When I started my undergraduate work at Colorado State University, I committed myself to trying to maintain a 4.0 GPA. At the time, I didn’t understand what it would take to maintain that level of excellence for the duration of the coursework, nor did I find much in the way of best practices to light the way. Now that I have completed my coursework and graduated with a 4.0, I though it would be worthwhile to document those practices that helped me reach my goal for other students who choose to commit themselves to academic excellence. I have organized the practices into three categories, a) building a support system, b) organization, and c) intellectual curiosity.
Building a Support System
Every journey in life is worth sharing, and the decision to pursue a college education is no different. It’s a journey, and as such, requires a support system to help along the way. A strong support system includes family, friends, employers, and the university. In addition, it is important to seek out a mentor that can guide you through the journey.
I began by talking with my family, to make sure they understood the value I placed on academic excellence and the sacrifices that we would have to make as a family. In addition, I used Facebook, Twitter, and a WordPress blog to communicate my progress to extended family and friends, finding the social network tools a great way to keep everyone informed of my progress and share my work. After each term, I posted the grades for my classes and a credit countdown. In turn, friends and family gave me the encouragement I needed to keep going when things got tough.
In addition, I talked to my boss and co-workers about what I was doing and learning throughout the journey. My employer was incredibly supportive and allowed me to use what I learned in the work environment, helping me to synthesize the knowledge.
I also made extensive use of the University support system, including the librarian, professors, the administrative staff, and my academic advisor. Colorado State’s staff was excellent, insofar as they appeared to care as much about my success as I did.
Finally, I had an excellent mentor. Tom Tonkin, a friend and colleague of mine was pursuing his doctorate while I was working on my undergraduate degree. I was able to bounce ideas off of him, run my rough drafts by him, get guidance on research, or simply vent. His support and guidance was invaluable.
Building a viable support system was likely the most important step I took, and there is little doubt in my mind that they were critical to my success.
Staying organized is another critically important practice that includes planning for success, time management, understanding expectations, and keeping your research, citations, and academic work managed and accessible for future assignments. Staying organized assures that you understand what needs to happen, and build the infrastructure and tools that support your academic efforts.
The first step in getting organized is to work with your academic advisors to build a realistic degree plan, that takes into account all of your obligations and responsibilities. Of course, the plan is simply that, a plan. As such, you should be comfortable adjusting it to changing life circumstances.
Second, I recommend using calendar tools to build a schedule that includes assignments, writing time, and research time. Pad the schedule with extra time.
Third, go through the ALL of the course material before starting, paying particular attention to the syllabus, rubrics, and the grading scheme. The grading scheme will tell you a lot about where to spend your time and energy.
Finally, keep your work organized, including research, citations, and all of your academic work. I use End Note, a software package made by Thompson Reuters to managing citations and research. I organize the End Note library by class and then citation. I also make sure every citation includes a hyperlink to the material where possible. This way I can always come back to it. In addition, I post all assignments on my blog. This is important because it makes it easy to cite myself (which you need to do to avoid plagiarism); thus, I am able to build on my earlier ideas in future work. Finally, I save all of the original assignment documents in a local folder structure.
Intellectual curiosity and engagement
The most important advice I can give is to engage seriously. It starts with an intellectual curiosity. I try to provoke my curiosity by suspending my natural attitude—the ideas we take for granted—to look upon a subject with fresh eyes. In addition, I always go to original sources rather than simply using the text. The texts are typically great summaries, but the original material is much richer. Finally, I try to be provocative—not for provocations sake—to engage in positions that I may not normally take or that nobody would take, to explore other positions in the spirit of intellectual inquiry. Unpopular positions make for great debate, the soul of interaction. It isn’t about beliefs, rather the point is to learn and grow.
In summary, I attribute my undergraduate success to more than just hard work. Hard work is necessary, but not sufficient condition. Graduating with a 4.0GPA also requires a great support system, great organization, and a genuine curiosity for how people and things work.
The WordPress.com stats helper monkeys prepared a 2012 annual report for this blog.
Here’s an excerpt:
600 people reached the top of Mt. Everest in 2012. This blog got about 2,700 views in 2012. If every person who reached the top of Mt. Everest viewed this blog, it would have taken 5 years to get that many views.
Since 2001, Improv Everywhere, a prank collective based in New York, have pranked their way into the media spotlight, by riding the subway without pants, hacking the public’s reality with clandestine performances in the streets, parks, and subways of the city, and flash mobbing public and commercial spaces (Improv Everywhere, 2012g). The comedy troupe’s missions grew popular on You Tube, but have increasingly become a staple of New York culture and the mainstream media. Indeed, the troupe’s pranks occupy a unique place in New York culture, owing to how their pranks challenge popular conceptions of the use of public space and consumerism at large using culture jamming techniques (Rodriguez, 2010). In this paper, the author traces the evolution of Improv Everywhere, from a small group of pranksters to a media phenomenon, to examine how media technology influences the creation of counter-cultural media products that are ultimately co-opted by the economic logic of commercialism. The author’s analysis will proceed in four parts. Part I will provide an overview of Improv Everywhere and their missions, and provide a detailed analysis of the Best Buy Uniform prank. Part II describes how the Best Buy Uniform prank demonstrates culture-jamming techniques that challenge the dominant ideology of consumerism through alternative conceptions of the public’s use of time and space. Part III analyzes the influence of media technology and economic processes in the evolution and rise of Improv Everywhere. Finally, in Part IV the author provides a critical analysis of Improv Everywhere’s success and argues that the comedy troupe has evolved into a paragon of the very ideology they criticize, yet remains an important social phenomenon, offering an opposing voice in contrast to the allure of consumerism.
Part I: Improv Everywhere and the Best Buy Mission
According to Improv Everywhere (2012b), their mission is to cause scenes of chaos and joy for the entertainment of participants and audiences. Indeed, the collective has staged more than one hundred missions since 2001 that have been viewed on You Tube nearly 250 million times (Improv Everywhere, 2012e). Agents, the term for participants that are in on the prank, perform each mission, in front of an unsuspecting public audience, typically in a public or commercial space, like parks, subways, streets, and stores in New York City. The number of agents can range from several to several thousand depending upon the prank. In addition, some pranks, like the No Pants Subway Rides, are replicated in dozens of cities around the world. While each prank is unique in terms of setting, participants, and approach, this author as identified several commonalities. First, the group conducts the pranks in public space, conceiving of public or commercial space as a venue for performance and play. Second, the performers include agents aware of the pranks, and an unsuspecting public. Third, agents record the mission with numerous digital video cameras from a variety of vantage points, and distribute the video to the audience on You Tube. Moreover, there appears to be three distinct styles of mission, including a) flash mobs, b) clandestine performances by agents, and c) audience performances where the audience members are the actors. Of the missions conducted between 2006 and 2012, more than fifty-four percent were flash mobs, forty-one percent were clandestine performances, and a mere five percent were crowd performances (Rock, 2012). Given the majority of missions use flash mobs, this author chose a flash mob mission for detailed analysis.
The media text for the Best Buy Uniform prank on Improv Everywhere’s website, includes a produced video, a text narrative, and agent reports (Improv Everywhere, 2012a). Simply stated, the mission was to organize a flash mob of eighty agents dressed in an approximation of the uniform worn by Best Buy employees, and have them descend upon a Best Buy store in Manhattan, while four agents not in uniform captured the scene on digital video (Improv Everywhere, 2012a). The agents were instructed to enter the store one or two at a time, disperse into different sections, and face away from store merchandise (Improv Everywhere, 2012a). In addition, the organizers instructed agents to be helpful when approached by customers, and to state they were waiting for a friend and disavow knowledge of the other agents when confronted by store employees (Improv Everywhere, 2012a). The video footage begins by showing the agents entering Best Buy, loitering in different store locations, and even straightening up disorganized merchandise (Improv Everywhere, 2012a). However, the footage quickly shifted to the reaction from store employees. While some employees appeared bemused by the spectacle, others were clearly alarmed. In particular, store security and managers, in black and yellow shirts respectively, were concerned that the flash mob represented a sophisticated heist of some sort, and called 911 (Improv Everywhere, 2012a). The next scene captures the arrival of the irritated policemen as they tell store managers that they cannot arrest people for wearing khakis and blue shorts, and that the only thing the store can do is ask them to leave (Improv Everywhere, 2012a). Finally, the video shows the agents leaving the premises.
It is worth noting, that the music accompanying the video sounds like the MIDI-style sounds from video games of earlier decades, giving the video a sense of playfulness that was clearly not universally shared during the experience (Improv Everywhere, 2012a). It appears the music selection is oriented to highlight the playfulness of the scene, rather than the tension. Indeed, emphasizing play is a notable tactic of culture jammers.
Part II: Culture Jamming at Best Buy
According to Dery (2010), cultural jamming was first introduced to the public in 1984 by the band Negativland, notable for their criticism of media, politics, and society. Jamming, originates from the illegal practice of interfering with the transmission of citizen band radios, whereas “culture jamming, by extension, is artistic ‘terrorism’ directed against the information society in which we live” (Dery, 1990, p. 1), an information society dominated by consumer ideology and brand images. Moreover, Harold (2004) suggests culture jamming “usually implies an interruption, a sabotage, hoax, prank, banditry, or blockage of what are seen as the monolithic power structures governing cultural life” (p. 192). For certain, as the Best Buy Uniform prank demonstrates, Improv Everywhere used the prank to interrupt or block the routine employee and consumer behavior at Best Buy. Moreover, the video recording of the prank is itself, a critique of the power structures governing consumerism, demonstrating how the police and commercial interests work in concert when social norms of consumer behavior are broken. Accordingly, Improv Everywhere agents demonstrate a sophisticated understanding of culture jamming tactics, given they were able to accomplish their mission without repercussion. What specific tactics did Improv Everywhere use during the prank to navigate the boundaries between critique and protest?
Some scholars and observers of culture jammers suggest their ideas and tactics have origins in the French Situationist movement of the 1960s (Dery, 1990; Goldstein, 2003; Harold, 2007). The Situationist movement built upon critical culture theory, concerning itself with how cultural products were commoditized, providing “illusory notions of our place in the world, often resulting in the obscuration of the real structure of society and our subordination in it” (McQuail, 2010). In short, the Situationist movement decried the Spectacle, the subjugation of social life to mediated consumerism, where “the commodity has attained the total occupation of social life [where] the relation to the commodity is not only visible, but one no longer sees anything but it” (Debord, 1994, p. para. 42). Of importance to the discussion of Improv Everywhere’s culture jamming techniques, is their similarity to the two tactics used by Situationists to bring about a postmodern world, détournement, and dérive.
Détournement is the French word for rerouting, diversion, or hijacking (Wiktionary, 2012). Debord described détournement as the language of anti-ideology and used it to describe the technique of rerouting expressions of capitalist media culture to subvert their meaning, and thus reclaim them (Harold, 2007). According to Harold (2007), examples of the détournement technique include:
Rewording conversations between popular comic-strip characters, reworking the sign on a storefront, making subversive collages out of familiar advertising images, and ‘hijacking’ a public sermon, where a Situationist dressed as a priest declares that ‘God is dead’. (p. 8)
Of course, there is a distinct similarity between Harold’s examples of détournement and the Best Buy prank, given Improv Everywhere agents dressed as Best Buy employees and faced away from the merchandise in a subtle alteration of typical norms associated with consumerism.
The second tactic of Situationists was dérive, a behavior where one or more persons would stop work or leisure activity and drift through urban terrains in search of experiences afforded by the city (Harold, 2007). In addition, Lasn (2000) suggests “the Situationists believed the dérive could largely replace the old twin occupations of work and entertainment, and become a model for the ‘playful creation’ of a new way of life” (p. 103). In this sense, the dérive was a rejection of capitalist and consumerist notions of work and entertainment, offering an alternative for the creation of happiness. Again, there are similarities between the Situationists’ use of dérive and the techniques employed by Improv Everywhere. As noted earlier, nearly every one of the group’s mission conceive public space as a place of performance and play, rather than consumption. Indeed, spontaneous musicals erupt in grocery stores and malls, subways are transformed into art galleries and theatres, and the streets, parks, and stores of Manhattan become places for flash mobs to experiment and play (Improv Everywhere, 2012g). Moreover, all of these diversions occur without participants exchanging money for happiness.
It is clear that Improv Everywhere uses the techniques of détournement and dérive in their pranks. Moreover, culture jammers typically use these tools to help people question the assumed, but not discussed, norms, roles, and constraints of consumerist ideology. For instance, is it safe for this author to go into a Best Buy with khaki pants and blue shirt? On the other hand, can this author go into a store, face away from the merchandise, and not buy anything?
It is important to note that Improv Everywhere makes no claim to be part of a counter-culture or social movement of any kind, rather they distance themselves from such notions (Improv Everywhere, 2012b). Nor does the comedy group link their pranks to the Situationist movement. Indeed, according to Improv Everywhere founder Charlie Todd, “There is no point and…there doesn’t have to be a point. We don’t need a reason. As long as it’s fun” (TedxBloomington, 2011). However, their emphasis on joy, happiness, and fun belie their sophisticated use of détournement, and derive. Indeed, it is difficult to ascertain whether the group is operating meta-prank intended to further subvert consumerism through greater media popularity, or whether they are simply out to have fun. Perhaps a third option is an economic motive.
Part III: Media Technology and Production Economics of Improv Everywhere
Charlie Todd founded Improv Everywhere in 2001 after he and a friend pretended he was Ben Folds, of the Ben Folds Five musical group at a Manhattan bar (Plummer, 2011). Beginning with that first mission, this author catalogued the collective’s rise and evolution based on information available on the Internet. In addition, this author analyzed each mission, tracing the collective’s evolution from obscure beginnings characterized by simple pranks, to a media darling using increasingly inventive and unique pranks. The analysis is useful to identify major inflection points, and begin to infer how the group operates, produces, distributes, and generates revenue from their pranks.
To identify major inflection points and trends in the group’s evolution, this author created a chronological sequence of events in Figure 2 in the appendix, that includes substantive changes in prank techniques, production and distribution changes, media appearances, notable pranks, and commercial ventures. The first major inflection point occurred in 2003 with the introduction of the first flash mob for the No Pants Subway Ride 2K3, where a team of 40 agents rode the subway in their underwear. The next inflection point occurs when the media begins to focus on the group, beginning in 2004. By 2006, Improv Everywhere began posting videos of their missions on You Tube, and by 2008, the Frozen Grand Central mission had gone viral with more than thirty-one million views. The period between 2007 and 2012 demonstrated increased commercialization with joint ventures and corporate sponsorship of the MP3 experiment project. Furthermore, increased national media coverage is coincident with greater commercial success. In addition, it appears that the use of flash mobs, coupled with the use of You Tube as a distribution channel, caused many of the pranks to go viral, which in turn, caused the national media to take notice. Indeed, according to Juno, Vale, and Ballard (1987):
The media can never deny coverage to a good spectacle. No matter how ridiculous, absurd, insane or illogical something is, if it achieves a certain identity as a spectacle, the media has to deal with it. They have no choice. They’re hamstrung by their own needs. (p. 14)
While the rise in commercialization of Improv Everywhere appears to go hand-in-hand with the growing media spectacle, there is little evidence to suggest the group’s goals turned exclusively commercial. In fact, the group draws a distinction between Improv Everywhere projects and commercial efforts, however the members are open to appearances, conference bookings, media consulting, and other ventures (Improv Everywhere, 2012b). Despite the lack of public information on the group’s finances, it is possible to infer the major elements of the business model using publicly available information. This author built a process model showing the production, distribution, and monetization of Improv Everywhere content outline in Figure 1 below:
Process model of the production, distribution, and monetization of Improv Everywhere content.
Figure 1. Business process model for the production, distribution, and monetization of Improv Everywhere content.
Production and Distribution
As Figure 2 outlines, Improv Everywhere conceives, produces, and organizes each mission, although it should be noted that ideas for missions are occasionally crowd sourced. During the organization of the mission, Improv Everywhere recruits agents to participate. Agent recruitment is enabled by electronic communication. Agents record the mission using digital video and still cameras, where both agents and an unsuspecting public are the subject of the work. In fact, this author’s analysis of the missions, show that in more than twenty percent of missions, authority figures are the subject.
Improv Everywhere edit and post the video to You Tube, after the mission is completed. In addition, the video, a mission overview, digital photographs, and agent notes are distributed on the group’s website (Improv Everywhere, 2012g). It appears that You Tube is the primary distribution vehicle for Improv Everywhere content, although the group also has a Facebook page and Twitter account that are used to connect and update audiences (O’Neill, 2010). In fact, Improv Everywhere has almost one million subscribers on You Tube, while only two-hundred and eighty thousand Facebook likes, and thirty thousand Twitter followers, demonstrating the importance of You Tube to the group success (Improv Everywhere, 2012c, 2012d, 2012e). Founder, Charlie Todd acknowledged the importance of You Tube during an interview (O’Neill, 2010):
YouTube has been incredible for us– it’s enabled us to reach an international audience of millions. YouTube has enabled us to communicate directly with our audience without the need of a television network. If we had been doing these projects in the 1990s our only option for exposure would have been the greenlight from an executive at somewhere like MTV or Comedy Central. (p. 1)
Indeed, without the availability of digital recording and production technology, or distribution channels like You Tube, it appears unlikely that Improv Everywhere would have become so popular. In fact, their entire business model is predicated upon the use of social media.
While there is no public data on the group’s finances, their revenue sources are apparent to a casual observer. First, each audience click of the You Tube video triggers an advertisement, and You Tube shows additional advertisements while the video plays. In fact, one of the commercials that aired frequently during the author’s analysis was a Trident commercial that mimicked Improv Everywhere, showing riders in subway car spontaneously bursting into song. In addition, the group sells merchandise, books, and DVDs on their website (Improv Everywhere, 2012f), and solicits public appearances, event engagements, and corporate sponsorship for missions (Improv Everywhere, 2012b). Furthermore, the group raised more than $125,000 to develop a documentary film scheduled to be released in June 2013 (Matt & Andrew, 2012). On the surface, the group appears to operate as a marketing collective that benefits the top tier of performers, although it is unclear whether the producers share the proceeds with the agents. Of course, the business model leads to an important ethical question related to the use or abuse of free labor. To what extent is Improv Everywhere harnessing the free labor of others for private profit? According to Croteau, Hoynes, and Milan (2012), business models dependent on the free labor of individuals “undermine the integrity of the individual by emphasizing a ‘hive’ mentality in which independent thought and achievement is neglected and undervalued in favor of the faceless—and easily replaceable—micro-contributions of many” (p. 314). In truth, agents are easily replaceable with virtually anyone, as is the unsuspecting crowd that is the primary subject of the mission videos. It is doubtful that Improv Everywhere shares profits with the agents, and nigh impossible for them to share profits with the subjects of the videos.
In short, Improv Everywhere is dependent upon media technology for the production, distribution, and monetizing of their work. In addition, like most media concerns, the group generates revenue by selling their audience to advertisers, in addition to selling their media products directly to audiences. Moreover, the group has a symbiotic relationship with the mainstream media, providing them with a spectacle in exchange for coverage that creates awareness for their content, which in turn creates revenues. Of course, the ethics of Improv Everywhere’s business model are concerning, insofar as the producers of the content appear to accrue the majority of the benefit, even though the content requires the labor of the crowd. However, in the use of the crowd, the group’s business model is little different from most modern media concerns.
Part IV: Critical Analysis
There is little question that Improv Everywhere’s missions have tremendous popular appeal. The group created a media spectacle with more than 250 million views on You Tube, replicated around the world, and commercialized by traditional media outlets. In addition, the group has enjoyed considerable commercial success with their media products, generating revenue from a variety of sources, including media products, merchandise, and advertising. Of course, there is one critical question that remains unanswered; what are the intentions of the group? Are the members of the group ideologues seeking to lift the veil of consumer ideology, using Situationist techniques, to help the public glimpse the possibility of a life beyond the false consciousness of consumerism? Is the group simply using the tools of culture jammers to create commercial success? Alternatively, should the public take the group at face value, assuming the group is intent on making the public happy by creating scenes of joy and chaos?
The first proposition argues that the group is operating in the tradition of Situationists, seeking to show the public a glimpse of the possibilities of a postmodern era not dominated by consumerism, where happiness is a function of play rather than consumption. Certainly, the group appears to use Situationist techniques, but differs from Situationists and even other culture jammers like Adbusters, insofar as they have not made public any desire for social change. In fact, the group largely disavows such notions, instead opting to emphasize play. On the other hand, is there a possibility that the entire public view of the group is a meta-prank, designed to use their growing popularity to expose consumer ideology to the largest possible audience. While there is no evidence to suggest this is the case, the idea is consistent with Situationist thought. According to Harold (2007), the Situationists were ever concerned with the Spectacle’s sophisticated ability to appropriate the rhetoric of revolution and repackage it for consumers as image. Indeed, Harold (2007) criticized détournement precisely because the use of consumerist conventions also confirms those same conventions.
Is this the reason that Improv Everywhere never includes a reveal moment in their missions, instead opting to let the audience wonder at the experience, in effect, continuing the prank indefinitely, and resisting the appropriation of its form? Might the larger prank simply be the purposeful withholding of Situationist-like aims? Alternatively, is Improv Everywhere’s use of Situationist techniques a demonstration of the worst fear of Situationist thought, that their rhetoric was appropriated for consumer ends? In absence of a reveal moment, the public may never know. However, this author believes that the commercial logic of Improv Everywhere’s business model is an alluring motive.
Of course, the domination of commercial logic in the public sphere makes economic motives perhaps the easiest to understand. It is clear that Improv Everywhere is generating revenue, although the amount of revenue and its distribution are not clear. Furthermore, irrespective of the amount of revenue generated, the business model socializes labor costs, while privatizing profits. While companies the world over have similar business models, most do not have the dilemma of filming an unsuspecting public as they grapple with the fear and uncertainty of mob behavior. Indeed, despite the joy created by Improv Everywhere’s missions, they each carry a darker side, insofar as their missions use the public’s emotions as the fodder that feeds their business model. In addition to ethical concerns, equally, this author has moral concerns. To what extent is it moral to appropriate détournement and dérive for purely commercial concerns given their origin?
If the public takes the group at face value, meaning commercial success is not the primary motive, rather the group chooses to create spectacles of chaos and joy for the public good, moral, and ethical questions remain, because the pranks have been commercialized. Therefore, irrespective of the group’s motives, the simple fact remains that their pranks have been co-opted by commercial logic. As such, the group has become a paragon of the very consumerist ideology criticized in their missions.
However, when all arguments are considered, and the group is viewed in equal parts as cultural critics, merry pranksters, and a commercial success, perhaps that is enough. Perhaps it is enough to critique the system from within the system, while allowing commercial success to fund the ongoing critique. Perhaps, when viewed through the lens of an ongoing contrast between the Spectacle and the joy of dérive, the movement remains a viable alternative to consumerism in the public’s consciousness, avoiding the fate of earlier revolutions, simply by remaining present as an oppositional force.
Retracing the journey presented in this paper, the author has detailed how Improv Everywhere has captured the public eye with pranks that are a relevant counterforce to consumerism. Indeed, using Situationist techniques, Improv Everywhere helps the public find joy and happiness outside of the twin occupation of work and leisure. In addition, without digital media technology, and the socioeconomic structures of the media industry, it is highly unlikely that Improv Everywhere would have the reach and durability they enjoy today. Despite being co-opted by commercial logic, Improv Everywhere remains an important social phenomenon, offering an opposing voice in contrast to the allure of consumerism.
Croteau, D., Hoynes, W., & Milan, S. (2012). Media/society : Industries, images, and audiences (4th ed.). Thousand Oaks, CA: SAGE.
Debord, G. (1994). The society of the spectacle. New York: Zone Books.
Dery, M. (1990). The Merry Pranksters And the Art of the Hoax. Arts. Retrieved from http://www.nytimes.com/1990/12/23/arts/the-merry-pranksters-and-the-art-of-the-hoax.html
Dery, M. (2010). Culture Jamming: Hacking, Slashing, and Sniping in the Empire of Signs. Retrieved from http://markdery.com/?page_id=154
Goldstein, L. (2003). The mob rules. Time, 176.
Harold, C. (2004). Pranking Rhetoric: “Culture Jamming” as Media Activism. Critical Studies in Media Communication, 21(3), 189-211.
Harold, C. (2007). OurSpace : resisting the corporate control of culture. Minneapolis: University of Minnesota Press.
Improv Everywhere. (2012a). Best Buy | Improve Everywhere. Retrieved from http://improveverywhere.com/2006/04/23/best-buy/
Improv Everywhere. (2012b). FAQ | Improve Everywhere. Retrieved from http://improveverywhere.com/faq/
Improv Everywhere. (2012c). Improv Everywhere. Retrieved from http://www.facebook.com/improv.everywhere
Improv Everywhere. (2012d). Improv Everywhere (ImprovEvery) on Twitter. Retrieved from https://twitter.com/ImprovEvery
Improv Everywhere. (2012e). Improv Everywhere | You Tube. Retrieved from http://www.youtube.com/user/ImprovEverywhere?feature=g-all-u
Improv Everywhere. (2012f). Merch | Improve Everywhere. Retrieved from http://improveverywhere.com/merch/
Improv Everywhere. (2012g). Missions | Improve Everywhere. Retrieved from http://improveverywhere.com/missions/
Juno, A., Vale, V., & Ballard, J. G. (1987). Pranks! San Francisco, CA: Re/Search Publications.
Lasn, K. (2000). Culture jam: The uncooling of America. New York: Quill.
Matt & Andrew. (2012). Improv Everywhere Film. Retrieved from http://www.kickstarter.com/projects/improveverywherefilm/improv-everywhere-film?ref=live
McQuail, D. (2010). Mcquail’s mass communication theory (6th ed.). London; Thousand Oaks, CA: Sage Publications.
O’Neill, M. (2010). Interview: Prankster Charlie Todd on YouTube & The Success Of Improv Everywhere. Retrieved from http://socialtimes.com/interview-prankster-charlie-todd-on-youtube-the-success-of-improv-everywhere_b18037
Plummer, W. (2011). Charlie Todd of Improv Everywhere Tells Us About His Latest Experiment, Favorite Pranks, and Future Plans. Retrieved from http://blogs.villagevoice.com/runninscared/2011/07/charlie_todd_improv_everywhere.php
Rock, R. (2012). Improv Everywhere Analysis. Retrieved https://docs.google.com/open?id=0B5nQSd5ycZwGOTFzQWpmVm9KLUE
Rodriguez, A. (2010). Performing in the public sphere: Flash mobs and their participants. University of North Texas, Denton Texas. Retrieved from http://web3.unt.edu/honors/eaglefeather/wp-content/2010/08/Rodriguez-Atilano-081210-SE.pdf
TedxBloomington (Producer). (2011). Charlie Todd: The shared experience of absurdity. Retrieved from http://www.ted.com/talks/charlie_todd_the_shared_experience_of_absurdity.html
Wiktionary. (2012). détournement – Wiktionary. Retrieved from http://en.wiktionary.org/wiki/d%C3%A9tournement
The evolution of Improve Everywhere between 2001 and 2012.
Figure 2. This figure charts the substantive events that characterize the evolution of Improv Everywhere between 2001 and 2012, including changes in approach, notable pranks, media coverage, and commercialization.
The information technology market is undergoing a major shift towards cloud computing. While cloud computing only represents 2.8% of the $3.6 trillion information technology market today, analysts expect it to more than double over the next two years (Cantu, 2011). Moreover, the economics of the cloud are so compelling this author thinks that all compute services will be delivered via the cloud in the decades to come. Given the clear shift to the cloud, it is worthwhile to explore what cloud computing is, how it works, and potential implications of the cloud for Internet consumers and producers of content. However, an overarching analysis of the cloud is overly ambitious given the size and scope of the market, therefore, this author will analyze the cloud using the narrow confines of a case study on Facebook, the largest social Internet application in the world. Therefore, this author compared Facebook to the cloud market in general, and specifically explored the implications of content usage, labor, and privacy in a cloud application, like Facebook. This author found that Facebook has remarkably similar issues with cloud vendors, and profits from user-generated data while providing only limited privacy protections, in exchange for the use value of the application.
What is Cloud Computing?
Cloud computing is the result of advances in information technology over the last forty years, and specifically is the result of the Internet architecture. Whereas, in the era before the network, computing power was largely in the hands of government and large corporations, the coincident revolutions of personal computers and private networks, led to a client server architecture, where application processing occurred on a client computer, and data was stored on a network server. With the development of the Internet, a global computing network, came the possibility of a new architecture, where every layer of the architecture is centralized, including the application logic, and the network end-points are simply dumb terminals in essence. While this description is necessarily an oversimplification, it is generally correct.
As the Internet architecture has matured, increasingly corporations are seeking ways to improve efficiency and reduce the costs of doing business over the network. Indeed, cost and efficiency gains have led to the advancements necessary to make cloud computing possible. Important advancements in the shift to cloud computing include autonomic computing, service-oriented architecture, web services, virtualization, and grid computing (Cantu, 2011). These technologies allow technology professionals to deliver each compute layer as a service, including storage, database, middleware, and applications. Moreover, as the cloud market has matured, so has the definition. The National Institute of Standards and Technology (2011) recently released the final draft of the cloud computing definition, conceived of as:
A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. (p. 1)
In the strictest sense, an application like Facebook cannot be conceived of as cloud computing, because the application is not provisioned for different entities, rather it is simply an application that is available for end users. While admittedly, the distinction is minor, it remains important. However, Facebook is similar enough to a cloud application to warrant further analysis. Specifically, the application logic, the infrastructure, user credentials, user information, user-generated content, and user relationship data are centralized behind Facebook’s corporate firewall. This architecture gives rise to a number of important questions for both cloud applications and Internet applications. For instance, what are the implications for user generated content? Whose data is it? Who profits from the data? Who is both responsible and liable for data protection and privacy? It is these questions that this author will attempt to address in the rest of the paper.
Whose Data Is It?
When a user registers for a Facebook account, the user is required to load their name, email address, birthday, and gender (Facebook, 2012a). No other information is required. However, the application is of limited value without providing additional data. Typically, users will add personally identifiable information, relationship data, preference data, status updates, location data, photos, and videos to make the application valuable. Legally, each user is the owner of their data in the application, however the matter is complicated by the social nature of the application (Facebook, 2012b). For example, if one user posts a photo of another user, the data is owned by the user that posted the photo, an important implication for those concerned about privacy (Facebook, 2012a). Moreover, through the terms of agreement between Facebook and a user, users assign Facebook a “non-exclusive, transferable, sub-licensable, royalty-free, worldwide license to use any IP content [posted] on or in connection with Facebook” (Facebook, 2012b, p. 1). Therefore, while users own the data, Facebook has the right to profit from it.
Of course, the problem with storing user data in Facebook is that like most cloud applications, the application is analogous to a roach motel, it is easy to check data in, but much tougher to check it out. While Facebook provides a number of application programming interfaces to retrieve data (Facebook, 2012c), it requires technical expertise to access the data through anything but the native Facebook application interface. Therefore, outside the confines of Facebook, the data is of limited use. Moreover, the limitations of the application interface make it difficult for non-technical users to substantially transform the data to produce new works. In effect, the structure serves to constrain people from profiting from their data.
Who Profits from User Data on Facebook?
As made clear in the previous section, while users own their data, Facebook has both the right and the architecture to assure that they are in a position to profit from user data. In fact, the data only has value when considered in the aggregate. For example, few would care to pay this author for knowing of a recent ski vacation. However, a skiing manufacturer might pay a considerable sum to target active adult skiers across the country with targeted advertising for a new line of high performance skis. Thus, Facebook profits from the free labor of 800 million users. Indeed, with Facebook’s recent initial public offering, their finances came under intense scrutiny from the investment community. In 2011, Facebook generated more than $3.7 billion in revenue, 82% of which came from advertising (Boorstin, 2012). With more than 500 million monthly active users, and 125 billion friend connections, Facebook provides advertisers a platform with reach, relevance, and most importantly, a social context for product recommendations (Boorstin, 2012). For example, if this author creates a post highlighting the purchase of a set of high-performance skis, the ski manufacturer might send targeted advertising to other skiers in the author’s network.
Croteau, Hoynes, and Milan (2012) point out that firms like Facebook “harvest and harness the free labor of others to generate profits for themselves” (p. 314). However, that perspective includes only one side of the transaction. Facebook simply enables a transaction to occur, where users providing content receive a use value, while Facebook creates exchange value from the commodification of users. In this sense, Facebook is simply following the business model of traditional mass media who provided television content for consumers, in exchange for commodification of consumers into an audience to bring in advertising revenue; new media indeed. Therefore, in the case of Facebook, is there really exploitation of free labor? Or are Facebook users receiving value from the use of the application? This author thinks it is the latter. In what other way can people stay connected and share their lives with friends and family as efficiently as on Facebook? Therein lies Facebook’s use value for users. While the exchange relationship between Facebook users, the company, and advertisers captures the essence of the business model, the business model itself raises significant concerns over the security and privacy of the data that fuels Facebook’s revenue.
Technology companies like Facebook have an amazing business model. The company has figured out how to generate immense revenues from the data that people provide about themselves, their friends, and their family, in exchange for a more efficient way to keep in touch. By locking the user data into the Facebook application, Facebook assures that the data is only useful to Facebook. Moreover, given the legal terms associated with use of the application, users readily grant Facebook the license to profit from the invasion of their privacy. Future research should explore whether the development of open standards for social relationship data portability could spur the company to provide greater privacy protection based on the threat of customer churn, in much the same way that cell phone number portability enabled greater choice and competition in the wireless industry.
Boorstin, J. (2012). Inside Facebook’s money machine. Techbiz. Retrieved from http://money.msn.com/technology-investment/post.aspx?post=869a1b6c-0bb7-47b3-ac0a-25d10f6a5404
Cantu, A. (2011). The History and Future of Cloud Computing. Retrieved from http://www.forbes.com/sites/dell/2011/12/20/the-history-and-future-of-cloud-computing/2/
Croteau, D., Hoynes, W., & Milan, S. (2012). Media/society : Industries, images, and audiences (4th ed.). Thousand Oaks, CA: SAGE.
Electronic Privacy Information Center. (2012). Facebook Privacy. Retreived from http://epic.org/privacy/facebook/
Facebook. (2012a). Data Use Policy. Retrieved from http://www.facebook.com/about/privacy/your-info
Facebook. (2012b). Facebook Terms. Retrieved from http://www.facebook.com/legal/terms
Facebook. (2012c). Graph API – Facebook Developers. Retrieved from http://developers.facebook.com/docs/reference/api/
National Institute of Standards and Technology. (2011). Final Version of NIST Cloud Computing Definition Published. Retrieved from http://www.nist.gov/itl/csd/cloud-102511.cfm
Presentation on the use of Emotional Intelligence instruments for leadership development.
In the last decade, and coincident with the advent of broadband Internet technology, Internet regulation has been the subject of intense public debate over network neutrality, a legislative concept designed to provide Internet consumer/producers the right to open and non-discriminatory access to the network. At the heart of the debate is the determination of whether the Internet constitutes a commons, and if so, whether the commons needs to be regulated to protect equal and anti-discriminatory access in what is now, a largely privatized network. Of course, the Internet is not the first privatized network that engendered the commons debate. Arguably, while the Internet is a unique infrastructure in many respects, it also has significant similarities to earlier networks, such as roads, railroads, the telegraph, telephone networks, radio networks, and television networks (Blondheim, 2004). Indeed, many of these networks created positive network externalities that constituted public goods, and as such were considered commons subjected to common carriage law, a form of regulating the network infrastructure to protect the public good. Therefore, examining the Internet network neutrality debate through the lens of common carriage, while not new, is useful insofar as it centers the discussion on the firm foundation of historical precedent, and captures the essence of what is at stake. As such, this paper will cover a brief historical background of common carriage, describe the application of common carriage principles in the early Internet, compare and contrast proposed network neutrality legislation with common carriage principles, and conclude with a considered recommendation advocating for network neutrality legislation.
Common Carriage Background
Common carriage is a legal principle that intends “to guarantee that no customer seeking service upon reasonable demand, willing and able to pay the established price, however set, would be denied lawful use of the service or would otherwise be discriminated against (Noam, 1994, p. 436). The origins of common carriage law predate English law and whose precursors “go back to the Roman Empire and the legal obligations of shipowners, innkeepers and stable keepers” (Noam, 1994, p. 437). English common law supports the notion of common carriage, beginning with the 1701 case, Lane versus Cotton, in which Justice Holt asserted “that one in the public employment can not refuse the duty incumbent upon him and that there would thus be causes of action for a postmaster refusing a letter, inn keeper refusing a guest or blacksmith refusing to shoe a horse” (Moglen, 2009, p. 1). As such, common carriage’s core principal is that of anti-discrimination.
Common carriage was applied in the United States initially as common law, most notably to regulate the activity of the railroads, in absence of specific congressional legislation governing interstate commerce (“Western Union Telegraph Co. v. Call Pub. Co.,” 1901). In addition, common carriage was applied to the first U.S. telecommunications infrastructure, the telegraph network, as a result of discriminatory behavior by Western Union (“Western Union Telegraph Co. v. Call Pub. Co.,” 1901). Western Union’s discriminatory practices extended far beyond choosing winners and losers in the open market; the company went so far as to practice censorship by choosing political sides and only offering the perspectives of candidates whose policies favored Western Union (Rock, 2012; Wu, 2006a). As a result of this and other corporate abuses of monopoly power over the telecommunications network, common carriage over telecommunications was codified into law with Title II of the 1934 Communications Act (Noam, 1994). Since then, regulated telephone companies have been generally referred to as ‘common carriers’ and as such, have the obligation to provide non-discriminatory access to telephone service across the nation, and in exchange are not held liable for the content of traffic across the network.
The Internet and Common Carriage
To say that the Internet was created as a result of the common carriage principle of non-discrimination is not an overstatement. There was a time, prior to the 1980s, when consumers had to purchase their telephones from a Bell company and were not allowed to attach any other device to their phone line (Wu, 2006b). However, a series of court decisions, including the Hush-A-Phone and Carterfone decisions, led to the FCC to enact “a strong non-discrimination rule for consumer network equipment, and even blocked the regional Bell operating companies from offering such equipment” (Wu, 2006b, p. 33). The rule sparked a new wave of commercial innovations that saw the development of fax machines and modems, antecedents of modern networking.
Moreover, principles of non-discrimination were built into the very architecture of the Internet. According to Lessig and Lemley (2001), the design of both the Internet and it’s predecessor ARPANET were based on the end-to-end design principle which organizes the placement of intelligence at the ends, while making the communications protocols simple. “One consequence of this design is a principle of non-discrimination among applications” (Lessig & Lemley, 2001, p. 927). In essence, the network is a highly sophisticated set of dumb pipes, in the sense that any network or device can interconnect to the Internet by following the basic communication protocols. Of course, the last thing that cable and DSL providers want to be are ‘dumb pipes’ and therefore, many use a variety of strategies, including discrimination, to avoid becoming a commodity (Knowledge@Wharton, 2009). Indeed, there is little to prevent broadband providers from using their monopoly power over the network to introduce discriminatory behaviors that favor their commercial interests.
The Internet and Net Neutrality
The advent of the Internet has ushered in new era of debate over non-discrimination on the network, partly because with the Telecommunications Act of 1996, the FCC designated cable and DSL as ‘information services’, rather than telecommunications (United States. Congress., 1996), and as such, they are not designated as common carriers. Moreover, freed from constraint, telecommunications providers have used their network power to discriminate against perceived threats. For example, Telus Corporation blocked subscriber access to a Union website critical of their labor practices (CBC News, 2005). In addition, Madison River Communications, a DSL provider, blocked subscriber access to Vonage, a company with voice-over-IP technology that allows subscribers to place calls over the Internet, rather than paying for traditional phone service (Sandvig, 2007). Finally, Comcast Corporation intentionally blocked subscriber access to Bit Torrent, a popular peer-to-peer file sharing protocol (Weiser, 2009). Nor is the discrimination likely to end any time soon.
For example, former AT&T Chairman and CEO Whitacre (BusinessWeek, 2005) described the motivation for AT&T to discriminate against Internet upstarts like Google, Vonage, and MSN, noting:
Now what they would like to do is use my pipes free, but I ain’t going to let them do that because we have spent this capital and we have to have a return on it. So there’s going to have to be some mechanism for these people who use these pipes to pay for the portion they’re using. Why should they be allowed to use my pipes? (p. 1)
It is not surprising, that when freed from the constraint of common carrier classification, broadband providers use discriminatory practices to create and sustain competitive advantage; it is in their nature to do so.
However, the Federal Communications Commission (2010) recently passed a set of Open Internet rules to address broadband discriminatory practices. The Open Internet rules force broadband providers to be transparent about their network management practices, prevent the blocking of legal content, applications, services, or devices, and prevent unreasonable network discrimination (Federal Communications Commission, 2010). While the rules appear to provide a basis for the FCC to deal with discriminatory practices, there are several problems worth exploring.
First, the FCC treats fixed broadband and wireless broadband differently, providing far more leeway for cellular providers to discriminate, particularly against competing services. Second, there remains considerable question as to whether the FCC has the legal authority to enforce such rules, particularly given the FCC’s original classification of broadband as an ‘information service’. In fact, the DC Court of Appeals, ruling on the Comcast and BitTorrent FCC decision, recently “struck down a federal rule that required broadband providers to keep their networks open” (Puzzanghera & Guynn, 2010, p. 1). Furthermore, Senate Republicans recently attempted to put a bill on the floor to overturn the FCC’s Open Internet rules, however the bill was narrowly rejected (Puzzanghera, 2011). It appears likely that the FCC Open Internet rules will continue to be challenged in the legislature and the judiciary until the Internet is treated legally as a commons.
Of course, the critical issue with the Open Internet rules is the lack of legal recognition of the Internet as a commons. Instead, the emphasis is on the Internet is as an important commercial platform for innovation and growth that must be protected with administrative rules rather than law. While the Open Internet rules are an important step in anti-discrimination, they fall short of common carriage law insofar as they fail to treat the Internet as a legal commons that produces a public good. Moreover, the Open Internet rules are not a legislative solution and remain dependent on the support of the FCC. This author suggests that the anti-discrimination principles inherent in network neutrality proposals come largely from the common carriage principles of earlier legislation. Moreover, the current Open Internet rules contain important anti-discrimination principles, but lack the force of law. This author recognizes that despite the progress inherent in the FCC rules, net neutrality legislation is required to assure a lasting solution that recognizes the importance of the Internet to public good.
From the telegraph to the Internet, each new communication technology creates a similar debate. To what degree does the network constitute a public good and require regulation as a commons? In the past, common carriage laws have been used to assure that corporations are unable to use their network ownership to discriminate. However, the recent net neutrality rules enacted by the FCC, while providing an administrative basis to prevent the worst forms of discrimination, falls far short of common carriage legislation of the past, and continues to be challenged by lawmakers and the judiciary. Therefore, this author suggests that the fight against network discrimination has only just begun, until such a time where anti-discrimination law for the Internet is a reality.
Blondheim, M. (2004). Rehearsal for media regulation: Congress versus the telegraph-news monopoly, 1866-1900. Federal Communications Law Journal, 56(2), 300-328.
BusinessWeek, B. (2005). Online Extra: At SBC, It’s All About “Scale and Scope”, from http://www.businessweek.com/stories/2005-11-06/online-extra-at-sbc-its-all-about-scale-and-scope
CBC News. (2005, July 24). Telus cuts subscriber access to pro-union website, from http://www.cbc.ca/news/canada/story/2005/07/24/telus-sites050724.html
Federal Communications Commission. (2010). Report and Order: In the Matter of Preserving the Open Internet Broadband Indusrty Practices. Washington, DC: FCC, Retrieved from http://hraunfoss.fcc.gov/edocs_public/attachmatch/FCC-10-201A1_Rcd.pdf.
Knowledge@Wharton. (2009, December 9). Comcast-NBC Universal: Will the Marriage of Cable and Content Work? , from http://knowledge.wharton.upenn.edu/article.cfm?articleid=2401
Lessig, L., & Lemley, M. (2001). The end of end-to-end: Preserving the architecture of the Internet in the broadband era. UCLA Law Review, 48, 925-987.
Moglen, E. (2009, February 2). Lane v. Cotton, from http://moglen.law.columbia.edu/twiki/bin/view/EngLegalHist/LanevCotton
Noam, E. M. (1994). Beyond liberalization II: The impending doom of common carriage. Telecommunications Policy, 18(6), 435-452.
Puzzanghera, J. (2011). Senate rejects attempt to overturn FCC’s net neutrality, from http://latimesblogs.latimes.com/technology/2011/11/senate-net-neutrality-vote-.html
Puzzanghera, J., & Guynn, J. (2010). Appeals court overturns FCC rule on net neutrality, from http://articles.latimes.com/2010/apr/07/business/la-fi-fcc-comcast7-2010apr07
Rock, R. (2012). What Hath God Wrought: Commonality Between the Telegraph and the Internet [1-6]. Essay Retrieved from https://journey24pointoh.com/2012/09/05/what-hath-god-wrought-commonality-between-the-telegraph-and-the-internet/
Sandvig, C. (2007). Network neutrality is the new common carriage. info, 9(2/3), 136-147.
United States. Congress. (1996). Telecommunications Act of 1996. (0160534887). Washington DC: U.S. G.P.O. : For sale by the U.S. G.P.O., Supt. of Docs., Congressional Sales Office Retrieved from http://transition.fcc.gov/Reports/tcom1996.pdf.
Weiser, P. J. (2009). The future of Internet regulation. University of California, Davis Law Review, 43, 529-590.
Western Union Telegraph Co. v. Call Pub. Co., No. 181 U.S. 92 (U.S. Supreme Court 1901).
Network neutrality: Competition, innovation, and nondiscriminatory access, United States Congress 1-7 (2006a).
Wu, T. (2006b). Why have telecommunications law? Anti-discrimination norms in communications. Journal on Telecom and High Tech, 5(7), 15-46.