Search results for body modification

I’ve been thinking a lot about this question lately. I even wrote an essay awhile back for The New Inquiry. But, honestly, none of the answers I come up seem complete. I’m posting this as a means of seeking help developing an explanation and to see if anyone knows of people who are taking on this question.

I think question is important because it relates to our “digital dualist” tendency to view the Web as separate from “real life.”

So far, I see three, potentially compatible, explanations: more...

Michael Rogers, Republican Congressional Representative of Michigan's 8th district and sponsor of CISPA

House representative Mike Rogers (R-MI) introduced a bill back in November called the Cyber Intelligence Sharing and Protection Act (H.R. 3523) or CISPA. It has since been referred to and reported by the appropriate committees. Since then, according to Representative Rogers’ own web site, over 100 members of congress have already announced their support for the bill:

The 105 co-sponsors of the bill include 10 committee chairmen.  Additionally, a wide range of major industry and cyber associations, such as Facebook, Microsoft, the US Chamber Commerce, the Business Roundtable, the Internet Security Alliance, TechAmerica, and many others have sent letters of support for the bill.  A list of major industry and association supporters can be found at http://intelligence.house.gov/bill/cyber-intelligence-sharing-and-protection-act-2011

Unlike SOPA and PIPA, CISPA is all about collecting and sharing “cyber threat intelligence” and has less to do with copyright infringement concerns. This bill does not directly threaten the business interests of web companies, which means we should not expect their help in fighting the bill. In fact Facebook, IBM, Intel, Oracle, and Microsoft (among others) have already sent letters in support. more...

A “catfish” is someone who misrepresents themselves online. This is all you really need to know about the movie catfish. The rest is kind of hard to describe, like trying to explain the movie Inception after you just watched it one time. I don’t want to debate the authenticity of the film, because it doesn’t really matter to this discussion (read about it on the wiki). I want to talk about the film’s noteworthy use of social media and the probing questions that it raises for scholars of new technology and Web 2.0.

The film incorporates social media in a very integral and experiential way. The producers take a pretty postmodern approach to depict the characters and draw out the narrative of the film. Mirroring some of the techniques seen Cloverfield or the Blair Witch Project, similar pseudo-documentary mystery narratives, hand-held cameras and panning screenshots allow us to experience the characters, to develop the plot arc, and to eventually come to the realization that all is not what it seems. We experience the characters through social media, as the protagonist Nev is gradually introduced to the family of a young girl Abby.  The camera pans across grainy computer screens, as Nev clicks through the Facebook profiles of the films characters and we, by proxy “get to know” these characters. The point of this exercise is for the viewer to gradually build trust for the characters alongside the central character Nev. So in effect, the film takes the technique of Takashi Miike in Audition The film builds this trust and then quickly shatters it, at which point the trust we had for the characters is broken. more...