Presentation on theme: "Student Led Facilitation Session Transgression 2.0 Chapter 9, 10,11 & 14 By Robby Riehle."— Presentation transcript:
Student Led Facilitation Session Transgression 2.0 Chapter 9, 10,11 & 14 By Robby Riehle
Chapter 9-Abusing the Media Chapter 9 Mark Nunes
Main Ideas Subversive tactical media attempt to undermine power structures through the use of large-scale forums like the Internet. New media attributes to peoples access and ability to send, receive, and relay information. “If information is power, then this new technology—which is the first to evenly distribute information—is really distributing power...[And] can give a voice to even the weakest signals. (Trippi 159) The subversion succeeds if “information” (the signal that travels from sender to receiver with as little noise or interference as possible) exploiting the “equivocation” (the degree on uncertainty that the message received was the signal sent) within the system.
Gatekeeping & Agenda setting in New Media Are these pranks and hoaxes “burning bags of poop” or politically engaging transgressions? “Computer-mediated communication in the web can undermine the censorship of authoritarian regimes that try to control and repress public opinion” (Hambermas) In new media the hoaxes become less trivial and more meaningful BvXtbaWQQ&playnext=1&list=PLAB4B 95866BFE0C5D&feature=results_main Nhb24iIEyQ
Rapid speed at which information is sent (true or not true) reveals that the relay of such information is more important than the source from where it was received. fa_n_ html
Dismissal of such moments... “is to ignore the viral as a forum of communicative action with validity.” (162) Example: Persiankiwi
Conclusion: The goal is to understand how the triviality of noise created by the subversion allows for political engagement, divergent from the issue, which it is commenting on. It instead comments on the legitimacy of the media system as a whole through a discourse agenda.
Breaking the New: Power and Secrecy in the Age of the Internet Chapter 10 Ted Gournelos
“The primary interest is in exposing oppressive regimes in Asia, the former Soviet bloc, sub-Saharan Africa and Middle East, But we also expect to be of assistance to people of all religions who wish to reveal unethical behavior if in their governments and corporations.” (171) “Can the release of documents leaked by a third party function under the same logic as circulating music through Napster or movies through bit torrents?”
Popular Culture News Discourse programs: The Daily Show, The Colbert Report & South Park. v=aFQFB5YpDZE
[... ] The Internet is potentially an open society, in which total freedom of information connects with public relations as a tool of the masses rather than elites (Gournelos 173).
My Day of Fame on Digg.com Race, Representation, and Resistance in Web 2.0 Chapter11 Vanessa Au
Web 1.0 vs. Web 2.0 “Web 1.0 is best characterized under the general rubric of data: primarily Web sites and tools that allowed for massive amounts of archiving, data collecting, dada manipulation, and searching, sites and tools mostly created by experts or commercial interests.” Whereas Web. 2.0 has made it possible for far greater user interactivity and user participation such as commenting, sharing, and ranking. For example Wikipedia allows people to post written submission becoming the formidable user- generated encyclopedia. And Facebook which coined the term Social Network which allows people to post photos, status’ and comment them that resembles a virtual society. These advances mark the evolution of the Web.
Constructed Ideology of Racialized Online Other 1. User Rankings and, as a result, hierarchical structuring of the web content. 2. The sharing/reposting of web content (to indicate approval or disapproval of the content). 3. Functionality that enables users to hijack or colonize web space to display the author’s content with oppositional, often racist views.
Monsters in the Metropolis Pirate Utopias and the New Politics of space Chapter 14 Debra Benita Shaw
Main Idea New technology has changed the way we think about space. Making city architecture and cyberspace mutually constitutive. In the same way homelessness or squatting affects the physical society. Hacking “like a parasite, takes place and by occupying and feeding off a host...”(Shaw 251) Although the transgressive potential of cyberspace has only been realized as [...] a substitute for resistant activities and a space which recuperates those activities while reconstituting the dichotomies of public/private and open/closed (Shaw 253)