Journal articles: 'Bomb Group (M)' – Grafiati (2024)

  • Bibliography
  • Subscribe
  • News
  • Referencing guides Blog Automated transliteration Relevant bibliographies by topics

Log in

Українська Français Italiano Español Polski Português Deutsch

We are proudly a Ukrainian website. Our country was attacked by Russian Armed Forces on Feb. 24, 2022.
You can support the Ukrainian Army by following the link: https://u24.gov.ua/. Even the smallest donation is hugely appreciated!

Relevant bibliographies by topics / Bomb Group (M) / Journal articles

To see the other types of publications on this topic, follow the link: Bomb Group (M).

Author: Grafiati

Published: 4 June 2021

Last updated: 17 February 2022

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Consult the top 50 journal articles for your research on the topic 'Bomb Group (M).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Cole,A.H., and R.F.Ogungbe. "Food intake and energy expenditure of Nigerian female students." British Journal of Nutrition 57, no.3 (May 1987): 309–18. http://dx.doi.org/10.1079/bjn19870039.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

1. Twenty apparently healthy and normal Nigerian female students, resident at the University of Ibadan campus, were studied for seven consecutive days to assess their food energy intake and energy expenditure during sedentary and physical activities.2. The mean age (years) of the group was 20.05 (SD 3.44, range 16–29), mean height (m) 1.62 (SD 0.07, range 1.47–1.74) and body-weight (kg) 51.28 (SD 3.21, range 46–58).3. The food intake of each subject was obtained by direct weighing, and the energy value determined using a ballistic bomb calorimeter. Daily activities were recorded and the energy cost of representative activities was determined by indirect calorimetry.4. Activities mainly involved sitting, mean (min/d) 354 (SD 84, range 253–475). Personal domestic activities took a mean of 162 (SD 73) min/d. Sleeping took a mean of 451 (SD 62) min/d.5. The mean energy intake of the group was 8480 (SD 1316) kJ/d or 167 (SD 30.6) kJ/kg body-weight per d. This value is lower than that recommended by the Food and Agriculture Organization/World Health Organization (FAO/WHO) (1973) as the energy requirement for adult women engaged in light activities (9205 kJ/d), but it is higher than the FAO/WHO/United Nations University (UNU) (1985) recommended value of 8326 kJ (1990 kcal)/d for a housewife in an affluent society. It is lower than the recommended intake of 9350 kJ/d for rural women in developing countries (FAO/WHO/UNU, 1985).6. The mean energy expenditure (kJ/d) of the female subjects was 6865 (SD 214, range 6519–7222). Mean energy expenditure was lower than mean energy intake.7. The energy intake and expenditure values indicated that the subjects participating in the present study were not physically very active. It is suggested, for health reasons, that they might undertake more physical activity.

2

Cole,A.H., and J.O.Ogbe. "Energy intake, expenditure and pattern of daily activity of Nigerian male students." British Journal of Nutrition 58, no.3 (November 1987): 357–67. http://dx.doi.org/10.1079/bjn19870105.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

1. Twenty apparently healthy and normal Nigerian male students, resident at the University of Ibadan campus, were studied for seven consecutive days to assess their food energy intake and expenditure and pattern of their daily activities.2. The mean age (years) of the group was 24.0 (SD 3.23, range 20–30), mean height (m) 1.71 (SD 0.06, range 1.61–1.84) and body-weight (kg) was 61.1 (SD 5.01, range 51.0–69.5).3. The food intake of each subject was obtained by direct weighing and its energy value determined using a ballistic bomb calorimeter. Patterns of daily activities were recorded and the energy costs of representative activities were determined by indirect calorimetry.4. Activities mainly involved sitting, mean 580 (SD 167, range 394–732) min/d. Sleeping and standing activities took a mean of 445 (SD 112) and 115 (SD 75) min/d respectively. Personal domestic activities took a mean of 94 (SD 40) min/d.5. The mean energy intake of the group was 11 182 (SD 1970) kJ/d or 183 (SD 32) kJ/kg body-weight per d. This value is lower than the 12.5 MJ/d recommended by the Food and Agriculture Organization (FAO)/World Health Organization (WHO) (1973) as the energy requirement for an adult man engaged in moderate activities, but it is higher than the FAO/WHO/United Nations University (UNU) (1985) recommended value of 10.8 MJ/d for a male office clerk (light activity). It is also lower than the recommended energy requirement of 11.6 MJ/d for a subsistence farmer (moderately active work) (FAO/WHO/UNU, 1985).6. The mean energy expenditure of the male subjects was 9876 (SD 1064, range 7159–12259) kJ/d and was lower than mean intake.7. The energy intake and expenditure values indicated that the groups participating in the present study were not physically very active. It is an indication that the Nigerian male students expended less but probably consumed more energy than required. It is suggested for health reasons and for mental fitness that the Nigerian male students might undertake more physical exercise.

3

Cole,AbiodunH., OmowumiO.Taiwo, NgoziI.Nwagbara, and CorneliaE.Cole. "Energy intakes, anthropometry and body composition of Nigerian adolescent girls: a case study of an institutionalized secondary school in Ibadan." British Journal of Nutrition 77, no.4 (April 1997): 497–509. http://dx.doi.org/10.1079/bjn19970052.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Twenty-two apparently healthy Nigerian adolescent girls aged 11–17 years residing in a hostel, were studied over five consecutive days in order to assess their energy intake (EI), energy cost of specific activities and body composition (BC). The mean characteristics of the group were: height 1·58 (SD 0·1, range 1·42–1·68) m, body weight 49·1 (SD 7·9, range 34·0–61·0) kg and BMI 19·5 (SD 2·0, range 16·0-23·0) kg/m2. The food intake of each subject was assessed by direct weighing and its energy value was determined by means of a ballistic bomb calorimeter. BMR values were calculated according to Food and Agriculture Organization/World Health Organization/United Nations University (FAO/WHO/UNU) (1985) equations. Percentage body fat (BF %) values were derived from three skinfold thickness measurements, using population-specific equations. The adolescents' mean daily EI was found to be 6510 (SD 855) kJ/d (138·3 (SD 27·8) kJ/kg body weight per d) which is lower than the FAO/WHO/UNU (1985) calculated energy requirement of 8800 kJ/d for adolescent girls aged 12–14 years. The contributions of specific nutrients and individual meals to the total EI were: carbohydrate, protein and fat, 59·2, 12·5 and 28·3 % of energy respectively and breakfast, lunch and supper, 21·5, 41·0 and 37·4 % respectively. However, the mean BMR was 5627kJ/d, which is comparable with that given by FAO/WHO/UNU (1985) for adolescent girls aged 13–14 years. The mean BF % was found to be 21·7. The comparatively low EI of the participants in the present study may be indicative of energy deficiency in their meals. This assumption is also reflected in their BC values. Nevertheless, further studies of this kind on adolescents in Nigeria are needed to confirm these observations.

4

Ely,DamonT., and J.BruceWallace. "Long-term functional group recovery of lotic macroinvertebrates from logging disturbance." Canadian Journal of Fisheries and Aquatic Sciences 67, no.7 (July 2010): 1126–34. http://dx.doi.org/10.1139/f10-045.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Clear-cut logging rapidly affects stream macroinvertebrates through substantial alteration of terrestrial–aquatic resource linkages; however, lesser known are the long-term influences of forest succession on benthic macroinvertebrate assemblages, which play key roles in stream ecosystem function. We compared secondary production and standing crops of detritus in two mountain headwater streams within Coweeta Hydrologic Laboratory, North Carolina, USA, as part of a long-term, paired-watershed investigation of macroinvertebrate recovery from whole-catchment logging. Mean annual habitat-weighted abundance and biomass in the disturbed stream (catchment entirely logged 26 years prior) did not differ from that of the reference stream, and secondary production was only 0.8 g ash-free dry mass (AFDM)·m–2·year–1 greater in the disturbed stream (disturbed, 10.1; reference, 9.3). Taxonomic composition, shredder–scraper ratios, and North Carolina biotic index scores were more similar between streams than in previous years. However, mean annual standing crops of benthic organic matter (BOM) were much lower in the disturbed stream (167 g AFDM·m–2) than in the reference stream (339 g AFDM·m–2), and the disturbed stream supported greater macroinvertebrate biomass per unit BOM. We suggest that despite similarities in macroinvertebrate structure and function, past logging activity continues to influence consumer–resource relationships in the disturbed stream through enhanced resource quality.

5

Bier, Vanderlei Artur, Eduardo Godoy de Souza, and Márcio Antonio Vilas Boas. "PROGRAMA COMPUTACIONAL PARA SELEÇÃO DE CONJUNTOS MOTO-BOMBA." IRRIGA 9, no.3 (December22, 2004): 225–34. http://dx.doi.org/10.15809/irriga.2004v9n3p225-234.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

PROGRAMA COMPUTACIONAL PARA SELEÇÃO DE CONJUNTOS MOTO-BOMBA Vanderlei Artur Bier1; Eduardo Godoy de Souza2; Márcio Antonio Vilas Boas21Universidade Paranaense, Toledo – PR, vabier@unipar.com.br2Núcleo de Inovações Tecnológicas -Universidade Estadual do Oeste do Paraná , Cascavel - PR, 1 RESUMO O objetivo deste trabalho foi desenvolver um programa computacional para a seleção e avaliação de conjuntos moto-bomba, baseada na eficiência do conjunto calculada a partir da eficiência máxima da bomba e da eficiência máxima do motor. O programa computacional desenvolvido auxilia na seleção racional, através da incorporação de coeficientes de regressão das curvas desempenho da altura manométrica e do rendimento em função da vazão para bombas, e curva de torque e rendimento em função da rotação para motores. Através do cruzamento das curvas de desempenho de cada elemento, encontra-se um ponto ótimo de funcionamento do conjunto, baseando-se em condições sugeridas pelo projeto de irrigação. O programa desenvolvido pode ser utilizado para fins didáticos e está disponível gratuitamente através de solicitação por email ao primeiro autor. UNITERMOS: Seleção racional, irrigação. BIER, W. A.; SOUZA, E. G.; BOAS, M. A. V. SOFTWARE TO SELECT MOTOR-PUMP GROUPS 2 ABSTRACT The objective of this study was to develop a new selection methodology and evaluation for motor-pump groups, based on the group efficiency which is calculated from the pump maximum efficiency and the motor maximum efficiency. A software was developed to help out that rational selection which uses regression coefficient of water height performance curve and performance curve, and coefficient of torque and performance curves in relation to motor rotation. Through the crossing of performance curves for each element, an optimal operation point, based on the suggested conditions of the irrigation project, was found for the group. KEYWORDS: Rational selection, irrigation

6

Suryani, Eva, Muhammad Farid, and Afrizal Mayub. "Implementasi Karakteristik Nilai Kalor Briket Campuran Limbah Kulit Durian dan Tempurung Kelapa pada Pembelajaran Suhu dan Kalor Di SMP N 15 Kota Bengkulu." PENDIPA Journal of Science Education 3, no.3 (October22, 2019): 146–53. http://dx.doi.org/10.33369/pendipa.3.3.146-153.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

ABSTRACT[Implementation of The Characteristics of the Heating Value of Briquettes in a Mixture of Durian Skin and Coconut Shell Waste in Temperature and Heat Learning In SMPN 15 Bengkulu City]. This study aims to determine the characteristics and calorific value briquettes mix variations durian peel and coconut shell and knowing the increase in students cognitive learning outcomes after using briquettes as a practicum material on the temperature and heat material by using a model of Discovery Learning (DL) in SMP N 15 Bengkulu City. The type of research in used quasi eksperiment. The sampele in this study was extra curricular student class VII in SMP N 15 Bengkulu City. The calorific value of the briquette mixture of durian peel and coconut shell is determined by using the tool Bomb Calorimeter Chemistry Laboratory Basic Science UNIB and characteristics of the briquette was done Science Laboratory og SMPN 15 Bengkulu City. In this study, the skin of durian mixed Science Laboratory og SMPN 15 Bengkulu Citywith coconut shell with the composition (1) 20% of skin durian: 80% coconut shell; (2) 50% of the durian skin: 50% coconut shell and (3) 80% of the durian skin: 20% coconut shell.Data collection techniques in the implementation of such lerning achievement test in the form of multiple-choise has been validated. Results of research on the calorific value of the mixture at (1) amounted to 7306.81 cal / gram, at (2) amounting to 6487.31 cal / gram and in (3) of 6284.99 cal / gram. Characteristics of briquettes include water content was lost, the density of the briquettes and burning speed. Based on the results of dataprocessing showed that after learning by using the model of Discovery Learning (DL), cognitive learning outcomes of students has increased and the value of N-gain for the high grade was 0.78 in the high category, the group is sebesa 0.57 in the medium category and the lower group was 0.53 in the medium category. Keywords: Charcoal briquettes; calorific value;characteristics of briquettes; Discovery Learning(Received July 13, 2019; Accepted August 7, 2019; Published October 22, 2019) ABSTRAKPenelitian ini bertujuan untuk menentukan karakteristik dan nilai kalor briket variasi campuran kulit durian dan tempurung kelapa dan mengetahui peningkatan hasil belajar kognitif siswa setelah menggunakan briket sebagai bahan praktikum pada materi suhu dan kalor dengan menggunakan model Discovery Learning di SMP N 15 Kota Bengkulu. Jenis penelitian yang digunakan yaitu quasi eksperimen. Sampel dalam penelitian ini yaitu siswa kelas VII ekstra kurikuler KIR SMP N 15 Kota Bengkulu. Data nilai kalor briket campuran kulit durian dan tempurung kelapa ditentukan dengan menggunakan alat Bomb Calorimeter di Laboratorium Kimia Basic Science UNIB dan karakteristik briket di lakukan di Laboratorium IPA SMP N 15 Kota Bengkulu. Dalam penelitian ini kulit durian dicampur dengan tempurung kelapa dengan komposisi (1) 20% kulit durian: 80% tempurung kelapa; (2) 50% kulit durian: 50% tempurung kelapa dan (3) 80% kulit durian: 20% tempurung kelapa. Tehnik pengumpulan data pada implementasi pembelajaran berupa tes hasil belajar dalam bentuk pilihan ganda yang telah divalidasi. Hasil penelitian nilai kalor pada campuran (1) sebesar 7306,81 kal/gram, pada campuran (2) sebesar 6487,31 kal/gram dan pada campuran (3) sebesar 6284,99 kal/gram. Karakteristik briket meliputi kadar air hilang, kerapatan briket, kecepatan pembakaranbriket. Berdasarkan hasil pengolahan data menunjukkan bahwa setelah belajar dengan menggunakan model Discovery Learning (DL) hasil belajar kognitif peserta didik mengalami peningkatan dan nilai N-gain untuk kelas tinggi adalah sebesar 0,78 dalam kategori tinggi, kelompok sedang sebesa 0,57 dalam kategori sedang dan kelompok rendah sebesar 0,53 dalam kategori sedang. Kata Kunci: Briket arang; nilai kalor; karakteristik briket;Discovery LearningDAFTAR PUSTAKA Bahri, S. (2007). Pemanfaatan Limbah Industri Pengolahan Kayu untuk Pembuatan Briket Arang dalam Mengurangi Pencemaran di Nangroe Aceh Darusalam. Universitas Sumatera Utara.Elfiano, E.,Subekti, P., Sadil, A. (2014). Analisis Proksimat dan Nilai Kalor pada Briket Bioarang Limbah Ampas Tebu dan Arang kayu. Jurnal APTEK No 1 hal 57-64Emerhi,E.A. (2011). Physical and Combustion Proporties of Briquettes Produced from Sawdust of Three Hardwood Species and Different Organic Binders. Nigeria: Departement of Forestry and Wildlife, Delta State. Univesity. WWW. Pelagiaresearch Library.comFajari, I. (2012). Karakteristik Pembakaran Briket Arang Campuran Sekam Padi dan Serbuk Kayu Serta Implementasinya sebagai Model Pembelajaran Dengan LKS Kimia Berbasis Keterampilan Proses di SMA N 3 Lubuk Linggau. Bengkulu. Tesis Pascasarjana Universitas BengkuluHalimmatus, S . (2010). Pemanfaatan Limbah Kulit Durian dalam pembuatan Briket Arang sebagai Bahan Bakar Alternatif. Semarang: Fakultas Tehnik Universitas Negari SemarangHasbullah., Iskandar, T., Yuniningsih, S.(2018). Identifikasi Nilai Kalor pada Briket Biochar Berbahan Baku Kulit Durian. eUREKA. Jurnal Penelitian Mahasiswa Tehnik Sipil dan Tehnik Kimia 2(1) hal 1-8Hatta, V.(2007). Manfaat Kulit Durian Selezat Buahnya. Universitas Lampung. LampungHendra,D., Darmawan, S. (2000). Pembuatan Briket Arang Serbuk Gergajian Kayu dengan Penambahan Tempurung Kelapa. Buletin Penelitian Hasil Hutan. Bogor.Jamilatun, S. (2008). Sifat-sifat Penyalaan dan Pembakaran Briket Biomassa, Briket Batubara dan Arang Kayu. Yogyakarta. Jurnal Rekayasa Proses, Vol 2, No. 2Nurhilal,O. (2017).Karakteristik Biobriket Campuran Serbuk Kayu dan Tempurung Kelapa. Bandung:Jurnal Material dan Energi Indonesia Vol 07 No 02(2017) Hal 13-16Nurhilal, O; Suryaningsih, S. (2018). Pengaruh Komposisi Campuran Sabut dan Tempurung Kelapa Terhadap Nilai Kalor Biobriket dengan Perekat Molase. Bandung: Jurnal Ilmu dan Inovasi Fisika Vol 02 No 01 (2018) 8-14Nuriana, W., Anisa, N dan Martana. (2013). Karakteristik Biobriket Kulit Durian Sebagai Bahan Bakar Alternatif Terbarukan,Jurnal Teknologi Industri Pertanian 23(1) hal 70-76Putri, I; Juliani, R; Lestari, N. (2017). Pengaruh Model Pembelajaran Discovery Learning terhadap Hasil Belajar Siswa dan Aktivitas Siswa. Medan. Jurnal Pendidikan Fisika Vol 6.Sudiro, S., Farid, M., Swistoro, E. (2018). Hubungan antara kedalaman Permukaan Air Tanah dengan Salinitas di Pesisir Pantai Kungkai Baru serta Penggunaan Model Discovery Learning. PENDIPA Journal of Scince Education Vol 2 No 3 Triono. (2006). Karakteristik Briket arang dari campuran serbuk gergaji kayu Afrika (Aesopsis emini) dan Sengon(Paraserianthes falcarita) dengan Penambahan Tempurung Kelapa. Bogor. Institut Pertanian BogorVachlepi, A., Suwardin, D. (2013). Penggunaan Biobriket Sebagai Bahan Bakar Alternatif dalam Pengeringan Karet Alami. Palembang. Balai Penelitian Sumbawa 32(2) hal 65-73 Yuliah, Y; Suryaningsih, S; Ulfi, K.(2017). Penentuan Kadar Air Hilang dan Voltile Matter pada Bio Briket dari Campuran Arang Sekam Padi dan Batok Kelapa. Bandung. Jurnal Ilmu dan Fisika Vol 01, N0 01 51-57

7

Mendonça, Luana Marina De Castro, Carmen Regina Parisotto Guimarães, and Silvio Felipe Barbosa Lima. "Mollusk bycatch in trawl fisheries targeting the Atlantic seabob shrimp Xiphopenaeus kroyeri on the coast of Sergipe, northeastern Brazil." Papéis Avulsos de Zoologia 59 (August15, 2019): e20195933. http://dx.doi.org/10.11606/1807-0205/2019.59.33.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

The malacofauna bycatch of sea-bob shrimp Xiphopenaeus kroyeri (Heller, 1862) trawl fisheries on the coast of Sergipe was studied for 5 years. The malacofauna bycatch considered was obtained in nine oceanographic sampling campaigns carried out between May 1999 and June 2003 in 18 stations distributed in six transects along depths of 10, 20 and 30 m. A total of 2,669 individuals of mollusk belonging to 54 species were captured on the 18 sea-bob shrimp trawl stations carried out along the coast of Sergipe. The considerable richness of mollusks was composed by 19 families and 31 species of gastropods, 12 families and 19 species of bivalves and 2 families and 4 species of cephalopods. The highest abundance were observed at stations 13 (373 individuals) and 16 (685 individuals) that represents the lowest depth (10 m) and the richness was higher at stations 15 and 12 (17 and 11 species, respectively) both located at the highest depth (30 m). Cephalopods had high frequency of occurrence being collected in all the stations and by far the most abundant group with a total of 2,488 individuals captured. On the other hand, gastropods (with 142 individuals found in 83.3% of stations) and bivalves (about 1% of the individuals collected) contribute with a much smaller percentage of individuals captured. Lolliguncula brevis (Blainville, 1823) was most representative cephalopod in number and frequency of occurrence. Arcidae, Conidae, Muricidae and Strombidae were the families with the higher number of species in the trawl-fishery. Among bivalves, Pitar arestus (Dall & Simpson, 1901) and Spathochlamys benedicti (Verrill & Bush [in Verrill], 1897) were the species with higher frequency of occurrence. Although the considerable sample effort and a number of mollusks captured as bycath, the richness estimators indicated that the species richness could increase with additional sampling effort in the study area. The present study expands the taxonomic alpha knowledge on the mollusk bycatch of sea-bob shrimp trawl fisheries on the northeastern coast of Brazil. However, it is of crucial importance to assess urgently the negative impacts of the sea-bob shrimp trawl fisheries on the benthic community of the entire coast of Brazil.

8

de Guibert, Sophie, Marie-Sarah Dilhuydy, Loic Ysebaert, Laurence Sanhès, Sylvain Choquet, Therese Aurran-Schleinitz, Romain Guieze, et al. "Bendamustine, Ofatumumab and High-Dose Methylprednisolone (BOMP) in Relapsed/Refractory CLL: Results of a Planned Interim Analysis of the French CLL Intergroup ICLL01 Phase II Trial." Blood 124, no.21 (December6, 2014): 3341. http://dx.doi.org/10.1182/blood.v124.21.3341.3341.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Abstract Introduction: For relapsed or refractory (R/R) CLL patients (pts), combination of bendamustine and rituximab appears safe and effective (Fischer 2011). Ofatumumab monotherapy gives 58% ORR in heavily pre-treated (median 4 prior lines) R/R CLL pts (Wierda JCO 2010). High doses (HD) steroids are also active in poor prognosis pts with bulky nodal involvement or p53 impairment (Castro 2008, Xu 2010). We report a planned interim analysis of the ICLL01-BOMP phase II trial evaluating the association of Bendamustine, Ofatumumab and high-dose MethylPrednisolone for fit R/R CLL pts after 1-3 previous lines (NCT01612988). Patients and Methods: Primary endpoint was CR rate after 6 cycles (cy) of the BOMP regimen [i.e. bendamustine (70 mg/m2 d1, d2), ofatumumab (1000 mg d1;15 on cy#1-2 and d1 on cy#3-6) and HD methylprednisolone (1 g/m2 d1-3)]. The c#1 was preceded by an ofatumumab (300 mg) prephase. Response evaluation (IWCLL 2008) was done 3 months (m) after the last cy along with blood and bone marrow 10-color flow MRD analysis. Results: Among the 55 pts of this analysis, median age was 64 years (44-76). CIRS-G comorbidity score was 2-6 in 61% and pts had received 2-3 lines in 37% of the cases. Prior FCR-like regimens (50 (91%) patients) had been followed by relapse within 2y in 22/55 and 5/55 pts were fludarabine-refractory (FR). IGVH was unmutated (UM) in (47/52) 90.4%. Karyotypes were complex in 18/46 (39%) cases. Distribution according to FISH hierarchical model was: del(17p) in 15 (27%), del(11q) in 14 (26%), trisomy 12 in 4 (7%), del(13q) in 17 (31%) and normal in 5 (9%). Mutations on the TP53, SF3B1 and NOTCH1 genes occurred in 17 (31%), 14 (26%) and 5 (9%) pts, respectively. According to published risk stratification (Zenz, 2012), 34/55 pts (62%) belonged to the “highest-risk” group with either TP53 disruption (deletion and/or mutation) (n=19) and/or early relapse within 2 years post-FCR (n=22). The remaining patients belonged to either the “high-risk” group (UM-IGVH and/or Highb2mic and/or del11q) accounting for 17 pts (31%) or to the “low-risk” group (or non evaluable) accounting for 4 (7%) pts. Overall, 292 BOMP cy (mean 5.3 cy/pts) were delivered. Safety analysis recorded 158 grade 3-4 adverse events (G3-4/AE) with according to cy: neutropenia: 20.8%, thrombocytopenia: 11.3%, anemia: 2.4%, infection: 5,8%, hyperglycemia: 7,5%, liver enzyme elevation: 1,4%, cutaneous reaction: 1,4%, ofatumumab infusion related reaction: 0,3% and other AE: 3,4%. Overall 43 out of 55 pts (78.2%) had at least one G3-4/AE. Twenty-eight severe adverse events were reported in 20 pts. Treatment interruption before planned 6 cy occurred for pts' decision (n=3), excessive toxicity (n=5) or early progressive disease (PD) (n = 4). Response in the ITT population was 76.4% ORR with 20% CR (n=11), 56.4% PR (n=31 including 5 nPR and 1 CRi), 9.1% stable disease (n=5), 10.9% PD (n=6) and 3.6% (n=3) non evaluable. Blood MRD obtained in 45 pts was negative (<10-4) in 13 (28.8%) cases. Following evaluation, 5 responding pts (9%) had RIC allogeneic (RIC-Allo) transplantation with a persistent remission. With median follow-up of 16.2 (5.1-23.6) months (m) we observed 9 deaths, related to PD (n=5), EBV-induced lymphoproliferation (n=1), PML encephalitis (n=1), sepsis/pancytopenia (n=1) or unknown origin (n=1). We recorded 22 relapses (including 4 Richter Syndromes) resulting in treatment in 17 cases, with a BTK inhibitor in 8 cases. The median OS has not been reached (estimation 84% at 18 m) (Fig 1B). The median PFS was 18.4 m (95%CI, 14.6-22.2) and the median time to next treatment 17.6 m (95%CI, 12.9-22.4). With 5 cases censored at time of RIC-Allo, the PFS (censored analysis) was 17.5 m (95%CI, 13.2-21.8). (Fig 1A) After univariate analysis, ORR was lower in the “highest-risk” (64,6%, p=0.01), del(17p) (40%, p=0.003), TP53 mutation (47.1%, p=0.01) and complex karyotype (61.2%, p=0.024) groups. PFS was shorter in the “highest-risk” (14 m, p=0.046), FR (4.96 m, p<0.001), del(17p) (9.5 m, p=0.017) and TP53 mutation (9.5 m, p=0.007) groups. Conclusion: Relapse treatment of CLL is a challenge especially after prior FCR-like treatments, accounting for >90% of this trial population. These results in terms of response and survival appear noteworthy considering that >60% are “highest-risk” pts. This study provides important information for forthcoming comparison with next emerging CLL therapies. Figure 1 Figure 1. Disclosures de Guibert: Roche: Honoraria. Feugier:Roche: Honoraria. Schuh:Roche, Gilead, GSK, NAPP, Celgene: Honoraria. Leblond:Roche: Honoraria, Speakers Bureau. Tournilhac:mundipharma: Honoraria, Other, Research Funding; GSK: Honoraria, Other, Research Funding; Roche: Honoraria, Other, Research Funding.

9

Diamant, Viktor, Volodymyr Trachevskii, Katherine Pershina, Volodymyr Ogenko, Chen Donchu, Hu Huawen, Chen Min, Wang Xiaowen, and Chang Menglei. "Specialties of the structure and conductivity of the non-aqueous electrolytes based on alkali metal bis (salicyl) borates and bis (oxalate) borates." Ukrainian Chemistry Journal 85, no.3 (June7, 2019): 49–55. http://dx.doi.org/10.33609/0041-6045.85.3.2019.49-55.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

The structure and coordination environment of non-aqueous electrolytes based on bis(salicyl)borates of lithium, sodium, potassium, tetramethylammonium (MeBSB) and bis(oxalato)borates from lithium to cesium (MeBOB) using NMR spectroscopy have been investigated. Bis(salicyl)borates (BSB) and bis(oxalate)borates (BOB) of alkali metals and organic cations are considered as promising electroconductive components of electrolytes of modern chemical sources of current (lithium, sodium ion batteries and super-capacitors). The salts were synthesized by the microwave radiation method. The 13C and 11B NMR spectra analysis determined the presence of symmetric structure in BOB anion and the presence of two optical conformations of the BSB anion with labile coordination environment of boron. The conformations of the BSB are the result of the ion contact pairs formation. In the case of tetramethylammonium cation the presence of conformations are depended on the reactive medium. The conformational lability of the coordination sphere of NaBSB dissolved in DMAA is connected with increasing of the integral intensity of carboxyl group singles relatively signals of carbon atoms in fragments of another functional affiliation when the time delay between radio frequencies varies within 2-15 seconds. The difference in the structure of these anions leads to a change in the thermal dependence of the electrical conductivity of BSB and the transport of ions in non-aqueous solvents. Maximum electrical conductivity of salt solutions in DMFA is achieved at close concentrations of 0.75 m for KBSB and 0.77-1 m for NaBSB. The solubility of BSB is better than the BOB. Based on the measurements of the conductivity and the data of electrochemical impedance spectroscopy (the angle of inclination of spectra in the Nyquist coordinates in the low frequency range, the phase angle shift at a frequency) it was proposed the existence of two ways of ions and charge transfer in the electrolytes: diffusion and relay transport. The possibility of formation of a labile salt complex with a solvent due to hydrogen bonds is established.

10

Diamant, Viktor, Volodymyr Trachevskii, Katherine Pershina, Volodymyr Ogenko, Chen Donchu, Hu Huawen, Chen Min, Wang Xiaowen, and Chang Menglei. "Specialties of the structure and conductivity of the non-aqueous electrolytes based on alkali metal bis (salicyl) borates and bis (oxalate) borates." Ukrainian Chemistry Journal 85, no.3 (June7, 2019): 49–55. http://dx.doi.org/10.33609/6045.85.3.2019.49-55.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

The structure and coordination environment of non-aqueous electrolytes based on bis(salicyl)borates of lithium, sodium, potassium, tetramethylammonium (MeBSB) and bis(oxalato)borates from lithium to cesium (MeBOB) using NMR spectroscopy have been investigated. Bis(salicyl)borates (BSB) and bis(oxalate)borates (BOB) of alkali metals and organic cations are considered as promising electroconductive components of electrolytes of modern chemical sources of current (lithium, sodium ion batteries and super-capacitors). The salts were synthesized by the microwave radiation method. The 13C and 11B NMR spectra analysis determined the presence of symmetric structure in BOB anion and the presence of two optical conformations of the BSB anion with labile coordination environment of boron. The conformations of the BSB are the result of the ion contact pairs formation. In the case of tetramethylammonium cation the presence of conformations are depended on the reactive medium. The conformational lability of the coordination sphere of NaBSB dissolved in DMAA is connected with increasing of the integral intensity of carboxyl group singles relatively signals of carbon atoms in fragments of another functional affiliation when the time delay between radio frequencies varies within 2-15 seconds. The difference in the structure of these anions leads to a change in the thermal dependence of the electrical conductivity of BSB and the transport of ions in non-aqueous solvents. Maximum electrical conductivity of salt solutions in DMFA is achieved at close concentrations of 0.75 m for KBSB and 0.77-1 m for NaBSB. The solubility of BSB is better than the BOB. Based on the measurements of the conductivity and the data of electrochemical impedance spectroscopy (the angle of inclination of spectra in the Nyquist coordinates in the low frequency range, the phase angle shift at a frequency) it was proposed the existence of two ways of ions and charge transfer in the electrolytes: diffusion and relay transport. The possibility of formation of a labile salt complex with a solvent due to hydrogen bonds is established.

Langlois,AlphonseJ., RonaldC.Desrosiers, MarkG.Lewis, VineetN.KewalRamani, DanR.Littman, Ji Ying Zhou, Kelledy Manson, MichaelS.Wyand, DaniP.Bolognesi, and DavidC.Montefiori. "Neutralizing Antibodies in Sera from Macaques Immunized with Attenuated Simian Immunodeficiency Virus." Journal of Virology 72, no.8 (August1, 1998): 6950–55. http://dx.doi.org/10.1128/jvi.72.8.6950-6955.1998.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

ABSTRACT Infection with attenuated simian immunodeficiency virus (SIV) in rhesus macaques has been shown to raise antibodies capable of neutralizing an animal challenge stock of primary SIVmac251 in CEMx174 cells that correlate with resistance to infection after experimental challenge with this virulent virus (M. S. Wyand, K. H. Manson, M. Garcia-Moll, D. C. Montefiori, and R. C. Desrosiers, J. Virol. 70:3724–3733, 1996). Here we show that these neutralizing antibodies are not detected in human and rhesus peripheral blood mononuclear cells (PBMC). In addition, neutralization of primary SIVmac251 in human and rhesus PBMC was rarely detected with plasma samples from a similar group of animals that had been infected either with SIVmac239Δnef for 1.5 years or with SIVmac239Δ3 for 3.2 years, although low-level neutralization was detected in CEMx174 cells. Potent neutralization was detected in CEMx174 cells when the latter plasma samples were assessed with laboratory-adapted SIVmac251. In contrast to primary SIVmac251, laboratory-adapted SIVmac251 did not replicate in human and rhesus PBMC despite its ability to utilize CCR5, Bonzo/STRL33, and BOB/gpr15 as coreceptors for virus entry. These results illustrate the importance of virus passage history and the choice of indicator cells for making assessments of neutralizing antibodies to lentiviruses such as SIV. They also demonstrate that primary SIVmac251 is less sensitive to neutralization in human and rhesus PBMC than it is in established cell lines. Results obtained in PBMC did not support a role for neutralizing antibodies as a mechanism of protection in animals immunized with attenuated SIV and challenged with primary SIVmac251.

12

Zazo Sánchez-Mateos, Ricardo, and Fernando Peruyero de León. "Análisis cualitativo de la pasión en mujeres a través de un programa acuático motivacional saludable." Revista de Investigación en Actividades Acuáticas 1, no.2 (February25, 2021): 55–59. http://dx.doi.org/10.21134/riaa.v1i2.396.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Antecedentes: Actualmente, aumenta la importancia de variables psico-sociales como la pasión en diferentes contextos comportamentales, cómo, por ejemplo, los deportivos y los educativos.Objetivos: El objetivo del estudio ha sido comprobar el efecto de un programa acuático motivacional saludable en la pasión en un grupo de mujeres.Método: La muestra fue dividida en dos grupos, un grupo experimental formado por 28 mujeres (M = 43.64; DT = 12.06), con una experiencia media previa de 3.05 años, y un grupo control constituido por 21 mujeres (M = 47.14; DT = 10.01), con una experiencia media previa de 2.29 años que practicaban ejercicio físico en el medio acuático de una gran ciudad española. Los datos de esta investigación proceden de entrevistas semiestructuradas.Resultados: Tras la intervención con un programa fundamentado en la SDT, ambos grupos percibieron beneficios hacia la pasión, pero el grupo experimental percibió una mayor pasión armoniosa hacia el programa gracias a la interiorización del concepto a través de las actividades experimentadas, destacando la novedad y una buena relación entre los practicantes.Conclusiones: La información ofrecida en este estudio puede ser de interés para los profesionales promotores de programas de ejercicio físico acuático saludable.Palabras clave: Ejercicio físico, actividad acuática, motivación, relación con los demás. AbstractIntroduction: Nowadays, increases the importance of psycho-social variables such as the passion in different behavioral contexts, for example, sports and education.Goals: The goal of the study was to analyze the evolution of the aquatic passion that has made the PAMS’ practittioners through the SDT. The data of this research come from semi-structured interviews to 49 women.Method: The sample was divided into two groups, an experimental group formed by 28 women (M = 39.04; SD = 12.06), with an average experience of 3.05 years, and a control group made up of 21 women (M = 36.42; SD = 10.01), with an average experience of 2.29 years practising physical exercise in the aquatic environment of a large Spanish city.Results: After the intervention with a program based on the SDT, both groups’ perceived benefits toward the passion, but the experimental group perceived a greater harmonious passion toward the program thanks to the internalization of the concept through the activities experienced, highlighting the novelty and a good relationship between practitioners.Conclusions: The information offered in this study may be of interest to promote the aquatic physical exercise healthy programs of the future professionals.Keywords: Physical exercise, aquatic exercise, motivation, relation with others. ResumoIntrodução: Atualmente, aumenta a importância da psico-social de variáveis tais como a paixão em diferentes contextos comportamentais, por exemplo, do desporto e da educação.Objetivos: O objetivo do estudo foi analisar a evolução do meio aquático paixão que fez do PAMS' practittioners através da SDT. Os dados da presente investigação provêm de entrevistas semi-estruturadas a 49 mulheres.Método: A amostra foi dividida em dois grupos, um grupo experimental formada por 28 mulheres (M = 39.04; SD = 12.06), com uma experiência média de 3.05 anos, e um grupo controle composto de 21 mulheres (M = 36.42; SD = 10.01), com uma experiência média de 2.29 anos praticar exercício físico no ambiente aquático de uma grande cidade espanhola.Resultados: Após a intervenção com um programa baseado na SDT, ambos os grupos benefícios percebidos para a paixão, mas o grupo experimental percebeu uma maior paixão harmonioso para o programa graças à internalização do conceito através de actividades experientes, destacando a novidade e um bom relacionamento entre os profissionais.Conclusões: As informações oferecidas neste estudo podem ser de interesse para promover o exercício físico aquático saudável programas futuros profissionais.Palavras-chave: Exercício físico, exercício aquático, a motivação, a relação com os outros.

13

Zhang, Linqi, Tian He, Yaoxing Huang, Zhiwei Chen, Young Guo, Sam Wu, KevinJ.Kunstman, et al. "Chemokine Coreceptor Usage by Diverse Primary Isolates of Human Immunodeficiency Virus Type 1." Journal of Virology 72, no.11 (November1, 1998): 9307–12. http://dx.doi.org/10.1128/jvi.72.11.9307-9312.1998.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

ABSTRACT We tested chemokine receptor subset usage by diverse, well-characterized primary viruses isolated from peripheral blood by monitoring viral replication with CCR1, CCR2b, CCR3, CCR5, and CXCR4 U87MG.CD4 transformed cell lines and STRL33/BONZO/TYMSTR and GPR15/BOB HOS.CD4 transformed cell lines. Primary viruses were isolated from 79 men with confirmed human immunodeficiency virus type 1 (HIV-1) infection from the Chicago component of the Multicenter AIDS Cohort Study at interval time points. Thirty-five additional well-characterized primary viruses representing HIV-1 group M subtypes A, B, C, D, and E and group O and three primary simian immunodeficiency virus (SIV) isolates were also used for these studies. The restricted use of the CCR5 chemokine receptor for viral entry was associated with infection by a virus having a non-syncytium-inducing phenotype and correlated with a reduced rate of disease progression and a prolonged disease-free interval. Conversely, broadening chemokine receptor usage from CCR5 to both CCR5 and CXCR4 was associated with infection by a virus having a syncytium-inducing phenotype and correlated with a faster rate of CD4 T-cell decline and progression of disease. We also observed a greater tendency for infection with a virus having a syncytium-inducing phenotype in men heterozygous for the defectiveCCR5 Δ32 allele (25%) than in those men hom*ozygous for the wild-type CCR5 allele (6%) (P = 0.03). The propensity for infection with a virus having a syncytium-inducing phenotype provides a partial explanation for the rapid disease progression among some men heterozygous for the defectiveCCR5 Δ32 allele. Furthermore, we did not identify any primary viruses that used CCR3 as an entry cofactor, despite this CC chemokine receptor being expressed on the cell surface at a level commensurate with or higher than that observed for primary peripheral blood mononuclear cells. Whereas isolates of primary viruses of SIV also used STRL33/BONZO/TYMSTR and GPR15/BOB, no primary isolates of HIV-1 used these particular chemokine receptor-like orphan molecules as entry cofactors, suggesting a limited contribution of these other chemokine receptors to viral evolution. Thus, despite the number of chemokine receptors implicated in viral entry, CCR5 and CXCR4 are likely to be the physiologically relevant chemokine receptors used as entry cofactors in vivo by diverse strains of primary viruses isolated from blood.

14

Le Garff-Tavernier, Magali, Lauren Veronese, Florence Nguyen-Khac, Marie-Sarah Dilhuydy, Patricia Combes, Véronique Leblond, Pierre Feugier, et al. "P53 Functional Assessment and Correlation With 17p Deletion and/Or TP53 Mutation Status In Chronic Lymphocytic Leukemia (CLL). A Preliminary Report Of The ICLL001 Bomp Trial On Behalf Of The French CLL Intergroup (GCFLLC/MW - GOELAMS)." Blood 122, no.21 (November15, 2013): 4173. http://dx.doi.org/10.1182/blood.v122.21.4173.4173.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Abstract Despite improvement in treatment strategies, virtually all chronic lymphocytic leukemia (CLL) patients will relapse and experience tumor resistance. The 17p deletion resulting in loss of the TP53 gene, found in up to 20-40% of relapsing patients, is strongly associated with impaired response to genotoxic agents, reduced progression free survival and poor overall survival. The 17p deletion usually coincides with TP53 mutation, leading to the impairment of the p53-associated pathway. In addition, sole TP53 mutations (without 17p deletion) appear also associated with poor outcome in prospective trials. However, TP53 mutation screening is time consuming, can be not exhaustive, and the respective impact of different patterns of TP53 gene impairment on p53 function and prognostic remains unclear. We previously developed a functional assay to detect p53 dysfunction (Le Garff-Tavernier, 2011) and we aim to validate this analysis on a large prospective trial. Clinical and laboratory data were collected from CLL patients (pts) enrolled in the ICLL001 – BOMP phase II trial of the French CLL intergroup (NCT01612988) evaluating a prephase of ofatumumab (300 mg) followed by 6 monthly courses of BOMP including bendamustine (70 mg/m2 d1-2), ofatumumab 1000 mg TD (d1 and d15 on 1st and 2nd courses) and high dose methylprednisolone (1 g/m2 d1-3) in fit patients with relapsing CLL and IWCLL treatment criteria. In addition to conventional screening, we focused on p53 evaluation. FISH analysis for 17p deletion was done with a 10% cut-off for positive result, TP53 gene mutation screening was performed using Sanger sequencing of the entire coding region (exons 2–11) and the p53 functional status in CLL cells was determined by a flow cytometry assay based on induction of p53 and p21 protein expression after etoposide and nutlin-3a exposition. Data from the first 55 enrolled pts are available. Sex ratio M/F was 3.3 and median age was 63.8 yrs (44.6-76.4). CLL diagnostic had been done 7,2 (1,9-16,8) years before inclusion. All patients had according to IWCLL criteria an active disease of Binet stage of A (11%), B (57%) and C (32%) respectively. Patients had been previously pretreated with a median of 1 (1-3) lines, including FCR (or FCR-like) in 51 (93%) pts and 22 (42%) pts had experienced high-risk relapses within 24 months post-FCR, with 7 (13%) pts being fludarabine refractory (less than PR after fludarabine regiment and/or response lasting less than 6 months). IGVH gene status was unmutated in 90%, elevated β2-microglobulin (>4) was found in 52%. Karyotypes were complex (≥ 3 abnormalities) in 18/46 (39%) successful cases. Using FISH, we found 15/55 (27%) del17p (median of positive cells 71%, range 10-98), 6/55 (11%) tri12, 18/55 (33%) del11q, 35/55 (64%) del13q. Results of p53 functional assay was available for 52 pts with the following results: normal in 31 pts and abnormal in 21 pts including type A (n=4), type B (n=13) and type C (n=4) dysfunction. Mutation screening was available in 55 pts. No mutation were detected in 38 pts, one significant mutation was detected in 14 pts within exon 5 (n=1), exon 6 (n=2), exon 7 (n=2), exon 8 (n=6), exon 10 (n=1) and intronic splice site (n=2) ; 3 pts had 2 mutations within exons 7 and 8 (n=1), exons 7 and 10 (n=1), exons 5 and 7 (n=1). Among the 52 pts with available functional results we found the 7 following groups (Table). In this study, the sensitivity and specificity of the p53 functional test to detect patient with 17p deletion and/or TP53 mutation was 89.5% (66.9 –99.7) and 87.9% (71.8 – 96.6) respectively. Response to p53/21 functional assay 17p deletion TP53 mutation n % Group 1 Normal No No 29 56 Group 2 Abnormal Yes Yes 13 25 Group 3 Abnormal Yes No 1 2 Group 4 Abnormal No Yes 3 5.5 Group 5 Abnormal No No 4 7.5 Group 6 Normal Yes No 1 2 Group 7 Normal No Yes 1 2 This study shows that an in vitro p53 functional analysis can predict with an acceptable sensitivity the presence of TP53 gene disruption and could be useful to identify pts with TP53 mutation without 17p deletion. Interestingly, this functional assay coupled with cytogenetic and mutational screening could reveal 3 sub-groups of pts with potential clinical consequences: i) normal p53 function despite a del17p deletion (group 6) ii) normal p53 function despite a TP53 mutation (group 7) and in contrast iii) abnormal p53 function without any TP53 gene disruption (group 5) allowing to describe alternative alterations of p53 pathway. Disclosures: Dilhuydy: Roche: Honoraria. Leblond:Roche: Consultancy, Honoraria, Membership on an entity’s Board of Directors or advisory committees, Speakers Bureau; Janssen: Honoraria, Membership on an entity’s Board of Directors or advisory committees; Mundipharma: Honoraria, Membership on an entity’s Board of Directors or advisory committees, Speakers Bureau. Feugier:Roche: Honoraria, Membership on an entity’s Board of Directors or advisory committees. Tournilhac:MUNDIPHARMA: Consultancy, travel funding Other; GSK: Consultancy, travel funding, travel funding Other; Celgene: Consultancy, teaching, teaching Other.

15

Le Garff-Tavernier, Magali, Claire Quiney, Lauren Veronese, Florence Nguyen-Khac, Pauline Robbe, Patricia Combes, Marie-Sarah Dilhuydy, et al. "p53 Functional Assessment and Correlation with 17p Deletion and/or TP53 Mutation Status: Final Report of the ICLL001 Bomp Trial." Blood 132, Supplement 1 (November29, 2018): 3127. http://dx.doi.org/10.1182/blood-2018-99-116722.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Abstract Introduction: The 17p deletion (del(17p)) resulting in loss of the TP53 gene is associated with impaired response to genotoxic agents and has an impact on PFS following BTK inhibitor and possibly also venetoclax. The del(17p) usually coincides with TP53 mutation, leading to the impairment of the p53-associated pathway. Sole TP53 mutations appear also associated with poor outcome in prospective trials. The iwCLL guidelines recommend to look for del(17p) and TP53 mutation before each line of treatment. An original approach is the functional assay, which highlights the functional abnormalities of p53 whether it is a TP53 gene disruption (del(17p) and/or TP53 mutation) or a defect of another actor in the p53 pathway. We aim to validate this functional assay on a prospective trial and to study the impact of p53 status on the clinical response regardless of the biological method. Methods: Clinical and biological data were collected from 74 CLL patients (pts) enrolled in the BOMP phase II trial of the French Innovative Leukemia Organization (FILO) (NCT01612988) evaluating 6 monthly courses of BOMP including bendamustine, ofatumumab and high dose methylprednisolone in fit pts with relapsing CLL. In addition to conventional screening, we focused on p53 evaluation at time of inclusion. FISH analysis for del(17p) was done with a 5% cut-off for positive result. TP53 gene mutation screening was performed by Sanger sequencing of the coding region (exons 2-11). A targeted NGS screening (19 genes including TP53, Illumina MiSeq) was also performed. The p53 functional status was determined by a flow cytometry assay based on induction of p53 and p21 protein expression after etoposide and nutlin-3 exposition, as previously described (Le Garff-Tavernier M., 2011), which allows the detection of 3 types of p53 dysfunction (A, B and C), irrespective of an ATM default. Clinical response was evaluated by PFS, OS and TTNT Kaplan-Meier analyses (MedCalc stat). Results: Data from the whole cohort are available. Median age was 64 yrs. Pts had a median of 1 (1-3) lines of treatment previous to this trial, including FCR in >90%. Concerning p53 evaluation, a del(17p) was found in 30% of cases by FISH (22/73 pts with a median of 68% positive cells, range 10-98). The percentage of p53 abnormalities increased to 41% when TP53 mutations were screened (30/73 pts with 1 to 8 mutations, median VAF 10 %, range 1.6-90). Results from the p53 functional assay were available for 69 pts showing the highest level of p53 abnormalities. Indeed, p53 dysfunction was observed in 48% of pts (33/69) including type A (n=11), type B (n=17) and type C (n=5) dysfunction. Thus, the sensitivity and specificity of the p53 functional assay to detect pts with del(17p) and/or TP53 mutation were of 87% and 84% respectively (n=68 pts for which the 3 tests were available). Interestingly, discordant results were observed in 10 pts: 4 pts with a functional p53 despite a TP53 gene disruption (3 with TP53 mutation only and 1 with del(17p) only) and conversely 6 pts with a p53 dysfunction (all with type B dysfunction) but without any TP53 gene disruption, suggesting alternative alterations of the p53 pathway. The only similarity for those latter pts is the occurrence of at least one ATM abnormality (del(11q) and/or ATM mutation). The combination of the 3 assays defines 3 groups: (1) "intact p53" (no TP53 disruption and functional p53, n=32), (2) "altered p53" (TP53 disruption and p53 dysfunction, n=26) and (3) "discordant p53" (n=10). PFS and TTNT were higher in pts without (n=38) compared to those with TP53 gene disruption (n=30) (p=0.04 for both). The OS, even though not significant, presented a similar trend. When considering the functional status, a similar profile is observed but with a better discrimination between pts with normal p53 function (n=36) and pts with p53 dysfunction (n=32) (p=0.002 and 0.003, respectively). Combining the 3 assays, PFS and TTNT of the group 3 "discordant p53" profiles' appeared intermediate (Figure 1). Conclusion: This study shows that a p53 functional analysis can predict with an acceptable sensitivity the presence of a TP53 gene disruption. Interestingly, this functional assay coupled with cytogenetic and mutational screening could reveal a sub-group of pts with discordant results for which PFS and TTNT appeared intermediate. Evaluation of other discordant cases is mandatory to confirm these results and could lead to a wider use of this global functional approach. Figure 1. Figure 1. Disclosures Feugier: Abbvie: Consultancy, Honoraria, Membership on an entity's Board of Directors or advisory committees, Research Funding; Janssen: Consultancy, Honoraria, Membership on an entity's Board of Directors or advisory committees, Research Funding; Roche: Consultancy, Honoraria, Membership on an entity's Board of Directors or advisory committees, Research Funding; Gilead: Consultancy, Honoraria, Membership on an entity's Board of Directors or advisory committees, Research Funding. Sylvain:Gilead: Other: scientific advisor board. Schuh:Giles, Roche, Janssen, AbbVie: Honoraria. Guieze:abbvie: Honoraria; janssen: Honoraria; gilead: Honoraria. Leblond:Abbvie: Consultancy, Honoraria, Other: Travel, Accommodations, Expenses, Speakers Bureau; Roche: Consultancy, Honoraria, Other: Travel, Accommodations, Expenses, Speakers Bureau; Janssen: Consultancy, Honoraria, Speakers Bureau; Gilead: Honoraria, Speakers Bureau; Sandoz: Honoraria; Amgen: Honoraria.

16

Kampf,A.R., J.J.Pluth, Y.S.Chen, A.C.Roberts, and R.M.Housley. "Bobmeyerite, a new mineral from Tiger, Arizona, USA, structurally related to cerchiaraite and ashburtonite." Mineralogical Magazine 77, no.1 (February 2013): 81–91. http://dx.doi.org/10.1180/minmag.2013.077.1.08.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

AbstractBobmeyerite, Pb4(Al3Cu)(Si4 O12)(S0.5Si0.5O4)(OH)7 Cl(H2O)3, is a new mineral from the Mammoth - Saint Anthony mine, Tiger, Pinal County, Arizona, USA. It occurs in an oxidation zone assemblage attributed to progressive alteration and crystallization in a closed system. Other minerals in this assemblage include atacamite, caledonite, cerussite, connellite, diaboleite, fluorite, georgerobinsonite, hematite, leadhillite, matlockite, murdochite, phosgenite, pinalite, quartz, wulfenite and yedlinite. Bobmeyerite occurs as colourless to white or cream-coloured needles, up to 300 m m in length, that taper to sharp points. The streak is white and the lustre is adamantine, dull or silky. Bobmeyerite is not fluorescent. The hardness could not be determined, the tenacity is brittle and no cleavage was observed. The calculated density is 4.381 g cm-3. Bobmeyerite is biaxial (-) with α ≈ β = 1.759(2), γ = 1.756(2) (white light), it is not pleochroic; the orientation is X = c; Y or Z = a or b. Electron-microprobe analyses provided the empirical formula Pb3.80Ca0.04Al3.04Cu2+0.96Cr3+0.13Si4.40S0.58O24.43Cl1.05F0.52H11.83. Bobmeyerite is orthorhombic (pseudotetragonal), Pnnm with unit-cell parameters a = 13.969(9), b = 14.243(10), c = 5.893(4) Å, V = 1172.5(1.4) Å3 and Z = 2. The nine strongest lines in the X-ray powder diffraction pattern, listed as [dobs (Å)(I)(hkl)], are as follows: 10.051(35)(110); 5.474(54)(011,101); 5.011(35)(220); 4.333(43)(121,211); 3.545(34)(040,400); 3.278(77)(330,231,321); 2.9656(88)(141,002,411); 2.5485(93)(051,222,501); 1.873(39)(multiple). Bobmeyerite has the same structural framework as cerchiaraite and ashburtonite. In the structure, which refined to R1 = 0.079 for 1057 reflections with F > 4σF, SiO4 tetrahedra share corners to form four-membered Si4O12 rings centred on the c axis. The rings are linked by chains of edge-sharing AlO6 octahedra running parallel to [001]. The framework thereby created contains large channels, running parallel to [001]. The Cl site is centred on the c axis alternating along [001] with the Si4O12 rings. Two non-equivalent Pb atoms are positioned around the periphery of the channels. Both are elevencoordinate, bonding to the Cl atom on the c axis, to eight O atoms in the framework and to two O (H2O) sites in the channel. The Pb atoms are off-centre in these coordinations, as is typical of Pb2+ with stereo-active lone-electron pairs. A (S, Si, Cr)O4 group is presumed to be disordered in the channel. The name honours Robert (Bob) Owen Meyer, one of the discoverers of the new mineral.

17

Hiolanda, Rosivaldo, Anderson Morais Kimecz, Leonardo Cunha Melo, and Flávio Carlos Dalchiavon. "PERFORMANCE OF COMMON BEAN GENOTYPES IN THE REGION OF CAMPO NOVO DO PARECÍS - MT." Nativa 6, no.6 (November5, 2018): 582. http://dx.doi.org/10.31413/nativa.v6i6.5925.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

DESEMPENHO DE GENÓTIPOS DE FEIJÃO PRETO NA REGIÃO DE CAMPO NOVO DO PARECIS - MT O objetivo do trabalho foi avaliar o desempenho agronômico de genótipos de feijão comum, grupo comercial preto, cultivados na região de Campo Novo do Parecis – MT.O ensaio foi instalado e conduzido, entre os meses de fevereiro e maio de 2016 e 2017, na área experimental do setor de produção do Instituto Federal de Educação, Ciência e Tecnologia de Mato Grosso – IFMT Campus Campo Novo do Parecis, cujas coordenadas geográficas são latitude S 13°40’31’’ longitude O 57°53’31’’ e altitude média de 574 m. O delineamento experimental foi em blocos casualizados, com 12 tratamentos (nove linhagens e três padrões) e três repetições. Foram avaliadas as características agronômicas altura da planta, diâmetro do caule, dias para o florescimento inicial, dias para a maturação fisiológica, número de vagens por planta, número de grãos por vagem, número de grãos por planta, massa de cem grãos e produtividade de grãos. Os dados submetidos à análise de variância e ao teste de média Scott-Knott, ambos a 5% de probabilidade. O feijão comum preto é uma cultura que se desenvolve bem no chapadão do Parecis, permitindo a colheita mecanizada pela boa resistência ao acamamento. A produtividade de grãos pode ser satisfatória, desde que não ocorra estresse hídrico na fase reprodutiva. Entre os genótipos pesquisados, o BRS FP403, CNFP 15697 e CNFP 15684 se destacaram no desempenho produtivo. Para obter um bom rendimento é necessário investimento, pois a cultura é exigente em água.Palavras-chave: melhoramento genético vegetal, Phaseolus vulgaris, valor de cultivo e uso. ABSTRACT: The objective of this work was to evaluate the agronomic performance of common bean genotypes, black commercial group, grown in the region of Campo Novo do Parecis, state of Mato Grosso. The experiment was set and conducted from February to May 2016/ 2017 in the experimental area of the production sector of the Instituto Federal de Educação, Ciência e Tecnologia de Mato Grosso – IFMT Campus Campo Novo do Parecis, at the geographical coordinates 13°40’31” S latitude and 57°53’31” W longitude and an average elevation of 574 m. The experimental design was complete randomized, with 12 treatments (nine lines and three standards) and three replications. Plant height, stem diameter, days for initial flowering, days for physiological maturation, number of pods per plant, number of grains per pod, number of grains per plant, mass of one hundred grains and grain yield were evaluated in this study. Data were submitted to analysis of variance and to the Scott-Knott mean test, both at 5% probability. Black common bean is a crop that grows well on the Parecis’s region, allowing mechanized harvesting for good resistance to lodging. Grain yield may be satisfactory as long as there is no water stress in the reproductive phase. Among the evaluated genotypes, the BRS FP403, CNFP 15697 and CNFP 15684 showed good productive performance. Investment is necessary to achieve a good yield because the crop is demanding in water.Keywords: cultivation value and use, genetic plant breeding, Phaseolus vulgaris.

18

Santos, Ronaldo Antonio dos, Marcos Vinícius Folegatti, Tarlei Arriel Botrel, Roberto Terumi Atarassi, and José Alves Júnior. "PROJETO, CONSTRUÇÃO E CALIBRAÇÃO DE UM LISÍMETRO MÓVEL DE PESAGEM, COM CÉLULA DE CARGA HIDRÁULICA, PARA DETERMINAÇÃO DA DEMANDA HÍDRICA DE MUDAS CÍTRICAS EM CASA DE VEGETAÇÃO." IRRIGA 12, no.2 (August10, 2007): 202–15. http://dx.doi.org/10.15809/irriga.2007v12n2p202-215.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

PROJETO, CONSTRUÇÃO E CALIBRAÇÃO DE UM LISÍMETRO MÓVEL DE PESAGEM, COM CÉLULA DE CARGA HIDRÁULICA, PARA DETERMINAÇÃO DA DEMANDA HÍDRICA DE MUDAS CÍTRICAS EM CASA DE VEGETAÇÃO Ronaldo Antonio dos Santos; Marcos Vinícius Folegatti; Tarlei Arriel Botrel; Roberto Terumi Atarassi; José Alves JúniorDepartamento de Engenharia Rural, Escola Superior de Agricultura "Luiz de Queiroz", Universidade de São Paulo, Piracicaba, SP, santosra@esalq.usp.br 1 RESUMO Este trabalho teve como objetivo desenvolver, construir e analisar a performance de um lisímetro móvel de pesagem, utilizando célula de carga hidráulica confeccionada com diafragma. A solução encontrada para viabilizar a lisimetria no atual sistema de produção de mudas cítricas em casa de vegetação, com grupos de plantas muito heterogêneos, foi o emprego de uma estrutura móvel, capaz de pesar, isoladamente, vários contentores de mudas. O número de contentores seria função do número de variedades e estádio de desenvolvimento, enquanto que o número de estruturas de pesagem seria função do número de contentores. Os resultados obtidos permitiram concluir que o lisímetro apresentou um bom desempenho, resultando na equação de calibração V=0,018.LR, onde V é o volume de água (L.planta-1) e LR é a leitura piezométrica (mm). Esta equação apresentou um r2 de 0,997, indicando a excelente precisão do equipamento. Com um r2 de 0,997, originado da regressão entre o volume estimado e volume real, e um índice de Concordância (d) de 0,9993, o lisímetro apresentou excelente acurácia, com resolução de 0,45mm de lâmina de água. Sua mobilidade permitiu o livre deslocamento entre bancadas de mudas, exigindo um único operador. O custo total de construção do equipamento foi de US$1.108,54. UNITERMOS: lisimetria móvel, evapotranspiração, citros SANTOS, R. A. dos; FOLEGATTI, M. V.; BOTREL, T. A.; ATARASSI, R. T.; ALVES JÚNIOR, J. DESIGN, CONSTRUCTION AND EVALUATION OF A WEIGHING LYSIMETER WITH HYDRAULIC LOAD CELL TO DETERMINE WATER REQUIREMENTS OF CITRUS NURSERY TREES IN GREENHOUSE 2 ABSTRACT The aim of the present work was to develop, build and evaluate the performance of a mobile weighing lysimeter using a hydraulic load cell with a diaphragm. In order to make the use of lysimeter feasible in the present citrus nursery production system in greenhouses with very heterogeneous group of plants, a mobile structure capable of weighing several containers of seedlings separately was used. The quantity of containers was the function of the number of varieties and their development stages and the number of weighing structure, a function of the number of containers. From the obtained results, it was concluded that the lysimeter presented a good performance, providing the calibration equation V=0.018LR, where V is the water volume (L.plant‾¹) and LR is the piezometric reading (mm). The determination coefficient (r²) was 0.997, indication an excellent equipment adjustment. A regression between estimated and actual volumes provided an r² of 0.998 and a concordance index (d) of 0.0003, indicating an excellent accuracy with 0.45mm depth resolution. The equipment mobility allowed free movement in nursery benches and just one operator was required. Total equipment assembly cost was about US$ 1,108.54. KEYWORDS: mobile lysimeter, evapotranspiration, Citrus.

19

Djokovic, Zorica. "Stanovnistvo istocne Makedonije u prvoj polovini XIV veka." Zbornik radova Vizantoloskog instituta, no.40 (2003): 97–244. http://dx.doi.org/10.2298/zrvi0340097d.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

(francuski) Le but du pr?sent ouvrage est de pr?senter la structure ethnique de la Mac?doine de l'Est dans la p?riode entre 1300 et 1341, et cela en se basant sur les donn?es anthroponymiques. Cette limitation dans le temps et l'espace a ?t? impos?e par les sources elles-m?me, qui sont les praktika (une sorte de registre des cadastres) des monast?res d'Athos, car ils sont les seuls ? avoir ?t? conserv?s. Les monast?res en question avaient eu des propri?t?s dans cette r?gion-l? et c'est uniquement pour cette p?riode qu'ils permettent de suivre continuellement la population dans certains villages. Il faudrait prendre en consid?ration le fait que dans les praktika ?taient recens?s uniquement les par?ques (paysans d?pendants) des monast?res d'Athos dans 65 villages, et non pas la population enti?re de cette r?gion. Parfois un monast?re dans un certain village n'avait qu'un ou deux m?nages de par?ques. Cela signifie que les r?sultats que nous avons obtenus ?taient relatifs. Deuxi?mement, toutes les agglom?rations ne sont pas couvertes par les sources pour toute la p?riode mentionn?e. Rares sont les cas o? pour un village il existe 3-4 praktika ce qui nous permet de suivre sa population dans 2-3 g?n?rations. Le cas le plus fr?quent est lorsqu'il n'existe qu'un seul praktika ce qui nous permet uniquement de constater dans quelle circonstance avait apparu le praktika, mais pas de suivre les changements ?ventuels dans la structure de la population. ?galement, il faudrait tenir compte du fait que c'est uniquement la population paysanne qui a ?t? recens?e. Dans la majorit? des praktika, les m?nages de par?ques sont d?crit en d?tail, quant aux par?ques eux-m?me, ils sont identifi?s de mani?re diff?rente, le plus souvent d'apr?s leur nom individuel ou d'apr?s une autre caract?ristique comme par exemple un surnom, une profession compl?mentaire une origine ethnique, lieu d'o? la personne ?tait venue, relation familiale par rapport ? une autre personne. Ces moyens d'identification nous pr?sentent des donn?es pr?cieuses sur la soci?t? rurale et sur les professions compl?mentaires exerc?es par les paysans (il s'agit le plus souvent de m?tiers et plus exactement le m?tier de cordonnier, de forgeron et de potelier), sur les rapports entre les gens, les conditions mat?rielles, les migrations, la langue utilis?e par la population... Afin d'?tudier la structure ethnique d'apr?s l'anthroponymie, il fallait avant tout classifier les pr?noms. En effectuant cela, nous nous sommes confront?s ? plusieurs probl?mes. Il arrive parfois que dans la litt?rature scientifique que nous avons consult?e, on donne des interpr?tations compl?tement diff?rentes des pr?noms que nous avons rencontr?s, c'est pourquoi, nous avons d? juger de nous-m?me assez souvent. Tout en nous basant avant tout sur l'?tymologie mais ?galement sur l'observation de la situation sur le terrain. Par exemple si pour un pr?nom ou un mot on suppose qu'il est d'origine slave, nous nous sommes efforc?s de d?finir si ce nom apparaissait plus souvent dans un milieu o? il y a des Slaves. Les listes des noms et surnoms sont aussi donn?es afin que nos conclusions puissent ?tre contr?l?es. Certains des probl?mes sont originaires des recenseurs eux-m?mes. Ils ?taient Grecs et certains d'entre-eux ne savaient pas transcrire correctement les pr?noms et les surnoms non-grecs. Cela est particuli?rement valable pour les sons qui n'existent pas dans la langue grecque. Parfois ils hell?nisent les pr?noms non-grecs et leur donnent un sens qu'ils n'avaient pas. Par exemple: le surnom slave Stur (St?nr?z) est transcris d'une mani?re incorrecte en tant que surnom grec Zgur (Sgsyr?z). Derri?re ces formes aussi modifi?es il est impossible de reconna?tre la forme v?ritable sauf s'il existe des s?ries praktika qui permettent que les donn?es soient compar?es. Pourtant, la classification m?me des pr?noms ne suffit pas pour aboutir ? des conclusions fiables sur l'appartenance ethnique de leur porteurs. N?anmoins, le plus grand nombre repr?sentent les pr?noms du calendrier qui n'indiquent rien sur l'appartenance ethnique, ? moins que des variations populaires de ces pr?noms ne soient utilis?es (par ex. Joanakis ou Joanikije au lieu de Jovan chez les Grecs ou Ivan, Ivanko Janko chez les Slaves) et ceci est extr?mement rare. Les plus pr?cieux sont les pr?noms populaires. Mais, l? aussi il faut ?tre tr?s vigilant. En g?n?ral, si quelqu'un porte un pr?nom slave, il est Slave. Cependant, il arrivait souvent que ce pr?nom devienne un nom patronymique et soit ainsi transmis ? travers les g?n?rations, quant ? la famille, elle s'hell?nisait entre-temps. Nous sommes arriv?s ? la conclusion que l? o? les noms individuels apparaissent au moins dans deux g?n?rations, il s'agissait s?rement des Slaves pop-hell?nis?s (qui parlent le slave). Au cas o? les descendants des Slaves portent des noms individuels grecs, nous avons de bonnes raisons ? douter qu'il s'agisse d'une hell?nisation (qui est du moins entam?e, ce qui ne veut pas dire qu'elle ait aboutit ? une fin). Les surnoms sont nombreux et vari?s. Ils peuvent nous ?tre d'une grande utilit? dans la d?termination de l'appartenance ethnique de quelqu'un. Vu que la majorit? de par?ques porte des pr?noms eccl?siastiques c'est-?-dire neutres, comme nous les avons nomm?s pour les besoins de notre ouvrage, les surnoms sont particuli?rement pr?cieux lorsque nous rencontrons ce genre de situations. N?anmoins, l'existence de surnoms slaves nous montre que dans le milieu o? ils apparaissent, la langue slave est comprise et parl?e, alors que le grec nous indique que le grec est compris et parl?. En principe, celui qui porte un surnom slave est le plus souvent Slave. Cependant, l'existence de ce genre de surnom n'exclut pas Fhell?nisation. Il existe une autre difficult? qui est que les membres d'un groupe ethnique peuvent avoir un surnom dans la langue de l'autre peuple avec lequel le plus souvent ils cohabitent. Il existe plusieurs cas o? les Slaves pour lesquels nous sommes certains qu'ils sont Slaves, car les membres de leur famille portent des noms individuels slaves ont un surnom grec. L'analyse a montr? que ce genre de cas se rencontrent dans les r?gions bilingues o? ce surnom avait ?t? compr?hensible aux membres des deux ethnies. C'est pourquoi, les surnoms, en tant qu'indices de l'appartenance ethnique ne peuvent en aucun cas ?tre utilis?s individuellement, mais uniquement en combinaison avec d'autres donn?es. Les r?sultats auquels nous sommes parvenus sont les suivants. La Mac?doine de l'est ?tait au XIVe si?cle une r?gion encore ethniquement h?t?rog?ne ce qui ne fait que confirmer les r?sultats des autres chercheurs. Pourtant, la question de la structure ethnique est r?duite ? la question des relations entre Grecs et Slaves. Les autres peuples qui se rencontrent, et qui sont les Latins, les Valaches, divers peuples turcs, les Albanais, les Arm?niens les Rom et m?me un Juif et une famille hongroise, ils forment tous une minorit? g?n?ralement d?j? assimil?e. Dans la moyenne, les pr?noms et surnoms slaves se manifestent dans un peu plus d'un quart de familles recens?es. Cela ne veut pas dire que les Slaves pop-hell?nis?s repr?sentaient r?ellement une partie si importante de la population de l'est de la Mac?doine, car leur pr?noms et surnoms se transformaient parfois en nom de famille et ?taient ainsi conserv?s m?me apr?s que la famille se soit hell?nis?e. D'autre part il faut prendre en consid?ration qu'un certain nombre de Slaves se dissimulait derri?re des pr?noms eccl?siastiques et c'est pourquoi il est rest? pour nous imperceptible. Donc, les donn?es statistiques pr?sentent uniquement une image relative de la r?alit?, mais elles sont donn?es dans l'ouvrage car il a ?t? n?cessaire de donner un certain rapport num?rique de la pr?sence des Grecs et des Slaves. La pr?sence de la population slave dans la Mac?doine de l'Est n'est pas proportionn?e. On observe plusieurs r?gions qui se distinguent par la pr?sence des Slaves ? leur sein, c'est pourquoi nous les avons analys?s individuellement. La Chalcidique est une r?gion o? le nombre de Slaves, dans la p?riode depuis le d?but du XIVe si?cle jusqu'en 1341 ?tait consid?rable. En moyenne, leurs pr?noms et surnoms se manifestent dans environ 25% de m?nages ce qui, statistiquement parlant, nous indique que les Slaves repr?sentait un quart de la Chalcidique, qu'il s'agisse des Slaves qui avait encore gard? leurs caract?ristiques ethniques, ou qu'il s'agisse de ceux qui se sont hell?nis?s mais qui ont gard? leur noms individuels ou leurs surnoms slaves en tant que noms de famille. Lorsque l'on effectue une coupe dans le temps de la pr?sence des pr?noms et surnoms slaves, il est ?vident que le nombre de Slaves en Chalcidiques diminue sans cesse. De 35,98% combien il y en avait au d?but du XIVe si?cle, leur nombre jusqu'aux ann?es vingt avait diminu? et repr?sentait 20,81% et le d?croissem*nt continuait jusqu'? 1341 lorsqu'ils apparaissent dans uniquement 13,69% de m?nages. Dans cette m?me p?riode, on distingue une hausse du nombre de m?nages portant des pr?noms grecs, ainsi qu'une baisse de m?nages portant des pr?noms mixtes c'est-?-dire avec des pr?noms populaires d'au moins deux peuples, dans ce cas-l?, le plus souvent grec et slave. Nous pensons que dans ce ph?nom?ne se cache l'explication de la diminution du nombre de familles portant des pr?noms slaves. N?anmoins, comme les mariages mixtes ?tait une chose fr?quente, avec le temps, dans ces couples dominait l'influence grecque ce qui est tout ? fait compr?hensible, ?tant donn? que les Grecs, comme on peut le remarquer sur le tableau 3, d?j? au d?but du si?cle ?taient dominants. En plus du fait que l'on remarque que le nombre de Slaves est en baisse continue, on remarque que leur pr?sence n'?tait pas partout la m?me. En relation avec cela, il existe de nombreuses diff?rences entre la Chalcidique de l'Ouest et de l'Est. En g?n?ral, pour la Chalcidique de l'Ouest on pourrait dire que le nombre de Slaves, plus exactement, les familles portant des pr?noms et surnoms slaves est petit. Statistiquement observant, ce nombre s'?l?ve ? environ 13% et reste stable pour toute la p?riode de 1301 jusqu'? 1341. Cependant, dans certains endroits comme par exemple Epan?-Bolbos Skyloch?rion, N?akitou ainsi que d'autres endroits, ils n'apparaissent pas du tout. M?me dans les endroits o? il y en avait dans un nombre consid?rablement plus grand que la moyenne, comme c'est le cas avec Sainte-Euph?mie, nous sommes les t?moins de leur disparition ? la suite de l'hell?nisation compl?t?e. Deux autres faits t?moignent de la fin du processus d'hell?nisation des Slaves dans la Chalcidique de l'Ouest. Le premier fait est que dans la majorit? des cas o? nous rencontrons des pr?noms ou surnoms slaves, ils apparaissent en fonction de noms fig?s et sont port?s par des personnes aux pr?noms eccl?siastiques voire m?me grecs alors qu'il y a tr?s peu de noms individuels slaves. Deuxi?mement, l? o? les pr?noms slaves apparaissent comme noms individuels, ils sont le plus souvent port?s par des immigrants, dont certains d'entre eux sont devenus les gendres dans certaines familles grecques autochtones. En Chalcidique de l'Est il y avait consid?rablemet plus de Slaves que dans la partie ouest de la p?ninsule. En moyenne, les pr?noms slaves apparaissent dans un tiers de m?nages. Pourtant si nous observons chronologiquement les sources, nous nous apercevons que le nombre de Slaves est en baisse continue. De 38,29% combien ils ?taient au d?but du si?cle, leur nombre baisse ? environ 30% dans les ann?es vingt du XIVe si?cle pour ensuite baisser ? seulement 14,49% en 1338-1341. Ce dernier r?sultat est ? prendre avec r?serve. N?anmoins pour les ?tapes pr?c?dentes nous disposons de dix fois plus de donn?es que pour la derni?re ?tape. C'est pourquoi nous estimons que le r?sultat obtenu est, au moins partiellement, la cons?quence de la nature fragmentaire des sources, et qu'il y aurait pu ?tre beaucoup plus de Slaves. Ici, les Slaves ?taient encore rest?s en tant que groupe ethnique solide. L'hell?nisation ?tait ici aussi entam?e, mais elle n'a pas ?t? compl?t?e. Ce qui caract?rise en g?n?ral cette r?gion, c'est l'importante mixit? ethnique de la population, la coexistence et le bilinguisme. Cependant, la situation varie d'un village ? un autre. Il y en a de ceux o? les pr?noms et les surnoms slaves se manifestent uniquement en fonction de patronymes, alors qu'aucun membre de la communaut? ne porte un pr?nom slave en tant que nom individuel ce qui t?moigne du fait que les Slaves, autrefois, dans un pass? pas si lointain, ?taient pr?sents, l?, mais qu'une hell?nisation a ?t? effectu?e comme c'est le cas avec Hi?rissos et Gomatou. Il y en a aussi o? le nombre de Slaves est important mais qui dimunue avec le temps ce qui indique que l'hell?nisation est en cours comme ? Kozla. Certains villages indiquent un haut pourcentage de population slave comme Gradista, Simeon et S?lada, mais on y rencontre pourtant des traces d'hell?nisation. Dans d'autre, n?anmoins le nombre de Slaves augmente: ? Kontogrikon et ? M?tallin.Ce qui peut aussi ?tre observ? c'est qu'une si grande pr?sence de Slaves pourrait ?tre expliqu?e non seulement par leur r?sistance vis-?-vis de l'hell?nisation mais aussi par leur migrations r?centes dans ces r?gions-l?, ce qui signifie qu'ici nous ne rencontrons pas uniquement les descendants des Anciens Slaves, c'est-?-dire ceux qui ?taient venus dans ces r?gions d?j? au septi?me si?cle, mais aussi que la communaut? ethnique slave ?tait renforc?e avec l'arriv?e des nouveaux Slaves. Dans la r?gion de Strymon, on distingue plusieurs r?gions caract?ristiques. La premi?re r?gion est la vall?e de Strimona pour laquelle on pourrait dire la m?me chose que pour la Chalcidique de l'Ouest, c'est pour cela que nous ne r?p?terons pas les r?sultats ? cet endroit-l?. La deuxi?me est la r?gion montagneuse de Kerdylion et Bolb?. Malheureusem*nt, pour cette r?gion nous disposons uniquement de donn?es pour les dix premi?res ann?es du XIVe si?cle. En g?n?ral, on pourrait dire pour elle que le nombre de Slaves est ?lev?. Leur pr?sence correspond ? celle de la Chalcidique de l'Est, elle est m?me quelque peu plus importante. Malgr? l'hell?nisation qui s'?coule en toute ?vidence, leur nombre est relativement stable. Le fait qu'en 1318-1321, les pr?noms populaires slaves se rencontrent seuls dans plus de 20% de m?nages nous indique qu'au moins un cinqui?me de la population devait ?tre slave et pop-hell?nis?e. Le nombre de mariages mixtes est important. On parle les deux langues, le slave et le grec. Cependant, ceci est valable uniquement pour une p?riode de vingt ans, de 1301 jusqu'? 1321. Malheureusem*nt, les sources ne nous permettent pas de suivre ce qui se passait plus tard avec la population de ces villages-l?. La troisi?me province est la r?gion du mont de Pang?e qui est caract?ris?e par une forte pr?sence de Slaves. Ils repr?sentaient presque la moiti? de la population de cette r?gion. Dans certains villages il y en avait m?me beaucoup plus par exemple ? Boriskos en 1316, dans certains villages ils ?taient plus nombreux que les pr?noms purement grecs comme dans le m?toque de Saint-Pent?l??im?n et Ob?los. Les pr?noms slaves se rencontrent comme noms individuels, c'est-?-dire pr?noms vivants, et non pas comme des mots slaves fig?s en fonction des noms patronymiques. Sur l'existence de l'?l?ment slave nous parlent non seulement les nombreux cas que les descendants des Slaves portent des pr?noms slaves mais il y a aussi de nombreux cas o? les enfants issus de mariages mixtes gr?co-slave portent ?galement des pr?noms slaves. Ceci d?montre que dans ces mariages-l? il n'y avait pas la domination de l'?l?ment grec, ou du moins pas tout de suite. Nous sommes les t?moins que les enfants de parents aux pr?noms grecs portent parfois des pr?noms slaves. Ceci pourrait signifier que m?me l? o? l'on donnait des pr?noms grecs aux Slaves, ces derniers n'ont pas ?t? automatiquement hell?nis?s, mais vu qu'entour?s d'une importante population slave, ils r?ussissaient ? conserver encore leurs caract?ristiques ethniques ainsi que le fait qu'ils ?taient hell?nis?s tr?s difficilement et lentement. Ils s'?taient maintenus ici en tant qu'?l?ment ethnique extr?mement fort et ils n'ont pas ?t? hell?nis?s jusqu'? l'arriv?e des Turques. Les exemples de villages de Dobrobikeia et Ob?los le montrent tr?s bien, ces villages ?taient d?plac?s ? la suite d'attaques turques dans la p?riode entre 1316 jusqu'? 1341. En g?n?ral, on pourrait y ajouter encore que la population slave s'est beaucoup mieux maintenue dans les r?gions montagneuses que dans les r?gions maritimes et dans les plaines. On pourrait dire que la Mac?doine de l'Est ?tait une r?gion interm?diaire entre les provinces slaves du nord et les provinces grecques du sud. Il est imp?ratif d'ajouter que la mixit? de la population est grande et que tout partage en population purement grecque ou purement slave pourrait ?tre artificiel. On peut facilement remarquer dans les sources que les habitants de certaines r?gions et agglom?rations comprenaient les deux langues et que le nombre de mariages mixtes ?tait consid?rable. Il y avait des familles qui contenaient voire m?me trois ?l?ments ethniques. Le bilinguisme et la coexistence ?taient chose commune c'est pourquoi nous pensons qu'ils repr?sentent m?me le principal facteur d'hell?nisation ?tant donn? qu'avec le temps, il y a eu une domination de l'?l?ment ethnique grec m?me dans les milieux caract?ris?s par une forte pr?sence des Slaves.

20

Matos, Ecivaldo De Souza, and Fábio Correia de Rezende. "Raciocínio computacional no ensino de língua inglesa na escola: um relato de experiência na perspectiva BYOD (Computational thinking to teaching English in high school: an experience report in the BYOD perspective)." Revista Eletrônica de Educação 14 (November6, 2019): 3116073. http://dx.doi.org/10.14244/198271993116.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Computational Thinking (CT) is a set of logical-operational cognitive skills or processes of reasoning, based on Computer Science. Abstraction, pattern recognition, algorithmic reasoning, and decomposition are examples of some of these skills that form the four pillar of CT. Some researchers have considered these skills as useful, and even mandatory to to cognitive development of the schoolchildren. In this paper, we present practical aspects and the possible contributions of CT in the development of competence of reading and interpreting English texts. Didactic interventions were carried out in high school classes of a public school, supported by the Bring Your Own Device (BYOD) approach, in which the students used their own smartphones. During these interventions, the students developed concept maps and podcasts, performed online exercises and the traditional exam, all of that composed the set of evaluation instruments. It was possible to understand that the CT skills are intrinsically present and contributed to the development of the reading and writing skills in English. According to testimonials, we highlight that the BYOD approach provided new conceptions and perspectives on the use of electronic equipment in function of the students’ learning.ResumoO Raciocínio Computacional (RC) é um conjunto de habilidades ou processos cognitivos lógico-operacionais de raciocínio, fundamentadas na Ciência da Computação. Abstração, reconhecimento de padrões, raciocínio algorítmico e decomposição são exemplos de algumas dessas habilidades que formam os quatro pilares do RC. Alguns pesquisadores consideram essas habilidades úteis, e até mesmo fundamentais, para o desenvolvimento cognitivo dos estudantes. Nesse sentido, este relato de experiência tem por objetivo apresentar aspectos práticos e possíveis contribuições do RC no desenvolvimento da competência de leitura e interpretação de textos de diferentes naturezas na disciplina de língua inglesa. Para isso, realizaram-se intervenções didáticas em uma turma do ensino médio de uma escola pública, apoiadas na abordagem Bring Your Own Device ou, simplesmente, BYOD, em que os estudantes usaram seus próprios aparelhos celulares. Durante o desenvolvimento das intervenções, os estudantes construíram mapas conceituais e podcasts, realizarem exercício online e a tradicional prova, os quais compuseram o conjunto de instrumentos avaliativos do bimestre. Por meio dessas intervenções, foi possível identificar como as habilidades do RC estiveram intrinsecamente presentes e contribuíram para o desenvolvimento da competência de leitura e escrita em língua inglesa, elencada pelos Parâmetros Curriculares Nacionais. Conforme relatos, além da articulação didática com o RC, a abordagem BYOD proporcionou à professora e aos estudantes novas concepções e perspectivas sobre o uso de equipamentos eletrônicos em função da aprendizagem deles mesmos.Palavras-chave: Raciocínio computacional, Ensino de inglês, Mobile learning, Educação em computação.Keywords: Computational thinking, English teaching, Mobile learning, Computer science education.ReferencesALBERTA Education. School Technology Branch. Bring your own device: a guide for schools. 2012. Disponível em:http://education.alberta.ca/admin/technology/research.aspx. Acesso em: 01 fev. 2017.ALLAN, Walter; COULTER, Bob; DENNER, Jill; ERICKSON, Jeri; LEE, Irene; MALYN-SMITH, Joyce; MARTIN, Fred. Computational thinking for youth. White Paper for the ITEST Learning Resource Centre na EDC. Small Working Group on Computational Thinking (CT), 2010. Disponível em: http://stelar.edc.org/publications/computational-thinking-youth. Acesso em: dez 2017.ARAÚJO, Ana Liz; ANDRADE, Wilkerson; GERRERO, Dalton Serey. Pensamento Computacional sob a visão dos profissionais da computação: uma discussão sobre conceitos e habilidades. In: Anais dos Workshops do VI Congresso Brasileiro de Informática na Educação. v. 4, n 1, 2015. p. 1454-1563.ARMONI, Michal. Computing in schools: On teaching topics in computer science theory. ACM Inroads, v. 1, n. 1, p. 21-22. 2010. DOI=http://dx.doi.org/10.1145/1721933.1721941BARBOSA, Márcio Lobo; ALVES, Álvaro Santos; JESUS, José Carlos Oliveira; BURNHAM, Teresinha Fróes. Mapas conceituais na avaliação da aprendizagem significativa. In: Anais do XVI Simpósio Nacional de Ensino de Física, v. 14, 2005, p. 1-4.BELL, Tim; WITTEN, Ian; FELLOWS, Mike. Ensinando Ciência da Computação sem o uso do computador. Computer Science Unplugged, 2011.BOCCONI, Stefania; CHIOCCARIELLO, Augusto; DETTORI, Giuliana; FERRARI, Anusca; ENGELHARDT, Katja. Developing computational thinking in compulsory education Implications for policy and practice. European Commission, JRC Science for Policy Report. 2016.BRASIL, Ministério da Educação. Secretaria da Educação Básica. PCN+ ensino médio: Orientações educacionais complementares aos parâmetros curriculares nacionais, Brasília: MEC. 2002. Disponível em: http://portal.mec.gov.br/seb/arquivos/pdf/linguagens02.pdf. Acesso em: set 2017.BRASIL. Ministério da Educação (MEC). Base Nacional Comum Curricular. 2017. Disponível em: http://basenacionalcomum.mec.gov.br/. Acesso em: set 2017.BRITANNICA, Encyclopaedia. Phenol: Encyclopaedia Britannica Online Academic Edition. Encyclopædia Britannica Inc. 2012. Disponível em: https://www.britannica.com/. Acesso em: 01 fev. 2017.BROOKSHEAR, J-Glenn. Ciência da Computação: uma visão abrangente. Porto Alegre, Bookman Editora, 2005.CHARLTON, Patricia; LUCKIN, Rosemary. Computational thinking and computer science in schools. What The Research Says’ Briefing, v. 2. 2012. [s.p.]CHIOFI, Luiz Carlos; OLIVEIRA, Marta Regina Furlan de. O uso das tecnologias educacionais como ferramenta didática no processo de ensino e aprendizagem. In: Anais da III Jornada de Didática - Jornada de Didática: Desafios para a Docência e II Seminário de Pesquisa do CEMAD. Londrina, 2014. [s.p.]COMPUTER AT SCHOOL. Computational Thinking: a guide for teachers. Hodder Education - the educational division of Hachette UK Digital Schoolhouse, 2015. Disponível em: https://community.computingatschool.org.uk/resources/2324/single. Acesso em: 01 set 2017.CORREIA, Paulo Rogério Miranda; SILVA, Amanda Cristina; ROMANO JÚNIOR, Jerson Geraldo. Mapas conceituais como ferramenta de avaliação na sala de aula. Revista Brasileira de Ensino de Física, v. 32, n. 4, p. 4402-4408. 2010.COSTA, Giselda dos Santos. Mobile learning: explorando potencialidades com o uso do celular no ensino-aprendizagem de língua inglesa como língua estrangeira com alunos da escola pública. 2013. 201f. Tese (Doutorado em Letras). Faculdade de Letras. Universidade Federal de Pernambuco. Recife. 2013.CSIZMADIA, Andrew; SENTANCE, Sue. Teachers’ perspectives on successful strategies for teaching Computing in school. In: IFIP TCS. 2015. Disponível em: <http://community.computingatschool.org.uk/files/6769/original.pdf>. Acesso em março 2018.CSIZMADIA, Andrew; CURZON, Paul; DORLING, Mark; HUMPHREYS, Simon; NG, Thomas; SELBY, Cynthia; WOOLLARD, John. Computational thinking: A guide for teachers. Computing at Schools, 2015. Disponível em: https://community.computingatschool.org.uk/files/8550/original.pdf>. Acesso em: 26 out. 2017.DIAS, Reneildes; JUCÁ, Leina; FARIA, Raquel. High Up: ensino médio. Cotia, SP: Macmillan, 2013.GOOGLE FOR EDUCATION. What is Computational Thinking? Computational Thinking for Educators. 2015. Disponível em: <https://computationalthinkingcourse.withgoogle.com/unit?lesson=8&unit=1. Acesso em: set 2017.LEE, Irene; MARTIN, Fred; DENNER, Jill; COULTER, Bob; ALLAN, Walter; ERICKSON, Jeri; MALYN-SMITH, Joyce; WERNER, Linda. Computational thinking for youth in practice. ACM Inroads, v. 2, n. 1, 2011. p. 32-37.LIUKAS, Linda. Hello Ruby: adventures in coding. New York: Feiwel & Friends, 2015.LU, Zhao.; YING, Lu. Application of Podcast in Teaching and Learning Oral English for Non-English Majors. In: International Conference on Computational and Information Sciences, Shiyang, 2013. p. 1935-1938. doi: 10.1109/ICCIS.2013.506MANNILA, Linda; VALENTINA, Dagiene; DEMO, Barbara; GRGURINA, Natasa; MIROLO, Claudio; ROLANDSSON, Lennart; SETTLE, Amber. Computational thinking in K-9 education. In: Proceedings of the working group reports of the 2014 on innovation & technology in computer science education conference. ACM, 2014. p. 1-29.MOREIRA, Antonio Marco. Mapas conceituais e aprendizagem significativa (concept maps and meaningful learning). Cadernos do Aplicação, v. 11, n. 2, 1998. p. 143-156.NCSEC. Team 11 in 2000. Concept map. 2000. National Computation Science Education Consortium Disponível em: <http://www.ncsec.org/team11/ Rubric Concep tMap.doc>. Acesso em: set. 2017.NOVAK, Joseph. D. Meaningful learning: The essential factor for conceptual change in limited or inappropriate propositional hierarchies leading to empowerment of learners. Science education, Wiley Online Library, v. 86, n. 4, 2002. p. 548-571.NOVAK, Joseph. Learning creating and using knowledge: Concept maps as facilitative tools in schools and corporations. [S.l.]: Routledge, 2010.PAIVA, Luiz Fernando; FERREIRA, Ana Carolina; ROCHA, Caio; BARRETO, Jandiaci; MELHOR, André; LOPES, Randerson; MATOS, Ecivaldo. Uma experiência piloto de integração curricular do raciocínio computacional na educação básica. In: Anais dos Workshops do Congresso Brasileiro de Informática na Educação, v. 4, 2015. p. 1300-1309.RACHID, Laura. Cenário da educação básica no Brasil é alarmante, aponta Ideb. Revista Educação. São Paulo, 04 set. 2018. Disponível em: http://www.revistaeducacao.com.br/cenario-da-educacao-basica-no-brasil-e-alarmante/. Acesso em: 26 de setembro de 2018.RODRIGUEZ, Carla; ZEM-LOPES, Aparecida Maria; MARQUES, Leonardo; ISOTANI, Seiji. Pensamento Computacional: transformando ideias em jogos digitais usando o Scratch. In: Anais do Workshop de Informática na Escola. p. 62-71. 2015.SILVA, Edson Coutinho. Mapas conceituais: propostas de aprendizagem e avaliação. Administração: Ensino e Pesquisa, [S.l.], v. 16, n. 4, p. 785-815, dez. 2015. ISSN 2358-0917. Disponível em: <https://raep.emnuvens.com.br/raep/article/view/385/196>. Acesso em: 06 nov. 2017. doi: https://doi.org/10.13058/raep.2015.v16n4.385.SILVA, Edson Coutinho. Mapas Conceituais: Modelos de Avaliação. Concept Mapping to Learn and Innovate. In: Proc. of Sixth Int. Conference on Concept Mapping. Santos, Brazil. 2014.WING, Jannette. Computational thinking. Communications of the ACM, v. 49, n. 3, p. 33-35, 2006.WING, Jannette. Computational thinking and thinking about computing. Philosophical transactions of the royal society of London A: mathematical, physical and engineering sciences, v. 366, n. 1881, 2008. p. 3717-3725.XU, Zhichang. Problems and strategies of teaching English in large classes in the People's Republic of China. In: Expanding Horizons in Teaching and Learning. Proceedings of the 10th Annual Teaching Learning Forum. 2001. p. 7-9.ZORZO, Avelino Francisco; RAABE, André Luís Alice; BRACKMANN, Christian Puhlmann. Computação: o vetor de transformação da sociedade. In: FOGUEL, D.; SCHEUENSTUHL, M. C. B. Desafios da Educação Técnico-Científica no Ensino Médio. Rio de Janeiro: Academia Brasileira de Ciências, 2018. p. 154-163.e3116073

21

Armitage, John. "The Uncertainty Principle." M/C Journal 3, no.3 (June1, 2000). http://dx.doi.org/10.5204/mcj.1846.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Paul Virilio. The Information Bomb. London: Verso, 2000. 145 pp., ISBN: 1-85984-745-5 (hardback). Born in Paris in 1932, the French political and 'technocultural' theorist Paul Virilio is the leading exponent of the idea that 'dromology' (the logic of speed) stands at the centre of the political formation and technocultural transformation of the contemporary world. Virilio is an architect of the 'Brutalist' school and political 'critic of the art of technology' as well as a Husserlian phenomenologist and post-Einsteinian analyst of technoculture. In recent years Virilio has developed his own political approach to the technocultural and experiential effects of speed and technoscience on the organisation of cyberspace and cyberculture. It is an approach that is increasingly being adopted and adapted by a variety of pre-eminent thinkers on the Left such as Jean Baudrillard, Slavoj Zizek and Andre Gorz. As the son of a Breton mother and an Italian communist father in Nazi-occupied France, Virilio spent the majority of World War II as an anxious evacuee in Nantes. In 1950 he converted to Christianity in the fraternity of 'worker-priests'. Virilio was educated at the L'École des Métiers d'Art in Paris and first became a craftsman in stained glass before becoming a sort of intellectual provocateur and co-editor of Architecture Principe, an architectural group and occasional review devoted to radical political and architectural experimentation. Between 1963 and 1966 Virilio dedicated his time to studying the architecture of war and to the construction of the 'bunker church' of Sainte-Bernadette du Banlay at Nevers. Virilio became politically active during the 1968 May revolt and this led to an irrevocable split with his partner in Architecture Principe, the architect Claude Parent. In 1969 Virilio was instated as a professor of architecture at the École Speciale d'Architecture at the behest of the students there, a position he occupied until his retirement in 1997. Virilio's major work is Speed & Politics: An Essay on Dromology (1986), written, he maintains, to raise the political question of speed as the hidden side of economic development. Virilio's recent texts such as Open Sky (1997) and now The Information Bomb can therefore be regarded as important advances in his current work on the politics of techno, or, cyberculture. As the son of a Breton mother and an Italian communist father in Nazi-occupied France, Virilio spent the majority of World War II as an anxious evacuee in Nantes. In 1950 he converted to Christianity in the fraternity of 'worker-priests'. Virilio was educated at the L'École des Métiers d'Art in Paris and first became a craftsman in stained glass before becoming a sort of intellectual provocateur and co-editor of Architecture Principe, an architectural group and occasional review devoted to radical political and architectural experimentation. Between 1963 and 1966 Virilio dedicated his time to studying the architecture of war and to the construction of the 'bunker church' of Sainte-Bernadette du Banlay at Nevers. Virilio became politically active during the 1968 May revolt and this led to an irrevocable split with his partner in Architecture Principe, the architect Claude Parent. In 1969 Virilio was instated as a professor of architecture at the École Speciale d'Architecture at the behest of the students there, a position he occupied until his retirement in 1997. Virilio's major work is Speed & Politics: An Essay on Dromology (1986), written, he maintains, to raise the political question of speed as the hidden side of economic development. Virilio's recent texts such as Open Sky (1997) and now The Information Bomb can therefore be regarded as important advances in his current work on the politics of techno, or, cyberculture. Virilio's newest political and technocultural work, The Information Bomb, is set to become an important text of intellectual and dromological analysis. On its opening page Virilio quotes Werner Heisenberg, the German physicist, chief architect of quantum mechanics and founder of the 'uncertainty principle': 'No one can say what will be "real" for people when the wars which are now beginning come to an end'. Briefly, Heisenberg's uncertainty principle states that if a simultaneous calculation is made of the location and speed of a particle then, no matter how faithful the calculations, there is always an uncertainty in the values acquired. It deals with the simultaneous calculation of energy and time. The uncertainty occurs because the act of perceiving the system interferes with it in an unpredictable manner. But uncertainty is only significant at the atomic and subatomic levels and at these levels throws the principle of causality into confusion. Virilio's The Information Bomb therefore examines the dromological and uncertain relationships between the 'reality' of the war universe, speed and, crucially, our perception of its main causalities. The key question and the first sentence of Virilio's book is: 'The civilianisation or militarisation of science?' Virilio answers by describing what he calls the catastrophes of postmodern technoscience and globalisation, Americanisation, biotechnology, Internet p*rnography and the advertising industry in the most uncompromising terms. Virilio's riposte to the question is already contained in the book's title. This is because, for him, since the end of World War II, the militarisation of science and the construction of two kinds of bomb have overshadowed civilian life. The first is the atom bomb, 'which is capable of using the energy of radioactivity to smash matter'. The second is the information bomb, 'which is capable of using the interactivity of information to wreck the peace between nations'. Virilio delineates the existence of the information bomb, of an explosion of mediated misery around the world, in terms of the deterioration of language and the sheer seductive power of TV and computer screens, the acceleration of history and the emergence of new inter-generational conflicts. Virilio forcefully argues that the advent of the information bomb requires the creation of a new type of social deterrence if nations are to avoid the 'fission' of their 'social cores' as they enter into the uncertain and often shocking world of chronopolitics. For this is a topsy-turvy world where neo-liberalism confronts 'cyberfeminism' and the military-scientific complex contemplates the arrival of 'cyberwar' and 'grey ecology' (the pollution of distances) under the sign of cinematic disinformation from Hollywood and the technological transformation of work through the introduction of mobile phones and 'zero-hour' contracts. Or, as Virilio says at one point in The Information Bomb: in today's 'dromocratic' capitalism, when the biotech corporation calls, 'you come running'. It would, though, be incorrect to view Virilio's political opposition to the uncritical acceptance of technoculture and the explosion of the information bomb as a wholly pessimistic stance on the spread of neo-liberalism in realms such as the multimedia. Virilio's work is, for example, in no way analogous to that of Baudrillard, the intellectual high priest of postmodernism. In truth, Virilio manifestly frames his recent writings in relation to a guarded optimism concerning what I have elsewhere called his 'hypermodern' technocultural theory: a theory involved with the acceleration and dislocation of modern forms of thought about the contemporary world and how it is depicted. It is therefore perfectly plausible to derive from Virilio's dromological texts a scientifically 'uncertain' conception of 'reality' that focusses on the concepts of hypermodernism and 'hypermodernity'. The latter is an idea centred on coming to terms with the speeding-up of historical processes and a critical analysis of modernity based on a political perception of technoculture that is catastrophic. In this way, Virilio typically conceives of the developments he documents in The Information Bomb not as the psychoanalytic problems of progress but as the technoscientific and 'excessive' displacement of them. It is a conceptualisation that is evident in his dromological and dynamic writings on the subject of 'information superhighways' and the 'full range of communications disturbances acquired over the recent centuries of technology'. 'In this field', Virilio says, progress 'acts like a forensic scientist on us' since it violates 'each bodily orifice'. But such 'brutal incursions' do not merely influence individuals; they colonise them. For Virilio, then, progress 'heaps up, accumulates and condenses in each of us the full range of (visual, social, psycho-motor, affective, sexual, etc.) detrital disorders which it has taken on with each innovation, each with their full complement of specific injuries'. All criticism of technology having disappeared, 'we have slid unconsciously from pure technology to techno-culture and, lastly, to the dogmatism of a totalitarian techno-cult...' As can be ascertained from the above examples, Virilio's work sits uneasily with almost all the prevailing paradigms and methodological approaches currently on offer. Chasing a multitude of Foucauldian discontinuities and shape-shifting Deleuzian inflected 'lines of flight' simultaneously, The Information Bomb can thus be seen as a reflection of his self-professed 'anarcho-Christianity'. It is a methodological stance, political perspective and religious position Virilio shares to some extent with the author of The Technological Society (1964), the late Jacques Ellul. Viewed from this angle, Virilio's oppositional and overtly political writings on the 'hypermodern condition' present a comprehensible methodological outlook. It is, however, an outlook that is somewhat at odds with the political and intellectual terrain occupied by 'transpolitical' postmodernists such as Baudrillard, 'poststructuralist anarchists' like Michel Foucault and Gilles Deleuze and the deconstructionist and 'spectral Marxist' Jacques Derrida. Nonetheless, it would be a mistake to imagine that Virilio's rather abstract writings in The Information Bomb opposing the rise of neo-liberalism and the hypermodern condition have not touched a nerve in France. Left-leaning theoreticians and the editors of newspapers such as Le Monde Diplomatique regularly pursue Virilio's forthright opinions in the form of articles and interviews on everything from f*ckuyama's The End of History and the Last Man (1992) to his own thoughts on the end of geography and technoculture. Virilio is therefore a very creative political theorist who articulates himself with equal ease in academic and non-specialist technocultural works. Unlike Foucault, Virilio is the personification of the 'engaged intellectual'. Rather than simply opting for the life of a professor of architecture at the École Speciale d' Architecture, Virilio has always chosen to communicate his ideas to as wide an audience as possible, a strategy that earned him a 'National Award for Criticism' in 1987. Virilio's contemporary writings thus necessarily involve a dromological, political and technocultural encounter with the militarisation of science in the shape of the Internet. Even so, unlike Virilio's earlier texts such as Open Sky (1997), in The Information Bomb Virilio does not merely concentrate his gaze on society's apparent need for speed but, decisively, on its present-day extension into p*rnography and advertising and their integration into the commercialisation of the art world. Describing the 1997 London Royal Academy exhibition entitled 'Sensation' ostensibly held to present young British artists, Virilio suggests that, like many others, in actuality, this exhibition was designed and presented by 'the sex-culture-advertising movement'. This is because the '110 works on display (a portrait of child-murderer Myra Hindley, casts of childlike bodies with mouths replaced by phalluses, etc.) belonged, without exception, to Charles Saatchi, one of Britain's great advertising moguls'. What is at issue here for Virilio is the recognition that, like the need for speed and the example of the Internet, the distinctions between the world of p*rnography, the world of art and the world of advertising have all but been obliterated in the name of nothing more profound than 'breaking down the last taboos'. However, in Virilio's hypermodern conception of the 'terminal arts', a 'confrontation between a tortured body and an automatic camera' not only signifies the coming of the 'sex-culture-advertising-complex' but, equally importantly, the onset of 'endocolonisation' or, what takes place when militarised technoscience colonises the human body with the aim of reducing every member of humanity that has 'had its day' to the status of a 'specimen'. The political critiques provided by Virilio in The Information Bomb are a welcome development. For, today, it is sometimes all too easy to criticise the discipline of cultural studies for its celebration of political, technological and cultural différance without any corresponding recognition of economic and other inequalities founded on class, gender and race. Moreover, Virilio's fervent and occasionally maniacal critique of the art of technology stands out because it stretches from political and technocultural studies to economic and film studies, sometimes in the space of a single paragraph. Taking in Hollywood directors and obvious film productions such as Jan de Bont's Speed as well as the work of French cinematic pioneers like the Lumière brothers', Virilio's The Information Bomb is an important publication. But, unlike numerous other 'cybercultural' tomes, the significance of this book is derived from the fact that it also manages to extend the scope of political and technocultural studies through the provision of often-abstruse pronouncements such as Kafka's claim that the cinema 'involves putting the eye into uniform'. The political critiques provided by Virilio in The Information Bomb are a welcome development. For, today, it is sometimes all too easy to criticise the discipline of cultural studies for its celebration of political, technological and cultural différance without any corresponding recognition of economic and other inequalities founded on class, gender and race. Moreover, Virilio's fervent and occasionally maniacal critique of the art of technology stands out because it stretches from political and technocultural studies to economic and film studies, sometimes in the space of a single paragraph. Taking in Hollywood directors and obvious film productions such as Jan de Bont's Speed as well as the work of French cinematic pioneers like the Lumière brothers', Virilio's The Information Bomb is an important publication. But, unlike numerous other 'cybercultural' tomes, the significance of this book is derived from the fact that it also manages to extend the scope of political and technocultural studies through the provision of often-abstruse pronouncements such as Kafka's claim that the cinema 'involves putting the eye into uniform'. Yet it would be wrong to think that such an individualistic political and technocultural approach cannot be extended beyond Virilio's own anarcho-Christianity or the writings of Ellul. For example, Virilio's The Art of the Motor (1995) has been an important reference point in the recent writings of imaginative Marxists as distinct as Zizek in The Plague of Fantasies (1997) and Gorz in Reclaiming Work: Beyond the Wage-Based Society (1999). It would be difficult to believe that The Information Bomb will not become another significant source in the future works of other creative radicals, offering as it does not only a provisional pathway out of the quicksand of postmodernism but also a way into the sympathies of ordinary people. Firing off political concepts and technocultural neologisms at the speed of light, Virilio's passionately argued texts do not always hit their intended targets. But for anyone seeking a hypermodern critique of the cultural logic of late militarism that ranges from the Internet and the commercialisation of art to endocolonisation and the accident, Virilio's radical political and technocultural theory of speed contained in The Information Bomb is just what you have been waiting for. Citation reference for this article MLA style: John Armitage. "The Uncertainty Principle: Paul Virilio's 'The Information Bomb'." M/C: A Journal of Media and Culture 3.3 (2000). [your date of access] <http://www.api-network.com/mc/0006/virilio.php>. Chicago style: John Armitage, "The Uncertainty Principle: Paul Virilio's 'The Information Bomb'," M/C: A Journal of Media and Culture 3, no. 3 (2000), <http://www.api-network.com/mc/0006/virilio.php> ([your date of access]). APA style: John Armitage. (2000) The uncertainty principle: Paul Virilio's 'The information bomb'. M/C: A Journal of Media and Culture 3(3). <http://www.api-network.com/mc/0006/virilio.php> ([your date of access]).

22

Santos, Djavan Pinheiro, Robélio Leandro Marchão, Ronny Sobreira Barbosa, Juvenal Pereira da Silva Junior, Everaldo Moreira da Silva, Júlio César Azevedo Nóbrega, Cintia Carla Niva, and Glenio Guimarães Santos. "Soil macrofauna associated with cover crops in an Oxisol from the southwest of Piauí state, Brazil." Arquivos do Instituto Biológico 87 (2020). http://dx.doi.org/10.1590/1808-1657000822018.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

ABSTRACT: The soil macrofauna is fundamental for the maintenance of soil quality. The aim of this study was to characterize the soil macrofauna under different species of cover crops, including monoculture or intercropping associated to two types of soil management in the southwest region of Piauí state. The study was carried out in an Oxisol (Latossolo Amarelo, according to Brazilian Soil Classification System) in the municipality of Bom Jesus, Piauí, distributed in 30 m2 plots. Testing and evaluation of the soil macrofauna were conducted in a 9 × 2 strip factorial design, with combinations between cover crops/consortia and soil management (with or without tillage), with four replications. Soil monoliths (0.25 × 0.25 m) were randomly sampled in each plot for macrofauna at 0‒0.1, 0.1‒0.2, and 0.2‒0.3 m depth, including surface litter. After identification and counting of soil organims, the relative density of each taxon in each depth was determined. The total abundance of soil macrofauna quantified under cover crops in the conventional and no-tillage system was 2,408 ind. m-2, distributed in 6 classes, 16 orders, and 31 families. The results of multivariate analysis show that grass species in sole cropping systems and no-tillage presents higher macrofauna density, in particular the taxonomic group Isoptera. No-tillage also provided higher richness of families, where Coleoptera adult were the second more abundant group in no-tillage and Hemiptera in conventional tillage.

23

Caxito, Fabrício de Andrade, YanLucasdeO.PereiraDosSantos, Alexandre Uhlein, Augusto José Pedreira, and FabianoRichardL.Faulstich. "A GEOLOGIA ENTRE MACAÚBAS E CANATIBA (BAHIA) E A EVOLUÇÃO DO SUPERGRUPO ESPINHAÇO NO BRASIL ORIENTAL." Geonomos, February15, 2013. http://dx.doi.org/10.18285/geonomos.v16i1.89.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

The Espinhaço Supergroup cropping out between the cities of Macaúbas and Canatiba, in the northernEspinhaço range, Bahia, is composed by the Pajeú Group (metarhythmites and intermediate to acidmetavolcanics), the Bom Retiro Formation (mature quartzites with metric to decametric cross-bedding), theSão Marcos Group (quartzites with wavy stratification and wave-related cross-bedding, intercalated with micaschists)and the Sítio Novo Group (cross-bedded, conglomeratic and massive quartzites, metarhythmites andmetapelites). The bedrock (gneisses and schists) is tectonically emplaced over the Espinhaço Supergroup inthe eastern portion of the area, and the Espinhaço Supergroup is unconformably covered by the Santo OnofreGroup (graphite-phyllites and metarhythmites) in the western portion of the area. This whole stratigraphicpackage is inverted, allowing, together with relations between bedding and schistosity, to define a largeinverted limb of an assymmetric fold with axis NNW-SSE.In the Veredas Formation, intermediate portion of the Sítio Novo Group, occurs a bed of approximately10 m of deep blue dumortierite-quartzites, used as ornamental rocks. Samples of these rocks have beenanalysed using optic, cathodoluminescence and electronic microscopic techniques, revealing its mineralogicand micromorphologic features.Comparing the stratigraphic and sedimentologic features of the studied area with other outcropping areas ofthe Espinhaço Supergroup, it can be concluded that it has evolved through three sedimentary megacycles,represented on each of the portions of the Espinhaço Range and Diamantina Plateau in the eastern regionof Brazil. The first megacycle involves syn-rift sedimentation, starting at about 1,75 Ga (Statherian Period).The second megacycle involves fundamentally eolian sedimentation. The third megacycle involves mainlyshallow marine to transitional sedimentation, with important tectonic reativation in the northern sector ofthe basin. All megacycles evolded in intracratonic environment..

24

Almeida-Gutierrez,E., P.Garcia-DeLaTorre, A.Acevedo-Melendez, J.Torres-Rosales, A.Pacheco-Lopez, K.Lupercio-Mora, R.C.Garcia-Mendez, G.Borrayo-Sanchez, and G.Saturno-Chiu. "P5347Pulse wave velocity is associated with cognitive impairment in older adults with heart disease." European Heart Journal 40, Supplement_1 (October1, 2019). http://dx.doi.org/10.1093/eurheartj/ehz746.0314.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Abstract Introduction Cognitive impairment is highly frequent in adults older than 50 years as well as classical cardiovascular risk factors which cause vascular and endothelial dysfunction. The vascular etiology of cognitive impairment is well known, but it has been poorly studied the possible association between this cognitive status and the arterial stiffness evaluation in patients with heart disease. Purpose The aim of our study was to evaluate the association between cognitive impairment and vascular function in subjects with heart disease. Methods By an analytic transversal study, we included any sex patients older than 50 years, with known chronic cardiovascular disease (ischemic, valvular or conduction abnormalities). All of them were evaluated by Blessed Orientation-Memory-Concentration (BOMC) Test and Mini Mental State Examination (MMSE) to determine cognitive impairment; all patients underwent vascular function evaluation at same time with Arteriograph device, to determine augmentation index (AI) and aortic pulse wave velocity (PWV). All subjects gave informed consent. Protocol was authorized by ethics and science committee. Quantitative variables are resumed as median (interquartile range) and qualitative variables as absolute and relative frequencies. Mann-Whitney's and χ2 (or Fisher exact) tests were used for association analysis. For potentially confounders variables we use logistic regression; alpha confidence level was 0.05 for all tests. Results One-hundred and seven patients were included; 43 (40.1%) had cognitive impairment (CIm). Age was 76 (71–83) years vs. 64 (59–70) years in the non-cognitive impairment (NCIm), p<0.001; cerebrovascular accident history was more frequent in CIm group [13 (30.2%) vs. 9 (14.0%), p=0.04). Sex, diabetes mellitus, hypertension, current smoke, lipids alteration, body mass index, serum glucose, creatinine, cholesterol, HDL-cholesterol, non-HDL cholesterol, hemoglobin, ischemic, valvular or conduction abnormalities pathology, atrial fibrillation, left atrial enlargement, left ventricle ejection fraction and treatment with statins, antiplatelet or anticoagulants had not significant differences between groups with or without CIm. Pulse wave velocity and In CIm group, the PWV was 9.4 (7.4–11.4) m/s vs. 8.2 (7.2–9.3) m/s, p=0.016; augmentation index showed no significant differences between groups [29 (10–48) vs. 27 (13–47) m/s, p=0.78]. In multivariate analysis, PWV (Odds ratio 1.27, confidence interval 1.15–1.69, p=0.03), and age (Odds ratio 1.19, confidence interval 1.10–1.30, p=0.01), remain as independent predictors of cognitive impairment. Conclusions In older adults with cardiovascular disease, pulse wave velocity and age are associated with cognitive impairment independently of other risk classical risk factors and cardiovascular drugs treatment. Acknowledgement/Funding FOSISS 290480

25

Singh Gulat, Harpreet, Upendra Kumar Gupta, and Ambica Wadhwa. "A DESCRIPTIVE STUDY ON THE RELATIONSHIP BETWEEN BODY MASS INDEX AND BODY POSTURE IN CLINICIANS." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH, June1, 2021, 18–20. http://dx.doi.org/10.36106/ijsr/8700771.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

BACKGROUND : Clinicians in the today's world are always under sustained levels of physical exertion. As they form backbone of healthcare setup, the health of clinicians themselves is a very signicant factor towards providing good health to all. AIMS & OBJECTIVES - The objective of the study was to determine the relation of body mass index (BMI) on both static standing as well as dynamic sitting body posture in clinicians. This will establish a relation between obesity and postural stress of clinicians METHODS: The descriptive study was conducted in OPD clinics of our medical college and various private hospitals of Jalandhar. BMI was calculated as ratio of weight (kg) to the square of height (m). Standing posture was assessed with the help of plumb bob passing the line in lateral and posterior aspect of the body nding the correct (YES) or faulty (NO) posture taken for the calculation. Dynamic (work sitting) posture was checked with observation during the OPD work by using the RULA (Rapid Upper Limb Assessment) worksheet. All the values obtained were statistically analysed with Chi square test to determine association. RESULTS: In high BMI group, three-fourths of the clinicians were found to have faulty standing static posture and 79% had faulty dynamic work posture whereas normal BMI group had minimum faulty posture. Female clinicians showed more level of faulty posture than male clinicians. The results also show that with increase in BMI, faulty posture also takes a higher turn. CONCLUSION: BMI is positively related to postural stress in clinicians, especially in the higher age group. This information serves as an awareness and warning signal for the clinicians to safeguard their own health and correct their faulty posture

26

Scholfield, Simon Astley. "How Funny?" M/C Journal 2, no.3 (May1, 1999). http://dx.doi.org/10.5204/mcj.1753.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Images of anal flesh have been flashed on Australian television in the popular animated American 'kidult' cartoon series, Ren and Stimpy (1991-95) and South Park (1997-). Ren and Stimpy relates the tales of two male human-voiced animals: Ren, a skinny hyperactive chihuahua, and Stimpy, his stupid fat cat friend. The "Son of Stimpy" and "Blazing Entrails" episodes of the series contain landmark references to the anus which have informed the broader range of representations of the orifice in the South Park series. South Park explores the lives of four pre-pubescent Colorado schoolboys -- Stan, Kyle, Cartman and Kenny. Commentary about the excessive depictions of violence and viscera in these masculinist comedy cartoons has avoided analysis of their representations of anal flesh. How have ani been represented in these popular cultural productions? "Son Of Stimpy" pioneered with a narrative of male anal birth. At Christmas, Stimpy passes his first fart. His bare buttocks gurgle and a fart cloud rises and disappears. Stimpy's anus is not visually (re)presented. His attempts to produce another fart fail. Stimpy and "Stinky" search desperately for each other. Stinky, the personified fart, resembles a wrinkled hybrid of Casper The Friendly Ghost and Tweety Bird. Appearing outside the closed window of Ren and Stimpy's bedroom, Stinky ogles the sleeping Stimpy's unreachable buttocks. "Oh why did I leave home? I'll never find a home as warm and snuggly as the one I left", he reflects on Stimpy's anus. Father and son eventually meet, the adult Stinky marries a rotting dead codfish, and the newly-weds then live in Ren's nostrils. As probably the most conspicuously hom*oerotic televised cartoon, "Son of Stimpy" also shows Ren flirtatiously snuggling up to Stimpy under some mistletoe, the pair sharing a bed, and reminiscences about their nuptials. Thus, the unavoidable thrust of this play is that Stinky-the-fart (the son) was farted (born) through the anus of Stimpy (the male mother) after sodomitical penetration by Ren (Stinky's father). Moreover, Stimpy's search for his fart-child and Ren's relishing of Stinky's smell provide a clear metaphor for Ren and Stimpy's continuing desire for more fun, fart-producing, "gay", an(im)al sex. Although Stimpy's anus and Ren's penis are not depicted, the fleshy intercourse between them (that produced the cherished Stinky) can hardly be ignored in the imagination of the viewer. "Blazing Entrails" includes a groundbreaking image of inner male anal flesh. The title refers to Blazing Saddles with its famous comedy scene involving bean-eating, farting cowboys. The plot loosely reworks that of Fantastic Voyage, with Ren taking a crazed Stimpy to see a scientist who inflates him into a giant. Ren then travels through Stimpy's (unseen) anal sphincter (in a significant departure from the plot of Voyage). Ren is shown reading The Bowel Daily News on a speeding subway train that travels along the giant Stimpy's rectum. After this close-up depiction of Ren's (total body) penetration of Stimpy's anal canal, Ren travels via various vital organs to Stimpy's brain, which he shatters. Stimpy soon recovers. The fundamental thrust is that Ren 'f*cks Stimpy brainless' through his anus for another mutually happy ending. The South Park series (Parker and Stone) also contains spectacular depictions of anal birth, a personified anal product, and anal sex between male animals. However, none lead to consensual hom*oerotic ecstasy. In "Cartman Gets an Anal Probe", which spoofs Communion, Cartman is raped in his sleep by male space aliens who penetrate his anus with a probe. Thus 'impregnated', he experiences immense pain (and ridicule), until his blazing anus delivers an enormous satellite dish. Instead of Stinky-the-fart, South Park features the more 'fleshy' Mr Hankey, a non-denominational talking Christmas turd that resembles Mr Potato Head. "Big Gay Al's Gay Boat Ride" contains the only reference to 'gay' male sex in the series. Sparky, a stray "gay hom*osexual" dog mounts another male canine before anally raping yet another. The anus is not depicted in these scenes. Anything but eroticised, the unexposed human male anus is valorised in South Park as an arsenal of multiple farts which are either deployed as weapons against male enemies, or shared between male friends as penultimate acts of affection and sacrifice. In "Not without My Anus", Terrance and Phillip organise a stadium full of Canadians to don gasmasks and fart on cue, thus generating an enormous cloud of gas that kills Saddam Hussein. In "Chicken Pox", Phillip worries that he "won't be able to fart anymore", due to his anal cancer. After he and Terrance appear in surgery with their buttocks and heads (but not ani) exposed, the two men literally 'bond' through an (unseen) "anal transplant". Terrance donates half his anus to Phillip, who happily farts again after the successful operation. The "Cow Days" episode of South Park includes close-up images depicting the outside and inside of an anus. The Chamber of Farts sideshow ride first appears from the outside as a giant pair of pink body-less buttocks, decorated with a vampire bat, spider and cobwebs. After buying tickets, the schoolboys take the traincar ride into the Chamber through the front door -- a giant asterisk which designates the anal sphincter. Inside, the boys pass clothed male dummies (one with a bare front bottom) and a farting black oval anus. They exit through a back door between the spread legs of a farting clothed female dummy. This arrangement codes the anal chamber as female (or feminised), with the rear door configured as a 'puss*-farting' vagin*, or (to borrow a gay term for the male anus), as 'backpuss*'. Therein, the confusing boys-in-the-train-in-the-haunted-Chamber-of-Farts scenario seemingly expresses heterosexual male anxieties about engaging in (paid group) penetration of a female anus, because the act too readily evokes visions of the beastly queer male things gay men and Sparky do with (their or other) male ani. Eve Sedgwick has stressed that "there has been no important and sustained [modern] Western discourse in which women's anal eroticism means anything" (129). In the form of the Chamber of Farts, the eroticised female anus has been conflated by hysterical heterosexual males to mean something horrific. There are few other farting females in these cartoons. In the "Powdered Toast Man with Vitamin 'F'" segment of Ren and Stimpy, a girl and boy fart after eating Powdered Toast. An empowering image of an exploding atomic bomb is superimposed only over the fart-inflated pants of the girl. In South Park's "Not Without My Anus", Terrance's baby daughter farts once, but only to establish her resemblance to her father. Women contribute only in long shot to the fart cloud that kills Saddam Hussein. While the female anus is demeaned in South Park, other female flesh is overwhelmingly cast as terrifying. Barbara Creed has demonstrated that classic horror films feature seven female archetypes (archaic mother, monstrous womb, vampire, witch, possessed body, monstrous mother and castrator) that express male fears of the mythical vagin* dentata. Versions of these 'monstrous-feminine' figures in South Park include the Conjoined Fetus Lady; Frieda (the herpes-spreading prostitute); Cartman's highly-sexed hermaphrodite-born mother; Aunt Flo (the red-haired "monthly visitor" who personifies menstruation and gives away a serial killer fish), Barbra Streisand's "spooky" face; Wendy and Ms Crabtree (with their gnashing teeth); and Stan's mother with her herpes-infected genitalia. While male genitals are celebrated in South Park, the anus is configured as the most grotesque zone of male flesh, sometimes through misogynist references. The penis and "chocolate salty balls" of the black man, Chef, are praised through descriptive (heterosexual) innuendo. One father's insult to another, "I wasn't born with a silver enema up my ass", exploits the experiences of birthing women who have received enemas. In Ren and Stimpy, on the other hand, horrific (hairy, muscled, excretive, male) flesh belongs to hyper-masculine bodies, and sex organs other than male genitalia are celebrated. The joyous anal birth of Stinky mimics, yet edifies, non-vagin*l birth. Stinky-the-fart and his female codfish wife celebrate the joining of the odours of anal and vagin*l flesh, which they respectively incarnate. Key episodes of Ren and Stimpy provided the seminal subversive representations of ani in the history of televised animated cartoons. In "Son of Stimpy" and "Blazing Entrails", the meta(eu)phoric valorisation of the creativity of gay anal eroticism, org*smic farting, and gay fatherhood (through metadiegetic narratives of inter-male conception and anal birth) challenges the dominant hom*ophobic culture which demonises the (anal) sexuality of gay men and denies them access to reproductive technologies and families. Ren and Stimpy also pioneered with a skit celebrating the farting power of the female anus. In South Park, these subversive themes have been twisted into misogynist and hom*ophobic contexts. Perhaps the anal transplant innovatively satirises the seriousness of rectal (bowel, colon, and prostate) cancers. However, this scenario is overshadowed by the show's gynophobic grotesquerie of female flesh, exemplified by the disturbing graphic imag(in)ing of the sexualised farting female anus as a chamber of horrors. The representation of collective killer ani and inter-male (human and animal) anal rape as comedy, is also disturbing. There are no references to fleshy practices -- such as anal masturbation, pleasurable inter-male or inter-female human anal eroticism, or female penetrations of male ani -- which could upset the hetero-masculinist hom*osocial phallologocentric order. How sad. References Blazing Entrails." Dir. Bob Camp. Ren and Stimpy 4.43 (1994).Nickelodeon. The Ren and Stimpy Prime Time Show. TVQ10, Brisbane. 9 April 1995. Blazing Saddles. Dir. Mel Brooks. Warner Bros., 1974. Communion. Dir. Philippe Mora. Allied Vision, 1989. Creed, Barbara. The Monstrous~Feminine: Film, Feminism, Psychoanalysis. London: Routledge, 1993. Fantastic Voyage. Dir. Richard Fleischer. 20th Century Fox, 1966. "Powdered Toast man with Vitamin 'F'." Dir. John Kricfalusi. Ren and Stimpy 3.27 (1993). Nickelodeon. Big Breakfast. TVQ10, Brisbane. 14 May 1994. "Son of Stimpy." Dir. John Kricfalusi. Ren and Stimpy 2.19 (1992). Nickelodeon. The Ren and Stimpy Prime Time Show. TVQ10, Brisbane. 1995. Parker, Trey, and Matt Stone, dirs. "Big Gay Al's Big Gay Boat Ride." South Park 1.4 (1997). Comedy Partners/Celluloid Studios, U.S.A. SBS, Brisbane. 19 Oct. 1998. ---, dirs. "Cartman Gets an Anal Probe." South Park 1.1 (1997). SBS, Brisbane. 28 Sept. 1998. ---, dirs. "Chicken Pox." South Park 2.10 (1998). SBS, Brisbane. 12 Oct. 1998. ---, dirs. "Cowdays." South Park 2.13 (1998). SBS, Brisbane. 23 Nov. 1998. ---, dirs. "Mr Hankey." South Park 1.10 (1997). SBS, Brisbane. 5 Oct. 1998. ---, dirs. "Not Without My Anus." South Park 2.01 (1998). SBS, Brisbane. 31 Aug. 1998. Sedgwick, Eve K. "A Poem Is Being Written." Representations 17 (1987): 110-143. Citation reference for this article MLA style: Simon-Astley Scholfield. "How Funny?: Spectacular Ani in Animated Television Cartoons." M/C: A Journal of Media and Culture 2.3 (1999). [your date of access] <http://www.uq.edu.au/mc/9905/funny.php>. Chicago style: Simon-Astley Scholfield, "How Funny?: Spectacular Ani in Animated Television Cartoons," M/C: A Journal of Media and Culture 2, no. 3 (1999), <http://www.uq.edu.au/mc/9905/funny.php> ([your date of access]). APA style: Simon-Astley Scholfield. (1999) How funny?: spectacular ani in animated television cartoons. M/C: A Journal of Media and Culture 2(3). <http://www.uq.edu.au/mc/9905/funny.php> ([your date of access]).

27

Piper, Melanie. "Blood on Boylston: Digital Memory and the Dramatisation of Recent History in Patriots Day." M/C Journal 20, no.5 (October13, 2017). http://dx.doi.org/10.5204/mcj.1288.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

IntroductionWhen I saw Patriots Day (Berg 2016) at my local multiplex, a family entered the theatre and sat a few rows in front of me. They had a child with them, a boy who was perhaps nine or ten years old. Upon seeing the kid, I had a physical reaction. Not quite a knee-jerk, but more of an uneasy gut punch. ‘Don't you know what this movie is about?’ I wanted to ask his parents; ‘I’ve seen Jeff Bauman’s bones, and that is not something a child should see.’ I had lived through the 2013 Boston Marathon bombing and subsequent manhunt, and the memories were vivid in my mind as I waited for the movie to start, to re-present the memory on screen. Admittedly, I had lived through it from the other side of the world, watching through the mediated windows of the computer, smartphone, and television screen. Nevertheless, I remembered it in blood-soaked colour detail, brought to me by online photo galleries, social media updates, the failed amateur sleuths of Reddit, and constant cable news updates, breaking news even when the events had temporarily stalled. Alison Landsberg has coined the term “prosthetic memory” to describe how historical events are re-created and imbued with an affective experience through cinema and other sites of mass cultural mediation, allowing those who did not experience the past to form a personal connection to and subjective memory of history (2). For the boy in the cinema, Patriots Day would most likely be his first encounter with and memory of the Boston Marathon bombing. But how does prosthetic memory apply to audience members like me, who had lived through the Boston bombing from a great distance, with personalised memories mediated by the first-person perspective of social media? Does the ease of dissemination of information, particularly eyewitness photographs and videos, create possibilities for a prosthetic experience of the present? Does the online mediation of historical events of the present translate to screen dramatisations? These questions become particularly pertinent when the first-release audience of a film has recent, living memories of the real events depicted on screen.The time between when an event occurs and when it is brought to cinemas in a true-events adaptation is decreasing. Rebecca A. Sheehan argues that the cultural value of instant information has given rise to a trend in the contemporary biopic and historical film that sees our mediated world turned into a temporal "paradox in which the present is figured as both historical and ongoing" (36). Since 2005, Sheehan writes, biographical films that depict the lives of still-living public figures or in other ways comment on the ongoing history of the present have become increasingly frequent. Sheehan cites films such as The Social Network (Fincher 2010), The Queen (Frears 2006), W. (Stone 2008), and Game Change (Roach 2012) as examples of this growing biopic trend (35-36). In addition to the instantaneous remediation of public figures in the contemporary biopic, similarly there is a stable of contemporary historical films based on the true stories of ordinary people involved in extraordinary recent events. Films such as The Impossible (Bayona 2012), World Trade Center (Stone 2006), United 93 (Greengrass 2006), and Deepwater Horizon (Berg 2016) bring the death and destruction of real-world natural disasters or terrorist attacks to a sanitised but experiential cinematic event. The sensitive nature of some of the events in question often see the films labelled “too soon” and exploitative of recent tragedy. Films such as these typically do not have known public figures as their protagonists, but they arise from a similar climate of the demands of televisual and online mediation that Sheehan describes in the “instant biopics” of her study (36). Given this rise of brief temporal space between real events and their dramatisations, in this essay, I examine Patriots Day in light of the role digital experience plays in both its dramatisation and how the film's initial audience may remember the event. As Patriots Day replicates a kind of prosthetic memory of the present, it uses the first-instance digital mediation of the event to form prosthetic memories for future viewers. Through Patriots Day, I seek to gesture toward the possibilities of first-person digital mediation of major news events in shaping dramatisations of the recent past.Digital Memories of the Boston Marathon BombingTo examine the ways the Boston Marathon bombing circulated in online space, I look at the link- and image-based online discussion platform Reddit as an example of engagement with and recirculation of the event, particularly as a form of engagement defined by photographs and videos. Because the Boston Marathon is a televised and widely-reported event, professional videographers and photographers were present at the marathon’s finish line at the time of the first explosion. Thus, the first bomb and its immediate aftermath were captured in news footage and still images. The graphic nature of some of these images depicting the violence of the scene saw traditional print and television outlets cropping or otherwise editing the photographs to make them appropriate for mass broadcast (Hughney). Some online outlets, however, showed these pictures in their unedited form, often accompanied by warnings that required readers to scroll further down the page or click through the warning to see the photographs. These distinctive capabilities of the online environment allowed individuals to choose whether to view the image, while still allowing the uncensored image to circulate and be reposted elsewhere, such as on Reddit. In addition to photos and videos shot by professionals at the finish line, witnesses armed with smart phone cameras and access to social media posted their views of the aftermath to social media like Twitter, enabling the collation of both amateur and professionally shot photographs of the scene by online news aggregators such as Buzzfeed (Broderick). The Reddit community is seen as an essential part of the Boston Bombing story for the way some of its users participated in a form of ‘crowd-sourced’ investigation that resulted in the false identification of suspects (see: Nhan et al.; Tapia et al.; Potts and Harrison). There is another aspect to Reddit’s role in the circulation and mediation of the story, however, as online venues became a go-to source for news on the unfolding event, where information was delivered faster and with greater accuracy than the often-sensationalised television news coverage (Starbird et al. 347). In addition to its role in providing information that is a part of Reddit’s culture that “value[s] evidence of some kind” to support discussion (Potts and Harrison 144), Reddit played a number of roles in the sense-making process that social media can often facilitate during crisis situations (Heverin and Zach). Through its division into “subreddits,” the individual communities and discussion areas that make up the platform, Reddit accommodates an incredibly diverse range of topics and interests. Different areas of Reddit were able to play different roles in the process of sharing information and acting in a community sense-making capacity in the aftermath of the bombing. Among the subreddits involved in attempting to make sense of the event were those that served as appropriate places for posting image galleries of both professional and amateur photographs and videos, drawn from a variety of online sources. Users of subreddits such as /r/WTF and /r/MorbidReality, for example, posted galleries of “NSFL” (Not Safe For Life) images of the bombing and its aftermath (see: touhou_hijack, titan059, f00d4tehg0dz). Additionally, the /r/Boston subreddit issued calls for anyone with photographs or videos related to the attack to upload them to the thread, as well as providing an e-mail address to submit them to the FBI (RichardHerold). The /r/FindBostonBombers subreddit became a hub for analysis of the photographs. The subreddit's investigatory work was picked up by other online and traditional media outlets (including the New York Post cover photo which misidentified two suspects), bringing wider attention to Reddit’s unfolding coverage of the bombing (Potts and Harrison 148). Landsberg’s theory of prosthetic memory, and her application of it, largely relates to mass culture’s role in “the production and dissemination of memories that have no direct connection to a person’s lived past” (20). The possibilities for news events to be recorded and disseminated by smart phones and social media, however, help to create a deeper sense of affective engagement with a distant present, creating prosthetic memories out of the mediated first-hand experiences of others. The graphic nature of the photos and videos of the Boston bombing collected by and shared on sites like Reddit, the ongoing nature of the event (which, from detonation to the capture of Dzokhar Tsarnaev, spanned five days), and the participatory activity of scouring photographs for clues to the identity of the bombers all lend a sense of ongoing, experiential engagement with first-person, audiovisual mediations of the event. These prosthetic memories of the present are, as Landsberg writes of those created from dramatisations or re-creations of the past, transferable, able to belong to those who have no “natural” claim to them (18) with an experiential element that personalises history for those who do not directly experience it (33). If widely disseminated first-person mediations of events like the Boston bombing can be thought of as a prosthetic experience of present history, how will they play a part in the prosthetic memories of the future? How will those who did not live through the Boston bombing, either as a personal experience or a digitally mediated one, incorporate this digital memory into their own experience of its cinematic re-creation? To address this question, I turn to consider Patriots Day. Of particular note is the bombing sequence’s resemblance to digital mediations of the event as a marker of a plausible docudramatic resemblance to reality.The Docudramatic Re-Presentation of Digital MemoryAs a cinematic representation of recent history, Patriots Day sits at a somewhat uncomfortable intersection of fact and fiction, of docudrama and popcorn action movie, more so than an instant history film typically would. Composite characters or entirely invented characters and narratives that play out against the backdrop of real events are nothing out of the ordinary in the historical film. However, Patriots Day's use of real material and that of pure invention coincides, frequently in stark contrast. The film's protagonist, Boston Police Sergeant Tommy Saunders (played by Mark Wahlberg) is a fictional character, the improbable hero of the story who is present at every step of the attack and the manhunt. He is there on Boylston Street when the bombs go off. He is there with the FBI, helping to identify the suspects with knowledge of Boylston Street security cameras that borders on a supernatural power. He is there at the Watertown shootout among exploding cars and one-liner quips. When Dzokhar Tsarnaev is finally located, he is, of course, first on the scene. Tommy Saunders, as embodied by Wahlberg, trades on all the connotations of both the stereotypical Boston Southie and the action hero that are embedded in Wahlberg’s star persona. As a result, Patriots Day often seems to be a depiction of an alternate universe where Mark Wahlberg in a cop uniform almost single-handedly caught a terrorist. The improbability of Saunders as a character in a true-events drama, though, is thoroughly couched in the docudramatic material of historical depiction. Steven N. Lipkin argues that docudrama is a mode of representation that performs a re-creation of memory to persuade us that it is representing the real (1). By conjuring the memory of an event into being in ways that seem plausible and anchored to the evidence of actuality—such as integrating archival footage or an indexical resemblance to the actual event or an actual person—the representational, cinematic, or fictionalised elements of docudrama are imbued with a sense of the reality they claim to represent (Lipkin 3). Patriots Day uses real visual material throughout the film. The integration of evidence is particularly notable in the bombing sequence, which combines archival footage of the 2013 race, surveillance footage of the Tsarnaev brothers approaching the finish line, and a dramatic re-creation that visually resembles the original to such an extent that its integration with archival footage is almost seamless (Landler). The conclusion of the film draws on this evidential connection to the real as well, in the way that docudrama is momentarily suspended to become documentary, as interviews with some of the real people who are depicted as characters in the film close out the story. In addition to its direct use of the actual, Patriots Day's re-creation of the bombing itself bears an indexical resemblance to the event as seen by those who were not there and relies on memories of the bombing's initial mediation to vouch for the dramatisation's accuracy. In the moments before the bombing's re-creation, actual footage of the Tsarnaevs's route down Boylston Street plays, a low ominous tone of the score building over the silent security footage. The fictional Saunders’s fictional wife (Michelle Monaghan) has come to the finish line to bring him a knee brace, and she passes Tamerlan Tsarnaev as she leaves. This shot directly crosses a visual resemblance to the actual (Themo Melikidze playing Tsarnaev, resembling the bomber through physicality and costuming) with the fictional structuring device of the film in the form of Tommy Saunders. Next, in a long shot, we see Tsarnaev bump into a man wearing a grey raglan shirt. The man turns to look at Tsarnaev. From the costuming, it is evident that this man who is not otherwise named is intended to represent Jeff Bauman, the subject of an iconic photograph from the bombing. In the photo, Bauman is shown being taken from the scene in a wheelchair with both legs amputated from below the knee by the blast (another cinematic dramatisation of the Boston bombing, Stronger, based on Bauman’s memoir of the same name, will be released in 2017). In addition to the visual signifier of Bauman from the memorable photograph, reports circulated that Bauman's ability to describe Tsarnaev to the FBI in the immediate aftermath of the bombing was instrumental in identifying the suspects (Hartmann). Here, this digital memory is re-created in a brief but recognisable moment: this is the before picture of Jeff Bauman, this is the moment of identification that was widely circulated and talked about, a memory of that one piece of good news that helped satisfy public curiosity about the status of the iconic Man in the Wheelchair.When the bombs detonate, we are brought into the smoke and ash, closer access than the original mediation afforded by the videographers at the finish line. After the first bomb detonates, the camera follows Saunders as he walks toward the smoke cloud. As the second bomb explodes, we go inside the scene. The sequence cuts from actual security camera footage that captured the blast, to a first-person perspective of the explosion, the resulting fire and smoke, and a shot that resembles the point of view of footage captured on a smart phone. The frame shakes wildly, giving the viewer disorienting flashes of the victims, a sense of the chaos without seeing anything in lasting, specific detail, before the frame tips sideways onto the pavement, stained with blood and littered with debris. Coupled with this is a soundscape that resembles both the subjective experience of a bombing victim and what their smart phone video has captured. There is the rumble of the explosion and muffled sounds of debris hidden under the noise of shockwaves of air hitting a microphone, fading into an electronic whine and tinnitus ring. A later shot shows the frame obscured by smoke, slowly clearing to give us a high angle view of the aftermath, resembling photographs taken from a window overlooking the scene on Boylston Street (see: touhou_hijack). Archival footage of first responders and points of view resembling a running cell phone camera that captures flashes of blood and open wounds combine with shots of the actors playing characters (both fictional and based on real people) that were established at the beginning of the film. There is once again a merging of the re-created and the actual, bound together by a sense of memory that encourages the viewer to take the former as plausible, based on its resemblance to the latter.When Saunders runs for the second bombing site further down the street, he looks down at two bodies on the ground. Framed in close-up, the bloodless, empty expression and bright blue shirt of Krystle Campbell are recognisable. We can ignore the inaccuracies of this element of the digital memory amidst the chaos of the sequence. Campbell died in the first bombing, not the second. The body of a woman in a black shirt is between the camera's position on the re-created Boylston Street and the actor standing in for Campbell, the opposite of how Campbell and her friend Karen Rand lay beside each other in photographs of the bombing aftermath. The police officer who takes Krystle's pulse on film and shakes her head at Wahlberg's character is a brunette, not the blonde in the widely-circulated picture of a first responder at the actual bombing. The most visceral portion of the image is there, though, re-created almost exactly as it appeared at its first point of mediation: the lifeless eyes and gaping mouth, the bright blue t-shirt. The memory of the event is conjured into being, and the cinematic image resembles the most salient elements of the memory enough for the cinematic image to be a plausible re-creation. The cinematic frame is positioned at a lower level to the original still, as though we are on the ground beside her, bringing the viewer even closer to the event, even as the frame crops out her injuries as scene photographs did not, granting a semblance of respectful distance from the real death. This re-creation of Krystle Campbell’s death is a brief flash in the sequence, but a powerful moment of recognition for those who remember its original mediation. The result is a sequence that shows the graphic violence of the actuality it represents in a series of images that invite its viewer to expand the sequence with their memory of the event the way most of them experienced it: on other screens, at the site of its first instance of digital mediation.ConclusionThrough its use of cinematography that resembles actual photographic evidence of the Boston Marathon bombing or imbues the re-creation with a sense of a first-person, digitally mediated account of the event, Patriots Day draws on its audience's digital memory of recent history to claim accuracy in its fictionalisation. Not everyone who sees Patriots Day may be as familiar with the wealth of eyewitness photographs and images of the Boston Marathon bombing as those who may have experienced and followed the events in online venues such as Reddit. Nonetheless, the fact of this material's existence shapes the event's dramatisation as the filmmakers attempt to imbue the dramatisation with a sense of accuracy and fidelity to the event. The influence of digital memory on the film’s representation of the event gestures toward the possibilities for how online engagement with major news events may play a role in their dramatisation moving forward. Events that have had eyewitness visual accounts distributed online, such as the 2015 Bataclan massacre, the 2016 Pulse nightclub shooting, the 2017 Manchester Arena bombing and Westminster Bridge attack, or the 2016 police shooting of Philando Castile that was streamed on Facebook live, may become the subject of future dramatisations of recent history. The dramatic renderings of contemporary history films will undoubtedly be shaped by the recent memory of their online mediations to appeal to a sense of accuracy in the viewer's memory. As recent history films continue, digital memories of the present will help make the prosthetic memories of the future. ReferencesBroderick, Ryan. “Photos from the Scene of the Boston Marathon Explosion (Extremely Graphic).” Buzzfeed News, 16 Apr. 2013. 2 Aug. 2017 <https://www.buzzfeed.com/ryanhatesthis/first-photos-from-the-scene-of-the-boston-marathon-explosion?utm_term=.fw38Byjq1#.peNXWPe8G>.f00d4tehg0dz. “Collection of Photos from the Boston Marathon Bombing (NSFW) (NSFL-Gore).” Reddit, 16 Apr. 2013. 8 Aug. 2017 <https://www.reddit.com/r/WTF/comments/1cfhg4/collection_of_photos_from_the_boston_marathon/>.Hartmann, Margaret. “Bombing Victim in Iconic Photo Was Key to Identifying Boston Suspects.” New York Magazine, 18 Apr. 2013. 8 Aug. 2017 <http://nymag.com/daily/intelligencer/2013/04/bombing-victim-identified-suspects.html>.Heverin, Thomas, and Lisl Zach. “Use of Microblogging for Collective Sense-Making during Violent Crises: A Study of Three Campus Shootings.” Journal of the American Society for Information Science and Technology 63.1 (2012): 34-47. Hughney, Christine. “News Media Weigh Use of Photos of Carnage.” New York Times, 17 Apr. 2013. 2 Aug. 2017 <http://www.nytimes.com/2013/04/18/business/media/news-media-weigh-use-of-photos-of-carnage.html>.Landler, Edward. “Recreating the Boston Marathon Bombing in Patriots Day.” Cinemontage, 21 Dec. 2016. 8 Aug. 2017 <http://cinemontage.org/2016/12/recreating-boston-marathon-bombing-patriots-day/>.Landsberg, Alison. Prosthetic Memory: The Transformation of American Remembrance in the Age of Mass Culture. New York: Columbia U P, 2004. Lipkin, Steven N. Docudrama Performs the Past: Arenas of Argument in Films Based on True Stories. Newcastle upon Tyne: Cambridge Scholars, 2011. Nhan, Johnny, Laura Huey, and Ryan Broll. “Digilantism: An Analysis of Crowdsourcing and the Boston Marathon Bombing.” British Journal of Criminology 57 (2017): 341-361. Patriots Day. Dir. Peter Berg. CBS Films, 2016.Potts, Liza, and Angela Harrison. “Interfaces as Rhetorical Constructions. Reddit and 4chan during the Boston Marathon Bombings.” Proceedings of the 31st ACM International Conference on Design of Communication. Greenville, North Carolina, September-October 2013. 143-150. RichardHerold. “2013 Boston Marathon Attacks: Please Upload Any Photos in Relation to the Attacks That You Have.” Reddit, 15 Apr. 2013. 8 Aug. 2017 <https://www.reddit.com/r/boston/comments/1cf5wp/2013_boston_marathon_attacks_please_upload_any/>.Sheehan, Rebecca A. “Facebooking the Present: The Biopic and Cultural Instantaneity.” The Biopic in Contemporary Film Culture. Eds. Tom Brown and Bélen Vidal. New York: Routledge, 2014. 35-51. Starbird, Kate, Jim Maddock, Mania Orand, Peg Achterman, and Robert M. Mason. “Rumors, False Flags, and Digital Vigilantes: Misinformation on Twitter after the 2013 Boston Marathon Bombing.” iConference 2014 Proceedings. Berlin, March 2014. 654-662. Tapia, Andrea H., Nicolas LaLone, and Hyun-Woo Kim. “Run Amok: Group Crowd Participation in Identifying the Bomb and Bomber from the Boston Marathon Bombing.” Proceedings of the 11th International ISCRAM Conference. Eds. S.R. Hiltz, M.S. Pfaff, L. Plotnick, and P.C. Shih. University Park, Pennsylvania, May 2014. 265-274. titan059. “Pics from Boston Bombing NSFL.” Reddit, 15 Apr. 2013. 8 Aug. 2017 <https://www.reddit.com/r/WTF/comments/1cf0po/pics_from_boston_bombing_nsfl/>.touhou_hijack. “Krystle Campbell Died Screaming. This Sequence of Photos Shows Her Final Moments.” Reddit, 18 Apr. 2013. 8 Aug. 2017 <https://www.reddit.com/r/MorbidReality/comments/1cktrx/krystle_campbell_died_screaming_this_sequence_of/>.

28

Kabir, Nahid. "Depiction of Muslims in Selected Australian Media." M/C Journal 9, no.4 (September1, 2006). http://dx.doi.org/10.5204/mcj.2642.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Give me the liberty to know, to utter, and to argue freely according to conscience, above all liberties. —John Milton (1608-1674) Introduction The publication of 12 cartoons depicting images of Prophet Mohammed [Peace Be Upon Him] first in Denmark’s Jyllands-Posten on 30 September 2005, and later reprinted in European media and two New Zealand newspapers, sparked protests around the Muslim world. The Australian newspapers – with the exception of The Courier-Mail, which published one cartoon – refrained from reprinting the cartoons, acknowledging that depictions of the Prophet are regarded as “blasphemous by Muslims”. How is this apparent act of restraint to be assessed? Edward Said, in his book Covering Islam has acknowledged that there have been many Muslim provocations and troubling incidents by Islamic countries such as Iran, Libya, Sudan, and others in the 1980s. However, he contends that the use of the label “Islam” by non-Muslim commentators, either to explain or indiscriminately condemn “Islam”, ends up becoming a form of attack, which in turn provokes more hostility (xv-xvi). This article examines how two Australian newspapers – The Australian and The West Australian – handled the debate on the Prophet Muhammad cartoons and considers whether in the name of “free speech” it ended in “a form of attack” on Australian Muslims. It also considers the media’s treatment of Muslim Australians’ “free speech” on previous occasions. This article is drawn from the oral testimonies of Muslims of diverse ethnic background. Since 1998, as part of PhD and post-doctoral research on Muslims in Australia, the author conducted 130 face-to-face, in-depth, taped interviews of Muslims, aged 18-90, both male and female. While speaking about their settlement experience, several interviewees made unsolicited remarks about Western/Australian media, all of them making the point that Muslims were being demonised. Australian Muslims Many of Australia’s 281,578 Muslims — 1.5 per cent of the total population (Australian Bureau of Statistics) — believe that as a result of media bias, they are vilified in society as “terrorists”, and discriminated in the workplace (Human Rights and Equal Opportunity Commission; Dreher 13; Kabir 266-277). The ABS figures support their claim of discrimination in the workplace; in 1996 the unemployment rate for Muslim Australians was 25 per cent, compared to 9 per cent for the national total. In 2001, it was reduced to 18.5 per cent, compared to 6.8 per cent for the national total, but the ratio of underprivileged positions in the labour market remained almost three times higher than for the wider community. Instead of reflecting on Muslims’ labour market issues or highlighting the social issues confronting Muslims since 9/11, some Australian media, in the name of “free speech”, reinforce negative perceptions of Muslims through images, cartoons and headlines. In 2004, one Muslim informant offered their perceptions of Australian media: I think the Australian media are quite prejudiced, and they only do show one side of the story, which is quite pro-Bush, pro-Howard, pro-war. Probably the least prejudiced media would be ABC or SBS, but the most pro-Jewish, pro-America, would be Channel Seven, Channel Nine, Channel Ten. They only ever show things from one side of the story. This article considers the validity of the Muslim interviewee’s perception that Australian media representation is one-sided. On 26 October 2005, under the headline: “Draw a Cartoon about Mohammed and You Must Die”, The Australian warned its readers: ISLAM is no laughing matter. Danish newspaper, Jyllands-Posten, is being protected by security guards and several cartoonists have gone into hiding after the newspaper published a series of 12 cartoons about the prophet Mohammed. According to Islam, it is blasphemous to make images of the prophet. Muslim fundamentalists have threatened to bomb the paper’s offices and kill the cartoonists (17). Militant Muslims The most provocative cartoons appearing in the Danish media are probably those showing a Muhammad-like figure wearing a turban shaped as a bomb with a burning fuse coming out of it, or a queue of smoking suicide bombers on a cloud with an Islamic cleric saying, “Stop stop we have run out of virgins”. Another showed a blindfolded Muslim man with two veiled Muslim women standing behind him. These messages appeared to be concerned with Islam’s repression of women (Jyllands-Posten), and possibly with the American channel CBS airing an interview in August 2001 of a Palestinian Hamas activist, Muhammad Abu Wardeh, who recruited terrorists for suicide bombings in Israel. Abu Wardeh was quoted as saying: “I described to him [the suicide bomber] how God would compensate the martyr for sacrificing his life for his land. If you become a martyr, God will give you 70 virgins, 70 wives and everlasting happiness” (The Guardian). Perhaps to serve their goals, the militants have re-interpreted the verses of the Holy Quran (Sura 44:51-54; 55:56) where it is said that Muslims who perform good deeds will be blessed by the huris or “pure being” (Ali 1290-1291; 1404). However, since 9/11, it is also clear that the Muslim militant groups such as the Al-Qaeda have become the “new enemy” of the West. They have used religion to justify the terrorist acts and suicide bombings that have impacted on Western interests in New York, Washington, Bali, Madrid amongst other places. But it should be noted that there are Muslim critics, such as Pakistani-born writer, Irshad Manji, Bangladeshi-born writer Taslima Nasreen and Somalian-born Dutch parliamentarian Ayaan Hirsi Ali, who have been constant critics of Muslim men’s oppression of women and have urged reformation. However, their extremist fellow believers threatened them with a death sentence for their “free speech” (Chadwick). The non-Muslim Dutch film director, Theo van Gogh, also a critic of Islam and a supporter of Ayaan Hirsi Ali, advocated a reduction in immigration into Holland, especially by Muslims. Both van Gogh and Hirsi Ali – who co-scripted and co-produced the film Submission – received death threats from Muslim extremists because the film exhibited the verses of the Quran across the chest, stomach and thighs of an almost naked girl, and featured four women in see-through robes showing their breasts, with texts from the Quran daubed on their bodies, talking about the abuse they had suffered under Islam (Anon 25). Whereas there may be some justification for the claim made in the film, that some Muslim men interpret the Quran to oppress women (Doogue and Kirkwood 220), the writing of the Quranic verses on almost-naked women is surely offensive to all Muslims because the Quran teaches Muslim women to dress modestly (Sura 24: 30-31; Ali 873). On 4 November 2004, The West Australian reported that the Dutch director Theo van Gogh was murdered by a 26-year-old Dutch-Moroccan Muslim on 2 November 2004 (27). Hirsi Ali, the co-producer of the film was forced to go into hiding after van Gogh’s murder. In the face of a growing clamour from both the Dutch Muslims and the secular communities to silence her, Ayaan Hirsi Ali resigned from the Dutch Parliament in May 2006 and decided to re-settle in Washington (Jardine 2006). It should be noted that militant Muslims form a tiny but forceful minority of the 1.4 billion Muslims worldwide. The Muslim majority are moderate and peaceful (Doogue and Kirkwood 79-80). Some Muslim scholars argue that there is specific instruction in the Quran for people to apply their knowledge and arrive at whatever interpretation is of greatest benefit to the community. It may be that stricter practitioners would not agree with the moderate interpretation of the Quran and vice versa (Doogue and Kirkwood 232). Therefore, when the Western media makes a mockery of the Muslim religion or their Prophet in the name of “free speech”, or generalises all Muslims for the acts of a few through headlines or cartoons, it impacts on the Muslims residing in the West. Prophet Muhammad’s Cartoons With the above-mentioned publication of Prophet Muhammad’s cartoons in Denmark, Islamic critics charged that the cartoons were a deliberate provocation and insult to their religion, designed to incite hatred and polarise people of different faiths. In February 2006, regrettably, violent reactions took place in the Middle East, Europe and in Asia. Danish embassies were attacked and, in some instances, were set on fire. The demonstrators chanted, “With our blood and souls we defend you, O Prophet of God!”. Some replaced the Danish flag with a green one printed with the first pillar of Islam (Kalima): “There is no god but God and Mohammed is the messenger of God”. Some considered the cartoons “an unforgivable insult” that merited punishment by death (The Age). A debate on “free speech” soon emerged in newspapers throughout the world. On 7 February 2006 the editorial in The West Australian, “World Has Had Enough of Muslim Fanatics”, stated that the newspaper would not publish cartoons of Mohammad that have drawn protests from Muslims around the world. The newspaper acknowledged that depictions of the prophet are regarded as “blasphemous by Muslims” (18). However, the editorial was juxtaposed with another article “Can Liberty Survive a Clash of Cultures?”, with an image of bearded men wearing Muslim head coverings, holding Arabic placards and chanting slogans, implying the violent nature of Islam. And in the letters page of this newspaper, published on the same day, appeared the following headlines (20): Another Excuse for Muslims to Threaten Us Islam Attacked Cartoon Rage: Greatest Threat to World Peace We’re Living in Dangerous Times Why Treat Embassies with Contempt? Muslim Religion Is Not So Soft Civilised World Is Threatened The West Australian is a state-based newspaper that tends to side with the conservative Liberal party, and is designed to appeal to the “man in the street”. The West Australian did not republish the Prophet Muhammad cartoon, but for 8 days from 7 to 15 February 2006 the letters to the editor and opinion columns consistently criticised Islam and upheld “superior” Western secular values. During this period, the newspaper did publish a few letters that condemned the Danish cartoonist, including the author’s letter, which also condemned the Muslims’ attack on the embassies. But the overall message was that Western secular values were superior to Islamic values. In other words, the newspaper adopted a jingoistic posture and asserted the cultural superiority of mainstream Australians. The Danish cartoons also sparked a debate on “free speech” in Australia’s leading newspaper, The Australian, which is a national newspaper that also tends to reflect the values of the ruling national government – also the conservative Liberal party. And it followed a similar pattern of debate as The West Australian. On 14 February 2006, The Australian (13) published a reader’s criticism of The Australian for not republishing the cartoons. The author questioned whether the Muslims deserved any tolerance because their Holy Book teaches intolerance. The Koran [Quran] (22:19) says: Garments of fire have been prepared for the unbelievers. Scalding water shall be poured upon their heads, melting their skins and that which is in their bellies. Perhaps this reader did not find the three cartoons published in The Australian a few days earlier to be ‘offensive’ to the Australian Muslims. In the first, on 6 February 2006, the cartoonist Bill Leak showed that his head was chopped off by some masked people (8), implying that Muslim militants, such as the Hamas, would commit such a brutal act. The Palestinian Hamas group often appear in masks before the media. In this context, it is important to note that Israel is an ally of Australia and the United States, whereas the Hamas is Israel’s enemy whose political ideology goes against Israel’s national interest. On 25 January 2006, the Hamas won a landslide victory in the Palestine elections but Israel refused to recognise this government because Hamas has not abandoned its militant ideology (Page 13). The cartoon, therefore, probably means that the cartoonist or perhaps The Australian has taken sides on behalf of Australia’s ally Israel. In the second cartoon, on 7 February 2006, Bill Leak sketched an Arab raising his sword over a school boy who was drawing in a classroom. The caption read, “One more line and I’ll chop your hand off!” (12). And in the third, on 10 February 2006, Bill Leak sketched Mr Mohammed’s shadow holding a sword with the caption: “The unacceptable face of fanaticism”. A reporter asked: “And so, Mr Mohammed, what do you have to say about the current crisis?” to which Mr Mohammed replied, “I refuse to be drawn on the subject” (16). The cartoonist also thought that the Danish cartoons should have been republished in the Australian newspapers (Insight). Cartoons are supposed to reflect the theme of the day. Therefore, Bill Leak’s cartoons were certainly topical. But his cartoons reveal that his or The Australian’s “freedom of expression” has been one-sided, all depicting Islam as representing violence. For example, after the Bali bombing on 21 November 2002, Leak sketched two fully veiled women, one carrying explosives under her veil and asking the other, “Does my bomb look big in this”? The cartoonist’s immediate response to criticism of the cartoon in a television programme was, “inevitably, when you look at a cartoon such as that one, the first thing you’ve got to do is remember that as a daily editorial cartoonist, you’re commenting first and foremost on the events of the day. They’re very ephemeral things”. He added, “It was…drawn about three years ago after a spate of suicide bombing attacks in Israel” (Insight). Earlier events also suggested that that The Australian resolutely supports Australia’s ally, Israel. On 13-14 November 2004 Bill Leak caricatured the recently deceased Palestinian leader Yasser Arafat in The Weekend Australian (18). In the cartoon, God appeared to be displeased with him and would not allow him to enter paradise. Arafat was shown with explosives strapped to his body and threatening God by saying, “A cloud to myself or the whole place goes up….”. On the other hand, on 6 January 2006 the same cartoonist sympathetically portrayed ailing Israeli leader Ariel Sharon as a decent man wearing a black suit, with God willing to accept him (10); and the next day Sharon was portrayed as “a Man of Peace” (12). Politics and Religion Thus, the anecdotal evidence so far reveals that in the name of “freedom of expression”, or “free speech” The West Australian and The Australian newspapers have taken sides – either glorifying their “superior” Western culture or taking sides on behalf of its allies. On the other hand, these print media would not tolerate the “free speech” of a Muslim leader who spoke against their ally or another religious group. From the 1980s until recently, some print media, particularly The Australian, have been critical of the Egyptian-born Muslim spiritual leader Imam Taj el din al-Hilali for his “free speech”. In 1988 the Australian Federation of Islamic Councils bestowed the title of Mufti to Imam al- Hilali, and al-Hilali was elevated to a position of national religious leadership. Al-Hilali became a controversial figure after 1988 when he gave a speech to the Muslim students at Sydney University and accused Jews of trying to control the world through “sex, then sexual perversion, then the promotion of espionage, treason and economic hoarding” (Hewett 7). The Imam started being identified as a “Muslim chief” in the news headlines once he directly criticised American foreign policy during the 1990-91 Gulf crisis. The Imam interpreted US intervention in Kuwait as a “political dictatorship” that was exploiting the Gulf crisis because it was seen as a threat to its oil supply (Hewett 7). After the Bali bombings in 2002, the Howard government distributed information on terrorism through the “Alert and Alarmed” kit as part of its campaign of public awareness. The first casualty of the “Be alert, but not alarmed” campaign was the Imam al-Hilali. On 6 January 2003, police saw a tube of plastic protruding from a passenger door window and suspected that al-Hilali might have been carrying a gun when they pulled him over for traffic infringements. Sheikh al-Hilali was charged with resisting arrest and assaulting police (Morris 1, 4). On 8 January 2003 The Australian reminded its readers “Arrest Adds to Mufti’s Mystery” (9). The same issue of The Australian portrayed the Sheikh being stripped of his clothes by two policemen. The letter page also contained some unsympathetic opinions under the headline: “Mufti Deserved No Special Treatment” (10). In January 2004, al-Hilali was again brought under the spotlight. The Australian media alleged that al-Hilali praised the suicide bombers at a Mosque in Lebanon and said that the destruction of the World Trade Center was “God’s work against oppressors” (Guillatt 24). Without further investigation, The Australian again reported his alleged inflammatory comments. Under the headline, “Muslim Leader’s Jihad Call”, it condemned al-Hilali and accused him of strongly endorsing “terrorist groups Hezbollah and Hamas, during his visit to Lebanon”. Federal Labor Member of Parliament Michael Danby said, “Hilali’s presence in Australia is a mistake. He and his associates must give authorities an assurance he will not assist future homicide attacks” (Chulov 1, 5). Later investigations by Sydney’s Good Weekend Magazine and SBS Television found that al-Hilali’s speech had been mistranslated (Guillatt 24). However, the selected print media that had been very critical of the Sheikh did not highlight the mistranslation. On the other hand, the Archbishop of Sydney, Cardinal George Pell has been critical of Islam and is also opposed to Australia’s involvement in the Iraq war in 2003, but the print media appeared to ignore his “free speech” (Dateline). In November 2004, Dr Pell said that secular liberal democracy was empty and selfish, and Islam was emerging as an alternative world view that attracted the alienated (Zwartz 3). In May 2006, Dr Pell said that he tried to reconcile claims that Islam was a faith of peace with those that suggested the Quran legitimised the killings of non-Muslims but: In my own reading of the Koran [Quran], I began to note down invocations to violence. There are so many of them, however, that I abandoned this exercise after 50 or 60 or 70 pages (Morris). Muslim leaders regarded Dr Pell’s anti-Islam statement as “inflammatory” (Morris). However, both the newspapers, The Australian and The West Australian remained uncritical of Dr Pell’s “free speech” against Islam. Conclusion Edward Said believed that media images are informed by official definitions of Islam that serve the interests of government and business. The success of the images is not in their accuracy but in the power of the people who produce them, the triumph of which is hardly challenged. “Labels have survived many experiences and have been capable of adapting to new events, information and realities” (9). In this paper the author accepts that, in the Australian context, militant Muslims are the “enemy of the West”. However, they are also the enemy of most moderate Australian Muslims. When some selected media take sides on behalf of the hegemony, or Australia’s “allies”, and offend moderate Australian Muslims, the media’s claim of “free speech” or “freedom of expression” remains highly questionable. Muslim interviewees in this study have noted a systemic bias in some Australian media, but they are not alone in detecting this bias (see the “Abu Who?” segment of Media Watch on ABC TV, 31 July 2006). To address this concern, Australian Muslim leaders need to play an active role in monitoring the media. This might take the form of a watchdog body within the Australian Federation of Islamic Councils. If the media bias is found to be persistent, the AFIC might then recommend legislative intervention or application of existing anti-discrimination policies; alternatively, AFIC could seek sanctions from within the Australian journalistic community. One way or another this practice should be stopped. References Ali, Abdullah Yusuf. The Holy Quran: Text, Translation and Commentary. New Revised Ed. Maryland, USA: Amana Corporation, 1989. Anonymous. “Dutch Courage in Aftermath of Film-Maker’s Slaying.” The Weekend Australian 6-7 Nov. 2004. Chadwick, Alex. “The Caged Virgin: A Call for Change in Islam.” 4 June 2006 http://www.npr.org/templates/story/story.php?storyId=5382547>. Chulov, Martin. “Muslim Leader’s Jihad Call.” The Australian 19 Feb. 2004. Dateline. “Cardinal George Pell Interview.” SBS TV 6 April 2005. 7 June 2006 http://news.sbs.com.au/dateline/>. Dreher, Tanya. “Targeted”, Experiences of Racism in NSW after September 11, 2001. Sydney: University of Technology, 2005. Doogue, Geraldine, and Peter Kirkwood. Tomorrow’s Islam: Understanding Age-Old Beliefs and a Modern World. Sydney: ABC Books, 2005. Insight. “Culture Clash.” SBS TV 7 March 2006. 11 June 2006 http://news.sbs.com.au/insight/archive.php>. Guillatt, Richard. “Moderate or Menace.” Sydney Morning Herald Good Weekend 21 Aug. 2004. Hewett, Tony. “Australia Exploiting Crisis: Muslim Chief.” Sydney Morning Herald 27 Nov. 1990. Human Rights and Equal Opportunity Commission. Ismaa – Listen: National Consultations on Eliminating Prejudice against Arab and Muslim Australians. Sydney: Human Rights and Equal Opportunity Commission, 2004. Jyllands-Posten. 24 Jan. 2006. http://www.di2.nu/files/Muhammad_Cartoons_Jyllands_Posten.html>. Jardine, Lisa. “Liberalism under Pressure.” BBC News 5 June 2006. 12 June 2006 http://news.bbc.co.uk/1/hi/magazine/5042418.stm>. Kabir, Nahid. Muslims in Australia: Immigration, Race Relations and Cultural History. London: Kegan Paul, 2005. Media Watch. “Abu Who?” ABC Television 31 July 2006. http://abc.net.au/mediawatch/>. Morris, Linda. “Imam Facing Charges after Row with Police.” Sydney Morning Herald 7 Jan. 2003. Morris, Linda. “Pell Challenges Islam – O Ye, of Little Tolerant Faith.” Sydney Morning Herald 5 May 2006. Page, Jeremy. “Russia May Sell Arms to Hamas.” The Australian 18 Feb. 2006. Said, Edward. Covering Islam: How the Media and the Experts Determine How We See the Rest of the World. London: Vintage, 1981, 1997. Submission. “Film Clip from Short Submission.” Submission. 11 June 2006. http://www.ifilm.com/ifilmdetail/2655656?htv=12> The Age. “Embassies Torched over Cartoons.” 5 Feb. 2006. http://www.theage.com.au>. The Guardian. “Virgins? What Virgins?” 12 Jan. 2002. 4 June 2006 http://www.guardian.co.uk/>. Zwartz, Barney. “Islam Could Be New Communism, Pell Tells US Audience.” Sydney Morning Herald 12 Nov. 2004. Citation reference for this article MLA Style Kabir, Nahid. "Depiction of Muslims in Selected Australian Media: Free Speech or Taking Sides." M/C Journal 9.4 (2006). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0609/1-kabir.php>. APA Style Kabir, N. (Sep. 2006) "Depiction of Muslims in Selected Australian Media: Free Speech or Taking Sides," M/C Journal, 9(4). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0609/1-kabir.php>.

29

Balanzategui, Jessica. "“You have a secret that you don't want to tell me”: The Child as Trauma in Spanish and American Horror Film." M/C Journal 17, no.4 (July24, 2014). http://dx.doi.org/10.5204/mcj.854.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

In the years surrounding the turn of the millennium, there emerged an assemblage of American and Spanish horror films fixated on uncanny child characters. Caught in the symbolic abyss between death and life, these figures are central to the films’ building of suspense and Gothic frisson—they are at once familiar and unfamiliar, vulnerable and threatening, innocent yet unnervingly inscrutable. Despite being conceived and produced in two very different cultural climates, these films construct the child as an embodiment of trauma in parallel ways. In turn, these Gothic children express the wavering of narratives of progress which suffused the liminal moment of the millennial turn. Steven Bruhm suggests that there is “a startling emphasis on children as the bearers of death” (author’s emphasis 98) in popular Gothic fiction at the turn of the new millennium, and that this contemporary Gothic “has a particular emotive force for us because it brings into high relief exactly what the child knows ... Invariably, the Gothic child knows too much, and that knowledge makes us more than a little nervous” (103). A comparative analysis of trans-millennial American and Spanish supernatural horror films reveals the specifically threatening register of the Gothic child’s knowledge, and that the gradual revelation of this knowledge aestheticizes the mechanics of trauma. This “traumatic” aesthetic also entails a disruption to linear progress, exposing the ways in which Gothic representations of the child’s uncanny knowledge express anxieties about the collapse of temporal progress. The eeriness associated with the child’s knowledge is thus tied to a temporal disjuncture; as Margarita Georgieva explains, child-centred Gothic fiction meditates on the fact that “childhood is quickly lost, never regained and, therefore, outside of the tangible adult world” (191). American films such as The Sixth Sense (M. Night Shyamalan, 1999) and Stir of Echoes (David Koepp, 1999), and Spanish films The Nameless (Jaume Balagueró, 1999) and The Devil’s Backbone (Guillermo del Toro, 2001), and also American-Spanish co-productions such as The Others (Alejandro Amenábar, 2001) and Fragile (Jaume Balagueró, 2005), expose the tangle of contradictions which lurk beneath romanticised definitions of childhood innocence and nostalgia for an adult’s “lost” childhood. The child characters in these films tend to be either ghosts or in-between figures, seemingly alive yet acting as mediators between the realms of the living and the dead, the past and the present. Through this liminal position, these children wreak havoc on the symbolic coherence of the films’ diegetic worlds. In so doing, they incarnate the ontological wound described by Cathy Caruth in her definition of trauma: “a breach in the mind’s experience of time, self, and the world” caused by an event that “is experienced too soon, too unexpectedly, to be fully known and is therefore not available to consciousness until it imposes itself ... repeatedly ... in the nightmares and repetitive actions” (4) of those who have experienced trauma. The Gothic aesthetic of these children expresses the ways in which trauma is locatable not in the original traumatic past event, but rather in “the way it was precisely not known in the first instance”, through revealing that it is trauma’s unassimilated element which “returns to haunt the survivor later on” (Caruth, author’s emphasis 4). The uncanny frisson in these films arises through the gradual exposition of the child character’s knowledge of this unassimilated element. As a result, these children trouble secure processes of symbolic functioning, embodying Anne Williams’ suggestion that “Gothic conventions imply a fascination with … possible fissures in the system of the symbolic as a whole” (141). I suggest that, reflecting Bruhm’s assertion above, these children are eerie because they have access to memories and knowledge as yet unassimilated within the realm of adult understanding, which is expressed in these films through the Gothic resurfacing of past traumas. Through an analysis of two of the most transnationally successful and influential films to emerge from this trend—The Sixth Sense (1999) and The Devil’s Backbone (2001)—this article explores the intersecting but tellingly distinctive ways in which the American and Spanish horror films figure the child as a vessel for previously repressed trauma. In both films, the eeriness of the children, Cole and Santi respectively, is associated with their temporal liminality and subsequent ability to invoke grisly secrets of the past, which in turn unsettles solid conceptions of identity. In The Sixth Sense, as in other American ghost films of this period, it is an adult character’s subjectivity which is untethered by the traumas of the uncanny child; Bruhm suggests that the contemporary Gothic “attacks adult self-identity on multiple fronts” (107), and in American films the uncanny child tends to launch this traumatic assault from within an adult character’s own psyche. Yet in the Spanish films, the Gothic child tends not to threaten an individual adult figure’s self-identity, instead constituting a challenge to secure concepts of socio-cultural identity. In The Sixth Sense, Cole raises a formerly repressed trauma in the mind of central adult character Malcolm Crowe, while simultaneously disturbing the viewer’s secure grasp on the film’s narrative world. Ultimately, Cole raises Freudian-inflected anxieties surrounding childhood’s disruption to coherent adult subjectivity, functioning as a receptacle for the adult’s repressed secrets. Cole’s gradual exposure of these secrets simulates the effects of trauma for both Malcolm and the viewer via a Gothic unsettling of meaning. While The Sixth Sense is set in the present, The Devil’s Backbone is set during the Spanish Civil War (1936-39)—a violent and traumatic period of Spain’s history, the ramifications of which have been largely unexplored in Spanish popular culture until very recently as a result of forty years of strict censorship under General Franco, whose dictatorship eroded following his death in 1975. Unlike Cole, Santi does not arouse a previously submerged trauma within an adult character’s mind, instead serving to allegorically raise socio-cultural trauma. Santi functions as an incarnation of Gilles Deleuze’s “child seer”, a figure who Deleuze claims first emerged in Italian neo-realist films of the 1940s as a response to the massive cultural rupture of World War II (3). The child seer is characterised by his entrapment in the gap between the perception of a traumatic event, and the understanding and subsequent action required to move on from it. Thus, upon experiencing a disturbing event, he suffers a breach in comprehension which disrupts the typical sensory-motor chain of perception-understanding-action, rendering him physically and mentally unable to escape his situation. Yet in experiencing this incapacity, the seer gains a powerful insight beyond the limits of linear temporality. On becoming a ghost, Santi escapes coherent space-time, and invokes the repressed spectre of Spain’s violent Civil War past, inciting an eerie collision of past and present. This temporal disruption has deep allegorical implications for contemporary Spain through the child’s symbolic status as vessel for the future. Santi’s embodiment of cultural trauma ensures that Spain’s past, as constructed by the film, eerily folds into the nation’s extra-diegetic present. The Sixth Sense In The Sixth Sense, adult protagonist Malcolm Crowe is a child psychiatrist, thus unravelling the riddles of the child’s psyche is positioned as the central quest of the film’s narrative. The dramatic twist in the film’s final scene reveals that the analysis of the child Cole’s “phobia” has in fact exhumed dormant spectres within Malcolm’s own mind, exposing the Gothic mechanisms whereby the uncanny child becomes conflated with the adult’s repressed trauma. This impression is heightened by the narrative structure of The Sixth Sense, in which the twist in the final scene shifts the meaning of all that has happened before. Both the audience and Malcolm are led to assume that they have uncovered and come to terms with Cole’s secret once it becomes clear two-thirds into the film that he “sees dead people”. However, the climactic twist exposes that Cole has in fact been hiding another secret which is not so easily ameliorated: that Malcolm is one of these dead people, having died in the film’s opening sequence. If the film’s narrative “pulling the rug out” from under the audience functions as intended, at the climax of the film both Malcolm and viewer simultaneously become privy to a layer of Cole’s secret previously inaccessible to us, both that Malcolm has been dead all along and that, subsequently, the hidden quest underlying the surface narrative has been Malcolm’s journey to come to terms with this disturbing truth. Thus, the uncanny child functions as a symbolic stage for the adult protagonist’s unassimilated trauma, and the unsettling nature of this experience is extended to the viewer via the gradual exposure of Cole’s secret. Further intensifying the uncanny effects of this Gothic disruption to adult knowledge, Cole also functions like a reincarnation of the crisis which has undermined Malcolm’s coherent identity as a successful child psychiatrist: his failure to cure former patient Vincent. Thus, Cole is like uncanny déjà vu for Malcolm and the viewer, an almost literal re-evocation of Malcolm’s past trauma. Both Vincent and Cole have a patch of grey hair at the back of their head, symbolising their access to knowledge too great for their youth, and as Malcolm explains, “They’re both so similar. Same mannerisms, same expressions, same things hanging over their heads.” At the opening of the film, Vincent is depicted as a wretched madman. He appears crying and half naked in Malcolm’s bathroom, having broken into his house, before shooting Malcolm and then turning the gun on himself. Thus, Vincent is an abject image of Malcolm’s failure, and his taunting words expose a rupture in Malcolm’s paternalistic, professional identity by hinting at his lack of awareness. “You don’t know so many things” Vincent remarks, and sarcastically undermines Malcolm’s “saviour” status by taunting, “Don’t you know me, hero?”. Functioning as a repetition of this trauma, Cole provides Malcolm with an opportunity to discover the “so many things” that he does not know, and also to once again become a “hero”. Cole functions as a literalisation of Malcolm’s compulsion to repeat the trauma which has exposed a breach in his sense of self, and to gain mastery over it. On first viewing, the audience is led to believe that this narrative is the primary one in the film, and that the film is wrapped up when Malcolm finally achieves his goal and becomes Cole’s hero. However, the final revelation that Cole has been keeping yet another secret from Malcolm—that Malcolm has been dead all along—reveals that this trauma is actually irrevocable: Malcolm was in fact killed by Vincent at the beginning of the film, thus the adult’s subjective breach (symbolised by his gunshot wound, which he suddenly notices for the first time) cannot be filled or repaired. All Malcolm can do at the close of the film is disappear, as a close-up of his face fades into the mediated image of him, now his only form of existence in the world as we know it, on the home videotapes of his wedding which play as his wife sleeps. Thus, Cole evokes the experience of a violent, unassimilated trauma which is experienced “too soon, too unexpectedly to be fully known in the first instance” (Caruth 4), a breach in subjectivity which has only become consciously known to Malcolm through the “nightmare repetition” figured by Cole. This experience of a traumatic disruption to the wholeness and coherence of subjective reality is echoed by the viewer’s own experience of The Sixth Sense, if the twist-narrative functions as intended. While on first viewing we are led to believe that we are watching a straightforward ghost story about a paternalistic psychologist helping a young child with an uncanny gift, we learn in the final scene that there has been an underlying double reality haunting the surface narrative all along. Central to this twist is the recognition that Cole was always aware of this second reality, but has been concealing it from Malcolm—underscoring the ways in which Malcolm’s trauma is bound up largely with what he was unable to comprehend and assimilate when the traumatic event of his death first occurred. The eerie effects of Malcolm’s traumatic confrontation with the child’s Gothic knowledge is extended to the viewer via the film’s narrative structure. Erlend Lavik discusses The Sixth Sense and other twist films in terms of a particular relationship between the syuzhet (the way in which a story’s components are organized) and the fabula (the raw components which constitute the story). He explains that in such films, there is a “doubling of the syuzhet, where we are led to construct a fabula that initially seems quite straightforward until suddenly a new piece of information is introduced that subverts (or decentres) the fictional world we have created. We come to realize the presence of another fabula running parallel to the first one but ‘beneath’ it, hidden from view” (Lavik 56). The revelation that Malcolm has been a ghost all along shatters the fabula that most viewers construct upon first viewing the film. The impression that an eerie, previously hidden double of accepted reality has bubbled to the surface of our perceptions is deeply uncanny, evoking the experience of filmic déjà vu. This is of course heightened by the fact that the viewer is compelled to re-watch the film in order to construct the second, and more “correct”, fabula. In doing so, the viewer experiences a “narrative bifurcation whereby we come to notice how traces of the correct fabula were actually available to us the first time” (Lavik 59). The process of re-watching the film in an attempt to solve the riddles of Malcolm’s existence reveals the viewer’s compulsion to undergo their own “detective work” in a parallel of Malcolm’s analysis of Cole: the exposure of the child’s secret turns a mirror upon the protagonist and audience which exposes a fracture in the adult’s subjectivity. Discussing the detective story, Slavoj Žižek explains that “the detective's role is ... to demonstrate how ‘the impossible is possible’ ... that is, to resymbolize the traumatic shock, to integrate it into symbolic reality” (58). On first viewing, this detective work is realized through Malcolm’s quest to comprehend Cole’s secrets, and then to situate the abject ghosts the child sees into a secure framework whereby they disappear if Cole helps them. The compulsion to re-watch the film in order to better understand how Malcolm experiences time, consciousness and communication (or lack there-of) represents an analogous attempt to re-integrate the traumatic shock raised by the twist-ending by imposing more secure symbolic frameworks upon the film’s diegetic world: to suture the traumatic breach in meaning. However, there are many irremediable gaps in Malcolm’s experiences—we do not actually see him trying to pay for the bus, or meeting Cole’s mother for the first time, or pondering the fact that no other human being has spoken to him directly for six months apart from Cole—fissures which repeat viewings cannot repair. The Devil’s Backbone The Devil’s Backbone is set in the final years of the Civil War, a liminal period in which the advancement of Spain’s national narrative is disturbingly uncertain. The film takes place in an orphanage for young boys from Republican families whose parents have been killed or captured in the Civil War. In the middle of the orphanage’s courtyard stands an unexploded bomb, an ominous and volatile reminder of the war. As well as being haunted by this unexploded bomb, the orphanage is also haunted by a child ghost, Santi, a former inhabitant of the orphanage who disappeared on the same night that the bomb landed in the orphanage’s grounds. We learn mid-way through the film that Santi in fact drowned in the orphanage’s cavernous cistern: after being struck on the head by the angry groundskeeper, Santi was left unable to swim, and is shown sinking helplessly into the water’s murky depths. Thus, Santi’s death represents the ultimate extreme of the child seer’s traumatic entrapment between perceiving and understanding the traumatic event, and the physical action required to escape it. Both the ghostly Santi and the unexploded bomb exude an eerie power despite, and perhaps because of, their apparent physical incapacity. Such corporeal powerlessness is the defining feature of Deleuze’s “child seer”, as the breach in the sensory-motor chain comes to imbue the child who encounters trauma with a penetrating gaze which sees beyond temporal borders. Once he becomes a ghost, Santi escapes the bounds of linear time altogether, becoming forever fused to the moment of his drowning. Santi’s spectral presence warps the ether around him as if he is permanently underwater, and the blood from his head wound constantly floats upwards. The sensory-motor chain becomes completely severed in a cinematic moment which can be likened to Deleuze “crystal of time”. Like the dual layers of narrative in The Sixth Sense, this crystal of time sparks a moment of Gothic frisson as linear time collapses and dual modes of temporality are expressed simultaneously: the chronological moment of Santi’s death—a ‘dead’ present that has already passed—and the fractured, traumatic memories of this past which linger in the present—what Deleuze would call a ‘virtual’ past which “coincides with the present that it was” (79). The traumatic effect of this collapse of temporal boundaries is enhanced by the fact that the shot of Santi drowning is repeated multiple times throughout the film—including in the opening minutes, before the audience is able to comprehend what we are seeing and where this scene fits into the film’s chronology. Ultimately, this cinematic crystal symbolically ungrounds linear narratives of Spanish history, which position the cultural rupture of the Civil War as a remnant of Spain’s past which has successfully been overcome. Through uncanny repetition, Santi’s death refuses to remain lodged in an immobilized “historical” past—a present that has passed—but remains forever alongside the present as an ethereal past that “is”. Santi’s raising of Gothic knowledge incites the wavering of not an adult character’s self-identity, as in The Sixth Sense, but a trembling in conceptual models of linear cultural progress. As a ghost, Santi is visually constructed as a broken porcelain doll, with cracks visible all over his body, emphasising his physical fragility; however, in his ghostly form it is this very fragility which becomes uncanny and threatening. His cracked body fetishizes his status as a subject who is not fully formed or complete. Thus, the film presents the post-Civil War child as a being who has been shattered and broken while undergoing the delicate process of being formed: an eerie incarnation of a trauma that has occurred “too soon” to be properly integrated. Santi’s broken body visualises the mechanisms whereby the violent conditions and mentalities of war permeate the child’s being in irreversible ways. Because he is soldered to the space and time of his death, he is caught forever as an expression of trauma in the inescapable gap between perception, assimilation and action. His haunting involves the intrusion of this liminal space onto the solid boundaries and binaries of the diegetic present; his abject presence forces other characters, and viewers, to experience the frisson of this previously concealed traumatic encounter. In so doing, Santi allegorically triggers the irruption of a fissure in the progression of Spain’s socio-cultural narrative. He embodies the ominous possibility that Spain’s grisly recent past may return within the child mutated by wartime trauma to engulf the future. The final scene of the film ideates the threshold of this volatile future, as the orphaned children stand as a group staring out at the endless expanse of desert beyond the orphanage’s bounds, all the adult characters having killed each other in a microcosm of the Civil War. Ultimately, both Cole and Santi enforce an eerie moment of recognition that the previously unassimilated traumas of the past live on within the present: a Gothic drawing forth of buried knowledge that exposes cracks in coherent meaning. In The Sixth Sense, Cole reveals the extent to which trauma is located in “the way it was precisely not known in the first instance” (Caruth 4), haunting Malcolm with his previous failure before exposing the all-encompassing extent to which this past trauma has fractured Malcom’s subjectivity. Santi of The Devil’s Backbone alludes to the ways in which this process of eliding past trauma extra-diegetically haunts contemporary Spain, particularly because those who were children during the Civil War are now the adult filmmakers, political leaders and constituents of Spanish society. These disturbances of historical and personal progress are rendered particularly threatening emerging as they do at the millennial turn, a symbolic temporal threshold which divides the recent past and the “new” present. The Gothic child in these contexts points to the danger inherent in misrecognizing traumatic histories—both personal and socio-cultural—as presents that have long-since passed instead of pasts that are. ReferencesBruhm, Steven. “Nightmare on Sesame Street: or, The Self-Possessed Child.” Gothic Studies 8.2 (2006): 98-210. Caruth, Cathy. Unclaimed Experience: Trauma, Narrative and History. Baltimore: Johns Hopkins University Press, 1996. Deleuze, Gilles. Cinema 2: The Time-Image. London: Continuum Books, 2005. The Devil’s Backbone. Dir. Guillermo del Toro. Perf. Fernando Tielve, Junio Valverde and Eduardo Diego. El Deseo S.A., 2001. Georgieva, Margarita. The Gothic Child. Basingstoke: Palgrave Macmillan, 2013. Fragile. Dir. Jaume Balageuró. Perf. Calista Flockhart, Richard Roxburgh and Ivana Baquero. Castelao Producciones, 2005. Lavik, Erlend. “Narrative Structure in The Sixth Sense: A New Twist in ‘Twist Movies?’” The Velvet Light Trap 58 (2006): 55-64. The Nameless. Dir. Jaumé Balaguero. Perf. Emma Vilarasau, Karra Elejalde and Tristán Ulloa. Filmax S.A., 1999. The Orphanage. Dir. Juan Antonio Bayona. Perf. Belén Rueda, Fernando Cayo and Roger Príncep. Esta Vivo! Laboratorio de Nuevos Talentos, 2007. The Others. Dir. Alejandro Amenábar. Perf. Nicole Kidman, Alakina Mann and James Bentley. Sociedad General de Cine, 2001. The Sixth Sense. Dir. M. Night Shyalaman. Perf. Haley Joel Osment, Bruce Willis and Toni Collette. Hollywood Pictures, 1999. Stir of Echoes. Dir. David Koepp. Perf. Kevin Bacon, Zachary David Cope and Kathryn Erbe. Artisan Entertainment, 1999. Williams, Anne. Art of Darkness: A Poetics of Gothic. Chicago: University of Chicago Press, 1995. Žižek, Slavoj. Looking Awry: An Introduction to Jacques Lacan Through Popular Culture. Cambridge: MIT Press, 1991.

30

Parikka, Jussi. "Viral Noise and the (Dis)Order of the Digital Culture." M/C Journal 7, no.6 (January1, 2005). http://dx.doi.org/10.5204/mcj.2472.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

“We may no longer be able to trust technology. A computer program could, without warning, become an uncontrollable force, triggered by a date, an event or a timer.” (Clough and Mungo 223) Introduction In 1991 the Information Security Handbook noted how “society is becoming increasingly dependent on the accurate and timely distribution of information” (Shain 4). This dependence, however, exposed the society to new kinds of dangers, accidents that have to do with information disorders – viruses, worms, bugs, malicious hackers etc. In this essay, I focus on digital viruses as disorderly elements within the digital culture. It is due to certain key principles in computing and computer security that viruses and worms have acquired their contemporary status as malicious software, that is, malware – elements of chaos, accident and disorder. According to my claim, the fear of viruses does not stem just from the contemporary culture of digital technology. It is part of a longer genealogy of modern computing, which has emphasized issues of control, reliability and order. Viruses and worms threaten the conceptual ontology of digital culture in a similar fashion as epidemic diseases have been figures for social disorder throughout Western history. Unlike AIDS or other deadly biological viruses, computer viruses have not been known to cause casualties to humans, yet they have been treated the last years as the “killer viruses of digital culture”, connotating the seriousness of the threat. A “viral perspective” to digital culture reveals how underlying articulations of order are used to construct an all-too-harmonious picture of computers in modern society. Reliability Anti-virus manuals, guidebooks and other such publications have especially contributed to our understanding of viruses as threats to the orderly digital society. The editorial of the first issue of Virus Bulletin (July 1989) sees viruses as a cunning form of vandalism and an indication of ”sabotage mentality”. Viruses destroy information and produce uncontrollability: Rather like Hitler’s V1 ‘flying bomb’, no-one knows when or where a computer virus will strike. They attack indiscriminately. Virus writers, whether or not they have targeted specific companies or individuals, must know that their programs, once unleashed, soon become uncontrollable. (Virus Bulletin 2) Computer viruses mean unreliable and unexpected danger: they are a chaotic element within a system based on security and order. According to a widely embraced view computer security means 1) confidentiality (the privacy of sensitive information), 2) integrity (authorized information and program exchange) and 3) availability (systems work promptly and allow access to authorized users). (E.g. Shain 5). Viruses and other forms of malicious code are, consequently, a direct threat to these values, part of the modern episteme in general. This is what I will here define as “a computational way of thinking”. The concept refers not only to the epistemological and ontological presuppositions in actual computer science discussions, but also to the larger cultural historical contexts surrounding the design, implementation and use of computers. Of course, one has to note that computers have never been those reliable and rational dream-machines they have been taken to be, as they are exposed to various potentials for breaking down of which viruses and worms form only a minor part. Yet, interestingly, reading professional and popular depictions of digital viruses reveals that these sources do consider computers as otherwise integrated, coherent and pristine machines of rationality, which are only temporarily disturbed by the evil occurrences of external malicious software. Control The virus researcher Vesselin Bontchev acknowledges how issues of trust and control are at the heart of computing and the virus threat: “a computer virus steals the control of the computer from the user. The virus activity ruins the trust that the user has in his/her machine, because it causes the user to lose his or her belief that she or he can control this machine” (31). This definition resonates with broader cultural trends of modernization. Zygmunt Bauman has expressed the essence of modern science as an ”ambition to conquer Nature and subordinate it to human needs” (39). Bauman understands this as ”control management”: the moulding of things to suit human needs. The essence of modern technology proceeds along the same lines, defined through values of progress, controllability, subordination of chaos and reification of the world. From the 19th-century on, technology became closely associated with advances in science. The values of order and control were embedded in the machines and technological systems, and with time, these values became the characteristics of modern technological culture. In this vein modernity can be defined as a new attitude towards controlling information. Capitalism and digital culture as historical phenomena share the valuation of abstraction, standardization and mechanization, which were already part of the technological culture of the 19th-century. Similarly, Turing’s universal machine was above all a machine of ordering and translation, with which heterogenous phenomena could be equated. This idea, concretised in typewriters, conveyer belts, assembly lines, calculators and computers served the basis for both digital machines and capitalism. The concrete connection was the capitalist need to control the increasingly complex amount of production, circulation and signs. Rationalism – as exemplified in Babbage’s differential calculators, Taylor’s ideas of work-management and cybernetics – was the image of thought incorporated in these machines (Gere 19–40). Rationalism In general, first order cybernetics fulfilled the project of modern abstract rationalism. In other words, notions of control and order play a significant role in the archaeology of information technological security, and these themes are especially visible in the thinking of Norbert Wiener, the pioneer of cybernetics. Wiener’s cybernetics touches, most of all, upon the question of understanding the world as communication circuits and controlling them via successful feedback loops that maintain the stasis of a system. This theory relates closely the problem of entropy, a classical notion in statistical mechanics from the 19th-century: “Just as the amount of information in a system is a measure of its degree of organization, so the entropy of a system is a measure of its degree of disorganization; and the one is simply the negative of the other” (Wiener 11). Wiener and the modern era share a respect for control and security. As products of modernity, cybernetics, systems theory and information theory are all in a way theories of order and cleanliness. This is the main theme of Stephen Pfohl’s essay “The Cybernetic Delirium of Norbert Wiener”, in which he describes the cultural historical background of modern cybernetic culture. To Pfohl, cybernetics does not mean a purely academic discipline but “a term connoting the most far-reaching of ultramodern forms of social control.” Pfohl delineates the genealogy of cybernetics from the early projects on anti-aircraft artillery to the functioning of the contemporary capitalist media culture. For Pfohl, Wiener’s theories connect directly to the power structures of modern society, sacrificing other ways of being, restricting other possible worlds from emerging. Paraphrasing Pfohl, cybernetics regulates and modifies the dynamic flows of the world into fixed, stabilized and controlled boundaries. Noise The engineering problem of logical calculation and communication of signals without noise expands towards the more general cultural fields of power and articulation. I would especially like to pick up the notion of noise, which, as understood by Bauman, means undefinability, incoherence, incongruity, incompatibility, illogicality, irrationality, ambiguity, confusion, undecidability, ambivalence, all tropes of “the other of order” (7). For cybernetics and early computer pioneers, noise meant a managing problem, objects in the way of transmitting signals. Noise as the most important problem for the rise of modern discourse networks was not solved once and for all in any historical phase, but remained part of the communication acts ever since, and the only resolution to the problem of non-communication was to incorporate it within the system (Kittler 242). Computer viruses can be understood as contemporary instances of this notion of noise. They are software that short-circuit the “normal” operations of a computer and connect themselves to the basic functioning of the machine. Viruses mean short-term wiring of noise to the components of a computer. By definition, viruses have been conceived as a threat to any computer system for a) virus activity is always uncontrollable, because the actions of the virus program are autonomous and b) viruses behave indeterminately and unpredictably (Lamacka 195). In a much more positive vein, this coupling of computing order and viral disorder has been noted by recent net art projects. According to the net artist Jaromil the digital domain produces a form of chaos – which is inconvenient because it is unusual and fertile – on which people can surf. In that chaos, viruses are spontaneous compositions which are like lyrical poems in causing imperfections in machines ”made to work” and in representing the rebellion of our digital serfs. Jaromil takes noise as the starting point and articulates how viruses function also as forms of resistance to the contemporary informational capitalist ideology of the digital. Charlie Gere’s analysis of the connections between modern technology and capitalism is apt in this regard as well: the abstract, standardizing and mechanizing machines of modernization serve the basis for both the cult of the digital and contemporary capitalism in a way that makes these two almost siblings. Thus, also accidents of this techno-capitalist culture are not solely technical, but social in that they are articulated on a plane of society and cultural interaction. Viruses can thus be understood as those “unwanted bads” that are a by-product of post-industrial culture of production of goods (Van Loon), as well as they can be viewed alongside other mass mediated apocalyptic monsters threatening the order of contemporary Western culture, as Luca Lampo from the net art group _[epidemiC]_ suggests: We feel that “The Virus” is the “stranger”, the “other”, in our machine, a sort of digital sans papier—uncontrollable diversity. Once Hollywood, like Empire, finished killing “Indians” and the “Soviet Russians”, the Hollywood propaganda machine had to build other anti-Empire monsters to keep alive the social imaginary of 2001: aliens, meteors, epidemic… so many monsters. In this light, while being technical bits of code that from time to time cause trouble for users, viruses act also as social signs which can be activated in various contexts. For representatives of the official computer culture viruses and worms are signs of disorder, chaos and crime that undermine the presumed reliability of digital culture, which would otherwise function “normally.” Yet, according to some commentators, viral disorder should not mean solely anarchy but a space for variation and experimentation that resist the one-way ideology of computer rationalism. (See Sampson; Cohen; Deleuze.) For some, that ideology has been crystallized in the figure of Microsoft, a popular target for virus attacks. This view accentuates that the genealogy of computers and rationalism analysed above is but one potential history. There is always the possibility to write the counter-memory of the disorderly, accidental, probabilistic and contingent nature of technological culture. Hence, viruses might prove out to be also intellectual tools, with which to create new concepts and viewpoints to digital culture and the cultural history of computing and technology in general. Already Martin Heidegger (§ 16) proposed that modern technology reveals itself at the moment of its breaking. In this sense, viruses reveal the functioning of a certain ideological or micro-political constitution of digital order. The challenge is not to take any notion of a “healthy” cultural network without disturbances as the starting point, but to see elements of break-up as part and parcel of those systems. Even if we are used to thinking of systems as orderly and harmonious, “[i]n the beginning there was noise”, as Serres (13) notes. This emphasizes the conceptual space we should give to the parasites who reveal the networks of power that otherwise are left unnoticed. References Bauman, Zygmunt. Modernity and Ambivalence. Cambridge: Polity Press, 1995 Bontchev, Vesselin. “Are ‘Good’ Computer Viruses Still a Bad Idea?” EICAR Conference Proceedings 1994, 25–47. Clough, Bryan and Mungo, Paul. Approaching Zero: Data Crime and the Computer Underworld. London & Boston: Faber & Faber, 1992. Cohen, Fred. It’s Alive! The New Breed of Living Computer Programs. New York: John Wiley & Sons, 1994. Deleuze, Gilles. “Post-scriptum sur les sociétés de contrôle” In: Pourparlers 1972–1990. Paris: Les éditions de minuit, 1990, 240–7. Gere, Charlie. Digital Culture. London: Reaktion Books, 2002. Heidegger, Martin. Being and Time. Albany: New York University Press, 1996. Jaromil. “:(){ :|:& };:” ‘I love You’ – exhibition catalogue, 2002, http://www.digitalcraft.org/index.php?artikel_id=292> Kittler, Friedrich. Draculas Vermächtnis: Technische Schriften. Leipzig: Reclam Verlag Leipzig, 1993. Lamacka, Pavel. “Harmless and useful viruses can hardly exist.” Virus Bulletin Conference Proceedings 1995, 193–8. Lampo, Luca. “When The Virus Becomes Epidemic.” An Interview with Luca Lampo by Snafu and Vanni Brusadin, 18.4.2002, http://www.epidemic.ws/downJones_press/THE_THING_ Interview_files/index_files/display.forum> Pfohl, Stephen. “The Cybernetic Delirium of Norbert Wiener.” C-Theory 30.1.1997 http://www.ctheory.net/text_file.asp?pick=86>. Sampson, Tony. ”A Virus in Info-Space.” M/C Journal http://www.media-culture.org.au/0406/07_Sampson.html>. Serres, Michel. The Parasite. Baltimore & London: The Johns Hopkins University Press, 1982. Shain, Michael. ”An Overview of Security”. Information Security Handbook. Eds. Michael Caelli, Dennis Longley & Michael Shain. Basingstoke: Macmillan, 1994 (1991). Van Loon, Joost. Risk and Technological Culture: Towards a Sociology of Virulence. London & New York: Routledge, 2002. Virus Bulletin, “Editorial”, July 1989. Wiener, Norbert. Cybernetics, or Control and Communication in the Animal and the Machine. 2nd edition. (1st edition 1948). New York & London: The M.I.T. Press and John Wiley & Sons, 1961. Citation reference for this article MLA Style Parikka, Jussi. "Viral Noise and the (Dis)Order of the Digital Culture." M/C Journal 7.6 (2005). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0501/05-parikka.php>. APA Style Parikka, J. (Jan. 2005) "Viral Noise and the (Dis)Order of the Digital Culture," M/C Journal, 7(6). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0501/05-parikka.php>.

31

Hookway, Nicholas, and Sara James. "Authentic Lives, Authentic Times: A Cultural and Media Analysis." M/C Journal 18, no.1 (March15, 2015). http://dx.doi.org/10.5204/mcj.964.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Authenticity is the value of our times. From reality television and self-help literature to expectations to find the “real you” in work, love and relationships, authenticity pervades contemporary social and cultural life (Vannini and Williams). In contemporary Western culture the ideal of living authentically, of being “true to yourself,” is ubiquitous. Authenticity is “taken for granted” as an absolute value in a multitude of areas, from music, to travel to identity (Lindholm 1). We seek to perform authentically, to consume authentic products and to be authentic people. To describe something as inauthentic is the critic's cruellest barb, implying that the product or person under review is contrived, insincere, or at worst, soulless.The prevalence of authenticity is linked to what Charles Taylor (26) calls the “massive subjective turn of modern culture.” As religion and other traditional forms of authority weaken in modern secular societies, individuals need to draw on their inner resources to find answers to life’s big questions. It is in this context that ethical ideals of authenticity—wrapped in notions of self-discovery, self-fulfilment and personal improvement—come to play a central role in modern Western culture. While Taylor posits that authenticity can be a worthwhile moral ideal, it has tended to get a bad wrap in much cultural diagnosis. From Lasch to Bauman, authenticity is routinely linked to narcissism and declining care for others.For this issue of M/C Journal we wanted to develop a more nuanced conception of authenticity that moved outside abstracted theoretical accounts such as those provided by Taylor, Lasch and Bauman. We wanted to curate an issue that captured the concrete and situated ways in which authenticity is mobilised in everyday life and use this to interrogate the meaning and consequences of authenticity for contemporary living. In aiming to do this, the issue builds upon a one-day symposium—Cultures of Authenticity—we organised in our roles as co-conveners of The Australian Sociological Association (TASA) Cultural Sociology group. The symposium was held at Flinders University City campus in Adelaide on 28 November 2014 and supported by TASA thematic group funding.Building on the focus of the symposium, we invited papers for this issue of M/C Journal to analyse the role of authenticity in late-modern life and its real world meanings, applications and consequences. We asked for papers to investigate the significance of authenticity across diverse areas of media and culture. The result is an exciting collection of articles that address authenticity from a variety of angles that draw upon established and innovative empirical sources, including blogs, internet forums, reality TV, radio transcripts, interviews and focus-groups. Our feature article by Patrick Williams and Xiang Goh offers an emotionally powerful account of how discourses of authenticity are constructed on a breast cancer Internet forum. Using qualitative research methods, the article analyses two key dimensions of authenticity: 1) the existential, which focuses on cancer patients’ ability to face crisis and death; and 2) the interactional, which focuses on the collaborative making of the authentic cancer survivor.Nicholas Hookway and Akane Kanai also use online mediums to excavate contemporary applications of authenticity. Hookway uses blog data to show the prevalence of “being true to yourself” as a contemporary moral ideal, but suggests that the version of authenticity produced by the bloggers tends to miss the relational basis of self and morality. Kanai engages with the topic of authenticity as it applies to Tumblr blogs, arguing that they produce a concept of authenticity constituted in tension between individuality and belonging.The following three papers address the significance of authenticity in relation to work, religion and authenticity. Sara James shows that constructions of authentic selfhood in relation to work can offer existential answers to questions of meaning in disenchanted times. Steve Taylor looks at how authenticity as originality is claimed by alternative Christian communities and appropriated by mainstream groups in the UK while Ramon Menendez Domingo explores the different meanings that individuals from diverse ethnic backgrounds associate with being authentic. The next two papers address the production of authenticity in chat-based radio and reality TV. Kate Ames uses Kyle Sandilands to examine authentic performance in the chat-based radio genre, before Ava Parsemain moves our attention to how authenticity as truthfulness is deployed as a pedagogical strategy in the SBS show Who Do You Think You Are.Amy Bauder and David Inglis then close out the issue with analyses of country music and wine. Focusing on Bob Corbett and the Roo Grass Band, Bauder offers an ethnographic account of the role of authenticity in country music, arguing that family is used as a central vehicle to authenticate the genre. Inglis book-ends the issue by challenging readers to consider authenticity in wine production and consumption not simply as a social construction.Highlighting the importance of developing specific accounts of authenticity, Inglis argues that unlike the example of country music, authenticity in wine is never solely a cultural fabrication. Specifically, Inglis urges us to consider the importance of terroir to authenticity, not simply as the branding of place but also the physical and chemical components involved in wine making. Inglis’s paper was a fitting way to close the issue—it not only highlights the importance of authenticity as a modern value it also underscores the importance of historising the concept, demonstrating that demand for “authentic” wine is not just a modern value but one that has ancient roots.Putting together such a project involves the support and cooperation of a large numbers of people. Thanks to the authors for their wonderful contributions, the reviewers for their generous comments and The Australian Sociological Association, Flinders University and the Australian Cultural Sociology group for your support and advice. Thank you to Axel Bruns and the M/C Journal team for supporting not only this issue but also providing an exciting avenue to share new research and ideas. This is an on-going project but we feel this issue makes an important contribution to the operationalisation and application of authenticity to the study of self, culture and society. We hope you agree.ReferencesBauman, Zygmunt. Liquid Modernity. Cambridge: Polity, 2000.Lasch, Christopher. The Culture of Narcissism: American Life in an Age of Diminishing Expectations. New York: W.W. Norton and Co, 1979.Lindholm, Charles. Culture and Authenticity. Malden: Blackwell, 2008.Taylor, Charles. Ethics of Authenticity. Cambridge: Harvard UP, 1991.Vannini, Phillip, and J. Patrick Williams, eds. Authenticity in Culture, Self, and Society. Ashgate, 2009.

32

Silva, Lorena Scaioni, Gustavo Porangaba Miranda, Aljomar José Vechiato-Filho, Fellippo Ramos Verri, and Victor Eduardo De Souza Batista. "Confecção de moldeira individual pela clonagem da prótese total provisória do paciente: relato de caso clínico." ARCHIVES OF HEALTH INVESTIGATION 8, no.11 (June4, 2020). http://dx.doi.org/10.21270/archi.v8i11.4395.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

O objetivo do presente artigo foi relatar uma forma de confecção de prótese total utilizando a clonagem da prótese provisória com a finalidade de reduzir as etapas do tratamento. Paciente desdentada total superior e classe I de Kennedy inferior compareceu ao consultório apresentando inflamação severa do tecido periodontal, mobilidade grau III de todos os dentes e supuração à sondagem. Optou-se por realizar prótese total superior convencional e realização das exodontias dos dentes remanescentes, seguida de prótese total provisória e como tratamento definitivo mandibular uma prótese total convencional. Na primeira sessão foi realizada a reavaliação dos tecidos bucais, moldagem da prótese total superior para obter o modelo antagonista, seleção da cor do dente, registro para montagem no articulador semi-ajustável e a clonagem da prótese total inferior provisória. Após polimerizada, a réplica em resina acrílica incolor foi ajustada em boca e realizada a moldagem de borda com godiva em bastão, seguida da moldagem funcional com silicone de condensação. Ambos modelos foram montados no articulador para montagem dos dentes artificiais. A prova estética e funcional foi realizada na segunda consulta e na terceira a prótese foi instalada junto com as instruções de uso e higiene oral. Os controles foram realizados após 24 horas, 3, 7 e 14 dias. O uso de uma técnica alternativa para confecção de uma moldeira individual pode reduzir o tempo clinico, trazendo assim vantagens tanto para o paciente como para o profissional, desde que haja um bom planejamento e conhecimento da técnica.Descritores: Prótese Total; Técnica de Moldagem Odontológica; Materiais para Moldagem Odontológica.ReferênciasEmami E, Souza RF, Kabawat M, Feine JS. The impact of edentulism on oral and general health. Int J Dent. 2013;2013:498305Williams SE, Slice DE. Influence of edentulism on human orbit and zygomatic arch shape. Clin anat. 2014;27(3):408-16.Brasil. Ministério da Saúde. Projeto SB Brasil 2010: Brasil Sorridente - A saúde bucal levada a sério. Brasília: Ministério da Saúde; 2010.Petersen PE. The World Oral Health Report 2003: continuous improvement of oral health in the 21st century – the approach of the WHO Global Oral Health Programme. Community Dent Oral Epidemiol. 2003;31(Suppl 1):3-23.Agostinho ACMG, Campos ML, Silveira JLGC. Edentulismo, uso de prótese e autopercepção de saúde bucal entre idosos. Rev odontol UNESP. 2015; 44(2):74-9.Di Fiori SR, Di Fiori M, Di Fiori AP. Atlas de prótese parcial removível. São Paulo: Santos; 2010.Telles D. Prótese total: convencional e sobre implantes. São Paulo: Santos; 2011.Carlsson GE, Omar R. The future of complete dentures in oral rehabilitation. A critical review. J Oral Rehabil. 2010;37(2):143-56.Mericske-Stern RD, Taylor TD, Belser U. Management of the edentulous patient. Clin Oral Implants Res. 2000;11(1):108-25.Telles D, Coelho AB. Próteses sobre implantes. Rio de Janeiro: SobreImplantes.com; 2006.Calvani L, Michalakis K, Hirayama H. The influence of full-arch implant-retained fixed dental prostheses on upper lip support and lower facial esthetics: preliminary clinical observations. Eur J Esthet Dent. 2007;2(4):420-28.Cooper LF. The current and future treatment of edentulism. J Prosthodont. 2009;18(2):116-22Thomason JM, Lund JP, Chehade A, Feine JS. Patient satisfaction with mandibular implant overdenture and conventional denture 6 months after delivery. Int J Prosthodont. 2003;16(5):467-73.Silva-Junior MF, Fonseca EP, Batista MJ, Sousa MLR. Spatial distribuition of tooth loss in a population of adults. RGO. 2017;65(2):115-20.Ettinger RL. Managing and treating the atrophic mandible. J Am Dent Assoc. 1993;124(7):234-41Lindquist TJ, Narhi TO, Ettinger RL. Denture duplication technique with alternative materials. J Prosthet Dent. 1997;77(1):97-8.Barros AWP, Porto E, Lima JFS, Brito NMSO, Soares RSC. Steps for biomodel acquisition through addtive manufacturing for health. RGO. 2016;64(4):442-6.Watamabe Y. Observation of horizontal mandibular positions in an edentulous patient using a digital gothic arch tracer: a clinical report. J Prosthet Dent. 2004;91(1):15-9.Williamson RA, Williamson AE, Bowley J, Toothaker R. Maximizing mandibular prosthesis stability utilizing linear occlusion, occlusal plane selection, and centric recording. J Prosthodont. 2004;13(1):55-61.Paixão F, Silva WAB, Silva FA, Ramos GG, Cruz MVJ. Evaluation of the reproducibility of two techniques used to determine and record centric relation in Angle's class I patients. J Appl Oral Sci. 2007;15(4):275-79.Duncan JP, Taylor TD. Simplified complete dentures. Dent Clin North Am. 2004; 48(3):25-40.Nascimento DFF, Patto RBL, Marchini L, Cunha VPP. Double-nlind study for evaluation of complete dentures made by two techniques with and without face-bow. Braz J Oral Sci. 2004;3(9):439-45.Kawai Y, Murakami H, Takanashi Y, Lund JP, Feine JS. Efficient resource use in simplified complete denture fabrication. J Prosthodont. 2010;19(7):512-16.Heydecke G, Vogeler M, Wolkewitz M, Türp JC, Strub JR. Simplified versus comprehensive fabrication of complete dentures: patient ratings of denture satisfaction from a randomized crossover trial. Quintessence Int. 2008;39(2):107-16.Duncan JP, Taylor TD. Teaching an abbreviated impression technique for complete dentures in an undergraduate dental curriculum. J Prosthet Dent. 2001;85(2):121-25.Heydecke G, Akkad AS, Wolkewitz M, Vogeler M, Türp JC, Strub JR. Patient ratings of chewing ability from a randomised crossover trial: lingualised vs. first premolar/canine-guided occlusion for complete dentures. Gerodontology. 2007;24(2):77-86.Ansari IH. A one-appointment impression and centric relation record technique for compromised complete denture patients. J Prosthet Dent. 1997;78(3):320-23.Davis DM, Watson RM. A retrospective study comparing duplication and conventionally made complete dentures for a group of elderly people. Br Dent J. 1993;175(2):57-60.Clark RfK. The future of teaching of complete denture construction to undergraduates. Br Dent J. 2002;193(1):13-4.Ellis JS, Pelekis ND, Thomason JM. Conventional rehabilitation of edentulous patients: the impact on oral health-related quality of life and patient satisfaction. J Prosthodont. 2007;16(1):37-42.Rodrigues AHC, Morgano SM. An expedited technique for remaking a single complete denture for an edentulous patient. J Prosthet Dent. 2007;98(3):232-34.Tamaki T. Dentaduras completas, 4. ed. São Paulo: Sarvier; 1983.Reis JMSN, Perez LECP, Nogueira S, Ariolli Filho JN, Moll Júnior FA. Moldagem em prótese total: uma revisão de literatura. RFO. 2007;12(1):70-4.Bonachela WC, Rosseti PHO. Overdentures: das raízes implantadas osseointegrados - planejamentos, tendências e inovações. São Paulo: Santos; 2002.Telles D. Prótese total - convencional e sobre implantes. 2. ed. São Paulo: Santos; 2010.Felton DA, Cooper LF, Scurria MS. Predictable impression procedures for complete dentures. Dent Clin North Am. 1996; 40(1):39-51.Lee RE. Mucostatics. Dent Clin North Am. 1980; 24(1):81-96.DeFranco RL, Sallustio A. An impression procedure for the severely atrophied mandibule. J Prosthet Dent. 1995;73(6):574-77.Tripathi A, Singh SV, Aggarwal H, Gupta A. Effect of mucostatic and selective pressure impression techniques on residual ridge resorption in individuals with different bone mineral densities: A prospective clinical pilot study. J Prosthet Dent. 2019;121(1):90-4.Levin BL. Impressions for complete dentures. Chicago: Quintessence; 1984.Turano JC, Turano LM. Consertos e Reembasamentos. Fundamentos da prótese total, 7.ed. São Paulo: Santos; 2004.Caputi S, Murmura G, Ricci L, Varvara G, Sinjari B. Immediate denture fabrication: a clinical report. Ann Stomatol (Roma). 2013;4(3-4):273-77.Seals Jr RR, Kuebker WA, Stewart KL. Immediate complete dentures. Dent Clin North Am. 1996; 40(1):151-67.Cerveira Neto H. Prótese total imediata. 2. ed. São Paulo: Pancast Editorial; 1987.Marchini L, Santos JFF, Cunha VPP. Prótese total imediata: considerações clínicas. Robrac. 2000;9(27):45-9.Wagner AG. Making duplicate dentures for use as final impression trays. J Prosthet Dent. 1970;24(1):111-13.Anusavice KJ. Phillips: materiais dentários. 10.ed. Rio de Janeiro: Guanabara Koogan;1998.Elie E. Daou. The elastomers for complete denture impression: a review of the literature. Saudi Dent J. 2010;22(4):153-60.Goldfogel M, Harvey WL, Winter D.Dimensional change of acrylic resin tray materials. J Prosthet Dent. 1985;54(2):284-86.Pagniano RP, Scheid RC, Clowson RL, Dagefoerde RO, Zardiackas LD. Linear dimensional change of acrylic resins used in the fabrication of custom trays. J Prosthet Dent. 1982;47(3):279-83.

33

Lombard, Kara-Jane. "“To Us Writers, the Differences Are Obvious”." M/C Journal 10, no.2 (May1, 2007). http://dx.doi.org/10.5204/mcj.2629.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Introduction It appears that graffiti has begun to clean up its act. Escalating numbers of mature graffiti writers feel the removal of their graffiti has robbed them of a history, and are turning to legal projects in an effort to restore it. Phibs has declared the graffiti underground “limited” and Kano claims its illegal aspect no longer inspires him (Hamilton, 73). A sign of the times was the exhibition Sake of Name: Australian Graffiti Now which opened at the Wharf 2 Theatre in January 2001. The exhibition was commissioned by the Sydney Theatre Company and comprised twenty-two pieces painted by graffiti writers from around Australia. Keen to present a respectable image, writers rejected the original title of Bomb the Wharf, as they felt it focused on the negative aspects of the culture (Andrews, 2). Premier Bob Carr opened the exhibition with the declaration that there is a difference between “graffiti art” and “graffiti vandalism”. The Premier’s stance struck a discordant note with Tony Stevens, a twenty-three-year veteran graffiti cleaner. Described by the Sydney Morning Herald as an “urban art critic by default,” Stevens could see no distinction between graffiti art and vandalism (Leys, 1). Furthermore, he expressed his disappointment that the pieces had “no sense of individuality … it could be graffiti from any American city” (Stevens, 1). As far as Stevens could see, Australian graffiti expressed nothing of its Australian context; it simply mimicked that of America. Sydney Theatre Company director Benedict Andrews responded with a venomous attack on Stevens. Andrews accused the cleaner of being blinded by prejudice (1), and felt that years of cleaning texta tags from railway corridors could not have possibly qualified Stevens as an art critic (3). “The artists in this exhibition are not misfits,” Andrews wrote (2). “They are serious artists in dialogue with their culture and the landscapes in which they live” (2). He went on to hail the strength and diversity of the Australian graffiti scene: “it is a vital and agile international culture and in Australia has evolved in specific ways” (1). The altercation between Stevens and Andrews pointed to one of the debates concerning Australian graffiti: whether it is unique or simply imitative of the American form. Hinged on the assessment of graffiti as vandalism is the view that graffiti is dirty, a disease. Proponents of this view consider graffiti to be an undifferentiated global phenomenon. Others conceive of graffiti as art, and as such argue that it is expressive of local experiences. Graffiti writers maintain that graffiti is expressive of local experiences and they describe it in terms of regional styles and aesthetics. This article maps the transformation of hip hop graffiti as it has been disseminated throughout the world. It registers the distinctiveness of graffiti in Australia and argues that graffiti is not a globally hom*ogenous form, but one which develops in a locally specific manner. Writing and Replicating: Hip Hop Graffiti and Cultural Imperialism Contemporary graffiti subcultures are strongly identified with large American cities. Originating in the black neighbourhood cultures of Philadelphia and New York City in the late 1960s and early 1970s, hip hop graffiti emerged as part of a larger, homegrown, alternative youth culture (“Urban Graffiti”, 77). Before the end of the 1970s, the aesthetic codes and stylised images of hip hop graffiti began to disseminate to major cities across America and throughout the globe. Its transmission was facilitated by: the production and export of films such as Style Wars (Silver and Chalfant, 1983) and Wild Style (Ahearn, 1983); the covers of rap albums; graffiti magazines; art dealers; and style manuals such as Subway Art (Cooper and Chalfant) and Spraycan Art (Chalfant and Prigroff). Graffiti migrated to Australian shores during the early 1980s, gaining influence through the appearance of these seminal works, which are credited by many as having inspired them to pick up a can of spraypaint. During its larval stages, the subcultural codes of graffiti invented by American writers were reiterated in an Australian context. Australian graffiti writers poached the vocabulary and rhetoric invented by their American counterparts. Writers spoke of “getting up”, “getting fame” and their “crew”, classifying their work as “tags”, “pieces”, or “throw ups”. They utilised the same bubble letters, and later, the incomprehensible “wildstyle” originally devised by American writers. It was not long, however, before Australian writers were making their own innovations and developing a unique style. Despite this, there is still widespread conviction in the view that Australian graffiti is a replica of an American cultural form. This view is supported at a theoretical level by the concept of cultural imperialism. It is generally understood, at a basic level, to be the diffusion of a foreign culture at the expense of a local culture. The concept has been usefully clarified by John Tomlinson. Since there are various orders of power involved in allegations of cultural imperialism, Tomlinson attempts to resist some implicit “master narrative” of the term, accounting for cultural imperialism in a multidimensional fashion (20). He outlines five possible versions, which inflect cultural imperialism to mean cultural domination; a discourse of nationality; media imperialism; global capital; and modernity (19-28). The idea that Australian graffiti replicates American graffiti draws particularly on the first two versions—that of cultural imperialism as cultural domination, and the discourse of nationality. Both these approaches focus on the processes involved in cultural imperialism—“the invasion of an indigenous culture by a foreign one” (Tomlinson, 23). Many people I spoke to about graffiti saw it as evidence of foreign, particularly American, domination and influence over Australian culture. They expressed concern that the appearance of graffiti would signal an influx of “American” problems: gang activity, escalating violence and social disorder. Cultural imperialism as a discourse of nationality hinges on the concepts of “belonging” and “indigenous culture”. In a conference organised by the Graffiti Program of the Government of Western Australia, Senator Ian Campbell argued that graffiti had no place in Australia. He felt that, “there should be little need for social comment through the vandalism of other’s property. Perhaps in nations where … freedoms are not recognised … but not in Australia” (6). Tomlinson argues that the conceptions of cultural imperialism as both cultural domination and as a discourse of nationality are popular because of their highly ambiguous (and thus accommodating) nature (19, 23). However, both notions are problematic. Tomlinson immediately dismisses the notion of cultural imperialism as cultural domination, arguing that one should aim for specificity. “Imperialism” and “domination” are rather general notions, and as such both have sufficient conceptual breadth and ambiguity to accommodate most uses to which they might be put (19). Cultural imperialism as a discourse of nationality is similarly problematic, relying on the precise definitions of a series of terms—such as belonging, and indigenous culture—which have multiple inflections (24). Cultural imperialism has often been tracked as a process of hom*ogenisation. Conceiving of cultural imperialism as hom*ogenisation is particularly pertinent to the argument for the global hom*ogeneity of graffiti. Cultural hom*ogenisation makes “everywhere seem more or less the same,” assuming a global uniformity which is inherently Western, and in extreme cases, American (6). The implications of “Americanisation” are relevant to the attitudes of Australian graffiti writers. On the Blitzkrieg Bulletin Board—an internet board for Australian graffiti writers—I found evidence of a range of responses to “Americanisation” in Australian graffiti. One of the writers had posted: “you shouldn’t even be doing graff if you are a toy little kid, buying export paint and painting legal walls during the day … f*** all y’all nigg*z!” s3 replied, “I do know that modern graffiti originated in America but … token are you American? Why do you want to talk like an American gangsta rapper?” The global currency of graffiti is one in which local originality and distinctiveness are highly prized. It is a source of shame for a writer to “bite”. Many of the writers I spoke to became irate when I suggested that Australian styles “bit” those of America. It seems inconsistent that Australian graffiti writers would reproduce American graffiti, if they do not even tolerate Australian writers using the word “nigg*”. Like the argument that Australian graffiti replicates that of America, the concept of cultural imperialism is problematic. By the 1970s the concept was beginning to come apart at the seams, its “artificial coherence” exposed when subjected to a range of applications (Tomlinson, 8). Although the idea of cultural imperialism has been discredited and somewhat abandoned at the level of theory, the concept nonetheless continues to guide attitudes towards graffiti. Jeff Ferrell has argued that the interplay of cultural resources involved in worldwide graffiti directly locates it inside issues of cultural imperialism (“Review of Moscow Graffiti”, paragraph 5). Stylistic and subcultural consistencies are mobilised to substantiate assertions of the operation of cultural imperialism in the global form of graffiti. This serves to render it globally hom*ogeneous. While many graffiti writers would concede that graffiti maintains certain global elements, few would agree that this is indicative of a global hom*ogeneity of form. As part of the hip hop component of their website, Triple J conducted an investigation into graffiti. It found that “the graffiti aesthetic developed in New York has been modified with individual characteristics … and has transformed into a unique Australian style” (“Old Skool”, paragraph 6). Veteran writers Umph, Exit, Phibs and Dmote agree. Perth writer Zenith claims, “we came up with styles from the US back in the day and it has grown into something quite unique” (personal communication). Exit declares, “every city has its own particular style. Graffiti from Australia can easily be distinguished by graffiti artists. Australia has its own particular style” (1). Umph agrees: “to us writers, the differences are obvious” (2). Although some continue to perceive Australian graffiti as replicating that of America, it appears that this is no longer the case. Evidence has emerged that Australian graffiti has evolved into a unique and localised form, which no longer imitates that of America. “Going Over” Cultural Imperialism: Hip Hop Graffiti and Processes of Globalisation The argument that graffiti has developed local inflections has lately garnered increasing support due to new theories of global cultural interaction and exchange. The modern era has been characterised by the increasing circulation of goods, capital, knowledge, information, people, images, ideologies, technologies and practices across national borders and territorial boundaries (Appadurai, 230; Scholte, 10). Academic discussion of these developments has converged in recent years around the concept of “globalisation”. While cultural imperialism describes these movements as the diffusion of a foreign culture at the expense of a local one, globalisation interprets these profound changes as evidence of “a global ecumene of persistent cultural interaction and exchange” (Hannerz, 107). In such a view, the globe is not characterised by domination and hom*ogenisation (as with cultural imperialism), but more in terms of exchange and heterogeneity. Recent studies acknowledge that globalisation is complex and multidimensional (Giddens, 30; Kalb, 1), even a process of paradoxes (Findlay, 30). Globalisation is frequently described in terms of contradictory processes—universalisation vs. particularisation, hom*ogenisation vs. differentiation, integration vs. fragmentation. Another of these dialectical tendencies is that of localisation. Kloos defines localisation as representing “the rise of localised, culturally defined identities … localisation stresses sociocultural specificity, in a limited space” (281). While localisation initially appears to stand in opposition to globalisation, the concepts are actually involved in a dialectical process (Giddens, 64). The relationship between localisation and globalisation has been formulated as follows: “Processes of globalisation trigger identity movements leading to the creation of localised, cultural-specific, identities” (Kloos, 282). The development of localisation is particularly pertinent to this study of graffiti. The concept allows for local diversity and has led to the understanding that global cultural phenomena are involved in a process of exchange. Work around globalisation lends credence to the argument that, as graffiti has disseminated throughout the globe, it has mutated to the specific locale within which it exists. Graffiti has always been locally specific: from the early stages which witnessed writers such as Julio 204, Fran 207 and Joe 136 (the numbers referred to their street), to the more recent practice of suffixing tag names with the name of a writers’ crew and their area code. The tendency to include area codes has been largely abandoned in Australia as the law has responded to graffiti with increasing vigilance, but evolutions in graffiti have pointed towards the development of regionally specific styles which writers have come to recognise. Thus, graffiti cannot be thought of as a globally hom*ogenous form, nor can it be said that Australian graffiti replicates that of America. As hip hop has circulated throughout the globe it has appeared to adopt local inflections, having adapted into something quite locally distinctive. In a sense hip hop has been “translated” to particular circ*mstances. It is now appropriate to consider Australian hip hop and graffiti as a translation of a global cultural phenomenon. A useful reference in this regard is Yuri Lotman, who designates dialogue as the elementary mechanism of translation (143). He suggests that participants involved in a dialogue alternate between a position of “transmission” and “reception” (144). Hence cultural developments are cyclical, and relationships between units—which may range from genres to national cultures—pass through periods of “transmission” and “reception” (144). Lotman proposes that the relationship between structures follows a pattern: at first, a structure will appear in decline, static, unoriginal. He records these “intermissions” as “pauses in dialogue”, during which the structure absorbs influences from the outside (144). When saturation reaches a certain limit, the structure begins producing its own texts as its “passive state changes to a state of alertness” (145). This is a useful way of comprehending Australian hip hop culture. It appears that the Australian hip hop scene has left behind its period of “reception” and is now witnessing one of “transmission” in which it is producing uniquely Australian flavours and styles. Of the contemporary graffiti I have observed, it appears that Australian writing is truly distinctive. Australian writers may have initially poached the subcultural codes developed by their American counterparts, however Australia has evolved to be truly unique where it counts—in graffiti styles. Distinctive graffiti styles can be witnessed, not only between different continents, but also within geographic locations. American graffiti registers a variety of locally specific forms. New York remains devoted to the letter, while graffiti on the west coast of America is renowned for its gang writing. American lettering styles tend to develop existing styles. New York wildstyle is easily recognised, and differs from letters in the Bay Area and San Francisco, which feature arrows inside the letters. While American graffiti is by and large concerned with letters, Australia has gained some repute for its exploration of characters. Like American writers, Australians employ characters poached from popular culture, but for the most part Australian writers employ characters and figures that they have invented themselves, often poaching elements from a wide variety of sources and utilising a wide variety of styles. Marine imagery, not usually employed in American graffiti, recurs in Australian pieces. Kikinit in the Park, a youth festival held in Fremantle in March 2001, featured a live urban art display by Bugszy Snaps, who combined oceanic and graffiti iconography, fusing sea creatures with spraypaint cans. Phibs also “uses images from the sea a lot” (Hamilton, 73), having grown up at the beach. In spite of this focus on the development of characters and images, Australia has not neglected the letter. While initially Australian graffiti artists imitated the styles developed in America, Australian lettering has evolved into something exceptional. Some writers have continued to employ bubble letters and wildstyle, and Australia has kept up with modifications in wildstyle that has seen it move towards 3D. Australia has cultivated this form of traditional wildstyle, elevating it to new heights. Sometimes it is combined with other styles; other times it appears as controlled wildstyle—set around a framework of some sort. In other instances, Australia has charted new territory with the letter, developing styles that are completely individual. Australian writing also blends a variety of lettering and graphic styles, combining letters and figures in new and exciting ways. Australian graffiti often fuses letters with images. This is relatively rare in American graffiti, which tends to focus on lettering and, on the whole, utilises characters to less effect than Australian graffiti. Conclusion Graffiti is not a globally hom*ogeneous form, but one which has developed in locally specific and distinctive ways. As hip hop graffiti has circulated throughout the globe it has been translated between various sites and developed local inflections. In order to visualise graffiti in this manner, it is necessary to recognise theories of cultural imperialism as guiding the widespread belief that graffiti is a globally hom*ogeneous form. I have refuted this view and the worth of cultural imperialism in directing attitudes towards graffiti, as there is a valid foundation for considering the local distinctiveness of Australian graffiti. By engaging critically with literature around globalisation, I have established a theoretical base for the argument that graffiti is locally specific. Envisaging the global form of hip hop graffiti as translated between various sites and having developed in locally specific ways has exposed the study of graffiti outside of the United States. Current writings on cultural studies and graffiti are dominated by the American academy, taking the United States as its centre. In rectifying this imbalance, I stress the need to recognise the distinctiveness of other cultures and geographic locations, even if they appear to be similar. While writers across Australia argue that their locations produce original styles, few have been willing to expound on how their scene is “fresh”. One writer I spoke with was an exception. Zenith explained that: “the way we are original is that our style has developed for so long, fermented if you will, because of Perth being so damned isolated” (personal communication). He went on to say: “I also happen to feel that we’re losing the originality every second of every day, for a number of reasons … with web sites, videos, magazines, and all this type of graffito affiliated stuff” (personal communication). Hip hop graffiti culture is one in which communication and exchange is of central concern. The circulation of this “graffito affiliated stuff”—websites, graffiti magazines, videos, books—as well as the fact that aerosol artists frequently travel to other cities and countries to write, demonstrates that this is a culture which, although largely identified with America, is also global in reach. This global interaction and exchange is increasingly characterised by a complex relationship which involves imitation and adaptation. Glossary Bite To copy another graffiti writer’s style Crew Organised group of graffiti writers Getting up Successful graffiti endeavour; to graffiti Going over To graffiti over another’s graffiti Piece The most sophisticated kind of graffiti, which includes characters, words and phrases Tag A stylised version of a signature; the most basic form of graffiti Throw up Two-dimensional version of a tag Wildstyle Style of graffiti characterised by interlocking letters and arrows Writer Graffiti artist; one who does graffiti References Andrews, Benedict. “If a Cleaner Can Review Graffiti Art, Then …” Sydney Morning Herald 15 Jan. 2001. 15 August 2001 http://www.smh.com.au/news/0101/15/features/features8.html>. Appadurai, Arjun. “Globalization and the Research Imagination.” International Social Science Journal 51.2 (1999): 229-38. Campbell, Ian. “The National Perspective.” Dealing with Graffiti. Ed. Graffiti Program, Government of Western Australia: Perth, 1997: 6-7. Chalfant, Henry, and James Prigroff. Spraycan Art. London: Thames & Hudson, 1987. Cooper, Martha, and Henry Chalfant. Subway Art. London: Thames & Hudson, 1984. “Exit”. n.d. [1998]. 18 Jul. 2001 http://loud.net.au/projects/digit/garry/exit.htm>. Ferrell, Jeff. “Review of Moscow Graffiti: Language and Subculture.” Social Justice 20.3-4 (1993): 188 (15). ———. “Urban Graffiti: Crime, Control, and Resistance.” Youth and Society 27 (1995-6): 73-87. Findlay, Mark. The Globalization of Crime: Understanding Transitional Relationships in Context. Cambridge: Cambridge UP, 1999. Giddens, Anthony. Runaway World: How Globalization Is Reshaping our Lives. New York: Routledge, 2000. Hamilton, Kate. “Can in Hand.” Rolling Stone 590 (2001): 72-5. Hannerz, Ulf. “Scenarios for Peripheral Cultures.” Culture, Globalization and the World-System: Contemporary Conditions for the Representation of Identity. Ed. Anthony D. King. Houndmills: Macmillan, 1991. 107-28. Kalb, Don. “Localizing Flows: Power, Paths, Institutions, and Networks.” The Ends of Globalization: Bringing Society Back In. Ed. Don Kalb. Boston: Rowman and Littlefield Publishers, 2000. 1-29. Kloos, Peter. “The Dialectics of Globalization and Localization.” The Ends of Globalization: Bringing Society Back In. Ed. Don Kalb. Boston: Rowman and Littlefield, 2000. 281-97. Leys, Nick. “Graffiti Removalist Gives Art Installation a Spray.” Sydney Morning Herald 9 January 2001. 9 Jan. 2001. http://www.smh.com.au/news/0101/09/national/national15.html>. Lotman, Yuri. The Universe of the Mind: A Semiotic Theory of Culture. Bloomington, IN: Indiana UP, 1990. “Old Skool.” Triple J. 2001. 18 Jul. 2001 http://www.abc.net.au/triplej/arts/graff/oldskool/default.htm>. s3. “Name & Email Supplied.” Online posting. 9 May 2004. Blitzkrieg Bulletin Board. 20 July 2001 http://network54.com/Forum>. Scholte, Jan Aarte. “Globalisation: Prospects For a Paradigm Shift.” Politics and Globalisation: Knowledge, Ethics and Agency. Ed. Martin Shaw. London: Routledge, 1999. 9-22. Stevens, Tony. “It’s Vandalism, It’s Illegal and It Causes Anguish and Frustration.” Sydney Morning Herald 5 Feb. 2001. 4 Mar. 2001 http://www.smh.com.au/news/0102/05/features/features10.html>. Style Wars. Dir. Tony Silver and Henry Chalfant. 1983. DVD. Passion River, 2005. Token. “F*** You Little Kids!” Online posting. 5 May 2000. Blitzkrieg Bulletin Board. 20 Jul. 2001 http://network54.com/Forum>. Tomlinson, John. Cultural Imperialism: A Critical Introduction. London: Pinter Publishers, 1991. Umph. n.d. [1998]. 18 Jul. 2001. http://loud.net.au/projects/digit/garry/umph.htm>. Wild Style. Dir. Charlie Ahearn. 1983. DVD. Rhino Theatrical, 2002. Citation reference for this article MLA Style Lombard, Kara-Jane. "“To Us Writers, the Differences Are Obvious”: The Adaptation of Hip Hop Graffiti to an Australian Context." M/C Journal 10.2 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0705/05-lombard.php>. APA Style Lombard, K. (May 2007) "“To Us Writers, the Differences Are Obvious”: The Adaptation of Hip Hop Graffiti to an Australian Context," M/C Journal, 10(2). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0705/05-lombard.php>.

34

Wolbring, Gregor. "A Culture of Neglect: Climate Discourse and Disabled People." M/C Journal 12, no.4 (August28, 2009). http://dx.doi.org/10.5204/mcj.173.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Introduction The scientific validity of climate change claims, how to intervene (if at all) in environmental, economic, political and social consequences of climate change, and the adaptation and mitigation needed with any given climate change scenario, are contested areas of public, policy and academic discourses. For marginalised populations, the climate discourses around adaptation, mitigation, vulnerability and resilience are of particular importance. This paper considers the silence around disabled people in these discourses. Marci Roth of the Spinal Cord Injury Association testified before Congress in regards to the Katrina disaster: [On August 29] Susan Daniels called me to enlist my help because her sister in-law, a quadriplegic woman in New Orleans, had been unsuccessfully trying to evacuate to the Superdome for two days. […] It was clear that this woman, Benilda Caixetta, was not being evacuated. I stayed on the phone with Benilda, for the most part of the day. […] She kept telling me she’d been calling for a ride to the Superdome since Saturday; but, despite promises, no one came. The very same paratransit system that people can’t rely on in good weather is what was being relied on in the evacuation. […] I was on the phone with Benilda when she told me, with panic in her voice “the water is rushing in.” And then her phone went dead. We learned five days later that she had been found in her apartment dead, floating next to her wheelchair. […] Benilda did not have to drown. (National Council on Disability, emphasis added) According to the Intergovernmental Panel on Climate Change (IPCC), adaptation is the “Adjustment in natural or human systems in response to actual or expected climatic stimuli or their effects, which moderates harm or exploits beneficial opportunities” (IPCC, Climate Change 2007). Adaptations can be anticipatory or reactive, and depending on their degree of spontaneity they can be autonomous or planned (IPCC, Fourth Assessment Report). Adaptations can be private or public (IPCC, Fourth Assessment Report), technological, behavioural, managerial and structural (National Research Council of Canada). Adaptation, in the context of human dimensions of global change, usually refers to a process, action or outcome in a system (household, community, group, sector, region, country) in order for that system to better cope with, manage or adjust to some changing condition, stress, hazard, risk or opportunity (Smit and Wandel). Adaptation can encompass national or regional strategies as well as practical steps taken at the community level or by individuals. According to Smit et al, a framework for systematically defining adaptations is based on three questions: (i) adaptation to what; (ii) who or what adapts; and (iii) how does adaptation occur? These are essential questions that have to be looked at from many angles including cultural and anthropological lenses as well as lenses of marginalised and highly vulnerable populations. Mitigation (to reduce or prevent changes in the climate system), vulnerability (the degree to which a system is susceptible to, and unable to cope with, the adverse effects of climate change), and resilience (the amount of change a system can undergo without changing state), are other important concepts within the climate change discourse. Non-climate stresses can increase vulnerability to climate change by reducing resilience and can also reduce adaptive capacity because of resource deployment to competing needs. Extending this to the context of disabled people, ableism (sentiment to expect certain abilities within humans) (Wolbring, “Is there an end to out-able?”) and disablism (the unwillingness to accommodate different needs) (Miller, Parker and Gillinson) are two concepts that will thus play themselves out in climate discourses. The “Summary for Policymakers” of the IPCC 2007 report, Climate Change 2007: Impacts, Adaptation and Vulnerability, states: “Poor communities can be especially vulnerable, in particular those concentrated in high-risk areas. They tend to have more limited adaptive capacities, and are more dependent on climate-sensitive resources such as local water and food supplies.” From this quote one can conclude that disabled people are particularly impacted, as the majority of disabled people live in poverty (Elwan). For instance, CARE International, a humanitarian organisation fighting global poverty, the UN Office for the Coordination of Humanitarian Affairs, and Maplecroft, a company that specialises in the calculation, analysis and visualisation of global risks, conclude: “The degree of vulnerability is determined by underlying natural, human, social, physical and financial factors and is a major reason why poor people—especially those in marginalised social groups like women, children, the elderly and people with disabilities—are most affected by disasters” (CARE International). The purpose of this paper is to expose the reader to (a) how disabled people are situated in the culture of the climate, adaptation, mitigation and resilience discourse; (b) how one would answer the three questions, (i) adaptation to what, (ii) who or what adapts, and (iii) how does adaptation occur (Smit et al), using a disabled people lens; and (c) what that reality of the involvement of disabled people within the climate change discourse might herald for other groups in the future. The paper contends that there is a pressing need for the climate discourse to be more inclusive and to develop a new social contract to modify existing dynamics of ableism and disablism so as to avoid the uneven distribution of evident burdens already linked to climate change. A Culture of Neglect: The Situation of Disabled People As climates changes, environmental events that are classified as natural disasters are expected to be more frequent. In the face of recent disaster responses, how effective have these efforts been as they relate to the needs and challenges faced by disabled people? Almost immediately after Hurricane Katrina devastated the Gulf Coast, the National Council on Disability (NCD) in the United States estimated that 155,000 people with disabilities lived in the three cities hardest hit by the hurricane (about 25 per cent of the cities’ populations). The NCD urged emergency managers and government officials to recognise that the need for basic necessities by hurricane survivors with disabilities was “compounded by chronic health conditions and functional impairments … [which include] people who are blind, people who are deaf, people who use wheelchairs, canes, walkers, crutches, people with service animals, and people with mental health needs.” The NCD estimated that a disproportionate number of fatalities were people with disabilities. They cited one statistic from the American Association of Retired Persons (AARP): “73 per cent of Hurricane Katrina-related deaths in New Orleans area were among persons age 60 and over, although they comprised only 15 per cent of the population in New Orleans.” As the NCD stated, “most of those individuals had medical conditions and functional or sensory disabilities that made them more vulnerable. Many more people with disabilities under the age of 60 died or were otherwise impacted by the hurricanes.” As these numbers are very likely linked to the impaired status of the elderly, it seems reasonable to assume similar numbers for non-elderly disabled people. Hurricane Katrina is but one example of how disabled people are neglected in a disaster (Hemingway and Priestley; Fjord and Manderson). Disabled people were also disproportionately impacted in other disasters, such as the 1995 Great Hanshin Earthquake in Japan (Nakamura) or the 2003 heatwave in France, where 63 per cent of heat-related deaths occurred in institutions, with a quarter of these in nursing homes (Holstein et al.). A review of 18 US heatwave response plans revealed that although people with mental or chronic illnesses and the homeless constitute a significant proportion of the victims in recent heatwaves, only one plan emphasised outreach to disabled persons, and only two addressed the shelter and water needs of the homeless (Ebi and Meehl; Bernhard and McGeehin). Presence of Disabled People in Climate Discourse Although climate change will disproportionately impact disabled people, despite the less than stellar record of disaster adaptation and mitigation efforts towards disabled people, and despite the fact that other social groups (such as women, children, ‘the poor’, indigenous people, farmers and displaced people) are mentioned in climate-related reports such as the IPCC reports and the Human Development Report 2007/2008, the same reports do not mention disabled people. Even worse, the majority of the material generated by, and physically set up for, discourses on climate, is inaccessible for many disabled people (Australian Human Rights Commission). For instance, the IPCC report, Climate Change 2007: Impacts, Adaptation and Vulnerability, contains Box 8.2: Gender and natural disasters, makes the following points: (a) “men and women are affected differently in all phases of a disaster, from exposure to risk and risk perception; to preparedness behaviour, warning communication and response; physical, psychological, social and economic impacts; emergency response; and ultimately to recovery and reconstruction”; (b) “natural disasters have been shown to result in increased domestic violence against, and post-traumatic stress disorders in, women”; and (c) “women make an important contribution to disaster reduction, often informally through participating in disaster management and acting as agents of social change. Their resilience and their networks are critical in household and community recovery.” The content of Box 8.2 acknowledges the existence of different perspectives and contributions to the climate discourse, and that it is beneficial to explore these differences. It seems reasonable to assume that differences in perspectives, contributions and impact may well also exist between people with and without disabilities, and that it may be likewise beneficial to explore these differences. Disabled people are differently affected in all phases of a disaster, from exposure to risk and risk perception; to preparedness behaviour, warning communication and response; physical, psychological, social and economic impacts; emergency response; and ultimately to recovery and reconstruction. Disabled people could also make an important contribution to disaster reduction, often informally through participating in disaster management and acting as agents of social change. Their resilience and their networks are critical in household and community recovery, important as distributors of relief efforts and in reconstruction design. The Bonn Declaration from the 2007 international conference, Disasters are always Inclusive: Persons with Disabilities in Humanitarian Emergency Situations, highlighted many problems disabled people are facing and gives recommendations for inclusive disaster preparedness planning, for inclusive response in acute emergency situations and immediate rehabilitation measures, and for inclusive post-disaster reconstruction and development measures. Many workshops were initiated by disabled people groups, such as Rehabilitation International. However, the disabled people disaster adaptation and mitigation discourse is not mainstreamed. Advocacy by people with disability for accessible transport and universal or “life-cycle” housing (among other things) shows how they can contribute significantly to more effective social systems and public facilities. These benefit everyone and help to shift public expectations towards accessible and flexible amenities and services—for example, emergency response and evacuation procedures are much easier for all if such facilities are universally accessible. Most suggestions by disabled people for a more integrative, accessible physical environment and societal attitude benefit everyone, and gain special importance with the ever-increasing proportion of elderly people in society. The IPCC Fourth Assessment Report is intended to be a balanced assessment of current knowledge on climate change mitigation. However, none of the 2007 IPCC reports mention disabled people. Does that mean that disabled people are not impacted by, or impact, climate change? Does no knowledge of adaptation, mitigation and adaptation capacity from a disabled people lens exist, or does the knowledge not reach the IPCC, or does the IPCC judge this knowledge as irrelevant? This culture of neglect and unbalanced assessment of knowledge evident in the IPCC reports was recognised before for rise of a ‘global’ climate discourse. For instance, a 2001 Canadian government document asked that research agendas be developed with the involvement of, among others, disabled people (Health Canada). The 2009 Nairobi Declaration on Africa’s response to climate change (paragraph 36) also asks for the involvement of disabled people (African Ministerial Conference on the Environment). However, so far nothing has trickled up to the international bodies, like the IPCC, or leading conferences such as the United Nations Climate Change Conference Copenhagen 2009. Where Will It End? In his essay, “We do not need climate change apartheid in adaptation”, in the Human Development Report 2007/2008, Archbishop Desmond Tutu suggests that we are drifting into a situation of global adaptation apartheid—that adaptation becomes a euphemism for social injustice on a global scale (United Nations Development Programme). He uses the term “adaptation apartheid” to highlight the inequality of support for adaptation capacity between high and low income countries: “Inequality in capacity to adapt to climate change is emerging as a potential driver of wider disparities in wealth, security and opportunities for human development”. I submit that “adaptation apartheid” also exists in regard to disabled people, with the invisibility of disabled people in the climate discourse being just one facet. The unwillingness to accommodate, to help the “other,” is nothing new for disabled people. The ableism that favours species-typical bodily functioning (Wolbring, “Is there an end to out-able?”; Wolbring, “Why NBIC?”) and disablism (Miller, Parker, and Gillinson)—the lack of accommodation enthusiasm for the needs of people with ‘below’ species-typical body abilities and the unwillingness to adapt to the needs of “others”—is a form of “adaptation apartheid,” of accommodation apartheid, of adaptation disablism that has been battled by disabled people for a long time. In a 2009 online survey of 2000 British people, 38 per cent believed that most people in British society see disabled people as a “drain on resources” (Scope). A majority of human geneticist concluded in a survey in 1999 that disabled people will never be given the support they need (Nippert and Wolff). Adaptation disablism is visible in the literature and studies around other disasters. The 1988 British Medical Association discussion document, Selection of casualties for treatment after nuclear attack, stated “casualties whose injuries were likely to lead to a permanent disability would receive lower priority than those expected to fully recover” (Sunday Morning Herald). Famine is seen to lead to increased infanticide, increased competitiveness and decreased collaboration (Participants of the Nuclear Winter: The Anthropology of Human Survival Session). Ableism and disablism notions experienced by disabled people can now be extended to include those challenges expected to arise from the need to adapt to climate change. It is reasonable to expect that ableism will prevail, expecting people to cope with certain forms of climate change, and that disablism will be extended, with the ones less affected being unwilling to accommodate the ones more affected beyond a certain point. This ableism/disablism will not only play itself out between high and low income countries, as Desmond Tutu described, but also within high income countries, as not every need will be accommodated. The disaster experience of disabled people is just one example. And there might be climate change consequences that one can only mitigate through high tech bodily adaptations that will not be available to many of the ones who are so far accommodated in high income countries. Desmond Tutu submits that adaptation apartheid might work for the fortunate ones in the short term, but will be destructive for them in the long term (United Nations Development Programme). Disability studies scholar Erik Leipoldt proposed that the disability perspective of interdependence is a practical guide from the margins for making new choices that may lead to a just and sustainable world—a concept that reduces the distance between each other and our environment (Leipoldt). This perspective rejects ableism and disablism as it plays itself out today, including adaptation apartheid. Planned adaptation involves four basic steps: information development and awareness-raising; planning and design; implementation; and monitoring and evaluation (Smit et al). Disabled people have important knowledge to contribute to these four basic steps that goes far beyond their community. Their understanding and acceptance of, for example, the concept of interdependence, is just one major contribution. Including the concept of interdependence within the set of tools that inform the four basic steps of adaptation and other facets of climate discourse has the potential to lead to a decrease of adaptation apartheid, and to increase the utility of the climate discourse for the global community as a whole. References African Ministerial Conference on the Environment. Nairobi Declaration on the African Process for Combating Climate Change. 2009. 26 Aug. 2009 ‹ http://www.unep.org/roa/Amcen/Amcen_Events/3rd_ss/Docs/nairobi-Decration-2009.pdf ›. American Association of Retired Persons. We Can Do Better: Lessons Learned for Protecting Older Persons in Disasters. 2009. 26 Aug. 2009 ‹ http://assets.aarp.org/rgcenter/il/better.pdf ›. Australian Human Rights Commission. “Climate Change Secretariat Excludes People with Disabilities.” 2008. 26 Aug. 2009 ‹ http://www.hreoc.gov.au/about/media/media_releases/2008/95_08.html ›. Bernhard, S., and M. McGeehin. “Municipal Heatwave Response Plans.” American Journal of Public Health 94 (2004): 1520-21. CARE International, the UN Office for the Coordination of Humanitarian Affairs, and Maplecroft. Humanitarian Implications of Climate Change: Mapping Emerging Trends and Risk Hotspots for Humanitarian Actors. CARE International, 2008. 26 Aug. 2009 ‹ http://www.careclimatechange.org/files/reports/Human_Implications_PolicyBrief.pdf ›, ‹ http://www.careclimatechange.org/files/reports/CARE_Human_Implications.pdf ›. "Disasters Are Always Inclusive: Persons with Disabilities in Humanitarian Emergency Situations." Bonn Declaration from the International Conference: Disasters Are Always Inclusive: Persons with Disabilities in Humanitarian Emergency Situations. 2007. 26 Aug. 2009 ‹ http://www.disabilityfunders.org/webfm_send/6, http://www.disabilityfunders.org/emergency_preparedness ›, ‹ http://bezev.de/bezev/aktuelles/index.htm ›. Ebi, K., and G. Meehl. Heatwaves and Global Climate Change: The Heat Is On: Climate Change and Heatwaves in the Midwest. 2007. 26 Aug. 2009 ‹ www.pewclimate.org/docUploads/Regional-Impacts-Midwest.pdf ›. Elwan, A. Poverty and Disability: A Survey of the Literature. Worldbank, Social Protection Discussion Paper Series (1999): 9932. 26 Aug. 2009 ‹ http://siteresources.worldbank.org/DISABILITY/Resources/Poverty/Poverty_and_Disability_A_Survey_of_the_Literature.pdf ›. Fjord, L., and L. Manderson. “Anthropological Perspectives on Disasters and Disability: An Introduction.” Human Organisation 68.1 (2009): 64-72. Health Canada. First Annual National Health and Climate Change Science and Policy Research Consensus Conference: How Will Climate Change Affect Priorities for Your Health Science and Policy Research? Health Canada, 2001. 26 Aug. 2009 ‹ http://www.hc-sc.gc.ca/ewh-semt/pubs/climat/research-agenda-recherche/population-eng.php ›. Hemingway, L., and M. Priestley. “Natural Hazards, Human Vulnerability and Disabling Societies: A Disaster for Disabled People?” The Review of Disability Studies (2006). 26 Aug. 2009 ‹ http://www.rds.hawaii.edu/counter/count.php?id=13 ›. Holstein, J., et al. “Were Less Disabled Patients the Most Affected by the 2003 Heatwave in Nursing Homes in Paris, France?” Journal of Public Health Advance 27.4 (2005): 359-65. Intergovernmental Panel on Climate Change. Climate Change 2007: Impacts, Adaptation and Vulnerability. 2007. 26 Aug. 2009 ‹ http://www.ipcc.ch/publications_and_data/publications_ipcc_fourth_assessment_report_wg2_report_impacts_adaptation_and_vulnerability.htm ›. Intergovernmental Panel on Climate Change. “Summary for Policymakers.” Eds. O. F. Canziani, J. P. Palutikof, P. J. van der Linden, C. E. Hanson, and M.L.Parry. Cambridge, UK: Cambridge University Press, 2007. 7-22. 26 Aug. 2009 ‹ http://www.ipcc.ch/pdf/assessment-report/ar4/wg2/ar4-wg2-spm.pdf ›. Intergovernmental Panel on Climate Change. IPCC Fourth Assessment Report Working Group III Report: Mitigation of Climate Change Glossary. 2007. 26 Aug. 2009 ‹ http://www.ipcc.ch/ipccreports/ar4-wg3.htm, http://www.ipcc.ch/pdf/assessment-report/ar4/wg3/ar4-wg3-annex1.pdf ›. Leipoldt, E. “Disability Experience: A Contribution from the Margins. Towards a Sustainable Future.” Journal of Futures Studies 10 (2006): 3-15. Miller, P., S. Parker and S. Gillinson. “Disablism: How to Tackle the Last Prejudice.” Demos, 2004. 26 Aug. 2009 ‹ http://www.demos.co.uk/files/disablism.pdf ›. Nakamura, K. “Disability, Destitution, and Disaster: Surviving the 1995 Great Hanshin Earthquake in Japan.” Human Organisation 68.1 (2009): 82-88. National Council on Disability, National Council on Independent Living, National Organization on Disability, and National Spinal Cord Injury Association and the Paralyzed Veterans of America. Emergency Management and People with Disabilities: before, during and after Congressional Briefing, 10 November 2005. 26 Aug. 2009 ‹ http://www.ncd.gov/newsroom/publications/2005/transcript_emergencymgt.htm ›. National Council on Disability. National Council on Disability on Hurricane Katrina Affected Areas. 2005. 26 Aug. 2009 ‹ http://www.ncd.gov/newsroom/publications/2005/katrina2.htm ›. National Research Council of Canada. From Impacts to Adaptation: Canada in a Changing Climate 2007. 26 Aug. 2009 ‹ http://adaptation.nrcan.gc.ca/assess/2007/pdf/full-complet_e.pdf ›. Nippert, I. and G. Wolff. “Ethik und Genetik: Ergebnisse der Umfrage zu Problemaspekten angewandter Humangenetik 1994-1996, 37 Länder.” Medgen 11 (1999): 53-61. Participants of the Nuclear Winter: The Anthropology of Human Survival Session. Proceedings of the 84th American Anthropological Association's Annual Meeting. Washington, D.C., 6 Dec. 1985. 26 Aug. 2009 ‹ http://www.fas.org/sgp/othergov/doe/lanl/lib-www/la-pubs/00173165.pdf ›. Scope. “Most Britons Think Others View Disabled People ‘As Inferior’.” 2009. 26 Aug. 2009 ‹ http://www.scope.org.uk/cgi-bin/np/viewnews.cgi?id=1244379033, http://www.comres.co.uk/resources/7/Social%20Polls/Scope%20PublicPoll%20Results%20May09.pdf ›. Smit, B., et al. “The Science of Adaptation: A Framework for Assessment.” Mitigation and Adaptation Strategies for Global Change 4 (1999): 199-213. Smit, B., and J. Wandel. “Adaptation, Adaptive Capacity and Vulnerability.” Global Environmental Change 16 (2006): 282-92. Sunday Morning Herald. “Who Lives and Dies in Britain after the Bomb.” Sunday Morning Herald 1988. 26 Aug. 2009 ‹ http://news.google.com/newspapers?nid=1301&dat=19880511&id=wFYVAAAAIBAJ&sjid=kOQDAAAAIBAJ&pg=3909,113100 ›. United Nations Development Programme. Human Development Report 2007/2008: Fighting Climate Change – Human Solidarity in a Divided World. 2008. 26 Aug. 2009 ‹ http://hdr.undp.org/en/media/HDR_20072008_EN_Complete.pdf ›. Wolbring, Gregor. “Is There an End to Out-Able? Is There an End to the Rat Race for Abilities?” M/C Journal 11.3 (2008). 26 Aug. 2009 ‹ http://journal.media-culture.org.au/index.php/mcjournal/article/viewArticle/57 ›. Wolbring, Gregor. “Why NBIC? Why Human Performance Enhancement?” Innovation: The European Journal of Social Science Research 21.1 (2008): 25-40.

35

"Reading & writing." Language Teaching 39, no.4 (September26, 2006): 284–91. http://dx.doi.org/10.1017/s0261444806233858.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

06–701Boon, Andrew (Toyo Gakuen U, Japan; bromleycross@ hotmail.com), The search for irony: A textual analysis of the lyrics of ‘Ironic’ by Alanis Morissette. The Reading Matrix (Readingmatrix.com) 5.2 (2005), 129–142.06–702Brantmeir, Cindy (Washington U, USA; cbrantme@wustle.edu), The effects of language of assessment and L2 reading performance on advanced readers' recall. The Reading Matrix (Readingmatrix.com) 6.1 (2006), 1–17.06–703Brooks, Wanda (Temple U, Philadelphia, USA), Reading representations of themselves: Urban youth use culture and African American textual features to develop literary understandings. Reading Research Quarterly (International Reading Association) 41.3 (2006), 372–392.06–704Burns, Eila (Jyvaskyla U of Applied Sciences, Finland; eila.burns@jypoly.fi), Pause, prompt and praise – Peer tutored reading for pupils with learning difficulties. British Journal of Special Education (Blackwell) 33.2 (2006), 62–67.06–705Carlisle, Joanne F. & C. Addison Stone, Exploring the role of morphemes in word reading. Reading Research Quarterly (International Reading Association) 40.4 (2005), 428–449.06–706Cho, Kwangsu, Christian D. Schunn (U Pittsburgh, PA, USA) & Davida Charney, Commenting on writing: Typology and perceived helpfulness of comments from novice peer reviewers and subject matter experts.Written Communication (Sage) 23.3 (2006), 260–294.06–707Cunningham, James W. (U North Carolina at Chapel Hill, USA), Stephanie A. Spadorcia, Karen A. Erickson, David A. Koppenhaver, Janet M. Sturm & David E. Yoder, Investigating the instructional supportiveness of leveled texts. Reading Research Quarterly (International Reading Association) 40.4 (2005), 410–427.06–708DeVoss, Dànıelle Nıcole & James E. Porter (Michigan State U, USA), Why Napster matters to writing: Filesharing as a new ethic of digital delivery. Computers and Composition (Elsevier) 23.1 (2006), 178–210.06–709Ghahremani-ghajar, Sue-San (Al-Zahra U, Iran) & Seyyed Abdolhamid Mirhosseini, English class or speaking about everything class? Dialogue journal writing as a critical EFL literacy practice in an Iranian high school. Language, Culture and Curriculum (Multilingual Matters) 18.3 (2005), 286–299.06–710Hunter, Darryl (U British Columbia, Canada; Darrylinvic@hotmail.com), Charles Mayenga & Trevor Gambell, Classroom assessment tools and uses: Canadian English teachers' practices for writing. Assessing Writing (Elsevier) 11.1 (2006), 42–65.06–711Jarratt, Susan C., Elızabeth Losh & Davıd Puente (U California at Irvine, USA), Transnational identifications: Biliterate writers in a first-year humanities course. Journal of Second Language Writing (Elsevier) 15.1 (2006), 24–48.06–712Jocson, Korina M. (Stanford U, USA), ‘Bob Dylan and Hip Hop’: Intersecting literacy practices in youth poetry communities. Written Communication (Sage) 23.3 (2006), 231–259.06–713Jones, Rodney H., Angel Garralda, Davıd C. S. Lı & Graham Lock (City U Hong Kong, China), Interactional dynamics in on-line and face-to-face peer-tutoring sessions for second language writers. Journal of Second Language Writing (Elsevier) 15.1 (2006), 1–23.06–714Kruse, Otto (Zurich U of Applied Sciences, Winterthur, Switzerland), The origins of writing in the disciplines: Traditions of seminar writing and the Humboldtian ideal of the research university.Written Communication (Sage) 23.3 (2006), 331–352.06–715Li, Jiang (jianli@enoreo.on.ca), The mediation of technology in ESL writing and its implications for writing assessment. Assessing Writing (Elsevier) 11.1 (2006), 5–21.06–716Lunsford, Andrea A. (Stanford U, USA), Writing, technologies, and the fifth canon. Computers and Composition (Elsevier) 23.1 (2006), 169–177.06–717Marsh, Jackie (U Sheffield, UK), Popular culture in the literacy curriculum: A Bourdieuan analysis. Reading Research Quarterly (International Reading Association) 41.2 (2006), 160–174.06–718Martin, Deb (Rowan U, USA; martind@rowan.edu) &Diane Penrod, Coming to know criteria: The value of an evaluating writing course for undergraduates. Assessing Writing (Elsevier) 11.1 (2006), 66–73.06–719McIntyre, Ellen, Diane W. Kyle (U Louisville, USA) & Gayle H. Moore, A primary-grade teacher's guidance toward small-group dialogue. Reading Research Quarterly (International Reading Association) 41.1 (2006), 36–66.06–720McQuillan, Jeff (Center for Educational Development, USA; jeff@learningexperts.com), The effects of print access and print exposure on English vocabulary acquisition of language minority students. The Reading Matrix (Readingmatrix.com) 6.1 (2006), 41–51.06–721Neuman, Susan B. (U Michigan, USA) & Donna Celano, The knowledge gap: Implications of leveling the playing field for low-income and middle-income children. Reading Research Quarterly (International Reading Association), 41.2 (2006), 176–201.06–722O'Sullıvan, Íde & Angela Chambers (U Limerick, Ireland), Learners' writing skills in French: Corpus consultation and learner evaluation. Journal of Second Language Writing (Elsevier) 15.1 (2006), 49–68.06–723Pino-Silva, Juan (U Simón Bolivar, Venezuela; jpino@usb.ve), Extensive reading through the internet: Is it worth the while?The Reading Matrix (Readingmatrix.com) 6.1 (2006), 85–96.06–724Rogers, Theresa (U British Columbia, Canada) Elizabeth Marshall& Cynthia A. Tyson, Dialogic narratives of literacy, teaching, and schooling: Preparing literacy teachers for diverse settings. Reading Research Quarterly (International Reading Association) 41.2 (2006) 202–224.06–725Scott, Tony (U North Carolina, USA), Writing work, technology, and pedagogy in the era of late capitalism. Computers and Composition (Elsevier) 23. 1 (2006), 228–243.06–726Tian, Shiauping (National Taiwan U of Science and Technology, Taiwan; sptian@mail.ntust.edu.tw.), Passage dependency of reading comprehension items in the GEPT and the TOEFL. The Reading Matrix (Readingmatrix.com) 6.1 (2006), 66–84.06–727Tseng, Yen-Chu & Hsien-Chin Liou (National Tsing Hua U, China; hcliu@mx.nthu.edu.tw), The effects of online conjunction materials on college EFL students' writing. System (Elsevier) 34.2 (2006), 270–283.06–728VanderStaay, Steven L. (Western Washington U, Bellingham, USA), Learning from longitudinal research in criminology and the health sciences. Reading Research Quarterly (International Reading Association) 41.3 (2006), 328–350.06–729Warrington, Stuart (Asian U, Japan; kaminare@hotmail.com), Building automaticity of word recognition for less proficient readers. The Reading Matrix (Readingmatrix.com) 6.1 (2006), 52–63.06–730Yasuda, Sachiko (Waseda U, Japan), Japanese students' literacy background and the role of the writing center. The Language Teacher (Japan Association for Language Teaching) 30.5 (2006), 3–7.

36

Caldwell,TracyM. "Identity Making from Soap to Nuts." M/C Journal 6, no.1 (February1, 2003). http://dx.doi.org/10.5204/mcj.2149.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

The release of the film Fight Club (Dir. David Fincher, 1999) was met with an outpouring of contradictory reviews. From David Ansen’s [Newsweek] claim that “Fight Club is the most incendiary movie to come out of Hollywood in a long time” (Fight Club DVD insert) to LA Times’s Kenneth Turan who proclaimed Fight Club to be “…a witless mishmash of whiny, infantile philosophising and bone-crushing violence that actually thinks it’s saying something of significance” (Fight Club DVD insert), everyone, it seemed, needed to weigh in with their views. Whether you think the film is a piece of witless and excessive trash, or believe, as Fight Club novelist Chuck Palahniuk hopes “it would offer more people the idea that they could create their own lives outside the existing blueprint for happiness offered by society,” this is a film that people react strongly to (Fight Club DVD insert). Whether or not the film is successful in the new ‘blueprint’ area is debatable and one focus of this essay. It isn’t difficult to spot the focus of the film Fight Club. The title and the graphic, edgy trailers for the film leave no doubt in the viewer’s mind that this film is about fighting. But fighting what and why are the questions that unveil the deeper edge to the film, an edge that skirts the abyss of deep psychological schism: man’s alienation from man, society and self, and the position of the late twentieth century male whose gendered potentialities have become muted thanks to corporate cookie-cutter culture and the loss of a ‘hunter-gatherer’ role for men. In a nutshell, the film explores the psychic rift of the main character, unnamed for the film, but conventionally referred to as “Jack” (played by Ed Norton). Jack leads a life many late twentieth century males can identify with, a life without real grounding, focus or passion. It is the kind of life that has become a by-product of the “me” generation and corporate/consumer culture. Aside from Jack’s inability to find real satisfaction in his love life, friendships, job, or sense of self, he also suffers from an identity disorder. While there are few people who are unaware of the mind-numbing (and in some cases, audience-alienating) “twist” offered near the end of the film, it bears repeating that the compelling character of Tyler Durden (played by Brad Pitt) who shapes and influences the changes in Jack’s life is actually revealed near the end of the film as a manifestation of Jack’s alter ego. Jack and Tyler are the same person. The two conspire to start ‘Fight Club’, where men hit other men. Hard. The Club becomes an underground sensation, expanding to other communities and cities and eventually spawns the offshoot Project Mayhem whose goal it is to ultimately erase individual debt so everyone (all consumers) can start at zero. In order to manage this affair, several large buildings are slated for destruction by the Mayhem team. Of course no people will be in the buildings at the time, but all the records will be destroyed. This is the core of the film, but there are several other interesting sidelights that will become important to this discussion, including the lone female character Marla who becomes the love interest of Jack/Tyler, and the friend Bob, whom Jack meets during his insomniac foray into the seedy underworld of the self help meeting. The film itself seems to cry out for a psychoanalytic reading. Its thinly veiled references to Freudian concepts and subliminal tricks aside, it also makes the inner world of the protagonist its landscape and backdrop. In a film dominated by a psychological and psychical problem, psychoanalysis seems an excellent tool for delving more deeply into the symbols and attitudes of the piece. I have chosen both Kleinian object relations and Julia Kristeva’s understanding of abjection to help illuminate some issues in the film. Object relations helps to make clear both the divergence of personality and the emergence of a ‘repaired’ protagonist at the end of the film as Jack first creates and then destroys his alter ego. Kristeva initially explored abjection theory via literature in Powers of Horror (1982), but Barbara Creed’s Monstrous Feminine: Film, Feminism and Psychoanalysis (1993) opened wide the door for applications of the theory to film studies. Creed uses abjection to explore issues of gender in the horror film, focusing on the role and depiction of women as abject. Here, I have adapted some of her ideas and intend to explore the role of abjection in the male identification process. In this film fighting operates as both reality and metaphor, on both the physical and psychical levels, encompassing the internal and external fight within the mind and body of the protagonist. Jack’s main problem is a lack of concrete identity and self-realization. Numbed by his willing and eager participation in consumer culture and his tacit compliance with the gritty underworld of his job as an automotive ‘recall coordinator’, his life’s work is estimating the cost effectiveness of saving lives by calculating the cost of death. In Jack’s world, meaning is derived solely through the external—external products he consumes and collects. Jack’s consumer-based emasculation is expressed when he states, “Like so many others I had become a slave to the Ikea nesting instinct.” In this sentence he clarifies his disempowerment and feminisation in one swoop. Having few, if any, relationships with human beings, meaningful or otherwise, Jack never reaches a level of social maturity. His only solace comes from visiting anonymous help groups for the terminally ill. Although Jack is physically fine (aside from his insomnia) a part of him is clearly dying, as his sense of who he is in a postmodern culture is hopelessly mediated by advertisem*nts that tell him what to be. In the absence of a father, Jack appears to have had no real role models. Made ‘soft’ by his mother, Jack exhibits a not so subtle misogyny that is illustrated through his relationship with fellow ‘tourist’ in the self-help circles, Marla Singer. Jack’s identity issues unfold via various conflicts, each of which is enmeshed in the club he starts that revolves around the physical pain of hand-to-hand, man-on-man combat. Jack’s conflicts with himself, others and society at large are all compressed within the theme and practice of fighting and the fight clubs he institutes. Fighting for Jack (and the others who join) seems the answer to life’s immediate problems. This essay looks deeply into Jack’s identity conflict, viewing it as a moment of psychic crisis in which Jack creates an alternate personality deeply steeped in and connected to the ‘abject’ in almost every way. Thus, Jack forces himself to confront the abject in himself and the world around him, dealing with abjection on several levels all with a view to expelling it to restore the ‘clean and proper’ boundaries necessary in the ‘whole’ self. Viewed though the lens of psychoanalysis, particularly Klein’s work on object relations and Kristeva’s work with abjection, allows a reading in which the film expresses the need for and accomplishment of a self-activated encounter with the abject in order to redraw ‘clean and proper’ boundaries of self. This film’s tag lines, ‘Mischief, Mayhem and Soap’—illustrate both the presence (Mischief, Mayhem) and function (Soap) of the abject—the interaction with the abject will lead to a ‘clean’ subject—a proper subject, a restored subject. Before continuing, a brief discussion of abjection and object relations and the ways in which they are utilized in this essay is essential here. One of Klein’s major propositions is that “the neonate brings into the world two main conflicting impulses: love and hate” (Mitchell 19). Each of these conflicting impulses must be dealt with, usually by either “bringing them together in order to modify the death drive along with the life drive or expelling the death drive into the outside world” (19). Along with this conflict arises the conflict of a primary relationship with the mother, which is seen as both satisfying and frustrating, and then later complicated with the addition of the father. The main conflicting love/hate binary is reflective of a number of ‘sets’ of dualities that surface when looking into the mother/child relationship. Besides love and hate, there is the ‘good’ and ‘bad’ mother, the mother as symbolic of both life and death, the symbolic (paternal) and semiotic (maternal), total oneness and total autonomy. The curious ‘split’ nature of the infant’s perception of the maternal figure recalls a kind of doppelganger, a doubling of the maternal (in positive and negative incarnations), that can be seen as abject. In the film, this informs the relationship between both Jack and Marla and Jack and Tyler, as I argue Tyler and Marla serve as parental substitutes at one part in the film. This is clarified in Jack’s statements about his relationship with the two of them: “My parents pulled this exact same act for years” and “I am six years old again, passing messages between parents.” This imaginary relationship allows Jack to re-experience some of his early identification processes, while effectively trading out the gender responsibilities to the point where Tyler symbolically takes the place of the ‘mother’ and Marla the place of the ‘father’. The result of this action is an excess of male gendered experiences in which Jack in crisis (emasculated) is surrounded by phalluses. Kristeva’s work with abjection is also important here. I am especially interested in her understanding of the mother/child relationship as connected with abjection, particularly the threat the mother represents to the child as wanting to return to a state of oneness. The abject functions in Fight Club as a means for the protagonist to re-configure his own autonomy. For Kristeva, the abject is that which is cast out in order that “I” may exist. It exists at the borders of the self and continually draws the subject into it. As the subject revolts and pulls away, its resistance cues the process of defining itself as separate, proper and autonomous. When the narrative of Jack’s life refuses to make sense to him, and his experiences seem like “a copy of a copy of a copy,” Jack turns inward for help. Kristeva says that the abject is “experienced at the peak of its strength when that subject, weary of fruitless attempts to identify with something on the outside, finds the impossible within” (5). Thus Jack ‘finds’ Tyler. The abject, [represented by Bob, Tyler and Marla in the film] is that which disturbs “identity, system, order. What does not respect borders, positions, rules” (Kristeva 4). As the abject is that which blurs boundaries borders and classification, the film itself is steeped in abject images and ideas. The discrete categories of inside/outside, asleep/awake, male/female, and self/other are continually troubled throughout the narrative. The two most confused binaries are male/female and self/other. As the film is about Jack’s own experience of emasculation it is not until the male/female gender issues are resolved that his self/other issues can be resolved. Through the re-ordering of gender he is able to take his place in society alongside Marla, finally viewed as not his mother or friend but lover. Jack Versus Himself: A Cult Of One Jack is able to re-vamp his personality through exposure to the abject and the replaying of certain key object relations moments in his childhood. He engages with this ‘inner child’ to reconnect with psychically difficult moments in which his ‘self’ emerged. Jack, however, twists the typical plot of maternal and paternal bonding in ways that speak to the underlying misogyny of the film and of late twentieth century society as well. While the story begins with both male and female characters in unnatural roles with unnatural and abject body parts, by the end of the film, these ‘abnormalities’ or abject objects are erased, ejected from the text so Jack is restored to the ‘safety’ of a compulsory heterosexuality. Bob, Tyler and Marla’s characters are three examples of gender twisting expressed in the film. In psychoanalytic literature, the child bonds first to the mother (via feeding from the breast and in-utero existence) and experiences a feeling of total oneness impossible to duplicate. Eventually the child seeks autonomy and breaks from the mother and her clinging ways with the help of the father and the phallus. So in basic terms, the female is abject, representing infantile regression and oneness, and the male represents taking the proper place in the symbolic order. When the female (mother) is denied, the male accepts his natural place in culture and society. However, in this film, Tyler (the male) is the abject presence in the text, that which threatens to consume and subsume the narrator’s personality. It is Marla, the phallic woman, who interposes herself in this dyad and becomes the correct choice for Jack, allowing him to proceed into ‘normal relations.’ Early in the film, Jack is unable to envision a female partner with whom he can open up and share, instead substituting Bob—and his doubly signified ‘bitch-tit*’—as a locus of comfort. In Bob’s ample bosom, Jack finds the release he is looking for, though it is unnatural in more ways than one. The feminised Bob [testicular cancer patient] comforts and coddles Jack so much that he feels the same idyllic bliss experienced by the infant at the mother’s breast; Jack feels “lost in oblivion, dark and silent and complete.” That night he is able for the first time in months to sleep: “Babies don’t sleep this well.” This illustrates Jack’s longing for the safety and security of the mother, complicated by his inability to bond with a female, replaced with his deep need for identification with a male. Continuing the twist, it is Marla who foils Jack’s moment of infantile bliss: “She ruined everything” with her presence, Jack sneers. Jack’s regression to this infantile bliss with either man or woman would be perceived as abject, (disrupting system and order) but this particular regression is at least doubly abject because of Bob’s unnatural breasts and lack of testicl*s. Both Bob, and to some degree Tyler, offer abjection to Jack as a way of dealing with this complexities of autonomous living. While my argument is that Tyler takes the traditional ‘female’ role in the drama, as a figure (like Bob) who lures Jack into an unnatural oneness that must ultimately be rejected, it is true that even in his position as abject ‘female’ (mother), Tyler is overwhelmingly phallic. His ‘jobs’ consist of splicing shots of penises into films, urinating and masturbating into restaurant food and engaging in acrobatic sex with Marla. Since Marla, who occupies the position of father bringing Jack into society away from the influence of Tyler, is also coded phallic, Jack’s world is overwhelmingly symbolically male. This appears to be a response to the overwhelming physical presence of Jack’s mother of which Tyler comments, “We’re a generation of men raised by women. I am wondering if another woman is really the answer we need?” During this same scene, Jack clarifies his regressive dilemma: “I can’t get married, I am a thirty year old boy.” Thus while Tyler campaigns for a world without women, Jack must decide if this is the correct way to go. Immersion in the world of uber-maleness only seems to make his life worse. It is only after he ‘kills’ Tyler and accepts Marla as a partner that he can feel successful. In another help meeting, one of the guided meditations emphasizes his regression by asking him to go to his “cave” and locate his “power animal.” This early in the film, Jack can only envision his power animal as a rather silly penguin, which, although phallic to some extent, is undercut by the fact that it speaks with a child’s voice. In the next visualization of the ‘power animal’, the animal becomes Marla—clarifying her influence over Jack’s subconscious. The threat of Marla’s sexuality is on one level explored with Jack’s counterpart Tyler, the one who dares to go where Jack will not, but their encounters are not shown in a ‘natural’ or fully mature light. They are instead equated with childhood experimentation and regressive fantasies as Marla responds that she “hasn’t been f*cked like that since grade school” and Tyler proclaims the relationship is mere “sportf*cking.” It is Tyler who discovers Marla’s oversized dild* proudly displayed on a dresser, of which she states “Don’t worry its not a threat to you.” This phallicized Marla refers to herself as “infectious human waste,” clearly abject. Marla’s power must be muted before Jack can truly relate to her. This is illustrated in two separate ‘visions’ of sexual intercourse—one between Marla and Tyler early in the film in which Marla assumes the dominant position, and then later near the end of the film when the same encounter is replayed with Jack taking Tyler’s place, Marla now in the standard missionary position on her back: Proper. Jack’s struggle with self is played out via his relationship with Tyler (and Marla to some degree). Once Jack has been exposed to the various levels of abject behaviour offered by Tyler and Project Mayhem, he chooses to go it alone, no longer needing the double he himself created. After experiencing and rejecting the abject, Jack redraws his boundaries and cleanses his soul. Jack Versus Society—The Personal Is Political Jack’s personal struggle becomes political—and communal. Another attempt at forming identity, Fight Club is bound to fail because it offers not autonomy but a group identity substituted for an individual one. While Jack loathes his ‘single serving life’ before Fight Club, he must come to realize that a group identity brings more problems than solutions in an identity crisis. While the comfort of ‘oneness’ is alluring, it is also abject. As Jack is able to finally refuse the safely and oneness offered by Tyler’s existence, he must also deny the safety in numbers offered by Fight Club itself. The cult he creates swallows members whole, excreting them as the “all singing all dancing crap of the world.” They eat, drink and sleep Fight Club and eventually its ‘evolutionary’ offshoot, Project Mayhem. During his involvement with Fight Club and Project Mayhem, Jack is exposed to three levels of abjection including food loathing, bodily wastes, and the corpse, each of which threaten to draw him to the “place where meaning collapses” (Kristeva 2). Jack’s first experience involves Tyler’s (a)vocation as a waiter who urinates and probably masturbat*s into patrons’ food. This mingling of bodily wastes and nourishment represents the most elementary form of abjection: food loathing. While Jack appears amused at Tyler’s antics in the beginning, by the end of the film, he illustrates his movement closer to self-identification, by calling for “clean food, please” signalling his alliance with the clean and proper. Bodily wastes, the internal made visible, represent the most extended contact Jack has with the abject. These experiences, when what is properly outside ends up inside and vice versa, begin with bloody hand-to-hand combat, including Tyler’s vomiting of blood into the mouth of an unwilling Fight Club participant “Lou”, causing another witness to vomit as well. The physical aversion to abject images (blood, pus, excrement) is part of the redrawing of self—the abject is ejected –via nausea/vomiting. Kristeva explains: “I give birth to myself amid the violence of sobs, of vomit” (3). The images continue to pile up as Jack describes life in the Paper Street house: “What a sh*t hole.” The house slowly decomposes around them, leaking and mouldy, releasing its own special smell: the rot of a “warm stale refrigerator” mixed with the “fart smell of steam” from a nearby industrial plant. While at Paper Street, Tyler decides to make soap. Soap in itself is an agent of cleanliness, but in this context it is abject and defiled by being composed of human waste. In a deeply abject moment, Jack is accidentally covered in refuse that spills from a ripped bag full of human fat pilfered from a liposuction clinic. Even at this profoundly disturbing moment, Jack is unwilling to give up his associations with Tyler and Project Mayhem. It is only after his encounter with a corpse that he changes his tune. While Fight Club attempted to blur physical boundaries via hand-to-hand combat and exchange of blood and blows, Project Mayhem threatens the psychic boundaries of self, a deeper danger. While a loud speaker drones “we are all part of the same compost heap” and a fellow occupant reminds Jack “In project mayhem we have no names,” Jack realizes he is truly losing himself, not gaining strength. Mayhem’s goal of ‘oneness’, like the maternal and infant experience, is exposed via slogans like “you are not a beautiful and unique snowflake. You are the same decaying organic matter as everything else.” Tyler finally puts his cards on the table and asks Jack to “stop trying to control everything and just let go.” For Kristeva, “If dung signifies the other side of the border, the place where I am not and which permits me to be, the corpse, the most sickening of wastes, is a border that has encroached upon everything”(3). The corpse of Bob causes Jack to confront the boundaries of life and death, both spiritual and physical, as he opens his eyes to the damaging effects of the cult-like environment into which he has fallen. Jack’s momentary indecision morphs into action after Bob’s death becomes just one more mantra for the zombie-like Project Mayhemers to chant: “His name was Robert Paulson.” Jack’s internal and external struggles are compressed into one moment when he commits hom*o(sui)cide. Placing a gun in his mouth, he attempts to rid himself of Tyler forever, his final words to Tyler: “My eyes are open now”. At this point, Jack is psychically ready to take charge of his life and confidently eject the abject from the narrative of his life. He wants no more to do with Project Mayhem gang and is reunited with Marla with whom he finally appears ready to have a fully realized relationship. His masculinity and identity restoration are made blindingly apparent by the final splice in the film—the image of Marla and Jack hand in hand overlooking the new view out of the tower, spliced with the shot of a semi-erect penis—back to shot of Marla and Jack. The message is clear: Jack is a man, he has a woman, and he knows who he is because of it. While Fight Club novelist Palahniuk hopes the film offers options for life “outside the existing blueprint offered by society” (Fight Club DVD insert). On the other hand, it’s unclear how well the film pulls this off. On one hand, its lambasting of the numbing effects of blind and excessive consumerism seems well explored, it’s unclear what options really surface by the end of the film. Although many targeted buildings have been destroyed, through which the viewer can assume some or even most records of individual debt were erased, the building in which Marla and Jack stand (initially slated for destruction) remains. Perhaps this is meant to signify the impossibility of true financial equality in American society. But it seems to me that the more pressing issues are not the ones openly addressed in the film (that of money and consumerism) but rather the more internalised issues of self-actualisation, gender identity and contentment. In a postmodern space ripe for the redrawing and redefinition of gender stereotypes, this film carefully reinscribes not only compulsory heterosexuality but also the rigid boundaries of acceptable male and female behaviour. For this film, the safest route to repairing male identity and self-hood threatened by the emasculating practices of a consumer culture is a route back. Back to infantile and childhood fantasy. While it dances provocatively around the edges of accepting a man with ‘bitch tit*’ and a woman with a dick, ultimately Bob is killed and Marla reclaimed by Jack in an ‘I’m ok you’re ok’ final scene: “Look at me Marla, I am really OK”. Jack’s immersion in an all male cult(ure) is eschewed for the comfort of real breasts. Works Cited Creed, Barbara. The Monstrous Feminine: Film, Feminism and Psychoanalysis. New York: Routledge, 1993. Fight Club. Dir. David Fincher. 1999. Fight Club DVD edition. Dir. David Fincher. 2000. Kristeva, Julia. Powers of Horror: An Essay On Abjection. New York: Columbia Press: 1982. Mitchell, Juliet. The Selected Melanie Klein. New York: The Free Press, 1986. Citation reference for this article Substitute your date of access for Dn Month Year etc... MLA Style Caldwell, Tracy M.. "Identity Making from Soap to Nuts" M/C: A Journal of Media and Culture 6.1 (2003). Dn Month Year < http://www.media-culture.org.au/0302/10-identitymaking.php>. APA Style Caldwell, T. M., (2003, Feb 26). Identity Making from Soap to Nuts. M/C: A Journal of Media and Culture, 6,(1). Retrieved Month Dn, Year, from http://www.media-culture.org.au/0302/10-identitymaking.html

37

Meakins, Felicity. "Shooting Baywatch." M/C Journal 2, no.2 (March1, 1999). http://dx.doi.org/10.5204/mcj.1743.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

"[Peter] Phelps was reacting to the news that the battle to 'save' Avalon from a Baywatch film crew invasion had been won after the Queensland Government clinched an in-principle deal with the producers of the world's most watched television show."-- Austin 5; italics added for emphasis The violent reaction of the Sydney residents of Avalon came as somewhat of a surprise to Baywatch producers and even the Australian Government, with Prime Minister John Howard reportedly commenting that the area would have benefitted from the increase in tourism and the creation of two hundred jobs. Avalon residents thought otherwise, and in the media, particularly the Sydney media, negative invasion metaphors ran rife. This disenchantment with American television culture may be considered a turning point in Australia's cultural identity analogous to an earlier example of cultural policing in the 1960s, when a new wave of nationalism saw the rejection of British and American English as the 'prestigous' varieties of English in the Australian media. It appears that parts of Australian society are again policing and promoting Australian culture through the negative, violent portrayal of American culture. Earlier this century, there was a certain repugnance associated with the Australian accent, with cultural commentators looking towards England for a standardised form of Australian English. "If we must follow a dialect of English in Australia, why not follow one of the charming ones? Why follow the ugliest that exists?" (Smith 1926; reported in Mitchell 63) "The attempt to create a distinct Australian accent is mischievous. For I make bold to say at present one does not exist. There is not, and should not be, any difference in standard English as spoken here, in the Motherland, or elsewhere in the Empire." (ABC Weekly 1942; reported in Mitchell 64-5) The linguistic manifestation of the Australian cultural cringe was complicated after World War II with the addition of American English to the 'prestigious' varieties. This attitude was exemplified in Australian radio announcers who adopted either American or British accents depending on whether the listeners were a commercial or ABC audience. The shift to an American accent for popular radio perhaps reflected the overwhelming acceptance of the American allies who had, at that stage, begun threatening England's cultural dominance. There was a clear association between America's own cultural dominance and the concepts of modernity and popular culture that were distinctly not British. The adoption of this form of English helped to perpetuate the attractiveness of the American ideology of freedom, equality, affluence and happiness (Horne 103) and to begin filtering out the hierarchical cultural snobbery associated with the British accent. In the sixties, the allure of American English became less tantalising and arguably only remained in some lexical items or words. Australian English came back into vogue during this time with writers such as Donald Horne (The Lucky Country), initiating a new wave of nationalism by pointing out the strengths of this country. Through the work of such social commentators, the Australian accent came to positively reflect the Australian ideological construction of mateship and egalitarianism. The Australian accent replaced the American accent, becoming the 'prestigious' form of English through the promotion of this form of nationalism. Even today, the battle to maintain an unadulterated form of Australian English resistant to outside influences is evident in the opinion columns. "As an Australian and proud of it, you get sick and tired of these characters [from American television programmes] mouthing 'guys, zerotouched, heist, ketchup and fries'." (Jefferies 8) However whilst the struggle to maintain a distinctive Australian accent has been successful, the attractiveness of American culture in general continues as portrayed in other cultural forms, especially television. Except for some concerns over Australian content regulations and some highbrow cultural commentary, Australians seem to be happily lapping up their nightly television doses of American culture -- that is, until Baywatch proposed that they move their filming location to the very middle-class Sydney suburb of Avalon. The residents of Avalon took this move as an act of war, and so the metaphors began flying. " .. the battle to 'save' Avalon from a Baywatch film crew invasion." (Austin 5) "Baywatch versus Avalon." (Carroll 16) "'Here they come, we surrender' [Avalon to Baywatch]" (Nicholson 18) "'Get that leaky old tub off this beach' [Baywatch to Howard]" (Nicholson 18) "'They took over the showers and toilets'" (Who Weekly 16) "They [Avalon residents] torpedoed plans .." (Lateline) The language that the media adopted in reporting the Baywatch filming proposal metaphorically constructed this event as an invasion, with the Baywatch producers as a hostile force willing to impinge upon the freedom and identity of the suburb of Avalon, which was alternatively portrayed as either a passive victim -- "'we surrender'" (Nicholson 18) -- or a virulent group armed to counterattack the Baywatch scurge -- "they torpedoed" (Who Weekly 16). Baywatch and Avalon were posed as enemies, as in "Baywatch versus Avalon" (Carroll 16), with both sides' attributes exaggerated to produce maximum difference -- the Avalon residents were described as snobby and middle class, and Baywatch became the epitome of American television trash. Yet it may be argued that this media construction of an invasion has wider, more significant cultural implications. Metonymically, the residents of Avalon seem to be representative of Australian culture, with Baywatch becoming the manifestation of American culture in its entirety. Thus, according to the media, the 'coming' of Baywatch was nothing short of a cultural invasion, an American impingement on Australian culture. The smugness of cultural commentators could be felt as the violent protests from Avalon residents perhaps marked the start of another wave of disillusionment with American culture, this time transmitted through such popular media as television. The 'popular' culture cringe that Australia seems to be suffering from in television content may be meeting its challenge. Avalon residents have made a stand against the cultural imperialism of American culture, similar to the 60s resistance to the invasion of Americanisms in Australian English. It will be interesting to examine the result of the Baywatch/Avalon incident, if indeed any lasting effects will be observed. It may be that Avalon's protest against Baywatch, which represents the struggle against American cultural invasion, will prove ineffectual. This is a likely outcome considering the Gold Coast's willingness to embrace this television show and its entourage before the decision to move to Hawaii. Indeed, the Gold Coast Mayor enthusiastically described the Gold Coast as Australia's answer to Hollywood. Yet an alternative result may be a positive re-examination and reappraisal of Australian television and its linked cultural identity similar to that which occured in the 1960s with Australian English. References Austin, Keith. "Sun, Sea Sound ... So Long." Sydney Morning Herald: The Guide 1 Mar. 1999: 5. Carroll, Nick. "Baywatch Link" Sydney Morning Herald 1 Mar. 1999: 16. "Drowning Out Baywatch." Who Weekly 8 Feb. 1999: 16. Horne, Donald. The Lucky Country: Australia in the Sixties. Australia: Penguin, 1966. Jefferys, Bob. "US Infiltration." Sydney Morning Herald: The Guide 1 Mar. 1999: 8. Lateline. Nine Network. QTQ9, Brisbane. 8 Mar. 1999. Mitchell, A. G. The Pronunciation of English in Australia. Sydney: Angus and Robertson, 1947. Nicholson. "Ulysees: An Irregular Soapie." Cartoon. The Weekend Australian 27-8 Feb. 1999: 18. Citation reference for this article MLA style: Felicity Meakins. "Shooting Baywatch: Resisting Cultural Invasion." M/C: A Journal of Media and Culture 2.2 (1999). [your date of access] <http://www.uq.edu.au/mc/9903/bay.php>. Chicago style: Felicity Meakins, "Shooting Baywatch: Resisting Cultural Invasion," M/C: A Journal of Media and Culture 2, no. 2 (1999), <http://www.uq.edu.au/mc/9903/bay.php> ([your date of access]). APA style: Felicity Meakins. (1999) Shooting Baywatch: resisting cultural invasion. M/C: A Journal of Media and Culture 2(2). <http://www.uq.edu.au/mc/9903/bay.php> ([your date of access]).

38

De Vos, Gail. "News and Announcements." Deakin Review of Children's Literature 5, no.3 (January29, 2016). http://dx.doi.org/10.20361/g21300.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

AWARDSSome major international children’s literature awards have just been announced as I compile the news for this issue. Several of these have Canadian connections.2016 ALSC (Association for Library Service to Children) Book & Media Award WinnersJohn Newbery Medal"Last Stop on Market Street,” written by Matt de la Peña, illustrated by Christian Robinson and published by G. P. Putnam’s Sons, an imprint of Penguin Books (USA) LLC Newbery Honor Books"The War that Saved My Life," written by Kimberly Brubaker Bradley and published by Dial Books for Young Readers, an imprint of Penguin Books (USA) LLC“Roller Girl,” written and illustrated by Victoria Jamieson and published by Dial Books for Young Readers, an imprint of Penguin Books (USA) LLC“Echo,” written by Pam Muñoz Ryan and published by Scholastic Press, an imprint of Scholastic Inc.Randolph Caldecott Medal"Finding Winnie: The True Story of the World’s Most Famous Bear," illustrated by Sophie Blackall, written by Lindsay Mattick and published by Little, Brown and Company, a division of Hachette Book Group, Inc.Caldecott Honor Books"Trombone Shorty," illustrated by Bryan Collier, written by Troy Andrews and published by Abrams Books for Young Readers, an imprint of ABRAMS“Waiting,” illustrated and written by Kevin Henkes, published by Greenwillow Books, an imprint of HarperCollins Publishers“Voice of Freedom Fannie Lou Hamer Spirit of the Civil Rights Movement,” illustrated by Ekua Holmes, written by Carole Boston Weatherford and published by Candlewick Press“Last Stop on Market Street,” illustrated by Christian Robinson, written by Matt de le Peña and published by G. P. Putnam’s Sons, an imprint of Penguin Books (USA) LLC Laura Ingalls Wilder AwardJerry Pinkney -- His award-winning works include “The Lion and the Mouse,” recipient of the Caldecott Award in 2010. In addition, Pinkney has received five Caldecott Honor Awards, five Coretta Scott King Illustrator Awards, and four Coretta Scott King Illustrator Honors. 2017 May Hill Arbuthnot Honor Lecture AwardJacqueline Woodson will deliver the 2017 May Hill Arbuthnot Honor Lecture. Woodson is the 2014 National Book Award winner for her New York Times bestselling memoir, “Brown Girl Dreaming.” Mildred L. Batchelder Award“The Wonderful Fluffy Little Squishy,” published by Enchanted Lion Books, written and illustrated by Beatrice Alemagna, and translated from the French by Claudia Zoe BedrickBatchelder Honor Books“Adam and Thomas,” published by Seven Stories Press, written by Aharon Appelfeld, iIllustrated by Philippe Dumas and translated from the Hebrew by Jeffrey M. Green“Grandma Lives in a Perfume Village,” published by NorthSouth Books, an imprint of Nordsüd Verlag AG, written by Fang Suzhen, iIllustrated by Sonja Danowski and translated from the Chinese by Huang Xiumin“Written and Drawn by Henrietta,” published by TOON Books, an imprint of RAW Junior, LLC and written, illustrated, and translated from the Spanish by Liniers.Pura Belpre (Author) Award“Enchanted Air: Two Cultures, Two Wings: A Memoir," written by Margarita Engle and published by Atheneum Books for Young Readers, an imprint of Simon & Schuster Children’s Publishing DivisionBelpre (Author) Honor Books"The Smoking Mirror," written by David Bowles and published by IFWG Publishing, Inc."Mango, Abuela, and Me," written by Meg Medina, illustrated by Angela Dominguez and published by Candlewick PressPura Belpre (Illustrator) Award"The Drum Dream Girl," illustrated by Rafael López, written by Margarita Engle and published by Houghton Mifflin HarcourtBelpre (Illustrator) Honor Books"My Tata’s Remedies = Los remedios de mi tata,” iIllustrated by Antonio Castro L., written by Roni Capin Rivera-Ashford and published by Cinco Puntos Press“Mango, Abuela, and Me,” illustrated by Angela Dominguez, written by Meg Medina and published by Candlewick Press“Funny Bones: Posada and His Day of the Dead Calaveras,” illustrated and written by Duncan Tonatiuh and published by Abrams Books for Young Readers, an imprint of ABRAMSAndrew Carnegie Medal "That Is NOT a Good Idea," produced by Weston Woods Studios, Inc.Theodor Seuss Geisel Award"Don’t Throw It to Mo!" written by David A. Adler, illustrated by Sam Ricks and published by Penguin Young Readers, and imprint of Penguin Group (USA), LLCGeisel Honor Books "A Pig, a Fox, and a Box," written and illustrated by Jonathan Fenske and published by Penguin Young Readers, an Imprint of Penguin Group (USA) LLC"Supertruck," written and illustrated by Stephen Savage and published by A Neal Porter Book published by Roaring Brook Press, a division of Holtzbrinck Publishing Holdings Limited Partnership"Waiting," written and illustrated by Kevin Henkes and published by Greenwillow Books, an imprint of HarperCollins Publishers.Odyssey Award"The War that Saved My Life," produced by Listening Library, an imprint of the Penguin Random House Audio Publishing Group, written by Kimberly Brubaker Bradley and narrated by Jayne EntwistleOdyssey Honor Audiobook"Echo," produced by Scholastic Audio / Paul R. Gagne, written by Pam Munoz Ryan and narrated by Mark Bramhall, David De Vries, MacLeod Andrews and Rebecca SolerRobert F. Sibert Informational Book Medal"Funny Bones: Posada and His Day of the Dead Calaveras,” written and illustrated by Duncan Tonatiuh and published by Abrams Books for Young Readers, an imprint of ABRAMSSibert Honor Books"Drowned City: Hurricane Katrina and New Orleans," written and illustrated by Don Brown and published by Houghton Mifflin Harcourt"The Boys Who Challenged Hitler: Knud Pedersen and the Churchill Club," by Phillip Hoose and published by Farrar Straus Giroux Books for Young Readers"Turning 15 on the Road to Freedom: My Story of the 1965 Selma Voting Rights March," written by Lynda Blackmon Lowery as told to Elspeth Leaco*ck and Susan Buckley, illustrated by PJ Loughran and published by Dial Books, an imprint of Penguin Group (USA) LLC"Voice of Freedom: Fannie Lou Hamer, Spirit of the Civil Rights Movement," written by Carole Boston Weatherford, illustrated by Ekua Holmes and published by Candlewick PressCONFERENCES & EVENTSThis 2016 is shaping up to be a busy year for those of us involved with Canadian children’s literature. To tantalize your appetite (and encourage you to get involved) here are some highlights:January:Vancouver Children’s Literature Roundtable event: A Celebration of BC’s Award Children’s Authors and Illustrators with special guests Rachel Hartman and the Children’s Literature Roundtables of Canada 2015 Information Book Award winners Margriet Ruurs & Katherine Gibson, January 27, 2016, 7 – 9 pm. Creekside Community Centre, 1 Athletes Way, Vancouver. Free to members and students.April:Wordpower programs from the Young Alberta Book Society feature teams of Albertan children’s literary artists touring to schools in rural areas. Thanks to the generous sponsorship of Cenovus Energy, schools unable to book artist visits due to prohibitive travel costs are able to participate.April 4-8: Wordpower South will send 8 artist teams to communities roughly between Drumheller and Medicine Hat. Artists include Karen Bass, Lorna Shultz-Nicholson, Bethany Ellis, Marty Chan, Mary Hays, Sigmund Brouwer, Carolyn Fisher, Natasha DeenApril 25-29: Wordpower North will have a team of 8 artists traveling among communities in north-eastern Alberta such as Fort MacKay, Conklin, Wabasca, Lac La Biche, Cold Lake, and Bonnyville. The artists include Kathy Jessup, Lois Donovan, Deborah Miller, David Poulsen, Gail de Vos, Karen Spafford-Fitz, Hazel Hutchins, Georgia Graham May: COMICS AND CONTEMPORARY LITERACY: May 2, 2016; 8:30am - 4:30pm at the Rozsa Centre, University of Calgary. This is a one day conference featuring presentations and a workshop by leading authors, scholars, and illustrators from the world of comics and graphic novels. This conference is the 5th in the annual 'Linguistic Diversity and Language Policy' series sponsored by the Chair, English as an Additional Language, Werklund School of Education, University of Calgary. Tom Ricento is the current Chair-holder. The conference is free and lunch is provided. Seating is limited, so register early. The four presenters are:Jillian Tamaki, illustrator for This One Summer, and winner of the Governor General's Award for children's illustration.Richard van Camp, best-selling author of The Lesser Blessed and Three Feathers, and member of the Dogrib Nation.Dr. Nick Sousanis, post-doctoral scholar, teacher and creator of the philosophical comic Unflattening.Dr. Bart Beaty, University of Calgary professor, acclaimed comics scholar and author of Comics vs. Art TD Canadian Children’s Book Week 2016. In 2016, the Canadian Children's Book Centre celebrates 40 years of bringing great Canadian children's books to young readers across the country and the annual TD Canadian Children’s Book Week will be occurring this May across Canada. The theme this year is the celebration of these 40 years of great books written, illustrated and published in Canada as well as stories that have been told over the years. The 2016 tour of storytellers, authors and illustrators and their area of travel are as follows:Alberta: Bob Graham, storyteller; Kate Jaimet, authorBritish Columbia (Interior region) Lisa Dalrymple, author; (Lower Mainland region) Graham Ross, illustrator; (Vancouver Island region) Wesley King, author; (Northern region, Rebecca Bender, author & illustrator.Manitoba: Angela Misri, author; Allison Van Diepen, authorNew Brunswick: Mary Ann Lippiatt, storytellerNewfoundland: Maureen Fergus, authorLabrador: Sharon Jennings, authorNorthwest Territories: Geneviève Després, illustratorNova Scotia: Judith Graves, authorNunavut: Gabrielle Grimard, illustratorOntario: Karen Autio, author; Marty Chan, author; Danika Dinsmore, author; Kallie George, author; Doretta Groenendyk, author & illustrator; Alison Hughes, author; Margriet Ruurs, author.Prince Edward Island: Wallace Edwards, author & illustratorQuebec (English-language tour): LM Falcone, author; Simon Rose, author; Kean Soo, author & illustrator; Robin Stevenson, author; and Tiffany Stone, author/poet.Saskatchewan: (Saskatoon and northern area) Donna Dudinsky, storyteller; (Moose Jaw/Regina and southern area) Sarah Ellis, authorYukon: Vicki Grant, author-----Gail de Vos is an adjunct professor who teaches courses on Canadian children's literature, young adult literature, and comic books & graphic novels at the School of Library and Information Studies (SLIS) at the University of Alberta. She is the author of nine books on storytelling and folklore. Gail is also a professional storyteller who has taught the storytelling course at SLIS for over two decades.

39

Losh, Elizabeth. "Artificial Intelligence." M/C Journal 10, no.5 (October1, 2007). http://dx.doi.org/10.5204/mcj.2710.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

On the morning of Thursday, 4 May 2006, the United States House Permanent Select Committee on Intelligence held an open hearing entitled “Terrorist Use of the Internet.” The Intelligence committee meeting was scheduled to take place in Room 1302 of the Longworth Office Building, a Depression-era structure with a neoclassical façade. Because of a dysfunctional elevator, some of the congressional representatives were late to the meeting. During the testimony about the newest political applications for cutting-edge digital technology, the microphones periodically malfunctioned, and witnesses complained of “technical problems” several times. By the end of the day it seemed that what was to be remembered about the hearing was the shocking revelation that terrorists were using videogames to recruit young jihadists. The Associated Press wrote a short, restrained article about the hearing that only mentioned “computer games and recruitment videos” in passing. Eager to have their version of the news item picked up, Reuters made videogames the focus of their coverage with a headline that announced, “Islamists Using US Videogames in Youth Appeal.” Like a game of telephone, as the Reuters videogame story was quickly re-run by several Internet news services, each iteration of the title seemed less true to the exact language of the original. One Internet news service changed the headline to “Islamic militants recruit using U.S. video games.” Fox News re-titled the story again to emphasise that this alert about technological manipulation was coming from recognised specialists in the anti-terrorism surveillance field: “Experts: Islamic Militants Customizing Violent Video Games.” As the story circulated, the body of the article remained largely unchanged, in which the Reuters reporter described the digital materials from Islamic extremists that were shown at the congressional hearing. During the segment that apparently most captured the attention of the wire service reporters, eerie music played as an English-speaking narrator condemned the “infidel” and declared that he had “put a jihad” on them, as aerial shots moved over 3D computer-generated images of flaming oil facilities and mosques covered with geometric designs. Suddenly, this menacing voice-over was interrupted by an explosion, as a virtual rocket was launched into a simulated military helicopter. The Reuters reporter shared this dystopian vision from cyberspace with Western audiences by quoting directly from the chilling commentary and describing a dissonant montage of images and remixed sound. “I was just a boy when the infidels came to my village in Blackhawk helicopters,” a narrator’s voice said as the screen flashed between images of street-level gunfights, explosions and helicopter assaults. Then came a recording of President George W. Bush’s September 16, 2001, statement: “This crusade, this war on terrorism, is going to take a while.” It was edited to repeat the word “crusade,” which Muslims often define as an attack on Islam by Christianity. According to the news reports, the key piece of evidence before Congress seemed to be a film by “SonicJihad” of recorded videogame play, which – according to the experts – was widely distributed online. Much of the clip takes place from the point of view of a first-person shooter, seen as if through the eyes of an armed insurgent, but the viewer also periodically sees third-person action in which the player appears as a running figure wearing a red-and-white checked keffiyeh, who dashes toward the screen with a rocket launcher balanced on his shoulder. Significantly, another of the player’s hand-held weapons is a detonator that triggers remote blasts. As jaunty music plays, helicopters, tanks, and armoured vehicles burst into smoke and flame. Finally, at the triumphant ending of the video, a green and white flag bearing a crescent is hoisted aloft into the sky to signify victory by Islamic forces. To explain the existence of this digital alternative history in which jihadists could be conquerors, the Reuters story described the deviousness of the country’s terrorist opponents, who were now apparently modifying popular videogames through their wizardry and inserting anti-American, pro-insurgency content into U.S.-made consumer technology. One of the latest video games modified by militants is the popular “Battlefield 2” from leading video game publisher, Electronic Arts Inc of Redwood City, California. Jeff Brown, a spokesman for Electronic Arts, said enthusiasts often write software modifications, known as “mods,” to video games. “Millions of people create mods on games around the world,” he said. “We have absolutely no control over them. It’s like drawing a mustache on a picture.” Although the Electronic Arts executive dismissed the activities of modders as a “mustache on a picture” that could only be considered little more than childish vandalism of their off-the-shelf corporate product, others saw a more serious form of criminality at work. Testifying experts and the legislators listening on the committee used the video to call for greater Internet surveillance efforts and electronic counter-measures. Within twenty-four hours of the sensationalistic news breaking, however, a group of Battlefield 2 fans was crowing about the idiocy of reporters. The game play footage wasn’t from a high-tech modification of the software by Islamic extremists; it had been posted on a Planet Battlefield forum the previous December of 2005 by a game fan who had cut together regular game play with a Bush remix and a parody snippet of the soundtrack from the 2004 hit comedy film Team America. The voice describing the Black Hawk helicopters was the voice of Trey Parker of South Park cartoon fame, and – much to Parker’s amusem*nt – even the mention of “goats screaming” did not clue spectators in to the fact of a comic source. Ironically, the moment in the movie from which the sound clip is excerpted is one about intelligence gathering. As an agent of Team America, a fictional elite U.S. commando squad, the hero of the film’s all-puppet cast, Gary Johnston, is impersonating a jihadist radical inside a hostile Egyptian tavern that is modelled on the cantina scene from Star Wars. Additional laughs come from the fact that agent Johnston is accepted by the menacing terrorist cell as “Hakmed,” despite the fact that he utters a series of improbable clichés made up of incoherent stereotypes about life in the Middle East while dressed up in a disguise made up of shoe polish and a turban from a bathroom towel. The man behind the “SonicJihad” pseudonym turned out to be a twenty-five-year-old hospital administrator named Samir, and what reporters and representatives saw was nothing more exotic than game play from an add-on expansion pack of Battlefield 2, which – like other versions of the game – allows first-person shooter play from the position of the opponent as a standard feature. While SonicJihad initially joined his fellow gamers in ridiculing the mainstream media, he also expressed astonishment and outrage about a larger politics of reception. In one interview he argued that the media illiteracy of Reuters potentially enabled a whole series of category errors, in which harmless gamers could be demonised as terrorists. It wasn’t intended for the purpose what it was portrayed to be by the media. So no I don’t regret making a funny video . . . why should I? The only thing I regret is thinking that news from Reuters was objective and always right. The least they could do is some online research before publishing this. If they label me al-Qaeda just for making this silly video, that makes you think, what is this al-Qaeda? And is everything al-Qaeda? Although Sonic Jihad dismissed his own work as “silly” or “funny,” he expected considerably more from a credible news agency like Reuters: “objective” reporting, “online research,” and fact-checking before “publishing.” Within the week, almost all of the salient details in the Reuters story were revealed to be incorrect. SonicJihad’s film was not made by terrorists or for terrorists: it was not created by “Islamic militants” for “Muslim youths.” The videogame it depicted had not been modified by a “tech-savvy militant” with advanced programming skills. Of course, what is most extraordinary about this story isn’t just that Reuters merely got its facts wrong; it is that a self-identified “parody” video was shown to the august House Intelligence Committee by a team of well-paid “experts” from the Science Applications International Corporation (SAIC), a major contractor with the federal government, as key evidence of terrorist recruitment techniques and abuse of digital networks. Moreover, this story of media illiteracy unfolded in the context of a fundamental Constitutional debate about domestic surveillance via communications technology and the further regulation of digital content by lawmakers. Furthermore, the transcripts of the actual hearing showed that much more than simple gullibility or technological ignorance was in play. Based on their exchanges in the public record, elected representatives and government experts appear to be keenly aware that the digital discourses of an emerging information culture might be challenging their authority and that of the longstanding institutions of knowledge and power with which they are affiliated. These hearings can be seen as representative of a larger historical moment in which emphatic declarations about prohibiting specific practices in digital culture have come to occupy a prominent place at the podium, news desk, or official Web portal. This environment of cultural reaction can be used to explain why policy makers’ reaction to terrorists’ use of networked communication and digital media actually tells us more about our own American ideologies about technology and rhetoric in a contemporary information environment. When the experts come forward at the Sonic Jihad hearing to “walk us through the media and some of the products,” they present digital artefacts of an information economy that mirrors many of the features of our own consumption of objects of electronic discourse, which seem dangerously easy to copy and distribute and thus also create confusion about their intended meanings, audiences, and purposes. From this one hearing we can see how the reception of many new digital genres plays out in the public sphere of legislative discourse. Web pages, videogames, and Weblogs are mentioned specifically in the transcript. The main architecture of the witnesses’ presentation to the committee is organised according to the rhetorical conventions of a PowerPoint presentation. Moreover, the arguments made by expert witnesses about the relationship of orality to literacy or of public to private communications in new media are highly relevant to how we might understand other important digital genres, such as electronic mail or text messaging. The hearing also invites consideration of privacy, intellectual property, and digital “rights,” because moral values about freedom and ownership are alluded to by many of the elected representatives present, albeit often through the looking glass of user behaviours imagined as radically Other. For example, terrorists are described as “modders” and “hackers” who subvert those who properly create, own, legitimate, and regulate intellectual property. To explain embarrassing leaks of infinitely replicable digital files, witness Ron Roughead says, “We’re not even sure that they don’t even hack into the kinds of spaces that hold photographs in order to get pictures that our forces have taken.” Another witness, Undersecretary of Defense for Policy and International Affairs, Peter Rodman claims that “any video game that comes out, as soon as the code is released, they will modify it and change the game for their needs.” Thus, the implication of these witnesses’ testimony is that the release of code into the public domain can contribute to political subversion, much as covert intrusion into computer networks by stealthy hackers can. However, the witnesses from the Pentagon and from the government contractor SAIC often present a contradictory image of the supposed terrorists in the hearing transcripts. Sometimes the enemy is depicted as an organisation of technological masterminds, capable of manipulating the computer code of unwitting Americans and snatching their rightful intellectual property away; sometimes those from the opposing forces are depicted as pre-modern and even sub-literate political innocents. In contrast, the congressional representatives seem to focus on similarities when comparing the work of “terrorists” to the everyday digital practices of their constituents and even of themselves. According to the transcripts of this open hearing, legislators on both sides of the aisle express anxiety about domestic patterns of Internet reception. Even the legislators’ own Web pages are potentially disruptive electronic artefacts, particularly when the demands of digital labour interfere with their duties as lawmakers. Although the subject of the hearing is ostensibly terrorist Websites, Representative Anna Eshoo (D-California) bemoans the difficulty of maintaining her own official congressional site. As she observes, “So we are – as members, I think we’re very sensitive about what’s on our Website, and if I retained what I had on my Website three years ago, I’d be out of business. So we know that they have to be renewed. They go up, they go down, they’re rebuilt, they’re – you know, the message is targeted to the future.” In their questions, lawmakers identify Weblogs (blogs) as a particular area of concern as a destabilising alternative to authoritative print sources of information from established institutions. Representative Alcee Hastings (D-Florida) compares the polluting power of insurgent bloggers to that of influential online muckrakers from the American political Right. Hastings complains of “garbage on our regular mainstream news that comes from blog sites.” Representative Heather Wilson (R-New Mexico) attempts to project a media-savvy persona by bringing up the “phenomenon of blogging” in conjunction with her questions about jihadist Websites in which she notes how Internet traffic can be magnified by cooperative ventures among groups of ideologically like-minded content-providers: “These Websites, and particularly the most active ones, are they cross-linked? And do they have kind of hot links to your other favorite sites on them?” At one point Representative Wilson asks witness Rodman if he knows “of your 100 hottest sites where the Webmasters are educated? What nationality they are? Where they’re getting their money from?” In her questions, Wilson implicitly acknowledges that Web work reflects influences from pedagogical communities, economic networks of the exchange of capital, and even potentially the specific ideologies of nation-states. It is perhaps indicative of the government contractors’ anachronistic worldview that the witness is unable to answer Wilson’s question. He explains that his agency focuses on the physical location of the server or ISP rather than the social backgrounds of the individuals who might be manufacturing objectionable digital texts. The premise behind the contractors’ working method – surveilling the technical apparatus not the social network – may be related to other beliefs expressed by government witnesses, such as the supposition that jihadist Websites are collectively produced and spontaneously emerge from the indigenous, traditional, tribal culture, instead of assuming that Iraqi insurgents have analogous beliefs, practices, and technological awareness to those in first-world countries. The residual subtexts in the witnesses’ conjectures about competing cultures of orality and literacy may tell us something about a reactionary rhetoric around videogames and digital culture more generally. According to the experts before Congress, the Middle Eastern audience for these videogames and Websites is limited by its membership in a pre-literate society that is only capable of abortive cultural production without access to knowledge that is archived in printed codices. Sometimes the witnesses before Congress seem to be unintentionally channelling the ideas of the late literacy theorist Walter Ong about the “secondary orality” associated with talky electronic media such as television, radio, audio recording, or telephone communication. Later followers of Ong extend this concept of secondary orality to hypertext, hypermedia, e-mail, and blogs, because they similarly share features of both speech and written discourse. Although Ong’s disciples celebrate this vibrant reconnection to a mythic, communal past of what Kathleen Welch calls “electric rhetoric,” the defence industry consultants express their profound state of alarm at the potentially dangerous and subversive character of this hybrid form of communication. The concept of an “oral tradition” is first introduced by the expert witnesses in the context of modern marketing and product distribution: “The Internet is used for a variety of things – command and control,” one witness states. “One of the things that’s missed frequently is how and – how effective the adversary is at using the Internet to distribute product. They’re using that distribution network as a modern form of oral tradition, if you will.” Thus, although the Internet can be deployed for hierarchical “command and control” activities, it also functions as a highly efficient peer-to-peer distributed network for disseminating the commodity of information. Throughout the hearings, the witnesses imply that unregulated lateral communication among social actors who are not authorised to speak for nation-states or to produce legitimated expert discourses is potentially destabilising to political order. Witness Eric Michael describes the “oral tradition” and the conventions of communal life in the Middle East to emphasise the primacy of speech in the collective discursive practices of this alien population: “I’d like to point your attention to the media types and the fact that the oral tradition is listed as most important. The other media listed support that. And the significance of the oral tradition is more than just – it’s the medium by which, once it comes off the Internet, it is transferred.” The experts go on to claim that this “oral tradition” can contaminate other media because it functions as “rumor,” the traditional bane of the stately discourse of military leaders since the classical era. The oral tradition now also has an aspect of rumor. A[n] event takes place. There is an explosion in a city. Rumor is that the United States Air Force dropped a bomb and is doing indiscriminate killing. This ends up being discussed on the street. It ends up showing up in a Friday sermon in a mosque or in another religious institution. It then gets recycled into written materials. Media picks up the story and broadcasts it, at which point it’s now a fact. In this particular case that we were telling you about, it showed up on a network television, and their propaganda continues to go back to this false initial report on network television and continue to reiterate that it’s a fact, even though the United States government has proven that it was not a fact, even though the network has since recanted the broadcast. In this example, many-to-many discussion on the “street” is formalised into a one-to many “sermon” and then further stylised using technology in a one-to-many broadcast on “network television” in which “propaganda” that is “false” can no longer be disputed. This “oral tradition” is like digital media, because elements of discourse can be infinitely copied or “recycled,” and it is designed to “reiterate” content. In this hearing, the word “rhetoric” is associated with destructive counter-cultural forces by the witnesses who reiterate cultural truisms dating back to Plato and the Gorgias. For example, witness Eric Michael initially presents “rhetoric” as the use of culturally specific and hence untranslatable figures of speech, but he quickly moves to an outright castigation of the entire communicative mode. “Rhetoric,” he tells us, is designed to “distort the truth,” because it is a “selective” assembly or a “distortion.” Rhetoric is also at odds with reason, because it appeals to “emotion” and a romanticised Weltanschauung oriented around discourses of “struggle.” The film by SonicJihad is chosen as the final clip by the witnesses before Congress, because it allegedly combines many different types of emotional appeal, and thus it conveniently ties together all of the themes that the witnesses present to the legislators about unreliable oral or rhetorical sources in the Middle East: And there you see how all these products are linked together. And you can see where the games are set to psychologically condition you to go kill coalition forces. You can see how they use humor. You can see how the entire campaign is carefully crafted to first evoke an emotion and then to evoke a response and to direct that response in the direction that they want. Jihadist digital products, especially videogames, are effective means of manipulation, the witnesses argue, because they employ multiple channels of persuasion and carefully sequenced and integrated subliminal messages. To understand the larger cultural conversation of the hearing, it is important to keep in mind that the related argument that “games” can “psychologically condition” players to be predisposed to violence is one that was important in other congressional hearings of the period, as well one that played a role in bills and resolutions that were passed by the full body of the legislative branch. In the witness’s testimony an appeal to anti-game sympathies at home is combined with a critique of a closed anti-democratic system abroad in which the circuits of rhetorical production and their composite metonymic chains are described as those that command specific, unvarying, robotic responses. This sharp criticism of the artful use of a presentation style that is “crafted” is ironic, given that the witnesses’ “compilation” of jihadist digital material is staged in the form of a carefully structured PowerPoint presentation, one that is paced to a well-rehearsed rhythm of “slide, please” or “next slide” in the transcript. The transcript also reveals that the members of the House Intelligence Committee were not the original audience for the witnesses’ PowerPoint presentation. Rather, when it was first created by SAIC, this “expert” presentation was designed for training purposes for the troops on the ground, who would be facing the challenges of deployment in hostile terrain. According to the witnesses, having the slide show showcased before Congress was something of an afterthought. Nonetheless, Congressman Tiahrt (R-KN) is so impressed with the rhetorical mastery of the consultants that he tries to appropriate it. As Tiarht puts it, “I’d like to get a copy of that slide sometime.” From the hearing we also learn that the terrorists’ Websites are threatening precisely because they manifest a polymorphously perverse geometry of expansion. For example, one SAIC witness before the House Committee compares the replication and elaboration of digital material online to a “spiderweb.” Like Representative Eshoo’s site, he also notes that the terrorists’ sites go “up” and “down,” but the consultant is left to speculate about whether or not there is any “central coordination” to serve as an organising principle and to explain the persistence and consistency of messages despite the apparent lack of a single authorial ethos to offer a stable, humanised, point of reference. In the hearing, the oft-cited solution to the problem created by the hybridity and iterability of digital rhetoric appears to be “public diplomacy.” Both consultants and lawmakers seem to agree that the damaging messages of the insurgents must be countered with U.S. sanctioned information, and thus the phrase “public diplomacy” appears in the hearing seven times. However, witness Roughhead complains that the protean “oral tradition” and what Henry Jenkins has called the “transmedia” character of digital culture, which often crosses several platforms of traditional print, projection, or broadcast media, stymies their best rhetorical efforts: “I think the point that we’ve tried to make in the briefing is that wherever there’s Internet availability at all, they can then download these – these programs and put them onto compact discs, DVDs, or post them into posters, and provide them to a greater range of people in the oral tradition that they’ve grown up in. And so they only need a few Internet sites in order to distribute and disseminate the message.” Of course, to maintain their share of the government market, the Science Applications International Corporation also employs practices of publicity and promotion through the Internet and digital media. They use HTML Web pages for these purposes, as well as PowerPoint presentations and online video. The rhetoric of the Website of SAIC emphasises their motto “From Science to Solutions.” After a short Flash film about how SAIC scientists and engineers solve “complex technical problems,” the visitor is taken to the home page of the firm that re-emphasises their central message about expertise. The maps, uniforms, and specialised tools and equipment that are depicted in these opening Web pages reinforce an ethos of professional specialisation that is able to respond to multiple threats posed by the “global war on terror.” By 26 June 2006, the incident finally was being described as a “Pentagon Snafu” by ABC News. From the opening of reporter Jake Tapper’s investigative Webcast, established government institutions were put on the spot: “So, how much does the Pentagon know about videogames? Well, when it came to a recent appearance before Congress, apparently not enough.” Indeed, the very language about “experts” that was highlighted in the earlier coverage is repeated by Tapper in mockery, with the significant exception of “independent expert” Ian Bogost of the Georgia Institute of Technology. If the Pentagon and SAIC deride the legitimacy of rhetoric as a cultural practice, Bogost occupies himself with its defence. In his recent book Persuasive Games: The Expressive Power of Videogames, Bogost draws upon the authority of the “2,500 year history of rhetoric” to argue that videogames represent a significant development in that cultural narrative. Given that Bogost and his Watercooler Games Weblog co-editor Gonzalo Frasca were actively involved in the detective work that exposed the depth of professional incompetence involved in the government’s line-up of witnesses, it is appropriate that Bogost is given the final words in the ABC exposé. As Bogost says, “We should be deeply bothered by this. We should really be questioning the kind of advice that Congress is getting.” Bogost may be right that Congress received terrible counsel on that day, but a close reading of the transcript reveals that elected officials were much more than passive listeners: in fact they were lively participants in a cultural conversation about regulating digital media. After looking at the actual language of these exchanges, it seems that the persuasiveness of the misinformation from the Pentagon and SAIC had as much to do with lawmakers’ preconceived anxieties about practices of computer-mediated communication close to home as it did with the contradictory stereotypes that were presented to them about Internet practices abroad. In other words, lawmakers found themselves looking into a fun house mirror that distorted what should have been familiar artefacts of American popular culture because it was precisely what they wanted to see. References ABC News. “Terrorist Videogame?” Nightline Online. 21 June 2006. 22 June 2006 http://abcnews.go.com/Video/playerIndex?id=2105341>. Bogost, Ian. Persuasive Games: Videogames and Procedural Rhetoric. Cambridge, MA: MIT Press, 2007. Game Politics. “Was Congress Misled by ‘Terrorist’ Game Video? We Talk to Gamer Who Created the Footage.” 11 May 2006. http://gamepolitics.livejournal.com/285129.html#cutid1>. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York UP, 2006. julieb. “David Morgan Is a Horrible Writer and Should Be Fired.” Online posting. 5 May 2006. Dvorak Uncensored Cage Match Forums. http://cagematch.dvorak.org/index.php/topic,130.0.html>. Mahmood. “Terrorists Don’t Recruit with Battlefield 2.” GGL Global Gaming. 16 May 2006 http://www.ggl.com/news.php?NewsId=3090>. Morgan, David. “Islamists Using U.S. Video Games in Youth Appeal.” Reuters online news service. 4 May 2006 http://today.reuters.com/news/ArticleNews.aspx?type=topNews &storyID=2006-05-04T215543Z_01_N04305973_RTRUKOC_0_US-SECURITY- VIDEOGAMES.xml&pageNumber=0&imageid=&cap=&sz=13&WTModLoc= NewsArt-C1-ArticlePage2>. Ong, Walter J. Orality and Literacy: The Technologizing of the Word. London/New York: Methuen, 1982. Parker, Trey. Online posting. 7 May 2006. 9 May 2006 http://www.treyparker.com>. Plato. “Gorgias.” Plato: Collected Dialogues. Princeton: Princeton UP, 1961. Shrader, Katherine. “Pentagon Surfing Thousands of Jihad Sites.” Associated Press 4 May 2006. SonicJihad. “SonicJihad: A Day in the Life of a Resistance Fighter.” Online posting. 26 Dec. 2005. Planet Battlefield Forums. 9 May 2006 http://www.forumplanet.com/planetbattlefield/topic.asp?fid=13670&tid=1806909&p=1>. Tapper, Jake, and Audery Taylor. “Terrorist Video Game or Pentagon Snafu?” ABC News Nightline 21 June 2006. 30 June 2006 http://abcnews.go.com/Nightline/Technology/story?id=2105128&page=1>. U.S. Congressional Record. Panel I of the Hearing of the House Select Intelligence Committee, Subject: “Terrorist Use of the Internet for Communications.” Federal News Service. 4 May 2006. Welch, Kathleen E. Electric Rhetoric: Classical Rhetoric, Oralism, and the New Literacy. Cambridge, MA: MIT Press, 1999. Citation reference for this article MLA Style Losh, Elizabeth. "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/08-losh.php>. APA Style Losh, E. (Oct. 2007) "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/08-losh.php>.

40

Green, Lelia. "No Taste for Health: How Tastes are Being Manipulated to Favour Foods that are not Conducive to Health and Wellbeing." M/C Journal 17, no.1 (March17, 2014). http://dx.doi.org/10.5204/mcj.785.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Background “The sense of taste,” write Nelson and colleagues in a 2002 issue of Nature, “provides animals with valuable information about the nature and quality of food. Mammals can recognize and respond to a diverse repertoire of chemical entities, including sugars, salts, acids and a wide range of toxic substances” (199). The authors go on to argue that several amino acids—the building blocks of proteins—taste delicious to humans and that “having a taste pathway dedicated to their detection probably had significant evolutionary implications”. They imply, but do not specify, that the evolutionary implications are positive. This may be the case with some amino acids, but contemporary tastes, and changes in them, are far from universally beneficial. Indeed, this article argues that modern food production shapes and distorts human taste with significant implications for health and wellbeing. Take the western taste for fried chipped potatoes, for example. According to Schlosser in Fast Food Nation, “In 1960, the typical American ate eighty-one pounds of fresh potatoes and about four pounds of frozen french fries. Today [2002] the typical American eats about forty-nine pounds of fresh potatoes every year—and more than thirty pounds of frozen french fries” (115). Nine-tenths of these chips are consumed in fast food restaurants which use mass-manufactured potato-based frozen products to provide this major “foodservice item” more quickly and cheaply than the equivalent dish prepared from raw ingredients. These choices, informed by human taste buds, have negative evolutionary implications, as does the apparently long-lasting consumer preference for fried goods cooked in trans-fats. “Numerous foods acquire their elastic properties (i.e., snap, mouth-feel, and hardness) from the colloidal fat crystal network comprised primarily of trans- and saturated fats. These hardstock fats contribute, along with numerous other factors, to the global epidemics related to metabolic syndrome and cardiovascular disease,” argues Michael A. Rogers (747). Policy makers and public health organisations continue to compare notes internationally about the best ways in which to persuade manufacturers and fast food purveyors to reduce the use of these trans-fats in their products (L’Abbé et al.), however, most manufacturers resist. Hank Cardello, a former fast food executive, argues that “many products are designed for ‘high hedonic value’, with carefully balanced combinations of salt, sugar and fat that, experience has shown, induce people to eat more” (quoted, Trivedi 41). Fortunately for the manufactured food industry, salt and sugar also help to preserve food, effectively prolonging the shelf life of pre-prepared and packaged goods. Physiological Factors As Glanz et al. discovered when surveying 2,967 adult Americans, “taste is the most important influence on their food choices, followed by cost” (1118). A person’s taste is to some extent an individual response to food stimuli, but the tongue’s taste buds respond to five basic categories of food: salty, sweet, sour, bitter, and umami. ‘Umami’ is a Japanese word indicating “delicious savoury taste” (Coughlan 11) and it is triggered by the amino acid glutamate. Japanese professor Kikunae Ikeda identified glutamate while investigating the taste of a particular seaweed which he believed was neither sweet, sour, bitter, or salty. When Ikeda combined the glutamate taste essence with sodium he formed the food additive sodium glutamate, which was patented in 1908 and subsequently went into commercial production (Japan Patent Office). Although individual, a person’s taste preferences are by no means fixed. There is ample evidence that people’s tastes are being distorted by modern food marketing practices that process foods to make them increasingly appealing to the average palate. In particular, this industrialisation of food promotes the growth of a snack market driven by salty and sugary foods, popularly constructed as posing a threat to health and wellbeing. “[E]xpanding waistlines [are] fuelled by a boom in fast food and a decline in physical activity” writes Stark, who reports upon the 2008 launch of a study into Australia’s future ‘fat bomb’. As Deborah Lupton notes, such reports were a particular feature of the mid 2000s when: intense concern about the ‘obesity epidemic’ intensified and peaked. Time magazine named 2004 ‘The Year of Obesity’. That year the World Health Organization’s Global Strategy on Diet, Physical Activity and Health was released and the [US] Centers for Disease Control predicted that a poor diet and lack of exercise would soon claim more lives than tobacco-related disease in the United States. (4) The American Heart Association recommends eating no more than 1500mg of salt per day (Hamzelou 11) but salt consumption in the USA averages more than twice this quantity, at 3500mg per day (Bernstein and Willett 1178). In the UK, a sustained campaign and public health-driven engagement with food manufacturers by CASH—Consensus Action on Salt and Health—resulted in a reduction of between 30 and 40 percent of added salt in processed foods between 2001 and 2011, with a knock-on 15 percent decline in the UK population’s salt intake overall. This is the largest reduction achieved by any developed nation (Brinsden et al.). “According to the [UK’s] National Institute for Health and Care Excellence (NICE), this will have reduced [UK] stroke and heart attack deaths by a minimum of 9,000 per year, with a saving in health care costs of at least £1.5bn a year” (MacGregor and Pombo). Whereas there has been some success over the past decade in reducing the amount of salt consumed, in the Western world the consumption of sugar continues to rise, as a graph cited in the New Scientist indicates (O’Callaghan). Regular warnings that sugar is associated with a range of health threats and delivers empty calories devoid of nutrition have failed to halt the increase in sugar consumption. Further, although some sugar is a natural product, processed foods tend to use a form invented in 1957: high-fructose corn syrup (HFCS). “HFCS is a gloopy solution of glucose and fructose” writes O’Callaghan, adding that it is “as sweet as table sugar but has typically been about 30% cheaper”. She cites Serge Ahmed, a French neuroscientist, as arguing that in a world of food sufficiency people do not need to consume more, so they need to be enticed to overeat by making food more pleasurable. Ahmed was part of a team that ran an experiment with cocaine-addicted rats, offering them a mutually exclusive choice between highly-sweetened water and cocaine: Our findings clearly indicate that intense sweetness can surpass cocaine reward, even in drug-sensitized and -addicted individuals. We speculate that the addictive potential of intense sweetness results from an inborn hypersensitivity to sweet tastants. In most mammals, including rats and humans, sweet receptors evolved in ancestral environments poor in sugars and are thus not adapted to high concentrations of sweet tastants. The supranormal stimulation of these receptors by sugar-rich diets, such as those now widely available in modern societies, would generate a supranormal reward signal in the brain, with the potential to override self-control mechanisms and thus lead to addiction. (Lenoir et al.) The Tongue and the Brain One of the implications of this research about the mammalian desire for sugar is that our taste for food is about more than how these foods actually taste in the mouth on our tongues. It is also about the neural response to the food we eat. The taste of French fries thus also includes that “snap, mouth-feel, and hardness” and the “colloidal fat crystal network” (Rogers, “Novel Structuring” 747). While there is no taste receptor for fats, these nutrients have important effects upon the brain. Wang et al. offered rats a highly fatty, but palatable, diet and allowed them to eat freely. 33 percent of the calories in the food were delivered via fat, compared with 21 percent in a normal diet. The animals almost doubled their usual calorific intake, both because the food had a 37 percent increased calorific content and also because the rats ate 47 percent more than was standard (2786). The research team discovered that in as little as three days the rats “had already lost almost all of their ability to respond to leptin” (Martindale 27). Leptin is a hormone that acts on the brain to communicate feelings of fullness, and is thus important in assisting animals to maintain a healthy body weight. The rats had also become insulin resistant. “Severe resistance to the metabolic effects of both leptin and insulin ensued after just 3 days of overfeeding” (Wang et al. 2786). Fast food restaurants typically offer highly palatable, high fat, high sugar, high salt, calorific foods which can deliver 130 percent of a day’s recommended fat intake, and almost a day’s worth of an adult man’s calories, in one meal. The impacts of maintaining such a diet over a comparatively short time-frame have been recorded in documentaries such as Super Size Me (Spurlock). The after effects of what we widely call “junk food” are also evident in rat studies. Neuroscientist Paul Kenny, who like Ahmed was investigating possible similarities between food- and cocaine-addicted rats, allowed his animals unlimited access to both rat ‘junk food’ and healthy food for rats. He then changed their diets. “The rats with unlimited access to junk food essentially went on a hunger strike. ‘It was as if they had become averse to healthy food’, says Kenny. It took two weeks before the animals began eating as much [healthy food] as those in the control group” (quoted, Trivedi 40). Developing a taste for certain food is consequently about much more than how they taste in the mouth; it constitutes an individual’s response to a mixture of taste, hormonal reactions and physiological changes. Choosing Health Glanz et al. conclude their study by commenting that “campaigns attempting to change people’s perception of the importance of nutrition will be interpreted in terms of existing values and beliefs. A more promising strategy might be to stress the good taste of healthful foods” (1126). Interestingly, this is the strategy already adopted by some health-focused cookbooks. I have 66 cookery books in my kitchen. None of ten books sampled from the five spaces in which these books are kept had ‘taste’ as an index entry, but three books had ‘taste’ in their titles: The Higher Taste, Taste of Life, and The Taste of Health. All three books seek to promote healthy eating, and they all date from the mid-1980s. It might be that taste is not mentioned in cookbook indexes because it is a sine qua non: a focus upon taste is so necessary and fundamental to a cookbook that it goes without saying. Yet, as the physiological evidence makes clear, what we find palatable is highly mutable, varying between people, and capable of changing significantly in comparatively short periods of time. The good news from the research studies is that the changes wrought by high salt, high sugar, high fat diets need not be permanent. Luciano Rossetti, one of the authors on Wang et al’s paper, told Martindale that the physiological changes are reversible, but added a note of caution: “the fatter a person becomes the more resistant they will be to the effects of leptin and the harder it is to reverse those effects” (27). Morgan Spurlock’s experience also indicates this. In his case it took the actor/director 14 months to lose the 11.1 kg (13 percent of his body mass) that he gained in the 30 days of his fast-food-only experiment. Trivedi was more fortunate, stating that, “After two weeks of going cold turkey, I can report I have successfully kicked my ice cream habit” (41). A reader’s letter in response to Trivedi’s article echoes this observation. She writes that “the best way to stop the craving was to switch to a diet of vegetables, seeds, nuts and fruits with a small amount of fish”, adding that “cravings stopped in just a week or two, and the diet was so effective that I no longer crave junk food even when it is in front of me” (Mackeown). Popular culture indicates a range of alternative ways to resist food manufacturers. In the West, there is a growing emphasis on organic farming methods and produce (Guthman), on sl called Urban Agriculture in the inner cities (Mason and Knowd), on farmers’ markets, where consumers can meet the producers of the food they eat (Guthrie et al.), and on the work of advocates of ‘real’ food, such as Jamie Oliver (Warrin). Food and wine festivals promote gourmet tourism along with an emphasis upon the quality of the food consumed, and consumption as a peak experience (Hall and Sharples), while environmental perspectives prompt awareness of ‘food miles’ (Weber and Matthews), fair trade (Getz and Shreck) and of land degradation, animal suffering, and the inequitable use of resources in the creation of the everyday Western diet (Dare, Costello and Green). The burgeoning of these different approaches has helped to stimulate a commensurate growth in relevant disciplinary fields such as Food Studies (Wessell and Brien). One thing that all these new ways of looking at food and taste have in common is that they are options for people who feel they have the right to choose what and when to eat; and to consume the tastes they prefer. This is not true of all groups of people in all countries. Hiding behind the public health campaigns that encourage people to exercise and eat fresh fruit and vegetables are the hidden “social determinants of health: The conditions in which people are born, grow, live, work and age, including the health system” (WHO 45). As the definitions explain, it is the “social determinants of health [that] are mostly responsible for health iniquities” with evidence from all countries around the world demonstrating that “in general, the lower an individual’s socioeconomic position, the worse his or her health” (WHO 45). For the comparatively disadvantaged, it may not be the taste of fast food that attracts them but the combination of price and convenience. If there is no ready access to cooking facilities, or safe food storage, or if a caregiver is simply too time-poor to plan and prepare meals for a family, junk food becomes a sensible choice and its palatability an added bonus. For those with the education, desire, and opportunity to break free of the taste for salty and sugary fats, however, there are a range of strategies to achieve this. There is a persuasive array of evidence that embracing a plant-based diet confers a multitude of health benefits for the individual, for the planet and for the animals whose lives and welfare would otherwise be sacrificed to feed us (Green, Costello and Dare). Such a choice does involve losing the taste for foods which make up the lion’s share of the Western diet, but any sense of deprivation only lasts for a short time. The fact is that our sense of taste responds to the stimuli offered. It may be that, notwithstanding the desires of Jamie Oliver and the like, a particular child never will never get to like broccoli, but it is also the case that broccoli tastes differently to me, seven years after becoming a vegan, than it ever did in the years in which I was omnivorous. When people tell me that they would love to adopt a plant-based diet but could not possibly give up cheese, it is difficult to reassure them that the pleasure they get now from that specific co*cktail of salty fats will be more than compensated for by the sheer exhilaration of eating crisp, fresh fruits and vegetables in the future. Conclusion For decades, the mass market food industry has tweaked their products to make them hyper-palatable and difficult to resist. They do this through marketing experiments and consumer behaviour research, schooling taste buds and brains to anticipate and relish specific co*cktails of sweet fats (cakes, biscuits, chocolate, ice cream) and salty fats (chips, hamburgers, cheese, salted nuts). They add ingredients to make these products stimulate taste buds more effectively, while also producing cheaper items with longer life on the shelves, reducing spoilage and the complexity of storage for retailers. Consumers are trained to like the tastes of these foods. Bitter, sour, and umami receptors are comparatively under-stimulated, with sweet, salty, and fat-based tastes favoured in their place. Western societies pay the price for this learned preference in high blood pressure, high cholesterol, diabetes, and obesity. Public health advocate Bruce Neal and colleagues, working to reduce added salt in processed foods, note that the food and manufacturing industries can now provide most of the calories that the world needs to survive. “The challenge now”, they argue, “is to have these same industries provide foods that support long and healthy adult lives. And in this regard there remains a very considerable way to go”. If the public were to believe that their sense of taste is mutable and has been distorted for corporate and industrial gain, and if they were to demand greater access to natural foods in their unprocessed state, then that journey towards a healthier future might be far less protracted than these and many other researchers seem to believe. References Bernstein, Adam, and Walter Willett. “Trends in 24-Hr Sodium Excretion in the United States, 1957–2003: A Systematic Review.” American Journal of Clinical Nutrition 92 (2010): 1172–1180. Bhaktivedanta Book Trust. The Higher Taste: A Guide to Gourmet Vegetarian Cooking and a Karma-Free Diet, over 60 Famous Hare Krishna Recipes. Botany, NSW: Bhaktivedanta Book Trust, 1987. Brinsden, Hannah C., Feng J. He, Katharine H. Jenner, & Graham A. MacGregor. “Surveys of the Salt Content in UK Bread: Progress Made and Further Reductions Possible.” British Medical Journal Open 3.6 (2013). 2 Feb. 2014 ‹http://bmjopen.bmj.com/content/3/6/e002936.full›. Coughlan, Andy. “In Good Taste.” New Scientist 2223 (2000): 11. Dare, Julie, Leesa Costello, and Lelia Green. “Nutritional Narratives: Examining Perspectives on Plant Based Diets in the Context of Dominant Western Discourse”. Proceedings of the 2013 Australian and New Zealand Communication Association Conference. Ed. In Terence Lee, Kathryn Trees, and Renae Desai. Fremantle, Western Australia, 3-5 Jul. 2013. 2 Feb. 2014 ‹http://www.anzca.net/conferences/past-conferences/159.html›. Getz, Christy, and Aimee Shreck. “What Organic and Fair Trade Labels Do Not Tell Us: Towards a Place‐Based Understanding of Certification.” International Journal of Consumer Studies 30.5 (2006): 490–501. Glanz, Karen, Michael Basil, Edward Maibach, Jeanne Goldberg, & Dan Snyder. “Why Americans Eat What They Do: Taste, Nutrition, Cost, Convenience, and Weight Control Concerns as Influences on Food Consumption.” Journal of the American Dietetic Association 98.10 (1988): 1118–1126. Green, Lelia, Leesa Costello, and Julie Dare. “Veganism, Health Expectancy, and the Communication of Sustainability.” Australian Journal of Communication 37.3 (2010): 87–102 Guthman, Julie. Agrarian Dreams: the Paradox of Organic Farming in California. Berkley and Los Angeles, CA: U of California P, 2004 Guthrie, John, Anna Guthrie, Rob Lawson, & Alan Cameron. “Farmers’ Markets: The Small Business Counter-Revolution in Food Production and Retailing.” British Food Journal 108.7 (2006): 560–573. Hall, Colin Michael, and Liz Sharples. Eds. Food and Wine Festivals and Events Around the World: Development, Management and Markets. Oxford, UK: Routledge, 2008. Hamzelou, Jessica. “Taste Bud Trickery Needed to Cut Salt Intake.” New Scientist 2799 (2011): 11. Japan Patent Office. History of Industrial Property Rights, Ten Japanese Great Inventors: Kikunae Ikeda: Sodium Glutamate. Tokyo: Japan Patent Office, 2002. L’Abbé, Mary R., S. Stender, C. M. Skeaff, Ghafoorunissa, & M. Tavella. “Approaches to Removing Trans Fats from the Food Supply in Industrialized and Developing Countries.” European Journal of Clinical Nutrition 63 (2009): S50–S67. Lenoir, Magalie, Fuschia Serre, Lauriane Cantin, & Serge H. Ahmed. “Intense Sweetness Surpasses Cocaine Reward.” PLOS One (2007). 2 Feb. 2014 ‹http://www.plosone.org/article/info%3Adoi%2F10.1371%2Fjournal.pone.0000698›. Lupton, Deborah. Fat. Oxford, UK: Routledge, 2013. MacGregor, Graham, and Sonia Pombo. “The Amount of Hidden Sugar in Your Diet Might Shock You.” The Conversation 9 January (2014). 2 Feb. 2014 ‹http://theconversation.com/the-amount-of-hidden-sugar-in-your-diet-might-shock-you-21867›. Mackeown, Elizabeth. “Cold Turkey?” [Letter]. New Scientist 2787 (2010): 31. Martindale, Diane. “Burgers on the Brain.” New Scientist 2380 (2003): 26–29. Mason, David, and Ian Knowd. “The Emergence of Urban Agriculture: Sydney, Australia.” The International Journal of Agricultural Sustainability 8.1–2 (2010): 62–71. Neal, Bruce, Jacqui Webster, and Sebastien Czernichow. “Sanguine About Salt Reduction.” European Journal of Preventative Cardiology 19.6 (2011): 1324–1325. Nelson, Greg, Jayaram Chandrashekar, Mark A. Hoon, Luxin Feng, Grace Zhao, Nicholas J. P. Ryba, & Charles S. Zuker. “An Amino-Acid Taste Receptor.” Nature 416 (2002): 199–202. O’Callaghan, Tiffany. “Sugar on Trial: What You Really Need to Know.” New Scientist 2954 (2011): 34–39. Rogers, Jenny. Ed. The Taste of Health: The BBC Guide to Healthy Cooking. London, UK: British Broadcasting Corporation, 1985. Rogers, Michael A. “Novel Structuring Strategies for Unsaturated Fats—Meeting the Zero-Trans, Zero-Saturated Fat Challenge: A Review.” Food Research International 42.7 August (2009): 747–753. Schlosser, Eric. Fast Food Nation. London, UK: Penguin, 2002. Super Size Me. Dir. Morgan Spurlock. Samuel Goldwyn Films, 2004. Stafford, Julie. Taste of Life. Richmond, Vic: Greenhouse Publications Ltd, 1983. Stark, Jill. “Australia Now World’s Fattest Nation.” The Age 20 June (2008). 2 Feb. 2014 ‹http://www.theage.com.au/news/health/australia-worlds-fattest-nation/2008/06/19/1213770886872.html›. Trivedi, Bijal. “Junkie Food: Tastes That Your Brain Cannot Resist.” New Scientist 2776 (2010): 38–41. Wang, Jiali, Silvana Obici, Kimyata Morgan, Nir Barzilai, Zhaohui Feng, & Luciano Rossetti. “Overfeeding Rapidly Increases Leptin and Insulin Resistance.” Diabetes 50.12 (2001): 2786–2791. Warin, Megan. “Foucault’s Progeny: Jamie Oliver and the Art of Governing Obesity.” Social Theory & Health 9.1 (2011): 24–40. Weber, Christopher L., and H. Scott Matthews. “Food-miles and the Relative Climate Impacts of Food Choices in the United States.” Environmental Science & Technology 42.10 (2008): 3508–3513. Wessell, Adele, and Donna Lee Brien. Eds. Rewriting the Menu: the Cultural Dynamics of Contemporary Food Choices. Special Issue 9, TEXT: Journal of Writing and Writing Programs October 2010. World Health Organisation. Closing the Gap: Policy into Practice on Social Determinants of Health [Discussion Paper]. Rio de Janeiro, Brazil: World Conference on Social Determinants of Health, World Health Organisation, 19–21 October 2011.

41

Bruns, Axel. "Archiving the Ephemeral." M/C Journal 1, no.2 (August1, 1998). http://dx.doi.org/10.5204/mcj.1708.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

They may have been obscured by the popular media's fascination with the World Wide Web, but for many Net users, Usenet newsgroups still constitute an equally important interactive tool. While Web pages present relatively static information that can be structured through hypertext links and searched using Yahoo! and similar services, newsgroups are fora for open, interactive discussion on virtually any conceivable subject, amongst participants from around the world -- more than any other part of the Net, they are instrumental in the formation of virtual communities by allowing like-minded individuals to get together, exchange their opinions, and organise themselves. Having emerged from email mailing-lists, newsgroups are among the oldest uses of computer networks for communication; based around a simple exchange of all new postings among the participants, they offer few of the comforts of more modern technologies, and so it is not surprising that a number of services have begun to provide powerful Web interfaces for newsgroup access. One of the oldest and most reknowned amongst these sites is Deja News. Since its launch in May 1995, Deja News has expanded to cover around 50,000 different newsgroups, which are contained in a memory archive that is several hundred gigabytes in size, according to some reports (Woods, n.pag.); the company itself boasts accesses by more than three million users each month to the hundreds of millions of articles it has archived ("Company Background", n. pag.). What makes Deja News attractive to so many users are the many search options the service has added to its newsgroups interface. Deja News visitors can search for any article subjects, keywords, newsgroups, or participants' names they are interested in: if you're looking for the absolutely latest on the White House sex scandal, search for "Clinton + Lewinski" and limit your search to articles posted in the last few days or hours; if you want to know what newsgroups your co-worker is writing to in her lunch break, simply ask Deja News to find all postings by "Annabel Smith". If you can't quite remember the address for the latest Internet camera site, Deja News will. To put such powerful research capabilities at the fingertips of any Web user raises any number of legal as well as ethical questions, however. To begin with, does Deja News even have the right to archive anyone's and everyone's postings to newsgroups? The simple fact that users' articles are posted openly, for all newsgroup participants to see, does not necessarily automatically imply that the article may be made available to a greater public elsewhere -- by analogy, if you have a casual conversation with a group of people, you aren't usually expecting to see your words in the history books the next day (but analogies between the Internet and 'real life' are always dangerous). Unless you spoke to someone with a photographic memory, you can usually rely on them gradually forgetting what you said, even if you made a fool out of yourself -- that's human. Appearing as the result of a Deja News search, articles lose their original context -- the newsgroup discussion they were part of -- and are given an entirely different one, a context in which by virtue of being so presented they may gain new and potentially questionable authority. As is so often the case for information on Websites, the information in articles which can thus be found through services like Deja News cannot easily be verified or disproven; due to the loss of context, researchers cannot even gain a feel for a writer's trustworthiness in the same way that seasoned newsgroup members can. Neither may they always detect intentional irony and humour: playful exaggeration may easily appear as deliberate misinformation, friendly oneupmanship as an angry attack. The results of author-based searches may be even more potentially damaging, however. Deja News offers various mechanisms that can include searches restricted to the articles written by a particular user, culminating in the 'author profile' that can be used to list all posts ever made by a particular user. One does not need to be paranoid to imagine ways in which such a powerful research tool may be abused -- perhaps even (and most easily) by the Deja News company itself: since, following general Web etiquette, access to the service is free for normal users, Deja News relies on other avenues of income, and doubtlessly it would be tempting to sell the rights to exploit the Deja News database to professional spammers (Internet junk mailers). These could then aim their advertising emails directly towards the most promising target audience -- those who have in their newsgroups postings shown the most interest in a particular product or service. Indeed, Deja News notes, somewhat vaguely, that it "can provide efficient and effective Internet-based marketing for various types of online marketing goals, such as testing messages, building brand awareness, increasing Website traffic or generating leads" ("Company Background", n. pag.). While such uninvited advertising may be annoying to unsuspecting Internet users, more damaging and mean-spirited uses of the 'author profile' can also be imagined easily. What if your prospective new employer finds the comments you made about the company in a newsgroup article last year? What if they check your author profile for your attitude to drugs (did you ever write an article in rec.drugs.cannabis) or your sexual orientation (any posts to alt.sex.hom*osexual)? What if some extremist group targets you over your support for multiculturalism? Thanks to Deja News and similar services, anything you've ever said may be used against you. The virtual walls of cyberspace have ears, come with a perfect memory, and are prepared to share their knowledge with anyone. A valid line of argument against such criticism notes that we are all responsible for our own actions: newsgroups are, after all, public discussion fora that are open to all participants -- if you make a controversial statement in such a place, you must be prepared to suffer the consequences. However, the threat of being taken out of context must once more be emphasised at this point: while the articles that can be found through Deja News appear to accurately reflect their writers' views, the background against which such views were expressed is much more difficult to extract. Furthermore, only very few newsgroup participants will be aware that their postings are continually being archived, since newsgroups generally appear as a fairly ephemeral medium: only the last few days or, at most, weeks of newsgroup traffic are usually stored on news servers. An awareness of being archived would help writers protect themselves -- it may also serve to impoverish newsgroup discussion, however. Even more importantly, the already-digital, computer-mediated nature of newsgroup discussions has far-reaching implications. Dealing with units of data that come in a handy, easily stored format, services like Deja News tend to archive Usenet newsgroups interminably -- your first flames as a 'clueless newbie', years ago, may therefore today still be used to embarass you. This is the most important new development: analogue, organic, human memory eventually fades; we tend to organise our memories, and remember those things we regard as most important, while others gradually vanish. Many modern legal systems reflect this process by gradually deleting minor and even major offences from a citizen's criminal records -- they forgive as they forget. Other than in cases of extreme Alzheimer's brought about by server crashes and hard disk defects, digital memory, on the other hand, is perfect for unlimited periods of time: once entered into a database, newsgroup articles may be stored forever; ephemeral discussions become matters of permanent record. The computer doesn't forget. While its many Internet accolades bear witness to the benefits users have found in Deja News, the ethical questions the service raises have hardly been addressed so far, least of all on the Deja News Website itself. While apparently the inclusion of a header line "X-noarchive: yes" may prevent articles from being archived by Deja News, this isn't advertised anywhere; neither are there any statements justifying the unauthorised archiving of newsgroups, or any easily accessible mechanisms for users to have their own articles deleted from the archives. As has often been the case on the Internet, a private organisation has therefore become a semi-official institution, simply by virtue of having thought of an idea first; ethics and laws are left behind by technological development, and find that they have some catching-up to do. Of course, none of this should be seen as condemning Deja News as a malevolent organisation out to spy on Internet participants -- in fact, the company so far appears to have shown admirable restraint in declining to exploit its database. Deja News is at the centre of this controversy only by virtue of having implemented the idea of a 'memory of Usenet' too perfectly: not Deja News is the problem, but those who would use, to their own and possibly sinister ends, information made available without charge by Deja News. Eventually, in any way, Deja News itself may be overwhelmed by its own creation: with the amount of Internet users still continually increasing, and with newsgroup articles accumulating, it is gradually getting harder to still find the few most important postings amongst a multitude of discussions (in a similar way, search engine users are beginning to have trouble locating the most relevant Websites on any specific topic amongst a large number of less useful 'vanity' homepages). In the end, then, this new 'perfect' digital memory may have to learn an important capability from its analogue human counterpart: Deja News and similar archives may have to learn how to forget articles of lesser significance. A very simple first step towards this process has already been made: since December 1997, junk mail postings ('spam') are being removed from the Deja News archives (Woods, n. pag.). While such articles, whose uselessness is almost universally agreed upon by the Internet community at large, constitute a clear case for removal, however, any further deletions will mean a significant step away from the original Deja News goal of providing a complete archive of Usenet newsgroups, and towards increasingly controversial value-judgments -- who, after all, is to decide which postings are worth archiving, and which are irrelevant? If memory is to be selective, who will do the selecting? Eventually (and even if new memory management technologies help prevent outright deletion by relegating less important information to some sort of second-rate, less accessed memory space), it seems, the problem returns to being an ethical one -- of what is archived where and for how long, of who has access to these data, and of how newsgroup writers can regain control of their articles to protect themselves and prevent abuse. Deja News and the Internet community as a whole would be well-advised to address the problems raised by this perfect memory of originally ephemeral conversations before any major and damaging abuse can occur. References "Company Background." Deja News. 1998. 11 Aug. 1998 <http://www.dejanews.com/emarket/about/background.shtml> "Deja News Invites Internet Users to Search the World's Largest On-Line Newsgroup Archive." Deja News. 30 May 1996. 11 Aug. 1998 <http://www.dejanews.com/emarket/about/pr/1996/dnpr_960530.shtml>. Woods, Bob. "Deja News Cuts, Increases Content." Newsbytes 8 Dec. 1997. Citation reference for this article MLA style: Axel Bruns. "Archiving the Ephemeral: Deja News and the Ethics of Perfect Memory." M/C: A Journal of Media and Culture 1.2 (1998). [your date of access] <http://www.uq.edu.au/mc/9808/deja.php>. Chicago style: Axel Bruns, "Archiving the Ephemeral: Deja News and the Ethics of Perfect Memory," M/C: A Journal of Media and Culture 1, no. 2 (1998), <http://www.uq.edu.au/mc/9808/deja.php> ([your date of access]). APA style: Axel Bruns. (1998) Archiving the ephemeral: Deja News and the ethics of perfect memory. M/C: A Journal of Media and Culture 1(2). <http://www.uq.edu.au/mc/9808/deja.php> ([your date of access]).

42

Downes,DanielM. "The Medium Vanishes?" M/C Journal 3, no.1 (March1, 2000). http://dx.doi.org/10.5204/mcj.1829.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Introduction The recent AOL/Time-Warner merger invites us to re-think the relationships amongst content producers, distributors, and audiences. Worth an estimated $300 billion (US), the largest Internet transaction of all time, the deal is 45 times larger than the AOL/Netscape merger of November 1998 (Ledbetter). Additionally, the Time Warner/EMI merger, which followed hard on the heels of the AOL/Time-Warner deal and is itself worth $28 billion (US), created the largest content rights organisation in the music industry. The joining of the Internet giant (AOL) with what was already the world's largest media corporation (Time-Warner-EMI) has inspired some exuberant reactions. An Infoworld column proclaimed: The AOL/Time-Warner merger signals the demise of traditional media companies and the ascendancy of 'new economy' media companies that will force any industry hesitant to adopt a complete electronic-commerce strategy to rethink and put itself on Internet time. (Saap & Schwarrtz) This comment identifies the distribution channel as the dominant component of the "new economy" media. But this might not really be much of an innovation. Indeed, the assumption of all industry observers is that Time-Warner will provide broadband distribution (through its extensive cable holdings) as well as proprietary content for AOL. It is also expected that Time-Warner will adopt AOL's strategy of seeking sponsorship for development projects as well as for content. However, both of these phenomena -- merger and sponsorship -- are at least as old as radio. It seems that the Internet is merely repeating an old industrial strategy. Nonetheless, one important difference distinguishes the Internet from earlier media: its characterisation of the audience. Internet companies such as AOL and Microsoft tend towards a simple and simplistic media- centred view of the audience as market. I will show, however, that as the Internet assumes more of the traditional mass media functions, it will be forced to adopt a more sophisticated notion of the mass audience. Indeed, the Internet is currently the site in which audience definitions borrowed from broadcasting are encountering and merging with definitions borrowed from marketing. The Internet apparently lends itself to both models. As a result, definitions of what the Internet does or is, and of how we should understand the audience, are suitably confused and opaque. And the behaviour of big Internet players, such as AOL and MSN, perfectly reflects this confusion as they seem to careen between a view of the Internet as the new television and a contrasting view of the Internet as the new shopping mall. Meanwhile, Internet users move in ways that most observers fail to capture. For example, Baran and Davis characterise mass communication as a process involving (1) an organized sender, (2) engaged in the distribution of messages, (3) directed toward a large audience. They argue that broadcasting fits this model whereas a LISTSERV does not because, even though the LISTSERV may have very many subscribers, its content is filtered through a single person or Webmaster. But why is the Webmaster suddenly more determining than a network programmer or magazine editor? The distinction seems to grow out of the Internet's technological characteristics: it is an interactive pipeline, therefore its use necessarily excludes the possibility of "broadcasting" which in turn causes us to reject "traditional" notions of the audience. However, if a media organisation were to establish an AOL discussion group in order to promote Warner TV shows, for example, would not the resulting communication suddenly fall under the definition as set out by Baran and Davis? It was precisely the confusion around such definitions that caused the CRTC (Canada's broadcasting and telecommunications regulator) to hold hearings in 1999 to determine what kind of medium the Internet is. Unlike traditional broadcasting, Internet communication does indeed include the possibility of interactivity and niche communities. In this sense, it is closer to narrowcasting than to broadcasting even while maintaining the possibility of broadcasting. Hence, the nature of the audience using the Internet quickly becomes muddy. While such muddiness might have led us to sharpen our definitions of the audience, it seems instead to have led many to focus on the medium itself. For example, Morris & Ogan define the Internet as a mass medium because it addresses a mass audience mediated through technology (Morris & Ogan 39). They divide producers and audiences on the Internet into four groups: One-to-one asynchronous communication (e-mail); Many-to-many asynchronous communication (Usenet and News Groups); One-to-one, one-to-few, and one-to-many synchronous communication (topic groups, construction of an object, role-playing games, IRC chats, chat rooms); Asynchronous communication (searches, many-to-one, one-to-one, one to- many, source-receiver relations (Morris & Ogan 42-3) Thus, some Internet communication qualifies as mass communication while some does not. However, the focus remains firmly anchored on either the sender or the medium because the receiver --the audience -- is apparently too slippery to define. When definitions do address the content distributed over the Net, they make a distinction between passive reception and interactive participation. As the World Wide Web makes pre-packaged content the norm, the Internet increasingly resembles a traditional mass medium. Timothy Roscoe argues that the main focus of the World Wide Web is not the production of content (and, hence, the fulfilment of the Internet's democratic potential) but rather the presentation of already produced material: "the dominant activity in relation to the Web is not producing your own content but surfing for content" (Rosco 680). He concludes that if the emphasis is on viewing material, the Internet will become a medium similar to television. Within media studies, several models of the audience compete for dominance in the "new media" economy. Denis McQuail recalls how historically, the electronic media furthered the view of the audience as a "public". The audience was an aggregate of common interests. With broadcasting, the electronic audience was delocalised and socially decomposed (McQuail, Mass 212). According to McQuail, it was not a great step to move from understanding the audience as a dispersed "public" to thinking about the audience as itself a market, both for products and as a commodity to be sold to advertisers. McQuail defines this conception of the audience as an "aggregate of potential customers with a known social- economic profile at which a medium or message is directed" (McQuail, Mass 221). Oddly though, in light of the emancipatory claims made for the Internet, this is precisely the dominant view of the audience in the "new media economy". Media Audience as Market How does the marketing model characterise the relationship between audience and producer? According to McQuail, the marketing model links sender and receiver in a cash transaction between producer and consumer rather than in a communicative relationship between equal interlocutors. Such a model ignores the relationships amongst consumers. Indeed, neither the effectiveness of the communication nor the quality of the communicative experience matters. This model, explicitly calculating and implicitly manipulative, is characteristically a "view from the media" (McQuail, Audience 9). Some scholars, when discussing new media, no longer even refer to audiences. They speak of users or consumers (Pavick & Dennis). The logic of the marketing model lies in the changing revenue base for media industries. Advertising-supported media revenues have been dropping since the early 1990s while user-supported media such as cable, satellite, online services, and pay-per-view, have been steadily growing (Pavlik & Dennis 19). In the Internet-based media landscape, the audience is a revenue stream and a source of consumer information. As Bill Gates says, it is all about "eyeballs". In keeping with this view, AOL hopes to attract consumers with its "one-stop shopping and billing". And Internet providers such as MSN do not even consider their subscribers as "audiences". Instead, they work from a consumer model derived from the computer software industry: individuals make purchases without the seller providing content or thematising the likely use of the software. The analogy extends well beyond the transactional moment. The common practice of prototyping products and beta-testing software requires the participation of potential customers in the product development cycle not as a potential audience sharing meanings but as recalcitrant individuals able to uncover bugs. Hence, media companies like MTV now use the Internet as a source of sophisticated demographic research. Recently, MTV Asia established a Website as a marketing tool to collect preferences and audience profiles (Slater 50). The MTV audience is now part of the product development cycle. Another method for getting information involves the "cookie" file that automatically provides a Website with information about the user who logs on to a site (Pavick & Dennis). Simultaneously, though, both Microsoft and AOL have consciously shifted from user-subscription revenues to advertising in an effort to make online services more like television (Gomery; Darlin). For example, AOL has long tried to produce content through its own studios to generate sufficiently heavy traffic on its Internet service in order to garner profitable advertising fees (Young). However, AOL and Microsoft have had little success in providing content (Krantz; Manes). In fact, faced with the AOL/Time-Warner merger, Microsoft declared that it was in the software rather than the content business (Trott). In short, they are caught between a broadcasting model and a consumer model and their behaviour is characteristically erratic. Similarly, media companies such as Time-Warner have failed to establish their own portals. Indeed, Time-Warner even abandoned attempts to create large Websites to compete with other Internet services when it shut down its Pathfinder site (Egan). Instead it refocussed its Websites so as to blur the line between pitching products and covering them (Reid; Lyons). Since one strategy for gaining large audiences is the creation of portals - - large Websites that keep surfers within the confines of a single company's site by providing content -- this is the logic behind the AOL/Time-Warner merger though both companies have clearly been unsuccessful at precisely such attempts. AOL seems to hope that Time- Warner will act as its content specialist, providing the type of compelling material that will make users want to use AOL, whereas Time- Warner seems to hope that AOL will become its privileged pipeline to the hearts and minds of untold millions. Neither has a coherent view of the audience, how it behaves, or should behave. Consequently, their efforts have a distinctly "unmanaged" and slighly inexplicable air to them, as though everyone were simultaneously hopeful and clueless. While one might argue that the stage is set to capitalise on the audience as commodity, there are indications that the success of such an approach is far from guaranteed. First, the AOL/Time-Warner/EMI transaction, merely by existing, has sparked conflicts over proprietary rights. For example, the Recording Industry Association of America, representing Sony, Universal, BMG, Warner and EMI, recently launched a $6.8 billion lawsuit against MP3.com -- an AOL subsidiary -- for alleged copyright violations. Specifically, MP3.com is being sued for selling digitized music over the Internet without paying royalties to the record companies (Anderson). A similar lawsuit has recently been launched over the issue of re- broadcasting television programs over the Internet. The major US networks have joined together against Canadian Internet company iCravetv for the unlawful distribution of content. Both the iCravetv and the MP3.com cases show how dominant media players can marshal their forces to protect proprietary rights in both content and distribution. Since software and media industries have failed to recreate the Internet in the image of traditional broadcasting, the merger of the dominant players in each industry makes sense. However, their simultaneous failure to secure proprietary rights reflects both the competitive nature of the "new media economy" and the weakness of the marketing view of the audience. Media Audience as Public It is often said that communication produces social cohesion. From such cohesion communities emerge on which political or social orders can be constructed. The power of social cohesion and attachment to group symbols can even create a sense of belonging to a "people" or nation (Deutsch). Sociologist Daniel Bell described how the mass media helped create an American culture simply by addressing a large enough audience. He suggested that on the evening of 7 March 1955, when one out of every two Americans could see Mary Martin as Peter Pan on television, a kind of social revolution occurred and a new American public was born. "It was the first time in history that a single individual was seen and heard at the same time by such a broad public" (Bell, quoted in Mattelart 72). One could easily substitute the 1953 World Series or the birth of little Ricky on I Love Lucy. The desire to document such a process recurs with the Internet. Internet communities are based on the assumption that a common experience "creates" group cohesion (Rheingold; Jones). However, as a mass medium, the Internet has yet to find its originary moment, that event to which all could credibly point as the birth of something genuine and meaningful. A recent contender was the appearance of Paul McCartney at the refurbished Cavern Club in Liverpool. On Tuesday, 14 December 1999, McCartney played to a packed club of 300 fans, while another 150,000 watched on an outdoor screen nearby. MSN arranged to broadcast the concert live over the Internet. It advertised an anticipated global audience of 500 million. Unfortunately, there was such heavy Internet traffic that the system was unable to accommodate more than 3 million people. Servers in the United Kingdom were so congested that many could only watch the choppy video stream via an American link. The concert raises a number of questions about "virtual" events. We can draw several conclusions about measuring Internet audiences. While 3 million is a sizeable audience for a 20 minute transmission, by advertising a potential audience of 500 million, MSN showed remarkably poor judgment of its inherent appeal. The Internet is the first medium that allows access to unprocessed material or information about events to be delivered to an audience with neither the time constraints of broadcast media nor the space limitations of the traditional press. This is often cited as one of the characteristics that sets the Internet apart from other media. This feeds the idea of the Internet audience as a participatory, democratic public. For example, it is often claimed that the Internet can foster democratic participation by providing voters with uninterpreted information about candidates and issues (Selnow). However, as James Curran argues, the very process of distributing uninterrupted, unfiltered information, at least in the case of traditional mass media, represents an abdication of a central democratic function -- that of watchdog to power (Curran). In the end, publics are created and maintained through active and continuous participation on the part of communicators and audiences. The Internet holds together potentially conflicting communicative relationships within the same technological medium (Merrill & Ogan). Viewing the audience as co-participant in a communicative relationship makes more sense than simply focussing on the Internet audience as either an aggregate of consumers or a passively constructed symbolic public. Audience as Relationship Many scholars have shifted attention from the producer to the audience as an active participant in the communication process (Ang; McQuail, Audience). Virginia Nightingale goes further to describe the audience as part of a communicative relationship. Nightingale identifies four factors in the relationship between audiences and producers that emphasize their co-dependency. The audience and producer are engaged in a symbiotic relationship in which consumption and use are necessary but not sufficient explanations of audience relations. The notion of the audience invokes, at least potentially, a greater range of activities than simply use or consumption. Further, the audience actively, if not always consciously, enters relationships with content producers and the institutions that govern the creation, distribution and exhibition of content (Nightingale 149-50). Others have demonstrated how this relationship between audiences and producers is no longer the one-sided affair characterised by the marketing model or the model of the audience as public. A global culture is emerging based on critical viewing skills. Kavoori calls this a reflexive mode born of an increasing familiarity with the narrative conventions of news and an awareness of the institutional imperatives of media industries (Kavoori). Given the sophistication of the emergent global audience, a theory that reduces new media audiences to a set of consumer preferences or behaviours will inevitably prove inadequate, just as it has for understanding audience behavior in old media. Similarly, by ignoring those elements of audience behavior that will be easily transported to the Web, we run the risk of idealising the Internet as a medium that will create an illusory, pre-technological public. Conclusion There is an understandable confusion between the two models of the audience that appear in the examples above. The "new economy" will have to come to terms with sophisticated audiences. Contrary to IBM's claim that they want to "get to know all about you", Internet users do not seem particularly interested in becoming a perpetual source of market information. The fragmented, autonomous audience resists attempts to lock it into proprietary relationships. Internet hypesters talk about creating publics and argue that the Internet recreates the intimacy of community as a corrective to the atomisation and alienation characteristic of mass society. This faith in the power of a medium to create social cohesion recalls the view of the television audience as a public constructed by the common experience of watching an important event. However, MSN's McCartney concert indicates that creating a public from spectacle it is not a simple process. In fact, what the Internet media conglomerates seem to want more than anything is to create consumer bases. Audiences exist for pleasure and by the desire to be entertained. As Internet media institutions are established, the cynical view of the audience as a source of consumer behavior and preferences will inevitably give way, to some extent, to a view of the audience as participant in communication. Audiences will be seen, as they have been by other media, as groups whose attention must be courted and rewarded. Who knows, maybe the AOL/Time-Warner merger might, indeed, signal the new medium's coming of age. References Anderson, Lessley. "To Beam or Not to Beam. MP3.com Is Being Sued by the Major Record Labels. Does the Digital Download Site Stand a Chance?" Industry Standard 31 Jan. 2000. <http://www.thestandard.com>. Ang, Ien. Watching Dallas: Soap Opera and the Melodramatic Imagination. London: Methuen, 1985. Baran, Stanley, and Dennis Davis. Mass Communication Theory: Foundations, Ferment, and Future. 2nd ed. Belmont, Calif.: Wadsworth 2000. Curran, James. "Mass Media and Democracy Revisited." Mass Media and Society. Eds. James Curran and Michael Gurevitch. New York: Hodder Headline Group, 1996. Darlin, Damon. "He Wants Your Eyeballs." Forbes 159 (16 June 1997): 114-6. Egan, Jack, "Pathfinder, Rest in Peace: Time-Warner Pulls the Plug on Site." US News and World Report 126.18 (10 May 1999): 50. Gomery, Douglas. "Making the Web Look like Television (American Online and Microsoft)." American Journalism Review 19 (March 1997): 46. Jones, Steve, ed. CyberSociety: Computer-Mediated Communication and Community. Thousand Oaks: Sage, 1995. Kavoori, Amandam P. "Discursive Texts, Reflexive Audiences: Global Trends in Television News Texts and Audience Reception." Journal of Broadcasting and Electronic Media 43.3 (Summer 1999): 386-98. Krantz, Michael. "Is MSN on the Block?" Time 150 (20 Oct. 1997): 82. Ledbetter, James. "AOL-Time-Warner Make It Big." Industry Standard 11 Jan. 2000. <http://www.thestandard.com>. Lyons, Daniel. "Desparate.com (Media Companies Losing Millions on the Web Turn to Electronic Commerce)." Forbes 163.6 (22 March 1999): 50-1. Manes, Stephen. "The New MSN as Prehistoric TV." New York Times 4 Feb. 1997: C6. McQuail, Denis. Audience Analysis. Thousand Oaks, Calif.: Sage, 1997. ---. Mass Communication Theory. 2nd ed. London: Sage, 1987. Mattelart, Armand. Mapping World Communication: War, Progress, Culture. Trans. Susan Emanuel and James A. Cohen. Minneapolis: U of Minnesota P, 1994. Morris, Merrill, and Christine Ogan. "The Internet as Mass Medium." Journal of Communications 46 (Winter 1996): 39-50. Nightingale, Virginia. Studying Audience: The Shock of the Real. London: Routledge, 1996. Pavlik, John V., and Everette E. Dennis. New Media Technology: Cultural and Commercial Perspectives. 2nd ed. Boston: Allyn and Bacon, 1998. Reid, Calvin. "Time-Warner Seeks Electronic Synergy, Profits on the Web (Pathfinder Site)." Publisher's Weekly 242 (4 Dec. 1995): 12. Rheingold, Howard. Virtual Community: Homesteading on the Electronic Frontier. New York: Harper, 1993. Roscoe, Timothy. "The Construction of the World Wide Web Audience." Media, Culture and Society 21.5 (1999): 673-84. Saap, Geneva, and Ephraim Schwarrtz. "AOL-Time-Warner Deal to Impact Commerce, Content, and Access Markets." Infoworld 11 January 2000. <http://infoworld.com/articles/ic/xml/00/01/11/000111icimpact.xml>. Slater, Joanna. "Cool Customers: Music Channels Hope New Web Sites Tap into Teen Spirit." Far Eastern Economic Review 162.9 (4 March 1999): 50. Trott, Bob. "Microsoft Views AOL-Time-Warner as Confirmation of Its Own Strategy." Infoworld 11 Jan. 2000. <http://infoworld.com/articles/pi/xml/00/01/11/000111pimsaoltw.xml>. Yan, Catherine. "A Major Studio Called AOL?" Business Week 1 Dec. 1997: 1773-4. Citation reference for this article MLA style: Daniel M. Downes. "The Medium Vanishes? The Resurrection of the Mass Audience in the New Media Economy." M/C: A Journal of Media and Culture 3.1 (2000). [your date of access] <http://www.uq.edu.au/mc/0003/mass.php>. Chicago style: Daniel M. Downes, "The Medium Vanishes? The Resurrection of the Mass Audience in the New Media Economy," M/C: A Journal of Media and Culture 3, no. 1 (2000), <http://www.uq.edu.au/mc/0003/mass.php> ([your date of access]). APA style: Daniel M. Downes. (2000) The Medium Vanishes? The Resurrection of the Mass Audience in the New Media Economy. M/C: A Journal of Media and Culture 3(1). <http://www.uq.edu.au/mc/0003/mass.php> ([your date of access]).

43

Mullins, Kimberley. "The Voting Audience." M/C Journal 10, no.6 (April1, 2008). http://dx.doi.org/10.5204/mcj.2716.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Political activity is expected to be of interest to a knowledgeable electorate, citizenry or ‘public’. Performance and entertainment have, on the other hand, been considered the domain of the ‘audience’. The line between active electorate and passive audience has been continually blurred, and as more political communication is designed along the lines of entertainment, the less likely it seems that the distinction will become clearer any time soon. The following article will attempt to thoroughly evaluate the contemporary implications of terms related to ‘public’ and ‘audience’, and to suggest a path forward in understanding the now intertwined roles of these two entities. In political commentary of all kinds, the term ‘audience’ has come to be regularly used in place of the more traditionally political terms ‘public’, ‘electorate’, ‘constituency’ or even ‘mass’, ‘mob’ and ‘multitude’. (Bratich 249) This slight alteration of language would seem to suggest an ongoing, and occasionally unintentional debate as to whether or not our increasingly mediated society has become incapable of true political discourse – an audience to be courted and won solely on the basis of visual and aural stimulation. In some instances, the debate goes unacknowledged, with authors using the term interchangeably with that of voter or public. Others seem to be making a more definite statement, as do the authors of Campaign Craft, wherein the term ‘audience’ is often used to refer to the voting population. (Shea and Burton) In either case, it is clear that the ‘public’ and the ‘audience’ are no longer to be considered two entirely separate entities. To understand the significance of this shift, it is necessary to identify the traditional distinctions of these sometimes problematic terms. To do so we must look briefly at how the original and contemporary meanings have developed. Herbert Blau writes that “audiences, such as they are, are nothing like a public, certainly nothing like the capitalised Public of another time” (Blau 22). That “capitalised Public” he refers to is perhaps the ideal state envisioned by Greek and Roman philosophers in which the community, as a whole, is maintained by and for its own members, and each individual plays a significant and specific role in its maintenance. The “audiences”, however, can be popularly defined as “the assembled spectators or listeners at a public event such as a play, film, concert, or meeting” or “the people giving attention to something”. (Soanes & Stevenson) The difference is subtle but significant. The public is expected to take some active interest in its own maintenance and growth, while the audience is not expected to offer action, just attention. The authors of Soundbite Culture, who would seem to see the blurring between audience and public as a negative side effect of mass media, offer this description of the differences between these two entities: Audiences are talked to; publics are talked with. Audiences are entertained; publics are engaged. Audiences live in the moment; publics have both memory and dreams. Audiences have opinions, publics have thoughts. (Slayden & Whillock 7) A ‘public’ is joined by more than their attendance at or attention to a single performance and responsible for more than just the experience of that performance. While an audience is expected to do little more than consume the performance before them, a public must respond to an experience with appropriate action. A public is a community, bound together by activity and mutual concerns. An audience is joined together only by their mutual interest in, or presence at, a performance. Carpini and Williams note that the term ‘public’ is no longer an adequate way to describe the complex levels of interaction that form contemporary political discourse: “people, politics, and the media are far more complex than this. Individuals are simultaneously citizens, consumers, audiences…and so forth” (Carpini & Williams in Bennett & Entman 161). Marshall sees the audience as both a derivative of and a factor in the larger, more political popular body called the “masses”. These masses define the population largely as an unorganised political power, while audiences emerge in relation to consumer products, as rationalised and therefore somewhat subdued categories within that scope. He notes that although the audience, in the twentieth century, has emerged as a “social category” of its own, it has developed as such in relation to both the unharnessed political power of the masses and the active political power of the public (Marshall 61-70). The audience, then, can be said to be a separate but overlapping state that rationalises and segments the potential of the masses, but also informs the subsequent actions of the public. An audience without some degree of action or involvement is not a public. Such a definition provides important insights into the debate from the perspective of political communication. The cohesiveness of the group that is to define the public can be undermined by mass media. It has been argued that mass media, in particular the internet, have removed all sense of local community and instead provided an information outlet that denies individual response. (Franklin 23; Postman 67-69) It can certainly be argued that with media available on such an instant and individual basis, the necessity of group gathering for information and action has been greatly reduced. Thus, one of the primary functions of the public is eliminated, that of joining together for information. This lack of communal information gathering can eliminate the most important functions of the public: debate and personal action. Those who tune-in to national broadcasts or even read national newspapers to receive political information are generally not invited to debate and pose solutions to the problems that are introduced to them, or to take immediate steps to resolve the conflicts addressed. Instead, they are asked only to fulfill that traditional function of the audience, to receive the information and either absorb or dismiss it. Media also blur the audience/public divide by making it necessary to change the means of political communication. Previous to the advent of mass media, political communication was separated from entertainment by its emphasis on debate and information. Television has led a turn toward more ‘emotion’ and image-based campaigning both for election and for support of a particular political agenda. This subsequently implies that this public has increasingly become primarily an audience. Although this attitude is one that has been adopted by many critics and observers, it is not entirely correct to say that there are no longer any opportunities for the audience to regain their function as a public. On a local level, town hall meetings, public consultations and rallies still exist and provide an opportunity for concerned citizens to voice their opinions and assist in forming local policy. Media, often accused of orchestrating the elimination of the active public, occasionally provide opportunities for more traditional public debate. In both Canada and the US, leaders are invited to participate in ‘town hall’ style television debates in which audience members are invited to ask questions. In the UK, both print media and television tend to offer opportunities for leaders to respond to the questions and concerns of individuals. Many newspapers publish responses and letters from many different readers, allowing for public debate and interaction. (McNair 13) In addition, newspapers such as The Washington Post and The Globe and Mail operate Websites that allow the public to comment on articles published in the paper text. In Canada, radio is often used as a forum for public debate and comment. The Canadian Broadcast Corporation’s Cross Country Check Up and Cross Talk allows mediated debate between citizens across the country. Regional stations offer similar programming. Local television news programmes often include ‘person on the street’ interviews on current issues and opportunities for the audience to voice their arguments on-air. Of course, in most of these instances, the information received from the audience is moderated, and shared selectively. This does not, however, negate the fact that there is interaction between that audience and the media. Perhaps the greatest challenge to traditional interpretations of media-audience response is the proliferation of the internet. As McNair observes, “the emergence of the internet has provided new opportunities for public participation in political debate, such as blogging and ‘citizen journalism’. Websites such as YouTube permit marginal political groups to make statements with global reach” (McNair 13). These ‘inter-networks’ not only provide alternative information for audiences to seek out, but also give audience members the ability to respond to any communication in an immediate and public way. Therefore, the audience member can exert potentially wide reaching influence on the public agenda and dialogue, clearly altering the accept-or-refuse model often applied to mediated communication. Opinion polls provide us with an opportunity to verify this shift away from the ‘hypodermic needle’ approach to communication theory (Sanderson King 61). Just as an audience can be responsible for the success of a theatre or television show based on attendance or viewing numbers, so too have public opinion polls been designed to measure, without nuance, only whether the audience accepts or dismisses what is presented to them through the media. There is little place for any measure of actual thought or opinion. The first indications of an upset in this balance resulted in tremendous surprise, as was the case during the US Clinton/Lewinsky scandal (Lawrence & Bennett 425). Stephanopoulos writes that after a full year of coverage of the Monica Lewinsky ‘scandal’, Clinton’s public approval poll numbers were “higher than ever” while the Republican leaders who had initiated the inquiry were suffering from a serious lack of public support (Stephanopoulos 442). Carpini and Williams also observed that public opinion polls taken during the media frenzy showed very little change of any kind, although the movement that did occur was in the direction of increased support for Clinton. This was in direct contrast to what “…traditional agenda-setting, framing, and priming theory would predict” (Carpini & Williams in Bennett & Entman 177). Zaller confirms that the expectation among news organisations, journalists, and political scientists was never realised; despite being cast by the media in a negative role, and despite the consumption of that negative media, the audience refused to judge the President solely on his framed persona (Zaller in Bennett & Entman 255). It was clear that the majority of the population in the US, and in other countries, were exposed to the information regarding the Clinton scandal. At the height of the scandal, it was almost unavoidable (Zaller in Bennett & Entman 254). Therefore it cannot be said that the information the media provided was not being consumed. Rather, the audience did not agree with the media’s attempts to persuade them, and communicated this through opinion polls, creating something resembling a mass political dialogue. As Lawrence and Bennett discuss in their article regarding the Lewinsky/Clinton public opinion “phenomenon”, it should not be assumed by polling institutions or public opinion watchers that the projected angle of the media will be immediately adopted by the public (Lawerence & Bennett 425). Although the media presented a preferred reading of the text, it could not ensure that the audience would interpret that meaning (Hall in Curran, Gurevitch & Harris 343). The audience’s decoding of the media’s message would have to depend on each audience member’s personal experiences and their impression of the media that was presenting the communication. This kind of response is, in fact, encouraging. If the audience relies on mainstream media to provide a frame and context to all political communication, then they are giving up their civic responsibility and placing complete authority in the hands of those actively involved in the process of communicating events. It could be suggested that the reported increase in the perceived reliabilty of internet news sources (Kinsella 251) can be at least partially attributed to the audience’s increasing awareness of these frames and limitations on mainstream media presentation. With the increase in ‘backstage’ reporting, the audience has become hyper-aware of the use of these strategies in communications. The audience is now using its knowledge and media access to decipher information, as it is presented to them, for authenticity and context. While there are those who would lament the fact that the community driven public is largely in the past and focus their attention on finding ways to see the old methods of communication revived, others argue that the way to move forward is not to regret the existence of an audience, but to alter our ideas about how to understand it. It has been suggested that in order to become a more democratic society we must now “re-conceive audiences as citizens” (Golding in Ferguson 98). And despite Blau’s pronouncement that audiences are “nothing like a public”, he later points out that there is still the possibility of unity even in the most diverse of audiences. “The presence of an audience is in itself a sign of coherence”(Blau 23). As Rothenbuhler writes: There is too much casualness in the use of the word spectator…A spectator is almost never simply looking at something. On the contrary, most forms of spectatorship are socially prescribed and performed roles and forms of communication…the spectator, then, is not simply a viewer but a participant in a larger system. (Rothenbuhler 65) We cannot regress to a time when audiences are reserved for the theatre and publics for civic matters. In a highly networked world that relies on communicating via the methods and media of entertainment, it is impossible to remove the role of the audience member from the role of citizen. This does not necessarily need to be a negative aspect of democracy, but instead a step in its constant evolution. There are positive aspects to the audience/public as well as potential negatives. McNair equates the increase in mediated communication with an increase in political knowledge and involvement, particularly for those on the margins of society who are unlikely to be exposed to national political activity in person. He notes that the advent of television may have limited political discourse to a media-friendly sound bite, but that it still increases the information dispensed to the majority of the population. Despite the ideals of democracy, the majority of the voting population is not extremely well informed as to political issues, and prior to the advent of mass media, were very unlikely to have an opportunity to become immersed in the details of policy. Media have increased the amount of political information the average citizen will be exposed to in their lifetime (McNair 41). With this in mind, it is possible to equate the faults of mass media not with their continued growth, but with society’s inability to recognise the effects of the media as technologies and to adjust education accordingly. While the quality of information and understanding regarding the actions and ideals of national political leaders may be disputed, the fact that they are more widely distributed than ever before is not. They have an audience at all times, and though that audience may receive information via a filtered medium, they are still present and active. As McNair notes, if the purpose of democracy is to increase the number of people participating in the political process, then mass media have clearly served to promote the democratic ideal (McNair 204). However, these positives are qualified by the fact that audiences must also possess the skills, the interests and the knowledge of a public, or else risk isolation that limits their power to contribute to public discourse in a meaningful way. The need for an accountable, educated audience has not gone unnoticed throughout the history of mass media. Cultural observers such as Postman, McLuhan, John Kennedy, and even Pope Pius XII have cited the need for education in media. As McLuhan aptly noted, “to the student of media, it is difficult to explain the human indifference to the social effect of these radical forces”(McLuhan 304). In 1964, McLuhan wrote that, “education will become recognised as civil defence against media fallout. The only medium for which our education now offers some civil defence is the print medium”(McLuhan 305). Unfortunately, it is only gradually and usually at an advanced level of higher education that the study and analysis of media has developed to any degree. The mass audiences, those who control the powers of the public, often remain formally uneducated as to the influence that the mediating factors of television have on the distribution of information. Although the audience may have developed a level of sophistication in their awareness of media frames, the public has not been taught how to translate this awareness into any real political or social understanding. The result is a community susceptible to being overtaken by manipulations of any medium. Those who attempt to convey political messages have only added to that confusion by being unclear as to whether or not they are attempting to address an audience or engage a public. In some instances, politicians and their teams focus their sole attention on the public, not taking into consideration the necessities of communicating with an audience, often to the detriment of political success. On the other hand, some focus their attentions on attracting and maintaining an audience, often to the detriment of the political process. This confusion may be a symptom of the mixed messages regarding the appropriate attitude toward performance that is generated by western culture. In an environment where open attention to performance is both demanded and distained, communication choices can be difficult. Instead we are likely to blindly observe the steady increase in the entertainment style packaging of our national politics. Until the audience fully incorporates itself with the public, we will see an absence of action, and excess of confused consumption (Kraus 18). Contemporary society has moved far beyond the traditional concepts of exclusive audience or public domains, and yet we have not fully articulated or defined what this change in structure really means. Although this review does suggest that contemporary citizens are both audience and public simultaneously, it is also clear that further discussion needs to occur before either of those roles can be fully understood in a contemporary communications context. References Bennett, Lance C., and Robert M. Entman. Mediated Politics: Communication in the Future of Democracy. Cambridge: Cambridge UP, 2001. Blau, Herbert. The Audience. Baltimore: Johns Hopkins UP, 1990. Bratich, Jack Z. “Amassing the Multitude: Revisiting Early Audience Studies”. Communication Theory 15 (2005): 242-65. Curran, J., M. Gurevitch, and D. Janet Harris, eds. Mass Communication and Society. Beverley Hills: Sage, 1977. DeLuca, T., and J. Buell. Liars! Cheaters! Evildoers! Demonization and the End of Civil Debate in American Politics. New York: New York UP, 2005. Ferguson, Marjorie, ed. Public Communication: The New Imperatives. London: Sage, 1990. Franklin, Bob. Packaging Politics. London: Edward Arnold, 1994. Gamson, Joshua. Claims to Fame: Celebrity in Contemporary America. Berkeley: U of California P, 1994. Keown, Leslie-Anne. “Keeping Up with the Times: Canadians and Their News Media Diets.” Canadian Social Trends June 2007. Government of Canada. Kinsella, Warren. The War Room. Toronto: Dunduran Group, 2007. Kraus, Sidney. Televised Presidential Debates and Public Policy. New Jersey: Lawerence Erlbaum Associates, 2000. Lawrence, Regina, and Lance Bennett. “Rethinking Media Politics and Public Opinion: Reactions to the Clinton-Lewinsky Scandal”. Political Science Quarterly 116 (Fall 2001): 425-46. Marland, Alex. Political Marketing in Modern Canadian Federal Elections. Dalhousie University: Canadian Political Science Association Conference, 2003. Marshall, P. David. Celebrity and Power. Minneapolis: U of Minnesota P, 1997. McLuhan, Marshall. Understanding Media. New ed. London: ARK Paperbacks, 1987 [1964]. McNair, Brian. An Introduction to Political Communication. 4th ed. London: Routledge, 2007. The Oxford Dictionary of English. Eds. Catherine Soanes and Angus Stevenson. Rev. ed. Oxford UP, 2005. Oxford Reference Online. Oxford UP. 1 Mar. 2008. http://www.oxfordreference.com.qe2aproxy.mun.ca/views/ ENTRY.html?subview=Main&entry=t140.e4525>. Postman, Neil. Amusing Ourselves to Death. New York: Penguin, 1985. Rothenbuhler, Eric W. Ritual Communication. Thousand Oaks, California: Sage, 1998. Sanderson King, Sarah. Human Communication as a Field of Study. New York: State U of New York P, 1990. Schultz, David A., ed. It’s Show Time! Media, Politics and Popular Culture. New York: Peter Lang, 2000. Shea, Daniel, and Michael John Burton. Campaign Craft. 3rd ed. Westport: Praeger, 2006. Slayden, D., and R.K. Whillock. Soundbite Culture: The Death of Discourse in a Wired World. London: Sage, 1999. Stephanopoulos, George. All Too Human. Boston: Little, Brown and Co., 1999. Webster, James C. “Beneath the Veneer of Fragmentation: Television Audience Polarization in a Multichannel World.” Journal of Communication 55 (June 2005): 366-82. Woodward, Gary C. Center Stage: Media and the Performance of American Politics. Lanham: Rowman and Littlefield, 2007. Xenos, Michael, and Kirsten Foot. “Not Your Father’s Internet: The Generation Gap in Online Politics.” Civic Life Online: Learning How Digital Media Can Engage Youth. Cambridge: MIT P, 2008. Citation reference for this article MLA Style Mullins, Kimberley. "The Voting Audience." M/C Journal 10.6/11.1 (2008). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0804/03-mullins.php>. APA Style Mullins, K. (Apr. 2008) "The Voting Audience," M/C Journal, 10(6)/11(1). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0804/03-mullins.php>.

44

Hunter,JohnC. "Organic Interfaces; or, How Human Beings Augment Their Digital Devices." M/C Journal 16, no.6 (November7, 2013). http://dx.doi.org/10.5204/mcj.743.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

In many ways, computers are becoming invisible and will continue to do so. When we reach into our pockets and pull out our cell phones to find a place to eat or message a friend on Facebook, we are no longer consciously aware that we are interacting with a user experience that has been consciously designed for our computer or device screen—but we are.— Andy Pratt and Jason Nunes, Interactive Design In theory, cell phones and other information and communication technologies (ICTs) are just a means for us to interact with people, businesses, and data sources. They have interfaces and, in a larger sense, are interfaces between their users and the networked world. Every day, people spend more time using them to perform more different tasks and find them more indispensable (Smith). As the epigraph above suggests, however, their omnipresence makes them practically invisible and has all but erased any feelings of awe or mystery that their power once generated. There is both a historical and functional dimension to this situation. In the historical advance of technology, it is part of what Kevin Kelly calls the “technium,” the ever-more complex interactions between advancing technology, our cognitive processes, and the cultural forces in which they are enmeshed; ICTs are measurably getting more powerful as time goes on and are, in this sense, worthy of our admiration (Kelly 11-17). In the functional dimension, on the other hand, many scholars and designers have observed how hard it is to hold on to this feeling of enchantment in our digital devices (Nye 185-226; McCarthy and Wright 192-97). As one study of human-computer interfaces observes “when people let the enchanting object [ICTs] do the emotional work of experience for them . . . what could be enchanting interactivity becomes a paradoxically detached interpassivity” (McCarthy et al. 377). ICTs can be ever more powerful, then, but this power will not necessarily be appreciated by their users. This paper analyzes recent narrative representations of ICT use in spy thrillers, with a particular focus on the canon of James Bond films (a sub-genre with a long-standing and overt fascination with advanced technology, especially ICTs), in order to explore how the banality of ICT technology has become the inescapable accompaniment of its power (Willis; Britton 99-123; 195-219). Among many possible recent examples: recall how Bond uses his ordinary cell phone camera to reveal the membership of the sinister Quantum group at an opera performance in Quantum of Solace; how world-wide video surveillance is depicted as inescapable (and amoral) in The Bourne Legacy; and how the anonymous protagonist of Roman Polanski’s Ghost Writer discovers the vital piece of top secret information that explains the entire film—by searching for it on his laptop via Google. In each of these cases, ICTs are represented as both incredibly powerful and tediously quotidian. More precisely, in each case human users are represented as interfaces between ICTs and their stored knowledge, rather than the reverse. Beginning with an account of how the naturalization of ICTs has changed the perceived relations between technology and its users, this essay argues that the promotional rhetoric of human empowerment and augmentation surrounding ICTs is opposed by a persistent cinematic theme of human subordination to technological needs. The question it seeks to open is why—why do the mainstream cinematic narratives of our culture depict the ICTs that enhance our capacities to know and communicate as something that diminishes rather than augments us? One answer (which can only be provisionally sketched here) is the loss of pleasure. It does not matter whether or not technology augments our capacities if it cannot sustain the fantasy of pleasure and/or enhancement at the same time. Without this fantasy, ICTs are represented as usurping position as the knowing subject and users, in turn, become the media connecting them– even when that user is James Bond. The Rhetoric of Augmentation Until the past five years or so, the technologization of the human mind was almost always represented in popular culture as a threat to humanity—whether it be Ira Levin’s robotic Stepford Wives as the debased expression of male wish-fulfillment (Levin), or Jonathan Demme’s brainwashed assassins with computer chip implants in his remake of The Manchurian Candidate. When Captain Picard, the leader and moral centre of the television series Star Trek: The Next Generation, is taken over by the Borg (an alien machine race that seeks to absorb other species into its technologized collective mind) in an episode from 1990, it is described as “assimilation” rather than an augmentation. The Borg version of Picard says to his former comrades that “we only wish to raise quality of life, for all species,” and it is a chilling, completely unemotional threat to the survival of our species (“Best of Both Worlds”). By 2012, on the other hand, the very same imagery is being used to sell smart phones by celebrating the technological enhancements that allegedly make us better human beings. In Verizon’s Droid DNA phone promotions, the product is depicted as an artificial heart for its user, one that enhances memory, “neural speed,” and “predictive intelligence” (thanks to Google Now). The tagline for the Verizon ad claims that “It’s not an upgrade to your phone; it’s an upgrade to yourself”, echoing Borg-Picard’s threat but this time as an aspirational promise (“Verizon Commercial”). The same technologization of the mind that was anathema just a few years ago, is now presented as both a desirable consumer goal and a professional necessity—the final close-up of the Verizon artificial heart shows that this 21st century cyborg has to be at his job in 26 minutes; the omnipresence of work in a networked world is here literally taken to heart. There is, notably, no promise of pleasure or liberation anywhere in this advertisem*nt. We are meant to desire this product very much, but solely because it allows us to do more and better work. Not coincidentally, the period that witnessed this inversion in popular culture also saw an exponential increase in the quantity and variety of digitally networked devices in our lives (“Mobile Cellular”) and the emergence of serious cultural, scientific, and philosophical movements exploring the idea of “enhanced” human beings, whether through digital tool use, biomedical prostheses, drugs, or genetic modifications (Buchanan; Savulescu and Bostrom; “Humanity +”). As the material boundaries of the “human” have become more permeable and malleable, and as the technologies that make this possible become everyday objects, our resistance to this possibility has receded. The discourse of the transhuman and extropian is now firmly established as a philosophical possibility (Lilley). Personal augmentation with the promise of pleasure is still, of course, very much present in the presentation of ICTs. Launching the iPad 2 in 2011, the late Steve Jobs described his new product as a “magical and revolutionary device” with an “incredible magical user interface on a much larger canvas with more resources” and gushing that “it's technology married with liberal arts, married with the humanities, that yields us the result that makes our hearts sing” (“Apple Special Event”). This is the rhetoric of augmentation through technology and, as in the Verizon ad, it is very careful to position the consumer/user at the centre of the experience. The technology is described as wonderful not just in itself, but also precisely because it gives users “a larger canvas” with which to create. Likewise, the lifelogging movement (which encourages people to use small cameras to record every event of daily life) is at great pains to stress that “you, not your desktop’s hard drive, are the hub of your digital belongings” (Bell and Gemmell 10). But do users experience life with these devices as augmented? Is either the Verizon work cyborg or the iPad user’s singing heart representative of how these devices make us feel? It depends upon the context in which the question is asked. Extensive survey data on cell phone use shows that we are more attached than ever to our phones, that they allow us to be “productive” in otherwise dead times (such as while waiting in queues), and that only a minority of users worry about the negative effects of being “permanently connected” (Smith 9-10). Representations of technological augmentation in 21st century popular cinema, however, offer a very different perspective. Even in James Bond films, which (since Goldfinger in 1964) have been enraptured with technological devices as augmentations for its protagonists and as lures for audiences, digital devices have (in the three most recent films) lost their magic and become banal in the same way as they have in the lives of audience members (Nitins 2010; Nitins 2011; “List of James Bond Gadgets”). Rather than focusing on technological empowerment, the post 2006 Bond films emphasize (1) that ICTs “know” things and that human agents are just the media that connect them together; and (2) that the reciprocal nature of networked ICTs means that we are always visible when we use them; like Verizon phone users, our on-screen heroes have to learn that the same technology that empowers them simultaneously empowers others to know and/or control them. Using examples from the James Bond franchise, the remainder of this paper discusses the simultaneous disenchantment and power of ICT technology in the films as a representative sample of the cultural status of ICTs as a whole. “We don’t go in for that sort of thing any more...” From Goldfinger until the end of Pierce Brosnan’s tenure in 2002, technological devices were an important part of the audience’s pleasure in a Bond film (Willis; Nitins 2011). James Bond’s jetpack in Thunderball, to give one of many examples, is a quasi-magical aid for the hero with literary precursors going back to Aeneas’s golden bough; it is utterly enchanting and, equally importantly, fun. In the most recent Bond film, Skyfall, however, Q, the character who has historically made Bond’s technology, reappears after a two-film hiatus, but in the guise of a computer nerd who openly disdains the pleasures and possibilities of technological augmentation. When Bond complains about receiving only a gun and a radio from him, Q replies: “What did you expect? An exploding pen? We don’t really go in for that sort of thing any more.” Technology is henceforth to be banal and invisible albeit (as the film’s computer hacker villain Silva demonstrates) still incredibly powerful. The film’s pleasures must come from elsewhere. The post-credit sequence in Casino Royale, which involves the pursuit and eventual death of a terrorist bomb-maker, perfectly embodies the diminished importance of human agents as bearers of knowledge. It is bracketed at the beginning by the bomber looking at a text message while under surveillance by Bond and a colleague and at the end by Bond looking at the same message after having killed him. Significantly, the camera angle and setup of both shots make it impossible to distinguish between Bond’s hand and the bomber’s as they see the same piece of information on the same phone. The ideological, legal, racial, and other differences between the two men are erased in pursuit of the data (the name “Ellipsis” and a phone number) that they both covet. As digitally-transmitted data, it is there for anyone, completely unaffected by the moral or legal value attached to its users. Cell phones in these films are, in many ways, better sources of information than their owners—after killing a phone’s owner, his or her network traces can show exactly where s/he has been and to whom s/he has been talking, and this is how Bond proceeds. The bomber’s phone contacts lead Bond to the Bahamas, to the next villain in the chain, whom Bond kills and from whom he obtains another cell phone, which allows the next narrative location to be established (Miami Airport) and the next villain to be located (by calling his cell phone in a crowded room and seeing who answers) (Demetrios). There are no conventional interrogations needed here, because it is the digital devices that are the locus of knowledge rather than people. Even Bond’s lover Vesper Lynd sends her most important message to him (the name and cell phone number of the film’s arch villain) in a posthumous text, rather than in an actual conversation. Cell phones do not enable communication between people; people connect the important information that cell phones hold together. The second manifestation of the disenchantment of ICT technology is the disempowering omnipresence of surveillance. Bond and his colleague are noticed by the bomber when the colleague touches his supposedly invisible communication earpiece. With the audience’s point of view conflated with that of the secret agent, the technology of concealment becomes precisely what reveals the secret agent’s identity in the midst of a chaotic scene in which staying anonymous should be the easiest thing in the world; other villains identify Bond by the same means in a hotel hallway later in the film. While chasing the bomber, Bond is recorded by a surveillance camera in the act of killing him on the grounds of a foreign embassy. The secret agent is, as a result, made into an object of knowledge for the international media, prompting M (Bond’s boss) to exclaim that their political masters “don’t care what we do, they care what we get photographed doing.” Bond is henceforth part of the mediascape, so well known as a spy that he refuses to use the alias that MI6 provides for his climactic encounter with the main villain LeChiffre on the grounds that any well-connected master criminal will know who he is anyway. This can, of course, go both ways: Bond uses the omnipresence of surveillance to find another of his targets by using the security cameras of a casino. This one image contains many layers of reference—Bond the character has found his man; he has also found an iconic image from his own cultural past (the Aston Martin DB V car that is the only clearly delineated object in the frame) that he cannot understand as such because Casino Royale is a “reboot” and he has only just become 007. But the audience knows what it means and can insert this incarnation of James Bond in its historical sequence and enjoy the allusion to a past of which Bond is oblivious. The point is that surveillance is omnipresent, anonymity is impossible, and we are always being watched and interpreted by someone. This is true in the film’s narrative and also in the cultural/historical contexts in which the Bond films operate. It may be better to be the watcher rather than the watched, but we are always already both. By the end of the film, Bond is literally being framed by technological devices and becomes the organic connection between different pieces of technology. The literal centrality of the human agent in these images is not, in this disenchanted landscape, an indication of his importance. The cell phones to which Bond listens in these images connect him (and us) to the past, the back story or context provided by his masters that permits the audience to understand the complex plot that is unfolding before them. The devices at which he looks represent the future, the next situation or person that he must contain. He does not fully understand what is happening, but he is not there to understand – he is there to join the information held in the various devices together, which (in this film) usually means to kill someone. The third image in this sequence is from the final scene of the film, and the assault rifle marks this end—the chain of cell phone messages (direct and indirect) that has driven Casino Royale from its outset has been stopped. The narrative stops with it. Bond’s centrality amid these ICTS and their messages is simultaneously what allows him to complete his mission and what subjects him to their needs. This kind of technological power can be so banal precisely because it has been stripped of pleasure and of any kind of mystique. The conclusion of Skyfall reinforces this by inverting all of the norms that Bond films have created about their climaxes: instead of the technologically-empowered villain’s lair being destroyed, it is Bond’s childhood home that is blown up. Rather than beating the computer hacker at his own game, Bond kills him with a knife in a medieval Scottish church. It could hardly be less hi-tech if it tried, which is precisely the point. What the Bond franchise and the other films mentioned above have shown us, is that we do not rely on ICTs for enchantment any more because they are so powerfully connected to the everyday reality of work and to the loss of privacy that our digital devices exact as the price of their use. The advertising materials that sell them to us have to rely on the rhetoric of augmentation, but these films are signs that we do not experience them as empowering devices any more. The deeper irony is that (for once) the ICT consumer products being advertised to us today really do what their promotional materials claim: they are faster, more powerful, and more widely applicable in our lives than ever before. Without the user fantasy of augmentation, however, this truth has very little power to move us. We depict ourselves as the medium, and it is our digital devices that bear the message.References“Apple Special Event. March 2, 2011.” Apple Events. 21 Sep. 2013 ‹http://events.apple.com.edgesuite.net/1103pijanbdvaaj/event/index.html›. Bell, Gordon, and Jim Gemmell. Total Recall: How the E-Memory Revolution Will Change Everything. New York: Dutton, 2009.“The Best of Both Worlds: Part Two.” Star Trek: The Next Generation. Dir. Cliff Bole. Paramount, 2013. The Bourne Legacy. Dir. Tony Gilroy. Universal Pictures, 2012. Britton, Wesley. Beyond Bond: Spies in Fiction and Film. Westport, CT: Praeger, 2005. Buchanan, Allen. Beyond Humanity: The Ethics of Biomedical Enhancement. Uehiro Series in Practical Ethics. New York: Oxford University Press, 2011. Casino Royale. Dir. Martin Campbell. Columbia Pictures, 2006. “Data’s Day.” Star Trek: The Next Generation. Dir. Robert Wiemer. Burbank, CA: Paramount, 2013. The Ghost Writer. Dir. Roman Polanski. R.P. Productions/France 2 Cinéma, 2010. “Humanity +”. 25 Aug. 2013 ‹http://humanityplus.org›. Kelly, Kevin. What Technology Wants. New York: Viking, 2010. Levin, Ira. The Stepford Wives. Introd. Peter Straub. New York: William Morrow, 2002. Lilley, Stephen. Transhumanism and Society: The Social Debate over Human Enhancement. New York: Springer, 2013. “List of James Bond Gadgets.” Wikipedia. 11 Nov. 2013 ‹http://en.wikipedia.org/wiki/List_of_James_Bond_gadgets›. The Manchurian Candidate. Dir. Jonathan Demme. Paramount, 2004. McCarthy, John, and Peter Wright. Technology as Experience. Cambridge, Mass.: MIT Press, 2004. McCarthy, John, et al. “The Experience of Enchantment in Human–Computer Interaction.” Journal of Personal and Ubiquitous Computing 10 (2006): 369-78. “Mobile Cellular Subscriptions (per 100 People).” The World Bank. 25 March 2013 ‹http://data.worldbank.org/indicator/IT.CEL.SETS.P2›. Nitins, Tanya L. “A Boy and His Toys: Technology and Gadgetry in the James Bond Films.” James Bond in World and Popular Culture: The Films Are Not Enough. Eds. Rob Weiner, B. Lynn Whitfield, and Jack Becker. Newcastle upon Tyne: Cambridge Scholars Publishing, 2010. 445-58. ———. Selling James Bond: Product Placement in the James Bond Films. Newcastle upon Tyne: Cambridge Scholars Publishing, 2011. Nye, David E. Technology Matters—Questions to Live With. Cambridge, MA: MIT Press, 2006. Pratt, Andy, and Jason Nunes Interactive Design: An Introduction to the Theory and Application of User-Centered Design. Beverly, MA: Rockport, 2012. Quantum of Solace. Dir: Marc Foster, Eon Productions, 2008. DVD. Savulescu, Julian, and Nick Bostrom, eds. Human Enhancement. Oxford: Oxford University Press, 2009. Skyfall. Dir. Sam Mendes. Eon Productions, 2012. Smith, Aaron. The Best and Worst of Mobile Connectivity. Pew Internet & American Life Project. Pew Research Center. 25 Aug. 2013 ‹http://pewinternet.org/Reports/2012/Best-Worst-Mobile.aspx›. Thunderball. Dir. Terence Young. Eon Productions, 1965. “Verizon Commercial – Droid DNA ‘Hyper Intelligence’.” 11 April 2013 ‹http://www.youtube.com/watch?v=IYIAaBOb5Bo›. Willis, Martin. “Hard-Wear: The Millenium, Technology, and Brosnan’s Bond.” The James Bond Phenomenon: A Critical Reader. Ed. Christoph Linder. Manchester: Manchester University Press, 2001. 151-65.

45

Flynn, Bernadette. "Towards an Aesthetics of Navigation." M/C Journal 3, no.5 (October1, 2000). http://dx.doi.org/10.5204/mcj.1875.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Introduction Explorations of the multimedia game format within cultural studies have been broadly approached from two perspectives: one -- the impact of technologies on user interaction particularly with regard to social implications, and the other -- human computer interactions within the framework of cybercultures. Another approach to understanding or speaking about games within cultural studies is to focus on the game experience as cultural practice -- as an activity or an event. In this article I wish to initiate an exploration of the aesthetics of player space as a distinctive element of the gameplay experience. In doing so I propose that an understanding of aesthetic spatial issues as an element of player interactivity and engagement is important for understanding the cultural practice of adventure gameplay. In approaching these questions, I am focussing on the single-player exploration adventure game in particular Myst and The Crystal Key. In describing these games as adventures I am drawing on Chris Crawford's The Art of Computer Game Design, which although a little dated, focusses on game design as a distinct activity. He brings together a theoretical approach with extensive experience as a game designer himself (Excalibur, Legionnaire, Gossip). Whilst at Atari he also worked with Brenda Laurel, a key theorist in the area of computer design and dramatic structure. Adventure games such as Myst and The Crystal Key might form a sub-genre in Chris Crawford's taxonomy of computer game design. Although they use the main conventions of the adventure game -- essentially a puzzle to be solved with characters within a story context -- the main focus and source of pleasure for the player is exploration, particularly the exploration of worlds or cosmologies. The main gameplay of both games is to travel through worlds solving clues, picking up objects, and interacting with other characters. In Myst the player has to solve the riddle of the world they have entered -- as the CD-ROM insert states "Now you're here, wherever here is, with no option but to explore." The goal, as the player must work out, is to release the father Atrus from prison by bringing magic pages of a book to different locations in the worlds. Hints are offered by broken-up, disrupted video clips shown throughout the game. In The Crystal Key, the player as test pilot has to save a civilisation by finding clues, picking up objects, mending ships and defeating an opponent. The questions foregrounded by a focus on the aesthetics of navigation are: What types of representational context are being set up? What choices have designers made about representational context? How are the players positioned within these spaces? What are the implications for the player's sense of orientation and navigation? Architectural Fabrication For the ancient Greeks, painting was divided into two categories: magalography (the painting of great things) and rhyparography (the painting of small things). Magalography covered mythological and historical scenes, which emphasised architectural settings, the human figure and grand landscapes. Rhyparography referred to still lifes and objects. In adventure games, particularly those that attempt to construct a cosmology such as Myst and The Crystal Key, magalography and rhyparography collide in a mix of architectural monumentality and obsessive detailing of objects. For the ancient Greeks, painting was divided into two categories: magalography (the painting of great things) and rhyparography (the painting of small things). Magalography covered mythological and historical scenes, which emphasised architectural settings, the human figure and grand landscapes. Rhyparography referred to still lifes and objects. In adventure games, particularly those that attempt to construct a cosmology such as Myst and The Crystal Key, magalography and rhyparography collide in a mix of architectural monumentality and obsessive detailing of objects. The creation of a digital architecture in adventure games mimics the Pompeii wall paintings with their interplay of extruded and painted features. In visualising the space of a cosmology, the environment starts to be coded like the urban or built environment with underlying geometry and textured surface or dressing. In The Making of Myst (packaged with the CD-ROM) Chuck Carter, the artist on Myst, outlines the process of creating Myst Island through painting the terrain in grey scale then extruding the features and adding textural render -- a methodology that lends itself to a hybrid of architectural and painted geometry. Examples of external architecture and of internal room design can be viewed online. In the spatial organisation of the murals of Pompeii and later Rome, orthogonals converged towards several vertical axes showing multiple points of view simultaneously. During the high Renaissance, notions of perspective developed into a more formal system known as the construzione legittima or legitimate construction. This assumed a singular position of the on-looker standing in the same place as that occupied by the artist when the painting was constructed. In Myst there is an exaggeration of the underlying structuring technique of the construzione legittima with its emphasis on geometry and mathematics. The player looks down at a slight angle onto the screen from a fixed vantage point and is signified as being within the cosmological expanse, either in off-screen space or as the cursor. Within the cosmology, the island as built environment appears as though viewed through an enlarging lens, creating the precision and coldness of a Piero della Francesca painting. Myst mixes flat and three-dimensional forms of imagery on the same screen -- the flat, sketchy portrayal of the trees of Myst Island exists side-by-side with the monumental architectural buildings and landscape design structures created in Macromodel. This image shows the flat, almost expressionistic trees of Myst Island juxtaposed with a fountain rendered in high detail. This recalls the work of Giotto in the Arena chapel. In Joachim's Dream, objects and buildings have depth, but trees, plants and sky -- the space in-between objects -- is flat. Myst Island conjures up the realm of a magic, realist space with obsolete artefacts, classic architectural styles (the Albert Hall as the domed launch pad, the British Museum as the library, the vernacular cottage in the wood), mechanical wonders, miniature ships, fountains, wells, macabre torture instruments, ziggurat-like towers, symbols and odd numerological codes. Adam Mates describes it as "that beautiful piece of brain-deadening sticky-sweet eye-candy" but more than mere eye-candy or graphic verisimilitude, it is the mix of cultural ingredients and signs that makes Myst an intriguing place to play. The buildings in The Crystal Key, an exploratory adventure game in a similar genre to Myst, celebrate the machine aesthetic and modernism with Buckminster Fuller style geodesic structures, the bombe shape, exposed ducting, glass and steel, interiors with movable room partitions and abstract expressionist decorations. An image of one of these modernist structures is available online. The Crystal Key uses QuickTime VR panoramas to construct the exterior and interior spaces. Different from the sharp detail of Myst's structures, the focus changes from sharp in wide shot to soft focus in close up, with hot-spot objects rendered in trompe l'oeil detail. The Tactility of Objects "The aim of trompe l'oeil -- using the term in its widest sense and applying it to both painting and objects -- is primarily to puzzle and to mystify" (Battersby 19). In the 15th century, Brunelleschi invented a screen with central apparatus in order to obtain exact perspective -- the monocular vision of the camera obscura. During the 17th century, there was a renewed interest in optics by the Dutch artists of the Rembrandt school (inspired by instruments developed for Dutch seafaring ventures), in particular Vermeer, Hoogstraten, de Hooch and Dou. Gerard Dou's painting of a woman chopping onions shows this. These artists were experimenting with interior perspective and trompe l'oeil in order to depict the minutia of the middle-class, domestic interior. Within these luminous interiors, with their receding tiles and domestic furniture, is an elevation of the significance of rhyparography. In the Girl Chopping Onions of 1646 by Gerard Dou the small things are emphasised -- the group of onions, candlestick holder, dead fowl, metal pitcher, and bird cage. Trompe l'oeil as an illusionist strategy is taken up in the worlds of Myst, The Crystal Key and others in the adventure game genre. Traditionally, the fascination of trompe l'oeil rests upon the tension between the actual painting and the scam; the physical structures and the faux painted structures call for the viewer to step closer to wave at a fly or test if the glass had actually broken in the frame. Mirian Milman describes trompe l'oeil painting in the following manner: "the repertory of trompe-l'oeil painting is made up of obsessive elements, it represents a reality immobilised by nails, held in the grip of death, corroded by time, glimpsed through half-open doors or curtains, containing messages that are sometimes unreadable, allusions that are often misunderstood, and a disorder of seemingly familiar and yet remote objects" (105). Her description could be a scene from Myst with in its suggestion of theatricality, rich texture and illusionistic play of riddle or puzzle. In the trompe l'oeil painterly device known as cartellino, niches and recesses in the wall are represented with projecting elements and mock bas-relief. This architectural trickery is simulated in the digital imaging of extruded and painting elements to give depth to an interior or an object. Other techniques common to trompe l'oeil -- doors, shadowy depths and staircases, half opened cupboard, and paintings often with drapes and curtains to suggest a layering of planes -- are used throughout Myst as transition points. In the trompe l'oeil paintings, these transition points were often framed with curtains or drapes that appeared to be from the spectator space -- creating a painting of a painting effect. Myst is rich in this suggestion of worlds within worlds through the framing gesture afforded by windows, doors, picture frames, bookcases and fireplaces. Views from a window -- a distant landscape or a domestic view, a common device for trompe l'oeil -- are used in Myst to represent passageways and transitions onto different levels. Vertical space is critical for extending navigation beyond the horizontal through the terraced landscape -- the tower, antechamber, dungeon, cellars and lifts of the fictional world. Screen shots show the use of the curve, light diffusion and terracing to invite the player. In The Crystal Key vertical space is limited to the extent of the QTVR tilt making navigation more of a horizontal experience. Out-Stilling the Still Dutch and Flemish miniatures of the 17th century give the impression of being viewed from above and through a focussing lens. As Mastai notes: "trompe l'oeil, therefore is not merely a certain kind of still life painting, it should in fact 'out-still' the stillest of still lifes" (156). The intricate detailing of objects rendered in higher resolution than the background elements creates a type of hyper-reality that is used in Myst to emphasise the physicality and actuality of objects. This ultimately enlarges the sense of space between objects and codes them as elements of significance within the gameplay. The obsessive, almost fetishistic, detailed displays of material artefacts recall the curiosity cabinets of Fabritius and Hoogstraten. The mechanical world of Myst replicates the Dutch 17th century fascination with the optical devices of the telescope, the convex mirror and the prism, by coding them as key signifiers/icons in the frame. In his peepshow of 1660, Hoogstraten plays with an enigma and optical illusion of a Dutch domestic interior seen as though through the wrong end of a telescope. Using the anamorphic effect, the image only makes sense from one vantage point -- an effect which has a contemporary counterpart in the digital morphing widely used in adventure games. The use of crumbled or folded paper standing out from the plane surface of the canvas was a recurring motif of the Vanitas trompe l'oeil paintings. The highly detailed representation and organisation of objects in the Vanitas pictures contained the narrative or symbology of a religious or moral tale. (As in this example by Hoogstraten.) In the cosmology of Myst and The Crystal Key, paper contains the narrative of the back-story lovingly represented in scrolls, books and curled paper messages. The entry into Myst is through the pages of an open book, and throughout the game, books occupy a privileged position as holders of stories and secrets that are used to unlock the puzzles of the game. Myst can be read as a Dantesque, labyrinthine journey with its rich tapestry of images, its multi-level historical associations and battle of good and evil. Indeed the developers, brothers Robyn and Rand Miller, had a fertile background to draw on, from a childhood spent travelling to Bible churches with their nondenominational preacher father. The Diorama as System Event The diorama (story in the round) or mechanical exhibit invented by Daguerre in the 19th century created a mini-cosmology with player anticipation, action and narrative. It functioned as a mini-theatre (with the spectator forming the fourth wall), offering a peek into mini-episodes from foreign worlds of experience. The Musée Mechanique in San Francisco has dioramas of the Chinese opium den, party on the captain's boat, French execution scenes and ghostly graveyard episodes amongst its many offerings, including a still showing an upper class dancing party called A Message from the Sea. These function in tandem with other forbidden pleasures of the late 19th century -- public displays of the dead, waxwork museums and kinetescope flip cards with their voyeuristic "What the Butler Saw", and "What the Maid Did on Her Day Off" tropes. Myst, along with The 7th Guest, Doom and Tomb Raider show a similar taste for verisimilitude and the macabre. However, the pre-rendered scenes of Myst and The Crystal Key allow for more diorama like elaborate and embellished details compared to the emphasis on speed in the real-time-rendered graphics of the shoot-'em-ups. In the gameplay of adventure games, animated moments function as rewards or responsive system events: allowing the player to navigate through the seemingly solid wall; enabling curtains to be swung back, passageways to appear, doors to open, bookcases to disappear. These short sequences resemble the techniques used in mechanical dioramas where a coin placed in the slot enables a curtain or doorway to open revealing a miniature narrative or tableau -- the closure of the narrative resulting in the doorway shutting or the curtain being pulled over again. These repeating cycles of contemplation-action-closure offer the player one of the rewards of the puzzle solution. The sense of verisimilitude and immersion in these scenes is underscored by the addition of sound effects (doors slamming, lifts creaking, room atmosphere) and music. Geographic Locomotion Static imagery is the standard backdrop of the navigable space of the cosmology game landscape. Myst used a virtual camera around a virtual set to create a sequence of still camera shots for each point of view. The use of the still image lends itself to a sense of the tableauesque -- the moment frozen in time. These tableauesque moments tend towards the clean and anaesthetic, lacking any evidence of the player's visceral presence or of other human habitation. The player's navigation from one tableau screen to the next takes the form of a 'cyber-leap' or visual jump cut. These jumps -- forward, backwards, up, down, west, east -- follow on from the geographic orientation of the early text-based adventure games. In their graphic form, they reveal a new framing angle or point of view on the scene whilst ignoring the rules of classical continuity editing. Games such as The Crystal Key show the player's movement through space (from one QTVR node to another) by employing a disorientating fast zoom, as though from the perspective of a supercharged wheelchair. Rather than reconciling the player to the state of movement, this technique tends to draw attention to the technologies of the programming apparatus. The Crystal Key sets up a meticulous screen language similar to filmic dramatic conventions then breaks its own conventions by allowing the player to jump out of the crashed spaceship through the still intact window. The landscape in adventure games is always partial, cropped and fragmented. The player has to try and map the geographical relationship of the environment in order to understand where they are and how to proceed (or go back). Examples include selecting the number of marker switches on the island to receive Atrus's message and the orientation of Myst's tower in the library map to obtain key clues. A screenshot shows the arrival point in Myst from the dock. In comprehending the landscape, which has no centre, the player has to create a mental map of the environment by sorting significant connecting elements into chunks of spatial elements similar to a Guy Debord Situationist map. Playing the Flaneur The player in Myst can afford to saunter through the landscape, meandering at a more leisurely pace that would be possible in a competitive shoot-'em-up, behaving as a type of flaneur. The image of the flaneur as described by Baudelaire motions towards fin de siècle decadence, the image of the socially marginal, the dispossessed aristocrat wandering the urban landscape ready for adventure and unusual exploits. This develops into the idea of the artist as observer meandering through city spaces and using the power of memory in evoking what is observed for translation into paintings, writing or poetry. In Myst, the player as flaneur, rather than creating paintings or writing, is scanning the landscape for clues, witnessing objects, possible hints and pick-ups. The numbers in the keypad in the antechamber, the notes from Atrus, the handles on the island marker, the tower in the forest and the miniature ship in the fountain all form part of a mnemomic trompe l'oeil. A screenshot shows the path to the library with one of the island markers and the note from Atrus. In the world of Myst, the player has no avatar presence and wanders around a seemingly unpeopled landscape -- strolling as a tourist venturing into the unknown -- creating and storing a mental map of objects and places. In places these become items for collection -- cultural icons with an emphasised materiality. In The Crystal Key iconography they appear at the bottom of the screen pulsing with relevance when active. A screenshot shows a view to a distant forest with the "pick-ups" at the bottom of the screen. This process of accumulation and synthesis suggests a Surrealist version of Joseph Cornell's strolls around Manhattan -- collecting, shifting and organising objects into significance. In his 1982 taxonomy of game design, Chris Crawford argues that without competition these worlds are not really games at all. That was before the existence of the Myst adventure sub-genre where the pleasures of the flaneur are a particular aspect of the gameplay pleasures outside of the rules of win/loose, combat and dominance. By turning the landscape itself into a pathway of significance signs and symbols, Myst, The Crystal Key and other games in the sub-genre offer different types of pleasures from combat or sport -- the pleasures of the stroll -- the player as observer and cultural explorer. References Battersby, M. Trompe L'Oeil: The Eye Deceived. New York: St. Martin's, 1974. Crawford, C. The Art of Computer Game Design. Original publication 1982, book out of print. 15 Oct. 2000 <http://members.nbci.com/kalid/art/art.php>. Darley Andrew. Visual Digital Culture: Surface Play and Spectacle in New Media Genres. London: Routledge, 2000. Lunenfeld, P. Digital Dialectic: New Essays on New Media. Cambridge, Mass.: MIT P 1999. Mates, A. Effective Illusory Worlds: A Comparative Analysis of Interfaces in Contemporary Interactive Fiction. 1998. 15 Oct. 2000 <http://www.wwa.com/~mathes/stuff/writings>. Mastai, M. L. d'Orange. Illusion in Art, Trompe L'Oeil: A History of Pictorial Illusion. New York: Abaris, 1975. Miller, Robyn and Rand. "The Making of Myst." Myst. Cyan and Broderbund, 1993. Milman, M. Trompe-L'Oeil: The Illusion of Reality. New York: Skira Rizzoli, 1982. Murray, J. Hamlet on the Holodeck: The Future of Narrative in Cyberspace. New York: Simon and Schuster, 1997. Wertheim, M. The Pearly Gates of Cyberspace: A History of Cyberspace from Dante to the Internet. Sydney: Doubleday, 1999. Game References 7th Guest. Trilobyte, Inc., distributed by Virgin Games, 1993. Doom. Id Software, 1992. Excalibur. Chris Crawford, 1982. Myst. Cyan and Broderbund, 1993. Tomb Raider. Core Design and Eidos Interactive, 1996. The Crystal Key. Dreamcatcher Interactive, 1999. Citation reference for this article MLA style: Bernadette Flynn. "Towards an Aesthetics of Navigation -- Spatial Organisation in the Cosmology of the Adventure Game." M/C: A Journal of Media and Culture 3.5 (2000). [your date of access] <http://www.api-network.com/mc/0010/navigation.php>. Chicago style: Bernadette Flynn, "Towards an Aesthetics of Navigation -- Spatial Organisation in the Cosmology of the Adventure Game," M/C: A Journal of Media and Culture 3, no. 5 (2000), <http://www.api-network.com/mc/0010/navigation.php> ([your date of access]). APA style: Bernadette Flynn. (2000) Towards an aesthetics of navigation -- spatial organisation in the cosmology of the adventure game. M/C: A Journal of Media and Culture 3(5). <http://www.api-network.com/mc/0010/navigation.php> ([your date of access]).

46

Ali, Kawsar. "Zoom-ing in on White Supremacy." M/C Journal 24, no.3 (June21, 2021). http://dx.doi.org/10.5204/mcj.2786.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

The Alt Right Are Not Alright Academic explorations complicating both the Internet and whiteness have often focussed on the rise of the “alt-right” to examine the co-option of digital technologies to extend white supremacy (Daniels, “Cyber Racism”; Daniels, “Algorithmic Rise”; Nagle). The term “alt-right” refers to media organisations, personalities, and sarcastic Internet users who promote the “alternative right”, understood as extremely conservative, political views online. The alt-right, in all of their online variations and inter-grouping, are infamous for supporting white supremacy online, “characterized by heavy use of social media and online memes. Alt-righters eschew ‘establishment’ conservatism, skew young, and embrace white ethnonationalism as a fundamental value” (Southern Poverty Law Center). Theoretical studies of the alt-right have largely focussed on its growing presence across social media and websites such as Twitter, Reddit, and notoriously “chan” sites 4chan and 8chan, through the political discussions referred to as “threads” on the site (Nagle; Daniels, “Algorithmic Rise”; Hawley). As well, the ability of online users to surpass national boundaries and spread global white supremacy through the Internet has also been studied (Back et al.). The alt-right have found a home on the Internet, using its features to cunningly recruit members and to establish a growing community that mainstream politically extreme views (Daniels, “Cyber Racism”; Daniels, “Algorithmic Rise; Munn). This body of knowledge shows that academics have been able to produce critically relevant literature regarding the alt-right despite the online anonymity of the majority of its members. For example, Conway et al., in their analysis of the history and social media patterns of the alt-right, follow the unique nature of the Christchurch Massacre, encompassing the use and development of message boards, fringe websites, and social media sites to champion white supremacy online. Positioning my research in this literature, I am interested in contributing further knowledge regarding the alt-right, white supremacy, and the Internet by exploring the sinister conducting of Zoom-bombing anti-racist events. Here, I will investigate how white supremacy through the Internet can lead to violence, abuse, and fear that “transcends the virtual world to damage real, live humans beings” via Zoom-bombing, an act that is situated in a larger co-option of the Internet by the alt-right and white supremacists, but has been under theorised as a hate crime (Daniels; “Cyber Racism” 7). sh*tposting I want to preface this chapter by acknowledging that while I understand the Internet, through my own external investigations of race, power and the Internet, as a series of entities that produce racial violence both online and offline, I am aware of the use of the Internet to frame, discuss, and share anti-racist activism. Here we can turn to the work of philosopher Michel de Certeau who conceived the idea of a “tactic” as a way to construct a space of agency in opposition to institutional power. This becomes a way that marginalised groups, such as racialised peoples, can utilise the Internet as a tactical material to assert themselves and their non-compliance with the state. Particularly, sh*tposting, a tactic often associated with the alt-right, has also been co-opted by those who fight for social justice and rally against oppression both online and offline. As Roderick Graham explores, the Internet, and for this exploration, sh*tposting, can be used to proliferate deviant and racist material but also as a “deviant” byway of oppositional and anti-racist material. Despite this, a lot can be said about the invisible yet present claims and support of whiteness through Internet and digital technologies, as well as the activity of users channelled through these screens, such as the alt-right and their digital tactics. As Vikki Fraser remarks, “the internet assumes whiteness as the norm – whiteness is made visible through what is left unsaid, through the assumption that white need not be said” (120). It is through the lens of white privilege and claims to white supremacy that online irony, by way of sh*tposting, is co-opted and understood as an inherently alt-right tool, through the deviance it entails. Their sinister co-option of sh*tposting bolsters audacious claims as to who has the right to exist, in their support of white identity, but also hides behind a veil of mischief that can hide their more insidious intention and political ideologies. The alt-right have used “sh*tposting”, an online style of posting and interacting with other users, to create a form of online communication for a translocal identity of white nationalist members. Sean McEwan defines sh*tposting as “a form of Internet interaction predicated upon thwarting established norms of discourse in favour of seemingly anarchic, poor quality contributions” (19). Far from being random, however, I argue that sh*tposting functions as a discourse that is employed by online communities to discuss, proliferate, and introduce white supremacist ideals among their communities as well as into the mainstream. In the course of this article, I will introduce racist Zoom-bombing as a tactic situated in sh*tposting which can be used as a means of white supremacist discourse and an attempt to block anti-racist efforts. By this line, the function of discourse as one “to preserve or to reproduce discourse (within) a closed community” is calculatingly met through sh*tposting, Zoom-bombing, and more overt forms of white supremacy online (Foucault 225-226). Using memes, dehumanisation, and sarcasm, online white supremacists have created a means of both organising and mainstreaming white supremacy through humour that allows insidious themes to be mocked and then spread online. Foucault writes that “in every society the production of discourse is at once controlled, selected, organised and redistributed according to a certain number of procedures, whose role is to avert its powers and danger, to cope with chance events, to evade ponderous, awesome materiality” (216). As Philippe-Joseph Salazar recontextualises to online white supremacists, “the first procedure of control is to define what is prohibited, in essence, to set aside that which cannot be spoken about, and thus to produce strategies to counter it” (137). By this line, the alt-right reorganises these procedures and allocates a checked speech that will allow their ideas to proliferate in like-minded and growing communities. As a result, online white supremacists becoming a “community of discourse” advantages them in two ways: first, ironic language permits the mainstreaming of hate that allows sinister content to enter the public as the severity of their intentions is doubted due to the sarcastic language employed. Second, sh*tposting is employed as an entry gate to more serious and dangerous participation with white supremacist action, engagement, and ideologies. It is important to note that white privilege is embodied in these discursive practices as despite this exploitation of emerging technologies to further white supremacy, there are approaches that theorise the alt-right as “crazed product(s) of an isolated, extremist milieu with no links to the mainstream” (Moses 201). In this way, it is useful to consider sh*tposting as an informal approach that mirrors legitimised white sovereignties and authorised white supremacy. The result is that white supremacist online users succeed in “not only in assembling a community of actors and a collective of authors, on the dual territory of digital communication and grass-roots activism”, but also shape an effective fellowship of discourse that audiences react well to online, encouraging its reception and mainstreaming (Salazar 142). Continuing, as McBain writes, “someone who would not dream of donning a white cap and attending a Ku Klux Klan meeting might find themselves laughing along to a video by the alt-right satirist RamZPaul”. This idea is echoed in a leaked stylistic guide by white supremacist website and message board the Daily Stormer that highlights irony as a cultivated mechanism used to draw new audiences to the far right, step by step (Wilson). As showcased in the screen capture below of the stylistic guide, “the reader is at first drawn in by curiosity or the naughty humor and is slowly awakened to reality by repeatedly reading the same points” (Feinburg). The result of this style of writing is used “to immerse recruits in an online movement culture built on memes, racial panic and the worst of Internet culture” (Wilson). Figure 1: A screenshot of the Daily Stormer’s playbook, expanding on the stylistic decisions of alt-right writers. Racist Zoom-Bombing In the timely text “Racist Zoombombing”, Lisa Nakamura et al. write the following: Zoombombing is more than just trolling; though it belongs to a broad category of online behavior meant to produce a negative reaction, it has an intimate connection with online conspiracy theorists and white supremacy … . Zoombombing should not be lumped into the larger category of trolling, both because the word “trolling” has become so broad it is nearly meaningless at times, and because zoombombing is designed to cause intimate harm and terrorize its target in distinct ways. (30) Notwithstanding the seriousness of Zoom-bombing, and to not minimise its insidiousness by understanding it as a form of sh*tposting, my article seeks to reiterate the seriousness of sh*tposting, which, in the age of COVID-19, Zoom-bombing has become an example of. I seek to purport the insidiousness of the tactical strategies of the alt-right online in a larger context of white violence online. Therefore, I am proposing a more critical look at the tactical use of the Internet by the alt-right, in theorising sh*tposting and Zoom-bombing as means of hate crimes wherein they impose upon anti-racist activism and organising. Newlands et al., receiving only limited exposure pre-pandemic, write that “Zoom has become a household name and an essential component for parties (Matyszczyk, 2020), weddings (Pajer, 2020), school and work” (1). However, through this came the strategic use of co-opting the application by the alt-right to digitise terror and ensure a “growing framework of memetic warfare” (Nakamura et al. 31). Kruglanski et al. label this co-opting of online tools to champion white supremacy operations via Zoom-bombing an example of sh*tposting: Not yet protesting the lockdown orders in front of statehouses, far-right extremists infiltrated Zoom calls and shared their screens, projecting violent and graphic imagery such as swastikas and p*rnography into the homes of unsuspecting attendees and making it impossible for schools to rely on Zoom for home-based lessons. Such actions, known as “Zoombombing,” were eventually curtailed by Zoom features requiring hosts to admit people into Zoom meetings as a default setting with an option to opt-out. (128) By this, we can draw on existing literature that has theorised white supremacists as innovation opportunists regarding their co-option of the Internet, as supported through Jessie Daniels’s work, “during the shift of the white supremacist movement from print to digital online users exploited emerging technologies to further their ideological goals” (“Algorithmic Rise” 63). Selfe and Selfe write in their description of the computer interface as a “political and ideological boundary land” that may serve larger cultural systems of domination in much the same way that geopolitical borders do (418). Considering these theorisations of white supremacists utilising tools that appear neutral for racialised aims and the political possibilities of whiteness online, we can consider racist Zoom-bombing as an assertion of a battle that seeks to disrupt racial justice online but also assert white supremacy as its own legitimate cause. My first encounter of local Zoom-bombing was during the Institute for Culture and Society (ICS) Seminar titled “Intersecting Crises” by Western Sydney University. The event sought to explore the concatenation of deeply inextricable ecological, political, economic, racial, and social crises. An academic involved in the facilitation of the event, Alana Lentin, live tweeted during the Zoom-bombing of the event: Figure 2: Academic Alana Lentin on Twitter live tweeting the Zoom-bombing of the Intersecting Crises event. Upon reflecting on this instance, I wondered, could efforts have been organised to prevent white supremacy? In considering who may or may not be responsible for halting racist sh*t-posting, we can problematise the work of R David Lankes, who writes that “Zoom-bombing is when inadequate security on the part of the person organizing a video conference allows uninvited users to join and disrupt a meeting. It can be anything from a prankster logging on, yelling, and logging off to uninvited users” (217). However, this beckons two areas to consider in theorising racist Zoom-bombing as a means of isolated trolling. First, this approach to Zoom-bombing minimises the sinister intentions of Zoom-bombing when referring to people as pranksters. Albeit withholding the “mimic trickery and mischief that were already present in spaces such as real-life classrooms and town halls” it may be more useful to consider theorising Zoom-bombing as often racialised harassment and a counter aggression to anti-racist initiatives (Nakamura et al. 30). Due to the live nature of most Zoom meetings, it is increasingly difficult to halt the threat of the alt-right from Zoom-bombing meetings. In “A First Look at Zoom-bombings” a range of preventative strategies are encouraged for Zoom organisers including “unique meeting links for each participant, although we acknowledge that this has usability implications and might not always be feasible” (Ling et al. 1). The alt-right exploit gaps, akin to co-opting the mainstreaming of trolling and sh*tposting, to put forward their agenda on white supremacy and assert their presence when not welcome. Therefore, utilising the pandemic to instil new forms of terror, it can be said that Zoom-bombing becomes a new means to sh*tpost, where the alt-right “exploits Zoom’s uniquely liminal space, a space of intimacy generated by users via the relationship between the digital screen and what it can depict, the device’s audio tools and how they can transmit and receive sound, the software that we can see, and the software that we can’t” (Nakamura et al. 29). Second, this definition of Zoom-bombing begs the question, is this a fair assessment to write that reiterates the blame of organisers? Rather, we can consider other gaps that have resulted in the misuse of Zoom co-opted by the alt-right: “two conditions have paved the way for Zoom-bombing: a resurgent fascist movement that has found its legs and best megaphone on the Internet and an often-unwitting public who have been suddenly required to spend many hours a day on this platform” (Nakamura et al. 29). In this way, it is interesting to note that recommendations to halt Zoom-bombing revolve around the energy, resources, and attention of the organisers to practically address possible threats, rather than the onus being placed on those who maintain these systems and those who Zoom-bomb. As Jessie Daniels states, “we should hold the platform accountable for this type of damage that it's facilitated. It's the platform's fault and it shouldn't be left to individual users who are making Zoom millions, if not billions, of dollars right now” (Ruf 8). Brian Friedberg, Gabrielle Lim, and Joan Donovan explore the organised efforts by the alt-right to impose on Zoom events and disturb schedules: “coordinated raids of Zoom meetings have become a social activity traversing the networked terrain of multiple platforms and web spaces. Raiders coordinate by sharing links to Zoom meetings targets and other operational and logistical details regarding the execution of an attack” (14). By encouraging a mass coordination of racist Zoom-bombing, in turn, social justice organisers are made to feel overwhelmed and that their efforts will be counteracted inevitably by a large and organised group, albeit appearing prankster-like. Aligning with the idea that “Zoombombing conceals and contains the terror and psychological harm that targets of active harassment face because it doesn’t leave a trace unless an alert user records the meeting”, it is useful to consider to what extent racist Zoom-bombing becomes a new weapon of the alt-right to entertain and affirm current members, and engage and influence new members (Nakamura et al. 34). I propose that we consider Zoom-bombing through sh*tposting, which is within “the location of matrix of domination (white supremacy, heteropatriarchy, ableism, capitalism, and settler colonialism)” to challenge the role of interface design and Internet infrastructure in enabling racial violence online (Costanza-Chock). Conclusion As Nakamura et al. have argued, Zoom-bombing is indeed “part of the lineage or ecosystem of trollish behavior”, yet these new forms of alt-right sh*tposting “[need] to be critiqued and understood as more than simply trolling because this term emerged during an earlier, less media-rich and interpersonally live Internet” (32). I recommend theorising the alt-right in a way that highlights the larger structures of white power, privilege, and supremacy that maintain their online and offline legacies beyond Zoom, “to view white supremacy not as a static ideology or condition, but to instead focus on its geographic and temporal contingency” that allows acts of hate crime by individuals on politicised bodies (Inwood and Bonds 722). This corresponds with Claire Renzetti’s argument that “criminologists theorise that committing a hate crime is a means of accomplishing a particular type of power, hegemonic masculinity, which is described as white, Christian, able-bodied and heterosexual” – an approach that can be applied to theorisations of the alt-right and online violence (136). This violent white masculinity occupies a hegemonic hold in the formation, reproduction, and extension of white supremacy that is then shared, affirmed, and idolised through a racialised Internet (Donaldson et al.). Therefore, I recommend that we situate Zoom-bombing as a means of sh*tposting, by reiterating the severity of sh*tposting with the same intentions and sinister goals of hate crimes and racial violence. References Back, Les, et al. “Racism on the Internet: Mapping Neo-Fascist Subcultures in Cyber-Space.” Nation and Race: The Developing Euro-American Racist Subculture. Eds. Jeffrey Kaplan and Tore Bjørgo. Northeastern UP, 1993. 73-101. Bonds, Anne, and Joshua Inwood. “Beyond White Privilege: Geographies of White Supremacy and Settler Colonialism.” Progress in Human Geography 40 (2015): 715-733. Conway, Maura, et al. “Right-Wing Extremists’ Persistent Online Presence: History and Contemporary Trends.” The International Centre for Counter-Terrorism – The Hague. Policy Brief, 2019. Costanza-Chock, Sasha. “Design Justice and User Interface Design, 2020.” Proceedings of the 33rd Annual ACM Symposium on User Interface Software and Technology. Association for Computing Machinery, 2020. Daniels, Jessie. “The Algorithmic Rise of the ‘Alt-Right.’” Contexts 17 (2018): 60-65. ———. “Race and Racism in Internet Studies: A Review and Critique.” New Media & Society 15 (2013): 695-719. ———. Cyber Racism: White Supremacy Online and the New Attack on Civil Rights. Rowman and Littlefield, 2009. De Certeau, Michel. The Practice of Everyday Life. First ed. U of California P, 1980. Donaldson, Mike. “What Is Hegemonic Masculinity?” Theory and Society 22 (1993): 643-657. Feinburg, Ashley. “This Is The Daily Stormer’s Playbook.” Huffington Post 13 Dec. 2017. <http://www.huffpost.com/entry/daily-stormer-nazi-style-guide_n_5a2ece19e4b0ce3b344492f2>. Foucault, Michel. “The Discourse on Language.” The Archaeology of Knowledge and the Discourse on Language. Ed. A.M. Sheridan Smith. Pantheon, 1971. 215-237. Fraser, Vicki. “Online Bodies and Sexual Subjectivities: In Whose Image?” The Racial Politics of Bodies, Nations and Knowledges. Eds. Barbara Baird and Damien W. Riggs. Newcastle: Cambridge Scholars Publishing, 2015. 116-132. Friedberg, Brian, Gabrielle Lim, and Joan Donovan. “Space Invaders: The Networked Terrain of Zoom Bombing.” Harvard Shorenstein Center, 2020. Graham, Roderick. “Race, Social Media and Deviance.” The Palgrave Handbook of International Cybercrime and Cyberdeviance. Eds. Thomas J. Holt and Adam M. Bossler, 2019. 67-90. Hawley, George. Making Sense of the Alt-Right. Columbia UP, 2017. Henry, Matthew G., and Lawrence D. Berg. “Geographers Performing Nationalism and Hetero-Masculinity.” Gender, Place & Culture 13 (2006): 629-645. Kruglanski, Arie W., et al. “Terrorism in Time of the Pandemic: Exploiting Mayhem.” Global Security: Health, Science and Policy 5 (2020): 121-132. Lankes, R. David. Forged in War: How a Century of War Created Today's Information Society. Rowman & Littlefield, 2021. Ling, Chen, et al. “A First Look at Zoombombing, 2021.” Proceedings of the 42nd IEEE Symposium on Security and Privacy. Oakland, 2021. McBain, Sophie. “The Alt-Right, and How the Paranoia of White Identity Politics Fuelled Trump’s Rise.” New Statesman 27 Nov. 2017. <http://www.newstatesman.com/culture/books/2017/11/alt-right-and-how-paranoia-white-identity-politics-fuelled-trump-s-rise>. McEwan, Sean. “Nation of sh*tposters: Ironic Engagement with the Facebook Posts of Shannon Noll as Reconfiguration of an Australian National Identity.” Journal of Media and Communication 8 (2017): 19-39. Morgensen, Scott Lauria. “Theorising Gender, Sexuality and Settler Colonialism: An Introduction.” Settler Colonial Studies 2 (2012): 2-22. Moses, A Dirk. “‘White Genocide’ and the Ethics of Public Analysis.” Journal of Genocide Research 21 (2019): 1-13. Munn, Luke. “Algorithmic Hate: Brenton Tarrant and the Dark Social Web.” VoxPol, 3 Apr. 2019. <http://www.voxpol.eu/algorithmic-hate-brenton-tarrant-and-the-dark-social-web>. Nagle, Angela. Kill All Normies: Online Culture Wars from 4chan and Tumblr to Trump and the Alt-Right. Zero Books, 2017. Nakamura, Lisa, et al. Racist Zoom-Bombing. Routledge, 2021. Newlands, Gemma, et al. “Innovation under Pressure: Implications for Data Privacy during the COVID-19 Pandemic.” Big Data & Society July-December (2020): 1-14. Perry, Barbara, and Ryan Scrivens. “White Pride Worldwide: Constructing Global Identities Online.” The Globalisation of Hate: Internationalising Hate Crime. Eds. Jennifer Schweppe and Mark Austin Walters. Oxford UP, 2016. 65-78. Renzetti, Claire. Feminist Criminology. Routledge, 2013. Ruf, Jessica. “‘Spirit-Murdering' Comes to Zoom: Racist Attacks Plague Online Learning.” Issues in Higher Education 37 (2020): 8. Salazar, Philippe-Joseph. “The Alt-Right as a Community of Discourse.” Javnost – The Public 25 (2018): 135-143. Selfe, Cyntia L., and Richard J. Selfe, Jr. “The Politics of the Interface: Power and Its Exercise in Electronic Contact Zones.” College Composition and Communication 45 (1994): 480-504. Southern Poverty Law Center. “Alt-Right.” <http://www.splcenter.org/fighting-hate/extremist-files/ideology/alt-right>. Wilson, Jason. “Do the Christchurch Shootings Expose the Murderous Nature of ‘Ironic’ Online Fascism?” The Guardian, 16 Mar. 2019. <http://www.theguardian.com/world/commentisfree/2019/mar/15/do-the-christchurch-shootings-expose-the-murderous-nature-of-ironic-online-fascism>.

47

Burns, Alex. "Doubting the Global War on Terror." M/C Journal 14, no.1 (January24, 2011). http://dx.doi.org/10.5204/mcj.338.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Photograph by Gonzalo Echeverria (2010)Declaring War Soon after Al Qaeda’s terrorist attacks on 11 September 2001, the Bush Administration described its new grand strategy: the “Global War on Terror”. This underpinned the subsequent counter-insurgency in Afghanistan and the United States invasion of Iraq in March 2003. Media pundits quickly applied the Global War on Terror label to the Madrid, Bali and London bombings, to convey how Al Qaeda’s terrorism had gone transnational. Meanwhile, international relations scholars debated the extent to which September 11 had changed the international system (Brenner; Mann 303). American intellectuals adopted several variations of the Global War on Terror in what initially felt like a transitional period of US foreign policy (Burns). Walter Laqueur suggested Al Qaeda was engaged in a “cosmological” and perpetual war. Paul Berman likened Al Qaeda and militant Islam to the past ideological battles against communism and fascism (Heilbrunn 248). In a widely cited article, neoconservative thinker Norman Podhoretz suggested the United States faced “World War IV”, which had three interlocking drivers: Al Qaeda and trans-national terrorism; political Islam as the West’s existential enemy; and nuclear proliferation to ‘rogue’ countries and non-state actors (Friedman 3). Podhoretz’s tone reflected a revival of his earlier Cold War politics and critique of the New Left (Friedman 148-149; Halper and Clarke 56; Heilbrunn 210). These stances attracted widespread support. For instance, the United States Marine Corp recalibrated its mission to fight a long war against “World War IV-like” enemies. Yet these stances left the United States unprepared as the combat situations in Afghanistan and Iraq worsened (Ricks; Ferguson; Filkins). Neoconservative ideals for Iraq “regime change” to transform the Middle East failed to deal with other security problems such as Pakistan’s Musharraf regime (Dorrien 110; Halper and Clarke 210-211; Friedman 121, 223; Heilbrunn 252). The Manichean and open-ended framing became a self-fulfilling prophecy for insurgents, jihadists, and militias. The Bush Administration quietly abandoned the Global War on Terror in July 2005. Widespread support had given way to policymaker doubt. Why did so many intellectuals and strategists embrace the Global War on Terror as the best possible “grand strategy” perspective of a post-September 11 world? Why was there so little doubt of this worldview? This is a debate with roots as old as the Sceptics versus the Sophists. Explanations usually focus on the Bush Administration’s “Vulcans” war cabinet: Vice President Dick Cheney, Secretary of Defense Donald Rumsfield, and National Security Advisor Condoleezza Rice, who later became Secretary of State (Mann xv-xvi). The “Vulcans” were named after the Roman god Vulcan because Rice’s hometown Birmingham, Alabama, had “a mammoth fifty-six foot statue . . . [in] homage to the city’s steel industry” (Mann x) and the name stuck. Alternatively, explanations focus on how neoconservative thinkers shaped the intellectual climate after September 11, in a receptive media climate. Biographers suggest that “neoconservatism had become an echo chamber” (Heilbrunn 242) with its own media outlets, pundits, and think-tanks such as the American Enterprise Institute and Project for a New America. Neoconservatism briefly flourished in Washington DC until Iraq’s sectarian violence discredited the “Vulcans” and neoconservative strategists like Paul Wolfowitz (Friedman; Ferguson). The neoconservatives' combination of September 11’s aftermath with strongly argued historical analogies was initially convincing. They conferred with scholars such as Bernard Lewis, Samuel P. Huntington and Victor Davis Hanson to construct classicist historical narratives and to explain cultural differences. However, the history of the decade after September 11 also contains mis-steps and mistakes which make it a series of contingent decisions (Ferguson; Bergen). One way to analyse these contingent decisions is to pose “what if?” counterfactuals, or feasible alternatives to historical events (Lebow). For instance, what if September 11 had been a chemical and biological weapons attack? (Mann 317). Appendix 1 includes a range of alternative possibilities and “minimal rewrites” or slight variations on the historical events which occurred. Collectively, these counterfactuals suggest the role of agency, chance, luck, and the juxtaposition of better and worse outcomes. They pose challenges to the classicist interpretation adopted soon after September 11 to justify “World War IV” (Podhoretz). A ‘Two-Track’ Process for ‘World War IV’ After the September 11 attacks, I think an overlapping two-track process occurred with the “Vulcans” cabinet, neoconservative advisers, and two “echo chambers”: neoconservative think-tanks and the post-September 11 media. Crucially, Bush’s “Vulcans” war cabinet succeeded in gaining civilian control of the United States war decision process. Although successful in initiating the 2003 Iraq War this civilian control created a deeper crisis in US civil-military relations (Stevenson; Morgan). The “Vulcans” relied on “politicised” intelligence such as a United Kingdom intelligence report on Iraq’s weapons development program. The report enabled “a climate of undifferentiated fear to arise” because its public version did not distinguish between chemical, biological, radiological or nuclear weapons (Halper and Clarke, 210). The cautious 2003 National Intelligence Estimates (NIE) report on Iraq was only released in a strongly edited form. For instance, the US Department of Energy had expressed doubts about claims that Iraq had approached Niger for uranium, and was using aluminium tubes for biological and chemical weapons development. Meanwhile, the post-September 11 media had become a second “echo chamber” (Halper and Clarke 194-196) which amplified neoconservative arguments. Berman, Laqueur, Podhoretz and others who framed the intellectual climate were “risk entrepreneurs” (Mueller 41-43) that supported the “World War IV” vision. The media also engaged in aggressive “flak” campaigns (Herman and Chomsky 26-28; Mueller 39-42) designed to limit debate and to stress foreign policy stances and themes which supported the Bush Administration. When former Central Intelligence Agency director James Woolsey’s claimed that Al Qaeda had close connections to Iraqi intelligence, this was promoted in several books, including Michael Ledeen’s War Against The Terror Masters, Stephen Hayes’ The Connection, and Laurie Mylroie’s Bush v. The Beltway; and in partisan media such as Fox News, NewsMax, and The Weekly Standard who each attacked the US State Department and the CIA (Dorrien 183; Hayes; Ledeen; Mylroie; Heilbrunn 237, 243-244; Mann 310). This was the media “echo chamber” at work. The group Accuracy in Media also campaigned successfully to ensure that US cable providers did not give Al Jazeera English access to US audiences (Barker). Cosmopolitan ideals seemed incompatible with what the “flak” groups desired. The two-track process converged on two now infamous speeches. US President Bush’s State of the Union Address on 29 January 2002, and US Secretary of State Colin Powell’s presentation to the United Nations on 5 February 2003. Bush’s speech included a line from neoconservative David Frumm about North Korea, Iraq and Iran as an “Axis of Evil” (Dorrien 158; Halper and Clarke 139-140; Mann 242, 317-321). Powell’s presentation to the United Nations included now-debunked threat assessments. In fact, Powell had altered the speech’s original draft by I. Lewis “Scooter” Libby, who was Cheney’s chief of staff (Dorrien 183-184). Powell claimed that Iraq had mobile biological weapons facilities, linked to Abu Musab al-Zarqawi. However, the International Atomic Energy Agency’s (IAEA) Mohamed El-Baradei, the Defense Intelligence Agency, the State Department, and the Institute for Science and International Security all strongly doubted this claim, as did international observers (Dorrien 184; Halper and Clarke 212-213; Mann 353-354). Yet this information was suppressed: attacked by “flak” or given little visible media coverage. Powell’s agenda included trying to rebuild an international coalition and to head off weather changes that would affect military operations in the Middle East (Mann 351). Both speeches used politicised variants of “weapons of mass destruction”, taken from the counterterrorism literature (Stern; Laqueur). Bush’s speech created an inflated geopolitical threat whilst Powell relied on flawed intelligence and scientific visuals to communicate a non-existent threat (Vogel). However, they had the intended effect on decision makers. US Under-Secretary of Defense, the neoconservative Paul Wolfowitz, later revealed to Vanity Fair that “weapons of mass destruction” was selected as an issue that all potential stakeholders could agree on (Wilkie 69). Perhaps the only remaining outlet was satire: Armando Iannucci’s 2009 film In The Loop parodied the diplomatic politics surrounding Powell’s speech and the civil-military tensions on the Iraq War’s eve. In the short term the two track process worked in heading off doubt. The “Vulcans” blocked important information on pre-war Iraq intelligence from reaching the media and the general public (Prados). Alternatively, they ignored area specialists and other experts, such as when Coalition Provisional Authority’s L. Paul Bremer ignored the US State Department’s fifteen volume ‘Future of Iraq’ project (Ferguson). Public “flak” and “risk entrepreneurs” mobilised a range of motivations from grief and revenge to historical memory and identity politics. This combination of private and public processes meant that although doubts were expressed, they could be contained through the dual echo chambers of neoconservative policymaking and the post-September 11 media. These factors enabled the “Vulcans” to proceed with their “regime change” plans despite strong public opposition from anti-war protestors. Expressing DoubtsMany experts and institutions expressed doubt about specific claims the Bush Administration made to support the 2003 Iraq War. This doubt came from three different and sometimes overlapping groups. Subject matter experts such as the IAEA’s Mohamed El-Baradei and weapons development scientists countered the UK intelligence report and Powell’s UN speech. However, they did not get the media coverage warranted due to “flak” and “echo chamber” dynamics. Others could challenge misleading historical analogies between insurgent Iraq and Nazi Germany, and yet not change the broader outcomes (Benjamin). Independent journalists one group who gained new information during the 1990-91 Gulf War: some entered Iraq from Kuwait and documented a more humanitarian side of the war to journalists embedded with US military units (Uyarra). Finally, there were dissenters from bureaucratic and institutional processes. In some cases, all three overlapped. In their separate analyses of the post-September 11 debate on intelligence “failure”, Zegart and Jervis point to a range of analytic misperceptions and institutional problems. However, the intelligence community is separated from policymakers such as the “Vulcans”. Compartmentalisation due to the “need to know” principle also means that doubting analysts can be blocked from releasing information. Andrew Wilkie discovered this when he resigned from Australia’s Office for National Assessments (ONA) as a transnational issues analyst. Wilkie questioned the pre-war assessments in Powell’s United Nations speech that were used to justify the 2003 Iraq War. Wilkie was then attacked publicly by Australian Prime Minister John Howard. This overshadowed a more important fact: both Howard and Wilkie knew that due to Australian legislation, Wilkie could not publicly comment on ONA intelligence, despite the invitation to do so. This barrier also prevented other intelligence analysts from responding to the “Vulcans”, and to “flak” and “echo chamber” dynamics in the media and neoconservative think-tanks. Many analysts knew that the excerpts released from the 2003 NIE on Iraq was highly edited (Prados). For example, Australian agencies such as the ONA, the Department of Foreign Affairs and Trade, and the Department of Defence knew this (Wilkie 98). However, analysts are trained not to interfere with policymakers, even when there are significant civil-military irregularities. Military officials who spoke out about pre-war planning against the “Vulcans” and their neoconservative supporters were silenced (Ricks; Ferguson). Greenlight Capital’s hedge fund manager David Einhorn illustrates in a different context what might happen if analysts did comment. Einhorn gave a speech to the Ira Sohn Conference on 15 May 2002 debunking the management of Allied Capital. Einhorn’s “short-selling” led to retaliation from Allied Capital, a Securities and Exchange Commission investigation, and growing evidence of potential fraud. If analysts adopted Einhorn’s tactics—combining rigorous analysis with targeted, public denunciation that is widely reported—then this may have short-circuited the “flak” and “echo chamber” effects prior to the 2003 Iraq War. The intelligence community usually tries to pre-empt such outcomes via contestation exercises and similar processes. This was the goal of the 2003 NIE on Iraq, despite the fact that the US Department of Energy which had the expertise was overruled by other agencies who expressed opinions not necessarily based on rigorous scientific and technical analysis (Prados; Vogel). In counterterrorism circles, similar disinformation arose about Aum Shinrikyo’s biological weapons research after its sarin gas attack on Tokyo’s subway system on 20 March 1995 (Leitenberg). Disinformation also arose regarding nuclear weapons proliferation to non-state actors in the 1990s (Stern). Interestingly, several of the “Vulcans” and neoconservatives had been involved in an earlier controversial contestation exercise: Team B in 1976. The Central Intelligence Agency (CIA) assembled three Team B groups in order to evaluate and forecast Soviet military capabilities. One group headed by historian Richard Pipes gave highly “alarmist” forecasts and then attacked a CIA NIE about the Soviets (Dorrien 50-56; Mueller 81). The neoconservatives adopted these same tactics to reframe the 2003 NIE from its position of caution, expressed by several intelligence agencies and experts, to belief that Iraq possessed a current, covert program to develop weapons of mass destruction (Prados). Alternatively, information may be leaked to the media to express doubt. “Non-attributable” background interviews to establishment journalists like Seymour Hersh and Bob Woodward achieved this. Wikileaks publisher Julian Assange has recently achieved notoriety due to US diplomatic cables from the SIPRNet network released from 28 November 2010 onwards. Supporters have favourably compared Assange to Daniel Ellsberg, the RAND researcher who leaked the Pentagon Papers (Ellsberg; Ehrlich and Goldsmith). Whilst Elsberg succeeded because a network of US national papers continued to print excerpts from the Pentagon Papers despite lawsuit threats, Assange relied in part on favourable coverage from the UK’s Guardian newspaper. However, suspected sources such as US Army soldier Bradley Manning are not protected whilst media outlets are relatively free to publish their scoops (Walt, ‘Woodward’). Assange’s publication of SIPRNet’s diplomatic cables will also likely mean greater restrictions on diplomatic and military intelligence (Walt, ‘Don’t Write’). Beyond ‘Doubt’ Iraq’s worsening security discredited many of the factors that had given the neoconservatives credibility. The post-September 11 media became increasingly more critical of the US military in Iraq (Ferguson) and cautious about the “echo chamber” of think-tanks and media outlets. Internet sites for Al Jazeera English, Al-Arabiya and other networks have enabled people to bypass “flak” and directly access these different viewpoints. Most damagingly, the non-discovery of Iraq’s weapons of mass destruction discredited both the 2003 NIE on Iraq and Colin Powell’s United Nations presentation (Wilkie 104). Likewise, “risk entrepreneurs” who foresaw “World War IV” in 2002 and 2003 have now distanced themselves from these apocalyptic forecasts due to a series of mis-steps and mistakes by the Bush Administration and Al Qaeda’s over-calculation (Bergen). The emergence of sites such as Wikileaks, and networks like Al Jazeera English and Al-Arabiya, are a response to the politics of the past decade. They attempt to short-circuit past “echo chambers” through providing access to different sources and leaked data. The Global War on Terror framed the Bush Administration’s response to September 11 as a war (Kirk; Mueller 59). Whilst this prematurely closed off other possibilities, it has also unleashed a series of dynamics which have undermined the neoconservative agenda. The “classicist” history and historical analogies constructed to justify the “World War IV” scenario are just one of several potential frameworks. “Flak” organisations and media “echo chambers” are now challenged by well-financed and strategic alternatives such as Al Jazeera English and Al-Arabiya. Doubt is one defence against “risk entrepreneurs” who seek to promote a particular idea: doubt guards against uncritical adoption. Perhaps the enduring lesson of the post-September 11 debates, though, is that doubt alone is not enough. What is needed are individuals and institutions that understand the strategies which the neoconservatives and others have used, and who also have the soft power skills during crises to influence critical decision-makers to choose alternatives. Appendix 1: Counterfactuals Richard Ned Lebow uses “what if?” counterfactuals to examine alternative possibilities and “minimal rewrites” or slight variations on the historical events that occurred. The following counterfactuals suggest that the Bush Administration’s Global War on Terror could have evolved very differently . . . or not occurred at all. Fact: The 2003 Iraq War and 2001 Afghanistan counterinsurgency shaped the Bush Administration’s post-September 11 grand strategy. Counterfactual #1: Al Gore decisively wins the 2000 U.S. election. Bush v. Gore never occurs. After the September 11 attacks, Gore focuses on international alliance-building and gains widespread diplomatic support rather than a neoconservative agenda. He authorises Special Operations Forces in Afghanistan and works closely with the Musharraf regime in Pakistan to target Al Qaeda’s muhajideen. He ‘contains’ Saddam Hussein’s Iraq through measurement and signature, technical intelligence, and more stringent monitoring by the International Atomic Energy Agency. Minimal Rewrite: United 93 crashes in Washington DC, killing senior members of the Gore Administration. Fact: U.S. Special Operations Forces failed to kill Osama bin Laden in late November and early December 2001 at Tora Bora. Counterfactual #2: U.S. Special Operations Forces kill Osama bin Laden in early December 2001 during skirmishes at Tora Bora. Ayman al-Zawahiri is critically wounded, captured, and imprisoned. The rest of Al Qaeda is scattered. Minimal Rewrite: Osama bin Laden’s death turns him into a self-mythologised hero for decades. Fact: The UK Blair Government supplied a 50-page intelligence dossier on Iraq’s weapons development program which the Bush Administration used to support its pre-war planning. Counterfactual #3: Rogue intelligence analysts debunk the UK Blair Government’s claims through a series of ‘targeted’ leaks to establishment news sources. Minimal Rewrite: The 50-page intelligence dossier is later discovered to be correct about Iraq’s weapons development program. Fact: The Bush Administration used the 2003 National Intelligence Estimate to “build its case” for “regime change” in Saddam Hussein’s Iraq. Counterfactual #4: A joint investigation by The New York Times and The Washington Post rebuts U.S. Secretary of State Colin Powell’s speech to the United National Security Council, delivered on 5 February 2003. Minimal Rewrite: The Central Intelligence Agency’s whitepaper “Iraq’s Weapons of Mass Destruction Programs” (October 2002) more accurately reflects the 2003 NIE’s cautious assessments. Fact: The Bush Administration relied on Ahmed Chalabi for its postwar estimates about Iraq’s reconstruction. Counterfactual #5: The Bush Administration ignores Chalabi’s advice and relies instead on the U.S. State Department’s 15 volume report “The Future of Iraq”. Minimal Rewrite: The Coalition Provisional Authority appoints Ahmed Chalabi to head an interim Iraqi government. Fact: L. Paul Bremer signed orders to disband Iraq’s Army and to De-Ba’athify Iraq’s new government. Counterfactual #6: Bremer keeps Iraq’s Army intact and uses it to impose security in Baghdad to prevent looting and to thwart insurgents. Rather than a De-Ba’athification policy, Bremer uses former Baath Party members to gather situational intelligence. Minimal Rewrite: Iraq’s Army refuses to disband and the De-Ba’athification policy uncovers several conspiracies to undermine the Coalition Provisional Authority. AcknowledgmentsThanks to Stephen McGrail for advice on science and technology analysis.References Barker, Greg. “War of Ideas”. PBS Frontline. Boston, MA: 2007. ‹http://www.pbs.org/frontlineworld/stories/newswar/video1.html› Benjamin, Daniel. “Condi’s Phony History.” Slate 29 Aug. 2003. ‹http://www.slate.com/id/2087768/pagenum/all/›. Bergen, Peter L. The Longest War: The Enduring Conflict between America and Al Qaeda. New York: The Free Press, 2011. Berman, Paul. Terror and Liberalism. W.W. Norton & Company: New York, 2003. Brenner, William J. “In Search of Monsters: Realism and Progress in International Relations Theory after September 11.” Security Studies 15.3 (2006): 496-528. Burns, Alex. “The Worldflash of a Coming Future.” M/C Journal 6.2 (April 2003). ‹http://journal.media-culture.org.au/0304/08-worldflash.php›. Dorrien, Gary. Imperial Designs: Neoconservatism and the New Pax Americana. New York: Routledge, 2004. Ehrlich, Judith, and Goldsmith, Rick. The Most Dangerous Man in America: Daniel Ellsberg and the Pentagon Papers. Berkley CA: Kovno Communications, 2009. Einhorn, David. Fooling Some of the People All of the Time: A Long Short (and Now Complete) Story. Hoboken NJ: John Wiley & Sons, 2010. Ellison, Sarah. “The Man Who Spilled The Secrets.” Vanity Fair (Feb. 2011). ‹http://www.vanityfair.com/politics/features/2011/02/the-guardian-201102›. Ellsberg, Daniel. Secrets: A Memoir of Vietnam and the Pentagon Papers. New York: Viking, 2002. Ferguson, Charles. No End in Sight, New York: Representational Pictures, 2007. Filkins, Dexter. The Forever War. New York: Vintage Books, 2008. Friedman, Murray. The Neoconservative Revolution: Jewish Intellectuals and the Shaping of Public Policy. New York: Cambridge UP, 2005. Halper, Stefan, and Jonathan Clarke. America Alone: The Neo-Conservatives and the Global Order. New York: Cambridge UP, 2004. Hayes, Stephen F. The Connection: How Al Qaeda’s Collaboration with Saddam Hussein Has Endangered America. New York: HarperCollins, 2004. Heilbrunn, Jacob. They Knew They Were Right: The Rise of the Neocons. New York: Doubleday, 2008. Herman, Edward S., and Noam Chomsky. Manufacturing Consent: The Political Economy of the Mass Media. Rev. ed. New York: Pantheon Books, 2002. Iannucci, Armando. In The Loop. London: BBC Films, 2009. Jervis, Robert. Why Intelligence Fails: Lessons from the Iranian Revolution and the Iraq War. Ithaca NY: Cornell UP, 2010. Kirk, Michael. “The War behind Closed Doors.” PBS Frontline. Boston, MA: 2003. ‹http://www.pbs.org/wgbh/pages/frontline/shows/iraq/›. Laqueur, Walter. No End to War: Terrorism in the Twenty-First Century. New York: Continuum, 2003. Lebow, Richard Ned. Forbidden Fruit: Counterfactuals and International Relations. Princeton NJ: Princeton UP, 2010. Ledeen, Michael. The War against The Terror Masters. New York: St. Martin’s Griffin, 2003. Leitenberg, Milton. “Aum Shinrikyo's Efforts to Produce Biological Weapons: A Case Study in the Serial Propagation of Misinformation.” Terrorism and Political Violence 11.4 (1999): 149-158. Mann, James. Rise of the Vulcans: The History of Bush’s War Cabinet. New York: Viking Penguin, 2004. Morgan, Matthew J. The American Military after 9/11: Society, State, and Empire. New York: Palgrave Macmillan, 2008. Mueller, John. Overblown: How Politicians and the Terrorism Industry Inflate National Security Threats, and Why We Believe Them. New York: The Free Press, 2009. Mylroie, Laurie. Bush v The Beltway: The Inside Battle over War in Iraq. New York: Regan Books, 2003. Nutt, Paul C. Why Decisions Fail. San Francisco: Berrett-Koelher, 2002. Podhoretz, Norman. “How to Win World War IV”. Commentary 113.2 (2002): 19-29. Prados, John. Hoodwinked: The Documents That Reveal How Bush Sold Us a War. New York: The New Press, 2004. Ricks, Thomas. Fiasco: The American Military Adventure in Iraq. New York: The Penguin Press, 2006. Stern, Jessica. The Ultimate Terrorists. Boston, MA: Harvard UP, 2001. Stevenson, Charles A. Warriors and Politicians: US Civil-Military Relations under Stress. New York: Routledge, 2006. Walt, Stephen M. “Should Bob Woodward Be Arrested?” Foreign Policy 10 Dec. 2010. ‹http://walt.foreignpolicy.com/posts/2010/12/10/more_wikileaks_double_standards›. Walt, Stephen M. “‘Don’t Write If You Can Talk...’: The Latest from WikiLeaks.” Foreign Policy 29 Nov. 2010. ‹http://walt.foreignpolicy.com/posts/2010/11/29/dont_write_if_you_can_talk_the_latest_from_wikileaks›. Wilkie, Andrew. Axis of Deceit. Melbourne: Black Ink Books, 2003. Uyarra, Esteban Manzanares. “War Feels like War”. London: BBC, 2003. Vogel, Kathleen M. “Iraqi Winnebagos™ of Death: Imagined and Realized Futures of US Bioweapons Threat Assessments.” Science and Public Policy 35.8 (2008): 561–573. Zegart, Amy. Spying Blind: The CIA, the FBI and the Origins of 9/11. Princeton NJ: Princeton UP, 2007.

48

Russell, David. "The Tumescent Citizen." M/C Journal 7, no.4 (October1, 2004). http://dx.doi.org/10.5204/mcj.2376.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Are male p*rn stars full-fledged citizens? Recent political developments make this question more than rhetorical. The Bush Justice Department, led by Attorney General John Ashcroft, has targeted the p*rn industry, beginning with its prosecution of Extreme Associates. More recently, the President requested an increase in the FBI’s 2005 budget for prosecuting obscenity, one of the few budget increases for the Bureau outside of its anti-terrorism program (Schmitt A1). To be sure, the concept of “citizen” is itself vexed. Citizenship, when obtained or granted, ostensibly legitimates a subject and opens up pathways to privilege: social, political, economic, etc. Yet all citizens do not seem to be created equal. “There is, in the operation of state-defined rules and in common practices an assumption of moral worth in which de facto as opposed to de jure rights of citizenship are defined as open to those who are deserving or who are capable of acting responsibly,” asserts feminist critic Linda McDowell. “The less deserving and the less responsible are defined as unworthy of or unfitted for the privileges of full citizenship” (150). Under this rubric, a citizen must measure up to a standard of “moral worth”—an individual is not a full-fledged citizen merely on the basis of birth or geographical placement. As McDowell concludes, “citizenship is not an inclusive but an exclusive concept” (150). Thus, in figuring out how male p*rn stars stand in regard to the question of citizenship, we must ask who determines “moral worth,” who distinguishes the less from the more deserving, and how people have come to agree on the “common practices” of citizenship. Many critics writing about citizenship, including McDowell, Michael Warner, Lauren Berlant, Russ Castronovo, Robyn Wiegman, Michael Moon, and Cathy Davidson (to name only a few) have located the nexus of “moral worth” in the body. In particular, the ability to make the body abstract, invisible, and non-identifiable has been the most desirable quality for a citizen to possess. White men seem ideally situated for such acts of “decorporealization,” and the white male body has been installed as the norm for citizenship. Conversely, women, people of color, and the ill and disabled, groups that are frequently defined by their very embodiment, find themselves more often subject to regulation. If the white male body is the standard, however, for “moral worth,” the white male p*rn star would seem to disrupt such calculations. Clearly, the profession demands that these men put their bodies very much in evidence, and the most famous p*rn stars, like John C. Holmes and Ron Jeremy, derive much of their popularity from their bodily excess. Jeremy’s struggle for “legitimacy,” and the tenuous position of men in the p*rn industry in general, demonstrate that even white males, when they cannot or will not aspire to abstraction and invisibility, will lose the privileges of citizenship. The right’s attack on p*rnography can thus be seen as yet another attempt to regulate and restrict citizenship, an effort that forces Jeremy and the industry that made him famous struggle for strategies of invisibility that will permit some mainstream acceptance. In American Anatomies, Robyn Wiegman points out that the idea of democratic citizenship rested on a distinct sense of the abstract and non-particular. The more “particular” an individual was, however, the less likely s/he could pass into the realm of citizen. “For those trapped by the discipline of the particular (women, slaves, the poor),” Wiegman writes, “the unmarked and universalized particularity of the white masculine prohibited their entrance into the abstraction of personhood that democratic equality supposedly entailed” (49). The norm of the “white masculine” caused others to signify “an incontrovertible difference” (49), so people who were visibly different (or perceived as visibly different) could be tyrannized over and regulated to ensure the purity of the norm. Like Wiegman, Lauren Berlant has written extensively about the ways in which the nation recognizes only one “official” body: “The white, male body is the relay to legitimation, but even more than that, the power to suppress that body, to cover its tracks and its traces, is the sign of real authority, according to constitutional fashion” (113). Berlant notes that “problem citizens”—most notably women of color—struggle with the problem of “surplus embodiment.” They cannot easily suppress their bodies, so they are subjected to the regulatory power of a law that defines them and consequently opens their bodies up to violation. To escape their “surplus embodiment,” those who can seek abstraction and invisibility because “sometimes a person doesn’t want to seek the dignity of an always-already-violated body, and wants to cast hers off, either for nothingness, or in a trade for some other, better model” (114). The question of “surplus embodiment” certainly has resonance for male p*rn stars. Peter Lehman has argued that hardcore p*rnography relies on images of large penises as signifiers of strength and virility. “The genre cannot tolerate a small, unerect penis,” Lehman asserts, “because the sight of the organ must convey the symbolic weight of the phallus” (175). The “power” of male p*rn stars derives from their visibility, from “meat shots” and “money shots.” Far from being abstract, decorporealized “persons,” male p*rn stars are fully embodied. In fact, the more “surplus embodiment” they possess, the more famous they become. Yet the very display that makes white male p*rn stars famous also seemingly disqualifies them from the “legitimacy” afforded the white male body. In the industry itself, male stars are losing authority to the “box-cover girls” who sell the product. One’s “surplus embodiment” might be a necessity for working in the industry, but, as Susan Faludi notes, “by choosing an erection as the proof of male utility, the male performer has hung his usefulness, as p*rn actor Jonathan Morgan observed, on ‘the one muscle on our body we can’t flex’” (547). When that muscle doesn’t work, a male p*rn star doesn’t become an abstraction—he becomes “other,” a joke, swept aside and deemed useless. Documentary filmmaker Scott J. Gill recognizes the tenuousness of the “citizenship” of male p*rn stars in his treatment of Ron Jeremy, “America’s most famous p*rn star.” The film, p*rn Star: The Legend of Ron Jeremy (2001), opens with a clear acknowledgment of Jeremy’s body, as one voiceover explains how his nickname, “the Hedgehog,” derives from the fact that Jeremy is “small, fat, and very hairy.” Then, Gill intercuts the comments of various Jeremy fans: “An idol to an entire generation,” one young man opines; “One of the greatest men this country has ever seen,” suggests another. This opening scene concludes with an image of Jeremy, smirking and dressed in a warm-up suit with a large dollar sign necklace, standing in front of an American flag (an image repeated at the end of the film). This opening few minutes posit the Hedgehog as super-citizen, embraced as few Americans are. “Everyone wants to be Ron Jeremy,” another young fan proclaims. “They want his life.” Gill also juxtaposes “constitutional” forms of legitimacy that seemingly celebrate Jeremy’s bodily excess with the resultant discrimination that body actually engenders. In one clip, Jeremy exposes himself to comedian Rodney Dangerfield, who then sardonically comments, “All men are created equal—what bullsh*t!” Later, Gill employs a clip of a film in which Jeremy is dressed like Ben Franklin while in a voiceover p*rn director/historian Bill Margold notes that the Freeman decision “gave a birth certificate to a bastard industry—it legitimized us.” The juxtaposition thus posits Jeremy as a “founding father” of sorts, the most recognizable participant in an industry now going mainstream. Gill, however, emphasizes the double-edged nature of Jeremy’s fame and the price of his display. Immediately after the plaudits of the opening sequence, Gill includes clips from various Jeremy talk show appearances in which he is denounced as “scum” and told “You should go to jail just for all the things that you’ve helped make worse in this country” and “You should be shot.” Gill also shows a clearly dazed Jeremy in close-up confessing, “I hate myself. I want to find a knife and slit my wrists.” Though Jeremy does not seem serious, this comment comes into better focus as the film unfolds. Jeremy’s efforts to go “legit,” to break into mainstream film and leave his p*rn life behind, keep going off the tracks. In the meantime, Jeremy must fulfill his obligations to his current profession, including getting a monthly HIV test. “There’ll be one good thing about eventually getting out of the p*rn business,” he confesses as Gill shows scenes of a clearly nervous Jeremy awaiting results in a clinic waiting room, “to be able to stop taking these things every f*cking month.” Gill shows that the life so many others would love to have requires an abuse of the body that fans never see. Jeremy is seeking to cast off that life, “either for nothingness, or in a trade for some other, better model.” Behind this “legend” is unseen pain and longing. Gill emphasizes the dichotomy between Jeremy (illegitimate) and “citizens” in his own designations. Adam Rifkin, director of Detroit Rock City, in which Jeremy has a small part, and Troy Duffy, another Jeremy pal, are referred to as “mainstream film directors.” When Jeremy returns to his home in Queens to visit his father, Arnold Hyatt is designated “physicist.” In fact, Jeremy’s father forbids his son from using the family name in his p*rn career. “I don’t want any confusion between myself and his line of work,” Hyatt confesses, “because I’m retired.” Denied his patronym, Jeremy is truly “illegitimate.” Despite his father’s understanding and support, Jeremy is on his own in the business he has chosen. Jeremy’s reputation also gets in the way of his mainstream dreams. “Sometimes all this fame can hurt you,” Jeremy himself notes. Rifkin admits that “People recognize Ron as a p*rn actor and immediately will ask me to remove him from the final cut.” Duffy concurs that Jeremy’s p*rn career has made him a pariah for some mainstream producers: “Stigma attached to him, and that’s all anybody’s ever gonna see.” Jeremy’s visibility, the “stigma” that people have “seen,” namely, his large penis and fat, hairy body, denies him the abstract personhood he needs to go “legitimate.” Thus, whether through the concerted efforts of the Justice Department or the informal, personal angst of a producer fearing a backlash against a film, Jeremy, as a representative of an immoral industry, finds himself subject to regulation. Indeed, as his “legitimate” filmography indicates, Jeremy has been cut out of more than half the films he has appeared in. The issue of “visibility” as the basis for regulation of hardcore p*rnography has its clearest articulation in Potter Stewart’s famous proclamation “I know it when I see it.” But as Bob Woodward and Scott Armstrong report in The Brethren, Stewart was not the only Justice who used visibility as a standard. Byron White’s personal definition was “no erect penises, no intercourse, no oral or anal sodomy” (193). William Brennan, too, had what his clerks called “the limp dick standard” (194). Erection, what Lehman has identified as the conveyance of the phallus, now became the point of departure for regulation, transferring, once again, the phallus to the “law.” When such governmental regulation failed First Amendment ratification, other forms of societal regulation kicked in. The p*rn industry has accommodated itself to this regulation, as Faludi observes, in its emphasis on “soft” versions of product for distribution to “legitimate” outlets like cable and hotels. “The version recut for TV would have to be entirely ‘soft,’” Faludi notes, “which meant, among other things, no erect penises and no sem*n” (547). The work of competent “woodsmen” like Jeremy now had to be made invisible to pass muster. Thus, even the penis could be conveyed to the viewer, a “fantasy penis,” as Katherine Frank has called it, that can be made to correlate to that viewer’s “fantasized identity” of himself (133-4). At the beginning of p*rn Star, during the various homages paid to Jeremy, one fan draws a curious comparison: “There’s Elvis, and then there’s Ron.” Elvis’s early career had certainly been plagued by criticism related to his bodily excess. Musicologist Robert Fink has recently compared Presley’s July 2, 1956, recording of “Hound Dog” to music for strip tease, suggesting that Elvis used such subtle variations to challenge the law that was constantly impinging on his performances: “The Gray Lady was sensitive to the presence of quite traditional musical erotics—formal devices that cued the performer and audience to experience their bodies sexually—but not quite hep enough to accept a male performer recycling these musical signifiers of sex back to a female audience” (99). Eventually, though, Elvis stopped rebelling and sought respectability. Writing to President Nixon on December 21, 1970, Presley offered his services to help combat what he perceived to be a growing cultural insurgency. “The drug culture, the hippie elements, the SDS, Black Panthers, etc., do not consider me as their enemy or as they call it, The Establishment,” Presley confided. “I call it America and I love it” (Carroll 266). In short, Elvis wanted to use his icon status to help reinstate law and order, in the process demonstrating his own patriotism, his value and worth as a citizen. At the end of p*rn Star, Jeremy, too, craves legitimacy. Whereas Elvis appealed to Nixon, Jeremy concludes by appealing to Steven Spielberg. Elvis received a badge from Nixon designating him as “special assistant” for the Bureau of Narcotics and Dangerous Drugs. Presumably Jeremy invests his legitimacy in a SAG card. Kenny Dollar, a Jeremy friend, unironically summarizes the final step the Hedgehog must take: “It’s time for Ron to go on and reach his full potential. Let him retire his dick.” That Jeremy must do the latter before having a chance for the former illustrates how “surplus embodiment” and “citizenship” remain inextricably entangled and mutually exclusive. References Berlant, Lauren. “National Brands/National Body: Imitation of Life.” Comparative American Identities: Race, Sex and Nationality in the Modern Text. Ed. Hortense Spillers. New York: Routledge, 1991: 110-140. Carroll, Andrew, ed. Letters of a Nation: A Collection of Extraordinary American Letters. New York: Broadway Books, 1999. Castronovo, Russ and Nelson, Dana D., eds. Materializing Democracy: Toward a Revitalized Cultural Politics. Durham: Duke University Press, 2002. Faludi, Susan. Stiffed: The Betrayal of the American Man. New York: William Morrow and Company, Inc., 1999. Fink, Robert. “Elvis Everywhere: Musicology and Popular Music Studies at the Twilight of the Canon.” Rock Over the Edge: Transformations in Popular Music Culture. Eds. Roger Beebe, Denise Fulbrook, and Ben Saunders. Durham: Duke University Press, 2002: 60-109. Frank, Katherine. G-Strings and Sympathy: Strip Club Regulars and Male Desire. Durham: Duke University Press, 2002. Gill, Scott J., dir. p*rn Star: The Legend of Ron Jeremy. New Video Group, 2001. Lehman, Peter. Running Scared: Masculinity and the Representation of the Male Body. Philadelphia: Temple University Press, 1993. McDowell, Linda. Gender, Identity and Place: Understanding Feminist Geographies. Minneapolis: University of Minnesota Press, 1999. Moon, Michael and Davidson, Cathy N., eds. Subjects and Citizens: From Oroonoko to Anita Hill. Durham: Duke University Press, 1995. Schmitt, Richard B. “U. S. Plans to Escalate p*rn Fight.” The Los Angeles Times 14 February 2004. A1. Wiegman, Robyn. American Anatomies: Theorizing Race and Gender. Durham: Duke University Press, 1995. Woodward, Bob and Armstrong, Scott. The Brethren: Inside the Supreme Court. New York: Simon and Schuster, 1979. MLA Style Russell, David. "The Tumescent Citizen: The Legend of Ron Jeremy." M/C Journal 7.4 (2004). 10 October 2004 <http://www.media-culture.org.au/0410/01_citizen.php>. APA Style Russell, D. (2004 Oct 11). The Tumescent Citizen: The Legend of Ron Jeremy, M/C Journal, 7(4). Retrieved Oct 10 2004 from <http://www.media-culture.org.au/0410/01_citizen.php>

49

Carpenter, Richard. "The Heart of the Matter." M/C Journal 10, no.3 (June1, 2007). http://dx.doi.org/10.5204/mcj.2658.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

During his speech in Plato’s The Symposium, Aristophanes explains that humans were originally round, composed of two people joined together in a perfect sphere with four arms, four legs, and two faces. Unfortunately, humans grew arrogant and ambitious; as a result, Zeus punished them by cleaving them in two. Now altered from their natural form, humans yearn for their former selves: “It is from this situation, then, that love for one another developed in human beings. Love collects the halves of our original nature, and tries to make a single thing out of the two parts so as to restore our natural condition. Thus, each of us is the matching half of a human being, since we have been severed like a flatfish, two coming from one, and each part is always seeking its other half” (191d). So it is that what we call “love” is but the “desire for wholeness” (193a). Love is not, for Aristophanes, a union but a re-union/reuniting. While Aristophanes’ account is simultaneously comedic and horrific, and consequently also absurdly ridiculous, there persists an undercurrent of some nebulous tickle, a recognition of something tangibly familiar in his myth, even now. Were space-time not linear and Plato could have Barbara Streisand speak next at that Athenian table (though of course he wouldn’t, as she’s a woman), he would undoubtedly have her sing “People”: “Lovers are very special people. They’re the luckiest people in the world. With one person, one very special person, a feeling deep in your soul, says you were half, now you’re whole.” “You complete me,” Jerry (played by Tom Cruise) says to Dorothy (played by Renée Zellweger) in the movie Jerry Maguire. How many lovers today claim their relationship with their beloved was meant to be? Even in a postmodern world, we seemingly have not strayed far from the Platonic ideal in which “lovers are incomplete halves of a single puzzle, searching for each other in order to become whole” (Ackerman 95). Implied by this model—described by Irving Singer as the “idealist tradition” (Modern 12)—is an uncomplicated conception of self. A self posited as fundamentally incomplete must be viewed as fixed and virtually invariable; otherwise, a multiplicity of ways in addition to a soul mate might be found to give the impoverished self what it needs. Viewed as yearning for his or her “other half,” the individual is positioned outside of/separated from the wider culture because only the “one true love” can make the person “whole.” Even biological impulses and psychological factors can be dismissed as irrelevant or possibly even dangerous distractions when all that truly matters is finding one’s “better half.” A self thus conceived also suggests a rather simplistic view of romantic love, which becomes merely the desire to achieve wholeness by connecting—or reconnecting, as Plato’s Aristophanes would have it—with a complementary lover. Unfortunately, the idealist model’s emphasis on deficiency codifies an ontology of lack that tends to foster omissions, oversimplifications, and misinterpretations. But, as numerous influential thinkers have convincingly argued, identity is neither uniform nor stable—nor even uncontested. Subjectivity is more accurately characterised by complexity and multiplicity than by simplicity and singularity. What, then, of romantic love? Is romantic love in contemporary Western cultures similarly complex, and if so, so what? How would (re)conceptualising romantic love as complex extend our knowledge and understanding of complex systems? I want to contribute to this themed issue of M/C Journal on complex by approaching romantic love as a point of departure, as an analytical methodology. I maintain that a critical study of romantic love—one that begins rather than concludes with romantic love’s complexity—helps illustrate the productive nature of complex and the utility of employing complex as a conceptual/theoretical point of origin and inquiry. Crucially, my formulation configures complex as a productive process that is itself a product. In other words, complex can be usefully defined as an effect that produces other effects—including potentially subversive ones. While other definitions are certainly valid, conceiving complex as an outcome that generates further outcomes not only emphasises the dynamic, multifaceted nature of systems but also helps to explain that multifaceted dynamism. Romantic love illustrates well this conception of complex (as productive product) because romantic love only has meaning, only works, because it is complex to begin with. In this manner, romantic love is a process of creating complexity from complexity. An examination that begins from a point of complexity gains much, I feel, by beginning with a historicisation of that complexity, for complex, as outcome/effect, is always already contextualised, situated, and diachronic. Historicising romantic love is particularly crucial because the idealist model tends to dismiss the past (what matters the past once one has finally met the love of one’s life?) and confuse history—especially its own—with nature (as with the supposedly natural passivity of the feminine). According to Singer, the idealist tradition, first codified by Plato, was taken up by medieval theologians who, drawn by the tradition’s ideal of merging, sought to produce a mystical oneness with the divine (Courtly 23). Emphasis eventually moved from merging to the experience of merging, a move that facilitated the rise of courtly love. Transmuting religious reverence into human devotion, courtly love introduced such revolutionary and potentially heretical notions as the belief that “love is an intense, passionate relationship that establishes a holy oneness between man and woman” (23). The desire for oneness appears even more prominently in the Romanticism of the 19th century (288). Importantly, erotic love becomes for the first time conjoined with romantic love in a causal rather than antithetical or consequential relation: “To the Romantic, sexual desire is usually more than just a vehicle or concomitant of love; it is a prerequisite” (Modern 10). Little wonder, given such a trajectory, that romantic love today has virtually no meaning independent of sexual love (though sexual desire may or may not be linked to romantic love). Little wonder as well that romantic love is so complex. But there’s more. As Stephanie Coontz explains, marriage in the West was until only about two centuries ago a political and economic institution having little or nothing to do with romantic love (33). Anthony Giddens also points out the relatively recent shift from an economic to a romantic basis for marriage (26). Giddens associates this shift with the emergence of what he terms “plastic sexuality”: “decentered sexuality, freed from the needs of reproduction” (2). Plastic sexuality resulted from a combination of factors, most notably societal trends toward limiting family size coupled with advances in contraceptive and reproductive technologies (27). Allowing for greater freedom and pleasure (especially for women), plastic sexuality is for Giddens linked not only to romantic love but also, intrinsically, to self-identity (2, 40). This connection—along with the plastic sexuality that undergirds it—creates narratives of self (and other) that can project “a course of future development” (45), lead to greater reflexivity for the body and the self (31), and transform intimacy in ways potentially subversive and emancipative (3, 194). In any case, our (inter)personal existence is currently undergoing active transfiguration, Giddens asserts, to the point that “personal life has become an open project, creating new demands and anxieties” (8). My reading of Giddens places this continuous, reflexive project of self (what one might alternatively term the ongoing production of selves-in-process) against the plastic sexuality and pure relationships that engendered the project. Only a view of romantic love as productive, evolving, and full—in other words, complex—can account for the complex transformations of intimacy and self described by Giddens. Viewed more broadly, romantic love corresponds—in both the analogous and communicative meanings of the term—to/with the very poststructural/postmodern subject it helps to enact. Tamsin Lorraine’s lucid articulation of embodied subjectivity is worth quoting at length in this context: I assume that the selves we experience as our own are the product of a historically conditioned process involving both corporeal and psychic aspects of existence, that this process needs to be instituted and continually reiterated in a social context in order to give birth to and maintain the subject at the corporeal level of embodiment as well as the psychic level of self, and that language and social positioning within a larger social field play a crucial role in this process. In taking up a position in the social field as a speaker of language, a human being takes up a perspective from which to develop a narrative of self. (ix-x) Others have theorised identity as a narrative construct (Holstein and Gubrium; Rosenwald and Ochberg). What is significant here in reading Lorraine’s embodied subjectivity through the interpretative lens provided by Giddens is the particular kind of narrative suggested by such a reading. After all, not just any narrative will do. The “perspective” taken up by the reflexive subject (as described by Giddens) in the process of constructing a storied self necessarily requires a productive integration of the many “aspects of existence.” Otherwise, no such “position” could be taken, no agency established; the particular self would not even be. As such, the perspective is a product of complexity even as it attempts to compose its own complex product (a narrative identity). Additionally, romantic love conceived as complex, as a productive force, opens up possibilities for new stories and new selves, even when, as in Lacanian theory, desire is correlated with lack. Lacan maintains that “desire is neither the appetite for satisfaction nor the demand for love, but the difference which results from the subtraction of the first from the second—the very phenomenon of their splitting” (287). Lack presented thusly is positive inasmuch as lack causes desire, which in turn produces the subject as a subjectivity. “Without lack,” Bruce Fink asserts, “the subject can never come into being, and the whole efflorescence of the dialectic of desire is squashed” (103). For clarification, Fink provides a simple illustration: “Why would a child even bother to learn to speak if all its needs were anticipated?” (103). Desire here is correlated with lack in a manner that suggests movement and change, bringing to mind Anne Carson’s famous quip, “Desire moves. Eros is a verb” (17). Keeping in mind that romantic love has become inextricably entwined with sexual desire in the West, designs that interrogate desire vis-à-vis lack (a strategy that also characterises the approaches taken by Hegel and Sartre) operate equally well in regards to self-identities formed via romantic love. Certainly, then, if desire constituted as lack can produce complexity by remaining unsatisfied and unfilled, what then of an approach that configures desire itself as production? Such a theoretical grounding is central to the work of Gilles Deleuze and Felix Guattari. For them, “everything is production” (Anti-Oedipus 4). In this view, life, the self, and even the body are not unified things but rather processes characterised by flow and multiplicity. Deleuze and Guattari emphasise the dynamic process of various sorts of “becoming” (Thousand 279). Becoming, in relation to romantic love and to other processes, involves not just individuals but assemblages. In this, Deleuze and Guattari present a collaborative conception of self involving the multiplicity of the two selves as well as the multiplicity “formed through the collaboration” (Lorraine 134). As Deleuze and Guattari explain, multiplicity “is continually transforming itself into a string of other multiplicities” (Thousand 249). To my mind, this “string” of multiplicities directly parallels the complex. Luce Irigaray’s project similarly views subjectivity as embodied, potentially collaborative, and creative. Specifically, however, Irigaray seeks to challenge the masculine specular subjectivity that fosters divisive dualisms and a sexual division of labour that privileges the masculine. She critiques the subject-object distinction that has always defined female sexuality “on the basis of masculine parameters” (This 204) and relegated the feminine to the role of other to the masculine subject. One of the more interesting aspects of Irigaray’s enterprise is her project of symbolic transformation, an attempt to symbolise an alternative feminine subjectivity: “Irigaray insists that we need to acknowledge two genders and work on providing the hitherto impoverished gender the symbolic support it needs to become more than the counterpart of masculinity. If the feminine were given the support of a gender in its own right, then feminine subjectivity could finally emerge” (Lorraine 91). What Irigaray advocates is a dialectical interaction between subjects that embraces both difference and corporeality, that is temporal, playful, reciprocal, and mutually nourishing (I Love 148). Elizabeth Grosz’s refiguring of desire somewhat echoes Irigaray’s stance. Drawing upon Deleuze and Guattarai, Grosz also conceptualises desire as productive and full. She insists that in order to understand this expanded conception of desire we must first “abandon our habitual understanding of entities as the integrated totality of parts, and instead focus on the elements, the parts, outside their integration or organisation; we must look beyond the organism to the organs comprising it” (78). Totalities remain and must be recognised, but an understanding of the dynamics of those totalities is better accomplished through an investigation of the parts rather the whole. In her privileging of parts I see reflections of Irigaray’s respect for difference and dialectical creation. Indeed, one can easily see themes of fluidity and multiplicity running through the work of the theorists we have examined. This thematic/analytical consistency, I would argue, is at least partially explained by their active engagement in the complexity of romantic love. How not to theorise subjectivities formed via narratives of romantic love in a manner that resists dualisms when romantic love itself overflows with multiplicities? This is not, of course, to downplay the role of other factors, contingencies, and motivations. Still, that some feminists are critical of certain aspects of Foucauldian theory (his failure to adequately account for unequal power relations; his seeming denial that one group or class may dominate another) strikes me as directly related to issues located (if not exclusively) within the contemporary concept of romantic love (see Hartsock; Ramazanoğlu; Sedgwick). That such is the case is, for me, no surprise. Ultimately, in spite of its long history of repression and inequity, romantic love’s ever-increasing complexity points to possible future transformations (as Giddens details). My optimism stems from the fact that romantic love’s productive force can potentially open up whole new ranges of (complex) possibilities. In the theories of Giddens, Deleuze, Irigaray, Grosz, and numerous others, we witness some of these emerging possibilities. Framing complex as an outcome that produces other complex outcomes allows me to envision the possibility of even more possibilities—something akin to Irigaray’s “expanding universe” (This 209). In the final (for now) analysis, let us follow Grosz’s lead and privilege parts over the whole. Viewed from this perspective, a given system cannot be considered as a complex thing, as though it were an isolated singularity. Focusing on the specific, the particular, and the concrete serves to highlight the contingencies, fragments, flows, shifts, multiplicities, instabilities, and relations that constitute and produce the complex. In saying this, I am not simply asserting a tautology: the complex is complex. Because the components of something complex interact in ways both provisional and productive, the complex must inevitably produce new components, parts that constitute and change the system, as well as other parts that eventually form and/or alter other complex systems. Put another way, the individual parts of a complex are themselves complex. Consequently, a deeper understanding can be gained by stepping back and re-visioning the parts-to-the-whole paradigm as complexoutcomes-ofcomplex-outcomes. Romantic love, I believe, is such an example, and an especially ubiquitous and influential one at that. Only by beginning with an understanding of love as complex can we adequately explain how it operates and produces the kinds of effects that it does. Nothing simple could produce such profoundly complex effects as identities, discourses, and material objects. Something simple may very well produce simple outcomes that eventually conjoin into something complex, a whole composed of many individual parts. But only something already complex (i.e., an existing outcome of outcomes) can produce complex outcomes instantly and automatically as a matter of course in an intricate unfolding of relationships that, like love, circulate, bond, motivate, and potentially transform. References Ackerman, Diane. A Natural History of Love. New York: Random House, 1994. Carson, Anne. Eros the Bittersweet: An Essay. Princeton, NJ: Princeton UP, 1986. Coontz, Stephanie. Marriage, a History: From Obedience to Intimacy, or How Love Conquered Marriage. New York: Viking, 2005. Deleuze, Gilles, and Félix Guattari. Anti-Oedipus: Capitalism and Schizophrenia. 1972. Trans. Robert Hurley, Mark Seem, and Helen R. Lane. Minneapolis: U of Minnesota P, 1983. ———. A Thousand Plateaus: Capitalism and Schizophrenia. 1980. Trans. Brian Massumi. Minneapolis: U of Minnesota P, 1987. Fink, Bruce. The Lacanian Subject: Between Language and Jouissance. Princeton, NJ: Princeton UP, 1995. Giddens, Anthony. The Transformation of Intimacy: Sexuality, Love and Eroticism in Modern Societies. Stanford, CA: Stanford UP, 1992. Grosz, Elizabeth. “Refiguring Lesbian Desire.” The Lesbian Postmodern. Ed. Laura Doan. New York: Columbia UP, 1994. 67-84. Hartsock, Nancy. “Foucault on Power: A Theory for Women?” Feminism/Postmodernism. Ed. Linda J. Nicholson. New York: Routledge, 1990. 157-175. Hegel, G. W. F. The Phenomenology of Mind. Trans. J. B. Baillie. New York: Harper, 1967. Holstein, James A., and Jaber F. Gubrium. The Self We Live By: Narrating Identity in a Postmodern World. New York: Oxford UP, 2000. Irigaray, Luce. I Love to You: Sketch of a Possible Felicity in History. Trans. Alison Martin. New York: Routledge, 1996. ———. “This Sex Which Is Not One.” 1985. A Reader in Feminist Knowledge. Ed. Sneja Gunew. New York: Routledge, 1991. 204-211. Jerry Maguire. Dir. Cameron Crowe. Columbia/Tristar, 1996. Lacan, Jacques. Écrits: A Selection. 1966. Trans. Alan Sheridan. New York: Norton, 1977. Lorraine, Tamsin. Irigaray and Deleuze: Experiments in Visceral Philosophy. Ithaca, New York: Cornell UP, 1999. Plato. The Symposium and The Phaedrus. Trans. William Cobb. New York: SUNY P, 1993. Ramazanoğlu, Caroline, ed. Up against Foucault: Explorations of Some Tensions between Foucault and Feminism. New York: Routledge, 1993. Rosenwald, George C., and Richard L. Ochberg, eds. Storied Lives: The Cultural Politics of Self-Understanding. New Haven, CT: Yale UP, 1992. Sartre, Jean-Paul. Being and Nothingness: An Essay on Phenomenological Ontology. Trans. Hazel E. Barnes. New York: Washington Square Press, 1956. Sedgwick, Eve Kosofsky. Touching Feeling: Affect, Pedagogy, Performativity. Durham, NC: Duke UP, 2003. Singer, Irving. The Nature of Love: Courtly and Romantic. Vol. 2. Chicago: Chicago UP, 1984. ———. The Nature of Love: The Modern World. Vol. 3. Chicago: Chicago UP, 1987. Streisand, Barbra. “People.” By Bob Merrill and Jule Styne. People. Columbia, 1964. Citation reference for this article MLA Style Carpenter, Richard. "The Heart of the Matter: Complex as Productive Force." M/C Journal 10.3 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0706/02-carpenter.php>. APA Style Carpenter, R. (Jun. 2007) "The Heart of the Matter: Complex as Productive Force," M/C Journal, 10(3). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0706/02-carpenter.php>.

50

Geoghegan, Hilary. "“If you can walk down the street and recognise the difference between cast iron and wrought iron, the world is altogether a better place”: Being Enthusiastic about Industrial Archaeology." M/C Journal 12, no.2 (May13, 2009). http://dx.doi.org/10.5204/mcj.140.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Introduction: Technology EnthusiasmEnthusiasts are people who have a passion, keenness, dedication or zeal for a particular activity or hobby. Today, there are enthusiasts for almost everything, from genealogy, costume dramas, and country houses, to metal detectors, coin collecting, and archaeology. But to be described as an enthusiast is not necessarily a compliment. Historically, the term “enthusiasm” was first used in England in the early seventeenth century to describe “religious or prophetic frenzy among the ancient Greeks” (Hanks, n.p.). This frenzy was ascribed to being possessed by spirits sent not only by God but also the devil. During this period, those who disobeyed the powers that be or claimed to have a message from God were considered to be enthusiasts (McLoughlin).Enthusiasm retained its religious connotations throughout the eighteenth century and was also used at this time to describe “the tendency within the population to be swept by crazes” (Mee 31). However, as part of the “rehabilitation of enthusiasm,” the emerging middle-classes adopted the word to characterise the intensity of Romantic poetry. The language of enthusiasm was then used to describe the “literary ideas of affect” and “a private feeling of religious warmth” (Mee 2 and 34). While the notion of enthusiasm was embraced here in a more optimistic sense, attempts to disassociate enthusiasm from crowd-inciting fanaticism were largely unsuccessful. As such enthusiasm has never quite managed to shake off its pejorative connotations.The 'enthusiasm' discussed in this paper is essentially a personal passion for technology. It forms part of a longer tradition of historical preservation in the United Kingdom and elsewhere in the world. From preserved railways to Victorian pumping stations, people have long been fascinated by the history of technology and engineering; manifesting their enthusiasm through their nostalgic longings and emotional attachment to its enduring material culture. Moreover, enthusiasts have been central to the collection, conservation, and preservation of this particular material record. Technology enthusiasm in this instance is about having a passion for the history and material record of technological development, specifically here industrial archaeology. Despite being a pastime much participated in, technology enthusiasm is relatively under-explored within the academic literature. For the most part, scholarship has tended to focus on the intended users, formal spaces, and official narratives of science and technology (Adas, Latour, Mellström, Oldenziel). In recent years attempts have been made to remedy this imbalance, with researchers from across the social sciences examining the position of hobbyists, tinkerers and amateurs in scientific and technical culture (Ellis and Waterton, Haring, Saarikoski, Takahashi). Work from historians of technology has focussed on the computer enthusiast; for example, Saarikoski’s work on the Finnish personal computer hobby:The definition of the computer enthusiast varies historically. Personal interest, pleasure and entertainment are the most significant factors defining computing as a hobby. Despite this, the hobby may also lead to acquiring useful knowledge, skills or experience of information technology. Most often the activity takes place outside working hours but can still have links to the development of professional expertise or the pursuit of studies. In many cases it takes place in the home environment. On the other hand, it is characteristically social, and the importance of friends, clubs and other communities is greatly emphasised.In common with a number of other studies relating to technical hobbies, for example Takahashi who argues tinkerers were behind the advent of the radio and television receiver, Saarikoski’s work focuses on the role these users played in shaping the technology in question. The enthusiasts encountered in this paper are important here not for their role in shaping the technology, but keeping technological heritage alive. As historian of technology Haring reminds us, “there exist alternative ways of using and relating to technology” (18). Furthermore, the sociological literature on audiences (Abercrombie and Longhurst, Ang), fans (Hills, Jenkins, Lewis, Sandvoss) and subcultures (Hall, Hebdige, Schouten and McAlexander) has also been extended in order to account for the enthusiast. In Abercrombie and Longhurst’s Audiences, the authors locate ‘the enthusiast’ and ‘the fan’ at opposing ends of a continuum of consumption defined by questions of specialisation of interest, social organisation of interest and material productivity. Fans are described as:skilled or competent in different modes of production and consumption; active in their interactions with texts and in their production of new texts; and communal in that they construct different communities based on their links to the programmes they like. (127 emphasis in original) Based on this definition, Abercrombie and Longhurst argue that fans and enthusiasts differ in three ways: (1) enthusiasts’ activities are not based around media images and stars in the way that fans’ activities are; (2) enthusiasts can be hypothesized to be relatively light media users, particularly perhaps broadcast media, though they may be heavy users of the specialist publications which are directed towards the enthusiasm itself; (3) the enthusiasm would appear to be rather more organised than the fan activity. (132) What is striking about this attempt to differentiate between the fan and the enthusiast is that it is based on supposition rather than the actual experience and observation of enthusiasm. It is here that the ethnographic account of enthusiasm presented in this paper and elsewhere, for example works by Dannefer on vintage car culture, Moorhouse on American hot-rodding and Fuller on modified-car culture in Australia, can shed light on the subject. My own ethnographic study of groups with a passion for telecommunications heritage, early British computers and industrial archaeology takes the discussion of “technology enthusiasm” further still. Through in-depth interviews, observation and textual analysis, I have examined in detail the formation of enthusiast societies and their membership, the importance of the material record to enthusiasts (particularly at home) and the enthusiastic practices of collecting and hoarding, as well as the figure of the technology enthusiast in the public space of the museum, namely the Science Museum in London (Geoghegan). In this paper, I explore the culture of enthusiasm for the industrial past through the example of the Greater London Industrial Archaeology Society (GLIAS). Focusing on industrial sites around London, GLIAS meet five or six times a year for field visits, walks and a treasure hunt. The committee maintain a website and produce a quarterly newsletter. The title of my paper, “If you can walk down the street and recognise the difference between cast iron and wrought iron, the world is altogether a better place,” comes from an interview I conducted with the co-founder and present chairman of GLIAS. He was telling me about his fascination with the materials of industrialisation. In fact, he said even concrete is sexy. Some call it a hobby; others call it a disease. But enthusiasm for industrial archaeology is, as several respondents have themselves identified, “as insidious in its side effects as any debilitating germ. It dictates your lifestyle, organises your activity and decides who your friends are” (Frow and Frow 177, Gillespie et al.). Through the figure of the industrial archaeology enthusiast, I discuss in this paper what it means to be enthusiastic. I begin by reflecting on the development of this specialist subject area. I go on to detail the formation of the Society in the late 1960s, before exploring the Society’s fieldwork methods and some of the other activities they now engage in. I raise questions of enthusiast and professional knowledge and practice, as well as consider the future of this particular enthusiasm.Defining Industrial ArchaeologyThe practice of 'industrial archaeology' is much contested. For a long time, enthusiasts and professional archaeologists have debated the meaning and use of the term (Palmer). On the one hand, there are those interested in the history, preservation, and recording of industrial sites. For example the grandfather figures of the subject, namely Kenneth Hudson and Angus Buchanan, who both published widely in the 1960s and 1970s in order to encourage publics to get involved in recording. Many members of GLIAS refer to the books of Hudson Industrial Archaeology: an Introduction and Buchanan Industrial Archaeology in Britain with their fine descriptions and photographs as integral to their early interest in the subject. On the other hand, there are those within the academic discipline of archaeology who consider the study of remains produced by the Industrial Revolution as too modern. Moreover, they find the activities of those calling themselves industrial archaeologists as lacking sufficient attention to the understanding of past human activity to justify the name. As a result, the definition of 'industrial archaeology' is problematic for both enthusiasts and professionals. Even the early advocates of professional industrial archaeology felt uneasy about the subject’s methods and practices. In 1973, Philip Riden (described by one GLIAS member as the angry young man of industrial archaeology), the then president of the Oxford University Archaeology Society, wrote a damning article in Antiquity, calling for the subject to “shed the amateur train drivers and others who are not part of archaeology” (215-216). He decried the “appallingly low standard of some of the work done under the name of ‘industrial archaeology’” (211). He felt that if enthusiasts did not attempt to maintain high technical standards, publish their work in journals or back up their fieldwork with documentary investigation or join their county archaeological societies then there was no value in the efforts of these amateurs. During this period, enthusiasts, academics, and professionals were divided. What was wrong with doing something for the pleasure it provides the participant?Although relations today between the so-called amateur (enthusiast) and professional archaeologies are less potent, some prejudice remains. Describing them as “barrow boys”, some enthusiasts suggest that what was once their much-loved pastime has been “hijacked” by professional archaeologists who, according to one respondent,are desperate to find subjects to get degrees in. So the whole thing has been hijacked by academia as it were. Traditional professional archaeologists in London at least are running head on into things that we have been doing for decades and they still don’t appreciate that this is what we do. A lot of assessments are handed out to professional archaeology teams who don’t necessarily have any knowledge of industrial archaeology. (James, GLIAS committee member)James went on to reveal that GLIAS receives numerous enquiries from professional archaeologists, developers and town planners asking what they know about particular sites across the city. Although the Society has compiled a detailed database covering some areas of London, it is by no means comprehensive. In addition, many active members often record and monitor sites in London for their own personal enjoyment. This leaves many questioning the need to publish their results for the gain of third parties. Canadian sociologist Stebbins discusses this situation in his research on “serious leisure”. He has worked extensively with amateur archaeologists in order to understand their approach to their leisure activity. He argues that amateurs are “neither dabblers who approach the activity with little commitment or seriousness, nor professionals who make a living from that activity” (55). Rather they pursue their chosen leisure activity to professional standards. A point echoed by Fine in his study of the cultures of mushrooming. But this is to get ahead of myself. How did GLIAS begin?GLIAS: The GroupThe 1960s have been described by respondents as a frantic period of “running around like headless chickens.” Enthusiasts of London’s industrial archaeology were witnessing incredible changes to the city’s industrial landscape. Individuals and groups like the Thames Basin Archaeology Observers Group were recording what they could. Dashing around London taking photos to capture London’s industrial legacy before it was lost forever. However the final straw for many, in London at least, was the proposed and subsequent demolition of the “Euston Arch”. The Doric portico at Euston Station was completed in 1838 and stood as a symbol to the glory of railway travel. Despite strong protests from amenity societies, this Victorian symbol of progress was finally pulled down by British Railways in 1962 in order to make way for what enthusiasts have called a “monstrous concrete box”.In response to these changes, GLIAS was founded in 1968 by two engineers and a locomotive driver over afternoon tea in a suburban living room in Woodford, North-East London. They held their first meeting one Sunday afternoon in December at the Science Museum in London and attracted over 130 people. Firing the imagination of potential members with an exhibition of photographs of the industrial landscape taken by Eric de Maré, GLIAS’s first meeting was a success. Bringing together like-minded people who are motivated and enthusiastic about the subject, GLIAS currently has over 600 members in the London area and beyond. This makes it the largest industrial archaeology society in the UK and perhaps Europe. Drawing some of its membership from a series of evening classes hosted by various members of the Society’s committee, GLIAS initially had a quasi-academic approach. Although some preferred the hands-on practical element and were more, as has been described by one respondent, “your free-range enthusiast”. The society has an active committee, produces a newsletter and journal, as well as runs regular events for members. However the Society is not simply about the study of London’s industrial heritage, over time the interest in industrial archaeology has developed for some members into long-term friendships. Sociability is central to organised leisure activities. It underpins and supports the performance of enthusiasm in groups and societies. For Fine, sociability does not always equal friendship, but it is the state from which people might become friends. Some GLIAS members have taken this one step further: there have even been a couple of marriages. Although not the subject of my paper, technical culture is heavily gendered. Industrial archaeology is a rare exception attracting a mixture of male and female participants, usually retired husband and wife teams.Doing Industrial Archaeology: GLIAS’s Method and PracticeIn what has been described as GLIAS’s heyday, namely the 1970s to early 1980s, fieldwork was fundamental to the Society’s activities. The Society’s approach to fieldwork during this period was much the same as the one described by champion of industrial archaeology Arthur Raistrick in 1973:photographing, measuring, describing, and so far as possible documenting buildings, engines, machinery, lines of communication, still or recently in use, providing a satisfactory record for the future before the object may become obsolete or be demolished. (13)In the early years of GLIAS and thanks to the committed efforts of two active Society members, recording parties were organised for extended lunch hours and weekends. The majority of this early fieldwork took place at the St Katherine Docks. The Docks were constructed in the 1820s by Thomas Telford. They became home to the world’s greatest concentration of portable wealth. Here GLIAS members learnt and employed practical (also professional) skills, such as measuring, triangulations and use of a “dumpy level”. For many members this was an incredibly exciting time. It was a chance to gain hands-on experience of industrial archaeology. Having been left derelict for many years, the Docks have since been redeveloped as part of the Docklands regeneration project.At this time the Society was also compiling data for what has become known to members as “The GLIAS Book”. The book was to have separate chapters on the various industrial histories of London with contributions from Society members about specific sites. Sadly the book’s editor died and the project lost impetus. Several years ago, the committee managed to digitise the data collected for the book and began to compile a database. However, the GLIAS database has been beset by problems. Firstly, there are often questions of consistency and coherence. There is a standard datasheet for recording industrial buildings – the Index Record for Industrial Sites. However, the quality of each record is different because of the experience level of the different authors. Some authors are automatically identified as good or expert record keepers. Secondly, getting access to the database in order to upload the information has proved difficult. As one of the respondents put it: “like all computer babies [the creator of the database], is finding it hard to give birth” (Sally, GLIAS member). As we have learnt enthusiasm is integral to movements such as industrial archaeology – public historian Raphael Samuel described them as the “invisible hands” of historical enquiry. Yet, it is this very enthusiasm that has the potential to jeopardise projects such as the GLIAS book. Although active in their recording practices, the GLIAS book saga reflects one of the challenges encountered by enthusiast groups and societies. In common with other researchers studying amenity societies, such as Ellis and Waterton’s work with amateur naturalists, unlike the world of work where people are paid to complete a task and are therefore meant to have a singular sense of purpose, the activities of an enthusiast group like GLIAS rely on the goodwill of their members to volunteer their time, energy and expertise. When this is lost for whatever reason, there is no requirement for any other member to take up that position. As such, levels of commitment vary between enthusiasts and can lead to the aforementioned difficulties, such as disputes between group members, the occasional miscommunication of ideas and an over-enthusiasm for some parts of the task in hand. On top of this, GLIAS and societies like it are confronted with changing health and safety policies and tightened security surrounding industrial sites. This has made the practical side of industrial archaeology increasingly difficult. As GLIAS member Bob explains:For me to go on site now I have to wear site boots and borrow a hard hat and a high visibility jacket. Now we used to do incredibly dangerous things in the seventies and nobody batted an eyelid. You know we were exploring derelict buildings, which you are virtually not allowed in now because the floor might give way. Again the world has changed a lot there. GLIAS: TodayGLIAS members continue to record sites across London. Some members are currently surveying the site chosen as the location of the Olympic Games in London in 2012 – the Lower Lea Valley. They describe their activities at this site as “rescue archaeology”. GLIAS members are working against the clock and some important structures have already been demolished. They only have time to complete a quick flash survey. Armed with the information they collated in previous years, GLIAS is currently in discussions with the developer to orchestrate a detailed recording of the site. It is important to note here that GLIAS members are less interested in campaigning for the preservation of a site or building, they appreciate that sites must change. Instead they want to ensure that large swathes of industrial London are not lost without a trace. Some members regard this as their public duty.Restricted by health and safety mandates and access disputes, GLIAS has had to adapt. The majority of practical recording sessions have given way to guided walks in the summer and public lectures in the winter. Some respondents have identified a difference between those members who call themselves “industrial archaeologists” and those who are just “ordinary members” of GLIAS. The walks are for those with a general interest, not serious members, and the talks are public lectures. Some audience researchers have used Bourdieu’s metaphor of “capital” to describe the experience, knowledge and skill required to be a fan, clubber or enthusiast. For Hills, fan status is built up through the demonstration of cultural capital: “where fans share a common interest while also competing over fan knowledge, access to the object of fandom, and status” (46). A clear membership hierarchy can be seen within GLIAS based on levels of experience, knowledge and practical skill.With a membership of over 600 and rising annually, the Society’s future is secure at present. However some of the more serious members, although retaining their membership, are pursuing their enthusiasm elsewhere: through break-away recording groups in London; active membership of other groups and societies, for example the national Association for Industrial Archaeology; as well as heading off to North Wales in the summer for practical, hands-on industrial archaeology in Snowdonia’s slate quarries – described in the Ffestiniog Railway Journal as the “annual convention of slate nutters.” ConclusionsGLIAS has changed since its foundation in the late 1960s. Its operation has been complicated by questions of health and safety, site access, an ageing membership, and the constant changes to London’s industrial archaeology. Previously rejected by professional industrial archaeology as “limited in skill and resources” (Riden), enthusiasts are now approached by professional archaeologists, developers, planners and even museums that are interested in engaging in knowledge exchange programmes. As a recent report from the British think-tank Demos has argued, enthusiasts or pro-ams – “amateurs who work to professional standards” (Leadbeater and Miller 12) – are integral to future innovation and creativity; for example computer pro-ams developed an operating system to rival Microsoft Windows. As such the specialist knowledge, skill and practice of these communities is of increasing interest to policymakers, practitioners, and business. So, the subject once described as “the ugly offspring of two parents that shouldn’t have been allowed to breed” (Hudson), the so-called “amateur” industrial archaeology offers enthusiasts and professionals alike alternative ways of knowing, seeing and being in the recent and contemporary past.Through the case study of GLIAS, I have described what it means to be enthusiastic about industrial archaeology. I have introduced a culture of collective and individual participation and friendship based on a mutual interest in and emotional attachment to industrial sites. As we have learnt in this paper, enthusiasm is about fun, pleasure and joy. The enthusiastic culture presented here advances themes such as passion in relation to less obvious communities of knowing, skilled practices, material artefacts and spaces of knowledge. Moreover, this paper has been about the affective narratives that are sometimes missing from academic accounts; overlooked for fear of snigg*rs at the back of a conference hall. Laughter and humour are a large part of what enthusiasm is. Enthusiastic cultures then are about the pleasure and joy experienced in doing things. Enthusiasm is clearly a potent force for active participation. I will leave the last word to GLIAS member John:One meaning of enthusiasm is as a form of possession, madness. Obsession perhaps rather than possession, which I think is entirely true. It is a pejorative term probably. The railway enthusiast. But an awful lot of energy goes into what they do and achieve. Enthusiasm to my mind is an essential ingredient. If you are not a person who can muster enthusiasm, it is very difficult, I think, to get anything out of it. On the basis of the more you put in the more you get out. In terms of what has happened with industrial archaeology in this country, I think, enthusiasm is a very important aspect of it. The movement needs people who can transmit that enthusiasm. ReferencesAbercrombie, N., and B. Longhurst. Audiences: A Sociological Theory of Performance and Imagination. London: Sage Publications, 1998.Adas, M. Machines as the Measure of Men: Science, Technology and Ideologies of Western Dominance. Ithaca: Cornell UP, 1989.Ang, I. Desperately Seeking the Audience. London: Routledge, 1991.Bourdieu, P. Distinction: A Social Critique of the Judgement of Taste. London: Routledge, 1984.Buchanan, R.A. Industrial Archaeology in Britain. Harmondsworth, Middlesex: Penguin, 1972.Dannefer, D. “Rationality and Passion in Private Experience: Modern Consciousness and the Social World of Old-Car Collectors.” Social Problems 27 (1980): 392–412.Dannefer, D. “Neither Socialization nor Recruitment: The Avocational Careers of Old-Car Enthusiasts.” Social Forces 60 (1981): 395–413.Ellis, R., and C. Waterton. “Caught between the Cartographic and the Ethnographic Imagination: The Whereabouts of Amateurs, Professionals, and Nature in Knowing Biodiversity.” Environment and Planning D: Society and Space 23 (2005): 673–693.Fine, G.A. “Mobilizing Fun: Provisioning Resources in Leisure Worlds.” Sociology of Sport Journal 6 (1989): 319–334.Fine, G.A. Morel Tales: The Culture of Mushrooming. Champaign, Ill.: U of Illinois P, 2003.Frow, E., and R. Frow. “Travels with a Caravan.” History Workshop Journal 2 (1976): 177–182Fuller, G. Modified: Cars, Culture, and Event Mechanics. Unpublished PhD Thesis, University of Western Sydney, 2007.Geoghegan, H. The Culture of Enthusiasm: Technology, Collecting and Museums. Unpublished PhD Thesis, University of London, 2008.Gillespie, D.L., A. Leffler, and E. Lerner. “‘If It Weren’t for My Hobby, I’d Have a Life’: Dog Sports, Serious Leisure, and Boundary Negotiations.” Leisure Studies 21 (2002): 285–304.Hall, S., and T. Jefferson, eds. Resistance through Rituals: Youth Sub-Cultures in Post-War Britain. London: Hutchinson, 1976.Hanks, P. “Enthusiasm and Condescension.” Euralex ’98 Proceedings. 1998. 18 Jul. 2005 ‹http://www.patrickhanks.com/papers/enthusiasm.pdf›.Haring, K. “The ‘Freer Men’ of Ham Radio: How a Technical Hobby Provided Social and Spatial Distance.” Technology and Culture 44 (2003): 734–761.Haring, K. Ham Radio’s Technical Culture. London: MIT Press, 2007.Hebdige, D. Subculture: The Meaning of Style. London: Methuen, 1979.Hills, M. Fan Cultures. London: Routledge, 2002.Hudson, K. Industrial Archaeology London: John Baker, 1963.Jenkins, H. Textual Poachers: Television Fans and Participatory Culture. London: Routledge, 1992.Latour, B. Aramis, or the Love of Technology. London: Harvard UP, 1996.Leadbeater, C., and P. Miller. The Pro-Am Revolution: How Enthusiasts Are Changing Our Economy and Society. London: Demos, 2004.Lewis, L.A., ed. The Adoring Audience: Fan Culture and Popular Media. London: Routledge, 1992.McLoughlin, W.G. Revivals, Awakenings, and Reform: An Essay on Religion and Social Change in America, 1607-1977. London: U of Chicago P, 1977.Mee, J. Romanticism, Enthusiasm, and Regulation: Poetics and the Policing of Culture in the Romantic Period. Oxford: Oxford UP, 2003.Mellström, U. “Patriarchal Machines and Masculine Embodiment.” Science, Technology, & Human Values 27 (2002): 460–478.Moorhouse, H.F. Driving Ambitions: A Social Analysis of American Hot Rod Enthusiasm. Manchester: Manchester UP, 1991.Oldenziel, R. Making Technology Masculine: Men, Women and Modern Machines in America 1870-1945. Amsterdam: Amsterdam UP, 1999.Palmer, M. “‘We Have Not Factory Bell’: Domestic Textile Workers in the Nineteenth Century.” The Local Historian 34 (2004): 198–213.Raistrick, A. Industrial Archaeology. London: Granada, 1973.Riden, P. “Post-Post-Medieval Archaeology.” Antiquity XLVII (1973): 210-216.Rix, M. “Industrial Archaeology: Progress Report 1962.” The Amateur Historian 5 (1962): 56–60.Rix, M. Industrial Archaeology. London: The Historical Association, 1967.Saarikoski, P. The Lure of the Machine: The Personal Computer Interest in Finland from the 1970s to the Mid-1990s. Unpublished PhD Thesis, 2004. ‹http://users.utu.fi/petsaari/lure.pdf›.Samuel, R. Theatres of Memory London: Verso, 1994.Sandvoss, C. Fans: The Mirror of Consumption Cambridge: Polity, 2005.Schouten, J.W., and J. McAlexander. “Subcultures of Consumption: An Ethnography of the New Bikers.” Journal of Consumer Research 22 (1995) 43–61.Stebbins, R.A. Amateurs: On the Margin between Work and Leisure. Beverly Hills: Sage, 1979.Stebbins, R.A. Amateurs, Professionals, and Serious Leisure. London: McGill-Queen’s UP, 1992.Takahashi, Y. “A Network of Tinkerers: The Advent of the Radio and Television Receiver Industry in Japan.” Technology and Culture 41 (2000): 460–484.

To the bibliography
Journal articles: 'Bomb Group (M)' – Grafiati (2024)

References

Top Articles
Latest Posts
Article information

Author: Van Hayes

Last Updated:

Views: 5964

Rating: 4.6 / 5 (66 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Van Hayes

Birthday: 1994-06-07

Address: 2004 Kling Rapid, New Destiny, MT 64658-2367

Phone: +512425013758

Job: National Farming Director

Hobby: Reading, Polo, Genealogy, amateur radio, Scouting, Stand-up comedy, Cryptography

Introduction: My name is Van Hayes, I am a thankful, friendly, smiling, calm, powerful, fine, enthusiastic person who loves writing and wants to share my knowledge and understanding with you.