summaryrefslogtreecommitdiff
path: root/deborah-lupton.html
diff options
context:
space:
mode:
authornatacha <natacha@kritica.lesoiseaux.io>2018-11-30 15:13:25 +0100
committernatacha <natacha@kritica.lesoiseaux.io>2018-11-30 15:13:25 +0100
commit15dc676dd99ce96b26e1d784cc7b6a45a428c708 (patch)
treed91aee49e2ea5e694bd5837950edf0d03d8140eb /deborah-lupton.html
parentc0c971e4f09e5c6984d629a8e95a4fcc16845830 (diff)
download3ts-reader-15dc676dd99ce96b26e1d784cc7b6a45a428c708.tar.gz
put authors in authors folder
Diffstat (limited to 'deborah-lupton.html')
-rwxr-xr-xdeborah-lupton.html181
1 files changed, 0 insertions, 181 deletions
diff --git a/deborah-lupton.html b/deborah-lupton.html
deleted file mode 100755
index dc986d1..0000000
--- a/deborah-lupton.html
+++ /dev/null
@@ -1,181 +0,0 @@
-<!DOCTYPE html>
-<html>
- <head>
- <meta charset="UTF-8">
- <title> Ici THK — Cyberfeminism </title>
- <link rel="stylesheet" href="assets/css/style.css">
- </head>
- <body>
- <header>
- <h1> <a href="index.html">Ici THK</a> </h1>
- <h2> Deborah Lupton </h2>
- <h3> Sociology </h3>
- </header>
- <main>
- <article>
- <aside>
- <section id="author">
- <h2>About the Author</h2>
- <p>Deborah Lupton worked already in 1993 on the analogy
- between the communication of technology threats and of
- diseases, she presents us the analogy that is voluntary
- made between the computer and the body in a hygienic
- society where we tend to rely on centralized organisation
- to desinfect and sanitize our world. Since then the issue
- of scale and control.</p>
- </section>
- <section id="sources">
- <h2>Sources</h2>
- <p><a href="assets/BookChapt_TacticalBiopolitics_subRosa.pdf">
- <em>Panic computing: The viral metaphor and computer technology</em></a>,
- Cultural Studies, 8:3, pp.556—568, ISSN 0950-2386</p>
- </section>
- </aside>
- <section id="scare">
- <h2> Panic computing: The viral metaphor and computer technology </h2>
-
- <p>The unproblematic use of the term 'virus' applied to
- technological artefacts, inspire ponderings on the wider
- implications of the viral metaphor. The choice of
- phraseology in textual accounts and talk, the discursive
- devices used, recurrent lexical patterns in describing
- things, events, groups or people is revealing of the
- latent ideological layer of meaning of such
- communications (van Dijk, 1990; Fowler, 1991). In
- particular, the intertextuality, or the ways in which
- texts selectively draw upon other texts, other cultural
- forms and discourses to create meaning, indicates the
- political and ideological functions of texts and delimits
- the boundaries within which topics may be discussed
- (Fairclough, 1992; Astroff and Nyberg, 1992). *The
- nomination of a type of computer technology malfunction
- as a 'virus'* is a highly significant and symbolic
- linguistic choice of metaphor, used to make certain
- connections between otherwise unassociated subjects and
- objects, to give meaning to unfamiliar events, to render
- abstract feelings and intangible processes concrete. In
- doing so, the metaphor shapes perception, identity and
- experience, going beyond the original association by
- evoking a host of multiple meanings (Clatts and Mutchler,
- 1989: 106-7). As Geertz has argued, '[i]n metaphor one
- has.., a stratification of meaning, in which an
- incongruity of sense on one level produces an influx of
- significance on another' (1973: 210).</p>
- </section>
- <section id="viruses-and-the-computer-corpus">
- <h2>Viruses and the computer corpus</h2>
-
- <p>The present analysis examines in detail the
- stratification of meaning evident in the widespread and
- largely unquestioned adoption of the viral metaphor to
- describe computer technology malfunction in popular
- texts. It is argued that the viral metaphor used in the
- context of computer technology draws upon a constellation
- of discourses concerning body boundaries, erotic
- pleasure, morality, invasion, disease and destruction. In
- what follows, the meanings of the term 'virus' in the
- medical context, the symbiotic relationship between body
- and computer metaphorical systems, the symbolic danger of
- viruses, the seductiveness of the human/computer,
- Self/Other relationship and the cultural crisis around
- issues of bodies, technologies and sexualities at the fin
- de millénnium are discussed to illuminate the ambivalent
- relationship of humans with computer technology in late
- capitalist societies.</p>
- </section>
- <section id="morality-and-viral-politics">
- <h2>Morality and viral politics</h2>
-
- <p>There are no "good" Germs or 'normal Germs; all Germs are
- bad' (Helman, 1978: 118-19). To counter this attack, as
- Cindy Patton points out, bodies are visualized as being
- 'filled with tiny defending armies whose mission [is] to
- return the "self" to the precarious balance of health'
- (Patton, 1990: 60). The immune system is commonly
- described in popular and medical texts as mounting a
- 'defence' or 'siege' against 'murderous' viruses or
- bacteria which are 'fought', 'attacked' or 'killed' by
- white blood cells, drugs or surgical procedures (Martin,
- 1990; Montgomery, 1991). This military discourse,
- redolent with images of physical aggression, has become
- routine and standardized to the point where its
- metaphorical origins are erased: it is now a 'dead'
- metaphor (Montgomery, 1991: 350).</p>
- </section>
- <section id="the-seduction-and-terror-of-cyberspace">
- <h2>The seduction and terror of cyberspace</h2>
- <p>The viral metaphor has been adopted in computing
- terminology to express the meanings of rapid spread and
- invisible invasion of an entity that is able to reproduce
- itself and causes malfunctioning on the systemic
- level. It is telling that this alternative use has been
- so readily accepted that at least one Australian medical
- journal has featured articles on computer viruses devoted
- to making explicit the similarities between biological
- viruses and computer viruses (Dawes, 1992a, 1992b). Just
- as the immune system is described in terms of military
- imagery, popular accounts of computer viruses commonly
- employ the terminology of war to conceptualize the
- struggle between technological order and chaos. [....]
- Ways of describing computer technology have both created
- new terminology which has entered the language and have
- drawn upon elements of older, more established lexical
- systems. In particular, drawing upon the centuries-old
- body/machine discourse, there has developed a symbiotic
- metaphorical relationship between computers and humans,
- in which computers have been anthropomorphized while
- humans have been portrayed as 'organic computers'
- (Berman, 1989: 7).The immune system is also commonly
- described as an information-processing system,
- communicating by means of hormones. By this imagery,
- there occurs 'the transformation of the human subject
- into an object, a repository, or else a collision site,
- for various types of detectable and useable information'
- (Montgomery, 1991: 383). Indeed, according to Haraway,
- bodies have conceptually become cyborgs
- (cyberneticorganisms), that is, 'techno-organic, humanoid
- hybrids' (Haraway, 1990:21), or compounds of machine and
- body theorized in terms of communications, for which
- disease may be conceptualized as 'a subspecies of
- information malfunction or communications pathology'
- (Haraway, 1989: 15).</p>
- </section>
- <section id="the-viral-metaphor-and-technophobia">
- <h2>The viral metaphor and technophobia</h2>
- <p>At the fin de millénnium, the body is a site of toxicity,
- contamination and catastrophe, subject to and needful of
- a high degree of surveillance and control. Kroker and
- Kroker (1988:10 ff.) term the contemporary obsession
- with clean bodily fluids as 'Body McCarthyism', an
- hysterical new temperance movement. [...] 'Panic
- Computing' invokes '[t]he underlying moral imperative
- ... You can't trust your best friend's software any more
- than you can trust his or her bodily fluids - safe
- software or no software at all!' (Ross, 1991: 108). The
- insertion of an 'infected' disk, that is a 'carrier' of
- corruption, spells disaster for the integrity of the
- computer corpus. Just as people are exhorted to grill
- their sexual partners for details of their past intimate
- lives, so as to be 'sure and safe' before proceeding to
- exchange bodily fluids, so they are warned to verify the
- source and safety of the computer disks they insert into
- their PCs (Sontag, 1989: 167).</p>
- </section>
- </article>
- <nav>
- <ul>
- <li><a href="bernard-aspe.html">ASPE</a></li>
- <li><a href="karen-barad.html">BARAD</a></li>
- <li><a href="muriel-combes.html">COMBES</a></li>
- <li><a href="stephane-lupasco.html">LUPASCO</a></li>
- <li><a href="deborah-lupton.html">LUPTON</a></li>
- <li><a href="lynn-margulis.html">MARGULIS</a></li>
- <li><a href="gilbert-simondon.html">SIMONDON</a></li>
- <li><a href="subrosa.html">SUBROSA</a></li>
- <li><a href="etc.html">Etc.</a></li>
- </ul>
- </nav>
- </main>
- </body>
-</html>
-