<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Keren Wang</title>
    <link>/</link>
    <description>Recent content on Keren Wang</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Sat, 28 Mar 2026 20:48:09 +0000</lastBuildDate>
    <atom:link href="/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>SCOM 3050 Lesson 13: Quantitative Methods - Content Analysis</title>
      <link>/blog/2026/03/scom-3050-lesson-13-quantitative-methods-content-analysis/</link>
      <pubDate>Sat, 28 Mar 2026 20:48:09 +0000</pubDate>
      <guid>/blog/2026/03/scom-3050-lesson-13-quantitative-methods-content-analysis/</guid>
      <description>&lt;section id=&#34;overview&#34;&gt;
&lt;h2&gt;Overview&lt;/h2&gt;
&lt;strong&gt;Content Analysis&lt;/strong&gt;: A research technique for the systematic classification and description of communication content based on predetermined categories. It can be quantitative, qualitative, or a combination of both.
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Quantitative content analysis&lt;/strong&gt; involves counting occurrences (e.g., how often violence is depicted in media).&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Qualitative content analysis&lt;/strong&gt; involves interpreting the meaning behind the content, overlapping with rhetorical and other qualitative methods discussed in previous weeks.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Why Use Content Analysis?&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Researchers use content analysis to measure behavior within media, such as how characters in films or television programs act, or how frequently certain themes appear in advertisements or articles.&lt;/li&gt;
&lt;li&gt;It is commonly used to investigate themes like violence, bias, identity representation, or other significant patterns in media.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Manifest vs. Latent Content&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Manifest Content&lt;/strong&gt;: What is explicitly presented in the media (e.g., a character saying &#34;I love you&#34;).&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Latent Content&lt;/strong&gt;: The underlying, hidden meanings behind what is explicitly shown, though content analysis typically focuses on manifest content.&lt;/li&gt;
&lt;/ul&gt;
&lt;/section&gt;
&lt;section id=&#34;coding&#34;&gt;
&lt;h2&gt;Coding&lt;/h2&gt;
&lt;strong&gt;Coding&lt;/strong&gt; is a critical process in content analysis, where researchers classify and categorize the data they&#39;ve collected based on predefined rules. Coding allows researchers to systematically organize and interpret large sets of data, making it easier to quantify and analyze the information.
&lt;h3&gt;Types of Coding&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Open Coding&lt;/strong&gt;: This is the initial phase of coding where researchers start by identifying key themes, concepts, or patterns in the data. This approach is flexible and exploratory, allowing researchers to see what categories naturally emerge.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Axial Coding&lt;/strong&gt;: Once the initial categories are identified, axial coding refines and links the categories by identifying relationships among them. This step helps in organizing the data around central themes.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Selective Coding&lt;/strong&gt;: In this phase, researchers focus on the core categories that have emerged and further explore connections. This step helps develop a coherent narrative around the data.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Coding Process&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Create Categories&lt;/strong&gt;: Researchers must establish a clear system of categories based on the research question. For example, if studying violence in TV shows, categories could include &#34;physical violence,&#34; &#34;verbal aggression,&#34; and &#34;implied violence.&#34;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Operational Definitions&lt;/strong&gt;: Essential for clear, measurable research, operational definitions specify how a concept will be measured in the study. For example, define what counts as &#34;violence&#34; to ensure consistent coding.
&lt;ul&gt;
&lt;li&gt;It is crucial to provide detailed operational definitions for each category. For example, if the category is &#34;physical violence,&#34; the definition might include &#34;any act where one character physically harms or attempts to harm another character, including hitting, kicking, shooting, etc.&#34;&lt;/li&gt;
&lt;li&gt;Coding for abstract concepts like &#34;patriotism&#34; or &#34;beauty&#34; can be difficult because these terms can be interpreted differently depending on context. Researchers must carefully operationalize these concepts to ensure clarity.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Mutually Exclusive Categories&lt;/strong&gt;: Categories must be distinct, meaning that a single piece of content should only fit into one category. If categories overlap, coding will be inconsistent and unreliable. For example, &#34;verbal aggression&#34; and &#34;insult&#34; should be clearly distinguished to avoid overlap.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Intercoder Reliability&lt;/strong&gt;: To maintain consistency, especially in larger studies involving multiple coders, researchers should test consistency between different coders, known as intercoder reliability. This process involves having several coders analyze the same content independently and comparing their results.
&lt;ul&gt;
&lt;li&gt;A high level of agreement between coders (typically 90% or higher) indicates reliable coding. If discrepancies arise, the operational definitions or coding procedures may need to be revised.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/section&gt;
&lt;section id=&#34;sampling&#34;&gt;
&lt;h2&gt;Sampling&lt;/h2&gt;
&lt;strong&gt;Sampling&lt;/strong&gt; refers to the process of selecting a representative subset of content from a larger pool to study. In content analysis, sampling is crucial because it directly affects the generalizability and reliability of the findings.
&lt;p&gt;Sampling and coding are closely related because the way you select and code your sample affects the validity of your research project. A well-chosen, representative sample ensures that the data collected can be generalized to the broader population, while accurate coding ensures that the data collected is reliable and meaningful.&lt;/p&gt;</description>
    </item>
    <item>
      <title>What Is AI? Part 2 – Demystifying AI Through Four Acts</title>
      <link>/blog/2025/12/what-is-ai-part-2-demystifying-ai-through-four-acts/</link>
      <pubDate>Mon, 01 Dec 2025 09:35:52 +0000</pubDate>
      <guid>/blog/2025/12/what-is-ai-part-2-demystifying-ai-through-four-acts/</guid>
      <description>&lt;div id=&#34;layout&#34;&gt;&lt;nav aria-label=&#34;Table of contents&#34; id=&#34;toc-container&#34;&gt;
&lt;h2&gt;&lt;span style=&#34;color: #00ccff;&#34;&gt;Table of Contents&lt;/span&gt;&lt;/h2&gt;
&lt;ul id=&#34;toc&#34;&gt;
&lt;li&gt;&lt;strong&gt;&lt;span style=&#34;color: #99ccff;&#34;&gt;&lt;a href=&#34;#introduction&#34; style=&#34;color: #99ccff;&#34;&gt;Introduction&lt;/a&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;&lt;span style=&#34;color: #99ccff;&#34;&gt;&lt;a href=&#34;#act-one&#34; style=&#34;color: #99ccff;&#34;&gt;Act One: AI as Metaphor and Speculative Frame for Procedural Automation (1980s–1990s)&lt;/a&gt;&lt;/span&gt;&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&#34;color: #99ccff; font-size: 14pt;&#34;&gt;&lt;a href=&#34;#from-labs-everyday&#34; style=&#34;color: #99ccff;&#34;&gt;From Laboratories to Everyday Life&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #99ccff; font-size: 14pt;&#34;&gt;&lt;a href=&#34;#cultural-imagination&#34; style=&#34;color: #99ccff;&#34;&gt;Cultural Imagination: Between Utopian and Dystopian Frames&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;&lt;span style=&#34;color: #99ccff;&#34;&gt;&lt;a href=&#34;#act-two&#34; style=&#34;color: #99ccff;&#34;&gt;Act Two: The Machine Learning Turn (Mid 1990s–2000s)&lt;/a&gt;&lt;/span&gt;&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&#34;color: #99ccff; font-size: 14pt;&#34;&gt;&lt;a href=&#34;#agentic-shift&#34; style=&#34;color: #99ccff;&#34;&gt;Agentic Shift From Static Programs to Adaptive Algorithms&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #99ccff; font-size: 14pt;&#34;&gt;&lt;a href=&#34;#wardrobe-recommender&#34; style=&#34;color: #99ccff;&#34;&gt;Illustrative Example: A Machine-Learning Wardrobe Recommender&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #99ccff; font-size: 14pt;&#34;&gt;&lt;a href=&#34;#paradoxes-ml&#34; style=&#34;color: #99ccff;&#34;&gt;Paradoxes of Machine Learning&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;&lt;span style=&#34;color: #99ccff;&#34;&gt;&lt;a href=&#34;#footnotes&#34; style=&#34;color: #99ccff;&#34;&gt;Footnotes&lt;/a&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/nav&gt;
&lt;figure&gt;
  &lt;img alt=&#34;Scene from the 1983 sci-fi thriller WarGames, directed by John Badham.The film dramatizes a near-catastrophe triggered by a military decision to entrust U.S. nuclear deterrence to an autonomous AI system that treats thermonuclear war as a solvable optimization problem.&#34; class=&#34;size-full wp-image-1241&#34; height=&#34;388&#34; src=&#34;/images/uploads/2025/11/WarGames-1983.gif&#34; width=&#34;660&#34;/&gt;
  &lt;figcaption&gt;&lt;span style=&#34;font-size: 12pt;&#34;&gt;&lt;strong&gt;&lt;span style=&#34;color: #ffcc99;&#34;&gt;Scene from the 1983 sci-fi thriller WarGames, directed by John Badham. &lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span style=&#34;font-size: 12pt;&#34;&gt;&lt;span style=&#34;color: #ffcc99;&#34;&gt;The film dramatizes a near-catastrophe triggered by a military decision to entrust U.S. nuclear deterrence to an autonomous AI system that treats thermonuclear war as a solvable optimization problem. &lt;/span&gt;&lt;span style=&#34;color: #999999;&#34;&gt;Source: DVDXtras, “WarGames (1983) | Behind the Scenes,” Internet Archive, June 2, 2022. &amp;lt;&lt;a href=&#34;https://archive.org/details/youtube-5g4EdnMcDzg&#34;&gt;LINK&lt;/a&gt;&amp;gt;&lt;/span&gt;&lt;/span&gt;&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;h2&gt;&lt;span style=&#34;font-size: 18pt;&#34;&gt;*Continuing from:&lt;/span&gt; &lt;span style=&#34;font-size: 18pt; color: #00ccff;&#34;&gt;&lt;em&gt;&lt;span style=&#34;color: #99ccff;&#34;&gt;&lt;a href=&#34;/blog/2025/11/a-survey-of-imaginaries-mythologies-and-rhetorical-structures-of-thinking-machines-part-1/&#34; style=&#34;color: #99ccff;&#34;&gt;“What Is AI?” Part 1: A Survey of Imaginaries, Mythologies, and Rhetorical Structures of Thinking Machines&lt;/a&gt;&lt;/span&gt;&lt;/em&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;a href=&#34;/blog/2025/11/a-survey-of-imaginaries-mythologies-and-rhetorical-structures-of-thinking-machines-part-1/&#34;&gt;&lt;strong&gt;In the previous segment of our genealogical survey,&lt;/strong&gt;&lt;/a&gt; we have traced ancient imaginaries that seeded today’s visions of machine intelligence. From &lt;span style=&#34;color: #ffff99;&#34;&gt;&lt;strong&gt;Yan Shi’s mechanical performers&lt;/strong&gt;&lt;/span&gt; to &lt;span style=&#34;color: #ffff99;&#34;&gt;&lt;strong&gt;&lt;em&gt;Talos&lt;/em&gt;&lt;/strong&gt;&lt;/span&gt;’ bronze vigilance and the ritual logic of &lt;strong&gt;golems&lt;/strong&gt; and Homunculi, we explored how mythic prototypes shaped the rhetorical terrain on which “AI” would later emerge as a technological category.
&lt;p&gt;Whereas earlier societies used myth and ritual to make sense of uncanny forms of artificial agency and “thinking machines,” in this second part we turn from historical mythologies to present-day technological possibilities. The term “artificial intelligence” circulates in our cultural lifeworld with astonishing fluidity. It appears in commercials, policy reports, sci-fi movies, legal disputes, and everyday conversations. It is used to describe everything from basic computer programs to sophisticated generative models capable of complex knowledge-performance.&lt;/p&gt;</description>
    </item>
    <item>
      <title>&#34;What Is AI?&#34; Part 1: A Survey of Imaginaries, Mythologies, and Rhetorical Structures of Thinking Machines</title>
      <link>/blog/2025/11/a-survey-of-imaginaries-mythologies-and-rhetorical-structures-of-thinking-machines-part-1/</link>
      <pubDate>Mon, 17 Nov 2025 14:18:43 +0000</pubDate>
      <guid>/blog/2025/11/a-survey-of-imaginaries-mythologies-and-rhetorical-structures-of-thinking-machines-part-1/</guid>
      <description>&lt;p&gt;&lt;strong&gt;&lt;span style=&#34;color: #cc99ff;&#34;&gt;&lt;em&gt;*Online lesson module and WIP chapter draft.&lt;/em&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style=&#34;color: #00ffff;&#34;&gt;Table of Contents&lt;/span&gt;&lt;/h2&gt;
&lt;nav id=&#34;toc&#34;&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&#34;color: #ccffff;&#34;&gt;&lt;a href=&#34;#introduction&#34; style=&#34;color: #ccffff;&#34;&gt;Introduction&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ccffff;&#34;&gt;&lt;em&gt;&lt;a href=&#34;#yan-shi&#34; style=&#34;color: #ccffff;&#34;&gt;Yan Shi&#39;s Automata&lt;/a&gt;&lt;/em&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ccffff;&#34;&gt;&lt;em&gt;&lt;a href=&#34;#talos&#34; style=&#34;color: #ccffff;&#34;&gt;Talos&lt;/a&gt;&lt;/em&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ccffff;&#34;&gt;&lt;em&gt;&lt;a href=&#34;#golem&#34; style=&#34;color: #ccffff;&#34;&gt;Golem&lt;/a&gt;&lt;/em&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ccffff;&#34;&gt;&lt;em&gt;&lt;a href=&#34;#faust-homunculus&#34; style=&#34;color: #ccffff;&#34;&gt;Faust’s Homunculus&lt;/a&gt;&lt;/em&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ccffff;&#34;&gt;&lt;a href=&#34;#long-arc&#34; style=&#34;color: #ccffff;&#34;&gt;The Long Arc of Artificial Imaginaries&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ccffff;&#34;&gt;&lt;a href=&#34;#footnotes&#34; style=&#34;color: #ccffff;&#34;&gt;Footnotes&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/nav&gt;
&lt;hr/&gt;
&lt;section id=&#34;introduction&#34;&gt;When our own era proclaims artificial intelligence (AI) as the centerpiece of contemporary&lt;strong&gt; technological fetishism&lt;/strong&gt;, it often points to its sweeping impact on medicine, autonomous mobility, creative production, and the evolving rituals of law and civic life. Yet even amid these transformations, we should resist the impulse to treat AI as a clean break with the past, for the imaginaries that animate it are far older than the machines themselves.&lt;sup&gt;&lt;a href=&#34;#1&#34; id=&#34;fn-1&#34;&gt;1&lt;/a&gt;&lt;/sup&gt;&lt;/section&gt;
&lt;p&gt;Long before the first integrated circuit pulsed with electricity, societies from the past contemplated thinking machines in forms that now read like allegories of our contemporary anxieties.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Free Speech and Communication Rights</title>
      <link>/blog/2025/11/free-speech-and-communication-rights/</link>
      <pubDate>Mon, 03 Nov 2025 04:41:42 +0000</pubDate>
      <guid>/blog/2025/11/free-speech-and-communication-rights/</guid>
      <description>&lt;div class=&#34;scom2050-lesson&#34; style=&#34;font-family: system-ui,-apple-system,Segoe UI,Roboto,Helvetica,Arial,sans-serif; line-height: 1.55; max-width: 880px; margin: 0 auto;&#34;&gt;
&lt;header class=&#34;hero&#34;&gt;
&lt;div class=&#34;hero-inner&#34;&gt;
&lt;p class=&#34;sub&#34;&gt;Online lesson module - A practical walk through First Amendment foundations, controversial but protected expressions, categories of unprotected speech, and contemporary questions of platform power, VPNs, and the Tor network. This lesson follows our in‑class slide deck and uses the same conceptual scaffolding for continuity.&lt;/p&gt;
&lt;table border=&#34;1&#34; style=&#34;width: 91.7614%; border-collapse: collapse; margin-left: 40px; border-color: #ffffff; border-style: solid; background-color: #1f2f36;&#34;&gt;
&lt;tbody style=&#34;padding-left: 40px;&#34;&gt;
&lt;tr style=&#34;padding-left: 40px;&#34;&gt;
&lt;td style=&#34;width: 100%; padding-left: 40px;&#34;&gt;
&lt;h3 style=&#34;line-height: 1.24138; font-family: system-ui, -apple-system, &#39;Segoe UI&#39;, Roboto, Helvetica, Arial, sans-serif; padding-left: 40px;&#34;&gt;&lt;span style=&#34;color: #00ccff;&#34;&gt;Table of Contents&lt;/span&gt;&lt;/h3&gt;
&lt;ol&gt;
&lt;li style=&#34;list-style-type: none;&#34;&gt;
&lt;ol&gt;
&lt;li style=&#34;list-style-type: none;&#34;&gt;
&lt;ol style=&#34;font-family: system-ui, -apple-system, &#39;Segoe UI&#39;, Roboto, Helvetica, Arial, sans-serif;&#34;&gt;
&lt;li&gt;&lt;span style=&#34;color: #99ccff;&#34;&gt;&lt;a href=&#34;#foundations&#34; style=&#34;color: #99ccff;&#34;&gt;Free Expression: Constitutional and Global Frames&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #99ccff;&#34;&gt;&lt;a href=&#34;#history&#34; style=&#34;color: #99ccff;&#34;&gt;Free Expression in American History&lt;/a&gt;&lt;/span&gt;
&lt;ul style=&#34;font-family: system-ui, -apple-system, &#39;Segoe UI&#39;, Roboto, Helvetica, Arial, sans-serif;&#34;&gt;
&lt;li&gt;&lt;span style=&#34;color: #99ccff;&#34;&gt;&lt;a href=&#34;#prior-restraint&#34; style=&#34;color: #99ccff;&#34;&gt;Prior Restraint and its Discontents&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #99ccff;&#34;&gt;&lt;a href=&#34;#protected&#34; style=&#34;color: #99ccff;&#34;&gt;One Man&#39;s Vulgarity is Another&#39;s Lyric&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #99ccff;&#34;&gt;&lt;a href=&#34;#unprotected&#34; style=&#34;color: #99ccff;&#34;&gt;Unprotected Speech&lt;/a&gt;&lt;/span&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&#34;color: #99ccff;&#34;&gt;&lt;a href=&#34;#defamation&#34; style=&#34;color: #99ccff;&#34;&gt;Defamation&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #99ccff;&#34;&gt;&lt;a href=&#34;#fighting&#34; style=&#34;color: #99ccff;&#34;&gt;Fighting Words&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #99ccff;&#34;&gt;&lt;a href=&#34;#obscenity&#34; style=&#34;color: #99ccff;&#34;&gt;Obscenity&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #99ccff;&#34;&gt;&lt;a href=&#34;#ip&#34; style=&#34;color: #99ccff;&#34;&gt;Intellectual Property Violations&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #99ccff;&#34;&gt;&lt;a href=&#34;#criminal&#34; style=&#34;color: #99ccff;&#34;&gt;Speech Integral to Criminal Conduct&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #99ccff;&#34;&gt;&lt;a href=&#34;#censorship&#34; style=&#34;color: #99ccff;&#34;&gt;Internet Censorship &amp;amp; Communication Rights&lt;/a&gt;&lt;/span&gt;
&lt;ul style=&#34;font-family: system-ui, -apple-system, &#39;Segoe UI&#39;, Roboto, Helvetica, Arial, sans-serif;&#34;&gt;
&lt;li&gt;&lt;span style=&#34;color: #99ccff;&#34;&gt;&lt;a href=&#34;#vpn&#34; style=&#34;color: #99ccff;&#34;&gt;VPNs: Benefits and Constraints&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #99ccff;&#34;&gt;&lt;a href=&#34;#tor&#34; style=&#34;color: #99ccff;&#34;&gt;The Tor Network and the “Dark Web”&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #99ccff;&#34;&gt;&lt;a href=&#34;#references&#34; style=&#34;color: #99ccff;&#34;&gt;References&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;div class=&#34;grid&#34;&gt;
&lt;div class=&#34;toc&#34;&gt;&lt;/div&gt;
&lt;img alt=&#34;&#34; class=&#34;aligncenter size-full wp-image-1188&#34; height=&#34;376&#34; src=&#34;/images/uploads/2025/11/Free-Expression-header.gif&#34; width=&#34;680&#34;/&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/header&gt;&lt;main class=&#34;wrap&#34;&gt;&lt;!-- Foundations --&gt;&lt;/main&gt;&lt;section id=&#34;foundations&#34;&gt;
&lt;div class=&#34;section-&#34;&gt;
&lt;h2&gt;&lt;span style=&#34;color: #00ccff;&#34;&gt;1) Free Expression: Constitutional and Global Frames&lt;/span&gt;&lt;/h2&gt;
&lt;div class=&#34;cols&#34;&gt;
&lt;div&gt;
&lt;span style=&#34;font-weight: 400;&#34;&gt;The framers of the US Constitution felt a strong need to safeguard the freedom of speech and the press (as well as religion and the right to assemble).&lt;/span&gt;
&lt;p&gt;The &lt;span style=&#34;color: #ffff99;&#34;&gt;&lt;strong&gt;First Amendment&lt;/strong&gt;&lt;/span&gt; of the Constitution articulates a bright‑line commitment: “Congress shall make no law … abridging the freedom of speech, or of the press.” [1]&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&#34;callout&#34;&gt;
&lt;pre&gt;&lt;span style=&#34;color: #ccffcc;&#34;&gt;&lt;strong&gt;Interpretive anchor:&lt;/strong&gt; Political and religious speech receive the highest protection under the US constitutional framework. Restrictions must satisfy content‑neutral “time, place, and manner” standards and leave open alternative channels of communication. [2]
&lt;/span&gt;&lt;/pre&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div class=&#34;box&#34;&gt;
&lt;span style=&#34;color: #ccffcc;&#34;&gt;&lt;span style=&#34;color: #ffffff;&#34;&gt;The term “&lt;span style=&#34;color: #ffff99;&#34;&gt;&lt;strong&gt;press&lt;/strong&gt;&lt;/span&gt;” in the First Amendment is NOT meant to be narrowly understood as newspapers or printed matter. The Supreme Court of the US (SCOTUS) has consistency interpreted the &#34;press&#34; as an umbrella encompassing any medium used to disseminate information and opinions to the public. &lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;The &#34;press&#34; includes, but not limited to: print publications, broadcast media, digital platforms, blogs, podcasts, streaming contents, social media, and &lt;/span&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Junger_v._Daley&#34;&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;software source codes&lt;/span&gt;&lt;/a&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;. [3]&lt;/span&gt;
&lt;blockquote&gt;
&lt;h3 style=&#34;text-align: center;&#34;&gt;&lt;span style=&#34;font-family: &#39;book antiqua&#39;, palatino, serif; color: #ffcc99;&#34;&gt;Universal Declaration of Human Rights, Art. 19&lt;/span&gt;&lt;/h3&gt;
&lt;p class=&#34;muted&#34; style=&#34;text-align: center;&#34;&gt;&lt;span style=&#34;font-family: &#39;book antiqua&#39;, palatino, serif; color: #ffcc99;&#34;&gt;Everyone has the right to seek, receive, and impart information and ideas through any media and regardless of frontiers. This is the global lingua franca of communication rights.[4]&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;article class=&#34;text-token-text-primary w-full focus:outline-none [--shadow-height:45px] has-data-writing-block:pointer-events-none has-data-writing-block:-mt-(--shadow-height) has-data-writing-block:pt-(--shadow-height) [&amp;amp;:has([data-writing-block])&amp;gt;*]:pointer-events-auto [content-visibility:auto] supports-[content-visibility:auto]:[contain-intrinsic-size:auto_100lvh] scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]&#34; data-scroll-anchor=&#34;true&#34; data-testid=&#34;conversation-turn-14&#34; data-turn=&#34;assistant&#34; data-turn-id=&#34;request-WEB:1b7eb0e4-70fc-4417-b516-9fafb91b0d4c-12&#34; dir=&#34;auto&#34; tabindex=&#34;-1&#34;&gt;
&lt;div class=&#34;text-base my-auto mx-auto pb-10 [--thread-content-margin:--spacing(4)] thread-sm:[--thread-content-margin:--spacing(6)] thread-lg:[--thread-content-margin:--spacing(16)] px-(--thread-content-margin)&#34;&gt;
&lt;div class=&#34;[--thread-content-max-width:40rem] thread-lg:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn&#34; tabindex=&#34;-1&#34;&gt;
&lt;div class=&#34;flex max-w-full flex-col grow&#34;&gt;
&lt;div class=&#34;min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal [.text-message+&amp;amp;]:mt-1&#34; data-message-author-role=&#34;assistant&#34; data-message-id=&#34;5216d5c1-6b15-452a-aa0f-006a6d45f883&#34; data-message-model-slug=&#34;gpt-5&#34; dir=&#34;auto&#34;&gt;
&lt;div class=&#34;flex w-full flex-col gap-1 empty:hidden first:pt-[1px]&#34;&gt;
&lt;div class=&#34;markdown prose dark:prose-invert w-full break-words light markdown-new-styling&#34;&gt;
&lt;p data-end=&#34;925&#34; data-is-last-node=&#34;&#34; data-is-only-node=&#34;&#34; data-start=&#34;105&#34;&gt;While the U.S. Constitution enshrines free expression through the First Amendment, its spirit resonates in international human rights law. &lt;strong data-end=&#34;311&#34; data-start=&#34;245&#34;&gt;&lt;span style=&#34;color: #ffff99;&#34;&gt;Article 19 of the Universal Declaration of Human Rights&lt;/span&gt; (1948)&lt;/strong&gt; extends the same principle beyond national boundaries, affirming that &lt;em data-end=&#34;613&#34; data-start=&#34;382&#34;&gt;“everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers.” [5]&lt;/em&gt;&lt;/p&gt;
&lt;p data-end=&#34;925&#34; data-is-last-node=&#34;&#34; data-is-only-node=&#34;&#34; data-start=&#34;105&#34;&gt;In this sense, the American jurisprudence on press freedom contributes to a broader global discourse on &lt;strong data-end=&#34;743&#34; data-start=&#34;719&#34;&gt;communication rights&lt;/strong&gt;—the notion that access to information and the ability to share ideas are not privileges granted by the state, but intrinsic conditions of human dignity and democratic participation. [6]&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&#34;mt-3 w-full empty:hidden&#34;&gt;
&lt;div class=&#34;text-center&#34;&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/article&gt;&lt;/div&gt;
&lt;div class=&#34;box&#34; style=&#34;margin-top: 12px;&#34;&gt;
&lt;div class=&#34;key-terms&#34;&gt;
&lt;hr/&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/section&gt;&lt;!-- History --&gt;
&lt;section id=&#34;history&#34;&gt;
&lt;div class=&#34;section-&#34;&gt;
&lt;h2&gt;&lt;span style=&#34;color: #00ccff;&#34;&gt;2) Free Expression in American History
&lt;/span&gt;&lt;/h2&gt;
The First Amendment’s promise of free expression has never fully insulated the United States from attempts to silence dissenting voices or control the press. A vivid early example came in 1798, when the Federalist-controlled Congress enacted the &lt;strong data-end=&#34;404&#34; data-start=&#34;377&#34;&gt;Alien and Sedition Acts&lt;/strong&gt;, a series of laws designed to suppress opposition during a time of political and international tension. The Sedition Act, in particular, made it a crime to “write, publish, or print any false, scandalous, and malicious writing” against the president, Congress, or the federal government.[7]
&lt;p&gt;In practice, these laws targeted journalists, editors, and immigrant supporters of the Democratic-Republican Party, whose criticism of Federalist policies was reframed as a threat to national security. The Acts proved deeply unpopular, provoking a national backlash over what many viewed as an assault on constitutional liberties. When the Federalists were voted out of power in 1800, the new administration swiftly allowed the legislation to expire, marking an early and decisive reaffirmation that &lt;strong data-end=&#34;1305&#34; data-start=&#34;1196&#34;&gt;political dissent and criticism of public officials lie at the core of the American free speech tradition&lt;/strong&gt;. [8]&lt;/p&gt;
&lt;div class=&#34;callout warn&#34;&gt;
&lt;div&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/section&gt;&lt;section id=&#34;prior-restraint&#34;&gt;
&lt;div class=&#34;section-&#34;&gt;
&lt;h3&gt;&lt;span style=&#34;color: #99ccff;&#34;&gt;2.1 Prior Restraint and its Discontents&lt;/span&gt;&lt;/h3&gt;
&lt;span style=&#34;color: #ffff99;&#34;&gt;&lt;strong data-end=&#34;254&#34; data-start=&#34;235&#34;&gt;Prior restraint&lt;/strong&gt;&lt;/span&gt; refers to government actions that prevent speech or publication before it occurs, typically through injunctions, licensing, or other forms of preemptive censorship. &lt;strong data-end=&#34;254&#34; data-start=&#34;235&#34;&gt;Prior restraint&lt;/strong&gt; has deep roots in &lt;strong data-end=&#34;461&#34; data-start=&#34;439&#34;&gt;English common law&lt;/strong&gt;, where monarchs required the press to obtain royal licenses, in effect silencing political or religious dissent. [9]
&lt;p data-end=&#34;1386&#34; data-start=&#34;265&#34;&gt;The struggle over prior restraint became especially visible in &lt;strong data-end=&#34;363&#34; data-start=&#34;328&#34;&gt;twentieth-century American jurisprudence&lt;/strong&gt;, as courts were forced to define the limits of government control over publication. In 1931, the Supreme Court’s decision in &lt;strong&gt;&lt;em data-end=&#34;512&#34; data-start=&#34;493&#34;&gt;Near v. Minnesota&lt;/em&gt;&lt;/strong&gt; marked the first major ruling to strike down a state’s attempt to suppress a newspaper before distribution. The case arose when Minnesota officials tried to shut down &lt;em data-end=&#34;700&#34; data-start=&#34;680&#34;&gt;The Saturday Press&lt;/em&gt; for accusing local politicians of corruption. The Court ruled that such pre-publication censorship violated the First Amendment, establishing that punishment for libel or incitement must come &lt;em data-end=&#34;900&#34; data-start=&#34;893&#34;&gt;after&lt;/em&gt; publication through due process, not before. [10]&lt;/p&gt;
&lt;table style=&#34;width: 100%; border-collapse: collapse; background-color: #b6c7de;&#34;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&#34;width: 100%;&#34;&gt; 
&lt;figure&gt;
  &lt;img alt=&#34;&#34; class=&#34;size-full wp-image-1189&#34; height=&#34;1211&#34; src=&#34;/images/uploads/2025/11/Free-Expression-A-November-1950-Central-Intelligence-Agency-map-of-dissident-activities-in-Indochina_the-Pentagon-Papers.png&#34; width=&#34;800&#34;/&gt;
  &lt;figcaption&gt;&lt;span style=&#34;color: #993300;&#34;&gt;A declassified Central Intelligence Agency map from November 1950 depicting dissident activity in Indochina, later published by The New York Times as part of the Pentagon Papers series. &lt;span style=&#34;font-size: 10pt;&#34;&gt;Source: Central Intelligence Agency, Public domain, via Wikimedia Commons &amp;lt;https://commons.wikimedia.org/wiki/File:Dissident_Activities_in_Indochina.svg&amp;gt;&lt;/span&gt;&lt;/span&gt;&lt;/figcaption&gt;
&lt;/figure&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p data-end=&#34;1386&#34; data-start=&#34;265&#34;&gt;Four decades later, in 1971, &lt;strong&gt;&lt;em data-end=&#34;1015&#34; data-start=&#34;978&#34;&gt;New York Times Co. v. United States&lt;/em&gt;&lt;/strong&gt;—the &lt;strong data-end=&#34;1041&#34; data-start=&#34;1020&#34;&gt;“Pentagon Papers”&lt;/strong&gt; case—reaffirmed that even claims of national security rarely justify silencing the press in advance. The Nixon administration’s effort to block the &lt;em data-end=&#34;1197&#34; data-start=&#34;1190&#34;&gt;Times&lt;/em&gt; and &lt;em data-end=&#34;1219&#34; data-start=&#34;1202&#34;&gt;Washington Post&lt;/em&gt; from publishing leaked documents on the Vietnam War was rejected, with Justice Black famously writing that “the press was to serve the governed, not the governors.” [11]&lt;/p&gt;
&lt;p data-end=&#34;1386&#34; data-start=&#34;265&#34;&gt;The issue of &lt;strong&gt;prior restraint&lt;/strong&gt; resurfaced in 1979 with &lt;strong&gt;&lt;em data-end=&#34;1581&#34; data-start=&#34;1547&#34;&gt;United States v. The Progressive&lt;/em&gt;&lt;/strong&gt;, when the &lt;strong data-end=&#34;1622&#34; data-start=&#34;1592&#34;&gt;Department of Energy (DOE)&lt;/strong&gt; sought to prevent &lt;em data-end=&#34;1658&#34; data-start=&#34;1641&#34;&gt;The Progressive&lt;/em&gt; magazine from publishing an article titled &lt;em data-end=&#34;1761&#34; data-start=&#34;1702&#34;&gt;“The H-Bomb Secret: How We Got It, Why We’re Telling It.”&lt;/em&gt; Written by freelance journalist &lt;strong data-end=&#34;1812&#34; data-start=&#34;1794&#34;&gt;Howard Morland&lt;/strong&gt;, the piece compiled publicly available scientific information to explain the general principles of hydrogen bomb design.&lt;/p&gt;
&lt;p data-end=&#34;1386&#34; data-start=&#34;265&#34;&gt;The US government argued that even though the H-bomb data was unclassified, the article could help hostile nations develop nuclear weapons and therefore threatened US national security. A federal judge initially granted an injunction, marking one of the rare instances in U.S. history where prior restraint was temporarily upheld. However, the case was dropped before reaching the Supreme Court after similar information appeared in other publications, rendering the injunction moot. [12]&lt;/p&gt;
&lt;div class=&#34;cols&#34;&gt;
&lt;div class=&#34;box&#34;&gt;
&lt;hr/&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/section&gt;&lt;!-- Protected but controversial --&gt;
&lt;section id=&#34;protected&#34;&gt;
&lt;div class=&#34;section-&#34;&gt;
&lt;h2&gt;&lt;span style=&#34;color: #00ccff;&#34;&gt;3) &lt;em&gt;One Man’s Vulgarity is Another’s Lyric&lt;/em&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;div class=&#34;cols&#34;&gt;
&lt;strong&gt;&lt;span style=&#34;color: #ffff99;&#34;&gt;The First Amendment protects not only agreeable or accurate speech but also expression that is false, unsettling, or offensive&lt;/span&gt;,&lt;/strong&gt; so long as it does not cross into one of the legally defined unprotected categories.
&lt;p&gt;For instance, most &lt;strong data-end=&#34;441&#34; data-start=&#34;421&#34;&gt;&lt;span style=&#34;color: #ffff99;&#34;&gt;false statements&lt;/span&gt; &lt;/strong&gt;(or the &amp;ldquo;right to lie&amp;rdquo;) are &lt;strong&gt;protected&lt;/strong&gt; as long as they do not amount to defamation, perjury, or professional malpractice. The Supreme Court made this point explicit in &lt;em data-end=&#34;624&#34; data-start=&#34;598&#34;&gt;United States v. Alvarez&lt;/em&gt; (2012), when it struck down the Stolen Valor Act, which had criminalized falsely claiming military honors. The Court reasoned that the government cannot impose blanket bans on lies without threatening the broader freedom to engage in activities intrinsic to public discourse and self-expression. [13]&lt;/p&gt;
&lt;figure&gt;
  &lt;img alt=&#34;&#34; class=&#34;size-full wp-image-1190&#34; height=&#34;361&#34; src=&#34;/images/uploads/2025/11/The_Progressive_H-bomb_cover.jpg&#34; width=&#34;275&#34;/&gt;
  &lt;figcaption&gt;&lt;span style=&#34;color: #ffcc99;&#34;&gt;C&lt;span style=&#34;color: #ffcc00;&#34;&gt;over of the November 1979 issue of The Progressive, displaying a simplified diagram of the Teller–Ulam hydrogen bomb design— an issue the U.S. Department of Energy sought to censor on national security grounds.&lt;/span&gt;&lt;/span&gt;&lt;br/&gt;&lt;span style=&#34;color: #ffcc00; font-size: 8pt;&#34;&gt;Source: By The Progressive magazine, Fair use, https://en.wikipedia.org/w/index.php?curid=20156806&lt;/span&gt;&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;p&gt;Another recurring controversy involves the &lt;span style=&#34;color: #ffffff;&#34;&gt;publication of &lt;/span&gt;&lt;span style=&#34;color: #ffff99;&#34;&gt;&lt;strong data-end=&#34;1048&#34; data-start=&#34;983&#34;&gt;classified or sensitive government information&lt;/strong&gt;&lt;/span&gt; by journalists or private citizens. In most circumstances, the First Amendment prohibits the government from punishing the press for publishing lawfully obtained materials, even if those materials expose state secrets or political wrongdoing.&lt;/p&gt;
&lt;p&gt;The &lt;em data-end=&#34;1313&#34; data-start=&#34;1296&#34;&gt;Pentagon Papers&lt;/em&gt; case (1971) and the &lt;em&gt;United States v. Progressive&lt;/em&gt; &amp;ldquo;H-bomb&amp;rdquo; case (1979) we&amp;rsquo;ve discussed earlier reaffirmed this principle, holding that the risk of embarrassment or diplomatic tension generally does not outweigh the public’s right to know.&lt;/p&gt;
&lt;article class=&#34;text-token-text-primary w-full focus:outline-none [--shadow-height:45px] has-data-writing-block:pointer-events-none has-data-writing-block:-mt-(--shadow-height) has-data-writing-block:pt-(--shadow-height) [&amp;amp;:has([data-writing-block])&amp;gt;*]:pointer-events-auto [content-visibility:auto] supports-[content-visibility:auto]:[contain-intrinsic-size:auto_100lvh] scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]&#34; data-scroll-anchor=&#34;true&#34; data-testid=&#34;conversation-turn-30&#34; data-turn=&#34;assistant&#34; data-turn-id=&#34;request-WEB:1b7eb0e4-70fc-4417-b516-9fafb91b0d4c-20&#34; dir=&#34;auto&#34; tabindex=&#34;-1&#34;&gt;
&lt;div class=&#34;text-base my-auto mx-auto pb-10 [--thread-content-margin:--spacing(4)] thread-sm:[--thread-content-margin:--spacing(6)] thread-lg:[--thread-content-margin:--spacing(16)] px-(--thread-content-margin)&#34;&gt;
&lt;div class=&#34;[--thread-content-max-width:40rem] thread-lg:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn&#34; tabindex=&#34;-1&#34;&gt;
&lt;div class=&#34;flex max-w-full flex-col grow&#34;&gt;
&lt;div class=&#34;min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal [.text-message+&amp;amp;]:mt-1&#34; data-message-author-role=&#34;assistant&#34; data-message-id=&#34;f5995701-fd8e-4a96-a720-416e86fadea2&#34; data-message-model-slug=&#34;gpt-5&#34; dir=&#34;auto&#34;&gt;
&lt;div class=&#34;flex w-full flex-col gap-1 empty:hidden first:pt-[1px]&#34;&gt;
&lt;div class=&#34;markdown prose dark:prose-invert w-full break-words light markdown-new-styling&#34;&gt;
&lt;p data-end=&#34;2549&#34; data-is-last-node=&#34;&#34; data-is-only-node=&#34;&#34; data-start=&#34;1648&#34;&gt;Finally, unpopular or &lt;span style=&#34;color: #ffff99;&#34;&gt;&lt;strong data-end=&#34;1694&#34; data-start=&#34;1657&#34;&gt;offensive expressions,&lt;/strong&gt;&lt;/span&gt; for the most part, remains constitutionally &lt;strong&gt;protected&lt;/strong&gt; unless it directly incites violence or falls within another unprotected category such as fighting words (more on this later). This includes speech that most find morally objectionable or politically extreme. The protection of offensive speech ensures that public authorities cannot easily redefine the boundaries of &#34;acceptable opinion.&#34; As Justice Harlan observed in &lt;strong&gt;&lt;em data-end=&#34;2190&#34; data-start=&#34;2169&#34;&gt;Cohen v. California&lt;/em&gt;&lt;/strong&gt; (1971), when a man wore a jacket emblazoned with “F*** the Draft” in a courthouse:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p data-end=&#34;2549&#34; data-is-last-node=&#34;&#34; data-is-only-node=&#34;&#34; data-start=&#34;1648&#34; style=&#34;text-align: center;&#34;&gt;&lt;span style=&#34;color: #ffcc99; font-family: georgia, palatino, serif;&#34;&gt;&lt;strong&gt;“One man’s vulgarity is another’s lyric.”&lt;/strong&gt; &lt;/span&gt;[14]&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/article&gt;
&lt;hr/&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/section&gt;&lt;!-- Unprotected categories overview --&gt;
&lt;section id=&#34;unprotected&#34;&gt;
&lt;div class=&#34;section-&#34;&gt;
&lt;h2&gt;&lt;span style=&#34;color: #00ccff;&#34;&gt;4) Unprotected Speech&lt;/span&gt;&lt;/h2&gt;
While the First Amendment offers broad protection for expression, it is not absolute. Over time, the US Supreme Court has defined a narrow set of unprotected categories of speech—forms of expression that are considered so harmful, fraudulent, or devoid of public value that they do not merit constitutional protection. Each category has been shaped by specific historical cases, reflecting the tension between liberty and harm prevention in a democratic society.
&lt;div class=&#34;cols&#34;&gt;
&lt;div class=&#34;box&#34; id=&#34;defamation&#34;&gt;
&lt;h3&gt;&lt;span style=&#34;color: #99ccff;&#34;&gt;4.1 Defamation (libel &amp;amp; slander)&lt;/span&gt;&lt;/h3&gt;
&lt;span style=&#34;color: #ffff99;&#34;&gt;&lt;strong data-end=&#34;699&#34; data-start=&#34;685&#34;&gt;Defamation&lt;/strong&gt;&lt;/span&gt; refers to false statements of fact that unjustly harm another person’s reputation. For speech to qualify as defamation, it must meet ALL four criteria: it must be:
&lt;p style=&#34;padding-left: 40px;&#34;&gt;&lt;span style=&#34;font-size: 14pt;&#34;&gt;&lt;strong&gt;(1) Untrue - &lt;/strong&gt;verified to be factually false &lt;span style=&#34;font-weight: 400;&#34;&gt;or misleading.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style=&#34;padding-left: 40px;&#34;&gt;&lt;span style=&#34;font-size: 14pt;&#34;&gt;&lt;strong&gt;(2) Public &lt;/strong&gt;- &lt;span style=&#34;font-weight: 400;&#34;&gt;cannot be an one-on-one private conversation, must be at minimum &lt;span style=&#34;text-decoration: underline;&#34;&gt;communicated to a third party individual.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style=&#34;padding-left: 40px;&#34;&gt;&lt;span style=&#34;font-size: 14pt;&#34;&gt;&lt;strong&gt;(3). Actual Malice&lt;/strong&gt; - made &lt;span style=&#34;font-weight: 400;&#34;&gt;with reckless disregard for truth AND the intent to cause harm.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style=&#34;padding-left: 40px;&#34;&gt;&lt;span style=&#34;font-size: 14pt;&#34;&gt;&lt;strong&gt;(4)&lt;/strong&gt;&lt;strong&gt;Actual Injury&lt;/strong&gt; - &lt;span style=&#34;font-weight: 400;&#34;&gt;must result in verifiable monetary or reputational damages&lt;/span&gt; [15]&lt;/span&gt;&lt;/p&gt;
&lt;table style=&#34;width: 128.403%; border-collapse: collapse; background-color: #361d0b;&#34;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&#34;width: 100%;&#34;&gt;
&lt;figure&gt;
  &lt;img alt=&#34;&#34; class=&#34;wp-image-1192 size-full&#34; height=&#34;626&#34; src=&#34;/images/uploads/2025/11/Free-Expression_IRS-Allows-Taxpayers-To-Deposit-Payments-Directly-Into-Elon-Musks-Bank-Account_Onion-June-6-2025-e1762154065529.png&#34; width=&#34;533&#34;/&gt;
  &lt;figcaption&gt;&lt;span style=&#34;color: #ffcc00; font-size: 0.7rem;&#34;&gt;The Onion. “IRS Allows Taxpayers to Deposit Payments Directly into Elon Musk’s Bank Account.” The Onion, June 6, 2025. https://www.theonion.com/irs-allows-taxpayers-to-deposit-payments-directly-into-elon-musks-bank-account&lt;/span&gt;&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;p data-end=&#34;513&#34; data-start=&#34;73&#34;&gt;&lt;span style=&#34;color: #ccffff;&#34;&gt;&lt;span style=&#34;font-family: arial, helvetica, sans-serif;&#34;&gt;&lt;span style=&#34;font-size: 12pt;&#34;&gt;Although &lt;em data-end=&#34;327&#34; data-start=&#34;316&#34;&gt;The Onion&lt;/em&gt;’s June 6, 2025 article, “IRS Allows Taxpayers To Deposit Payments Directly Into Elon Musk’s Bank Account,” makes numerous false claims about the U.S. government and Elon Musk, it is a &lt;strong data-end=&#34;538&#34; data-start=&#34;510&#34;&gt;work of satire&lt;/strong&gt; and &lt;strong&gt;does not meet the legal criteria for defamation&lt;/strong&gt;. &lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;font-family: arial, helvetica, sans-serif;&#34;&gt;&lt;span style=&#34;font-size: 12pt;&#34;&gt;Satirical and parodic works like &lt;em data-end=&#34;1141&#34; data-start=&#34;1130&#34;&gt;The Onion&lt;/em&gt;’s are protected precisely because they cannot reasonably be understood as stating actual facts. The publication made clear signals to its readers that the piece is humorous commentary on systemic wealth inequality, not actual news report. [16]&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style=&#34;list-style-type: none;&#34;&gt;
&lt;ol&gt;
&lt;li data-end=&#34;664&#34; data-start=&#34;621&#34;&gt;&lt;span style=&#34;font-family: arial, helvetica, sans-serif; font-size: 12pt; color: #ccffff;&#34;&gt;&lt;strong data-end=&#34;632&#34; data-start=&#34;621&#34;&gt;Untrue:&lt;/strong&gt; The claim is factually false.&lt;/span&gt;&lt;/li&gt;
&lt;li data-end=&#34;723&#34; data-start=&#34;668&#34;&gt;&lt;span style=&#34;font-family: arial, helvetica, sans-serif; font-size: 12pt; color: #ccffff;&#34;&gt;&lt;strong data-end=&#34;679&#34; data-start=&#34;668&#34;&gt;Communicated to at least one third party:&lt;/strong&gt; It was shared to a large online audience.&lt;/span&gt;&lt;/li&gt;
&lt;li data-end=&#34;842&#34; data-start=&#34;727&#34;&gt;&lt;span style=&#34;font-family: arial, helvetica, sans-serif; font-size: 12pt; color: #ccffff;&#34;&gt;&lt;strong data-end=&#34;745&#34; data-start=&#34;727&#34;&gt;Actual malice:&lt;/strong&gt; The celebrity chef acted with reckless disregard for the truth by publishing without verification.&lt;/span&gt;&lt;/li&gt;
&lt;li data-end=&#34;934&#34; data-start=&#34;846&#34;&gt;&lt;span style=&#34;font-family: arial, helvetica, sans-serif; font-size: 12pt; color: #ccffff;&#34;&gt;&lt;strong data-end=&#34;864&#34; data-start=&#34;846&#34;&gt;Actual injury:&lt;/strong&gt; The restaurant suffered measurable financial and reputational harm.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;div class=&#34;box&#34; id=&#34;fighting&#34;&gt;
&lt;h3&gt;&lt;span style=&#34;color: #99ccff;&#34;&gt;4.2 Fighting Words (rarely applicable today)&lt;/span&gt;&lt;/h3&gt;
The category of &lt;span style=&#34;color: #ffff99;&#34;&gt;&lt;strong&gt;&lt;em data-end=&#34;284&#34; data-start=&#34;268&#34;&gt;fighting words &lt;/em&gt;&lt;/strong&gt;&lt;/span&gt;refers to a&lt;strong&gt; very narrow&lt;/strong&gt; class of speech acts so personally abusive and confrontational that they are likely to provoke an immediate violent response from the person addressed. The doctrine was first articulated in the controversial case &lt;em data-end=&#34;365&#34; data-start=&#34;336&#34;&gt;Chaplinsky v. New Hampshire&lt;/em&gt; (1942). Since then, &lt;strong&gt;courts have dramatically narrowed the &lt;em data-end=&#34;440&#34; data-start=&#34;424&#34;&gt;fighting words&lt;/em&gt; doctrine, and it is almost never applied today&lt;/strong&gt;—surviving more as a historical artifact. [17]
&lt;p data-end=&#34;1400&#34; data-start=&#34;1312&#34;&gt;To qualify as &lt;em data-end=&#34;1342&#34; data-start=&#34;1326&#34;&gt;fighting words&lt;/em&gt;, speech must satisfy &lt;strong&gt;ALL &lt;/strong&gt;of the following elements:&lt;/p&gt;
&lt;p data-end=&#34;1591&#34; data-start=&#34;1405&#34; style=&#34;padding-left: 40px;&#34;&gt;&lt;span style=&#34;font-size: 14pt;&#34;&gt;&lt;strong data-end=&#34;1427&#34; data-start=&#34;1405&#34;&gt;(1) Personally Abusive&lt;/strong&gt; — must be directed at a specific individual in a way that is extremely insulting or demeaning;&lt;/span&gt;&lt;/p&gt;
&lt;p data-end=&#34;1764&#34; data-start=&#34;1595&#34; style=&#34;padding-left: 40px;&#34;&gt;&lt;span style=&#34;font-size: 14pt;&#34;&gt;&lt;strong data-end=&#34;1625&#34; data-start=&#34;1595&#34;&gt;(2) Face-to-Face &lt;/strong&gt; — must occur&lt;span style=&#34;font-weight: 400;&#34;&gt; in a close, personal encounter where physical confrontation between involved parties &lt;/span&gt;is possible;&lt;/span&gt;&lt;/p&gt;
&lt;p data-end=&#34;1912&#34; data-start=&#34;1768&#34; style=&#34;padding-left: 40px;&#34;&gt;&lt;span style=&#34;font-size: 14pt;&#34;&gt;&lt;strong data-end=&#34;1797&#34; data-start=&#34;1768&#34;&gt;(3) Incite Immediate Physical Violence&lt;/strong&gt; — the speech must be so severe where an reasonable be provoked into &lt;span style=&#34;text-decoration: underline;&#34;&gt;immediate physical retaliation&lt;/span&gt; (not merely offend, disturb, or anger).&lt;/span&gt;&lt;/p&gt;
&lt;p data-end=&#34;2105&#34; data-start=&#34;1916&#34; style=&#34;padding-left: 40px;&#34;&gt;&lt;span style=&#34;font-size: 14pt;&#34;&gt;&lt;strong data-end=&#34;1979&#34; data-start=&#34;1916&#34;&gt;(4) Lack of Broader Value&lt;/strong&gt; — must exist purely as a personal insult and cannot be reasonably interpreted as having serious literary, artistic, political, or scientific value (“SLAPS” value)&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style=&#34;list-style-type: none;&#34;&gt;&lt;article class=&#34;text-token-text-primary w-full focus:outline-none [--shadow-height:45px] has-data-writing-block:pointer-events-none has-data-writing-block:-mt-(--shadow-height) has-data-writing-block:pt-(--shadow-height) [&amp;amp;:has([data-writing-block])&amp;gt;*]:pointer-events-auto [content-visibility:auto] supports-[content-visibility:auto]:[contain-intrinsic-size:auto_100lvh] scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]&#34; data-scroll-anchor=&#34;true&#34; data-testid=&#34;conversation-turn-50&#34; data-turn=&#34;assistant&#34; data-turn-id=&#34;request-WEB:1b7eb0e4-70fc-4417-b516-9fafb91b0d4c-30&#34; dir=&#34;auto&#34; tabindex=&#34;-1&#34;&gt;
&lt;div class=&#34;text-base my-auto mx-auto pb-10 [--thread-content-margin:--spacing(4)] thread-sm:[--thread-content-margin:--spacing(6)] thread-lg:[--thread-content-margin:--spacing(16)] px-(--thread-content-margin)&#34;&gt;
&lt;div class=&#34;[--thread-content-max-width:40rem] thread-lg:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn&#34; tabindex=&#34;-1&#34;&gt;
&lt;div class=&#34;flex max-w-full flex-col grow&#34;&gt;
&lt;div class=&#34;min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal [.text-message+&amp;amp;]:mt-1&#34; data-message-author-role=&#34;assistant&#34; data-message-id=&#34;d60f999b-2323-4294-b7c4-5075b509a734&#34; data-message-model-slug=&#34;gpt-5&#34; dir=&#34;auto&#34;&gt;
&lt;div class=&#34;flex w-full flex-col gap-1 empty:hidden first:pt-[1px]&#34;&gt;
&lt;div class=&#34;markdown prose dark:prose-invert w-full break-words light markdown-new-styling&#34;&gt;
&lt;p data-end=&#34;2539&#34; data-is-last-node=&#34;&#34; data-is-only-node=&#34;&#34; data-start=&#34;2107&#34;&gt;Once again, &lt;strong&gt;fighting words are an exceedingly narrow exception to free expression&lt;/strong&gt;, representing the constitutional system’s effort to balance the right to speak with the need to prevent immediate, face-to-face violence. Because these conditions are so strict, very few cases meet all four elements—even when the speech in question is highly offensive or hateful.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/article&gt;&lt;span style=&#34;color: #99ccff; font-size: 29px; font-variant-ligatures: common-ligatures; font-weight: bold;&#34;&gt;4.3 Obscenity (Miller&#39;s test)&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
The Supreme Court’s decision in &lt;strong&gt;&lt;em data-end=&#34;2256&#34; data-start=&#34;2234&#34;&gt;Miller v. California&lt;/em&gt;&lt;/strong&gt;(1973) established the three-part test for determining &lt;span style=&#34;color: #ffff99;&#34;&gt;&lt;strong data-end=&#34;2325&#34; data-start=&#34;2312&#34;&gt;obscenity&lt;/strong&gt;&lt;/span&gt;. [18]
&lt;p&gt;A work is considered obscene only if it satisfies &lt;strong&gt;ALL &lt;/strong&gt;of the following elements (also known as the&lt;strong&gt;&lt;span style=&#34;color: #ffff99;&#34;&gt; Miller&amp;rsquo;s test&lt;/span&gt;&lt;/strong&gt;):&lt;/p&gt;
&lt;p data-end=&#34;430&#34; data-start=&#34;184&#34; style=&#34;padding-left: 40px;&#34;&gt;&lt;span style=&#34;font-size: 14pt;&#34;&gt;&lt;strong&gt;(1) Appeals to the Prurient Interest&lt;/strong&gt; - That &lt;em data-end=&#34;286&#34; data-start=&#34;220&#34;&gt;“the average person, applying &lt;span style=&#34;text-decoration: underline;&#34;&gt;contemporary community standards&lt;/span&gt;,”&lt;/em&gt; would find that the work, taken as a whole, appeals to an excessive or unhealthy interest in sexual matters. [19]&lt;/span&gt;&lt;/p&gt;
&lt;p data-end=&#34;600&#34; data-start=&#34;435&#34; style=&#34;padding-left: 40px;&#34;&gt;&lt;span style=&#34;font-size: 14pt;&#34;&gt;&lt;strong&gt;(2) Patently Offensive &lt;/strong&gt;- Whether the work depicts or describes patently offensive &#34;&lt;em&gt;&#39;&lt;span style=&#34;text-decoration: underline;&#34;&gt;hard core&lt;/span&gt;&#39; sexual conduct specifically defined by the &lt;span style=&#34;text-decoration: underline;&#34;&gt;regulating state law&lt;/span&gt;, as written or construed.&#34; &lt;/em&gt;[20]&lt;/span&gt;&lt;/p&gt;
&lt;p data-end=&#34;785&#34; data-start=&#34;605&#34; style=&#34;padding-left: 40px;&#34;&gt;&lt;span style=&#34;font-size: 14pt;&#34;&gt;&lt;strong&gt;(3) &lt;/strong&gt;&lt;strong&gt;No &#34;SLAPS&#34; Value&lt;/strong&gt; - the work, taken as a whole, does not have &lt;span style=&#34;text-decoration: underline;&#34;&gt;serious literary&lt;/span&gt;, &lt;span style=&#34;text-decoration: underline;&#34;&gt;artistic&lt;/span&gt;, &lt;span style=&#34;text-decoration: underline;&#34;&gt;political,&lt;/span&gt; or &lt;span style=&#34;text-decoration: underline;&#34;&gt;scientific value&lt;/span&gt; (“&lt;strong&gt;SLAPS&lt;/strong&gt;” value). [21]&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;table style=&#34;width: 125.57%; border-collapse: collapse; background-color: #1c001b;&#34;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&#34;width: 100%; text-align: justify;&#34;&gt;
&lt;figure&gt;
  &lt;img alt=&#34;&#34; class=&#34;wp-image-1196 size-full&#34; height=&#34;703&#34; src=&#34;/images/uploads/2025/11/Free-Expression_Pornhub-Notice-to-Users-Page_Screen_Nov-1-2025-e1762154138925.png&#34; width=&#34;500&#34;/&gt;
  &lt;figcaption&gt;&lt;span style=&#34;color: #ffcc99; font-size: 0.8rem; font-family: terminal, monaco, monospace;&#34;&gt;Screenshot of adult video-sharing website Pornhub’s “Notice to User” page, captured on November 1, 2025. The page automatically appears when users attempt to access the site from regions subject to state-level age-verification laws. At the top of the notice, a video message features Dr. Cherie DeVille, an American licensed physician, adult film performer, and free speech advocate. In the clip, Dr. DeVille explains that recently enacted state statutes require age and identity verification before granting access to adult content. Her statement frames the measure as both a legal compliance notice and a policy commentary on the right to free expression in digital environments.&lt;/span&gt;&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;p data-end=&#34;793&#34; data-start=&#34;129&#34;&gt;&lt;span style=&#34;color: #000000; background-color: #ffff99;&#34;&gt;&lt;strong&gt;Age Verification Laws and Digital Rights&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p data-end=&#34;793&#34; data-start=&#34;129&#34; style=&#34;text-align: left;&#34;&gt;&lt;span style=&#34;color: #fcdcec; font-size: 12pt; font-family: arial, helvetica, sans-serif;&#34;&gt;Under the &lt;strong&gt;Miller&#39;s test&lt;/strong&gt;, most mainstream online pornography platforms are &lt;strong data-end=&#34;323&#34; data-start=&#34;267&#34;&gt;not likely to meet the legal definition of obscenity&lt;/strong&gt;. The &lt;em data-end=&#34;337&#34; data-start=&#34;329&#34;&gt;Miller&lt;/em&gt; framework narrowly defines obscenity as expression that appeals to prurient interests, depicts sexual conduct in a patently offensive way, and lacks serious literary, artistic, political, or scientific value. By contrast, U.S. courts have repeatedly held that consensual adult pornography constitutes protected speech (so long as it does not involve minors or non-consensual acts), as they may reasonably be understood as having some expressive or artistic value. [22]&lt;/span&gt;&lt;/p&gt;
&lt;p data-end=&#34;1468&#34; data-start=&#34;795&#34; style=&#34;text-align: left;&#34;&gt;&lt;span style=&#34;color: #fcdcec; font-size: 12pt; font-family: arial, helvetica, sans-serif;&#34;&gt;However, beginning around &lt;strong data-end=&#34;829&#34; data-start=&#34;821&#34;&gt;2021&lt;/strong&gt;, a global wave of adult-content removals and site-access restrictions emerged—not through direct governmental censorship, but via indirect enforcement mechanisms.&lt;/span&gt;&lt;/p&gt;
&lt;p data-end=&#34;1468&#34; data-start=&#34;795&#34; style=&#34;text-align: left;&#34;&gt;&lt;span style=&#34;color: #fcdcec; font-size: 12pt; font-family: arial, helvetica, sans-serif;&#34;&gt; Rather than invoking obscenity law, public authorities and private intermediaries have increasingly relied on &lt;strong data-end=&#34;1160&#34; data-start=&#34;1111&#34;&gt;trafficking and age-verification statutes&lt;/strong&gt; to limit access to online adult material. These include &lt;strong data-end=&#34;1248&#34; data-start=&#34;1217&#34;&gt;18 U.S.C. §§ 2257 and 2257A&lt;/strong&gt;, which mandate age and identity verification for all performers in sexually explicit content, and the &lt;strong data-end=&#34;1366&#34; data-start=&#34;1351&#34;&gt;FOSTA–SESTA&lt;/strong&gt; package (2018), which expanded platform liability for facilitating sex trafficking or prostitution. [23]&lt;/span&gt;&lt;/p&gt;
&lt;p data-end=&#34;1937&#34; data-start=&#34;1470&#34; style=&#34;text-align: left;&#34;&gt;&lt;span style=&#34;color: #fcdcec; font-size: 12pt; font-family: arial, helvetica, sans-serif;&#34;&gt;Under the threat of severe financial and legal penalties, credit card companies and&lt;strong data-end=&#34;1595&#34; data-start=&#34;1528&#34;&gt; payment processors suspended services&lt;/strong&gt; to adult-content platforms such as Pornhub until they implemented stricter &lt;strong&gt;user identity and age verification systems&lt;/strong&gt; that satisfied government and corporate compliance standards. This strategy effectively &lt;strong data-end=&#34;1827&#34; data-start=&#34;1789&#34;&gt;bypasses traditional obscenity law&lt;/strong&gt;, achieving &lt;em&gt;de facto&lt;/em&gt; regulation through economic pressure and private enforcement rather than court rulings.&lt;/span&gt;&lt;/p&gt;
&lt;p data-end=&#34;2630&#34; data-is-last-node=&#34;&#34; data-is-only-node=&#34;&#34; data-start=&#34;1939&#34; style=&#34;text-align: left;&#34;&gt;&lt;span style=&#34;color: #fcdcec; font-size: 12pt; font-family: arial, helvetica, sans-serif;&#34;&gt;Many &lt;strong data-end=&#34;1992&#34; data-start=&#34;1944&#34;&gt;digital rights and free expression advocates&lt;/strong&gt; have voiced concern that such measures, while intended to prevent exploitation, &lt;strong data-end=&#34;2124&#34; data-start=&#34;2073&#34;&gt;expand the infrastructure for online censorship&lt;/strong&gt; and &lt;strong data-end=&#34;2151&#34; data-start=&#34;2129&#34;&gt;erode user privacy&lt;/strong&gt;. Mandatory age-verification systems require users to upload sensitive identification documents, increasing the risk of data breaches, identity theft, and potential state surveillance. In this way, the contemporary regulation of adult content reflects a shift from moral censorship under obscenity doctrine to a new regime of &lt;strong data-end=&#34;2519&#34; data-start=&#34;2477&#34;&gt;bureaucratic and corporate gatekeeping&lt;/strong&gt;, where privacy and free expression are increasingly contingent on compliance with opaque verification systems. [24]&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/section&gt;&lt;section id=&#34;unprotected&#34;&gt;
&lt;div class=&#34;section-&#34;&gt;
&lt;div class=&#34;cols&#34;&gt;
&lt;div class=&#34;box&#34; id=&#34;ip&#34;&gt;
&lt;h3&gt;&lt;span style=&#34;color: #99ccff;&#34;&gt;4.4 Intellectual Property Violations&lt;/span&gt;&lt;/h3&gt;
&lt;p data-end=&#34;673&#34; data-start=&#34;203&#34;&gt;While the First Amendment protects expression, it does &lt;strong data-end=&#34;265&#34; data-start=&#34;258&#34;&gt;not&lt;/strong&gt; protect the unauthorized use of another person’s creative work. &lt;strong data-end=&#34;356&#34; data-start=&#34;330&#34;&gt;&lt;span style=&#34;color: #ffff99;&#34;&gt;Copyright infringement&lt;/span&gt; &lt;/strong&gt;is one of the most common forms of restricted speech in the digital age. In fact, the vast majority of online takedown and censorship cases involve intellectual property violations, not hate speech or political dissent.&lt;/p&gt;
&lt;p data-end=&#34;1325&#34; data-start=&#34;675&#34;&gt;Under U.S. law, copyright protection extends &lt;strong data-end=&#34;791&#34; data-start=&#34;720&#34;&gt;for the lifetime of the author plus 70 years after their death&lt;/strong&gt;, a duration considerably longer than in most other countries. Once that period expires, the work enters the &lt;strong data-end=&#34;917&#34; data-start=&#34;900&#34;&gt;public domain&lt;/strong&gt;, where it may be freely used, adapted, or redistributed.&lt;/p&gt;
&lt;p data-end=&#34;1325&#34; data-start=&#34;675&#34;&gt;However, a significant &lt;strong&gt;loophole&lt;/strong&gt; allows corporations to preserve their intellectual monopolies: by continually &lt;strong&gt;producing “new” versions or derivative works based on existing characters and franchises&lt;/strong&gt;. Each new iteration—whether a sequel, prequel, or cinematic remake—resets the clock on copyright protection for that specific creative expression. This system contributes to the recent wave of live-action remakes, reboots, and remasters of older works in film and television. [25]&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&#34;box&#34; id=&#34;criminal&#34; style=&#34;margin-top: 16px;&#34;&gt;
&lt;h3&gt;&lt;span style=&#34;color: #99ccff;&#34;&gt;4.5 Speech Integral to Criminal Conduct&lt;/span&gt;&lt;/h3&gt;
&lt;p data-end=&#34;619&#34; data-start=&#34;213&#34;&gt;The final major category of unprotected speech encompasses expressions that are themselves integral to&lt;span style=&#34;color: #ffff99;&#34;&gt; &lt;strong data-end=&#34;337&#34; data-start=&#34;272&#34;&gt;criminal activity&lt;/strong&gt;&lt;/span&gt;. Unlike controversial or offensive ideas—which remain protected under the First Amendment—these forms of communication are inseparable from the commission of a crime. The law draws a firm line between speech that &lt;em data-end=&#34;562&#34; data-start=&#34;551&#34;&gt;expresses&lt;/em&gt; an idea and speech that &lt;em data-end=&#34;593&#34; data-start=&#34;587&#34;&gt;acts&lt;/em&gt; as a mechanism of harm.&lt;/p&gt;
&lt;p data-end=&#34;1184&#34; data-start=&#34;621&#34;&gt;Examples include &lt;strong data-end=&#34;657&#34; data-start=&#34;638&#34;&gt;fraud &lt;/strong&gt;and&lt;strong data-end=&#34;657&#34; data-start=&#34;638&#34;&gt; scams&lt;/strong&gt;, where deceptive speech is used to obtain money or property through misrepresentation; the &lt;strong data-end=&#34;811&#34; data-start=&#34;749&#34;&gt;possession and distribution of child abuse material&lt;/strong&gt;, which is categorically excluded from protection because it involves the documentation of real criminal abuse; &lt;strong data-end=&#34;962&#34; data-start=&#34;923&#34;&gt;criminal solicitation or conspiracy&lt;/strong&gt;, in which language functions as the coordination or encouragement of illegal acts; and &lt;strong data-end=&#34;1111&#34; data-start=&#34;1050&#34;&gt;targeted harassment or threats of specific, imminent harm&lt;/strong&gt;, where speech directly endangers the safety of an identifiable person.&lt;/p&gt;
&lt;p data-end=&#34;1184&#34; data-start=&#34;621&#34;&gt;In the digital age, many of these offenses increasingly manifest as forms of &lt;span style=&#34;color: #ffff99;&#34;&gt;&lt;strong&gt;cybercrime&lt;/strong&gt;&lt;/span&gt;—where speech itself becomes both the medium and mechanism of violence. [26]&lt;/p&gt;
&lt;figure&gt;
  &lt;img alt=&#34;&#34; class=&#34;size-full wp-image-1199&#34; height=&#34;400&#34; src=&#34;/images/uploads/2025/11/2017_Petya_cyberattack_screenshot.png&#34; width=&#34;720&#34;/&gt;
  &lt;figcaption&gt;&lt;span style=&#34;font-size: 0.85rem; color: #ffcc00;&#34;&gt;Screenshot of the splash screen of the payload of the original version of&lt;strong&gt; Petya&lt;/strong&gt; – a family of ransomware that encrypts its victims&#39; hard drive and prevents their PC computers from booting. It subsequently demands that its victims to make a payment in cryptocurrency (typically Bitcoin) in order to regain access to their PCs.&lt;/span&gt;&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;p data-end=&#34;1184&#34; data-start=&#34;621&#34;&gt;An example illustrating this boundary is the case of &lt;strong data-end=&#34;1260&#34; data-start=&#34;1251&#34;&gt;Petya&lt;/strong&gt;, a family of &lt;strong&gt;ransomware&lt;/strong&gt; first identified in 2016. Petya malware encrypts the victim’s hard drive and prevents their computer from booting, displaying a ransom note demanding payment in &lt;strong&gt;cryptocurrency&lt;/strong&gt; (such as Bitcoin) to restore access. [27]&lt;/p&gt;
&lt;hr/&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/section&gt;&lt;!-- Internet censorship &amp; rights --&gt;
&lt;section id=&#34;censorship&#34;&gt;
&lt;div class=&#34;section-&#34;&gt;
&lt;h2&gt;&lt;span style=&#34;color: #00ffff;&#34;&gt;5) Internet Censorship &amp;amp; Communication Rights&lt;/span&gt;&lt;/h2&gt;
&lt;div class=&#34;cols&#34;&gt;
&lt;div&gt;
&lt;p&gt;As discussed in our &lt;a href=&#34;/teaching/2025/10/teaching-the-internet-the-internet-from-nuclear-hardened-networks-to-algorithmic-governmentality/&#34; rel=&#34;noopener&#34; target=&#34;_blank&#34;&gt;&lt;strong&gt;previous lesson, the internet remains an enduring paradox&lt;/strong&gt;&lt;/a&gt;: it is both an infrastructure of free expression and a technology of control. On one level, it has democratized access to speech and empowered individuals to publish, organize, and collaborate across geographic and political boundaries. Yet the same architecture that enables open exchange also provides governments and corporations with unparalleled capacities for &lt;strong data-end=&#34;834&#34; data-start=&#34;764&#34;&gt;surveillance, behavioral manipulation, and information restriction&lt;/strong&gt;. In this way, the internet operates simultaneously as a public sphere and a system of governance—a space where freedom and regulation constantly collide.&lt;/p&gt;
&lt;table style=&#34;border-collapse: collapse; width: 109.941%;&#34;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&#34;width: 100%;&#34;&gt;
&lt;h4&gt;&lt;span style=&#34;color: #333333; background-color: #ffff99;&#34;&gt;&lt;strong&gt;Forms of Internet Censorship:&lt;/strong&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;p style=&#34;padding-left: 40px;&#34;&gt;&lt;span style=&#34;color: #ccffff; font-family: terminal, monaco, monospace; font-size: 14pt;&#34;&gt;&lt;b&gt;&lt;span style=&#34;color: #ffff99;&#34;&gt;Content Blocking&lt;/span&gt;:&lt;/b&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt; when Internet Service Providers (ISPs) or regulatory agencies restrict access to certain websites, social media platforms, or news outlets—often justified in the name of national security or “public morality.” [28]&lt;/span&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style=&#34;padding-left: 40px;&#34;&gt;&lt;span style=&#34;color: #ccffff; font-family: terminal, monaco, monospace; font-size: 14pt;&#34;&gt;&lt;b&gt;&lt;span style=&#34;color: #ffff99;&#34;&gt;Surveillance &amp;amp; Data Harvesting&lt;/span&gt;:&lt;/b&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt; allow both states and private firms to monitor user activity, constructing detailed behavioral profiles that can be used to shape, predict, remove, or &#34;shadow ban&#34; speech.&lt;a href=&#34;https://www.jstor.org/stable/48788933&#34; rel=&#34;noopener&#34; target=&#34;_blank&#34;&gt;&lt;span style=&#34;color: #ffff99;&#34;&gt;[29]&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style=&#34;padding-left: 40px;&#34;&gt;&lt;span style=&#34;color: #ccffff; font-family: terminal, monaco, monospace; font-size: 14pt;&#34;&gt;&lt;b&gt;&lt;span style=&#34;color: #ffff99;&#34;&gt;Algorithmic Filtering&lt;/span&gt;:&lt;/b&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt; Platforms algorithmically curate or suppress visibility of particular content, can be driven by the economic logic of engagement or government pressure.[30]&lt;/span&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style=&#34;padding-left: 40px;&#34;&gt;&lt;span style=&#34;color: #ccffff; font-family: terminal, monaco, monospace; font-size: 14pt;&#34;&gt;&lt;b&gt;&lt;span style=&#34;color: #ffff99;&#34;&gt;Legal/Administrative Pressure&lt;/span&gt;:&lt;/b&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt; Arrests, fines, or online takedown orders targeting journalists, activists, users, ISPs, sites and payment processors.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;span style=&#34;color: #ccffff; font-size: 29px; font-variant-ligatures: common-ligatures; font-weight: bold;&#34;&gt;5.1 Communication Rights&lt;/span&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div class=&#34;box&#34;&gt;
&lt;p&gt;In response to these pressures, scholars and civil society groups have advanced the framework of &lt;span style=&#34;color: #ffff99;&#34;&gt;&lt;strong data-end=&#34;2063&#34; data-start=&#34;2039&#34;&gt;communication rights&lt;/strong&gt;&lt;/span&gt;, extending the logic of free speech into the digital age. These rights include:&lt;/p&gt;
&lt;table style=&#34;width: 100%; border-collapse: collapse; background-color: #021a38;&#34;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&#34;width: 100%;&#34;&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;&lt;strong data-end=&#34;2217&#34; data-start=&#34;2147&#34;&gt;&lt;span style=&#34;color: #ffff99;&#34;&gt;The right to information&lt;/span&gt; - f&lt;/strong&gt;reedom to seek, receive, and impart information&lt;strong data-end=&#34;2217&#34; data-start=&#34;2147&#34;&gt; &lt;/strong&gt;through any media (UN Declaration of Human Rights, Art. 19).&lt;/span&gt;
&lt;strong&gt;&lt;span style=&#34;color: #ffff99;&#34;&gt;The right to equitable digital access&lt;/span&gt; -&lt;/strong&gt; free from discriminatory throttling or commercial gatekeeping.
&lt;p&gt;&lt;span style=&#34;color: #ffff99;&#34;&gt;&lt;strong&gt;Freedom from surveillance &lt;/strong&gt;&lt;/span&gt;- protection from arbitrary surveillance and content restriction.&lt;/p&gt;
&lt;p&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;&lt;span style=&#34;color: #ffff99;&#34;&gt;&lt;strong&gt;Data privacy&lt;/strong&gt; &lt;/span&gt;- protection of personal data from being collected and used without user&amp;rsquo;s authorization.&lt;/span&gt;&lt;/td&gt;&lt;/p&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
Together, these principles reflect the spirit of &lt;em data-end=&#34;2618&#34; data-start=&#34;2561&#34;&gt;Article 19 of the Universal Declaration of Human Rights&lt;/em&gt; (1948), which recognizes that the ability to communicate “through any media and regardless of frontiers” is essential to both human dignity and democratic governance.
&lt;p&gt;Together, these principles reflect the spirit of &lt;em data-end=&#34;2618&#34; data-start=&#34;2561&#34;&gt;Article 19 of the Universal Declaration of Human Rights&lt;/em&gt; (1948), which recognizes that the ability to communicate “through any media and regardless of frontiers” is essential to both human dignity and democratic governance. [31]&lt;/p&gt;
&lt;p&gt;The persistent &lt;span style=&#34;color: #ffff99;&#34;&gt;&lt;strong data-end=&#34;2825&#34; data-start=&#34;2804&#34;&gt;balancing problem&lt;/strong&gt;&lt;/span&gt; for communication rights lies in reconciling &lt;strong&gt;legitimate security concerns&lt;/strong&gt; with the preservation of &lt;strong&gt;user rights protections&lt;/strong&gt;. Measures enacted under the guise of protecting citizens (e.g. to combat terrorism, misinformation, or cybercrime) can easily evolve into permanent instruments of control. &lt;strong&gt;&lt;span style=&#34;color: #ff00ff;&#34;&gt;Once extraordinary powers are normalized, they seldom retreat&lt;/span&gt;.&lt;/strong&gt; Thus, maintaining an open and pluralistic internet requires institutional &lt;strong data-end=&#34;3318&#34; data-start=&#34;3250&#34;&gt;transparency, &lt;/strong&gt;public &lt;strong&gt;oversight&lt;/strong&gt;, and &lt;strong data-end=&#34;3318&#34; data-start=&#34;3250&#34;&gt;digital literacy&lt;/strong&gt; to ensure that digital protections do not quietly become digital censorship. [32]&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/section&gt;&lt;!-- VPNs --&gt;
&lt;section id=&#34;vpn&#34;&gt;
&lt;div class=&#34;section-&#34;&gt;
&lt;h3&gt;&lt;span style=&#34;color: #99ccff;&#34;&gt;5.1 VPNs: Benefits and Constraints&lt;/span&gt;&lt;/h3&gt;
&lt;div class=&#34;cols&#34;&gt;
&lt;div&gt;
&lt;p&gt;A &lt;strong data-end=&#34;291&#34; data-start=&#34;258&#34;&gt;Virtual Private Network (VPN)&lt;/strong&gt; is a tool that encrypts a user’s internet traffic and routes it through a remote server, effectively masking the user’s IP address and geographic location. In doing so, VPNs provide a degree of privacy and autonomy in digital communication, which can be vital for journalists, activists, or citizens in countries with heavy online surveillance.&lt;/p&gt;
&lt;p&gt;From a free speech perspective, VPNs extend the practical reach of expression by allowing individuals to &lt;strong data-end=&#34;763&#34; data-start=&#34;742&#34;&gt;bypass censorship&lt;/strong&gt;, &lt;strong data-end=&#34;798&#34; data-start=&#34;765&#34;&gt;access restricted information&lt;/strong&gt;, and &lt;strong data-end=&#34;831&#34; data-start=&#34;804&#34;&gt;protect their anonymity&lt;/strong&gt; while engaging in political or social discourse. However, while VPNs are often marketed as instruments of digital freedom, they also introduce new ethical, legal, and trust-based dilemmas.&lt;/p&gt;
&lt;table style=&#34;width: 112.784%; border-collapse: collapse; background-color: #140101;&#34;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&#34;width: 100%;&#34;&gt;
&lt;h4&gt;&lt;span style=&#34;background-color: #ccffcc; color: #000000;&#34;&gt;&lt;strong&gt;Why users adopt VPNs&lt;/strong&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;p data-end=&#34;1156&#34; data-start=&#34;1053&#34; style=&#34;padding-left: 40px;&#34;&gt;&lt;span style=&#34;font-size: 14pt;&#34;&gt;&lt;strong data-end=&#34;1073&#34; data-start=&#34;1053&#34;&gt;Mask IP location&lt;/strong&gt; to reduce tracking and profiling by advertisers, governments, or hostile actors.&lt;/span&gt;&lt;/p&gt;
&lt;p data-end=&#34;1263&#34; data-start=&#34;1159&#34; style=&#34;padding-left: 40px;&#34;&gt;&lt;span style=&#34;font-size: 14pt;&#34;&gt;&lt;strong data-end=&#34;1206&#34; data-start=&#34;1159&#34;&gt;Limit ISP and search engine data collection&lt;/strong&gt;, preventing providers from logging browsing histories.&lt;/span&gt;&lt;/p&gt;
&lt;p data-end=&#34;1367&#34; data-start=&#34;1266&#34; style=&#34;padding-left: 40px;&#34;&gt;&lt;span style=&#34;font-size: 14pt;&#34;&gt;&lt;strong data-end=&#34;1314&#34; data-start=&#34;1266&#34;&gt;Bypass censorship and geo-restricted content&lt;/strong&gt;, such as blocked news sites or streaming services.&lt;/span&gt;&lt;/p&gt;
&lt;p data-end=&#34;1457&#34; data-start=&#34;1370&#34; style=&#34;padding-left: 40px;&#34;&gt;&lt;span style=&#34;font-size: 14pt;&#34;&gt;&lt;strong data-end=&#34;1398&#34; data-start=&#34;1370&#34;&gt;Mitigate dynamic pricing&lt;/strong&gt; based on a user’s location, device, or browsing history.&lt;/span&gt;&lt;/p&gt;
&lt;h4&gt;&lt;span style=&#34;color: #000000; background-color: #ccffcc;&#34;&gt;&lt;strong&gt;Secure, nonprofit options&lt;/strong&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;span style=&#34;font-size: 14pt;&#34;&gt;Most commercial VPNs operate under opaque ownership structures, and many “free” VPNs monetize user data through surveillance advertising or analytics resale. By contrast, a small number of nonprofit projects are designed explicitly to serve privacy and anti-censorship goals:&lt;/span&gt;
&lt;ul&gt;
&lt;li style=&#34;list-style-type: none;&#34;&gt;
&lt;ul&gt;
&lt;li style=&#34;list-style-type: none;&#34;&gt;
&lt;ul&gt;
&lt;li data-end=&#34;1985&#34; data-start=&#34;1769&#34;&gt;
&lt;p data-end=&#34;1985&#34; data-start=&#34;1771&#34;&gt;&lt;span style=&#34;font-size: 14pt;&#34;&gt;&lt;strong data-end=&#34;1785&#34; data-start=&#34;1771&#34;&gt;Riseup VPN&lt;/strong&gt; — One of the few legitimate free and open VPN services, supported entirely by charitable donations from privacy and anti-censorship advocates. &lt;a class=&#34;decorated-link&#34; data-end=&#34;1983&#34; data-start=&#34;1929&#34; href=&#34;https://riseup.net/en/vpn&#34; rel=&#34;noopener&#34; target=&#34;_new&#34;&gt;https://riseup.net/en/vpn&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li data-end=&#34;2223&#34; data-start=&#34;1986&#34;&gt;
&lt;p data-end=&#34;2223&#34; data-start=&#34;1988&#34;&gt;&lt;span style=&#34;font-size: 14pt;&#34;&gt;&lt;strong data-end=&#34;2001&#34; data-start=&#34;1988&#34;&gt;ProtonVPN&lt;/strong&gt; — Founded by scientists at CERN and initially financed through a community crowdfunding campaign; now operated by the Swiss-based nonprofit Proton Foundation. &lt;a class=&#34;decorated-link&#34; data-end=&#34;2221&#34; data-start=&#34;2161&#34; href=&#34;https://github.com/ProtonVPN&#34; rel=&#34;noopener&#34; target=&#34;_new&#34;&gt;https://github.com/ProtonVPN&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;span style=&#34;background-color: #ffff99; color: #000000;&#34;&gt;Constraints and Ethical Implications&lt;/span&gt;&lt;/h4&gt;
&lt;ul&gt;
&lt;li style=&#34;list-style-type: none;&#34;&gt;
&lt;ul&gt;
&lt;li style=&#34;list-style-type: none;&#34;&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&#34;font-weight: 400; font-size: 14pt;&#34;&gt;A VPN doesn’t make you completely immune to all tracking: Websites can still identify users via cookies, browser fingerprinting, or account logins. &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;font-weight: 400; font-size: 14pt;&#34;&gt;A VPN hides user data from the ISP, but the VPN provider can see user traffic. &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;font-weight: 400; font-size: 14pt;&#34;&gt;Cybercriminals, (e.g.,  ransomware authors) also use VPNs to conceal their identities&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;font-weight: 400; font-size: 14pt;&#34;&gt;In some countries (e.g., Belarus, Egypt, Iran, Pakistan, PRC, Russia, Turkey, Turkmenistan, UAE), using a VPN is restricted or banned.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/section&gt;&lt;!-- Tor --&gt;
&lt;section id=&#34;tor&#34;&gt;
&lt;div class=&#34;section-&#34;&gt;
&lt;h3&gt;&lt;span style=&#34;color: #99ccff;&#34;&gt;5.2 The Tor Network and the “Dark Web”&lt;/span&gt;&lt;/h3&gt;
&lt;table style=&#34;border-collapse: collapse; width: 128.409%;&#34;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&#34;width: 100%;&#34;&gt;
&lt;figure&gt;
  &lt;img alt=&#34;&#34; class=&#34;size-full wp-image-1202&#34; height=&#34;1024&#34; src=&#34;/images/uploads/2025/11/Free-Expression_Tor-Project-android-security-settings.gif&#34; width=&#34;512&#34;/&gt;
  &lt;figcaption&gt;&lt;span style=&#34;color: #ffff99;&#34;&gt;Tor Browser is available in two versions for Android—standard and alpha. Non-technical users are advised to install the standard release, which is more stable and less prone to errors. The official Tor Browser for Android can be safely downloaded from the Google Play Store, F-Droid, or the Tor Project’s official website; obtaining it from any other source poses significant security risks.&lt;/span&gt;&lt;br/&gt;&lt;span style=&#34;color: #ff9900;&#34;&gt;Source: Tor Project. Mobile Tor Manual. Last modified 2024. https://iacobus.pages.torproject.net/manual/ca/mobile-tor/&lt;/span&gt;&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;p data-end=&#34;3922&#34; data-start=&#34;3383&#34;&gt;Whereas a VPN relies on a single provider to encrypt and reroute traffic, &lt;strong data-end=&#34;3483&#34; data-start=&#34;3457&#34;&gt;&lt;span style=&#34;color: #ffff99;&#34;&gt;Tor&lt;/span&gt; &lt;/strong&gt;(also known as the Onion Router)&lt;strong data-end=&#34;3483&#34; data-start=&#34;3457&#34;&gt; -- &lt;/strong&gt;an &lt;span style=&#34;color: #ffff99;&#34;&gt;&lt;strong data-end=&#34;3483&#34; data-start=&#34;3457&#34;&gt;open source, open access &lt;/strong&gt;&lt;/span&gt;&lt;strong&gt;project&lt;/strong&gt; &lt;strong data-end=&#34;3483&#34; data-start=&#34;3457&#34;&gt;--&lt;/strong&gt; distributes this process across a &lt;strong&gt;decentralized network&lt;/strong&gt; of volunteer-run servers, or “relays.”&lt;/p&gt;
&lt;p data-end=&#34;3922&#34; data-start=&#34;3383&#34;&gt;As data travels through multiple nodes, each layer of encryption is peeled away like an onion, ensuring that &lt;span style=&#34;background-color: #ccffcc; color: #000000;&#34;&gt;&lt;strong data-end=&#34;3769&#34; data-start=&#34;3687&#34;&gt;no single relay knows both who the user is and what content they are accessing&lt;/strong&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p data-end=&#34;3922&#34; data-start=&#34;3383&#34;&gt;This structure minimizes centralized control and makes it exceptionally difficult for surveillance systems to trace communication back to its origin. [33]&lt;/p&gt;
&lt;p data-end=&#34;4542&#34; data-start=&#34;3924&#34;&gt;Tor serves as both a technical safeguard for privacy and a philosophical statement about informational freedom. For users in heavily censored environments, Tor can mean the difference between silence and participation.&lt;/p&gt;
&lt;p data-end=&#34;4542&#34; data-start=&#34;3924&#34;&gt;Yet Tor’s very strength—its multilayered anonymity—also fuels public suspicion. The same system that protects dissidents and reporters can be used by criminals to conduct illicit trade, distribute malware, or traffic in stolen data.&lt;/p&gt;
&lt;p data-end=&#34;5074&#34; data-start=&#34;4544&#34;&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;div class=&#34;cols&#34;&gt;
&lt;div&gt;
&lt;table style=&#34;width: 129.972%; border-collapse: collapse;&#34;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;h4&gt;&lt;span style=&#34;color: #000000; background-color: #ccffcc; font-family: terminal, monaco, monospace;&#34;&gt;&lt;strong&gt;Advantages of using Tor&lt;/strong&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;p style=&#34;padding-left: 40px;&#34;&gt;&lt;span style=&#34;font-family: terminal, monaco, monospace; font-size: 14pt;&#34;&gt;&lt;b&gt;Circumvent Censorship: &lt;/b&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;Enables users in restrictive regimes to access blocked sites and communication tools. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style=&#34;padding-left: 40px;&#34;&gt;&lt;span style=&#34;font-family: terminal, monaco, monospace; font-size: 14pt;&#34;&gt;&lt;b&gt;Protect Privacy: &lt;/b&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;conceals both user identity &amp;amp; browsing activity from ISPs, governments, and advertisers.&lt;/span&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style=&#34;padding-left: 40px;&#34;&gt;&lt;span style=&#34;font-family: terminal, monaco, monospace; font-size: 14pt;&#34;&gt;&lt;b&gt;Digital Democracy: &lt;/b&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;Tor Project is open-source and community-run. Journalists, activists, and whistleblowers use it to safely  share information without fear of retaliation.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;h4&gt;&lt;span style=&#34;color: #000000; background-color: #ffff99; font-family: terminal, monaco, monospace;&#34;&gt;&lt;strong&gt;Constraints &amp;amp; Ethical Concerns&lt;/strong&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;p style=&#34;padding-left: 40px;&#34;&gt;&lt;span style=&#34;font-family: terminal, monaco, monospace;&#34;&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;Tor can be &lt;/span&gt;&lt;b&gt;slow &lt;/b&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;due to multiple encryption layers and limited volunteer bandwidth.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style=&#34;padding-left: 40px;&#34;&gt;&lt;span style=&#34;font-family: terminal, monaco, monospace;&#34;&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;While Tor safeguards legitimate users, it is also exploited for &lt;/span&gt;&lt;b&gt;cybercrimes &lt;/b&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;such as illegal marketplaces &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style=&#34;padding-left: 40px;&#34;&gt;&lt;span style=&#34;font-family: terminal, monaco, monospace;&#34;&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;Just like the VPNs, access to Tor is also heavily restricted in &lt;/span&gt;&lt;a href=&#34;https://forum.torproject.org/t/tor-project-re-are-there-countries-where-using-tor-is-illegal/18862&#34; rel=&#34;noopener&#34; target=&#34;_blank&#34;&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;many countries&lt;/span&gt;&lt;/a&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/section&gt;&lt;!-- Reflection --&gt;
&lt;section id=&#34;reflect&#34;&gt;
&lt;div class=&#34;section-&#34;&gt;
&lt;p&gt; &lt;/p&gt;
&lt;hr/&gt;
&lt;/div&gt;
&lt;/section&gt;&lt;!-- References --&gt;
&lt;section id=&#34;references&#34;&gt;
&lt;div class=&#34;section-&#34;&gt;
&lt;h2&gt;&lt;span style=&#34;color: #ffcc99; font-family: terminal, monaco, monospace;&#34;&gt;References&lt;/span&gt;&lt;/h2&gt;
&lt;table style=&#34;width: 139.771%; border-collapse: collapse; background-color: #290d28;&#34;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&#34;width: 100%;&#34;&gt;
&lt;ol&gt;
&lt;li&gt;&lt;span style=&#34;color: #ffcc99; font-family: terminal, monaco, monospace; font-size: 12pt;&#34;&gt;Cohen-Almagor, Raphael. &lt;i&gt;The scope of tolerance: Studies on the costs of free expression and freedom of the press&lt;/i&gt;. Routledge, 2005.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ffcc99; font-family: terminal, monaco, monospace; font-size: 12pt;&#34;&gt;Brownstein, Alan E. &#34;Harmonizing the Heavenly and Earthly Spheres: The Fragmentation and Synthesis of Religion, Equality, and Speech in the Constitution.&#34; &lt;i&gt;Ohio St. LJ&lt;/i&gt; 51 (1990): 89.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ffcc99; font-family: terminal, monaco, monospace; font-size: 12pt;&#34;&gt;Balkin, Jack M. &#34;Digital speech and democratic culture: A theory of freedom of expression for the information society.&#34; In &lt;i&gt;Law and Society approaches to cyberspace&lt;/i&gt;, pp. 325-382. Routledge, 2017.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ffcc99; font-family: terminal, monaco, monospace; font-size: 12pt;&#34;&gt;United Nations. General Assembly. &lt;i&gt;Universal declaration of human rights&lt;/i&gt;. Vol. 3381. Department of State, United States of America, 1949.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ffcc99; font-family: terminal, monaco, monospace; font-size: 12pt;&#34;&gt;McLeod, Sharynne. &#34;Communication rights: Fundamental human rights for all.&#34; &lt;i&gt;International journal of speech-language pathology&lt;/i&gt; 20, no. 1 (2018): 3-11.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ffcc99; font-family: terminal, monaco, monospace; font-size: 12pt;&#34;&gt;Mallén, Ignacio Bel. &#34;Freedom as the Essential Basis for Communication Rights.&#34; &lt;i&gt;The Handbook of Communication Rights, Law, and Ethics: Seeking Universality, Equality, Freedom and Dignity&lt;/i&gt; (2021): 7-19.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ffcc99; font-family: terminal, monaco, monospace; font-size: 12pt;&#34;&gt;Bradburn, Douglas. &#34;A clamor in the public mind: Opposition to the Alien and Sedition Acts.&#34; &lt;i&gt;The William and Mary Quarterly&lt;/i&gt; 65, no. 3 (2008): 565-600.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ffcc99; font-family: terminal, monaco, monospace; font-size: 12pt;&#34;&gt;Levy, Leonard W. &#34;Liberty and the First Amendment: 1790-1800.&#34; &lt;i&gt;The American Historical Review&lt;/i&gt; 68, no. 1 (1962): 22-37.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ffcc99; font-family: terminal, monaco, monospace; font-size: 12pt;&#34;&gt;Jeffries Jr, John Calvin. &#34;Rethinking Prior Restraint.&#34; &lt;i&gt;Yale LJ&lt;/i&gt; 92 (1982): 409.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ffcc99; font-family: terminal, monaco, monospace; font-size: 12pt;&#34;&gt;Meyerson, Michael I. &#34;Rewriting Near v. Minnesota: Creating a Complete Definition of Prior Restraint.&#34; &lt;i&gt;Mercer L. Rev.&lt;/i&gt; 52 (2000): 1087.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ffcc99; font-family: terminal, monaco, monospace; font-size: 12pt;&#34;&gt;Godofsky, Stanley, and Howard M. Rogatnick. &#34;Prior Restraints: The Pentagon Papers Case Revisited.&#34; &lt;i&gt;Cumb. L. Rev.&lt;/i&gt; 18 (1987): 527.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ffcc99; font-family: terminal, monaco, monospace; font-size: 12pt;&#34;&gt;Dumain, Ian M. &#34;No secret, no defense: United States v. progressive.&#34; &lt;i&gt;Cardozo L. Rev.&lt;/i&gt; 26 (2004): 1323.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ffcc99; font-family: terminal, monaco, monospace; font-size: 12pt;&#34;&gt;Lieffring, Staci. &#34;First Amendment and the right to lie: Regulating knowingly false campaign speech after United States v. Alvarez.&#34; &lt;i&gt;Minn. L. Rev.&lt;/i&gt; 97 (2012): 1047.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ffcc99; font-family: terminal, monaco, monospace; font-size: 12pt;&#34;&gt;Farber, Daniel A. &#34;Civilizing public discourse: An essay on Professor Bickel, Justice Harlan, and the enduring significance of Cohen v. California.&#34; &lt;i&gt;Duke LJ&lt;/i&gt; (1980): 283.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ffcc99; font-family: terminal, monaco, monospace; font-size: 12pt;&#34;&gt;Dienes, C. Thomas, and Lee Levine. &#34;Implied Libel, Defamatory Meaning, and State of Mind: The Promise of New York Times Co. v. Sullivan.&#34; &lt;i&gt;Iowa L. Rev.&lt;/i&gt; 78 (1992): 237.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ffcc99; font-family: terminal, monaco, monospace; font-size: 12pt;&#34;&gt;This protection was firmly established in &lt;strong data-end=&#34;1658&#34; data-start=&#34;1618&#34;&gt;&lt;em data-end=&#34;1649&#34; data-start=&#34;1620&#34;&gt;Hustler Magazine v. Falwell&lt;/em&gt; (1988)&lt;/strong&gt;, where the Supreme Court held that even offensive parodies of public figures are constitutionally protected so long as they cannot reasonably be interpreted as factual claims.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ffcc99; font-family: terminal, monaco, monospace; font-size: 12pt;&#34;&gt;Wright, R. George. &#34;Fighting Words Today.&#34; &lt;i&gt;Pepp. L. Rev.&lt;/i&gt; 49 (2022): 805.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ffcc99; font-family: terminal, monaco, monospace; font-size: 12pt;&#34;&gt;&lt;em&gt;Miller v. California,&lt;/em&gt; 413 U.S. 15 (1973).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ffcc99; font-family: terminal, monaco, monospace; font-size: 12pt;&#34;&gt;&lt;em&gt;Miller v. California,&lt;/em&gt; 413 U.S. 15, 15 (1973). &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ffcc99; font-family: terminal, monaco, monospace; font-size: 12pt;&#34;&gt;&lt;em&gt;Ibid., &lt;/em&gt;at 27. &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ffcc99; font-family: terminal, monaco, monospace; font-size: 12pt;&#34;&gt;&lt;em&gt;Ibid., &lt;/em&gt;at 15, 23.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ffcc99; font-family: terminal, monaco, monospace; font-size: 12pt;&#34;&gt;Karniel, Yuval, and Haim Wismonsky. &#34;Pornography, Community and the Internet-Freedom of Speech and Obscenity on the Internet.&#34; &lt;i&gt;Rutgers Computer &amp;amp; Tech. LJ&lt;/i&gt; 30 (2004): 105.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ffcc99; font-family: terminal, monaco, monospace; font-size: 12pt;&#34;&gt;Marsden, Christine. &#34;Age-verification laws in the era of digital privacy.&#34; &lt;i&gt;Nat&#39;l Sec. LJ&lt;/i&gt; 10 (2023): 210.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ffcc99; font-family: terminal, monaco, monospace; font-size: 12pt;&#34;&gt;Murray, Alana, Huma Chhipa, and Johnathan Yerby. &#34;Cyber risk, privacy, and the legal complexities of age verification for adult content platforms.&#34; &lt;i&gt;Issues in Information Systems&lt;/i&gt; 26, no. 4 (2025): 332-347.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ffcc99; font-family: terminal, monaco, monospace; font-size: 12pt;&#34;&gt;Bowrey, Kathy, and Michael Handler, eds. &lt;i&gt;Law and Creativity in the Age of the Entertainment Franchise&lt;/i&gt;. No. 27. Cambridge University Press, 2014.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ffcc99; font-family: terminal, monaco, monospace; font-size: 12pt;&#34;&gt;Holt, Thomas, and Adam Bossler. &lt;i&gt;Cybercrime in progress: Theory and prevention of technology-enabled offenses&lt;/i&gt;. Routledge, 2015.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ffcc99; font-family: terminal, monaco, monospace; font-size: 12pt;&#34;&gt;Fayi, Sharifah Yaqoub A. &#34;What Petya/NotPetya ransomware is and what its remidiations are.&#34; In &lt;i&gt;Information technology-new generations: 15th international conference on information technology&lt;/i&gt;, pp. 93-100. Cham: Springer International Publishing, 2018.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ffcc99; font-family: terminal, monaco, monospace; font-size: 12pt;&#34;&gt;Ververis, Vasilis, Sophia Marguel, and Benjamin Fabian. &#34;Cross‐Country comparison of Internet censorship: A literature review.&#34; &lt;i&gt;Policy &amp;amp; Internet&lt;/i&gt; 12, no. 4 (2020): 450-473.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ffcc99; font-family: terminal, monaco, monospace; font-size: 12pt;&#34;&gt;&lt;a href=&#34;https://www.jstor.org/stable/48788933&#34; rel=&#34;noopener&#34; target=&#34;_blank&#34;&gt;Wang, Keren. &#34;Legal and Ritological Dynamics of Personalized “Pillars of Shame” in Chinese Social Credit System Construction.&#34; &lt;i&gt;China review&lt;/i&gt; 24, no. 3 (2024): 179-206. https://www.jstor.org/stable/48788933&lt;/a&gt;
&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ffcc99; font-family: terminal, monaco, monospace; font-size: 16px;&#34;&gt;Cobbe, Jennifer. &#34;Algorithmic censorship by social platforms: Power and resistance.&#34; &lt;/span&gt;&lt;i style=&#34;color: #ffcc99; font-family: terminal, monaco, monospace; font-size: 16px;&#34;&gt;Philosophy &amp;amp; Technology&lt;/i&gt;&lt;span style=&#34;color: #ffcc99; font-family: terminal, monaco, monospace; font-size: 16px;&#34;&gt; 34, no. 4 (2021): 739-766.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ffcc99; font-family: terminal, monaco, monospace; font-size: 16px;&#34;&gt;McLeod, Sharynne. &#34;Communication rights: Fundamental human rights for all.&#34; &lt;/span&gt;&lt;i style=&#34;color: #ffcc99; font-family: terminal, monaco, monospace; font-size: 16px;&#34;&gt;International journal of speech-language pathology&lt;/i&gt;&lt;span style=&#34;color: #ffcc99; font-family: terminal, monaco, monospace; font-size: 16px;&#34;&gt; 20, no. 1 (2018): 3-11.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ffcc99; font-family: terminal, monaco, monospace; font-size: 16px;&#34;&gt;Bennett, W. Lance, and Barbara Pfetsch. &#34;Rethinking political communication in a time of disrupted public spheres.&#34; &lt;i&gt;Journal of communication&lt;/i&gt; 68, no. 2 (2018): 243-253. &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ffcc99; font-family: terminal, monaco, monospace; font-size: 16px;&#34;&gt;AlSabah, Mashael, and Ian Goldberg. &#34;Performance and security improvements for tor: A survey.&#34; &lt;i&gt;ACM Computing Surveys (CSUR)&lt;/i&gt; 49, no. 2 (2016): 1-36.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;/section&gt; 
&lt;/div&gt;</description>
    </item>
    <item>
      <title>Fake News: Concepts, Rhetorical Disruptions, and Policy Implications</title>
      <link>/teaching/2025/10/fake-news-concepts-rhetorical-disruptions-and-policy-implications/</link>
      <pubDate>Mon, 27 Oct 2025 00:26:53 +0000</pubDate>
      <guid>/teaching/2025/10/fake-news-concepts-rhetorical-disruptions-and-policy-implications/</guid>
      <description>&lt;div class=&#34;scom2050-lesson&#34; style=&#34;font-family: system-ui,-apple-system,Segoe UI,Roboto,Helvetica,Arial,sans-serif; line-height: 1.55; max-width: 880px; margin: 0 auto;&#34;&gt;
&lt;header style=&#34;margin: 1.2rem 0 .75rem;&#34;&gt;
&lt;p class=&#34;muted&#34; style=&#34;margin: .25rem 0 0;&#34;&gt;&lt;em&gt;&lt;strong&gt;Media, Society, and Culture&lt;/strong&gt; Lesson Module&lt;/em&gt;&lt;/p&gt;
&lt;img alt=&#34;&#34; class=&#34;aligncenter size-full wp-image-1172&#34; height=&#34;688&#34; src=&#34;/images/uploads/2025/10/Fake-News-Header.gif&#34; width=&#34;1280&#34;/&gt;
&lt;/header&gt;&lt;section style=&#34;margin: 1.2rem 0 1.75rem;&#34;&gt;
&lt;h2 id=&#34;hook&#34; style=&#34;font-size: 2rem; margin-bottom: .4rem;&#34;&gt;&lt;span style=&#34;color: #ff99cc;&#34;&gt;Seeing Isn’t Believing&lt;/span&gt;&lt;/h2&gt;
&lt;pre style=&#34;margin: 0 0 .75rem;&#34;&gt;&lt;iframe allowfullscreen=&#34;allowfullscreen&#34; frameborder=&#34;0&#34; height=&#34;288&#34; src=&#34;https://commons.wikimedia.org/wiki/File:Dictators_-_Kim_Jong-Un_by_RepresentUs.webm?embedplayer=yes&#34; width=&#34;512&#34;&gt;&lt;/iframe&gt; &lt;span style=&#34;font-size: 10pt; color: #ff99cc;&#34;&gt;RepresentUs, CC BY 3.0 &amp;lt;https://creativecommons.org/licenses/by/3.0&amp;gt;, via Wikimedia Commons: A synthetic Kim Jong Un warns Americans—evidence that our eyes/ears are no longer reliable gatekeepers.&lt;/span&gt;&lt;/pre&gt;
&lt;p data-end=&#34;1005&#34; data-start=&#34;263&#34;&gt;This video clip is a &#34;&lt;a href=&#34;https://en.wikipedia.org/wiki/Deepfake&#34; rel=&#34;noopener&#34; target=&#34;_blank&#34;&gt;deepfake&lt;/a&gt;&#34; of Kim Jong Un created in 2020 by &lt;a href=&#34;https://represent.us/&#34; rel=&#34;noopener&#34; target=&#34;_blank&#34;&gt;RepresentUs&lt;/a&gt;, a non-partisan non-profit organization that produced it to raise public awareness about fake news in the emerging age of generative AI. The footage itself is fully synthetic, yet it’s an amalgamation from genuine video footage and voice samples of the North Korean leader drawn from publicly available news archives. It was intentionally designed to look real enough to unsettle us, but still recognizable as “fake” for educational purposes. Since 2020, of course, deepfake technology has advanced by orders of magnitude, in terms of realism, accessibility, and speed of production.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Public Relations: Industry, Practices, and Democratic Implications</title>
      <link>/teaching/2025/10/teaching-public-relations-industry-practices-and-democratic-implications/</link>
      <pubDate>Mon, 20 Oct 2025 16:35:06 +0000</pubDate>
      <guid>/teaching/2025/10/teaching-public-relations-industry-practices-and-democratic-implications/</guid>
      <description>&lt;p&gt;&lt;b style=&#34;color: #99ccff; font-size: 24px; font-variant-ligatures: common-ligatures; letter-spacing: 0.13333em;&#34;&gt;Posted by Keren Wang, FA 2025&lt;/b&gt;&lt;/p&gt;
&lt;div class=&#34;wrap&#34;&gt;&lt;header&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;p&gt;&lt;img alt=&#34;&#34; class=&#34;aligncenter size-full wp-image-1130&#34; height=&#34;332&#34; src=&#34;/images/uploads/2025/10/Propaganda-and-Public-Relations-header.gif&#34; width=&#34;760&#34;/&gt;&lt;/p&gt;
&lt;/header&gt;
&lt;section class=&#34;stack&#34; id=&#34;sec-pr-vs-prop&#34;&gt;
&lt;div class=&#34;card&#34;&gt;
&lt;table style=&#34;border-collapse: collapse; width: 100%;&#34;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&#34;width: 100%;&#34;&gt;&lt;span style=&#34;color: #ccffff;&#34;&gt;&lt;!-- Table of Contents Navigation Box --&gt;&lt;/span&gt;&lt;nav aria-label=&#34;Lesson sections&#34; class=&#34;navbox&#34;&gt;
&lt;h3&gt;&lt;span style=&#34;color: #99ccff;&#34;&gt;Table of Content&lt;/span&gt;&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;&lt;span style=&#34;color: #ccffff;&#34;&gt;&lt;a href=&#34;#sec-pr-vs-prop&#34; style=&#34;color: #ccffff;&#34;&gt;Public Relations and Propaganda&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ccffff;&#34;&gt;&lt;a href=&#34;#sec-industry&#34; style=&#34;color: #ccffff;&#34;&gt;Inside the PR Industry&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ccffff;&#34;&gt;&lt;a href=&#34;#sec-activities&#34; style=&#34;color: #ccffff;&#34;&gt;Common PR Activities&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ccffff;&#34;&gt;&lt;a href=&#34;#sec-disinfo&#34; style=&#34;color: #ccffff;&#34;&gt;PR and Disinformation&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;color: #ccffff;&#34;&gt;&lt;a href=&#34;#sec-democratize&#34; style=&#34;color: #ccffff;&#34;&gt;Democratizing PR?&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;/nav&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;&lt;span style=&#34;color: #99ccff;&#34;&gt;1) Public Relations and Propaganda&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;Let’s start today’s discussion with one of the most famous political ads in American history: Lyndon B. Johnson’s 1964 “Daisy” ad. It’s only about a minute long, but it changed the entire landscape of political persuasion. Go ahead and give it a watch: &lt;span style=&#34;color: #ccffff;&#34;&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=riDypP1KfOU&#34; rel=&#34;noopener&#34; style=&#34;color: #ccffff;&#34; target=&#34;_blank&#34;&gt;LBJ campaign’s “Daisy” ad (1964)&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>The Internet - from &#34;Nuclear Hardened&#34;  Networks to Algorithmic Governmentality</title>
      <link>/teaching/2025/10/teaching-the-internet-the-internet-from-nuclear-hardened-networks-to-algorithmic-governmentality/</link>
      <pubDate>Sun, 12 Oct 2025 17:15:36 +0000</pubDate>
      <guid>/teaching/2025/10/teaching-the-internet-the-internet-from-nuclear-hardened-networks-to-algorithmic-governmentality/</guid>
      <description>&lt;section id=&#34;references&#34;&gt;
&lt;h2&gt;References&lt;/h2&gt;
Beck, Estee. &#34;Who Is Tracking You?: A Rhetorical Framework for Evaluating Surveillance and Privacy Practices.&#34; In &lt;i&gt;Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications&lt;/i&gt;, pp. 121-138. IGI Global, 2019.
&lt;p&gt;Belk, Russell. &amp;ldquo;Extended self and the digital world.&amp;rdquo; &lt;i&gt;Current Opinion in Psychology&lt;/i&gt; 10 (2016): 50-54.&lt;/p&gt;
&lt;p&gt;Chen, Ning, and Yu Chen. &amp;ldquo;Smart city surveillance at the network edge in the era of iot: opportunities and challenges.&amp;rdquo; &lt;i&gt;Smart cities: development and governance frameworks&lt;/i&gt; (2018): 153-176.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Understanding Advertising through Consumer Psychology and Computational Rhetoric</title>
      <link>/teaching/2025/09/understanding-advertising-through-consumer-psychology-computational-rhetoric/</link>
      <pubDate>Mon, 29 Sep 2025 03:44:29 +0000</pubDate>
      <guid>/teaching/2025/09/understanding-advertising-through-consumer-psychology-computational-rhetoric/</guid>
      <description>&lt;div&gt; &lt;/div&gt;
&lt;!-- wp:html --&gt;
&lt;p&gt; &lt;/p&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;table style=&#34;border-collapse: collapse; width: 100%;&#34;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&#34;width: 100%;&#34;&gt;
&lt;h2&gt;&lt;span style=&#34;font-size: 24pt;&#34;&gt;&lt;strong&gt;&lt;span style=&#34;font-style: italic;&#34;&gt;Table of Contents&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;div&gt;
&lt;blockquote&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#h.26n593d62ttq&#34;&gt;&lt;span style=&#34;font-size: 18pt;&#34;&gt;What Do You See?&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;font-size: 18pt;&#34;&gt;&lt;a href=&#34;#h.wyeqkw7puh5d&#34;&gt;Historical &#34;Thickness&#34; of Advertising&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;font-size: 18pt;&#34;&gt;&lt;a href=&#34;#h.4d5153j28kaw&#34;&gt;Demonstrative and Associative Ads&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;font-size: 18pt;&#34;&gt;&lt;a href=&#34;#h.uh0fxgv2a95c&#34;&gt;Advertising &amp;amp; Consumer Psychology&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;font-size: 18pt;&#34;&gt;&lt;a href=&#34;#h.qsu3bpa0yb2l&#34;&gt;Bandwagon &amp;amp; Anti-Bandwagon Effects&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;font-size: 18pt;&#34;&gt;&lt;a href=&#34;#h.vi7g0j3q3k9t&#34;&gt;Social Marketing &amp;amp; Exploitation&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&#34;font-size: 18pt;&#34;&gt;&lt;a href=&#34;#h.iidw96apa7dh&#34;&gt;Computational Rhetoric of Hyper-Personalization&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;
&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;h2&gt;&lt;img alt=&#34;&#34; class=&#34;aligncenter size-full wp-image-1065&#34; height=&#34;719&#34; src=&#34;/images/uploads/2025/09/Advertising-header.gif&#34; width=&#34;1280&#34;/&gt;&lt;/h2&gt;
&lt;h2 class=&#34;c17&#34; id=&#34;h.26n593d62ttq&#34;&gt;&lt;span class=&#34;c8 c29 c16&#34; style=&#34;color: #ccffff;&#34;&gt;What Do You See?&lt;/span&gt;&lt;/h2&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p class=&#34;c3&#34;&gt;&lt;span class=&#34;c8 c4&#34;&gt;Let’s begin today’s lesson with a quick glance at these sets of images. What do they remind you of?&lt;/span&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Lesson 7: Rhetorical Artifacts</title>
      <link>/teaching/2025/09/teaching-lesson-7-rhetorical-artifacts/</link>
      <pubDate>Sun, 14 Sep 2025 21:00:04 +0000</pubDate>
      <guid>/teaching/2025/09/teaching-lesson-7-rhetorical-artifacts/</guid>
      <description>&lt;header&gt;
&lt;p class=&#34;byline&#34;&gt;Posted by: Keren Wang&lt;/p&gt;
&lt;p class=&#34;intro&#34;&gt;&lt;strong&gt;Before you start this lesson, please READ:&lt;/strong&gt; Berger, Arthur Asa. 2024. &lt;em data-end=&#34;247&#34; data-start=&#34;145&#34;&gt;Media and Communication Research Methods: An Introduction to Qualitative and Quantitative Approaches&lt;/em&gt;. 3rd ed. Chapter 4, “Rhetorical Analysis.” Thousand Oaks, CA: SAGE. &lt;a class=&#34;decorated-link&#34; data-end=&#34;353&#34; data-start=&#34;316&#34; href=&#34;https://doi.org/10.4135/9781071939017&#34; rel=&#34;noopener&#34; target=&#34;_new&#34;&gt;https://doi.org/10.4135/9781071939017&lt;/a&gt;.&lt;/p&gt;
&lt;/header&gt;
&lt;section id=&#34;overview&#34;&gt;
&lt;h2&gt;1. Overview&lt;/h2&gt;
What do you think of when you hear the word “&lt;strong&gt;artifact&lt;/strong&gt;”? In rhetorical scholarship, the term “artifact” is not limited to historical objects or museum pieces. Instead, it encompasses various texts, speeches, symbolic objects, and events produced by humans.
&lt;p&gt;In communication research, one key difference between rhetorical and critical methods and other qualitative research methods is that, while qualitative methods such as interviews, observations, and focus group studies revolve around studying human subjects, rhetorical scholars analyze rhetorical artifacts, or “texts” that have already been produced.&lt;/p&gt;</description>
    </item>
    <item>
      <title>New Research Project: Artificial Intelligence and Human Sacrifice</title>
      <link>/blog/2025/08/new-research-project-artificial-intelligence-and-human-sacrifice/</link>
      <pubDate>Mon, 25 Aug 2025 02:36:41 +0000</pubDate>
      <guid>/blog/2025/08/new-research-project-artificial-intelligence-and-human-sacrifice/</guid>
      <description>&lt;!-- wp:paragraph --&gt;
&lt;p&gt;&lt;!-- Copyright Banner --&gt;&lt;/p&gt;
&lt;!-- /wp:paragraph --&gt;
&lt;!-- wp:tadv/classic-paragraph --&gt;
&lt;div style=&#34;margin: 1em auto; max-width: 760px; background: #fff3cd; color: #856404; border: 1px solid #ffeeba; border-radius: 4px; padding: 0.6em 1em; font-size: 0.85em; line-height: 1.35; text-align: center;&#34;&gt;
&lt;/div&gt;
&lt;!-- /wp:tadv/classic-paragraph --&gt;
&lt;!-- wp:paragraph {&#34;dropCap&#34;:true} --&gt;
&lt;p class=&#34;has-drop-cap&#34;&gt;On December 4, 2024, news broke that a lone gunman had assassinated UnitedHealthcare’s chief executive officer, Brian Thompson, outside the company’s headquarters.&lt;sup&gt;&lt;a href=&#34;#fn1&#34; id=&#34;fnref1&#34;&gt;1&lt;/a&gt;&lt;/sup&gt; The killing itself was shocking, but what unsettled many observers was the wave of sympathy that quickly coalesced around the perpetrator—donations, online tributes, and statements of support that revealed a raw seam in America’s collective experience of health care.&lt;sup&gt;&lt;a href=&#34;#fn2&#34; id=&#34;fnref2&#34;&gt;2&lt;/a&gt;&lt;/sup&gt; This dramatic act of killing is entangled with the dark trajectory in the devolution of the marketized healthcare industry in the United States: normalizing traumatic acts of takings, with increasingly unsustainable industry practices justifying the suspension of pre-existing taboos concerning the sanctity of life and the boundaries of wealth transfer.&lt;sup&gt;&lt;a href=&#34;#fn3&#34; id=&#34;fnref3&#34;&gt;3&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Introduction to a Brief History of Media</title>
      <link>/teaching/2025/08/teaching-introduction-to-a-brief-history-of-media/</link>
      <pubDate>Mon, 25 Aug 2025 02:34:28 +0000</pubDate>
      <guid>/teaching/2025/08/teaching-introduction-to-a-brief-history-of-media/</guid>
      <description>&lt;div style=&#34;margin: 1em auto; max-width: 760px; background: #fff3cd; color: #856404; border: 1px solid #ffeeba; border-radius: 4px; padding: 0.6em 1em; font-size: 0.85em; line-height: 1.35; text-align: center;&#34;&gt;
&lt;/div&gt;
&lt;div class=&#34;wp-block-image&#34;&gt;&lt;img alt=&#34;&#34; class=&#34;wpa-warning wpa-image-missing-alt alignright size-full wp-image-1004&#34; data-warning=&#34;Missing alt text&#34; height=&#34;844&#34; src=&#34;/images/uploads/2025/08/SCOM2050-week-1-History-of-Media_page-0001.jpg&#34; width=&#34;1500&#34;/&gt;&lt;/div&gt;
&lt;p&gt;We begin by asking a deceptively simple question: &lt;strong&gt;What is media?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;At its core, media is any&lt;strong&gt; technology that enables the storage, organization, transmission, and dissemination of information&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;When we hear the word today, we tend to think of “mass media” — newspapers, television, the internet — technologies that spread information rapidly across wide distances. &lt;span style=&#34;font-weight: 400;&#34;&gt;Commonly, people imagine the story of media beginning with the invention of the&lt;a href=&#34;https://en.wikipedia.org/wiki/Electrical_telegraph&#34;&gt; &lt;strong&gt;electric telegraph&lt;/strong&gt;&lt;/a&gt; in the early 19th century. But is that really where media begins?&lt;/span&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>MEDIA &amp; VIOLENCE - A Transnational Perspective</title>
      <link>/blog/2025/04/media-violence-a-transnational-perspective/</link>
      <pubDate>Mon, 14 Apr 2025 18:23:19 +0000</pubDate>
      <guid>/blog/2025/04/media-violence-a-transnational-perspective/</guid>
      <description>&lt;p&gt;Lesson Module by Keren Wang, updated 4 Nov 2025.&lt;/p&gt;
&lt;div class=&#34;scom2050-lesson&#34; style=&#34;font-family: system-ui,-apple-system,Segoe UI,Roboto,Helvetica,Arial,sans-serif; line-height: 1.55; max-width: 880px; margin: 0 auto;&#34;&gt;
&lt;p&gt;This lesson module examines the contested and ambivalent relationship between media and violence from historical and transnational perspectives.&lt;/p&gt;
&lt;img alt=&#34;&#34; class=&#34;aligncenter size-full wp-image-927&#34; height=&#34;718&#34; src=&#34;/images/uploads/2025/04/MEDIA-VIOLENCE-a-transnational-perspective-heading.gif&#34; width=&#34;1280&#34;/&gt;
&lt;/div&gt;
&lt;div class=&#34;scom2050-lesson&#34; style=&#34;font-family: system-ui,-apple-system,Segoe UI,Roboto,Helvetica,Arial,sans-serif; line-height: 1.55; max-width: 880px; margin: 0 auto;&#34;&gt;
&lt;h2&gt;&lt;span style=&#34;color: #00ccff;&#34;&gt;1. Violence as Ritual &amp;amp; Power: Historical and Global Perspectives&lt;/span&gt;&lt;/h2&gt;
Let&#39;s open this session with a reference from Greek mythology: consider the telltale of Prometheus, whose theft of fire from the Olympian gods for humanity’s benefit inadvertently brought both civilization and destruction. Like Prometheus’s fire, the development of media technology simultaneously brings enlightenment and cataclysm.
&lt;h4&gt;&lt;span style=&#34;color: #99ccff;&#34;&gt;1.1 Rhetorical Artifacts and Human Sacrifice&lt;/span&gt;&lt;/h4&gt;
The history of the development of writing technology overlaps with the history of war propaganda and &lt;a href=&#34;/blog/2020/10/nca-2020-virtual-convention-presentation-logographic-inventions-of-violent-rituals/&#34;&gt;human sacrifice&lt;/a&gt;.&lt;sup&gt;&lt;a href=&#34;#fn1&#34;&gt;[1]&lt;/a&gt;&lt;/sup&gt; As early as the Narmer Palette, one of the earliest hieroglyphic artifacts ever found from circa 3200 BCE depicting scenes of conquest and violence:
&lt;div class=&#34;wp-block-image&#34;&gt;&lt;img alt=&#34;&#34; class=&#34;wpa-warning wpa-image-missing-alt alignright size-large wp-image-881&#34; data-warning=&#34;Missing alt text&#34; height=&#34;537&#34; src=&#34;/images/uploads/2025/04/slide-2-1024x573.jpg&#34; width=&#34;960&#34;/&gt;&lt;/div&gt;
&lt;article class=&#34;text-token-text-primary w-full&#34; data-scroll-anchor=&#34;true&#34; data-testid=&#34;conversation-turn-18&#34; dir=&#34;auto&#34;&gt;
&lt;div class=&#34;text-base my-auto mx-auto py-5 [--thread-content-margin:--spacing(4)] @[37rem]:[--thread-content-margin:--spacing(6)] @[70rem]:[--thread-content-margin:--spacing(12)] px-(--thread-content-margin)&#34;&gt;
&lt;div class=&#34;[--thread-content-max-width:32rem] @[34rem]:[--thread-content-max-width:40rem] @[64rem]:[--thread-content-max-width:48rem] mx-auto flex max-w-(--thread-content-max-width) flex-1 text-base gap-4 md:gap-5 lg:gap-6 group/turn-messages focus-visible:outline-hidden&#34; tabindex=&#34;-1&#34;&gt;
&lt;div class=&#34;group/conversation-turn relative flex w-full min-w-0 flex-col agent-turn&#34;&gt;
&lt;div class=&#34;relative flex-col gap-1 md:gap-3&#34;&gt;
&lt;div class=&#34;flex max-w-full flex-col grow&#34;&gt;
&lt;div class=&#34;min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal [.text-message+&amp;amp;]:mt-5&#34; data-message-author-role=&#34;assistant&#34; data-message-id=&#34;ef8e3b62-0ef3-4df3-ae84-07980e2cc1a4&#34; data-message-model-slug=&#34;o3-mini-high&#34; dir=&#34;auto&#34;&gt;
&lt;div class=&#34;flex w-full flex-col gap-1 empty:hidden first:pt-[3px]&#34;&gt;
&lt;div class=&#34;markdown prose dark:prose-invert w-full break-words light&#34;&gt;
&lt;p class=&#34;&#34; data-end=&#34;495&#34; data-start=&#34;0&#34;&gt;Similarly, during the height of the Chinese Bronze Age, also known as the Shang dynasty (c. 1250–1046 BC) produced ritual bronze artifacts at monumental proportions -- such as the 833 kg (1,836 lbs) Houmuwu Ding -- &lt;strong&gt;one of the heaviest bronze vessel from the ancient world &lt;/strong&gt;-- and the 13-foot (3.96 m) tall Sanxingdui bronze tree (c. 1200 BC):&lt;/p&gt;</description>
    </item>
    <item>
      <title>Rhetorical Methods - Ideological and Psychoanalytic Criticism</title>
      <link>/teaching/2025/04/research-methods-lesson-notes-psychoanalytic-criticism/</link>
      <pubDate>Wed, 02 Apr 2025 12:40:01 +0000</pubDate>
      <guid>/teaching/2025/04/research-methods-lesson-notes-psychoanalytic-criticism/</guid>
      <description>&lt;h1&gt;&lt;/h1&gt;&lt;strong&gt;Originally posted by:&lt;/strong&gt; Keren Wang, Fall 2024
&lt;div class=&#34;toc&#34;&gt;
&lt;h2&gt;Table of Contents&lt;/h2&gt;
&lt;ul&gt;
&lt;li style=&#34;list-style-type: none;&#34;&gt;
&lt;ul&gt;
&lt;li style=&#34;list-style-type: none;&#34;&gt;
&lt;ul&gt;
&lt;li style=&#34;list-style-type: none;&#34;&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#overview&#34;&gt;Ideological Criticism - Overview&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#key-perspectives&#34;&gt;Key Perspectives from Ideological Criticism&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#base-superstructure&#34;&gt;Economic Inequality and False Consciousness&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#hegemony-mythologies&#34;&gt;Hegemony and Mythologies&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#psychoanalytic criticism overview&#34;&gt;Psychoanalytic Criticism - Overview&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#unconscious&#34;&gt;The Unconscious&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#Id, Ego, and Superego&#34;&gt;Id, Ego, and Superego&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#Defense Mechanisms and Complexes&#34;&gt;Defense Mechanisms and Complexes&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#References&#34;&gt;References&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;hr/&gt;
&lt;h2 id=&#34;overview&#34;&gt;Ideological Criticism - Overview&lt;/h2&gt;
&lt;p&gt;Ideological criticism is a method of analyzing texts and other rhetorical artifacts to uncover the underlying ideologies that shape and are reflected in them. This type of criticism is often used to explore how media, literature, and other forms of communication reinforce or challenge dominant social, political, and economic power structures.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Evaluating Online Sources</title>
      <link>/teaching/2025/03/evaluating-online-sources/</link>
      <pubDate>Wed, 26 Mar 2025 20:28:08 +0000</pubDate>
      <guid>/teaching/2025/03/evaluating-online-sources/</guid>
      <description>&lt;!-- FullPage.js CSS --&gt; &lt;!-- Your font link --&gt;
&lt;div id=&#34;fullpage&#34;&gt;
&lt;div class=&#34;section&#34; id=&#34;section0&#34;&gt;&lt;/div&gt;
&lt;!-- Section 1: Overview --&gt;
&lt;div class=&#34;section&#34; id=&#34;overview&#34;&gt;
&lt;hr/&gt;
&lt;h2 style=&#34;font-size: 32px;&#34;&gt;&lt;span style=&#34;color: #ffff99;&#34;&gt;1. OVERVIEW&lt;/span&gt;&lt;/h2&gt;
This lesson will be focusing on understanding and evaluating evidence and information sources, a crucial aspect of constructing persuasive arguments. It explains how evidence interacts with values, and presents general tests for assessing the quality of evidence. We will also be learning how to locate and evaluate various sources of evidence, guiding you on choosing reliable information from books, periodicals, websites, and more. The chapter emphasizes the importance of digital literacy and critical evaluation of different types of sources.
&lt;figure&gt;&lt;img alt=&#34;Ad Fontes Media Bias Chart 6.0&#34; src=&#34;/images/external/upload-wikimedia-org/wikipedia/commons/thumb/e/ef/Adfontesmedia.jpg/1024px-Adfontesmedia.jpg&#34; width=&#34;1024&#34;/&gt;&lt;figcaption&gt;&lt;a href=&#34;https://commons.wikimedia.org/wiki/File:Adfontesmedia.jpg&#34;&gt;Media Bias Chart published by Ad Fontes Media, 2020. Fact-checking always lags behind the emergence of new biased sources of information.&lt;/a&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;/div&gt;
&lt;!-- Section 2: Understanding Evidence --&gt;
&lt;div class=&#34;section&#34; id=&#34;understanding-evidence&#34;&gt;
&lt;hr/&gt;
&lt;h1 style=&#34;font-size: 32px;&#34;&gt;&lt;span style=&#34;color: #ffff99;&#34;&gt;2. UNDERSTANDING EVIDENCE&lt;/span&gt;&lt;/h1&gt;
&lt;h3&gt;Evidence and Values&lt;/h3&gt;
In public discourse, evidence is invariably filtered through the &#34;terminal screens&#34; of societal norms and cultural values, leading to divergent interpretations even when presented with the same set of facts. Consider, for instance, debates surrounding Artificial Intelligence (AI) and employment. For techno-optimists, as represented by some &lt;a href=&#34;https://www.jstor.org/stable/27283815&#34; rel=&#34;noopener&#34; target=&#34;_blank&#34;&gt;Silicon Valley entrepreneurs&lt;/a&gt;, rapid technological advancements are seen as essential for societal evolution. They may interpret the emergence of &lt;a href=&#34;https://arxiv.org/html/2502.07050v1&#34; rel=&#34;noopener&#34; target=&#34;_blank&#34;&gt;Artificial General Intelligence (AGI) labor&lt;/a&gt; as an auspice for accelerated economic growth, productivity, and innovation, contending that AI liberates human workers from repetitive labor and allows greater engagement in creative, strategic, or emotionally rewarding tasks. Conversely, many labor advocates and trade unionists may interpret the prospect of an AGI workforce &lt;a href=&#34;https://www.nber.org/papers/w32980&#34;&gt;less positively&lt;/a&gt;. As critics of unchecked technological disruption, they might perceive this development as a harbinger of livelihood displacement, expressing concerns that automation could trigger widespread unemployment, diminish workers&#39; bargaining power, and deepen existing economic inequalities. Such &lt;strong&gt;rhetorical divergence&lt;/strong&gt; highlights how interpretations of evidence surrounding AI&#39;s impact are strategically framed to reinforce broader narratives of either progress or caution.
&lt;p&gt;This example illustrates that the interpretation of evidence is not merely a neutral or objective process but is deeply intertwined with rhetorical constructions that reflect and reinforce specific value systems. Recognizing this interplay is crucial for understanding the dynamics of public debates and the ways in which information is presented and perceived.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Lesson on Data Visualization and its Misuses</title>
      <link>/teaching/2024/11/lesson-on-data-visualization-and-its-misuses/</link>
      <pubDate>Tue, 12 Nov 2024 01:05:28 +0000</pubDate>
      <guid>/teaching/2024/11/lesson-on-data-visualization-and-its-misuses/</guid>
      <description>&lt;h4&gt;&lt;b&gt;Posted by Keren Wang, FA 2024&lt;/b&gt;&lt;/h4&gt;&lt;hr/&gt;
&lt;h6&gt;&lt;b&gt;In this session, we aim to achieve several key learning objectives:&lt;/b&gt;&lt;/h6&gt;
&lt;ul&gt;
&lt;li aria-checked=&#34;false&#34; aria-level=&#34;1&#34;&gt;&lt;b&gt;Understand the fundamental principles of framing and visual rhetoric,&lt;/b&gt; exploring how they shape the design and interpretation of data visualizations.&lt;/li&gt;
&lt;li aria-checked=&#34;false&#34; aria-level=&#34;1&#34;&gt;&lt;b&gt;Examine the art of designing and manipulating graphic systems of signs&lt;/b&gt; that disclose or conceal specific quantitative or qualitative information.&lt;/li&gt;
&lt;li aria-checked=&#34;false&#34; aria-level=&#34;1&#34;&gt;&lt;b&gt;Identify common types of data visualizations,&lt;/b&gt; such as bar charts, pie charts, line graphs, and network graphs, along with their appropriate applications.&lt;/li&gt;
&lt;li aria-checked=&#34;false&#34; aria-level=&#34;1&#34;&gt;&lt;b&gt;Recognize the advantages and potential misuses of data visualizations,&lt;/b&gt; including manipulative techniques like framing and scaling distortions.&lt;/li&gt;
&lt;li aria-checked=&#34;false&#34; aria-level=&#34;1&#34;&gt;&lt;b&gt;Critically analyze real and hypothetical examples&lt;/b&gt; to detect misleading or biased visual representations.&lt;/li&gt;
&lt;li aria-checked=&#34;false&#34; aria-level=&#34;1&#34;&gt;&lt;b&gt;Develop best practices for creating clear, honest, and effective data visualizations,&lt;/b&gt; ensuring accuracy and ethical integrity.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr/&gt;
&lt;h2&gt;&lt;b&gt;Photography and Visual Rhetoric&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;To truly grasp the fundamental principles and perils of data visualization, we must journey back to the birth of photography and photojournalism. When photography was first employed in news reporting, it carried an inherent demand for credibility. Unlike paintings or sketches, photographs were perceived as unfiltered, unmediated representations of reality. Ironically, as our discussion will reveal, even from its inception, &lt;a href=&#34;https://en.wikipedia.org/wiki/Photograph_manipulation&#34;&gt;photojournalism was subject to rhetorical manipulation&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Argumentation - Language in Argument</title>
      <link>/teaching/2024/10/argumentation-lesson-language-in-argument/</link>
      <pubDate>Sun, 27 Oct 2024 21:16:47 +0000</pubDate>
      <guid>/teaching/2024/10/argumentation-lesson-language-in-argument/</guid>
      <description>&lt;style&gt;
        body {&lt;br /&gt;            font-family: Arial, sans-serif;&lt;br /&gt;            line-height: 1.6;&lt;br /&gt;            background-color: #f4f4f4;&lt;br /&gt;            color: #333;&lt;br /&gt;            margin: 0;&lt;br /&gt;            padding: 0;&lt;br /&gt;            display: flex;&lt;br /&gt;            flex-direction: column;&lt;br /&gt;            align-items: center;&lt;br /&gt;        }&lt;br /&gt;        header {&lt;br /&gt;            text-align: center;&lt;br /&gt;            background-color: #004080;&lt;br /&gt;            color: white;&lt;br /&gt;            padding: 1em;&lt;br /&gt;            width: 100%;&lt;br /&gt;        }&lt;br /&gt;        .content {&lt;br /&gt;            width: 90%;&lt;br /&gt;            max-width: 800px;&lt;br /&gt;            margin: 20px 0;&lt;br /&gt;            padding: 1em;&lt;br /&gt;            background-color: white;&lt;br /&gt;            border-radius: 5px;&lt;br /&gt;            box-shadow: 0 0 10px rgba(0, 0, 0, 0.1);&lt;br /&gt;        }&lt;br /&gt;        h2, h3 {&lt;br /&gt;            color: #004080;&lt;br /&gt;        }&lt;br /&gt;        .section {&lt;br /&gt;            margin-bottom: 20px;&lt;br /&gt;        }&lt;br /&gt;        .example {&lt;br /&gt;            font-style: italic;&lt;br /&gt;            color: #555;&lt;br /&gt;        }&lt;br /&gt;        .image-container {&lt;br /&gt;            margin-top: 10px;&lt;br /&gt;            text-align: center;&lt;br /&gt;        }&lt;br /&gt;        .image-container img {&lt;br /&gt;            max-width: 100%;&lt;br /&gt;            height: auto;&lt;br /&gt;            border-radius: 5px;&lt;br /&gt;        }&lt;br /&gt;        .caption {&lt;br /&gt;            font-size: 0.9em;&lt;br /&gt;            color: #666;&lt;br /&gt;            margin-top: 5px;&lt;br /&gt;        }&lt;br /&gt;        .quiz {&lt;br /&gt;            margin-top: 20px;&lt;br /&gt;            padding: 1em;&lt;br /&gt;            background-color: #e6f7ff;&lt;br /&gt;            border-radius: 5px;&lt;br /&gt;            width: 100%;&lt;br /&gt;        }&lt;br /&gt;        footer {&lt;br /&gt;            margin-top: 20px;&lt;br /&gt;            padding: 1em;&lt;br /&gt;            background-color: #004080;&lt;br /&gt;            color: white;&lt;br /&gt;            text-align: center;&lt;br /&gt;            width: 100%;&lt;br /&gt;        }&lt;br /&gt;    &lt;/style&gt;
&lt;p&gt; &lt;/p&gt;</description>
    </item>
    <item>
      <title>Lesson on Statistical Evidence</title>
      <link>/teaching/2024/10/communication-research-methods-survey-part-2-on-sampling-and-evaluating-survey-accuracy/</link>
      <pubDate>Sun, 27 Oct 2024 18:04:48 +0000</pubDate>
      <guid>/teaching/2024/10/communication-research-methods-survey-part-2-on-sampling-and-evaluating-survey-accuracy/</guid>
      <description></description>
    </item>
    <item>
      <title>Lesson on Statistical Evidence - Survey and Opinion Polling</title>
      <link>/teaching/2024/10/communication-research-methods-survey-part-1/</link>
      <pubDate>Sun, 27 Oct 2024 18:01:49 +0000</pubDate>
      <guid>/teaching/2024/10/communication-research-methods-survey-part-1/</guid>
      <description></description>
    </item>
    <item>
      <title>Argumentation - Digital Literacy in Argumentation</title>
      <link>/teaching/2024/10/argumentation-lesson-evaluating-evidence-and-online-sources-scom-2710/</link>
      <pubDate>Sun, 20 Oct 2024 17:59:23 +0000</pubDate>
      <guid>/teaching/2024/10/argumentation-lesson-evaluating-evidence-and-online-sources-scom-2710/</guid>
      <description>&lt;header&gt;
&lt;h1&gt;Digital Literacy in Argumentation&lt;/h1&gt;
SCOM 2710 Argumentation Lesson, Posted by Keren Wang, updated 2024
&lt;/header&gt;&lt;section id=&#34;overview&#34;&gt;
&lt;h2&gt;Overview&lt;/h2&gt;
This week we will be focusing on understanding and evaluating evidence, a crucial aspect of constructing persuasive arguments. It explains how evidence interacts with values, and presents general tests for assessing the quality of evidence. We will also be learning how to locate and evaluate various sources of evidence, guiding you on choosing reliable information from books, periodicals, websites, and more. The chapter emphasizes the importance of digital literacy and critical evaluation of different types of sources.
&lt;figure&gt;&lt;img alt=&#34;Ad Fontes Media Bias Chart 6.0&#34; src=&#34;/images/external/upload-wikimedia-org/wikipedia/commons/thumb/e/ef/Adfontesmedia.jpg/1024px-Adfontesmedia.jpg&#34; width=&#34;1024&#34;/&gt;&lt;figcaption&gt;&lt;a href=&#34;https://commons.wikimedia.org/wiki/File:Adfontesmedia.jpg&#34;&gt;Media Bias Chart published by Ad Fontes Media, 2020. Fact-checking always lags behind the emergence of new biased sources of information.&lt;/a&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;/section&gt;
&lt;section id=&#34;understanding-evidence&#34;&gt;
&lt;h2&gt;Understanding Evidence&lt;/h2&gt;
&lt;h3&gt;Evidence and Values&lt;/h3&gt;
Evidence is always interpreted through personal and cultural values. Here are some examples of how values shape our interpretation of evidence:
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Artificial Intelligence in Employment:&lt;/strong&gt; Evidence showing that AI can improve productivity and efficiency is interpreted by some as a positive development for economic growth, whereas others see it as a threat to jobs, fearing mass unemployment and widening economic inequality.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Genetic Editing (CRISPR):&lt;/strong&gt; Evidence about the successful application of CRISPR to edit genes in humans can be seen as a revolutionary medical advancement that will eliminate hereditary diseases, or as a dangerous intervention with unknown ethical and social consequences.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Universal Basic Income (UBI):&lt;/strong&gt; Evidence from trials of Universal Basic Income might show improvements in mental health and poverty reduction, which is interpreted positively by proponents as proof of the policy’s benefits. However, others might see it as fostering a culture of dependency or as economically unviable, depending on their economic values.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Police Surveillance Technology:&lt;/strong&gt; Evidence supporting the use of facial recognition and other surveillance technology to improve public safety can be seen as a way to effectively reduce crime. On the other hand, it is interpreted by others as a serious threat to privacy and civil liberties, especially in communities that may be disproportionately targeted.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Vaccination and Public Health:&lt;/strong&gt; Evidence showing the efficacy of mandatory vaccination for school children may be interpreted as essential for public safety by some individuals, while others may view it as intrusive government overreach or distrust the pharmaceutical industry.&lt;/li&gt;
&lt;/ul&gt;
&lt;figure&gt;&lt;img alt=&#34;Robotic Sculpture at MIT Media Lab (photo by Keren Wang 2015)&#34; src=&#34;/images/uploads/2024/10/Robotic-Sculpture-at-MIT-Media-Lab-photo-by-Keren-Wang-2015.jpg&#34;/&gt;&lt;figcaption&gt;Evidence that suggests a major breakthrough in general artificial intelligence may be seen either as a major technological advancement or as ethically problematic depending on the individual&#39;s values.&lt;/figcaption&gt;&lt;/figure&gt;
&lt;/section&gt;
&lt;section id=&#34;general-tests&#34;&gt;
&lt;h2&gt;General Tests of Evidence&lt;/h2&gt;
Herrick introduces seven general tests of evidence that can help evaluate whether evidence used in an argument is reliable, credible, and sufficient to support a conclusion. These tests provide a comprehensive approach to assessing the quality of evidence. Here’s a detailed breakdown:
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Accessibility: Is the Evidence Available?&lt;/strong&gt;Evidence that is accessible and open to scrutiny is generally considered more reliable.&lt;strong&gt;Example:&lt;/strong&gt; A public health official cites the number of COVID-19 cases reported by the Centers for Disease Control and Prevention (CDC). This evidence is accessible because the CDC publishes its data on a website that anyone can visit and verify.&lt;strong&gt;Counterexample:&lt;/strong&gt; Someone claims that the government has &#34;secret documents&#34; showing proof of extraterrestrial contact. Since these alleged documents are not accessible for review, the claim fails the test of accessibility.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Credibility: Is the Source of the Evidence Reliable?&lt;/strong&gt;This can depend on the reputation of the author or organization providing the evidence, as well as whether the source has the appropriate credentials or expertise.&lt;strong&gt;Example:&lt;/strong&gt; A research paper on the safety of vaccines authored by a team of immunologists and published in &lt;em&gt;The New England Journal of Medicine&lt;/em&gt; is credible due to the expertise of the authors and the reputation of the journal.&lt;strong&gt;Counterexample:&lt;/strong&gt; A claim about vaccine dangers coming from an anonymous social media post lacks credibility because the author’s qualifications are unknown, and the post does not have any verifiable authority.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Internal Consistency: Does the Evidence Contradict Itself?&lt;/strong&gt;Evidence should not contradict itself. If evidence is self-contradictory, it weakens the argument and creates doubt regarding its reliability.&lt;strong&gt;Example:&lt;/strong&gt; A government report on unemployment must consistently present the same statistics throughout the report. If one section states an unemployment rate of 6% and another section states 8% without clarification, the evidence lacks internal consistency.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;External Consistency: Does the Evidence Contradict Other Evidence?&lt;/strong&gt;Evidence that sharply contradicts most other reputable evidence is often seen as unreliable.&lt;strong&gt;Example:&lt;/strong&gt; A study on climate change that finds rising global temperatures should align with the majority of climate research from other scientific bodies such as NASA, the IPCC, and NOAA.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Recency: Is the Evidence Up to Date?&lt;/strong&gt;Evidence that has been superseded by more recent findings may no longer be applicable.&lt;strong&gt;Example:&lt;/strong&gt; Citing a 2023 meta-analysis on the effectiveness of renewable energy technologies is preferable to citing a study from 2001, as the newer study will have taken into account technological advancements.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Relevance: Does the Evidence Bear on the Conclusion?&lt;/strong&gt;Evidence that does not directly relate to the argument is not helpful.&lt;strong&gt;Example:&lt;/strong&gt; If a speaker argues for increasing the minimum wage, citing research that shows increased minimum wages boost consumer spending is relevant because it directly supports the argument.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Adequacy: Is the Evidence Sufficient to Support Its Claim?&lt;/strong&gt;Adequate evidence means having enough quality evidence to convincingly support the claim being made.&lt;strong&gt;Example:&lt;/strong&gt; If you are trying to prove that sugary drinks contribute to obesity, providing multiple studies from different credible sources, statistics on consumption rates, and expert testimony would collectively provide adequate evidence to support your claim.&lt;/li&gt;
&lt;/ol&gt;
&lt;h1&gt;&lt;b&gt;Sources of Evidence&lt;/b&gt;&lt;/h1&gt;
&lt;a href=&#34;https://www.stratapub.com/Herrick7/Herrick7.htm&#34;&gt;&lt;i&gt;Herrick, &lt;/i&gt;Chapter 7&lt;/a&gt; outlines different types of sources for evidence and their respective strengths and limitations:
&lt;ul&gt;
&lt;li aria-level=&#34;1&#34;&gt;&lt;b&gt;Periodicals&lt;/b&gt;: These include scholarly journals, special-interest magazines, and news/commentary publications. Scholarly journals are considered the most reliable due to their rigorous editorial and peer-review process.
&lt;ul&gt;
&lt;li aria-level=&#34;2&#34;&gt;&lt;b&gt;Scholarly journals &lt;/b&gt;are considered the gold standard due to their peer-review process, while special-interest publications and news magazines can offer accessible information but with less depth and more bias. They can be easily accessed via university libraries.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li aria-level=&#34;1&#34;&gt;&lt;b&gt;Books&lt;/b&gt;: Books can be useful sources of in-depth information, but it is important to consider the &lt;b&gt;author&#39;s credentials&lt;/b&gt;, &lt;b&gt;publication date&lt;/b&gt;, and the type of &lt;b&gt;publisher&lt;/b&gt;.&lt;/li&gt;
&lt;li aria-level=&#34;1&#34;&gt;&lt;b&gt;Documentaries&lt;/b&gt;: These can offer reliable insights but may be influenced by commercial interests or biases.&lt;/li&gt;
&lt;li aria-level=&#34;1&#34;&gt;&lt;b&gt;The Internet&lt;/b&gt;: Offers vast information, but requires critical assessment for credibility. Websites with recognizable authors and credible organizations are generally more reliable.&lt;b&gt; Digital literacy&lt;/b&gt; has become an essential skill for identifying and evaluating online sources.&lt;/li&gt;
&lt;/ul&gt;
&lt;/section&gt;
&lt;section id=&#34;digital-literacy&#34;&gt;
&lt;h2&gt;Digital Literacy&lt;/h2&gt;
&lt;b&gt;Digital Literacy&lt;/b&gt; refers to the ability to effectively navigate, evaluate, and utilize online information. Digital literacy is more than simply being able to use technology; it is about understanding how to critically evaluate the veracity and quality of digital content and its sources. Key aspects of digital literacy include:
&lt;ol&gt;
&lt;li aria-level=&#34;1&#34;&gt;&lt;b&gt;Critical Evaluation of Sources&lt;/b&gt;: Not all websites are created equal, and digital literacy involves determining whether an online source is credible, up-to-date, and relevant. It also requires recognizing the purpose of the content—whether it aims to inform, persuade, entertain, or mislead.&lt;/li&gt;
&lt;li aria-level=&#34;1&#34;&gt;&lt;b&gt;Understanding Bias and Intent&lt;/b&gt;: It is important to understand the motives behind the creation of digital content. Websites often have particular political, social, or commercial agendas, and digital literacy involves identifying these biases. For example, a blog promoting dietary supplements might not be objective if it’s sponsored by a company that sells such products.&lt;/li&gt;
&lt;li aria-level=&#34;1&#34;&gt;&lt;b&gt;Verification of Facts&lt;/b&gt;: Digital literacy requires cross-referencing information found online with multiple reliable sources. This helps verify facts and avoid falling for misinformation or “fake news.” For instance, a claim about a health benefit found on social media should be verified through medical publications or government health websites.&lt;/li&gt;
&lt;li aria-level=&#34;1&#34;&gt;&lt;b&gt;Awareness of Digital Manipulation&lt;/b&gt;: The internet includes not only text but also images, videos, and audio clips, many of which may be digitally altered. Digital literacy involves assessing whether visual or multimedia evidence has been manipulated to present a biased narrative.&lt;/li&gt;
&lt;li aria-level=&#34;1&#34;&gt;&lt;b&gt;Navigating Information Overload&lt;/b&gt;: The sheer volume of information available online can be overwhelming. Being digitally literate means knowing how to sift through large amounts of data to find high-quality, relevant information. This involves using effective search terms, recognizing authoritative domains (e.g., “.gov” or “.edu”), and understanding how search engine algorithms may prioritize certain content.&lt;/li&gt;
&lt;li aria-level=&#34;1&#34;&gt;&lt;b&gt;Digital Security and Privacy&lt;/b&gt;: Digital literacy also includes understanding how to protect one&#39;s privacy online and recognizing secure websites. For example, a digitally literate individual would know to look for “https://” at the beginning of a URL as an indicator of a secure website.&lt;/li&gt;
&lt;/ol&gt;
&lt;b&gt;Example of Digital Literacy in Practice&lt;/b&gt;: Suppose you are researching the benefits of electric vehicles (EVs). A digitally literate approach would involve consulting a mix of sources, including reputable news organizations (e.g., &lt;a href=&#34;https://apnews.com/&#34;&gt;Associated Press&lt;/a&gt;, &lt;a href=&#34;https://www.reuters.com/&#34;&gt;Reuters&lt;/a&gt;), trusted independent technical professional organizations or public agencies (e.g., &lt;a href=&#34;https://www.ieee.org&#34;&gt;IEEE&lt;/a&gt;, &lt;a href=&#34;https://alternative-fuels-observatory.ec.europa.eu/&#34;&gt;European Alternative Fuels Observatory&lt;/a&gt;), and peer-reviewed journals (&lt;a href=&#34;https://www.mdpi.com/journal/energies&#34;&gt;&lt;i&gt;Energies&lt;/i&gt;&lt;/a&gt;&lt;i&gt;,&lt;/i&gt; &lt;a href=&#34;https://www.tandfonline.com/journals/ttrv20/about-this-journal&#34;&gt;&lt;i&gt;Transport Reviews&lt;/i&gt;&lt;/a&gt;&lt;i&gt;, &lt;/i&gt;&lt;a href=&#34;https://www.sciencedirect.com/journal/journal-of-power-sources/about/editorial-board&#34;&gt;&lt;i&gt;Journal of Power Sources&lt;/i&gt;&lt;/a&gt;). It would also involve recognizing potential biases—such as an oil company-funded blog questioning the sustainability of EVs.
&lt;/section&gt;
&lt;section id=&#34;evaluating-websites&#34;&gt;
&lt;h2&gt;Evaluating Websites&lt;/h2&gt;
Evaluating the credibility of websites is a critical component of digital literacy. The internet contains valuable information but also a lot of misleading or false content. Here are key considerations for evaluating websites:
&lt;h3&gt;Key Considerations for Evaluating Websites&lt;/h3&gt;
&lt;ul&gt;
&lt;li aria-level=&#34;1&#34;&gt;&lt;b&gt;Language and Content Quality&lt;/b&gt;:
&lt;ul&gt;
&lt;li aria-level=&#34;2&#34;&gt;Credible websites typically use a &lt;b&gt;moderate and professional tone&lt;/b&gt;. They avoid extreme or sensational language that appeals to emotions rather than presenting facts.&lt;/li&gt;
&lt;li aria-level=&#34;2&#34;&gt;&lt;b&gt;Grammatical accuracy&lt;/b&gt; and proper &lt;b&gt;punctuation&lt;/b&gt; are often indicators of a professional and reliable website. Sites riddled with typos or casual language may lack reliability.&lt;/li&gt;
&lt;li aria-level=&#34;2&#34;&gt;&lt;b&gt;Fact-based Content&lt;/b&gt;: Reliable websites provide references, links to original studies, or citations to support their claims.&lt;/li&gt;
&lt;li aria-level=&#34;2&#34;&gt;&lt;b&gt;Example&lt;/b&gt;: A health website like Mayo Clinic (&lt;a href=&#34;http://www.mayoclinic.org&#34;&gt;www.mayoclinic.org&lt;/a&gt;) provides detailed health information, cites medical sources, and avoids sensational claims about treatments.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li aria-level=&#34;1&#34;&gt;&lt;b&gt;Authority of the Site Creator&lt;/b&gt;:
&lt;ul&gt;
&lt;li aria-level=&#34;2&#34;&gt;Consider who created the website. &lt;b&gt;Recognized authorities&lt;/b&gt; (e.g., universities, government institutions, established news organizations) provide credible content.&lt;/li&gt;
&lt;li aria-level=&#34;2&#34;&gt;Look for the &lt;b&gt;author’s credentials&lt;/b&gt;. An article on medical treatments should ideally be authored by a healthcare professional or medical researcher, with appropriate qualifications listed.&lt;/li&gt;
&lt;li aria-level=&#34;2&#34;&gt;&lt;b&gt;Example&lt;/b&gt;: The American Medical Association’s website (&lt;a href=&#34;http://www.ama-assn.org&#34;&gt;www.ama-assn.org&lt;/a&gt;) is a trustworthy source for medical information because it is maintained by a reputable professional organization.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li aria-level=&#34;1&#34;&gt;&lt;b&gt;External Consistency&lt;/b&gt;:
&lt;ul&gt;
&lt;li aria-level=&#34;2&#34;&gt;&lt;b&gt;External consistency&lt;/b&gt; is about comparing the information on the site with other reliable sources. A credible website should not present claims that contradict established knowledge.&lt;/li&gt;
&lt;li aria-level=&#34;2&#34;&gt;Cross-referencing helps determine if the information presented aligns with &lt;b&gt;mainstream consensus&lt;/b&gt; or is a fringe theory.&lt;/li&gt;
&lt;li aria-level=&#34;2&#34;&gt;&lt;b&gt;Example&lt;/b&gt;: If a website claims that climate change is not occurring, a comparison with multiple authoritative scientific sources (e.g., NASA, NOAA, IPCC) may reveal that the claim lacks external consistency and therefore credibility.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li aria-level=&#34;1&#34;&gt;&lt;b&gt;Objectivity and Bias&lt;/b&gt;:
&lt;ul&gt;
&lt;li aria-level=&#34;2&#34;&gt;Recognize the &lt;b&gt;potential bias&lt;/b&gt; or &lt;b&gt;purpose&lt;/b&gt; of a website. Websites created to sell a product, promote a political agenda, or advocate for a specific cause may present information in a skewed manner.&lt;/li&gt;
&lt;li aria-level=&#34;2&#34;&gt;&lt;b&gt;Lobbying organizations&lt;/b&gt;, for example, may present one-sided information to persuade rather than to inform.&lt;/li&gt;
&lt;li aria-level=&#34;2&#34;&gt;&lt;b&gt;Example&lt;/b&gt;: Greenpeace’s website (&lt;a href=&#34;http://www.greenpeace.org&#34;&gt;www.greenpeace.org&lt;/a&gt;) provides valuable information on environmental issues but is also advocating for specific policy changes. It is important to note that the content is aimed at activism and may include a biased perspective.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li aria-level=&#34;1&#34;&gt;&lt;b&gt;Currency of Information&lt;/b&gt;:
&lt;ul&gt;
&lt;li aria-level=&#34;2&#34;&gt;&lt;b&gt;Up-to-date content&lt;/b&gt; is crucial, especially for topics like technology, health, or science. Websites should indicate the date the content was published or last updated.&lt;/li&gt;
&lt;li aria-level=&#34;2&#34;&gt;&lt;b&gt;Outdated information&lt;/b&gt; can mislead or provide inaccurate conclusions if more recent research contradicts earlier findings.&lt;/li&gt;
&lt;li aria-level=&#34;2&#34;&gt;&lt;b&gt;Example&lt;/b&gt;: A website discussing COVID-19 treatments that has not been updated since 2020 may not reflect recent advancements, making it less reliable for current information.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li aria-level=&#34;1&#34;&gt;&lt;b&gt;Security of the Website&lt;/b&gt;:
&lt;ul&gt;
&lt;li aria-level=&#34;2&#34;&gt;&lt;b&gt;Secure websites&lt;/b&gt; often indicate greater credibility. Look for “https://” in the URL as a sign of secure data handling.&lt;/li&gt;
&lt;li aria-level=&#34;2&#34;&gt;&lt;b&gt;Trustworthy websites&lt;/b&gt; also typically have an “About Us” page that details their mission, authors, and organization’s background.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li aria-level=&#34;1&#34;&gt;&lt;b&gt;Cross-Referencing Sources&lt;/b&gt;:
&lt;ul&gt;
&lt;li aria-level=&#34;2&#34;&gt;A good practice in evaluating websites is to &lt;b&gt;cross-check&lt;/b&gt; information with other reputable sources. If multiple authoritative sites support the same conclusion, the information is more likely to be accurate.&lt;/li&gt;
&lt;li aria-level=&#34;2&#34;&gt;Use &lt;b&gt;fact-checking websites&lt;/b&gt; such as Snopes (&lt;a href=&#34;http://www.snopes.com&#34;&gt;www.snopes.com&lt;/a&gt;) or &lt;a href=&#34;https://mediabiasfactcheck.com/&#34;&gt;Media Bias / Fact Check&lt;/a&gt; (&lt;a href=&#34;https://mediabiasfactcheck.com/&#34;&gt;mediabiasfactcheck.com&lt;/a&gt;)  to verify claims and their sources that seem suspicious.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li aria-level=&#34;1&#34;&gt;&lt;b&gt;Avoiding Clickbait and Sensationalism&lt;/b&gt;:
&lt;ul&gt;
&lt;li aria-level=&#34;2&#34;&gt;&lt;b&gt;Clickbait headlines&lt;/b&gt; are designed to attract attention but often lack substance or reliable evidence. Reliable websites present headlines that are &lt;b&gt;informative and factual&lt;/b&gt; rather than exaggerated or misleading.&lt;/li&gt;
&lt;li aria-level=&#34;2&#34;&gt;&lt;b&gt;Example&lt;/b&gt;: Compare a “clickbait” headline like &#34;5 Ways Coffee Will Instantly Cure All Health Problems!&#34; with a more measured one such as &#34;Research Shows Potential Health Benefits of Moderate Coffee Consumption.&#34; The latter is more likely to come from a reputable source.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/section&gt;
&lt;p&gt; &lt;/p&gt;</description>
    </item>
    <item>
      <title>Free City Radio Interview: Exploring the Inherent Sacrifices of Capitalism</title>
      <link>/blog/2024/10/free-city-radio-interview-exploring-the-inherent-sacrifices-of-capitalism/</link>
      <pubDate>Thu, 03 Oct 2024 13:37:35 +0000</pubDate>
      <guid>/blog/2024/10/free-city-radio-interview-exploring-the-inherent-sacrifices-of-capitalism/</guid>
      <description>&lt;img alt=&#34;&#34; class=&#34;alignright size-large wp-image-788&#34; height=&#34;515&#34; src=&#34;/images/uploads/2024/10/free-city-radio-1It8TNlj-1024x586.jpg&#34; width=&#34;900&#34;/&gt;
&lt;p&gt;I’m excited to share that I was recently featured on &lt;a href=&#34;https://cod.ckcufm.com/programs/629/info.html&#34;&gt;&lt;strong&gt;Free City Radio&lt;/strong&gt;&lt;/a&gt; in an in-depth conversation about my research on the concept of &lt;strong&gt;human sacrifice in capitalism&lt;/strong&gt;. The interview, now &lt;a href=&#34;https://soundcloud.com/freecityradio/229-author-keren-wang-on-human-sacrifice-as-inherent-to-capitalism-today?utm_source=clipboard&amp;amp;utm_medium=text&amp;amp;utm_campaign=social_sharing&#34;&gt;&lt;strong&gt;available on SoundCloud&lt;/strong&gt;&lt;/a&gt;, is part of an interview series that examines the foundational realities of modern-day capitalism, specifically shaped by the notion of &lt;strong&gt;human sacrifice&lt;/strong&gt; as a necessary element of economic systems.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Here’s a link to the interview: &lt;em&gt;&lt;a href=&#34;https://soundcloud.com/freecityradio/229-author-keren-wang-on-human-sacrifice-as-inherent-to-capitalism-today&#34; rel=&#34;noopener&#34; target=&#34;_new&#34;&gt;Author Keren Wang on Human Sacrifice as Inherent to Capitalism Today&lt;/a&gt;&lt;/em&gt;&lt;/strong&gt;. During this conversation, I explore how this framework, traditionally viewed through ancient rituals, continues in modern contexts through the exploitation of labor, environmental destruction, and systemic injustices.&lt;/p&gt;</description>
    </item>
    <item>
      <title>New Publication: Legal and Ritological Dynamics of Personalized “Pillars of Shame” in Chinese Social Credit System Construction</title>
      <link>/blog/2024/09/new-publication-announcement-legal-and-ritological-dynamics-of-personalized-pillars-of-shame-in-chinese-social-credit-system-construction/</link>
      <pubDate>Fri, 13 Sep 2024 15:12:22 +0000</pubDate>
      <guid>/blog/2024/09/new-publication-announcement-legal-and-ritological-dynamics-of-personalized-pillars-of-shame-in-chinese-social-credit-system-construction/</guid>
      <description>&lt;p&gt;I am delighted to announce the publication of my latest article, &lt;em&gt;&lt;a href=&#34;/images/uploads/2024/09/China-Review_Vol.-24-No.-3_Aug.-2024.pdf&#34;&gt;“&lt;/a&gt;&lt;/em&gt;&lt;a href=&#34;/images/uploads/2024/09/ChinaReview_24.3_07_Keren-Wang.pdf&#34;&gt;&lt;strong&gt;Legal and Ritualological Dynamics of Personalized ‘Pillars of Shame’ in Chinese Social Credit System Construction&lt;/strong&gt;&lt;/a&gt;&lt;em&gt;&lt;a href=&#34;/images/uploads/2024/09/China-Review_Vol.-24-No.-3_Aug.-2024.pdf&#34;&gt;,&amp;quot; &lt;/a&gt;&lt;/em&gt;featured in the latest issue of &lt;a href=&#34;https://muse.jhu.edu/journal/621&#34;&gt;&lt;strong&gt;&lt;em&gt;The China Review&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt; (Vol. 24, No. 3). This work explores the intersection of the Chinese Social Credit System (SCS) with the Confucian ritual legal tradition and the rhetoric of public shaming. It integrates insights from rhetorical studies and philosophy of law to examine how the SCS operates as both a governance-by-data experiment and a framework that aligns with—and diverges from—domestic and transnational constitutional norms.&lt;/p&gt;</description>
    </item>
    <item>
      <title>&#34;Constitutional Dynamics in China-Taiwan Relations: A Historical and Comparative Analysis&#34; Presentation at Emory International Law Review Symposium on Disputed Territories Across the Globe, 13 April 2024</title>
      <link>/blog/2024/05/constitutional-dynamics-in-china-taiwan-relations-a-historical-and-comparative-analysis-presentation-at-emory-international-law-review-symposium-on-disputed-territories-across-the-globe-13-april/</link>
      <pubDate>Fri, 03 May 2024 19:34:56 +0000</pubDate>
      <guid>/blog/2024/05/constitutional-dynamics-in-china-taiwan-relations-a-historical-and-comparative-analysis-presentation-at-emory-international-law-review-symposium-on-disputed-territories-across-the-globe-13-april/</guid>
      <description>&lt;div&gt;
&lt;/div&gt;
&lt;p&gt;I would like to start by extending my heartfelt gratitude to Angelica Paquette, Editor-in-Chief of the &lt;a href=&#34;https://scholarlycommons.law.emory.edu/eilr/&#34;&gt;&lt;em&gt;Emory International Law Review&lt;/em&gt;&lt;/a&gt;, and Grayson Walker for their outstanding organization of this special symposium on &lt;a href=&#34;https://scholarlycommons.law.emory.edu/cgi/viewcontent.cgi?article=1004&amp;amp;context=eilr-symposia&#34;&gt;Disputed Territories across the Globe: A Future of Peace or Change, &lt;/a&gt;and particularly this panel on China-Taiwan relations. A special thank you to &lt;strong&gt;&lt;a href=&#34;https://law.emory.edu/faculty/faculty-profiles/ludsin-profile.html&#34;&gt;Hallie Ludsin&lt;/a&gt;&lt;/strong&gt; from Emory&amp;rsquo;s Center for International and Comparative Law for her valuable insights as our panel respondent today. I&amp;rsquo;m also grateful to see Professor &lt;a href=&#34;https://lcbackerblog.blogspot.com&#34;&gt;&lt;strong&gt;Larry Catá Backer&lt;/strong&gt;&lt;/a&gt; among us and would like to acknowledge Professor &lt;a href=&#34;https://law.emory.edu/faculty/faculty-profiles/fineman-profile.html&#34;&gt;&lt;strong&gt;Martha Albertson Fineman&lt;/strong&gt;&lt;/a&gt; for her invaluable guidance on my comparative and critical-legal research. My work is further supported by the &lt;a href=&#34;https://www.acls.org/fellow-grantees/keren-wang/&#34;&gt;American Council of Learned Societies Emerging Voices Fellowship&lt;/a&gt;, for which I am profoundly thankful.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Dasein, ChatGPT, and the Ritology of AI: Special lecture at East China University of Political Science and Law, Shanghai, June 18 2023 (updated_</title>
      <link>/blog/2023/12/dasein-chatgpt-and-the-ritology-of-ai-special-lecture-at-east-china-university-of-political-science-and-law-shanghai-june-18-2023/</link>
      <pubDate>Mon, 04 Dec 2023 12:55:09 +0000</pubDate>
      <guid>/blog/2023/12/dasein-chatgpt-and-the-ritology-of-ai-special-lecture-at-east-china-university-of-political-science-and-law-shanghai-june-18-2023/</guid>
      <description>&lt;h2&gt;&lt;span style=&#34;color: #800000;&#34;&gt;&lt;strong&gt;Dasein, ChatGPT, and the Ritology of AI:&lt;/strong&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;h3&gt;&lt;i&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;Special lecture &lt;/span&gt;&lt;/i&gt;&lt;i&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;at East China University of Political Science and Law, June 18, 2023&lt;/span&gt;&lt;/i&gt;&lt;i&gt;&lt;/i&gt;&lt;/h3&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p style=&#34;text-align: center;&#34;&gt;&lt;i&gt;What philosophical mischief might we unleash if Plato’s Cave or Zhuangzi&#39;s Well suddenly became inundated by algorithms, with the sound and fury of GeForce RTX™ GPU fans, insisting they’ve seen the light?&lt;/i&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;&lt;b&gt;Extended Abstract:&lt;/b&gt;&lt;/h3&gt;
This WIP paper builds off a guest lecture I have presented at the East China University of Political Science and Law (ECUPSL) in Shanghai, June 18, 2023. In this lecture, I had the privilege of sharing some of the preliminary research questions for my ongoing transdisciplinary survey, focusing on the intricate interplay between artificial intelligence and phenomenology. I will be highlighting the potentially profound implications of AI and its existential entanglements, particularly revolving around the context of Heidegger’s concept of &lt;i&gt;Dasein&lt;/i&gt;, and problematize some common ethical and ontological issues connected to &lt;i&gt;being-AI-in-our-world&lt;/i&gt;.
&lt;p&gt;The relentless acceleration of innovation in large language models (LLMs) and artificial neural networks (ANNs), embodied by transformative technologies like ChatGPT, deepfakes, and AI-generated art, has ignited a dual fire of awe and trepidation among technologists, ethicists, policymakers, and the broader public. As a vast body of literature explores the societal, ethical, and epistemological ripples of this ongoing technological upheaval—particularly within the fields of Information, Science, and Technology (IST)—this project seeks to offer a novel contribution by bringing into focus the lens of phenomenology: an intricate branch of philosophical inquiry renowned for its profound and methodical examination of the fundamental structures of human consciousness. By advocating for a phenomenological perspective, the project aims to illuminate how AI&amp;rsquo;s disruptions reshape not only our daily lives but also our understanding of what it means to &lt;i&gt;be&lt;/i&gt;. In doing so, it offers critical insights into the interplay between human and supra-human consciousness, reframing our relationship with emerging technologies and their implications for the future of sentient existence.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Persuasion and Propaganda - Supplementary Reading on Visualizing Propaganda (Emory, FA23)</title>
      <link>/teaching/2023/11/chn375w-persuasion-and-propaganda-supplementary-reading-on-visualizing-propaganda-fa2023-emory-university-realc/</link>
      <pubDate>Thu, 16 Nov 2023 11:36:19 +0000</pubDate>
      <guid>/teaching/2023/11/chn375w-persuasion-and-propaganda-supplementary-reading-on-visualizing-propaganda-fa2023-emory-university-realc/</guid>
      <description>&lt;h1&gt;&lt;b&gt;Key Concepts: Visualizing Propaganda&lt;/b&gt;&lt;/h1&gt;
&lt;figure&gt;
  &lt;img alt=&#34;&#34; class=&#34;wp-image-708&#34; height=&#34;290&#34; src=&#34;/images/uploads/2023/11/Antagonistic-soverignty-1024x742.jpg&#34; width=&#34;400&#34;/&gt;
  &lt;figcaption&gt;Jenne, Erin K. “Varieties of Nationalism in the Age of Covid-19.” Nationalities Papers 50, no. 1 (2022)&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;b&gt;Antagonistic sovereignty:&lt;/b&gt;  Antagonistic sovereignty refers to two types of divisive portrayals. The first is an &lt;em&gt;in-out&lt;/em&gt; depiction, which alienates and demonizes individuals who are not citizens of the nation (&amp;ldquo;non-nationals&amp;rdquo;). The second is an &amp;lsquo;up-down&amp;rsquo; depiction, targeting and vilifying the upper echelons of society, including the &amp;rsquo;elites&amp;rsquo; and the &amp;rsquo;establishment&amp;rsquo;. [1]&lt;/p&gt;</description>
    </item>
    <item>
      <title>Class slides for Social Movements and Social Change (Emory, FA23)</title>
      <link>/teaching/2023/10/class-slides-for-social-movements-and-social-change-emory-university-fa23/</link>
      <pubDate>Tue, 31 Oct 2023 11:20:56 +0000</pubDate>
      <guid>/teaching/2023/10/class-slides-for-social-movements-and-social-change-emory-university-fa23/</guid>
      <description>&lt;p&gt;Class teaching slides for CHN 375W Chinese Political Thought at Emory University, fall 2023&lt;/p&gt;
&lt;p&gt;Section on social movements and social change in modern China:&lt;/p&gt;
&lt;p&gt;[gallery ids=&amp;ldquo;689,690,691,692,693,694,695,696,697,698,699,700,701,702&amp;rdquo;]&lt;/p&gt;</description>
    </item>
    <item>
      <title>Class slides - The Hundred Schools of Thought (Chinese Political Thought)</title>
      <link>/teaching/2023/10/class-slides-for-chn375w-chinese-political-thought-propaganda-the-hundred-schools-of-thought/</link>
      <pubDate>Tue, 17 Oct 2023 10:08:46 +0000</pubDate>
      <guid>/teaching/2023/10/class-slides-for-chn375w-chinese-political-thought-propaganda-the-hundred-schools-of-thought/</guid>
      <description>&lt;iframe frameborder=&#34;0&#34; height=&#34;400&#34; marginheight=&#34;0&#34; marginwidth=&#34;0&#34; scrolling=&#34;no&#34; src=&#34;https://www.slideshare.net/slideshow/embed_code/key/9siPmohb1csx3H?hostedIn=slideshare&amp;amp;page=upload&#34; width=&#34;476&#34;&gt;&lt;span class=&#34;mce_SELRES_start&#34; data-mce-type=&#34;bookmark&#34; style=&#34;display: inline-block; width: 0px; overflow: hidden; line-height: 0;&#34;&gt;﻿&lt;/span&gt;&lt;/iframe&gt;
&lt;p&gt;Class PowerPoint slides for &lt;em&gt;CHN375W: Chinese Political Thought/Propaganda (Emory University, Fall 2023)&lt;/em&gt;: covering the historical evolution and contemporary implications of &amp;ldquo;The Hundred Schools of Thought&amp;rdquo; in Chinese governance and political practices.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Demystifying The Chinese Social Credit System - Presentation for the Symposium on China’s Data Governance and its Impact on US-China Relations, hosted by the Carter Center China Focus</title>
      <link>/blog/2023/10/demystifying-the-chinese-social-credit-system-presentation-for-the-symposium-on-chinas-data-governance-and-its-impact-on-us-china-relations-hosted-by-the-carter-center-china-focus/</link>
      <pubDate>Thu, 12 Oct 2023 21:46:45 +0000</pubDate>
      <guid>/blog/2023/10/demystifying-the-chinese-social-credit-system-presentation-for-the-symposium-on-chinas-data-governance-and-its-impact-on-us-china-relations-hosted-by-the-carter-center-china-focus/</guid>
      <description>&lt;h1&gt;&lt;b&gt;Demystifying The Chinese Social Credit System - Presentation for the &lt;a href=&#34;https://chinafocus.info/symposium-data-governance-and-its-impact-on-us-china-relations/&#34;&gt;Symposium on China’s Data Governance and its Impact on US-China Relations&lt;/a&gt;, hosted by the Carter Center China Focus&lt;/b&gt;&lt;/h1&gt;
&lt;h2&gt;&lt;img alt=&#34;&#34; class=&#34;aligncenter size-large wp-image-662&#34; height=&#34;503&#34; src=&#34;/images/uploads/2023/10/Screenshot-2023-10-12-204517-1024x572.png&#34; width=&#34;900&#34;/&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;b&gt;Introduction:&lt;/b&gt;&lt;/h2&gt;
There is nothing new about public authorities using collected numerical info as a governing technology. Census has been a central governance tool throughout Ancient Rome and Imperial China. In fact, the need for keeping taxation records was a key historical exigence driving the invention of many earliest writing systems.
&lt;p&gt;Throughout human history, public authorities have relied on collected numerical data as a tool for governance. This was evident with the census in Ancient Rome and Imperial China, where early writing systems were developed primarily for taxation records. The digitization of data and advancements in data science have revolutionized governance-by-data, making it continuously updated and more encompassing. The Chinese Social Credit System (SCS) is a testament to this evolution. Despite its significance, the SCS remains misunderstood, especially outside the Global North. Today, I aim to provide clarity on this topic, considering its implications on human rights and rule of law both within and beyond China, and shedding light on US-China relations. This talk will bring together relevant historical, rhetorical, socio-cultural and legal contexts to unpack the emergent structures of the Chinese social credit system and data governance experiments. By catalyzing greater open dialogue and critical inquiry on this thorny topic, this lecture seeks to advance the vision of The Carter Center and contribute to a deeper understanding of the past, present, and future of US-China relations.&lt;/p&gt;</description>
    </item>
    <item>
      <title>About</title>
      <link>/about/</link>
      <pubDate>Tue, 29 Aug 2023 11:12:35 +0000</pubDate>
      <guid>/about/</guid>
      <description>&lt;!-- wp:html --&gt;
&lt;!-- Header --&gt;
&lt;div class=&#34;wp-block-image&#34;&gt;
&lt;img alt=&#34;Portrait of Keren Wang&#34; class=&#34;size-medium wp-image-759 alignleft&#34; height=&#34;300&#34; src=&#34;/images/uploads/2025/08/profile-large.jpg&#34; width=&#34;300&#34;/&gt;
&lt;/div&gt;
&lt;h1&gt;Keren Wang, PhD&lt;/h1&gt;
&lt;p&gt;
  Faculty, Department of Communication, Georgia State University · Visiting Scholar, Emory University&lt;br/&gt;
&lt;em&gt;&lt;a href=&#34;https://www.acls.org/fellow-grantees/keren-wang/&#34; rel=&#34;noopener&#34; target=&#34;_blank&#34;&gt;ACLS Emerging Voices Fellow (2022–2024)&lt;/a&gt;&lt;/em&gt;
&lt;/p&gt;
&lt;!-- Primary actions --&gt;
&lt;div class=&#34;wp-block-buttons&#34;&gt;
&lt;div class=&#34;wp-block-button&#34;&gt;&lt;a class=&#34;wp-block-button__link&#34; href=&#34;mailto:contact@kerenwang.org&#34;&gt;Email me&lt;/a&gt;&lt;/div&gt;
&lt;div class=&#34;wp-block-button&#34;&gt;&lt;a class=&#34;wp-block-button__link&#34; href=&#34;/cv/&#34;&gt;C.V.&lt;/a&gt;&lt;/div&gt;
&lt;div class=&#34;wp-block-button&#34;&gt;&lt;a class=&#34;wp-block-button__link&#34; href=&#34;/blog/&#34;&gt;Blog&lt;/a&gt;&lt;/div&gt;
&lt;div class=&#34;wp-block-button&#34;&gt;&lt;a class=&#34;wp-block-button__link&#34; href=&#34;/teaching/&#34;&gt;Teaching&lt;/a&gt;&lt;/div&gt;
&lt;div class=&#34;wp-block-button&#34;&gt;&lt;a class=&#34;wp-block-button__link&#34; href=&#34;https://orcid.org/0000-0001-6933-885X&#34; rel=&#34;noopener&#34; target=&#34;_blank&#34;&gt;Publications (ORCID)&lt;/a&gt;&lt;/div&gt;
&lt;div class=&#34;wp-block-button&#34;&gt;&lt;a class=&#34;wp-block-button__link&#34; href=&#34;https://www.routledge.com/Legal-and-Rhetorical-Foundations-of-Economic-Globalization-An-Atlas-of-Ritual-Sacrifice-in-Late-Capitalism/Wang/p/book/9780367727826&#34; rel=&#34;noopener&#34; target=&#34;_blank&#34;&gt;Book&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;noscript&gt;kerenwcpe [at] gmail [dot] com&lt;/noscript&gt;
&lt;script&gt;
  (function () {
    var u = &#39;kerenwcpe&#39;, d = &#39;gmail&#39;, t = &#39;.com&#39;;
    var a = document.getElementById(&#39;em&#39;);
    if (a) a.href = &#39;mailto:&#39; + u + &#39;@&#39; + d + t + &#39;?subject=Hello%20from%20your%20website&#39;;
  }());
&lt;/script&gt;
&lt;hr class=&#34;wp-block-separator is-style-wide&#34;/&gt;
&lt;!-- /wp:html --&gt;
&lt;!-- wp:heading --&gt;
&lt;h2&gt;Highlighted Posts&lt;/h2&gt;
&lt;!-- /wp:heading --&gt;
&lt;!-- wp:html --&gt;
&lt;section class=&#34;highlighted-posts&#34; style=&#34;display:grid;grid-template-columns:repeat(auto-fit,minmax(240px,1fr));gap:1rem;&#34;&gt;
&lt;!-- Card 1 (ID 933) --&gt;
&lt;article class=&#34;highlight-card&#34; style=&#34;padding:.5rem;border-radius:16px;border:1px solid #ddd;&#34;&gt;
&lt;h3 style=&#34;margin:.25rem 0;&#34;&gt;&lt;a href=&#34;/blog/2025/08/new-research-project-artificial-intelligence-and-human-sacrifice/&#34;&gt;New Research Project: Artificial Intelligence and Human Sacrifice&lt;/a&gt;&lt;/h3&gt;
&lt;p style=&#34;margin:.25rem 0 .5rem 0;color:#444;&#34;&gt;This series will share work-in-progress manuscript draft as I develop the project into a full-length monograph. In the months ahead, I will trace how sacrificial rationalities persist, adapt, and become reconfigured in our algorithmic age. From oracle bone pyromancy in ancient China to AI-augmented prior-authorization denials in contemporary healthcare, the rituals may differ in form, but the underlying logic remains hauntingly familiar. &lt;/p&gt;</description>
    </item>
    <item>
      <title>Event Announcement: China’s Data Governance and Its Impact on U.S.-China Relations, Sept 26th at The Carter Center</title>
      <link>/blog/2023/08/event-announcement-chinas-data-governance-and-its-impact-on-u-s-china-relations/</link>
      <pubDate>Tue, 29 Aug 2023 10:50:24 +0000</pubDate>
      <guid>/blog/2023/08/event-announcement-chinas-data-governance-and-its-impact-on-u-s-china-relations/</guid>
      <description>&lt;p&gt;&lt;strong&gt;We are pleased to announce an upcoming hybrid symposium titled &amp;ldquo;China’s Data Governance and Its Impact on U.S.-China Relations&amp;rdquo; organized by The Carter Center, Emory University, China Research Center, Georgia State University, and Spellman College. &lt;/strong&gt;&lt;/p&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;Event Details:&lt;/h3&gt;
&lt;strong&gt;Date:&lt;/strong&gt; September 26, 2023 Time: 1:30 pm to 4:00 pm
&lt;p&gt;&lt;strong&gt;Location (in-person):&lt;/strong&gt; &lt;a href=&#34;https://www.cartercenter.org/about/facilities/spaces-and-fees/cyprus_room.html&#34; rel=&#34;noopener&#34; target=&#34;_blank&#34;&gt;Cyprus Room&lt;/a&gt;, The Carter Center , 453 John Lewis Freedom Parkway NE | Atlanta, GA 30307&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Virtual Attendance Registration&lt;/strong&gt;: &lt;a href=&#34;https://us02web.zoom.us/webinar/register/WN_bYTHGGiZQ8KK-2ARn5reEA&#34; rel=&#34;noopener&#34; target=&#34;_new&#34;&gt;Register Here&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;strong&gt;Event Description:&lt;/strong&gt;&lt;/h3&gt;
The relationship between the United States and China is currently facing significant challenges, particularly in the areas of technology and national security. Unfortunately, many misconceptions surround the development of the Chinese data governance system, often exacerbated by sensationalized discussions in the public discourse on US-China relations. This symposium aims to dispel these myths and provide a nuanced understanding of Chinese data governance and its implications for US-China relations. It seeks to foster open and critical dialogue among scholars, policymakers, and practitioners, offering an in-depth update on the topic.
&lt;h5&gt;&lt;/h5&gt;
&lt;h3&gt;Speakers:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;&lt;a href=&#34;https://global.emory.edu/about/staff/obse-ababiya.html&#34; rel=&#34;noopener&#34; target=&#34;_blank&#34;&gt;Obse Ababiya&lt;/a&gt;&lt;/strong&gt;, Associate Director, Office of Global Strategy and Initiatives at Emory University&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://pennstatelaw.psu.edu/faculty/backer&#34; rel=&#34;noopener&#34; target=&#34;_blank&#34;&gt;&lt;strong&gt;Larry Catá Backer&lt;/strong&gt;&lt;/a&gt;, Professor of Law and International Affairs, Penn State Law School&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.brookings.edu/people/jamie-horsley/&#34; rel=&#34;noopener&#34; target=&#34;_blank&#34;&gt;&lt;strong&gt;Jamie Horsley&lt;/strong&gt;&lt;/a&gt;, Senior Fellow, Paul Tsai China Center at Yale Law School | &lt;span class=&#34;expert-title h5 md:h3&#34;&gt;John L. Thornton China Center at &lt;/span&gt;Brookings Institution&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;&lt;a href=&#34;https://www.aynnekokas.com/aboutme&#34; rel=&#34;noopener&#34; target=&#34;_blank&#34;&gt;Aynne Kokas&lt;/a&gt;&lt;/strong&gt;, C.K. Yen Professor at the Miller Center and Associate Professor of Media Studies, University of Virginia&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.mariarepnikova.com/&#34; rel=&#34;noopener&#34; target=&#34;_blank&#34;&gt;&lt;strong&gt;Maria Repnikova&lt;/strong&gt;&lt;/a&gt;, Associate Professor in Global Communication, Georgia State University&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/about/&#34; rel=&#34;noopener&#34; target=&#34;_blank&#34;&gt;&lt;strong&gt;Keren Wang&lt;/strong&gt;&lt;/a&gt;, ACLS Emerging Voices Fellow, Emory University Department of Russian and East Asian Languages and Cultures&lt;/li&gt;
&lt;/ul&gt;
The symposium is being convened by &lt;strong&gt;&lt;a href=&#34;https://www.cartercenter.org/about/experts/yawei_liu.html&#34; rel=&#34;noopener&#34; target=&#34;_blank&#34;&gt;Dr. Yawei Liu&lt;/a&gt;&lt;/strong&gt;, Senior Advisor on China at The Carter Center and Dr. Keren Wang of Emory University Department of Russian and East Asian Languages and Cultures
&lt;h5&gt;&lt;/h5&gt;
&lt;h3&gt;Agenda:&lt;/h3&gt;
&lt;strong&gt;1:30 pm: &lt;/strong&gt;Ms. Obse Ababiya opens the meeting, introducing the organizers and sponsors
&lt;p&gt;&lt;strong&gt;1:35 pm: &lt;/strong&gt;Opening remarks by Dr. Maria Repnikova&lt;/p&gt;</description>
    </item>
    <item>
      <title>Event Announcement:  Chinese Politics &amp; Society Book Talk Series Featuring Dr. Brantly Womack&#39;s RECENTERING PACIFIC ASIA, hosted by the Carter Center China Focus,  Sept 7, 2023</title>
      <link>/blog/2023/08/event-announcement-chinese-politics-society-book-talk-series-featuring-dr-brantly-womacks-recentering-pacific-asia-hosted-by-the-carter-center-china-focus-sept-7-2023/</link>
      <pubDate>Wed, 16 Aug 2023 14:57:38 +0000</pubDate>
      <guid>/blog/2023/08/event-announcement-chinese-politics-society-book-talk-series-featuring-dr-brantly-womacks-recentering-pacific-asia-hosted-by-the-carter-center-china-focus-sept-7-2023/</guid>
      <description>&lt;p&gt;I am excited to share an upcoming event on September 7, 2023: The Carter Center China Focus will be hosting Dr. Brantly Womack for its Chinese Politics &amp;amp; Society Book Talk Series: of the Chinese Politics &amp;amp; Society book talk series, in collaboration with the China Research Center, East Asia Collective, and the Department of Russia and East Asian Languages and Cultures at Emory University.&lt;/p&gt;
&lt;p&gt;This session will feature a talk by Dr. Brantly Womack, Professor Emeritus of Foreign Affairs at the University of Virginia, on his new book &amp;ldquo;Recentering Pacific Asia: Regional China and World Order&amp;rdquo; (Cambridge University Press, 2023).&lt;/p&gt;</description>
    </item>
    <item>
      <title>Vulnerability Theory and Digital Intimacy: &#39;Pillars of Shame&#39; in the Age of Big Data</title>
      <link>/blog/2023/07/vulnerability-theory-and-digital-intimacy-pillars-of-shame-in-the-age-of-big-data/</link>
      <pubDate>Thu, 13 Jul 2023 18:25:17 +0000</pubDate>
      <guid>/blog/2023/07/vulnerability-theory-and-digital-intimacy-pillars-of-shame-in-the-age-of-big-data/</guid>
      <description>&lt;p&gt;&lt;img alt=&#34;&#34; class=&#34;aligncenter size-large wp-image-630&#34; height=&#34;510&#34; src=&#34;/images/uploads/2023/07/Digital-Intimacy-Workshop-Emory-March-2023-1024x768.jpg&#34; width=&#34;680&#34;/&gt;I am excited to share with you a recap of my recent presentation titled &amp;ldquo;Vulnerability Theory and Digital Intimacy: &amp;lsquo;Pillars of Shame&amp;rsquo; in the Age of Big Data.&amp;rdquo; This thought-provoking session took place at the &lt;a href=&#34;https://web.gs.emory.edu/vulnerability/_includes/documents/workshop-schedules/0322_scheduledigital_intimacy.pdf&#34;&gt;Vulnerability Theory and Digital Intimacy Workshop&lt;/a&gt;, hosted by convened by Professor &lt;a href=&#34;https://law.emory.edu/faculty/faculty-profiles/fineman-profile.html&#34;&gt;Martha Albertson Fineman&lt;/a&gt; and &lt;a href=&#34;https://web.gs.emory.edu/vulnerability/workshops/index.html&#34;&gt;The Vulnerability and the Human Condition Initiative&lt;/a&gt; at Emory University School of Law on March 24, 2023.&lt;/p&gt;
&lt;p&gt;During the presentation, I delved into the fascinating field of digital governance technologies and their role as modern public shaming rituals. I explored the impact of these technologies on individuals&amp;rsquo; vulnerability in the digital age and drew connections to Martha Fineman&amp;rsquo;s vulnerability theory of law.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Upcoming Emory REALC Faculty Spotlight Series lecture on Feb. 6</title>
      <link>/blog/2023/02/upcoming-emory-realc-faculty-spotlight-series-lecture-on-feb-6/</link>
      <pubDate>Wed, 01 Feb 2023 15:03:02 +0000</pubDate>
      <guid>/blog/2023/02/upcoming-emory-realc-faculty-spotlight-series-lecture-on-feb-6/</guid>
      <description>&lt;div&gt;
&lt;h2 class=&#34;display-flex align-items-center pt2 t-14&#34;&gt;&lt;span style=&#34;color: #000000;&#34;&gt;&lt;span class=&#34;lt-line-clamp__raw-line&#34;&gt;Upcoming Feb. 6 public lecture: &lt;/span&gt;&#34;Social and Moral Engineering in the Age of Big Data: Personalized &#39;Pillars of Shame&#39; and the Chinese Social Credit System&#34;&lt;/span&gt;&lt;/h2&gt;
&lt;/div&gt;
&lt;h5 class=&#34;display-flex align-items-center pt2&#34;&gt;&lt;strong&gt;Hosted by REALC Faculty Spotlight Series, Emory University&lt;/strong&gt;&lt;/h5&gt;
&lt;h5&gt;&lt;strong&gt;Format: Online&lt;/strong&gt;&lt;/h5&gt;
&lt;h5&gt;&lt;strong&gt;Time: &lt;span class=&#34;mr2 ml2&#34;&gt;Monday evening, Feb 6, 2023, 7:00 PM - 8:00 PM (US Eastern Standard Time)&lt;/span&gt;&lt;/strong&gt;&lt;/h5&gt;
&lt;h5&gt;&lt;span class=&#34;lt-line-clamp__raw-line&#34;&gt;&lt;strong&gt;&lt;span class=&#34;t-14 t-black--light t-bold flex-shrink-zero&#34;&gt;Event link&lt;/span&gt; &lt;/strong&gt;&lt;a class=&#34;events-live-top-card__external-url t-14 t-black--light t-normal link-without-visited-state ember-view&#34; href=&#34;https://emory.zoom.us/j/94409772969&#34; id=&#34;ember1685&#34; rel=&#34;noopener noreferrer&#34; tabindex=&#34;0&#34; target=&#34;_blank&#34;&gt;&lt;strong&gt; https://emory.zoom.us/j/94409772969&lt;/strong&gt; &lt;/a&gt;&lt;/span&gt;&lt;/h5&gt;
&lt;span class=&#34;lt-line-clamp__raw-line&#34;&gt;For my upcoming Feb. 6 public lecture hosted by &lt;strong&gt;Emory REALC Faculty Spotlight Series&lt;/strong&gt;, I will be discussing the legal and rhetorical dynamics of public shaming policy experiments in China, as a part of their ongoing Social Credit System project.&lt;/span&gt;
&lt;p&gt;The construction of the Chinese Social Credit System (SCS) represents one of the most ambitious social engineering projects in post-Mao China. It is also arguably the most significant governance-by-data experiment thus far the 21st century. This lecture explores the ways in which the SCS project was prompted by a ritual impulse to inculcate Chinese societal moral character in the big data age.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Persuasion and Propaganda new digital text case study draft - Bureaucratic Rhetoric and Institutions of Involuntary Labor in Early Imperial China</title>
      <link>/blog/2022/01/persuasion-and-propaganda-in-ancient-china-cas175-case-study-draft-bureaucratic-rhetoric-and-institutions-of-involuntary-labor/</link>
      <pubDate>Tue, 25 Jan 2022 10:18:06 +0000</pubDate>
      <guid>/blog/2022/01/persuasion-and-propaganda-in-ancient-china-cas175-case-study-draft-bureaucratic-rhetoric-and-institutions-of-involuntary-labor/</guid>
      <description>&lt;p&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;American economist &lt;/span&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Alan_Blinder&#34;&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;Alan Blinder&lt;/span&gt;&lt;/a&gt; &lt;span style=&#34;font-weight: 400;&#34;&gt;famously characterized the rhetorical style of &lt;/span&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Bureaucrat&#34;&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;bureaucrats&lt;/span&gt;&lt;/a&gt; &lt;span style=&#34;font-weight: 400;&#34;&gt;– an umbrella term denoting unelected officials &lt;/span&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;holding administrative, technical, and managerial positions – as “secretive, cryptic, [sic] using numerous and complicated words to convey little of any meaning.” &lt;/span&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;Think of a career government worker who talks in jargon-filled canned statements with little substance. While it may be counterintuitive to associate bureaucracy with the art of persuasion, history tells us quite a different story. Not only did &lt;/span&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Bureaucracy#Ancient&#34;&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;bureaucracy&lt;/span&gt;&lt;/a&gt; &lt;span style=&#34;font-weight: 400;&#34;&gt;itself emerge as a rhetorical response to the exigencies of &lt;/span&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Quipu&#34;&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;record-keeping&lt;/span&gt;&lt;/a&gt; &lt;span style=&#34;font-weight: 400;&#34;&gt;and &lt;/span&gt;&lt;a href=&#34;http://www.general-intelligence.com/library/hr.pdf&#34;&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;resolving disputes&lt;/span&gt;&lt;/a&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;, but it also provides a powerful platform for propaganda, sometimes making unpalatable measures appear proper and necessary.&lt;/span&gt;
&lt;span style=&#34;font-weight: 400;&#34;&gt;In this case study, we will examine official narratives on &lt;/span&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Involuntary_servitude&#34;&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;involuntary servitude&lt;/span&gt;&lt;/a&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt; (slavery) &lt;/span&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;in &lt;/span&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/History_of_China#Imperial_China&#34;&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;Early Imperial China&lt;/span&gt;&lt;/a&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;, and focus on how the imperial bureaucracy justified its institutions of forced labor despite having officially abolished slavery.  We approach this through a historical lens, the role of bureaucracy in persuasion and propaganda, and reflect on how authorities of power would employ subtle rhetorical strategies &lt;/span&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;to make dehumanizing, exploitative structures appear legitimate and necessary.&lt;/span&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Persuasion and Propaganda in Ancient China (textbook chapter draft), part 3</title>
      <link>/blog/2022/01/persuasion-and-propaganda-in-ancient-china-textbook-chapter-draft-part-3/</link>
      <pubDate>Sat, 01 Jan 2022 17:37:21 +0000</pubDate>
      <guid>/blog/2022/01/persuasion-and-propaganda-in-ancient-china-textbook-chapter-draft-part-3/</guid>
      <description>&lt;h3&gt;&lt;strong&gt;Confucian Rhetoric:&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Among the Hundred Schools of Thought, Confucianism, also known as &lt;strong&gt;Ru xue &lt;/strong&gt;(lit. “humanism”) or &lt;strong&gt;Ruism&lt;/strong&gt;, arguably played the most significant role in shaping the Chinese rhetorical tradition. This is in part due to the fact that Confucianism was established as the official state ideology throughout most of Imperial Chinese history.&lt;/p&gt;
&lt;p&gt;Originated from the writings and teaching of &lt;a href=&#34;https://en.wikipedia.org/wiki/Confucius&#34;&gt;Confucius&lt;/a&gt; and his &lt;a href=&#34;https://en.wikipedia.org/wiki/Disciples_of_Confucius&#34;&gt;disciples&lt;/a&gt;, most notably &lt;a href=&#34;https://en.wikipedia.org/wiki/Mencius&#34;&gt;Mencius&lt;/a&gt; (Mengzi) &lt;a href=&#34;https://en.wikipedia.org/wiki/Xun_Kuang&#34;&gt;Xun Kuang&lt;/a&gt; (Xunzi), its philosophy can be characterized as humanistic and rationalistic, and a tendency to emphasize the importance of ritual and upholding traditions. After multiple centuries of continuous development and official endorsement, Confucianism expanded into an umbrella that covers a range of &lt;a href=&#34;https://en.wikipedia.org/wiki/Confucianism&#34;&gt;philosophical&lt;/a&gt;, &lt;a href=&#34;https://en.wikipedia.org/wiki/Confucianism#Social_morality_and_ethics&#34;&gt;moral&lt;/a&gt;, &lt;a href=&#34;https://en.wikipedia.org/wiki/Confucius#Music_and_Poetry&#34;&gt;literary&lt;/a&gt;, &lt;a href=&#34;https://en.wikipedia.org/wiki/Temple_of_Confucius&#34;&gt;religious&lt;/a&gt;, and &lt;a href=&#34;https://en.wikipedia.org/wiki/County_magistrate&#34;&gt;legal&lt;/a&gt; traditions. To this day, Confucian ethics remains a defining element of Chinese culture.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Persuasion and Propaganda Ancient China (chapter draft), part 2: the Hundred Schools of Thought</title>
      <link>/blog/2021/12/persuasion-and-propaganda-ancient-china-chapter-draft-part-2-the-hundred-schools-of-thought/</link>
      <pubDate>Fri, 03 Dec 2021 14:30:03 +0000</pubDate>
      <guid>/blog/2021/12/persuasion-and-propaganda-ancient-china-chapter-draft-part-2-the-hundred-schools-of-thought/</guid>
      <description>&lt;h2&gt;&lt;b&gt;The Warring States and the Hundred Schools of Thought&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;The core of classical Chinese philosophical tradition emerged during a tumultuous period of ancient Chinese history, during which the civilization transitioned from a &lt;/span&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Zhou_dynasty#Feudalism&#34;&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;decentralized feudal system&lt;/span&gt;&lt;/a&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt; into a &lt;/span&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Qin&#39;s_wars_of_unification&#34;&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;unified empire&lt;/span&gt;&lt;/a&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;. We begin this section with a brief and high-altitude overview of the historical background for those who are not familiar with ancient Chinese history. The time frame would be the &lt;/span&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Warring_States_period&#34;&gt;&lt;i&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;Chunqiu-Zhanguo&lt;/span&gt;&lt;/i&gt;&lt;/a&gt; &lt;span style=&#34;font-weight: 400;&#34;&gt;era (lit., “Periods of Spring and Autumn and the Warring States”) which lasted from c.770 to 221 BCE  &lt;/span&gt;
&lt;span style=&#34;font-weight: 400;&#34;&gt;The Spring and Autumn period of Classical Chinese history, from approximately 771 to 476 BCE. The nominal seat of dynastic power, &lt;/span&gt;&lt;i&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;Zhou &lt;/span&gt;&lt;/i&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Son_of_Heaven&#34;&gt;&lt;i&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;Tianzi&lt;/span&gt;&lt;/i&gt;&lt;/a&gt; &lt;span style=&#34;font-weight: 400;&#34;&gt;(lit “Son of Heaven”) had rapidly&lt;/span&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Eastern_Zhou&#34;&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt; declined&lt;/span&gt;&lt;/a&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;, and in Confucious’ own words, that the “ancient feudal rite and hymns have crumbled （禮樂崩壞）.” It was a time when former Zhou feudal domains became de-facto independent sovereign states. Larger states swallow smaller ones. Rapid land reforms and power restructurings took place across major Chinese states in order to claim economic and military supremacy over their peers. Various &lt;/span&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Five_Hegemons&#34;&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;great powers rose and fell &lt;/span&gt;&lt;/a&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;throughout this period, constantly at war against one other for achieving hegemony over &lt;/span&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Tianxia&#34;&gt;&lt;i&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;Tianxia&lt;/span&gt;&lt;/i&gt;&lt;/a&gt;&lt;i&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;.&lt;/span&gt;&lt;/i&gt;
&lt;span style=&#34;font-weight: 400;&#34;&gt;The Warring States period is also when the coin-based cash economy rapidly took off throughout China-proper. Of course this did not happen overnight, but based on ample material evidence, the cash economy did intensify within a relatively short period, as major states began to implement similar types of sweeping bureaucratic governance reforms and centrally managed crop buy-out policies to remain competitive. By the time of the late Warring States era, your &amp;ldquo;average&amp;rdquo; peasant say in the state of &lt;/span&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Wey_(state)&#34;&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;Wei&lt;/span&gt;&lt;/a&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt; or &lt;/span&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Zhao_(state)&#34;&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;Zhao&lt;/span&gt;&lt;/a&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt; or any major power, not only was paid by the central government, in cash, to purchase his grains for strategic reserve, he is also likely to be drafted every so often, for a fixed term, to perform infrastructure labor or serve in the military, and paid a stipend at least in part in the form of cash coins.&lt;/span&gt;
&lt;span style=&#34;font-weight: 400;&#34;&gt;Consequently, old feudal aristocratic powers were displaced by an emerging class of scholar-officials, many of whom came from humble, non-noble backgrounds including &lt;/span&gt;&lt;a href=&#34;https://ctext.org/dictionary.pl?if=gb&amp;amp;id=1315#s10021396&#34;&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;Confucious&lt;/span&gt;&lt;/a&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt; and his &lt;/span&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Yan_Hui&#34;&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;disciples&lt;/span&gt;&lt;/a&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;. Members of this new &lt;/span&gt;&lt;i&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;literati &lt;/span&gt;&lt;/i&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;class often traveled throughout China and offered their knowledge and service to the most promising state sponsor.   &lt;/span&gt;
&lt;span style=&#34;font-weight: 400;&#34;&gt;Because of the intense interstate competition and the increasing demand for &lt;/span&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Scholar-official&#34;&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;scholar-officials&lt;/span&gt;&lt;/a&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;, philosophies flourished throughout the &lt;/span&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Warring_States_period&#34;&gt;&lt;i&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;Chunqiu-Zhanguo&lt;/span&gt;&lt;/i&gt;&lt;/a&gt; &lt;span style=&#34;font-weight: 400;&#34;&gt;era.  Early &lt;/span&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Han_dynasty&#34;&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;Han &lt;/span&gt;&lt;/a&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;historian &lt;/span&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Sima_Qian&#34;&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;Sima Qian&lt;/span&gt;&lt;/a&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt; used the term &lt;/span&gt;&lt;i&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;zhūzǐ bǎijiā &lt;/span&gt;&lt;/i&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;(諸子百家), or&lt;/span&gt; &lt;span style=&#34;font-weight: 400;&#34;&gt;“&lt;/span&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Hundred_Schools_of_Thought&#34;&gt;&lt;b&gt;Hundred Schools of Thought&lt;/b&gt;&lt;/a&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;” to describe this unprecedented expansion and diversification of Chinese intellectual outputs. Many philosophical texts from this historical moment – such as &lt;/span&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;the&lt;/span&gt; &lt;a href=&#34;https://en.wikipedia.org/wiki/Analects&#34;&gt;&lt;i&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;Analects&lt;/span&gt;&lt;/i&gt;&lt;/a&gt;&lt;i&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;, &lt;/span&gt;&lt;/i&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Tao_Te_Ching&#34;&gt;&lt;i&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;Tao Te Ching&lt;/span&gt;&lt;/i&gt;&lt;/a&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;, and&lt;/span&gt; &lt;a href=&#34;https://en.wikipedia.org/wiki/The_Art_of_War&#34;&gt;&lt;i&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;Sun Tzu’s Art of War&lt;/span&gt;&lt;/i&gt;&lt;/a&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt; have become widely known outside of China. See the timeline in figure 2 below for a partial list of key figures from the &lt;/span&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Hundred_Schools_of_Thought&#34;&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;Hundred Schools of Thought&lt;/span&gt;&lt;/a&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt; (top row). The timeline also includes contemporaneous Indo-European thinkers at the bottom row for clearer time reference:&lt;/span&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Persuasion and Propaganda Ancient China (chapter draft), part 1: Pyromancy and the Invention of the Chinese Writing System</title>
      <link>/blog/2021/10/persuasion-and-propaganda-ancient-china-chapter-draft-part-1-pyromancy-and-the-invention-of-the-chinese-writing-system/</link>
      <pubDate>Fri, 01 Oct 2021 17:14:32 +0000</pubDate>
      <guid>/blog/2021/10/persuasion-and-propaganda-ancient-china-chapter-draft-part-1-pyromancy-and-the-invention-of-the-chinese-writing-system/</guid>
      <description>&lt;h1&gt;&lt;b&gt;Persuasion and Propaganda Ancient China &lt;/b&gt;&lt;/h1&gt;
&lt;h2&gt;&lt;b&gt;（chapter draft, part 1）&lt;/b&gt;&lt;/h2&gt;
 
&lt;p&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;by Keren Wang,  &lt;a href=&#34;mailto:kwang35@gsu.edu&#34;&gt;kwang35@gsu.edu&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;There are increasing calls to give &lt;/span&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;rhetorics that are historically overlooked within Western academia&lt;/span&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt; their overdue consideration.[1] Despite growing interest in comparative and alternative rhetorics, insufficient attention has been paid to one category of crucial contribution to the intellectual history of persuasion and propaganda: the study of nonwestern ancient rhetorical traditions.[2] This chapter provides a sneak preview of the intellectual history of persuasion and propaganda in Ancient China, where a rich and distinct rhetorical tradition flourished for more than three millennia. &lt;/span&gt;
&lt;span style=&#34;font-weight: 400;&#34;&gt;We begin this chapter by addressing the question of why it is necessary to examine comparative perspectives, followed by looking briefly into the &lt;/span&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Oracle_bone_script&#34;&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;historical origin&lt;/span&gt;&lt;/a&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt; of Chinese characters – the &lt;/span&gt;&lt;a href=&#34;https://languagelog.ldc.upenn.edu/nll/?p=3954&#34;&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;oldest writing system still in use&lt;/span&gt;&lt;/a&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;.  Our discussion then proceeds to a high-altitude overview of the &lt;/span&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Hundred_Schools_of_Thought&#34;&gt;&lt;i&gt;&lt;span style=&#34;font-weight: 400;&#34;&gt;hundred schools of thought&lt;/span&gt;&lt;/i&gt;&lt;/a&gt; &lt;span style=&#34;font-weight: 400;&#34;&gt;that emerged during a pivotal moment of Chinese intellectual history and profoundly shaped the arc of Sinic civilizational development. &lt;/span&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Qu Yuan and Duanwu &#34;Dragon Boat&#34; Festival</title>
      <link>/blog/2021/06/qu-yuan-and-the-duanwu-dragon-boat-festival/</link>
      <pubDate>Mon, 14 Jun 2021 15:17:54 +0000</pubDate>
      <guid>/blog/2021/06/qu-yuan-and-the-duanwu-dragon-boat-festival/</guid>
      <description>&lt;p&gt;Happy &lt;strong&gt;端午節&lt;/strong&gt; Duanwu / Dragon Boat Festival!&lt;/p&gt;
&lt;img alt=&#34;Qu Yuan&#39;s Lisao (Image source Wikimedia Commons)&#34; class=&#34;aligncenter wp-image-550 size-large&#34; height=&#34;430&#34; src=&#34;/images/uploads/2021/06/Lisao-1024x648.png&#34; width=&#34;680&#34;/&gt;
&lt;em&gt;Duanwu&lt;/em&gt; is one of the four most important traditional holidays (the other three being &lt;em&gt;Qingming,&lt;/em&gt; Mid Autumn Festival and the Spring Festival/Chinese New Year) celebrated by Chinese people throughout the world. It is celebrated on the &lt;strong&gt;5th day of the 5th month of traditional Chinese calendar,&lt;/strong&gt; which for 2021 falls on June 14th of the Gregorian calendar. The two calendars are not perfectly synched, so the Gregorian calendar date for Duanwu would change from year to year (FYI it will be on June 3rd for 2022, and June 22nd for 2023).
&lt;p&gt;The &lt;em&gt;Duanwu&lt;/em&gt; festival is primarily for commemorating the &lt;a href=&#34;https://dragonboathistory.com/Legends.html&#34;&gt;tragic death&lt;/a&gt; of Warring States era poet and statesman &lt;strong&gt;Qu Yuan&lt;/strong&gt; (c. 243-348 BC). Qu Yuan is one of the most celebrated literary figure in Chinese history, whose poems are known for their highly expressive lyrical style, imbibed with intoxicating &lt;em&gt;mythos&lt;/em&gt; and broiling &lt;em&gt;pathos.&lt;/em&gt; Qu Yuan is also among those &lt;a href=&#34;https://www.scmp.com/article/703796/long-history-cutting-sleeves&#34;&gt; historical figures&lt;/a&gt; became widely celebrated by the contemporary &lt;a href=&#34;https://gayasianews.wordpress.com/2014/06/03/chinas-duanwu-festival-is-worlds-first-gay-valentines-day/&#34;&gt;Chinese LGBTQ community&lt;/a&gt;, as Qu frequently (also quite explicitly) writes about his &lt;a href=&#34;https://ctext.org/chu-ci/si-mei-ren/zh&#34;&gt;romantic passions towards his lover and patron King Huai of Chu&lt;/a&gt;, whom Qu Yuan refers to as &amp;ldquo;my beautiful one.&amp;rdquo;&lt;/p&gt;</description>
    </item>
    <item>
      <title>New Publication Announcement: The Legitimation Crisis of the Japanese Constitution - Communication Law Review</title>
      <link>/blog/2021/02/new-article-the-legitimation-crisis-of-the-japanese-constitution/</link>
      <pubDate>Thu, 25 Feb 2021 12:05:16 +0000</pubDate>
      <guid>/blog/2021/02/new-article-the-legitimation-crisis-of-the-japanese-constitution/</guid>
      <description>&lt;p&gt;Happy to announce the publication of my co-authored article with &lt;strong&gt;Dr. Tomonori Teraoka&lt;/strong&gt; - “&lt;a href=&#34;https://commlawreview.org/Archives/CLRv20/The_Legitimation_Crisis_of_the_Japanese_Constitution.PDF&#34;&gt;The Legitimation Crisis of the Japanese Constitution: Reflections on Japan’s Judicial Rhetoric and Its Post-WWII Constitutionalization Process&lt;/a&gt;” - on the latest issue of&lt;strong&gt; &lt;a href=&#34;https://commlawreview.org/&#34;&gt;&lt;em&gt;Communication Law Review&lt;/em&gt;&lt;/a&gt;&lt;/strong&gt;. Our article presents an interdisciplinary, multilingual collaborative effort to critically examine Japanese constitutional discourse at both domestic and transnational levels.&lt;/p&gt;
&lt;img alt=&#34;Keren Wang and Tomonori Teraoka, “The Legitimation Crisis of the Japanese Constitution: Reflections on Japan’s Judicial Rhetoric and Its Post-WWII Constitutionalization Process,” Communication Law Review, Volume 20, Issue 1 (2020)&#34; class=&#34;aligncenter wp-image-545 size-large&#34; height=&#34;383&#34; src=&#34;/images/uploads/2021/02/legitimation-crisis-1024x577.png&#34; width=&#34;680&#34;/&gt;
&lt;blockquote&gt;&lt;em&gt;&lt;strong&gt;Abstract:&lt;/strong&gt; Our article examines the issue of constitutional legitimacy in the post-WWII Japanese &lt;/em&gt;&lt;em&gt;legal system. Our analysis proceeds from the judicial rhetoric of postwar Japan, focusing &lt;/em&gt;&lt;em&gt;primarily on the state of judicial review and executive legislative practices throughout the &lt;/em&gt;&lt;em&gt;Japanese postwar constitutionalization process. The aim of our rhetorical analysis is to &lt;/em&gt;&lt;em&gt;identify the main points of discursive tensions as manifested in Japanese judiciary and &lt;/em&gt;&lt;em&gt;legislative norms. Although the postwar Japanese constitution provides a judicial review &lt;/em&gt;&lt;em&gt;process and separation of powers like its American counterpart, their implementation is &lt;/em&gt;&lt;em&gt;constrained by the legislative usurpation of the executive branch and judicial passivity of &lt;/em&gt;&lt;em&gt;the Japanese Supreme Court. Whereas the written language in the postwar Japanese &lt;/em&gt;&lt;em&gt;constitution adheres to the prevailing transnational dóxa for a democratic rule-of-law &lt;/em&gt;&lt;em&gt;society, we find many key constitutional elements are not internationalized within the &lt;/em&gt;&lt;em&gt;operational modality of Japanese judicial rhetoric.&lt;/em&gt;&lt;/blockquote&gt;</description>
    </item>
    <item>
      <title>NCA 2020 Virtual Convention Presentation:  Logographic Inventions of Violent Rituals</title>
      <link>/blog/2020/10/nca-2020-virtual-convention-presentation-logographic-inventions-of-violent-rituals/</link>
      <pubDate>Sat, 31 Oct 2020 20:52:00 +0000</pubDate>
      <guid>/blog/2020/10/nca-2020-virtual-convention-presentation-logographic-inventions-of-violent-rituals/</guid>
      <description>&lt;img alt=&#34;title slide&#34; class=&#34;aligncenter size-full wp-image-527&#34; height=&#34;540&#34; src=&#34;/images/uploads/2020/10/1.png&#34; width=&#34;960&#34;/&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p class=&#34;drop-cap&#34;&gt;The ritual taking of things that are of human value, including the ritual killing of humans, has been continuously practiced for as long as human civilization itself has existed. In my presentation for the upcoming virtual &lt;strong&gt;&lt;a href=&#34;https://www.natcom.org/convention-events/virtual-2020-convention&#34;&gt;2020 &lt;span class=&#34;il&#34;&gt;National Communication Association&#39;s &lt;/span&gt;Annual Convention&lt;/a&gt;&lt;/strong&gt;, I will highlight key findings from one of my ongoing historical archival projects, focusing on the rhetoric of human sacrifice as represented in Early Bronze Age China oracle bone scripts (c.1250 BC - 1046 BC). It will be delivered at the v&lt;a href=&#34;https://www.natcom.org/sites/default/files/annual-convention/Accessing%20Session%20Content%20%20FINAL.pdf&#34;&gt;irtual paper session&lt;/a&gt;, &#34;GPS: Changing Routes in Rhetoric&#39;s History&#34; sponsored by the &lt;a href=&#34;https://ww4.aievolution.com/nca2001/index.cfm?do=ev.viewEv&amp;amp;ev=10689&#34;&gt;American Society for the History of Rhetoric&lt;/a&gt; on November 1st, 2020.&lt;/p&gt;</description>
    </item>
    <item>
      <title>My recent interview for the &#34;Coronavirus and International Affairs&#34; Webinar</title>
      <link>/blog/2020/04/my-recent-interview-for-the-coronavirus-and-international-affairs-webinar/</link>
      <pubDate>Fri, 17 Apr 2020 12:44:27 +0000</pubDate>
      <guid>/blog/2020/04/my-recent-interview-for-the-coronavirus-and-international-affairs-webinar/</guid>
      <description>&lt;h3&gt;My recent interview for the &#34;Coronavirus and International Affairs&#34; Webinar, hosted by Penn State International Affairs and Penn State Law, Coalition for Peace &amp;amp; Ethics:&lt;/h3&gt;
&lt;h5&gt;(&lt;span class=&#34;post-author vcard&#34;&gt;Originally posted by &lt;span class=&#34;fn&#34;&gt;&lt;a class=&#34;g-profile&#34; data-gapiattached=&#34;true&#34; data-gapiscan=&#34;true&#34; data-onload=&#34;true&#34; href=&#34;https://www.blogger.com/profile/06545101367530775497&#34; rel=&#34;author&#34; title=&#34;author profile&#34;&gt;Larry Catá Backer &lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;post-timestamp&#34;&gt;at &lt;a class=&#34;timestamp-link&#34; href=&#34;http://lcbackerblog.blogspot.com/2020/04/interview-keren-wang-on-compasring-us.html&#34; rel=&#34;bookmark&#34; title=&#34;permanent link&#34;&gt;&lt;abbr class=&#34;published&#34; title=&#34;2020-04-14T11:28:00-04:00&#34;&gt;4/14/2020 11:28:00 AM)&lt;/abbr&gt;&lt;/a&gt;&lt;/span&gt;&lt;/h5&gt;
&lt;h5 class=&#34;post-title entry-title&#34;&gt;Interview: Keren Wang on Comparing US and Chinese Responses to the Pandemic, for Upcoming Webinar &#34;COVID-19 and International Affairs&#34; (17 April 2020)&lt;/h5&gt;
&lt;div class=&#34;post-header&#34;&gt;
&lt;div class=&#34;post-header-line-1&#34;&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&#34;post-body entry-content&#34; id=&#34;post-body-4028548618086851093&#34;&gt;
&lt;div class=&#34;separator&#34;&gt;&lt;/div&gt;
&lt;div class=&#34;post-header&#34;&gt;&lt;a href=&#34;https://1.bp.blogspot.com/-Yn6Dgr3nlHw/XpXUeURPOwI/AAAAAAAAS3E/dzaQP4oE_nANsYYCfOG4gMsqFL6oshD2ACLcBGAsYHQ/s1600/Screen%2BShot%2B2020-04-14%2Bat%2B11.19.04%2BAM.png&#34;&gt;&lt;img border=&#34;0&#34; data-original-height=&#34;436&#34; data-original-width=&#34;374&#34; height=&#34;320&#34; src=&#34;/images/external/1-bp-blogspot-com/-Yn6Dgr3nlHw/XpXUeURPOwI/AAAAAAAAS3E/dzaQP4oE_nANsYYCfOG4gMsqFL6oshD2ACLcBGAsYHQ/s320/Screen+Shot+2020-04-14+at+11.19.04+AM.png&#34; width=&#34;274&#34;/&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&#34;separator&#34; title=&#34;&#34;&gt;&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;In the run up to the Webinar Conference Roundtable, Coronavirus and International Relations, a number of participants and contributors agreed to give short interviews around the conference themes and their own interventions. All Zoom interviews will be posted to the &lt;a href=&#34;https://www.youtube.com/playlist?list=PL6pg8c3VR_wPL4EtXwvoPYiD7VDy1YDb9&#34;&gt;&lt;b&gt;&lt;i&gt;Coalition for Peace and Ethics You Tube Channel COVID-19 Conference Playlist&lt;/i&gt;&lt;/b&gt;.&lt;/a&gt; For our&lt;a href=&#34;https://www.youtube.com/watch?v=gbHcLNdR-y0&#34;&gt; first interview, Flora Sapio&lt;/a&gt; spoke to the issues of COVID-19 in Italy and its wider implication. For our &lt;a href=&#34;https://www.youtube.com/watch?v=9jgYvKzy_qg&amp;amp;list=PL6pg8c3VR_wPL4EtXwvoPYiD7VDy1YDb9&amp;amp;index=2&amp;amp;t=7s&#34;&gt;second interview, Larry Catá Backer&lt;/a&gt; spoke of COVID-19 and meaning making. &lt;a href=&#34;https://www.youtube.com/watch?v=UYZSlkwrsHU&amp;amp;list=PL6pg8c3VR_wPL4EtXwvoPYiD7VDy1YDb9&amp;amp;index=4&amp;amp;t=0s&#34;&gt;Yuri Gonzalez&lt;/a&gt; was interviewed about COVID-19 and the developing situation in Cuba, which has been able to project medical assistance outward even as it faces the challenges of a developing state.  &lt;a href=&#34;https://www.youtube.com/watch?v=GuYj251Ujyo&amp;amp;list=PL6pg8c3VR_wPL4EtXwvoPYiD7VDy1YDb9&amp;amp;index=5&amp;amp;t=0s&#34;&gt;Alice Hong&lt;/a&gt; provided insight on COVID-19 from the perspective of a foreign student in the US. And &lt;a href=&#34;https://www.youtube.com/watch?v=4KWypsBCBJw&amp;amp;list=PL6pg8c3VR_wPL4EtXwvoPYiD7VDy1YDb9&amp;amp;index=6&amp;amp;t=0s&#34;&gt;GAO Shan spoke&lt;/a&gt; to the way that the COVID-19 pandemic from a comparative context of Wuhan (where his family lives) and the US Midwest (where he now resides).&lt;/div&gt;
&lt;div class=&#34;separator&#34;&gt;&lt;/div&gt;
&lt;div&gt;For our next interview Keren Wang speaks to the issues of the way that the Pandemic was framed and experienced in the US and China. He considers the ways in which each system framed the pandemic in ways that could be understood. He noted how differences in those understandings could produce very different responses. Dr. Wang also considered the ways in which the official and popular discourse about the pandemic sometimes aligned and sometimes deviated in some substantial respects. The effects on both the internal organization of national responses, and on their international relations of states, have been both profound and to some extent quite different.&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div class=&#34;separator&#34;&gt; &lt;a href=&#34;https://1.bp.blogspot.com/-p9_ILWuWtz4/XpR9Gdu-kII/AAAAAAAAS2Y/ToifySDFYl8WVhEnBJWZnPI_PkwMivVqACLcBGAsYHQ/s1600/Screen%2BShot%2B2020-04-13%2Bat%2B10.54.08%2BAM.png&#34;&gt;&lt;img border=&#34;0&#34; data-original-height=&#34;450&#34; data-original-width=&#34;804&#34; height=&#34;179&#34; src=&#34;/images/external/1-bp-blogspot-com/-p9_ILWuWtz4/XpR9Gdu-kII/AAAAAAAAS2Y/ToifySDFYl8WVhEnBJWZnPI_PkwMivVqACLcBGAsYHQ/s320/Screen+Shot+2020-04-13+at+10.54.08+AM.png&#34; title=&#34;&#34; width=&#34;320&#34;/&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;&lt;b&gt;The interview may be accessed HERE:  &lt;/b&gt; Keren Wang &lt;a href=&#34;https://www.youtube.com/watch?v=5uoFAPF_LKs&amp;amp;list=PL6pg8c3VR_wPL4EtXwvoPYiD7VDy1YDb9&amp;amp;index=7&amp;amp;t=0s&#34;&gt;interview here&lt;/a&gt;.
&lt;p&gt;Conference Concept Note &lt;a href=&#34;https://www.thecpe.org/wp-content/uploads/2020/04/REV_Concept_Note_CoronavirusIA.pdf&#34;&gt;HERE&lt;/a&gt;&lt;/div&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Presentation at the 48th Annual Conference of the Society of Australasian Social Psychologists (SASP) at the University of New South Wales, Sydney</title>
      <link>/blog/2019/06/reexamining-ritual-sacrifice-in-late-capitalism-presentation-at-the-48th-annual-conference-of-the-society-of-australasian-social-psychologists-sasp/</link>
      <pubDate>Sun, 30 Jun 2019 21:09:13 +0000</pubDate>
      <guid>/blog/2019/06/reexamining-ritual-sacrifice-in-late-capitalism-presentation-at-the-48th-annual-conference-of-the-society-of-australasian-social-psychologists-sasp/</guid>
      <description>&lt;h2 class=&#34;post-title entry-title&#34;&gt;&#34;Reexamining Ritual Sacrifice in Late-Capitalism&#34;&lt;/h2&gt;
&lt;h5 class=&#34;post-title entry-title&#34;&gt;Presentation at the 48th Annual Conference of the Society of Australasian Social Psychologists (SASP) at the University of New South Wales, Sydney&lt;/h5&gt;
&lt;p&gt; &lt;/p&gt;
&lt;div&gt;Building on my doctoral dissertation, I have been exploring the rhetorical inventions of &#34;sacrifice&#34; in the construction and ordering of societal institutions.  The rhetoric of sacrifice, and its public rituals, form a core practice of all social orders.  Though the practices have become substantially more subtle and even more deeply embedded in everyday social practices and expectations, this research project explores the underlying local and trans-cultural reflexes inherent in the performance of social, political, and economic sacrifices, and their connections to the organization of public institutions. Indeed, the fundamental presumption of sacrifice - the &lt;i&gt;bargaining&lt;/i&gt; between unequal powers for the purchase of objectives by the offering of items precious to the giver - has often become so embedded to tacit social norms as to become effectively invisible. Though this project focuses on its connection to the organization of what is termed &#34;late capitalism,&#34; its insinuation in all social orderings is hard to ignore. &#34;Civilized&#34; societies and economic relations are ordered through the rituals of sacrifice - &lt;a href=&#34;https://www.biblestudytools.com/dictionary/propitiation/&#34;&gt;propitiation&lt;/a&gt; for whatever totems and taboos are set above the governance orders around which collectives coalesce.&lt;/div&gt;
&lt;p&gt; &lt;/p&gt;</description>
    </item>
    <item>
      <title>New Book: &#34;Legal and Rhetorical Foundations of Economic Globalization: An Atlas of Ritual Sacrifice in Late-Capitalism&#34; (Routledge, 2020)</title>
      <link>/blog/2018/11/announcing-upcoming-book-legal-and-rhetorical-foundations-of-economic-globalization-an-atlas-of-ritual-sacrifice-in-late-capitalism-in-press-with-routledge/</link>
      <pubDate>Sat, 03 Nov 2018 14:57:12 +0000</pubDate>
      <guid>/blog/2018/11/announcing-upcoming-book-legal-and-rhetorical-foundations-of-economic-globalization-an-atlas-of-ritual-sacrifice-in-late-capitalism-in-press-with-routledge/</guid>
      <description>&lt;!-- wp:html --&gt;
&lt;p&gt;(December 2nd, 2019)&lt;/p&gt;
&lt;p&gt;
  I am very pleased to announce that my academic monograph with Routledge | Taylor &amp;amp; Francis Group &lt;em&gt;has now been published&lt;/em&gt;:
  &lt;a href=&#34;/blog/2018/11/announcing-upcoming-book-legal-and-rhetorical-foundations-of-economic-globalization-an-atlas-of-ritual-sacrifice-in-late-capitalism-in-press-with-routledge/&#34;&gt;Keren Wang, &lt;/a&gt;
&lt;a href=&#34;https://doi.org/10.4324/9780429198687&#34;&gt;&lt;em&gt;Legal and Rhetorical Foundations of Economic Globalization: An Atlas of Ritual Sacrifice in Late-Capitalism&lt;/em&gt;&lt;/a&gt;.
  It is available in both hardback and digital formats.
&lt;/p&gt;
&lt;p&gt;
  This book was developed from my doctoral dissertation, “&lt;a href=&#34;/blog/2018/05/presentation-at-2018-psu-social-thought-conference-three-studies-of-ritual-sacrifice-in-late-capitalism/&#34;&gt;Three Studies of Ritual Sacrifice in Late Capitalism&lt;/a&gt;.” I would like to extend my special thanks to
  &lt;a href=&#34;http://cas.la.psu.edu/people/sxb17&#34;&gt;Stephen H. Browne&lt;/a&gt;, my dissertation supervisor, and to members of my dissertation advising committee:
  &lt;a href=&#34;https://pennstatelaw.psu.edu/faculty/backer&#34;&gt;Larry Catá Backer&lt;/a&gt;, &lt;a href=&#34;http://cas.la.psu.edu/people/khw2&#34;&gt;Kirt H. Wilson&lt;/a&gt;, and
  &lt;a href=&#34;http://cas.la.psu.edu/people/jde13&#34;&gt;Jeremy David Engels&lt;/a&gt;. This project would not have been possible without their guidance and mentorship. I would also like to express my gratitude to members of the
  &lt;a href=&#34;http://cas.la.psu.edu&#34;&gt;Department of Communication Arts and Sciences&lt;/a&gt; at Penn State University for their generous, ongoing support of my Ph.D. study and related postdoctoral research.
&lt;/p&gt;</description>
    </item>
    <item>
      <title>New Publication: &#34;The Rhetorical Invention of Laws of Sacrifice&#34; (Communication Law Review)</title>
      <link>/blog/2018/10/new-article-published-the-rhetorical-invention-of-laws-of-sacrifice-communication-law-review/</link>
      <pubDate>Thu, 18 Oct 2018 11:42:35 +0000</pubDate>
      <guid>/blog/2018/10/new-article-published-the-rhetorical-invention-of-laws-of-sacrifice-communication-law-review/</guid>
      <description>&lt;p&gt;I am happy to report that my recent article, &amp;ldquo;&lt;a class=&#34;style_1&#34; href=&#34;http://commlawreview.org/Archives/v18i2/CLRv18i2_The_Rhetorical_Invention&#34; title=&#34;http://commlawreview.org/Archives/v18i2/CLRv18i2_The_Rhetorical_Invention&#34;&gt;The Rhetorical Invention of Laws of Sacrifice: Kelo v. New London,&amp;rdquo; &lt;/a&gt;has just been published and appears in &lt;a href=&#34;http://www.commlawreview.org/Communication_Law_Review/Welcome.html&#34;&gt;&lt;em&gt;Communication Law Review&lt;/em&gt;,&lt;/a&gt; Volume 18, Issue 2 (2018): 58-94. My thanks to &lt;a href=&#34;https://www.duq.edu/academics/faculty/pat-arneson&#34;&gt;Dr. Pat Arneson&lt;/a&gt; (Chief Editor) for her valuable editorial contribution towards this publication.&lt;/p&gt;
&lt;p&gt;The article continues my broader work exploring the &lt;span style=&#34;font-weight: 400;&#34;&gt;concept of sacrifice as a useful concept for thinking about how violent transactions are rhetorically justified. The abstract follows. An online version of the article may be accessed &lt;a href=&#34;http://commlawreview.org/Archives/v18i2/CLRv18i2_The_Rhetorical_Invention&#34;&gt;HERE&lt;/a&gt;. &lt;/span&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Presentation at 2018 PSU Social Thought Conference - &#34;Three studies of ritual sacrifice in late-capitalism&#34;</title>
      <link>/blog/2018/05/presentation-at-2018-psu-social-thought-conference-three-studies-of-ritual-sacrifice-in-late-capitalism/</link>
      <pubDate>Tue, 01 May 2018 20:43:53 +0000</pubDate>
      <guid>/blog/2018/05/presentation-at-2018-psu-social-thought-conference-three-studies-of-ritual-sacrifice-in-late-capitalism/</guid>
      <description>&lt;p&gt;This presentation highlights a few key excerpts from my doctoral dissertation research:&lt;/p&gt;
&lt;img alt=&#34;&#34; class=&#34;aligncenter size-full wp-image-461&#34; height=&#34;540&#34; src=&#34;/images/uploads/2018/05/1-1hrbupv.jpg&#34; width=&#34;960&#34;/&gt;
&lt;p&gt;&amp;ldquo;The ritual taking of things that are of human value, including the ritual killing of humans, has been continuously practiced for as long as human civilization itself has existed. Sacrifices in the form of state-organized rituals have been observed in many societies throughout history. Existing scholarship also observed an interdependent relationship between ritual sacrifice and the maintenance of political power in a broad set of historical cases, ranging from Shang dynasty China in 10th century BCE to the witch-hunts in early modern Europe. Sacrificial rituals of the past should not be considered fundamentally divorced from our modern world: whereas the formal elements of sacrifice of the past may no longer be recognizable, their substantive political functions do remain, with rhetorical overtones that carry into the politics of the present time. The goal for this project is to give due consideration to the politics of sacrificial rites across a broad set of political-theological traditions, hopefully paving the way to a new unifying understanding of sacrificial rhetorics. This research goal revolves around two primary research tasks that are intimately connected. The first is to provide a working interpretative framework for understanding the politics of ritual sacrifice – one that not only accommodates multidisciplinary, intersectional knowledge of ritual practices, but that can also be usefully employed in the integrated analysis of sacrificial rituals as political rhetoric under divergent historical and societal contexts.  The second conducts a series of case studies that cuts across the wide variability of ritual public takings in late-capitalism.&amp;rdquo;&lt;/p&gt;</description>
    </item>
    <item>
      <title>A Survey of the &#34;Apologetics&#34; for the 2018 PRC Constitutional Revision  (WIP research)</title>
      <link>/blog/2018/03/a-survey-of-the-apologetics-for-the-2018-prc-constitutional-revision-wip-research/</link>
      <pubDate>Wed, 21 Mar 2018 10:31:18 +0000</pubDate>
      <guid>/blog/2018/03/a-survey-of-the-apologetics-for-the-2018-prc-constitutional-revision-wip-research/</guid>
      <description>&lt;img alt=&#34;&#34; class=&#34;aligncenter size-full wp-image-448&#34; height=&#34;540&#34; src=&#34;/images/uploads/2018/03/1-1yfnd9m.jpg&#34; width=&#34;960&#34;/&gt;
&lt;img alt=&#34;&#34; class=&#34;aligncenter size-full wp-image-449&#34; height=&#34;540&#34; src=&#34;/images/uploads/2018/03/2-2gkn67e.jpg&#34; width=&#34;960&#34;/&gt;
&lt;img alt=&#34;&#34; class=&#34;aligncenter size-full wp-image-450&#34; height=&#34;540&#34; src=&#34;/images/uploads/2018/03/3-2dmipd5.jpg&#34; width=&#34;960&#34;/&gt;
&lt;img alt=&#34;&#34; class=&#34;aligncenter size-full wp-image-451&#34; height=&#34;540&#34; src=&#34;/images/uploads/2018/03/4-1j2jht6.jpg&#34; width=&#34;960&#34;/&gt;
&lt;img alt=&#34;&#34; class=&#34;aligncenter size-full wp-image-452&#34; height=&#34;540&#34; src=&#34;/images/uploads/2018/03/5-1d7ixyh.jpg&#34; width=&#34;960&#34;/&gt;
&lt;img alt=&#34;&#34; class=&#34;aligncenter size-full wp-image-453&#34; height=&#34;540&#34; src=&#34;/images/uploads/2018/03/6-tw1wdn.jpg&#34; width=&#34;960&#34;/&gt;
&lt;img alt=&#34;&#34; class=&#34;aligncenter size-full wp-image-454&#34; height=&#34;540&#34; src=&#34;/images/uploads/2018/03/7-11hhn8q.jpg&#34; width=&#34;960&#34;/&gt;
&lt;img alt=&#34;&#34; class=&#34;aligncenter size-full wp-image-455&#34; height=&#34;540&#34; src=&#34;/images/uploads/2018/03/8-21i4v1o.jpg&#34; width=&#34;960&#34;/&gt;
&lt;img alt=&#34;&#34; class=&#34;aligncenter size-full wp-image-456&#34; height=&#34;540&#34; src=&#34;/images/uploads/2018/03/9-1u1owbv.jpg&#34; width=&#34;960&#34;/&gt;
&lt;img alt=&#34;&#34; class=&#34;aligncenter size-full wp-image-457&#34; height=&#34;540&#34; src=&#34;/images/uploads/2018/03/10-zul18b.jpg&#34; width=&#34;960&#34;/&gt;</description>
    </item>
    <item>
      <title>Thirteenth Amendment and the “Slaughter-House”</title>
      <link>/blog/2017/09/penn-state-civcom-2017-constitution-day-thirteenth-amendment-and-the-slaughter-house/</link>
      <pubDate>Thu, 14 Sep 2017 17:26:07 +0000</pubDate>
      <guid>/blog/2017/09/penn-state-civcom-2017-constitution-day-thirteenth-amendment-and-the-slaughter-house/</guid>
      <description>&lt;p&gt;by Keren Wang&lt;/p&gt;
&lt;hr/&gt;
&lt;strong&gt;&lt;em&gt;This essay was originally featured on the &lt;a href=&#34;http://civcm.psu.edu/2017/09/12/the-slaughter-house-principle/&#34;&gt;Penn State Civic &amp;amp; Community Engagement (CIVCOM)  websit&lt;/a&gt;e, responding to this year&#39;s &lt;span class=&#34;il&#34;&gt;Constitution&lt;/span&gt; &lt;span class=&#34;il&#34;&gt;Day theme: &#34;The U.S. Constitution &amp;amp; &#39;The Dangerous Thirteenth Amendment&#39;.&#34; &lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;
&lt;strong&gt;&lt;em&gt;Please visit and share with your students this link &lt;a data-saferedirecturl=&#34;https://www.google.com/url?hl=en&amp;amp;q=http://civcm.psu.edu/constitution-day/&amp;amp;source=gmail&amp;amp;ust=1505508602371000&amp;amp;usg=AFQjCNFxMIqIBe5PLVeWSmz-tXqdsnntow&#34; href=&#34;http://civcm.psu.edu/constitution-day/&#34; rel=&#34;noreferrer noopener&#34; target=&#34;_blank&#34;&gt;http://civcm.psu.edu/&lt;wbr/&gt;constitution-day/&lt;/a&gt;, where you&#39;ll also find essays by Lauren Camacci, Jeremy Cox, Michele Kennerly, Veena Raman, John Rountree, Mary Stuckey, and Kirt Wilson.  Last year&#39;s resources on &#34;The Spaces Between the First and Second Amendments&#34; can still be found here: &lt;a data-saferedirecturl=&#34;https://www.google.com/url?hl=en&amp;amp;q=http://civcm.psu.edu/constitution-day/past-constitution-days/2016-2/&amp;amp;source=gmail&amp;amp;ust=1505508602371000&amp;amp;usg=AFQjCNGPOS8F8WWpX9cGQgxv9m-2r8R1Og&#34; href=&#34;http://civcm.psu.edu/constitution-day/past-constitution-days/2016-2/&#34; rel=&#34;noreferrer noopener&#34; target=&#34;_blank&#34;&gt;http://civcm.psu.edu/&lt;wbr/&gt;constitution-day/past-&lt;wbr/&gt;constitution-days/2016-2/&lt;/a&gt;&lt;/em&gt;&lt;/strong&gt;
&lt;hr/&gt;
&lt;blockquote&gt;The Constitution of the United States – Article XIII (Amendment 13 – Slavery and Involuntary Servitude)
&lt;p&gt;&lt;em&gt;Neither slavery nor involuntary servitude, except as a punishment for crime whereof the party shall have been duly convicted, shall exist within the United States, or any place subject to their jurisdiction.&lt;/em&gt;
&lt;em&gt;Congress shall have power to enforce this article by appropriate legislation.&lt;/em&gt;&lt;/blockquote&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Combing through historical records, it appears that Robert E. Lee himself also opposed the erection of Confederate monuments...</title>
      <link>/blog/2017/08/combing-through-historical-records-it-appears-that-robert-e-lee-himself-also-opposed-the-erection-of-confederate-monuments/</link>
      <pubDate>Tue, 15 Aug 2017 19:18:32 +0000</pubDate>
      <guid>/blog/2017/08/combing-through-historical-records-it-appears-that-robert-e-lee-himself-also-opposed-the-erection-of-confederate-monuments/</guid>
      <description>&lt;div class=&#34;_5pbx userContent&#34; data-ft=&#39;{&#34;tn&#34;:&#34;K&#34;}&#39; id=&#34;js_atm&#34;&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&amp;ldquo;As regards the erection of such a monument as is contemplated, my conviction is, that, however grateful it would be to the feelings of the South, the attempt, in the present condition of the country, would have the effect of retarding instead of accelerating its accomplishment, and of continuing if not adding to the difficulties under which the Southern people labor.&amp;rdquo; (R. E. Lee, 1866)&lt;/p&gt;
&lt;/div&gt;
&lt;img alt=&#34;&#34; class=&#34;aligncenter size-full wp-image-419&#34; height=&#34;1223&#34; src=&#34;/images/uploads/2017/08/Lee-Letter-xkeltl.jpg&#34; width=&#34;680&#34;/&gt;
&lt;div class=&#34;_5pbx userContent&#34; data-ft=&#39;{&#34;tn&#34;:&#34;K&#34;}&#39; id=&#34;js_atm&#34;&gt;
&lt;p&gt;Source: Jones, J. William 1836-1909. Personal Reminiscences, Anecdotes, and Letters of Gen. Robert E. Lee. United States: 1875, p.257&lt;/p&gt;</description>
    </item>
    <item>
      <title>Ritualism and the Ethos of Chinese Legal Order: presentation at Penn State Law</title>
      <link>/blog/2017/06/ritualism-and-the-ethos-of-chinese-legal-order-presentation-at-penn-state-law/</link>
      <pubDate>Sat, 10 Jun 2017 16:39:47 +0000</pubDate>
      <guid>/blog/2017/06/ritualism-and-the-ethos-of-chinese-legal-order-presentation-at-penn-state-law/</guid>
      <description>&lt;p&gt;“Ritualism and the Ethos of Chinese Legal Order,” presented at International  Conference: New  International  Trade  and  Investment  Rules between  Globalization  and  Anti-­Globalization, Penn State University, University Park, PA (April 22, 2017)&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;blockquote&gt;倬彼雲漢 昭回于天
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;王曰於乎 何辜今之人&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;天降喪亂 饑饉薦臻&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;靡神不舉 靡愛斯牲&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;圭璧既卒 寧莫我聽&lt;/p&gt;
&lt;p&gt; &lt;/blockquote&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;i&gt;Majestic is that Milky Way, brightly afloat &lt;/i&gt;&lt;i&gt;in the firmament of the heaven.&lt;/i&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;i&gt;The King&lt;/i&gt;&lt;i&gt; said, O! What crime is chargeable on us now? &lt;/i&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;i&gt;That Heaven thus sends down death and disorder, unrelenting famine and hunger grapple us!&lt;/i&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Harvard East Asia Society 2017 Conference presentation: Legitimation Crisis of the Japanese Constitution (presentation slides and abstract)</title>
      <link>/blog/2017/02/harvard-east-asia-society-2017-conference-presentation-legitimation-crisis-of-the-japanese-constitution-presentation-slides-and-abstract/</link>
      <pubDate>Mon, 27 Feb 2017 11:14:50 +0000</pubDate>
      <guid>/blog/2017/02/harvard-east-asia-society-2017-conference-presentation-legitimation-crisis-of-the-japanese-constitution-presentation-slides-and-abstract/</guid>
      <description>&lt;p&gt;The&lt;a href=&#34;http://projects.iq.harvard.edu/heasconference&#34; target=&#34;_blank&#34;&gt; Harvard East Asia Society&lt;/a&gt; (HEAS) recently concluded its &lt;em&gt;&lt;a href=&#34;http://projects.iq.harvard.edu/heasconference&#34; target=&#34;_blank&#34;&gt;20th Annual Conference: Roads through Asia&lt;/a&gt;, &lt;/em&gt;held this year in Harvard &lt;a href=&#34;http://wcfia.harvard.edu/about/cgis&#34; target=&#34;_blank&#34;&gt;Center for Government and International Studies&lt;/a&gt;, Cambridge, Massachusetts. The conference program may be accessed &lt;a href=&#34;http://projects.iq.harvard.edu/files/heasconference/files/booklet_revised.pdf&#34; target=&#34;_blank&#34;&gt;HERE&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;For the conference, I presented a paper, along with my co-author Tomonori Teraoka, titled: &lt;em&gt;Legitimation Crisis of the Japanese Constitution: Reflections on Japan’s post-WWII Constitutionalization Process.  &lt;/em&gt;Below are Powerpoint slides and working abstract for our HEAS presentation:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Postscript on the &#34;Elephant&#34; in &#34;Phenomenology&#34;</title>
      <link>/blog/2017/02/postscript-on-the-elephant-in-phenomenology/</link>
      <pubDate>Fri, 03 Feb 2017 20:24:01 +0000</pubDate>
      <guid>/blog/2017/02/postscript-on-the-elephant-in-phenomenology/</guid>
      <description>&lt;p&gt;&lt;span style=&#34;color: #000000;&#34;&gt;&lt;em&gt;(Posted by Keren Wang | Feb. 3, 2017)&lt;/em&gt;&lt;/span&gt;
&lt;span style=&#34;color: #000000;&#34;&gt;Per &lt;strong&gt;&lt;a href=&#34;http://sociology.la.psu.edu/people/ams10&#34; style=&#34;color: #000000;&#34;&gt;Dr. Alan Sica&lt;/a&gt;&lt;/strong&gt;&amp;rsquo;s request, this post is written as a follow-up to a peculiar topic brought up during our Social Thought seminar yesterday &amp;ndash; it concerns  the &amp;ldquo;Elephant (&lt;strong&gt;象&lt;/strong&gt;)&amp;rdquo; glyph in the Chinese term for &amp;ldquo;Phenomenology (&lt;b&gt;现象学&lt;/b&gt;)&amp;rdquo;.&lt;/span&gt;
&lt;span style=&#34;color: #000000;&#34;&gt;Long story short&amp;hellip;&lt;/span&gt;
&lt;span style=&#34;color: #000000;&#34;&gt;During our regular seminar discussion on the writings of  &lt;a href=&#34;https://en.wikipedia.org/wiki/Maurice_Merleau-Ponty&#34; style=&#34;color: #000000;&#34;&gt;&lt;strong&gt;Maurice Merleau-Ponty&lt;/strong&gt; &lt;/a&gt;(French phenomenologist) yesterday, Dr. Sica asked what is the Chinese term for &amp;ldquo;&lt;strong&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Phenomenology_(philosophy)&#34; style=&#34;color: #000000;&#34;&gt;phenomenology&lt;/a&gt;&lt;/strong&gt;&amp;rdquo;.&lt;/span&gt;
&lt;span style=&#34;color: #000000;&#34;&gt;Luckily, there is an official Chinese translation available for this particular philosophical term  &amp;ndash; 現象學 (pronounced &amp;ldquo;hsien-hsiang hsueh&amp;rdquo;). For easier viewing, please see the enlarged picture-file below, which also includes the standard phonetic notation for each character:&lt;/span&gt;
&lt;span style=&#34;color: #000000;&#34;&gt;&lt;img alt=&#34;&#34; class=&#34;aligncenter size-full wp-image-365&#34; height=&#34;259&#34; src=&#34;/images/uploads/2017/02/xianxiangxue-ox93m8.png&#34; width=&#34;463&#34;/&gt;&lt;/span&gt;
&lt;span style=&#34;color: #000000;&#34;&gt;The facile explanation of phrase &lt;strong&gt;&amp;ldquo;現象學&amp;rdquo;&lt;/strong&gt; is that it combines &lt;b&gt;现象&lt;/b&gt; (&lt;em&gt;hsien-hsiang&lt;/em&gt;, lit. &amp;ldquo;phenomenon, materialization&amp;rdquo;) + &lt;strong&gt;學 &lt;/strong&gt;(&lt;em&gt;hsueh, &lt;/em&gt;lit. &amp;ldquo;study, learning&amp;rdquo;). By &amp;ldquo;facile explanation&amp;rdquo;, I am referring to the fact that the &lt;strong&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Chinese_characters&#34; style=&#34;color: #000000;&#34;&gt;Chinese writing system&lt;/a&gt;&lt;/strong&gt; doesn&amp;rsquo;t follow an alphabet-word system, so any direct &amp;ldquo;word-to-word&amp;rdquo; translation between Chinese and English would be at best a &amp;ldquo;metaphorical approximation&amp;rdquo;. Unwilling to settle for the easy explanation, Alan of course pressed for more precise meaning of each individual character in &lt;strong&gt;現象學&lt;/strong&gt;,  and thus going further down the impossible linguistic rabbit hole&amp;hellip;&lt;/span&gt;
&lt;span style=&#34;color: #000000;&#34;&gt;So here&amp;rsquo;s when the &amp;ldquo;elephant&amp;rdquo; came in&amp;hellip;&lt;/span&gt;
&lt;span style=&#34;color: #000000;&#34;&gt;The Chinese term for phenomenology, &lt;strong&gt;現象學&lt;/strong&gt;, consists three characters (or more accurately, three &lt;a href=&#34;https://en.wikipedia.org/wiki/Logogram&#34; style=&#34;color: #000000;&#34;&gt;&lt;strong&gt;logograms&lt;/strong&gt;&lt;/a&gt;). Here is a detailed break-down of the characters in &lt;strong&gt;現象學&lt;/strong&gt;:&lt;/span&gt;
&lt;span style=&#34;color: #000000;&#34;&gt;&lt;img class=&#34;aligncenter wp-image-369 size-full&#34; height=&#34;600&#34; src=&#34;/images/uploads/2017/02/xianxiangxue-construction-11xffbb.png&#34; width=&#34;1301&#34;/&gt;&lt;/span&gt;
&lt;span style=&#34;color: #000000;&#34;&gt;Indeed, for a Chinese reader, the term &lt;strong&gt;現象學&lt;/strong&gt; does not appear as a singular, self-contained &amp;ldquo;word&amp;rdquo; &lt;em&gt;per se.&lt;/em&gt; Rather, like most Chinese vocabularies,  the nomenclature would appear as a loosely-grouped logographic cluster that reads something like &amp;ldquo;(the) study (of) manifest shape(s) and symbol(s).&amp;rdquo; Those parenthetical parts are grammatical features absent in the Chinese writing system. Indeed, concepts such as definitive articles, plurals and grammatical tense may not apply to written Chinese&amp;hellip;at all! Chinese characters group together in ways that&amp;rsquo;s very different from English vocabularies. When used together, they do not form a new &amp;ldquo;word&amp;rdquo; in ways English alphabets would. Thus, unlike English &amp;ldquo;words&amp;rdquo;, meanings are not &amp;ldquo;encoded&amp;rdquo; into Chinese phrases and characters. Each logograph in a phrase or sentence merely defers and refers its signification in terms of its relation with those other characters in the sentence, and the final &amp;ldquo;meaning&amp;rdquo; of a phrase or sentence is obtained as the sum aggregate of signification of all the characters in the phrase. This might sound confusing, but it is worthwhile to keep in mind that even the most basic grammatical and syntactical principles in English do not apply in written Chinese. And now I regress&amp;hellip;&lt;/span&gt;
&lt;span style=&#34;color: #000000;&#34;&gt;Most notably, the second character of the phrase, &lt;strong&gt;象&lt;/strong&gt; (pronounced &amp;ldquo;&lt;em&gt;hsiang&lt;/em&gt;&amp;rdquo;) &lt;strong&gt;,&lt;/strong&gt; indeed means &amp;ldquo;elephant&amp;rdquo; in Chinese. Yes, when used with other characters, &lt;strong&gt;象&lt;/strong&gt; can be used broadly to signify ideas relating to &amp;ldquo;shape&amp;rdquo;, &amp;ldquo;symbol&amp;rdquo; and &amp;ldquo;representation&amp;rdquo;. However, those are derivatives or its &amp;ldquo;ordinary&amp;rdquo; meaning of &amp;ldquo;elephant&amp;rdquo; Indeed, when the character &amp;ldquo;&lt;strong&gt;象&lt;/strong&gt;&amp;rdquo; is used alone, it almost always refers to non other than those massive land mammals with long trunk and pillar-like legs.&lt;/span&gt;
&lt;span style=&#34;color: #000000;&#34;&gt;In fact, the &amp;ldquo;elephant“ in &lt;strong&gt;現象學&lt;/strong&gt; is among the oldest Chinese characters still in common use. As shown in the figure below, the glyph &amp;ldquo;&lt;strong&gt;象&lt;/strong&gt;&amp;rdquo; first appeared in &lt;a href=&#34;https://en.wikipedia.org/wiki/Oracle_bone_script&#34; style=&#34;color: #000000;&#34;&gt;Oracle bone script&lt;/a&gt; (c. 1,200 BCE) as an elephant &lt;strong&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Pictogram&#34; style=&#34;color: #000000;&#34;&gt;pictogram&lt;/a&gt;&lt;/strong&gt;. The basic shape and composition of &amp;ldquo;&lt;strong&gt;象&amp;rdquo;&lt;/strong&gt; remained surprisingly consistent across its three-thousand-plus years of continuous usage:&lt;/span&gt;
&lt;span style=&#34;color: #000000;&#34;&gt;&lt;img alt=&#34;&#34; class=&#34;aligncenter size-full wp-image-371&#34; height=&#34;401&#34; src=&#34;/images/uploads/2017/02/evolution-of-xiang-24bhiwg.png&#34; width=&#34;1370&#34;/&gt;&lt;/span&gt;
&lt;span style=&#34;color: #000000;&#34;&gt;So what does &amp;ldquo;elephant&amp;rdquo; has anything to do with symbol and elephant? While it is impossible to get into the heads of &lt;a href=&#34;/blog/2015/05/historical-background-of-human-sacrifices-during-shang-dynasty/&#34; style=&#34;color: #000000;&#34;&gt;&lt;strong&gt;Shang dynasty kings&lt;/strong&gt; (who first used this letter during sacrificial rites)&lt;/a&gt;, I did found a compelling explanation by searching around Chinese Classical texts. &lt;a href=&#34;https://en.wikipedia.org/wiki/Han_Fei&#34; style=&#34;color: #000000;&#34;&gt;&lt;strong&gt;Han Fei&lt;/strong&gt;&lt;/a&gt; (&lt;span lang=&#34;zh-Hant&#34; xml:lang=&#34;zh-Hant&#34;&gt;韓非, c. 280 – 233 BC&lt;/span&gt;), an influential political philosopher from the Warring States period (475BC - 221BC), wrote the following in his &lt;strong&gt;&lt;a href=&#34;http://ctext.org/hanfeizi/jie-lao/zh?searchu=%E8%B1%A1&amp;amp;searchmode=showall#result&#34; style=&#34;color: #000000;&#34;&gt;&lt;i&gt;Han Fei Tzu:&lt;/i&gt;&lt;/a&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>&#34;White/Older/Male&#34; voter groups may not be the ones to blame for electing Donald Trump...</title>
      <link>/blog/2016/11/data-suggest-trump-did-not-receive-higher-share-of-whiteoldermale-votes-than-romney/</link>
      <pubDate>Wed, 09 Nov 2016 18:56:34 +0000</pubDate>
      <guid>/blog/2016/11/data-suggest-trump-did-not-receive-higher-share-of-whiteoldermale-votes-than-romney/</guid>
      <description>&lt;p&gt;Posted by Keren Wang, 11/9/2016 at 19:00 ET&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;When comparing current election results with how groups voted back in 2012, it appears that the &amp;ldquo;White/Older/Male&amp;rdquo; voter groups may not be the ones to blame for electing Donald Trump. Current data suggest that Trump did not receive significantly higher percentage of &amp;ldquo;White/Older/Male&amp;rdquo; votes than the previous GOP candidate.&lt;/p&gt;
&lt;p&gt;&lt;span data-ft=&#39;{&#34;tn&#34;:&#34;K&#34;}&#39;&gt;&lt;span class=&#34;UFICommentBody&#34;&gt;Of course it is still too early to see the finalized voting data, and early exit poll numbers are not the most accurate. However, it is always a good practice to check our political assumptions with facts on the ground. At minimum, the &amp;ldquo;White/Older/Male&amp;rdquo; voter narrative frequently cited by the media might be too easy of an explanation for the election result we&amp;rsquo;re seeing&amp;hellip;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Civic &amp; Community Engagement (CIVCM) Constitution Day 2016 | Written and Unwritten Constitutions</title>
      <link>/blog/2016/09/civic-community-engagement-civcm-constitution-day-2016-written-and-unwritten-constitutions/</link>
      <pubDate>Thu, 08 Sep 2016 15:40:24 +0000</pubDate>
      <guid>/blog/2016/09/civic-community-engagement-civcm-constitution-day-2016-written-and-unwritten-constitutions/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;http://civcm.psu.edu/2016/09/06/written-and-unwritten-constitutions/&#34; rel=&#34;attachment wp-att-342&#34;&gt;&lt;img alt=&#34;0608151520&#34; class=&#34;aligncenter size-large wp-image-342&#34; height=&#34;481&#34; src=&#34;/images/uploads/2016/09/0608151520-vlf6tf-1024x724.jpg&#34; width=&#34;680&#34;/&gt;&lt;/a&gt;&lt;a href=&#34;http://civcm.psu.edu/2016/09/06/written-and-unwritten-constitutions/&#34;&gt;&lt;a href=&#34;http://civcm.psu.edu/2016/09/06/written-and-unwritten-constitutions/&#34;&gt;http://civcm.psu.edu/2016/09/06/written-and-unwritten-constitutions/&lt;/a&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>&#34;Participatory Global Citizenship&#34; Paper Featured on Yale Global</title>
      <link>/blog/2016/03/participatory-global-citizenship-paper-featured-on-yale-global/</link>
      <pubDate>Sun, 13 Mar 2016 18:49:25 +0000</pubDate>
      <guid>/blog/2016/03/participatory-global-citizenship-paper-featured-on-yale-global/</guid>
      <description>&lt;p&gt;One of my recently published article, &amp;ldquo;&lt;a href=&#34;http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2565483&#34; rel=&#34;noopener&#34; target=&#34;_blank&#34;&gt;Participatory Global Citizenship: Civic Education Beyond Territoriality&lt;/a&gt;&amp;rdquo;, co-authored with &lt;a href=&#34;https://umdearborn.edu/cob/nicole-mangis/&#34;&gt;Nabih Haddad&lt;/a&gt; of Michigan State University, has been featured on &lt;em&gt;Yale Global&lt;/em&gt;&amp;rsquo;s &lt;a href=&#34;http://yaleglobal.yale.edu/academic/papers&#34;&gt;Academic Papers collection&lt;/a&gt;
&lt;em&gt;Yale Global &lt;/em&gt;is an online publication of Yale University&amp;rsquo;s MacMillan Center. According to its website, the &amp;ldquo;Academic Papers&amp;rdquo; series incorporates &amp;ldquo;analytical and reflective essays on various aspects of globalization from many sources.&amp;rdquo;  (Available at: http://yaleglobal.yale.edu/academic/papers). The co-authored paper has been previously published on Journal of Self-Governance and Management Economics, 2015. Below is the abstract of the featured essay, the full version of the paper can be accessed here: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2565483&lt;/p&gt;</description>
    </item>
    <item>
      <title>A conversation with Flora Sapio on Chinese politics and the rhetoric of friend/enemy distinction</title>
      <link>/blog/2015/11/a-conversation-with-flora-sapio-on-chinese-politics-and-the-rhetoric-of-friendenemy-distinction/</link>
      <pubDate>Sun, 08 Nov 2015 14:55:26 +0000</pubDate>
      <guid>/blog/2015/11/a-conversation-with-flora-sapio-on-chinese-politics-and-the-rhetoric-of-friendenemy-distinction/</guid>
      <description>&lt;p&gt;*&lt;strong&gt;&lt;a href=&#34;http://florasapio.blogspot.it/&#34;&gt;Flora Sapio&lt;/a&gt;&lt;/strong&gt; is a China legal scholar currently serving as research fellow at the Australian Centre on China in the World. Her research is focused on criminal justice and legal philosophy. She is the author of &lt;em&gt;Sovereign Power and the Law in China&lt;/em&gt; (Brill, 2010); co-editor of &lt;em&gt;The Politics of Law and Stability in China&lt;/em&gt;(Edward Elgar, 2014); and, &lt;em&gt;Detention and its Reforms in China&lt;/em&gt; (forthcoming, Ashgate, 2016).&lt;/p&gt;
&lt;p&gt;The following is a transcription of my conversation with &lt;strong&gt;Flora Sapio&lt;/strong&gt; on the problem of enemyship in contemporary Chinese politics and the rhetorical approach in the investigation of political rhetoric:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Law at the End of the Day: Keren Wang on &#34;Religion in China: Historical and Legal Context&#34; and Chinese-Vatican Relations</title>
      <link>/blog/2015/09/law-at-the-end-of-the-day-keren-wang-on-religion-in-china-historical-and-legal-context-and-chinese-vatican-relations/</link>
      <pubDate>Sun, 20 Sep 2015 07:30:05 +0000</pubDate>
      <guid>/blog/2015/09/law-at-the-end-of-the-day-keren-wang-on-religion-in-china-historical-and-legal-context-and-chinese-vatican-relations/</guid>
      <description>&lt;div&gt;
&lt;p&gt;[embed]http://imgur.com/XhRs5nT[/embed]&lt;/p&gt;
&lt;p&gt;The study of the relationship between the state and religion—especially organized and institutional religion originating in the West and Middle East&amp;ndash;is grounded in an important and often overlooked premise. That premise is based on a very specific view of religion and a very historically contextualized understanding of the relationship between the state and religious institutions. Both are grounded in the primacy of the model of religious organization and of state-religion relations developed in the Middle East and Europe (and later spread elsewhere in the globe) centering around Judaism, Jewish state organization and its important evolution under Christianity and Islam, the religions that emerged from it. Much of the national and international discussion of the last several centuries has effectively centered on the way in each of these variants of so-called &amp;ldquo;&lt;a href=&#34;http://en.wikipedia.org/wiki/Abrahamic_religions&#34;&gt;Abrahamic&lt;/a&gt;&amp;rdquo; religions (and thier contests for domination within social, cultural and economic space) be manifested, and their relations with states legitimated. Other religious traditions are then folded into the master narrative of law-religion discourse, or treated as exceptions or variations within it.&lt;/p&gt;</description>
    </item>
    <item>
      <title>‘Reading’ the Historical New York Cityscape, part 2: fire, ice, and tensions on the streets</title>
      <link>/blog/2015/09/reading-the-historical-new-york-cityscape-part-2-fire-ice-and-tensions-on-the-streets/</link>
      <pubDate>Thu, 10 Sep 2015 21:19:44 +0000</pubDate>
      <guid>/blog/2015/09/reading-the-historical-new-york-cityscape-part-2-fire-ice-and-tensions-on-the-streets/</guid>
      <description>&lt;p&gt;The historic Laki (Lakagígar) eruption that took place in Iceland from June 1783 to February 1784 was so powerful, that the entire European continent plus many parts of North America were blanked with a great &amp;ldquo;haze&amp;rdquo; of volcanic gases and particles. The eight-month-long continuous release of toxic gas from Laki not only wiped out roughly one-quarter of Iceland&amp;rsquo;s population&lt;strong&gt; [1]&lt;/strong&gt;, the resulting volcanic haze also led to an exceptionally cool summer followed by a brutal, frigid winter in Europe and North America.  The Laki eruption added another layer of frost on top of the frigid climate pattern of  thus in turn led to acute food shortages in those regions. Present analysis estimated that the Laki eruption directly caused more than twenty-thousand human mortality in England alone during the &amp;ldquo;volcanic winter&amp;rdquo; from August 1783 to February 1784. &lt;strong&gt;[2]&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>‘Reading’ the Historical New York Cityscape, part 1: topography &amp; city-planning before and after the Revolutionary War</title>
      <link>/blog/2015/07/reading-the-post-revolutionary-war-new-york-cityscape-part-1-topography-and-city-planning/</link>
      <pubDate>Tue, 21 Jul 2015 20:49:50 +0000</pubDate>
      <guid>/blog/2015/07/reading-the-post-revolutionary-war-new-york-cityscape-part-1-topography-and-city-planning/</guid>
      <description>&lt;p&gt;&lt;b&gt;originally&lt;/b&gt;&lt;strong&gt; posted by Keren Wang, July 20th 2015&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;For this research project, in collaboration with Professor &lt;a href=&#34;http://cas.la.psu.edu/directory/sxb17&#34;&gt;Stephen Browne&lt;/a&gt; from Penn State University, we seek to investigate &lt;span class=&#34;il&#34;&gt;New&lt;/span&gt; &lt;span class=&#34;il&#34;&gt;York&lt;/span&gt; City, circa 1789 through the five senses: what did it look like, sound like, smell like, taste like, and feel like? I will be primarily focusing on looking directly into relevant sources from the early years of the Republic: newspapers clippings, personal diaries, musical scores, travelers&amp;rsquo; accounts, correspondence, menu offerings, historical art, architecture, music, theater, food, etc. By the end of this project, hopefully we may find ourselves with a collection of blog posts, nicely crammed with contemporary accounts of life in the City as it was lived bodily, publicly, and culturally.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The History and Challenges of Theorizing Human Sacrifice</title>
      <link>/blog/2015/06/the-history-and-challenges-of-theorizing-human-sacrifice/</link>
      <pubDate>Thu, 11 Jun 2015 17:08:00 +0000</pubDate>
      <guid>/blog/2015/06/the-history-and-challenges-of-theorizing-human-sacrifice/</guid>
      <description>&lt;figure&gt;
  &lt;img alt=&#34;Floor mosaic in Beit Alfa Synagogue (c.5th century AD, Israel) depicting the Binding of Issac&#34; class=&#34;size-full wp-image-161&#34; height=&#34;386&#34; src=&#34;/images/uploads/2015/06/Beit_alfa02.jpg&#34; width=&#34;600&#34;/&gt;
  &lt;figcaption&gt;&lt;/a&gt; Fig. 1: Floor mosaic in Beit Alfa Synagogue (c.5th century CE, Israel) depicting the Binding of Issac (public domain art available via &lt;a href=&#34;http://commons.wikimedia.org/wiki/File:Beit_alfa02.jpg&#34;&gt;Wikimedia Commons&lt;/a&gt;)&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;p&gt;Human sacrifice refers to the practice of ritual killing of human beings as offerings to divine patrons, ancestors, or other superhuman forces. Early comparative studies on human sacrifice were heavily influenced by theories of historical relativism and social evolutionism. [1] Such theory approach is exemplified by the works of nineteenth century cultural-anthropologists &lt;a href=&#34;http://en.wikipedia.org/wiki/Edward_Burnett_Tylor&#34;&gt;Edward Tylor&lt;/a&gt; and &lt;a href=&#34;http://en.wikipedia.org/wiki/Marcel_Mauss&#34;&gt;Marcel Mauss&lt;/a&gt;, both of whom framed practices of human sacrifice as specific iteration of a general social feature, developed relative to various stages of human historical development. [2]&lt;/p&gt;</description>
    </item>
    <item>
      <title>A Brief Note on Human Sacrifice in Classical Mayan Culture</title>
      <link>/blog/2015/06/a-brief-note-on-human-sacrifice-in-classical-mayan-culture/</link>
      <pubDate>Tue, 02 Jun 2015 22:27:59 +0000</pubDate>
      <guid>/blog/2015/06/a-brief-note-on-human-sacrifice-in-classical-mayan-culture/</guid>
      <description>&lt;figure&gt;
  &lt;img alt=&#34;Goddess_O_Ixchel&#34; class=&#34;wp-image-145 size-full&#34; height=&#34;565&#34; src=&#34;/images/uploads/2015/06/Goddess_O_Ixchel.jpg&#34; width=&#34;488&#34;/&gt;
  &lt;figcaption&gt;&lt;/a&gt; Mayan Moon Goddess with rabbit, Museum of Fine Arts Boston MA&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;In my &lt;a href=&#34;http://sites.psu.edu/kerenw/2015/05/27/historical-background-of-human-sacrifices-during-shang-dynasty/&#34;&gt;previous post&lt;/a&gt; &amp;ldquo;&lt;a href=&#34;http://sites.psu.edu/kerenw/2015/05/27/historical-background-of-human-sacrifices-during-shang-dynasty/&#34;&gt;Human Sacrifice during Shang Dynasty&lt;/a&gt;&amp;rdquo;, I  examined the historical background of &lt;i&gt;renji &lt;/i&gt;(人祭 / ritual human sacrifice) practiced during Shang dynasty China (c. 1600 BC to 1046 BC). It is important to note that the kind of large-scale human sacrifice practiced by Shang rulers, though extraordinary, is not historically idiosyncratic. Human sacrifice rituals similar to that of &lt;i&gt;renji &lt;/i&gt;were also found pre-Colombian Mesoamerica, most notably in Mayan and Aztec societies. [1]  As scholars have already performed excellent analyses on the political economy of ritual human killings in Aztec empire (&lt;em&gt;see, &lt;/em&gt;&lt;i&gt;&lt;a href=&#34;https://mitpress.mit.edu/index.php?q=books/accursed-share&#34;&gt;The Accursed Share&lt;/a&gt; &lt;/i&gt;by Georges Bataille), this post will focus only on large-scale human sacrifices as practiced in pre-Colombian Mayan society.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Human Sacrifice during Shang Dynasty</title>
      <link>/blog/2015/05/historical-background-of-human-sacrifices-during-shang-dynasty/</link>
      <pubDate>Wed, 27 May 2015 20:28:53 +0000</pubDate>
      <guid>/blog/2015/05/historical-background-of-human-sacrifices-during-shang-dynasty/</guid>
      <description>&lt;img alt=&#34;&#34; class=&#34;wp-image-118 size-medium aligncenter&#34; height=&#34;250&#34; src=&#34;/images/uploads/2015/05/01200000030126136323412742130-300x250.jpg&#34; width=&#34;300&#34;/&gt;
&lt;p&gt;[box type=&amp;ldquo;note&amp;rdquo;]Fig.1, Bronze ceremonial axe (Yue / 钺) from middle to late Shang period, c. 1400 BCE ~ 1000 BCE, symbol of state power. Excavated from tomb M1 at the Sufutun site, currently part of the Shandong Museum collection. [/box]&lt;/p&gt;
&lt;p&gt;Human sacrifice refers to the practice of ritual killing of human beings as offerings to divine patrons, ancestors, or other superhuman forces.  While the phenomenon of ritual human killings have been present in &lt;a href=&#34;http://www.nytimes.com/2009/10/27/science/27ur.html&#34; rel=&#34;noopener&#34; target=&#34;_blank&#34;&gt;many societies&lt;/a&gt; throughout history &lt;a href=&#34;#1&#34;&gt;[1]&lt;/a&gt;, the types of human sacrifice that were practiced by ancient Chinese and &lt;a href=&#34;http://en.wikipedia.org/wiki/Human_sacrifice_in_Maya_culture&#34; rel=&#34;noopener&#34; target=&#34;_blank&#34;&gt;pre-Colombian Mesoamerican&lt;/a&gt; cultures, which were exceptional in terms of the sheer number of people sacrificed, the frequency at which it was done, and the high degree of formalization of their sacrificial rituals. Large-scale, systematic human sacrifice functioned as important political and religious spectacles in &lt;a href=&#34;http://en.wikipedia.org/wiki/Shang_dynasty&#34; rel=&#34;noopener&#34; target=&#34;_blank&#34;&gt;Shang dynasty&lt;/a&gt;.&lt;a href=&#34;#2&#34;&gt;[2]&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Curriculum Vitae</title>
      <link>/cv/</link>
      <pubDate>Fri, 24 Apr 2015 03:43:27 +0000</pubDate>
      <guid>/cv/</guid>
      <description>&lt;!-- wp:html --&gt;
&lt;p&gt;&lt;a href=&#34;mailto:contact@kerenwang.org&#34;&gt;Email me&lt;/a&gt;
&lt;noscript&gt;kerenwcpe [at] gmail [dot] com&lt;/noscript&gt;&lt;/p&gt;
&lt;script&gt;
  (function () {
    var u = &#39;kerenwcpe&#39;, d = &#39;gmail&#39;, t = &#39;.com&#39;;
    var a = document.getElementById(&#39;em&#39;);
    a.href = &#39;mailto:&#39; + u + &#39;@&#39; + d + t + &#39;?subject=Hello%20from%20your%20website&#39;;
  }());
&lt;/script&gt;
&lt;!-- /wp:html --&gt;
&lt;h2&gt;&lt;strong&gt;ABOUT ME:&lt;/strong&gt;&lt;/h2&gt;
&lt;p data-pm-slice=&#34;1 1 []&#34;&gt;As a scholar, my research and teaching traverse the intersections of rhetorical theory, transnational legal studies, and political communication, interrogating the symbolic and discursive underpinnings of contemporary governance. My monograph, &lt;a href=&#34;https://id.lib.harvard.edu/alma/99153820005603941/catalog&#34;&gt;&lt;strong&gt;&lt;em&gt;Legal and Rhetorical Foundations of Economic Globalization: &lt;/em&gt;&lt;/strong&gt;&lt;em&gt;An Atlas of Ritual Sacrifice in Late-Capitalism&lt;/em&gt;&lt;/a&gt; (Routledge, 2020), examines how ritualistic frameworks render exploitative structures of the prevailing political‑economic system inescapable—or even preferable—offering an interdisciplinary critical lens on the architecture of global development.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
