new and transformative form of art that, despite industry copyright concerns, do not compete with existing texts but makes use of them as ‘found material’ in order to produce an ostensibly intertextual experience (Lessig). Intertexts include pastiche, parody and/or allusion to extant texts and, at the same time, acknowledge that no text is purely original but is built on its ostensible or tacit relationality with a broad range of other texts—relationalities which may be activated in reading or be coded into the text. Remixes are often the work of fan audiences who seek to engage in a participatory manner—a particular reading position that shifts into the act of writing—with texts, television, film and music of which one is a member of an avid audience or a community audience that engage with each other through collaborative production of new texts based on old. The remix is a substantial outcome of such readerly, writerly and collaborative engagement whereby meanings drawn intertextually from the original text are re-produced, expanded upon, critiqued or re-framed through several different activities which may include: re-ordering existing audio-visual material in a way which, according to Constance Penley, was once done by Star Trek fans using magnetic tape and two video recorders to produce new narratives and interpretative frames by cutting and suturing material in an order different from that broadcast (Penley);presenting new meanings to texts, stories or narratives by taking visual material either in short cuts or long scenes and layering over popular music audio tracks, which is commonly done by television fans, such as fans of Buffy the Vampire Slayer in the early 2000s, who produce new meanings or re-emphasise old ones around relationships by bringing together (sometimes cheesy) songs with televised footage (Cover, More Than a Watcher). In both cases, the texts are both new and old—they are a remix of existing material, but the act of remixing produces new frames for the activations of meanings or new narratives, that sit between the interactive and the intertextual. The fact that these forms can be traced back to pre-digital technologies of the 1970s (in the case of Penley’s Star Trek fan videos) or the pre-YouTube and Web 2.0 participatory sharing (in the case of Cover’s Buffy the Vampire Slayer fan videos, distributed through newslists, email and private website) indicates the deep-seated cultural desire or demand for participatory engagement and co-creative forms of encountering texts (Cover, Interactivity). In light of this new form of participatory communication experience, there has emerged a methodological gap requiring new frameworks for researching and analysing the remix text as a text, and within the context of its interactivity, intertextuality, layering and the ways in which these together reconfigure existing narratives and produce new narrative. This paper outlines some approaches used in teaching students about contemporary interactive and convergent digital texts by undertaking practical textual analyses of sample remix audio-video texts. I will discuss some of the more important theoretical issues concerning the analysis of remix texts, with particular attention to notions of interactivity, intertextuality and layering. I will then outline some practical steps for undertaking this kind of analysis in the classroom. By understanding the remix text through a metaphor of layering (drawn from Photoshopping and digital manipulation terminology), a method for ‘remix analysis’ can be put forward that presents innovative ways of engaging with textuality and narrative. Such analyses incorporate narrative sourcing, identification of user-generated content, sequencing, digital manipulation, framing and audio/visual juxtaposition as starting points for reading the remix text. Remix analyses, in this framework, optimise a reflective engagement with contemporary issues of copyright and intellectual property, textual genealogy, intertextuality, co-creative production and emergent forms of interactivity. Interactivity and Intertextuality For Lawrence Lessig, remix is a form of creativity that puts in question the separation between reader and writer. It emphasises instead the participatory form in which read-write creativity (or co-creativity) becomes the normative standard of high-level engagement with extant texts through both selection and arrangement (56). Remix culture, for Lessig, makes use of digital technologies that have been developed for other purposes and practices and delivers forms of collage, complexity, and co-creativity directed towards a broader audience. The role played by YouTube as a sharing site which makes available the massive number of remixed texts is testament to the form’s significance as an interactive, intertextual creation or co-creation. As Burgess and Green have argued, consumer co-creation is fundamental to YouTube’s mission and role in the distribution of texts (4-5). It is more than a peripheral site for re-distribution of either existing texts or private video-logs but, today, operates as a mainstream component in a broader media matrix. In this matrix, the experience of textual audiencehood is re-coded as participatory engagement with prior texts, in order both to reflect on those texts and to produce new ones in a co-creative capacity. This is not to suggest that YouTube is not complicit in copyright regimes that actively seek to restrict participatory and co-creative artistic practice in favour of older models of textual ownership and control over distribution (Cover, Audience Inter/Active). Its digital capacity to police remixed texts that have been marked by corporate copyright holders as unavailable for further use or manipulation has been a substantial development on the side of traditional copyright in the push-pull struggle between free co-creativity and limiting regimes (Cover, Interactivity), although this does not altogether stem the production of the remix as a substantial experience of artistic practice and of user participatory engagement with media matrices. Central to understanding and analysing the remix as a text in its own right is the fact that it is interactive, a point which leads to the assertion that analytic tools suited to traditional, non-interactive texts are not always going to be adequate to the task of unpacking and drawing out thematic and conceptual material from a remix’s narrative. Although interactivity has been difficult to define, the form of interactivity in which we see the remix is that which involves an element of co-creativity between the author of a source text and the user of the text who interacts with the source to transform it into something new. Spiro Kiousis has argued that while definitions of interactivity are amorphous, there is value in the concept “as long as we all accept that the term implies some degree of receiver feedback and is usually linked to new technologies” (357). For Lelia Green, however, interactivity implies the capacity of a communication medium to have its products altered by the actions of a user or audience (xx). In the case of the latter, interactivity covers not only the sorts of texts in which audience or user engagement is required as a built-in part of the process, such as in digital games, but those texts, forms, mediums and experiences in which existing texts are manipulated, revised, re-used or brought together, such as in the remix. Drawing on Bordewijk and van Kaam, Sally McMillan delineated the concept of interactivity into a typology of four intersecting levels or uses: Allocution, in which interactive engagement is minimal, and is set within the context of a single, central broadcaster and multiple receivers on the periphery (273). This would ordinarily include most traditional mass media forms such as television and the selection of channels.Consultation, which occurs in the use of a database, such as a website, where a user actively searches for pre-provided information but does not seek to alter that information (273). Access here does not alter the content, source, narrative or information that has been requested. Drawing information from Wikipedia without the intent of editing information may alter the metadata or framework through providing the site with tracking information, but in this case the textuality of the text as accessed is not transformed through this level of interactivity.Registration, which does record access patterns and accumulates information from the periphery in a central registry which alters the information, significance or context of the material (273). McMillan’s early Web 1.0 example of registrational interactivity was the internet ‘cookie’, which tracks and customises content of internet sites visited by the user. However, as a category of interactivity in which the narrative or form of the text itself is altered in its reading or use, it might also be said to include the electronic game as well as forms of communications engagement which access a source text, manipulate, customise or re-form it using commonly-available or sophisticated software, and re-distribute it through digital means. Here, the narrative is knowingly acted upon in ways which alter it for other uses. Conversational, which occurs when individuals interact directly with each other, usually in real-time in ways which mimic face-to-face engagement without physical presence at a locale (273). An online written chat using a relay platform provided by a social networking site that does not record the text is an example; likewise using a video skype account is also conversational interactivity. While McMillan’s ‘registrational’ definition of interactivity, as the one which gives greater capacity to an audience to change, alter and manipulate a text or a textual narrative, allows considerable redefinition of the traditional author-text-audience relationship, none of the four-scale definitions adequately allow for the ways in which remix texts are at once interactive, intertextual, intermedial and built through participatory re-layering and re-organising of a broader corpus of material in ways typically not invited by the original texts or their original distributional mediums—hence the concerns around copyright and distributional control (Cover, Audience Inter/Active). As an outcome of registrational interactivity, the remix presents itself not merely in terms of how the relationship is structured in the context of new digital media, but also shifts how the audience has been conceived historically in terms of its ability to control the text and its internal structure and coherence. In light of both new developments in interactivity with the text as found in the increasing popularity of new media forms such as electronic gaming, and the ‘backlash’ development of new technologies, software and legal methods that actively seek to prevent alteration and re-distribution of texts, the historical and contemporary conception of the author-text-audience affinity can be characterised as a tactical war of contention for control over the text. This is a struggle set across a number of different contexts, media forms, sites and author/audience capacities but is embodied in the legal, cultural and economic skirmishes over the form and use of remix texts. More significantly, however, the remix is an interactivity that is conscious of the intertextuality that produces the various juxtapositions to create new narratives. All texts are intertextual, and the concept of intertextuality takes into account the network of other, similar texts to which any new text contributes and by which it is influenced. This similarity can be produced by several factors, including genre, allusion, trace, pastiche and aesthetics. Intertextuality can include the fact that a text is related to and permeated by the discourse of its sources (Bignell 92), but in all cases it shapes the meanings, significations and potential readings of a text in a way attuned to the polysemy of contemporary cultural production. In the context of interactivity, however, it is through co-creative engagement that intertextuality of both the source and the new text are drawn out as a deliberate act of creation. Layering As an interactive and deliberately intertextual text, the remix or mash-up is best understood as layered intermedia, that is, as a narrative comprised of—or fused between—moving image and sound, audio which includes dialogue, effects, incidental and narrative-related music. In that context, no individual component of the text can be understood or analysed away from the elements into which it has been remixed. New meanings emerge in intermedia remixes not simply because originary or new intertextualities are produced by user-creators relying on existing sources, but because those sources themselves no longer operate with the same set of meanings and significations, allowing the productive activation of new meanings (Bennett). While it is important to pay attention to the fact that the narrative of a remix text works only through the reconfiguration of the intermedia of audio and visual in order to create a new text with subsequent new potential meanings, the analysis must pay attention to the various forms of layering that constitute all audio-visual texts. For Lessig, such layering is a digital form of collage (70). However it is also the means by which, on the one hand, new intertextualities are developed through juxtaposition of different sources in order to give them all new significations and to activate new meanings and, on the other hand, to draw attention to the existing potential intertextuality of the sources and the polysemy of meaning. Understanding layering of texts involves understanding a text in a three-dimensional capacity. This is where some basic awareness of digital image manipulation through application software such as Photoshop and Gimp can be instructive in providing frameworks through which to understand contemporary digital media forms and analyse the ways in which they, as potential, productively activate sets or ranges of meanings. Such digital manipulation programs require the user to think about, say, an image as being built upon and manipulated across different layers, whereby a core image is ‘drawn out’ into its third dimension through adding, shifting, changing, re-figuring and re-framing—layer over layer. The core remains, but is radically altered by what occurs at the different layers. Likewise, the remix is produced through interacting with a number of different source texts together within a conceptual framework that is three-dimension and operates across layers. These include the two primary layers of the visual and the audio—for remixes are typically audio-visual—but also through interacting with a range of intertextual meanings that, likewise, can be understood in three-dimensional layers across the temporality of an audio-visual moving text. Method of Analysis A simple typology for analysing remix texts—focusing particularly on fan videos on YouTube, including same-sexualised fan fiction known as slash and those texts which re-order television and film material juxtaposed against popular music tracks—emerged from a first-year undergraduate digital media cultures course I taught at The University of Adelaide in 2010. With a broad range of meanings, views, interpretations and engagements emerging in large-group teaching, we workshopped possible scenarios with the aim of establishing some steps that can be used to consider the place of the remix in the context of its narrative interactivity and intertextual groundings. A typological method for analysis is not necessarily the most sophisticated way in which to draw out narrative threads and strands from a remix text and, indeed, there may be value in exploring remixed texts from other perspectives such as the YouTube-enabled participatory reflectiveness that emerges from community and commentary perspectives. However, to understand the narrative elements that emerge from a remix there is also great value in beginning with an unstitching of its constituent components in order to understand the interactive, intertextual, intermedial formation of the remix through its structuration and selectivity and assembling of extant texts. To best describe a typology for analysing the remix as a text and an interactive intertext, we might use an example. Let us say, hypothetically, a YouTube remix video of three- minutes-and-fifty-seconds in length that takes various scenes from the television series Arrested Development, perhaps the two characters of adult brothers GOB and Michael Bluth, from across its four years and sets them against a single audio track, Belle & Sebastian’s Seeing Other People. Such an example would not be an uncommon remix, which may be an expression of fandom for Arrested Development or perhaps an expression of critical engagement that actively draws attention to the range of reading positions, formations and potential productive activation of meanings (Bennett) around sibling relationships in the original. That is, by juxtaposing a popular audio track about the awkwardness of romantic relationships against images of the closeness, distance and competitiveness of the two brothers is to give it a ‘slash’ element, thereby presenting a narrative which either implies a pseudo-sexual or romantic component to the brotherly relationship (an activity not uncommon in the production of slash) or makes a critical statement about the way in which the theatrics of touch, familial hugging, looking and seeing or positioning in visual frames is utilised in the series in ways which are open to alternative readings. Now that it is determined such a remix might actively and self-consciously play with the juxtaposition across two layers to create additional meanings, the real work of analysis can be undertaken. This, of course, could include thematic, discursive or narrative analysis of the text alone. However, if one is to work with the notion that a remix is always produced in both interactivity and intertextuality, then a number of steps must be taken at the level of individual layers and, subsequently, together. This aids in understanding the sourcing, collocation, positioning, re-ordering in order to come to a depth of interpretation as to a possible meaning of the remix among the many available in a polysemic cultural product. Step One: Determine the Video Narrative Source. This involves establishing if the remix’s video material is from a singular source (such as a single film or television episode), multiple sources (many films) and, if multiple, if these are from the same genre, with the same actors, same director or different in each case. It also involves ascertaining if there is user-generated visual content such as additional material, animation or captioning. Exploring the possible arrangements of the visual source, while assuming that the audio track remains singular and identifiable, provides opportunities to consider the thematic, genre and story elements and their significations for the resulting new, co-creative narrative of the remix. This step invites the scholar to consider how the remix’s discernible narrative differs from the scholar’s reading of the source video texts, how the visual material signifies without its original audio component (for example, the dialogue in a television episode) and the ways in which the separation of the source visual from audio presents new interpretative frames. Step Two: Understand the Narrative Sequence. Has the video material been cut (pieces extracted and re-joined? Has the temporal order of the video material been re-sequenced. How do these shifts and changes impact on the narrative or story told? In our example here, we might find a series of scenes of two characters hugging or touching, with the narrative elements from the original episode that occur between—that is, that give a context to those hugs—removed. Asking how the removal of that contextual material presents the source clips as a new narrative and a new interactively-derived creation is central to this step. Step Three: Visual Manipulation. What additional visual manipulation features have been added—fade-ins, fade-outs, framing, changes to the speed or playback time of the source video? Accounting for these enables the viewer to position the remix narrative at a point of distance from the source, shifting from derivative to intertextual. Naturally, these must be understood in the context of the earlier steps while foregrounding the interactive form of the remix as a co-created piece that is more than just an intervention into an original text but the utilisation through manipulation of a range of texts to produce a new one. Step Four: Narrative Engagement and Collocation. Here, the scholar must assess the extent to which the audio source has a ‘fit’ with the visual. Thematic and discourse analysis (among others) can be applied to determine the way in which audio track, in addition to the above four steps and manipulations, productively activate new meanings, contexts and frames in the narrative. Importantly, however, this step requires not only asking what the audio does to the video, but the reverse. Using the Arrested Development example, one must ask what the visual material does for the meanings that are denoted within the audio, its musical elements and its lyrics: to what extent does the video source ‘fit’ with or re-position the significance of the audio dialogue and present it with meanings it would not otherwise have in an audio-online context (or, of course, in the context of its use in an ‘authorised’ music video). Together, these four steps present one possible means of ‘coming at’ the interactive and intertextual roots of the remix as a co-creative text. It is not merely to analyse how the source has been used or how the remix allows the sources to be presented or distributed differently, but to understand how new narratives emerge in the context of the various ‘mixings’ that come out of interactive engagement with the text to produce intertextual activation of meanings. Analysing remix texts through this method opens the possibility not only of being able to articulate readings of the text that are built on interactivity and layering, but a critique of the contemporary conditions of textual production. By demonstrating the ways in which a text can be understood to be located not just within intertextuality but within intertextual layers, it is possible to reflect more broadly on all textuality as being produced, disseminated and having its meanings productively activated in the context of ‘degrees’ of layers and ‘degrees’ of of interactivity. References Bennett, T. “Texts, Readers, Reading Formations.” Literature and History 9.2 (1983): 214-227. Bignell, J. Media Semiotics: An Introduction. Manchester: Manchester University Press, 1997. Bordewijk, J.L., and B. van Kaam. “Towards a New Classification of Tele-Information Services.” InterMedia 14.1 (1986): 16-21. Burgess, J., and J. Green. YouTube: Online Video and Participatory Culture. Cambridge: Polity, 2009. Cover, R. “Interactivity: Reconceiving the Audience in the Struggle for Textual ‘Control’.” Australian Journal of Communication, 31.1 (2004): 107-120. — — —. “Audience Inter/Active: Interactive Media, Narrative Control & Reconceiving Audience History.” New Media & Society 8.1 (2006): 213-232. — — —. “More than a Watcher: Buffy Fans, Amateur Music Videos, Romantic Slash and Intermedia.” Music, Sound and Silence in Buffy the Vampire Slayer. Ed. P. Attinello, J. K. Halfyard & V. Knights, London: Ashgate, 2010. 131-148. Green, L. Communication, Technology and Society. St. Leonards, NSW: Allen & Unwin, 2002. Jenkins, H. “What Happened before YouTube.” YouTube: Online Video and Participatory Culture. Ed. J. Burgess and J. Green. Cambridge: Polity, 2009. 109-125. Kiousis, S. “Interactivity: A Concept Explication.” New Media & Society 4.3 (2002): 355-383. Lessig, L. Remix: Making Art and Commerce Thrive in the Hybrid Economy. London: Bloomsbury Academic, 2008. McMillan, S. “A Four-Part Model of Cyber-Interactivity: Some Cyber-Places are More Interactive than Others.” New Media & Society 4.2 (2002): 271-291. Penley, C. Nasa/Trek: Popular Science and Sex in America. London & New York: Verso, 1997.
APA, Harvard, Vancouver, ISO, and other styles
6

Shaw, Janice Marion. "The Curious Transformation of Boy to Computer." M/C Journal 19, no. 4 (August 31, 2016). http://dx.doi.org/10.5204/mcj.1130.

Full text
Abstract:
Mark Haddon’s The Curious Incident of the Dog in the Night-Time has achieved success as “the new Rain Man” or “the new definitive, popular account of the autistic condition” (Burks-Abbott 294). Integral to its favourable reception is the way it conflates the autistic main character, the fifteen-year-old narrator Christopher Boone, with the savant, or individual who exhibits both neurological problems and giftedness, thereby engaging with the way autism is presented in popular culture. In a variety of contemporary films and television series, autism has been transformed from a disability to a form of giftedness by relating it to abilities associated in contemporary media with a genius, in particular by invoking the metaphor of an autistic mind as a type of computer. As a result, the book engages with the current association of giftedness in mathematics and science with social awkwardness and isolation as constructed in popular culture: in idiomatic terms, the genius “nerd” figure characterised by an uncertain, adolescent approach to social contact (Kendall 353). The disablement of the character is, then, lessened so that the idea of being “special,” continually evoked throughout the text, has a transformative function that is related less to the special needs of those with a disability and more to the common element in adolescent fiction of longing for extraordinary power and control through being a special, gifted individual. The Curious Incident of the Dog in the Night-Time relates the protagonist, Christopher, to Sherlock Holmes and his methods of detection, specifically through the title being taken from a story by Conan Doyle, “Silver Blaze,” in which the “curious incident” referred to is that the dog did nothing in the night. In the original story, that the dog did not bark or react to an intruder was a clue that the person was known to the animal, so allowing Holmes to solve the crime by a process of deduction. Christopher copies these traditional methods of the classical detective to solve his personal mystery, that of who killed a neighbour’s dog, Wellington. The adoption of this title allows a double irony to emerge. Christopher’s attempts to emulate Holmes in his approach to crime are predicated on his assumption of his likeness to the model of the classical detective as he states, “I think that if I were a proper detective he is the kind of detective I would be,” pointing out the similarity of their powers of observation and his ability, like Holmes, to “detach his mind at will” as well as his capacity to find patterns in events (92). Through the novel, these attributes are aligned with his autism, constructing a trope of his disability conferring extraordinary abilities that are predicated on a computer-like detachment and precision in his method of thinking. The accessible narrative of the autistic Christopher gives the reader the impression of being able to understand the perspective of an individual with a spectrum disorder. In this way, the text not only engages with, but contributes to the construction of this disability in current popular culture as merely an extension of giftedness, especially in mathematics, and an associated unwillingness to communicate. Indeed, according to Raoul Eshelman, “one of its most engaging narrative devices is to make us identify with a mentally impaired narrator who is manifestly not interested in identifying either with us or anyone else” (1). The main character’s reference to mathematical and scientific ideas exploits an interest in giftedness already established by popular literature and film, and engages with a transformation effected in popular culture of the genius as autistic, and its corollary of an autistic person as potentially a genius. Such a construction ranges from fictional characters like Sheldon in The Big Bang Theory, Charlie and his physicist colleagues in Numb3rs, and Raymond Babbitt in Rain Man, to real life characters or representative figures in reality series and feature films such as x + y, The Imitation Game, The Big Short, and the television program Beauty and the Geek. While never referring specifically to autism, all the real or fictional representations contribute to the construction of a stereotype in which behaviours on the autistic spectrum are linked to a talent in mathematics and the sciences. In addition to this, detectives in the classical crime fiction alluded to in the novel typically exhibit traits of superhuman powers of deduction, pattern making, and problem solving that engage with the popular notion of genius in general and mathematics in particular by possessing a mind like a computer. Such detectives from current television series as Saga from The Bridge and Spencer Reid from Criminal Minds exhibit distance, coldness, and lack of social awareness or empathy with others, and this is presented as the basis of their extraordinary ability to discern patterns and solve crime. Spencer Reid, for example, has three PhDs in Science disciplines and Mathematics. Charlie in the television series Numb3rs is also a genius who uses his mathematical abilities to not only find the solution to crime but also explain the maths behind it to his FBI colleagues, and, in conjunction, the audience. But the character with the clearest association to Christopher is, naturally, Sherlock Holmes, both as constructed in Conan Doyle’s original text and the current adaptations and transformations of it. The television series Sherlock and Elementary, as well as the films Sherlock Holmes and Sherlock Holmes: A Game of Shadows all invoke a version of Holmes in which his powers of deduction are associated with symptoms to be found in a spectrum disorder.Like Christopher, the classical detective is characterised by being cold, emotionless, distant, socially inept, and isolated, but also keenly observant, analytical, and scientific; one who approaches the crime as a puzzle to be solved (Cawelti 43) with computer-like precision. In what is considered to be the original detective story, The Murders in the Rue Morgue, Poe included a “pseudo-mathematical logic in his literary scenario” (Platten 255). In Conan Doyle’s stories, Holmes, too, adopts a mathematical and scientific approach to construct patterns from clues that he alone can discern, and thereby solve the crime. The depiction of investigators in contemporary media such as Charlie in Numb3rs engages with these origins so that he is objective, dispassionate, and able to relate to real-world problems only through the filter of mathematical formulae. Christopher is presented similarly by engaging with the idea of the detective as implied savant and relying on an ability to discern patterns for successful crime solving.The book links the disabling behaviours of autism with the savant, so that the stereotype of the mystic displaying both disability and giftedness in fiction of earlier ages has been transformed in contemporary literature to a figure with extraordinary powers related both to autism and to the contemporary form of mysticism: innate mathematical ability and computer-style calculation. Allied with what Murray terms the “unknown and ambiguous nature” of autism, it is characterised as “the alien within the human, the mystical within the rational, the ultimate enigma” (25) in a way that is in keeping with the current fascination with the nature of genius and its association with being “special,” a term continually evoked and discussed throughout the book by the main character. The chapters on scientific ideas relate to Christopher’s world view, filtered through a mathematical and analytical approach to life and relationships with other people. Christopher examines beliefs such as the concept of humanity as superior to other animals, and the idea of religion and creationism, that is, the idea of humanity itself as special, with a cold and logical approach. He similarly discusses the idea of the individual person as special, linking this to a metaphor of the human mind being a computer (203, 148). Christopher’s narrow perspective as a result of his autism is not presented as disabling so much as protective, because the metaphorical connection of his viewpoint to a computer provides him with distance. Although initially Christopher fails to realise the significance of events, this allows him to be “switched off” (103) from events that he finds traumatising.The transformative metaphor of an autistic individual thinking like a computer is also invoked through Christopher’s explanation of “why people think that their brains are special, and different from computers” (147). Indeed, both in terms of his tendency to retreat or by “pressing CTRL + ALT + DEL and shutting down programs and turning the computer off and rebooting” (178) in times of stress, Christopher metaphorically views himself as a computer. Such a perspective invokes yet another popular cultural reference through the allusion to the human brain as “Captain Jean-Luc Picard in Star Trek: The Next Generation, sitting in his captain’s seat looking at a big screen” (147). But more importantly, the explanation refers to the basic premise of the book, that the text offers access to a condition that is inherently unknowable, but able to be understood by the reader through metaphor, often based on computers or technology as a result of a popular construction of autism that “the condition is the product of a brain in which the hard drive is incorrectly formatted” (Murray 25).Throughout the novel, the notion of “special” is presented as a trope for those with a disability, but as the protagonist, Christopher, points out, everyone is special in some way, so the whole idea of a disability as disabling is problematised throughout the text, while its associations of giftedness are upheld. Christopher’s disability, never actually designated as Asperger’s Syndrome or any type of spectrum disorder, is transformed into a protective mechanism that shields him from problematic social relationships of which he is unaware, but that the less naïve reader can well discern. In this way, rather than a limitation, the main character’s disorder protects him from a harsh reality. Even Christopher’s choice of Holmes as a role model is indicative of his desire to impose an eccentric order on his world, since this engages with a character in popular fiction who is famous not simply for his abilities, but for his eccentricity bordering on a form of autism. His aloof personality and cold logic not only fail to hamper him in his investigations, but these traits actually form the basis of them. The majority of recent adaptations of Conan Doyle’s stories, especially the BBC series Sherlock, depict Holmes with symptoms associated with spectrum disorder such as lack of empathy, difficulty in communication, and limited social skills, and these are clearly shown as contributing to his problem-solving ability. The trope of Christopher as detective also allows a parodic, postmodern comment on the classical detective form, because typically this fiction has a detective that knows more than the reader, and therefore the goal for the reader is to find the solution to the crime before it is revealed by the investigator in the final stages of the text (Rzepka 14). But the narrative works ironically in the novel since the non-autistic reader knows more than a narrator who is hampered by a limited worldview. From the beginning of the book, the narrative as focalised through Christopher’s narrow perspective allows a more profound view of events to be adopted by the reader, who is able to read clues that elude the protagonist. Christopher is well aware of this as he explains his attraction to the murder mystery novel, even though he has earlier stated he does not like novels since his inability to imagine or empathise means he is unable to relate to their fiction. For him, the genre of murder mystery is more akin to the books on maths and science that he finds comprehensible, because, like the classical detective, he views the crime as primarily a puzzle to be solved: as he states, “In a murder mystery novel someone has to work out who the murderer is and then catch them. It is a puzzle. If it is a good puzzle you can sometimes work out the answer before the end of the book” (5). But unlike Christopher, Holmes invariably knows more about the crime, can interpret the clues, and find the pattern, before other characters such as Watson, and especially the reader. In contrast, in The Curious Incident of the Dog in the Night-Time, the reader has more awareness of the probable context and significance of events than Christopher because, like a computer, he can calculate but not imagine. The reader can interpret clues within the plot of the story, such as the synchronous timing of the “death” of Christopher’s mother with the breakdown of the marriage of a neighbour, Mrs Shears. The astute reader is able to connect these events and realise that his mother has not died, but is living in a relationship with the neighbour’s husband. The construction of this pattern is denied Christopher, since he fails to determine their significance due to his limited imagination. Such a failure is related to Simon Baron-Cohen’s Theory of Mind, in which he proposes that autistic individuals have difficulty with social behaviour because they lack the capacity to comprehend that other people have individual mental states, or as Christopher terms it, “when I was little I didn’t understand about other people having minds” (145). Haddon utilises fictional licence when he allows Christopher to overcome such a limitation by a conscious shift in perspective, despite the specialist teacher within the text claiming that he would “always find this very difficult” (145). Christopher has here altered his view of events through his modelling both on the detective genre and on his affinity with mathematics, since he states, “I don’t find this difficult now. Because I decided that it was a kind of puzzle, and if something is a puzzle there is always a way of solving it” (145). In this way, the main character is shown as transcending symptoms of autism through the power of his giftedness in mathematics to ultimately discern a pattern in human relationships thereby adopting a computational approach to social problems.Haddon similarly explains the perspective of an individual with autism through a metaphor of Christopher’s memory being like a DVD recording. He is able to distance himself from his memories, choosing “Rewind” and then “Fast Forward” (96) to retrieve his recollection of events. This aspect of the precision of his memory relates to his machine-like coldness and lack of empathy for the feelings of others. But it also refers to the stereotype of the nerd figure in popular culture, where the nerd is able to relate more to a computer than to other people, exemplified in Sheldon from the television series The Big Bang Theory. Thus the presentation of Christopher’s autism relates to his giftedness in maths and science more than to areas that relate to his body. In general, descriptions of inappropriate or distressing bodily functions associated with disorders are mainly confined to other students at Christopher’s school. His references to his fellow students, such as Joseph eating his poo and playing in it (129) and his unsympathetic evaluation of Steve as not as clever or interesting as a dog because he “needs help to eat his food and could not even fetch a stick” (6), make a clear distinction between him and the other children, who despite being termed “special needs” are “special” in a different way from Christopher, because, according to him, “All the other children at my school are stupid” (56). While some reference is made to Christopher’s inappropriate behaviour in times of stress, such as punching a fellow student, wetting himself while on the train, and vomiting outside the school, in the main the emphasis is on his giftedness as a result of his autism, as displayed in the many chapters where he explains scientific and mathematical concepts. This is extrapolated into a further mathematical metaphor underlying the book, that he is like one of the prime numbers he finds so fascinating, because prime numbers do not fit neatly into the pattern of the number system, but they are essential and special nevertheless. Moreover, as James Berger suggests, prime numbers can “serve as figures for the autistic subject,” because like autistic individuals “they do not mix; they are singular, indivisible, unfactorable” yet “Mathematics could not exist without these singular entities that [. . .] are only apparent anomalies” (271).Haddon therefore offers a transformation by confounding autism with a computer-like ability to solve mathematical problems, so that the text is, as Haddon concedes, “as much about a gifted boy with behavior problems as it is about anyone on the autism spectrum” (qtd. in Burks-Abbott 291). Indeed, the word “autism” does not even appear in the book, while the terms “genius,” (140) “clever,” (32, 65, 252) and the like are continually being invoked in descriptions of Christopher, even if ironically. More importantly, the reader is constantly being shown his giftedness through the reiteration of his study of A Level Mathematics, and his explanation of scientific concepts. Throughout, Christopher explains aspects of mathematics, astrophysics, and other sciences, referring to such well-known puzzles in popular culture as the Monty Hall problem, as well as more obscure formulae and their proofs. They function to establish Christopher’s intuitive grasp of complex mathematical and scientific principles, as well as providing the reader with insight into both his perspective and the paradoxical nature of an individual who is at once able to solve quadratic equations in his head, yet is incapable of understanding the simple instruction, “Take the tube to Willesden Junction” (211).The presentation of Christopher is that of an individual who displays an extension of the social problems established in popular literature as connected to a talent for mathematics, therefore engaging with a depiction already existing in popular mythology: the isolated and analytical nerd or genius social introvert. Indeed, much of Christopher’s autistic behaviour functions to protect him from unsettling or traumatic information, since he fails to realise the significance of the information he collects or the clues he is given. His disability is therefore presented as not limiting so much as protective, and so the notion of disability is subsumed by the idea of the savant. The book, then, engages with a contemporary representation within popular culture that has transformed spectrum disability into mathematical giftedness, thereby metaphorically associating the autistic mind with the computer. ReferencesBaron-Cohen, Simon. Mindblindness: An Essay on Autism and Theory of Mind. Cambridge MA: MIT Press, 1995. Berger, James. “Alterity and Autism: Mark Haddon’s Curious Incident in the Neurological Spectrum.” Autism and Representation. Ed. Mark Osteen. Hoboken: Routledge, 2007. 271–88. Burks-Abbott, Gyasi. “Mark Haddon’s Popularity and Other Curious Incidents in My Life as an Autistic.” Autism and Representation. Ed. Mark Osteen. Hoboken: Routledge, 2007. 289–96. Cawelti, John G. Adventure, Mystery, and Romance: Formula Stories as Art and Popular Culture. Chicago: U of Chicago P, 1976. Eshelman, Raoul. “Transcendence and the Aesthetics of Disability: The Case of The Curious Incident of the Dog in the Night-Time.” Anthropoetics: The Journal of Generative Anthropology 15.1 (2009). Haddon, Mark. The Curious Incident of the Dog in the Night-Time. London: Random House Children’s Books, 2004. Kendall, Lori. “The Nerd Within: Mass Media and the Negotiation of Identity among Computer-Using Men.” Journal of Men’s Studies 3 (1999): 353–67. Murray, Stuart. “Autism and the Contemporary Sentimental: Fiction and the Narrative Fascination of the Present.” Literature and Medicine 25.1 (2006): 24–46. Platten, David. “Reading Glasses, Guns and Robots: A History of Science in French Crime Fiction.” French Cultural Studies 12 (2001): 253–70. Rzepka, Charles J. Detective Fiction. Cambridge, UK: Polity Press, 2005.
APA, Harvard, Vancouver, ISO, and other styles
7

Losh, Elizabeth. "Artificial Intelligence." M/C Journal 10, no. 5 (October 1, 2007). http://dx.doi.org/10.5204/mcj.2710.

Full text
Abstract:
On the morning of Thursday, 4 May 2006, the United States House Permanent Select Committee on Intelligence held an open hearing entitled “Terrorist Use of the Internet.” The Intelligence committee meeting was scheduled to take place in Room 1302 of the Longworth Office Building, a Depression-era structure with a neoclassical façade. Because of a dysfunctional elevator, some of the congressional representatives were late to the meeting. During the testimony about the newest political applications for cutting-edge digital technology, the microphones periodically malfunctioned, and witnesses complained of “technical problems” several times. By the end of the day it seemed that what was to be remembered about the hearing was the shocking revelation that terrorists were using videogames to recruit young jihadists. The Associated Press wrote a short, restrained article about the hearing that only mentioned “computer games and recruitment videos” in passing. Eager to have their version of the news item picked up, Reuters made videogames the focus of their coverage with a headline that announced, “Islamists Using US Videogames in Youth Appeal.” Like a game of telephone, as the Reuters videogame story was quickly re-run by several Internet news services, each iteration of the title seemed less true to the exact language of the original. One Internet news service changed the headline to “Islamic militants recruit using U.S. video games.” Fox News re-titled the story again to emphasise that this alert about technological manipulation was coming from recognised specialists in the anti-terrorism surveillance field: “Experts: Islamic Militants Customizing Violent Video Games.” As the story circulated, the body of the article remained largely unchanged, in which the Reuters reporter described the digital materials from Islamic extremists that were shown at the congressional hearing. During the segment that apparently most captured the attention of the wire service reporters, eerie music played as an English-speaking narrator condemned the “infidel” and declared that he had “put a jihad” on them, as aerial shots moved over 3D computer-generated images of flaming oil facilities and mosques covered with geometric designs. Suddenly, this menacing voice-over was interrupted by an explosion, as a virtual rocket was launched into a simulated military helicopter. The Reuters reporter shared this dystopian vision from cyberspace with Western audiences by quoting directly from the chilling commentary and describing a dissonant montage of images and remixed sound. “I was just a boy when the infidels came to my village in Blackhawk helicopters,” a narrator’s voice said as the screen flashed between images of street-level gunfights, explosions and helicopter assaults. Then came a recording of President George W. Bush’s September 16, 2001, statement: “This crusade, this war on terrorism, is going to take a while.” It was edited to repeat the word “crusade,” which Muslims often define as an attack on Islam by Christianity. According to the news reports, the key piece of evidence before Congress seemed to be a film by “SonicJihad” of recorded videogame play, which – according to the experts – was widely distributed online. Much of the clip takes place from the point of view of a first-person shooter, seen as if through the eyes of an armed insurgent, but the viewer also periodically sees third-person action in which the player appears as a running figure wearing a red-and-white checked keffiyeh, who dashes toward the screen with a rocket launcher balanced on his shoulder. Significantly, another of the player’s hand-held weapons is a detonator that triggers remote blasts. As jaunty music plays, helicopters, tanks, and armoured vehicles burst into smoke and flame. Finally, at the triumphant ending of the video, a green and white flag bearing a crescent is hoisted aloft into the sky to signify victory by Islamic forces. To explain the existence of this digital alternative history in which jihadists could be conquerors, the Reuters story described the deviousness of the country’s terrorist opponents, who were now apparently modifying popular videogames through their wizardry and inserting anti-American, pro-insurgency content into U.S.-made consumer technology. One of the latest video games modified by militants is the popular “Battlefield 2” from leading video game publisher, Electronic Arts Inc of Redwood City, California. Jeff Brown, a spokesman for Electronic Arts, said enthusiasts often write software modifications, known as “mods,” to video games. “Millions of people create mods on games around the world,” he said. “We have absolutely no control over them. It’s like drawing a mustache on a picture.” Although the Electronic Arts executive dismissed the activities of modders as a “mustache on a picture” that could only be considered little more than childish vandalism of their off-the-shelf corporate product, others saw a more serious form of criminality at work. Testifying experts and the legislators listening on the committee used the video to call for greater Internet surveillance efforts and electronic counter-measures. Within twenty-four hours of the sensationalistic news breaking, however, a group of Battlefield 2 fans was crowing about the idiocy of reporters. The game play footage wasn’t from a high-tech modification of the software by Islamic extremists; it had been posted on a Planet Battlefield forum the previous December of 2005 by a game fan who had cut together regular game play with a Bush remix and a parody snippet of the soundtrack from the 2004 hit comedy film Team America. The voice describing the Black Hawk helicopters was the voice of Trey Parker of South Park cartoon fame, and – much to Parker’s amusement – even the mention of “goats screaming” did not clue spectators in to the fact of a comic source. Ironically, the moment in the movie from which the sound clip is excerpted is one about intelligence gathering. As an agent of Team America, a fictional elite U.S. commando squad, the hero of the film’s all-puppet cast, Gary Johnston, is impersonating a jihadist radical inside a hostile Egyptian tavern that is modelled on the cantina scene from Star Wars. Additional laughs come from the fact that agent Johnston is accepted by the menacing terrorist cell as “Hakmed,” despite the fact that he utters a series of improbable clichés made up of incoherent stereotypes about life in the Middle East while dressed up in a disguise made up of shoe polish and a turban from a bathroom towel. The man behind the “SonicJihad” pseudonym turned out to be a twenty-five-year-old hospital administrator named Samir, and what reporters and representatives saw was nothing more exotic than game play from an add-on expansion pack of Battlefield 2, which – like other versions of the game – allows first-person shooter play from the position of the opponent as a standard feature. While SonicJihad initially joined his fellow gamers in ridiculing the mainstream media, he also expressed astonishment and outrage about a larger politics of reception. In one interview he argued that the media illiteracy of Reuters potentially enabled a whole series of category errors, in which harmless gamers could be demonised as terrorists. It wasn’t intended for the purpose what it was portrayed to be by the media. So no I don’t regret making a funny video . . . why should I? The only thing I regret is thinking that news from Reuters was objective and always right. The least they could do is some online research before publishing this. If they label me al-Qaeda just for making this silly video, that makes you think, what is this al-Qaeda? And is everything al-Qaeda? Although Sonic Jihad dismissed his own work as “silly” or “funny,” he expected considerably more from a credible news agency like Reuters: “objective” reporting, “online research,” and fact-checking before “publishing.” Within the week, almost all of the salient details in the Reuters story were revealed to be incorrect. SonicJihad’s film was not made by terrorists or for terrorists: it was not created by “Islamic militants” for “Muslim youths.” The videogame it depicted had not been modified by a “tech-savvy militant” with advanced programming skills. Of course, what is most extraordinary about this story isn’t just that Reuters merely got its facts wrong; it is that a self-identified “parody” video was shown to the august House Intelligence Committee by a team of well-paid “experts” from the Science Applications International Corporation (SAIC), a major contractor with the federal government, as key evidence of terrorist recruitment techniques and abuse of digital networks. Moreover, this story of media illiteracy unfolded in the context of a fundamental Constitutional debate about domestic surveillance via communications technology and the further regulation of digital content by lawmakers. Furthermore, the transcripts of the actual hearing showed that much more than simple gullibility or technological ignorance was in play. Based on their exchanges in the public record, elected representatives and government experts appear to be keenly aware that the digital discourses of an emerging information culture might be challenging their authority and that of the longstanding institutions of knowledge and power with which they are affiliated. These hearings can be seen as representative of a larger historical moment in which emphatic declarations about prohibiting specific practices in digital culture have come to occupy a prominent place at the podium, news desk, or official Web portal. This environment of cultural reaction can be used to explain why policy makers’ reaction to terrorists’ use of networked communication and digital media actually tells us more about our own American ideologies about technology and rhetoric in a contemporary information environment. When the experts come forward at the Sonic Jihad hearing to “walk us through the media and some of the products,” they present digital artefacts of an information economy that mirrors many of the features of our own consumption of objects of electronic discourse, which seem dangerously easy to copy and distribute and thus also create confusion about their intended meanings, audiences, and purposes. From this one hearing we can see how the reception of many new digital genres plays out in the public sphere of legislative discourse. Web pages, videogames, and Weblogs are mentioned specifically in the transcript. The main architecture of the witnesses’ presentation to the committee is organised according to the rhetorical conventions of a PowerPoint presentation. Moreover, the arguments made by expert witnesses about the relationship of orality to literacy or of public to private communications in new media are highly relevant to how we might understand other important digital genres, such as electronic mail or text messaging. The hearing also invites consideration of privacy, intellectual property, and digital “rights,” because moral values about freedom and ownership are alluded to by many of the elected representatives present, albeit often through the looking glass of user behaviours imagined as radically Other. For example, terrorists are described as “modders” and “hackers” who subvert those who properly create, own, legitimate, and regulate intellectual property. To explain embarrassing leaks of infinitely replicable digital files, witness Ron Roughead says, “We’re not even sure that they don’t even hack into the kinds of spaces that hold photographs in order to get pictures that our forces have taken.” Another witness, Undersecretary of Defense for Policy and International Affairs, Peter Rodman claims that “any video game that comes out, as soon as the code is released, they will modify it and change the game for their needs.” Thus, the implication of these witnesses’ testimony is that the release of code into the public domain can contribute to political subversion, much as covert intrusion into computer networks by stealthy hackers can. However, the witnesses from the Pentagon and from the government contractor SAIC often present a contradictory image of the supposed terrorists in the hearing transcripts. Sometimes the enemy is depicted as an organisation of technological masterminds, capable of manipulating the computer code of unwitting Americans and snatching their rightful intellectual property away; sometimes those from the opposing forces are depicted as pre-modern and even sub-literate political innocents. In contrast, the congressional representatives seem to focus on similarities when comparing the work of “terrorists” to the everyday digital practices of their constituents and even of themselves. According to the transcripts of this open hearing, legislators on both sides of the aisle express anxiety about domestic patterns of Internet reception. Even the legislators’ own Web pages are potentially disruptive electronic artefacts, particularly when the demands of digital labour interfere with their duties as lawmakers. Although the subject of the hearing is ostensibly terrorist Websites, Representative Anna Eshoo (D-California) bemoans the difficulty of maintaining her own official congressional site. As she observes, “So we are – as members, I think we’re very sensitive about what’s on our Website, and if I retained what I had on my Website three years ago, I’d be out of business. So we know that they have to be renewed. They go up, they go down, they’re rebuilt, they’re – you know, the message is targeted to the future.” In their questions, lawmakers identify Weblogs (blogs) as a particular area of concern as a destabilising alternative to authoritative print sources of information from established institutions. Representative Alcee Hastings (D-Florida) compares the polluting power of insurgent bloggers to that of influential online muckrakers from the American political Right. Hastings complains of “garbage on our regular mainstream news that comes from blog sites.” Representative Heather Wilson (R-New Mexico) attempts to project a media-savvy persona by bringing up the “phenomenon of blogging” in conjunction with her questions about jihadist Websites in which she notes how Internet traffic can be magnified by cooperative ventures among groups of ideologically like-minded content-providers: “These Websites, and particularly the most active ones, are they cross-linked? And do they have kind of hot links to your other favorite sites on them?” At one point Representative Wilson asks witness Rodman if he knows “of your 100 hottest sites where the Webmasters are educated? What nationality they are? Where they’re getting their money from?” In her questions, Wilson implicitly acknowledges that Web work reflects influences from pedagogical communities, economic networks of the exchange of capital, and even potentially the specific ideologies of nation-states. It is perhaps indicative of the government contractors’ anachronistic worldview that the witness is unable to answer Wilson’s question. He explains that his agency focuses on the physical location of the server or ISP rather than the social backgrounds of the individuals who might be manufacturing objectionable digital texts. The premise behind the contractors’ working method – surveilling the technical apparatus not the social network – may be related to other beliefs expressed by government witnesses, such as the supposition that jihadist Websites are collectively produced and spontaneously emerge from the indigenous, traditional, tribal culture, instead of assuming that Iraqi insurgents have analogous beliefs, practices, and technological awareness to those in first-world countries. The residual subtexts in the witnesses’ conjectures about competing cultures of orality and literacy may tell us something about a reactionary rhetoric around videogames and digital culture more generally. According to the experts before Congress, the Middle Eastern audience for these videogames and Websites is limited by its membership in a pre-literate society that is only capable of abortive cultural production without access to knowledge that is archived in printed codices. Sometimes the witnesses before Congress seem to be unintentionally channelling the ideas of the late literacy theorist Walter Ong about the “secondary orality” associated with talky electronic media such as television, radio, audio recording, or telephone communication. Later followers of Ong extend this concept of secondary orality to hypertext, hypermedia, e-mail, and blogs, because they similarly share features of both speech and written discourse. Although Ong’s disciples celebrate this vibrant reconnection to a mythic, communal past of what Kathleen Welch calls “electric rhetoric,” the defence industry consultants express their profound state of alarm at the potentially dangerous and subversive character of this hybrid form of communication. The concept of an “oral tradition” is first introduced by the expert witnesses in the context of modern marketing and product distribution: “The Internet is used for a variety of things – command and control,” one witness states. “One of the things that’s missed frequently is how and – how effective the adversary is at using the Internet to distribute product. They’re using that distribution network as a modern form of oral tradition, if you will.” Thus, although the Internet can be deployed for hierarchical “command and control” activities, it also functions as a highly efficient peer-to-peer distributed network for disseminating the commodity of information. Throughout the hearings, the witnesses imply that unregulated lateral communication among social actors who are not authorised to speak for nation-states or to produce legitimated expert discourses is potentially destabilising to political order. Witness Eric Michael describes the “oral tradition” and the conventions of communal life in the Middle East to emphasise the primacy of speech in the collective discursive practices of this alien population: “I’d like to point your attention to the media types and the fact that the oral tradition is listed as most important. The other media listed support that. And the significance of the oral tradition is more than just – it’s the medium by which, once it comes off the Internet, it is transferred.” The experts go on to claim that this “oral tradition” can contaminate other media because it functions as “rumor,” the traditional bane of the stately discourse of military leaders since the classical era. The oral tradition now also has an aspect of rumor. A[n] event takes place. There is an explosion in a city. Rumor is that the United States Air Force dropped a bomb and is doing indiscriminate killing. This ends up being discussed on the street. It ends up showing up in a Friday sermon in a mosque or in another religious institution. It then gets recycled into written materials. Media picks up the story and broadcasts it, at which point it’s now a fact. In this particular case that we were telling you about, it showed up on a network television, and their propaganda continues to go back to this false initial report on network television and continue to reiterate that it’s a fact, even though the United States government has proven that it was not a fact, even though the network has since recanted the broadcast. In this example, many-to-many discussion on the “street” is formalised into a one-to many “sermon” and then further stylised using technology in a one-to-many broadcast on “network television” in which “propaganda” that is “false” can no longer be disputed. This “oral tradition” is like digital media, because elements of discourse can be infinitely copied or “recycled,” and it is designed to “reiterate” content. In this hearing, the word “rhetoric” is associated with destructive counter-cultural forces by the witnesses who reiterate cultural truisms dating back to Plato and the Gorgias. For example, witness Eric Michael initially presents “rhetoric” as the use of culturally specific and hence untranslatable figures of speech, but he quickly moves to an outright castigation of the entire communicative mode. “Rhetoric,” he tells us, is designed to “distort the truth,” because it is a “selective” assembly or a “distortion.” Rhetoric is also at odds with reason, because it appeals to “emotion” and a romanticised Weltanschauung oriented around discourses of “struggle.” The film by SonicJihad is chosen as the final clip by the witnesses before Congress, because it allegedly combines many different types of emotional appeal, and thus it conveniently ties together all of the themes that the witnesses present to the legislators about unreliable oral or rhetorical sources in the Middle East: And there you see how all these products are linked together. And you can see where the games are set to psychologically condition you to go kill coalition forces. You can see how they use humor. You can see how the entire campaign is carefully crafted to first evoke an emotion and then to evoke a response and to direct that response in the direction that they want. Jihadist digital products, especially videogames, are effective means of manipulation, the witnesses argue, because they employ multiple channels of persuasion and carefully sequenced and integrated subliminal messages. To understand the larger cultural conversation of the hearing, it is important to keep in mind that the related argument that “games” can “psychologically condition” players to be predisposed to violence is one that was important in other congressional hearings of the period, as well one that played a role in bills and resolutions that were passed by the full body of the legislative branch. In the witness’s testimony an appeal to anti-game sympathies at home is combined with a critique of a closed anti-democratic system abroad in which the circuits of rhetorical production and their composite metonymic chains are described as those that command specific, unvarying, robotic responses. This sharp criticism of the artful use of a presentation style that is “crafted” is ironic, given that the witnesses’ “compilation” of jihadist digital material is staged in the form of a carefully structured PowerPoint presentation, one that is paced to a well-rehearsed rhythm of “slide, please” or “next slide” in the transcript. The transcript also reveals that the members of the House Intelligence Committee were not the original audience for the witnesses’ PowerPoint presentation. Rather, when it was first created by SAIC, this “expert” presentation was designed for training purposes for the troops on the ground, who would be facing the challenges of deployment in hostile terrain. According to the witnesses, having the slide show showcased before Congress was something of an afterthought. Nonetheless, Congressman Tiahrt (R-KN) is so impressed with the rhetorical mastery of the consultants that he tries to appropriate it. As Tiarht puts it, “I’d like to get a copy of that slide sometime.” From the hearing we also learn that the terrorists’ Websites are threatening precisely because they manifest a polymorphously perverse geometry of expansion. For example, one SAIC witness before the House Committee compares the replication and elaboration of digital material online to a “spiderweb.” Like Representative Eshoo’s site, he also notes that the terrorists’ sites go “up” and “down,” but the consultant is left to speculate about whether or not there is any “central coordination” to serve as an organising principle and to explain the persistence and consistency of messages despite the apparent lack of a single authorial ethos to offer a stable, humanised, point of reference. In the hearing, the oft-cited solution to the problem created by the hybridity and iterability of digital rhetoric appears to be “public diplomacy.” Both consultants and lawmakers seem to agree that the damaging messages of the insurgents must be countered with U.S. sanctioned information, and thus the phrase “public diplomacy” appears in the hearing seven times. However, witness Roughhead complains that the protean “oral tradition” and what Henry Jenkins has called the “transmedia” character of digital culture, which often crosses several platforms of traditional print, projection, or broadcast media, stymies their best rhetorical efforts: “I think the point that we’ve tried to make in the briefing is that wherever there’s Internet availability at all, they can then download these – these programs and put them onto compact discs, DVDs, or post them into posters, and provide them to a greater range of people in the oral tradition that they’ve grown up in. And so they only need a few Internet sites in order to distribute and disseminate the message.” Of course, to maintain their share of the government market, the Science Applications International Corporation also employs practices of publicity and promotion through the Internet and digital media. They use HTML Web pages for these purposes, as well as PowerPoint presentations and online video. The rhetoric of the Website of SAIC emphasises their motto “From Science to Solutions.” After a short Flash film about how SAIC scientists and engineers solve “complex technical problems,” the visitor is taken to the home page of the firm that re-emphasises their central message about expertise. The maps, uniforms, and specialised tools and equipment that are depicted in these opening Web pages reinforce an ethos of professional specialisation that is able to respond to multiple threats posed by the “global war on terror.” By 26 June 2006, the incident finally was being described as a “Pentagon Snafu” by ABC News. From the opening of reporter Jake Tapper’s investigative Webcast, established government institutions were put on the spot: “So, how much does the Pentagon know about videogames? Well, when it came to a recent appearance before Congress, apparently not enough.” Indeed, the very language about “experts” that was highlighted in the earlier coverage is repeated by Tapper in mockery, with the significant exception of “independent expert” Ian Bogost of the Georgia Institute of Technology. If the Pentagon and SAIC deride the legitimacy of rhetoric as a cultural practice, Bogost occupies himself with its defence. In his recent book Persuasive Games: The Expressive Power of Videogames, Bogost draws upon the authority of the “2,500 year history of rhetoric” to argue that videogames represent a significant development in that cultural narrative. Given that Bogost and his Watercooler Games Weblog co-editor Gonzalo Frasca were actively involved in the detective work that exposed the depth of professional incompetence involved in the government’s line-up of witnesses, it is appropriate that Bogost is given the final words in the ABC exposé. As Bogost says, “We should be deeply bothered by this. We should really be questioning the kind of advice that Congress is getting.” Bogost may be right that Congress received terrible counsel on that day, but a close reading of the transcript reveals that elected officials were much more than passive listeners: in fact they were lively participants in a cultural conversation about regulating digital media. After looking at the actual language of these exchanges, it seems that the persuasiveness of the misinformation from the Pentagon and SAIC had as much to do with lawmakers’ preconceived anxieties about practices of computer-mediated communication close to home as it did with the contradictory stereotypes that were presented to them about Internet practices abroad. In other words, lawmakers found themselves looking into a fun house mirror that distorted what should have been familiar artefacts of American popular culture because it was precisely what they wanted to see. References ABC News. “Terrorist Videogame?” Nightline Online. 21 June 2006. 22 June 2006 http://abcnews.go.com/Video/playerIndex?id=2105341>. Bogost, Ian. Persuasive Games: Videogames and Procedural Rhetoric. Cambridge, MA: MIT Press, 2007. Game Politics. “Was Congress Misled by ‘Terrorist’ Game Video? We Talk to Gamer Who Created the Footage.” 11 May 2006. http://gamepolitics.livejournal.com/285129.html#cutid1>. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York UP, 2006. julieb. “David Morgan Is a Horrible Writer and Should Be Fired.” Online posting. 5 May 2006. Dvorak Uncensored Cage Match Forums. http://cagematch.dvorak.org/index.php/topic,130.0.html>. Mahmood. “Terrorists Don’t Recruit with Battlefield 2.” GGL Global Gaming. 16 May 2006 http://www.ggl.com/news.php?NewsId=3090>. Morgan, David. “Islamists Using U.S. Video Games in Youth Appeal.” Reuters online news service. 4 May 2006 http://today.reuters.com/news/ArticleNews.aspx?type=topNews &storyID=2006-05-04T215543Z_01_N04305973_RTRUKOC_0_US-SECURITY- VIDEOGAMES.xml&pageNumber=0&imageid=&cap=&sz=13&WTModLoc= NewsArt-C1-ArticlePage2>. Ong, Walter J. Orality and Literacy: The Technologizing of the Word. London/New York: Methuen, 1982. Parker, Trey. Online posting. 7 May 2006. 9 May 2006 http://www.treyparker.com>. Plato. “Gorgias.” Plato: Collected Dialogues. Princeton: Princeton UP, 1961. Shrader, Katherine. “Pentagon Surfing Thousands of Jihad Sites.” Associated Press 4 May 2006. SonicJihad. “SonicJihad: A Day in the Life of a Resistance Fighter.” Online posting. 26 Dec. 2005. Planet Battlefield Forums. 9 May 2006 http://www.forumplanet.com/planetbattlefield/topic.asp?fid=13670&tid=1806909&p=1>. Tapper, Jake, and Audery Taylor. “Terrorist Video Game or Pentagon Snafu?” ABC News Nightline 21 June 2006. 30 June 2006 http://abcnews.go.com/Nightline/Technology/story?id=2105128&page=1>. U.S. Congressional Record. Panel I of the Hearing of the House Select Intelligence Committee, Subject: “Terrorist Use of the Internet for Communications.” Federal News Service. 4 May 2006. Welch, Kathleen E. Electric Rhetoric: Classical Rhetoric, Oralism, and the New Literacy. Cambridge, MA: MIT Press, 1999. Citation reference for this article MLA Style Losh, Elizabeth. "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/08-losh.php>. APA Style Losh, E. (Oct. 2007) "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/08-losh.php>.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Star Trek (Programa de televisión)"

1

Bernardi, Daniel. "Star trek and history : race-ing toward a white future /." New Brunswick, NJ [u.a.] : Rutgers University Press, 1999. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=018615232&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Busch, Willian Perpétuo. "Antropologia da ficção científica : alteridade maquínica em Star Treck: voyager." reponame:Repositório Institucional da UFPR, 2016. http://hdl.handle.net/1884/45195.

Full text
Abstract:
Orientador: Prof. Dr. Miguel Alfredo Carid Naveira
Dissertação (mestrado) - Universidade Federal do Paraná, Setor de Ciências Humanas, Programa de Pós-Graduação em Antropologia Social. Defesa: Curitiba, 13/10/2016
Inclui referências : f. 307-318
Resumo: A ficção científica pode ser entendida como uma forma antropológica de pensamento sobre a alteridade. Nesta dissertação aborda-se esta relação tendo como foco a série televisiva de Star Trek: Voyager. Para tal é realizada uma imersão no percurso filosófico do conceito de alteridade e da invenção da filosofia e, posteriormente, do pensamento antropológico, como formas de ficção sobre o Outro. Construindo uma etnografia pautada na interação entre indivíduos e máquinas, entendeu-se que estas últimas ocupavam o espaço de uma alteridade radicalmente outra, dado seu desposicionamento relacional. Uma vez que este esquema foi demarcado, entendeu-se que a ficção científica em questão era responsável por apresentar duas perspectivas ontológicas diferentes. Uma delas é o que chamei de ontologia da individualidade que existe nos mais variados coletivos humanoides de Star Trek. A outra, em oposição, é aparentemente exclusiva dos Borg e se constitui como uma ontologia da assimilação, na qual o conceito de individualidade, bem como sociedade, não pode ser pensado. Palavras-Chave: Antropologia da Ficção Científica, Star Trek, Ontologias e Indivíduos
Abstract: The science fiction could be understood as a type of anthropological thinking about the alterity. In this dissertation we aim to understand this relation by focusing in the TV Show Star Trek: Voyager. To do that we create a type of reflexion about the philosophical thinking on the concept of alterity and also the invention of philosophy itself. And later in the antropological thinking, as kinds of fiction about the Other. Our grounding is an etnography where we focus on the interation between individuals and machines. The later as a type of radical alterity completely alien to the notion of individual. After this scheme has been created, we understood that the science fiction is based on two kinds of ontological perspectives. The first is the ontology of the individual, mutual for different types of humanoids and their societies in Star Trek. The other is exclusively for the Borg as it is based in the notion of assimilation. Key words: Anthopology of Science Fiction, Star Trek, Ontologies, Individuals
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Star Trek (Programa de televisión)"

1

La guerra de las galaxias & Star trek. Madrid: Edimat Libros, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ed, Robertson, ed. The ethics of Star trek. New York, NY: Perennial, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Narratives from the final frontier: A postcolonial reading of the original Star trek series. Frankfurt am Main: P. Lang, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Star Trek. London: BFI, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Doug, Drexler, ed. Star Trek Star Charts: The Complete Atlas of Star Trek. New York: Pocket Books, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

J, Erdmann Terry, ed. Star trek, the next generation 365. New York: Abrams, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

M, Block Paula, ed. Star Trek action! New York: Pocket Books, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Pounds, Micheal C. The Star trek generations. Toronto: Toronto Semiotic Circle, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

John, Peel. Whom gods destroy: The Star trek files. San Bernardino, Calif: Borgo Press, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Farrand, Phil. The nitpicker's guide for classic trekkers. New York, NY: Dell, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Star Trek (Programa de televisión)"

1

Robinson, Michael G. "These are the Voyages?" In Fighting for the Future, 81–102. Liverpool University Press, 2020. http://dx.doi.org/10.3828/liverpool/9781789621761.003.0006.

Full text
Abstract:
The main thing noticeably absent from Star Trek’s half-century anniversary was a network television series. By 2016, the primary output of the Trek franchise was a set of commercially successful feature films that had retconned a substantial portion of the early series history and consequently left later spin-off television series adrift in continuity limbo. One year later, or perhaps one year too late, three programs emerged to take up the mantle of Trek: Star Trek: Discovery (2017-), The Orville (2017-present) and the “U.S.S Callister” episode of Black Mirror (2017). This chapter investigates how these series make a claim to and justify deviations from, a familiar science fiction formula legendary for diverse themes and progressive ideologies with particular attention invocation of Gene Roddenberry’s vision for Star Trek.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography