Skip to main content

2018 | OriginalPaper | Buchkapitel

8. On the Media Logic of the State

verfasst von : Jens Schröter

Erschienen in: Media Logic(s) Revisited

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In Altheides/Snow’s important book on “media logic” it is stated that “media are the dominant force to which other institutions conform”. This argument is completely convincing, but it implies the difference between “media” and “other institutions.” “Media” is one institution among others. Although this is of course correct from e.g. a systems-theoretical perspective in which “mass media” form one subsystem of society, from the standpoint of Medienkulturwissenschaft it neglects that all institutions are always already based on medial infrastructures. This is shown with the regard to the state, its medial infrastructure of identity documents and the historical development of the defense of the media monopoly of the state

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
On the rise in “identity theft”, which constitutes a serious problem, particularly for finance (cf. Hoofnagle, 2007; cf. also Wisse, 2007).
 
2
This also includes interesting information on historical techniques for ensuring authenticity, such as tallies. Also cf. Vogtherr (2002, 154) on the fact that the “standardization of the appearance” of certificates was “a safeguard against the falsification of documents”. He notes on p. 157 that “modern diplomatics, the academic study of documents, emerged around 1700”; “the fundamental question both then and now is discrimen veri ac falsi, the distinction between what is real and what is false”.
 
3
On the details of this development, cf. Mort (1989). On the founding of Xerox and the growing acceptance of photocopiers, cf. ibid., part. 59 and 62–69.
 
4
For the best, most comprehensive overview currently available, cf. van Renesse (2005).
 
5
German identity cards, for example, use the so-called “identigram” technique, cf. Bundesdruckerei (2014).
 
6
Such as “kinegrams” or security holograms (Wikipedia, 2014). Often these techniques are collectively referred to using the umbrella term “holography” or “holograms”, although strictly speaking this is not correct. Thus “dot matrix holography”, which is often used in security appliances (cf. Johnston, 2006, 220) does not record interference patterns between object waves and reference waves; instead, an interference between two beams is used to draw pixels that constitute diffraction gratings, thus digitally assembling an image. Cf. Andrulevičius, Tamulevičius, and Tamulevičius (2007).
 
7
Cf. Jens Schröter, “Das holographische Wissen und die Nicht-Reproduzierbarkeit,” in Das holographische Wissen, ed. Stefan Rieger and Jens Schröter (Berlin: diaphanes, 2009): 77–86.
 
8
Of course there has been no shortage of attempts to forge holograms, but the results were seldom convincing; cf. Pizzanelli (1998).
 
9
This does not pose a problem for the second and third line of defense, as the second line consists of persons working professionally with money, who are likely more aware of forgeries and also have devices at their disposal able to recognize forgeries (e.g. the counterfeit detectors produced by the company Safescan (cf. Safescan, 2014). The third line of defense are already specialists in counterfeit detection.
 
10
The governments of authoritarian states were not overly fond of photocopiers, as they made the uncontrolled reproduction of information possible (such as the USSR, cf. Steinschaden, 2012, 112). However, the new options for marking copies make them interesting for dictatorships again.
 
11
One of the best-known examples of such a taggant is the so-called EURion constellation, a cloud of dots found on Euro banknotes that can be recognized by copiers and the like. The algorithm CDS (Counterfeit Deterrence System) developed by the Central Banks Counterfeit Deterrence Group (Rules for Use, 2014), a working group of 27 central banks and other institutions that produce bank notes, is implemented in software such as Photoshop. For obvious reasons, the exact mechanisms used are secret. Steven J. Murdoch (2009) of Cambridge University has been researching this for some time: Software Detection of Currency.
 
Literatur
Zurück zum Zitat Altheide, D. L., & Snow, R. P. (1979). Media logic. Beverley Hills, CA: SAGE. Altheide, D. L., & Snow, R. P. (1979). Media logic. Beverley Hills, CA: SAGE.
Zurück zum Zitat Andrulevičius, M., Tamulevičius, T., & Tamulevičius, S. (2007). Formation and analysis of dot-matrix holograms. Materials Science (Medžiagotyra), 13, 278–281. Andrulevičius, M., Tamulevičius, T., & Tamulevičius, S. (2007). Formation and analysis of dot-matrix holograms. Materials Science (Medžiagotyra), 13, 278–281.
Zurück zum Zitat Benjamin, W. (2006). The work of art in the age of its technological reproducibility. Selected writings, 4, 1938–1940. Cambridge, MA: Harvard University Press, 251–283. Benjamin, W. (2006). The work of art in the age of its technological reproducibility. Selected writings, 4, 1938–1940. Cambridge, MA: Harvard University Press, 251–283.
Zurück zum Zitat Engemann, C. (2011). Im Namen des Staates. Der elektronische Personalausweis und die Medien der Regierungskunst. Zeitschrift für Medien- und Kulturforschung, 2, 211–228. Engemann, C. (2011). Im Namen des Staates. Der elektronische Personalausweis und die Medien der Regierungskunst. Zeitschrift für Medien- und Kulturforschung, 2, 211–228.
Zurück zum Zitat Engemann, C. (2013). Write me down, make me real. Zur Gouvernemedialität digitaler Identität. In H.Passoth & J. Wehner (Eds.), Quoten, Kurven und Profile. Zur Vermessung der sozialen Welt (pp. 205–227). Wiesbaden: Springer. Engemann, C. (2013). Write me down, make me real. Zur Gouvernemedialität digitaler Identität. In H.Passoth & J. Wehner (Eds.), Quoten, Kurven und Profile. Zur Vermessung der sozialen Welt (pp. 205–227). Wiesbaden: Springer.
Zurück zum Zitat Groebner, V. (2004). Der Schein der Person. Steckbrief, Ausweis und Kontrolle im Mittelalter. München: C. H. Beck. Groebner, V. (2004). Der Schein der Person. Steckbrief, Ausweis und Kontrolle im Mittelalter. München: C. H. Beck.
Zurück zum Zitat Higgs, E. (2007). From frankpledge to chip and pin: Identification and identity in England, 1475–2005. In K. de Leeuw & J. Bergstra (Eds.), The history of information security: A comprehensive handbook (pp. 243–262). Amsterdam, Oxford: Elsevier.CrossRef Higgs, E. (2007). From frankpledge to chip and pin: Identification and identity in England, 1475–2005. In K. de Leeuw & J. Bergstra (Eds.), The history of information security: A comprehensive handbook (pp. 243–262). Amsterdam, Oxford: Elsevier.CrossRef
Zurück zum Zitat Hoofnagle, C. J. (2007). Identity theft. Making the known unknowns known. Harvard Journal of Law & Technology, 21, 98–122. Hoofnagle, C. J. (2007). Identity theft. Making the known unknowns known. Harvard Journal of Law & Technology, 21, 98–122.
Zurück zum Zitat Johnston, S. (2006). Holographic visions. A history of new science. Oxford: Oxford University Press.CrossRef Johnston, S. (2006). Holographic visions. A history of new science. Oxford: Oxford University Press.CrossRef
Zurück zum Zitat Krajina, Z., Moores, S., & Morley, D. (2014). Non-media-centric media studies: A cross-generational conversation. European Journal of Cultural Studies, 17, 682–700.CrossRef Krajina, Z., Moores, S., & Morley, D. (2014). Non-media-centric media studies: A cross-generational conversation. European Journal of Cultural Studies, 17, 682–700.CrossRef
Zurück zum Zitat Lancaster, I. M., & Mitchell, A. (2004). The Growth of Optically Variable Features on Banknotes. In SPIE Proceedings, 5310 (pp. 34–45). Lancaster, I. M., & Mitchell, A. (2004). The Growth of Optically Variable Features on Banknotes. In SPIE Proceedings, 5310 (pp. 34–45).
Zurück zum Zitat Mort, J. (1989). The anatomy of xerography. Its invention and evolution. Jefferson/NC: MacFarland. Mort, J. (1989). The anatomy of xerography. Its invention and evolution. Jefferson/NC: MacFarland.
Zurück zum Zitat Owen, D. (2004). Copies in seconds. Chester carlson and the birth of the Xerox machine. New York: Simon & Schuster. Owen, D. (2004). Copies in seconds. Chester carlson and the birth of the Xerox machine. New York: Simon & Schuster.
Zurück zum Zitat Paul, H. (2010). Hologramme auf die Maschinen. Um sich vor Plagiatoren zu schützen, setzen die deutschen Maschinenbauer vor allem auf technologischen Vorsprung. Das reicht nicht aus, findet ihr Verband. Frankfurter Allgemeine Zeitung, January 19. Paul, H. (2010). Hologramme auf die Maschinen.  Um sich vor Plagiatoren zu schützen, setzen die deutschen Maschinenbauer vor allem auf technologischen Vorsprung. Das reicht nicht aus, findet ihr Verband. Frankfurter Allgemeine Zeitung, January 19.
Zurück zum Zitat Pizzanelli, D. (1998). Counterfeit Holograms and Simulations. In SPIE Proceedings, 3314 (pp. 86–96). Pizzanelli, D. (1998). Counterfeit Holograms and Simulations. In SPIE Proceedings, 3314 (pp. 86–96).
Zurück zum Zitat Renesse, R. L. V. (2005). Optical document security. Boston, London: Artech House. Renesse, R. L. V. (2005). Optical document security. Boston, London: Artech House.
Zurück zum Zitat Rosengart, F. (2005). Datenspur Papier. Die Datenschleuder, 86, 19–21. Rosengart, F. (2005). Datenspur Papier. Die Datenschleuder, 86, 19–21.
Zurück zum Zitat Schell, K. J. (2007). History of Document Security. In K. de Leeuw & J. Bergstra (Eds.), The history of information security: A comprehensive handbook (pp. 198–241). Amsterdam, Oxford: Elsevier. Schell, K. J. (2007). History of Document Security. In K. de Leeuw & J. Bergstra (Eds.), The history of information security: A comprehensive handbook (pp. 198–241). Amsterdam, Oxford: Elsevier.
Zurück zum Zitat Schröter, J. (2009). Das holographische Wissen und die Nicht-Reproduzierbarkeit. In S. Rieger & J. Schröter (Eds.), Das holographische Wissen (pp. 77–86). Berlin: diaphanes. Schröter, J. (2009). Das holographische Wissen und die Nicht-Reproduzierbarkeit. In S. Rieger & J. Schröter (Eds.), Das holographische Wissen (pp. 77–86). Berlin: diaphanes.
Zurück zum Zitat Steinschaden, J. (2012). Digitaler Frühling. Wer das Netz hat, hat die Macht? Vienna: Ueberreuter. Steinschaden, J. (2012). Digitaler Frühling. Wer das Netz hat, hat die Macht? Vienna: Ueberreuter.
Zurück zum Zitat Strasser, G. F. (2007). The rise of cryptology in the European Renaissance. In K. de Leeuw & J. Bergstra (Eds.), The history of information security: A comprehensive handbook (pp. 277–325). Amsterdam and Oxford: Elsevier.CrossRef Strasser, G. F. (2007). The rise of cryptology in the European Renaissance. In K. de Leeuw & J. Bergstra (Eds.), The history of information security: A comprehensive handbook (pp. 277–325). Amsterdam and Oxford: Elsevier.CrossRef
Zurück zum Zitat Torpey, J. (2000). The invention of the passport. Cambridge: Cambridge University Press. Torpey, J. (2000). The invention of the passport. Cambridge: Cambridge University Press.
Zurück zum Zitat Vogtherr, T. (2002). Urkunden und Akten. In M. Maurer (Ed.), Aufriß der Historischen Wissenschaften in sieben Bänden, 4 (pp. 146–167). Stuttgart: Reclam. Vogtherr, T. (2002). Urkunden und Akten. In M. Maurer (Ed.), Aufriß der Historischen Wissenschaften in sieben Bänden, 4 (pp. 146–167). Stuttgart: Reclam.
Zurück zum Zitat Werner, T. (2009). Urkunde. In G. Ueding (Ed.), Historisches Wörterbuch der Rhetorik, 9 (pp. 934–941). WBG: Darmstadt. Werner, T. (2009). Urkunde. In G. Ueding (Ed.), Historisches Wörterbuch der Rhetorik, 9 (pp. 934–941). WBG: Darmstadt.
Zurück zum Zitat Winston, B. (1998). Media technology and society. A history from the telegraph to the internet. London, New York: Routledge. Winston, B. (1998). Media technology and society. A history from the telegraph to the internet. London, New York: Routledge.
Zurück zum Zitat Wisse, P. (2007). Semiotics of identity management. In K. de Leeuw & J. Bergstra (Eds.), The history of information security: A comprehensive handbook (pp. 167–196). Elsvier: Amsterdam, Oxford.CrossRef Wisse, P. (2007). Semiotics of identity management. In K. de Leeuw & J. Bergstra (Eds.), The history of information security: A comprehensive handbook (pp. 167–196). Elsvier: Amsterdam, Oxford.CrossRef
Metadaten
Titel
On the Media Logic of the State
verfasst von
Jens Schröter
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-65756-1_8