18 research outputs found

    What Was Artificial Intelligence?

    Get PDF
    When it was originally published in 2002, Sue Curry Jansen’s “What Was Artificial Intelligence?” attracted little notice. The long essay was published as a chapter in Jansen’s Critical Communication Theory, a book whose wisdom and erudition failed to register across the many fields it addressed. One explanation for the neglect, ironic and telling, is that Jansen’s sheer scope as an intellectual had few competent readers in the communication studies discipline into which she published the book. “What Was Artificial Intelligence?” was buried treasure. In this mediastudies.press edition, Jansen’s prescient autopsy of AI self-selling—the rhetoric of the masculinist sublime—is reprinted with a new introduction. Now an open access book, “What Was Artificial Intelligence?” is a message in a bottle, addressed to Musk, Bezos, and the latest generation of AI myth-makers

    What Was Artificial Intelligence?

    Get PDF
    When it was originally published in 2002, Sue Curry Jansen’s “What Was Artificial Intelligence?” attracted little notice. The long essay was published as a chapter in Jansen’s Critical Communication Theory, a book whose wisdom and erudition failed to register across the many fields it addressed. One explanation for the neglect, ironic and telling, is that Jansen’s sheer scope as an intellectual had few competent readers in the communication studies discipline into which she published the book. “What Was Artificial Intelligence?” was buried treasure. In this mediastudies.press edition, Jansen’s prescient autopsy of AI self-selling—the rhetoric of the masculinist sublime—is reprinted with a new introduction. Now an open access book, “What Was Artificial Intelligence?” is a message in a bottle, addressed to Musk, Bezos, and the latest generation of AI myth-makers

    The Streisand effect and censorship backfire

    Get PDF
    Barbra Streisand\u27s attempt to restrict online views of her residence on a public website had the paradoxical effect of leading to many more views than if she had done nothing. Subsequently, attempts at censorship that end up being counterproductive have been dubbed the Streisand effect. To better understand the dynamics of the Streisand effect, we examine five tactics used by censors to reduce outrage from their actions: (1) hiding the existence of censorship; (2) devaluing targets of censorship; (3) reinterpreting actions by lying, minimizing consequences, blaming others, and using benign framing; (4) using official channels to give an appearance of justice; and (5) intimidating opponents. Within this framework, the Streisand effect can be understood as a special outcome of censorship attempts, one in which the methods used to reduce outrage did not succeed

    The Streisand Effect and Censorship Backfire

    Get PDF
    Barbra Streisand's attempt to restrict online views of her residence on a public website had the paradoxical effect of leading to many more views than if she had done nothing. Subsequently, attempts at censorship that end up being counterproductive have been dubbed the "Streisand effect." To better understand the dynamics of the Streisand effect, we examine five tactics used by censors to reduce outrage from their actions

    Exposing and exposing censorship: Backfire dynamics in freedom-of-speech struggle: Spin and censorship

    Get PDF
    Censorship can backfire because it is usually viewed as a violation of the right to free expression, which is widely valued as an ideal; under the Charter of the United Nations, freedom of expression is a universal human right. Backfire occurs, for example, when censorious attacks on a film or book cultivate increased demand for the forbidden work rather than restrict access to it. Censors can inhibit this backfire effect in various ways, including covering up the censorship, devaluing the target, reinterpreting the action, using official channels, and using intimidation and bribery. These five methods to inhibit backfire from attacks on free speech are illustrated by a variety of cases, including attacks that backfired and ones that did not. This analysis provides guidance for effectively opposing attacks on free expression

    Power

    No full text
    corecore