summaryrefslogtreecommitdiff
path: root/deborah-lupton.html
blob: dc986d1cb1f2bd1f83565e5c43f8b0ed618c22bc (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
<!DOCTYPE html>
<html>
    <head>
        <meta charset="UTF-8">
        <title> Ici THK — Cyberfeminism </title>
        <link rel="stylesheet" href="assets/css/style.css">
    </head>
    <body>
        <header>
            <h1> <a href="index.html">Ici THK</a> </h1>
            <h2> Deborah Lupton </h2>
            <h3> Sociology </h3>
        </header>
        <main>
            <article>
                <aside>
                    <section id="author">
                        <h2>About the Author</h2>
                        <p>Deborah Lupton worked already in 1993 on the analogy
                            between the communication of technology threats and of
                            diseases, she presents us the analogy that is voluntary
                            made between the computer and the body in a hygienic
                            society where we tend to rely on centralized organisation
                            to desinfect and sanitize our world. Since then the issue
                            of scale and control.</p>
                    </section>
                    <section id="sources">
                        <h2>Sources</h2>
                        <p><a href="assets/BookChapt_TacticalBiopolitics_subRosa.pdf">
                            <em>Panic computing: The viral metaphor and computer technology</em></a>,
                            Cultural Studies, 8:3, pp.556—568, ISSN 0950-2386</p>
                    </section>
                </aside>
                <section id="scare">
                    <h2> Panic computing: The viral metaphor and computer technology </h2>

                    <p>The unproblematic use of the term 'virus' applied to
		       technological artefacts, inspire ponderings on the wider
		       implications of the viral metaphor. The choice of
		       phraseology in textual accounts and talk, the discursive
		       devices used, recurrent lexical patterns in describing
		       things, events, groups or people is revealing of the
		       latent ideological layer of meaning of such
		       communications (van Dijk, 1990; Fowler, 1991). In
		       particular, the intertextuality, or the ways in which
		       texts selectively draw upon other texts, other cultural
		       forms and discourses to create meaning, indicates the
		       political and ideological functions of texts and delimits
		       the boundaries within which topics may be discussed
		       (Fairclough, 1992; Astroff and Nyberg, 1992). *The
		       nomination of a type of computer technology malfunction
		       as a 'virus'* is a highly significant and symbolic
		       linguistic choice of metaphor, used to make certain
		       connections between otherwise unassociated subjects and
		       objects, to give meaning to unfamiliar events, to render
		       abstract feelings and intangible processes concrete. In
		       doing so, the metaphor shapes perception, identity and
		       experience, going beyond the original association by
		       evoking a host of multiple meanings (Clatts and Mutchler,
		       1989: 106-7). As Geertz has argued, '[i]n metaphor one
		       has.., a stratification of meaning, in which an
		       incongruity of sense on one level produces an influx of
		        significance on another' (1973: 210).</p>
                </section>
		<section id="viruses-and-the-computer-corpus">
                    <h2>Viruses and the computer corpus</h2>

		    <p>The present analysis examines in detail the
		       stratification of meaning evident in the widespread and
		       largely unquestioned adoption of the viral metaphor to
		       describe computer technology malfunction in popular
		       texts. It is argued that the viral metaphor used in the
		       context of computer technology draws upon a constellation
		       of discourses concerning body boundaries, erotic
		       pleasure, morality, invasion, disease and destruction. In
		       what follows, the meanings of the term 'virus' in the
		       medical context, the symbiotic relationship between body
		       and computer metaphorical systems, the symbolic danger of
		       viruses, the seductiveness of the human/computer,
		       Self/Other relationship and the cultural crisis around
		       issues of bodies, technologies and sexualities at the fin
		       de millénnium are discussed to illuminate the ambivalent
		       relationship of humans with computer technology in late
	               capitalist societies.</p>
                </section>							
		<section id="morality-and-viral-politics">
                    <h2>Morality and viral politics</h2>

		    <p>There are no "good" Germs or 'normal Germs; all Germs are
		       bad' (Helman, 1978: 118-19). To counter this attack, as
		       Cindy Patton points out, bodies are visualized as being
		       'filled with tiny defending armies whose mission [is] to
		       return the "self" to the precarious balance of health'
		       (Patton, 1990: 60). The immune system is commonly
		       described in popular and medical texts as mounting a
		       'defence' or 'siege' against 'murderous' viruses or
		       bacteria which are 'fought', 'attacked' or 'killed' by
		       white blood cells, drugs or surgical procedures (Martin,
		       1990; Montgomery, 1991). This military discourse,
		       redolent with images of physical aggression, has become
		       routine and standardized to the point where its
		       metaphorical origins are erased: it is now a 'dead'
		        metaphor (Montgomery, 1991: 350).</p>
                </section>						
		<section id="the-seduction-and-terror-of-cyberspace">
                    <h2>The seduction and terror of cyberspace</h2>
                    <p>The viral metaphor has been adopted in computing
		       terminology to express the meanings of rapid spread and
		       invisible invasion of an entity that is able to reproduce
		       itself and causes malfunctioning on the systemic
		       level. It is telling that this alternative use has been
		       so readily accepted that at least one Australian medical
		       journal has featured articles on computer viruses devoted
		       to making explicit the similarities between biological
		       viruses and computer viruses (Dawes, 1992a, 1992b). Just
		       as the immune system is described in terms of military
		       imagery, popular accounts of computer viruses commonly
		       employ the terminology of war to conceptualize the
		       struggle between technological order and chaos.  [....]
		       Ways of describing computer technology have both created
		       new terminology which has entered the language and have
		       drawn upon elements of older, more established lexical
		       systems. In particular, drawing upon the centuries-old
		       body/machine discourse, there has developed a symbiotic
		       metaphorical relationship between computers and humans,
		       in which computers have been anthropomorphized while
		       humans have been portrayed as 'organic computers'
		       (Berman, 1989: 7).The immune system is also commonly
		       described as an information-processing system,
		       communicating by means of hormones. By this imagery,
		       there occurs 'the transformation of the human subject
		       into an object, a repository, or else a collision site,
		       for various types of detectable and useable information'
		       (Montgomery, 1991: 383). Indeed, according to Haraway,
		       bodies have conceptually become cyborgs
		       (cyberneticorganisms), that is, 'techno-organic, humanoid
		       hybrids' (Haraway, 1990:21), or compounds of machine and
		       body theorized in terms of communications, for which
		       disease may be conceptualized as 'a subspecies of
		       information malfunction or communications pathology'
		        (Haraway, 1989: 15).</p>
                </section>
		<section id="the-viral-metaphor-and-technophobia">
                    <h2>The viral metaphor and technophobia</h2>
		    <p>At the fin de millénnium, the body is a site of toxicity,
		       contamination and catastrophe, subject to and needful of
		       a high degree of surveillance and control. Kroker and
		       Kroker (1988:10 ff.)  term the contemporary obsession
		       with clean bodily fluids as 'Body McCarthyism', an
		       hysterical new temperance movement.  [...]  'Panic
		       Computing' invokes '[t]he underlying moral imperative
		       ... You can't trust your best friend's software any more
		       than you can trust his or her bodily fluids - safe
		       software or no software at all!' (Ross, 1991: 108). The
		       insertion of an 'infected' disk, that is a 'carrier' of
		       corruption, spells disaster for the integrity of the
		       computer corpus. Just as people are exhorted to grill
		       their sexual partners for details of their past intimate
		       lives, so as to be 'sure and safe' before proceeding to
		       exchange bodily fluids, so they are warned to verify the
		       source and safety of the computer disks they insert into
		        their PCs (Sontag, 1989: 167).</p>
                </section>
            </article>
            <nav>
              <ul>
                <li><a href="bernard-aspe.html">ASPE</a></li>
                <li><a href="karen-barad.html">BARAD</a></li>
                <li><a href="muriel-combes.html">COMBES</a></li>
                <li><a href="stephane-lupasco.html">LUPASCO</a></li>
                <li><a href="deborah-lupton.html">LUPTON</a></li>
                <li><a href="lynn-margulis.html">MARGULIS</a></li>
                <li><a href="gilbert-simondon.html">SIMONDON</a></li>
                <li><a href="subrosa.html">SUBROSA</a></li>
                <li><a href="etc.html">Etc.</a></li>
              </ul>
            </nav>
        </main>
    </body>
</html>