Rumination as a Consequence of Literacy

My husband and brothers-in-law are in an album club hosted over Discord. Over the course of two-ish weeks, they each listen to an album nearly ten times, then write up a few surprisingly formal paragraphs about the material.

At first, I wanted to participate in the fun. Like most people, I consider myself a music-lover, I think I have good taste, and I also struggle to believe that people will continue to survive without hearing my very important opinions on everything. But the idea of listening to the same album seven, eight, nine, or more times over the course of fourteen days didn’t sit well with me. Part of me wasn’t prepared to give that kind of focus to something, but I also felt ill-equipped because I am still processing the work of artists I started listening to years ago. If after who knows how many listens I still don’t know quite how I feel about Rumours (though, generally: yes, very good… except what happened with Oh, Daddy?), how can I expect myself to have anything to say about an album that is still so new to me?

Image of Squidward from Spongebob Squarepants with bloodshot eyes looking perturbed. Text above the image reads I am an iterative thinker (or a ruminator, if my mother is to be believed). I’m also an iterative reader, listener, writer. Recursion continues to show up in my life in many ways, and I am still learning to suspend my anxiety about it (a semester of Data Structures and Algorithms is enough to make anyone’s palms sweat at the thought).

I am always coming back, reviewing, adding, taking away. Revision is the sine qua non of my existence. I feel like I could toy with one idea forever, if only there weren’t so many others. Sometimes this abiding curiosity feels like a vigil: sitting, waiting, watching. Usually I think what you’re watching for is most important. What you find changes who you are.

But, in a larger sense, this rumination is one of the consequences of literacy that Goody & Watt discussed in their paper. A study conducted by the University of Michigan found that 73% of people between the ages of 25 and 35 are chronic over-thinkers. While this statistic falls with age, it remains significant: as creatures, we are obsessive. Maybe this is because reading and writing gives us the opportunity to revisit ideas constantly. Our shifting understanding of time and history permits us to linger, and then walk away… and then come back. At the same time, we are prone to revisionist histories in the same way that the oral cultures we discussed are: we change our minds with new information, according to our needs. Our ideas don’t stay static. We struggle to agree on facts, even though we each believe that facts exist. This revision, too, has been made a literary process. The second reading of a text is different from the first.

Malcolm X described his literacy as freedom. I wonder if he found a sweet spot between illiteracy and rumination.

Memory in Oral and Literate Cultures

In 1963, Jack Goody and Ian Watt described a high-level overview of humanity’s move from predominantly oral cultures to predominantly literate ones, focusing on the consequences of literacy. One of these consequences was a shift in how we remember.

Oral cultures were almost entirely rote memory-based. The next time you feel discouraged about memorizing the contents of your next closed-book exam, take heart in this knowledge of the human ability for recall: for a very long time, the entirety of a culture was held firmly in someone’s skull. Often these societies made use of mnemonic devices and rituals, and also employed professional remember-ers to maintain their store of knowledge.

Dory from the film Finding Nemo on an ocean background. Text above and below the image reads,

When I first thought about these professional remember-ers, I was immediately launched back to one of my middle school reading classes, The Giver by Lois Lowry nestled in my hands. But the more I thought, the more I started to think about our more contemporary versions of remember-ers: librarians, archivists, and museum curators.

As holders of our cultural heritage, the memory institutions that are libraries, archives, and museums are in a constant state of flux. While from the outside they seem to be the static, foreboding backbone of the academic enterprise, under the hood their workers are abuzz trying to find ways to best preserve, organize, and make accessible the stuff of our humanity. For example, a 2009 study examined how European Union research projects in archives, libraries, and museums communicated memory and provided recommendations for how information workers can balance their technology and information-centric responsibilities with their role as memory communicators.

These institutions also often carry the burden of ensuring diverse representation in their collections and preserving the history of underrepresented and minoritized groups—groups whose memories have often been intentionally targeted for destruction. The book Tribal Libraries, Archives, and Museums: Preserving Our Language, Memory, and Lifeways describes how memory institutions are working to maintain Indigenous knowledge, tradition, and languages. This requires examining the authority by which certain hierarchies of epistemology are established so that Native voices are prioritized over others when representing their history (a topic also explored in our course by Ellen Cushman’s examination of the Cherokee syllabary).

Oral and literate cultures are very different in the technical processes they employ in remembering, but both employ(ed) professional memory keepers to preserve their cultures. While in oral societies these were people tasked with keeping the glut of culture lodged between their ears, in literate societies they are people with the equally daunting task of collecting, labeling, and organizing the rapidly increasing holdings of our heritage and creating relationships between objects and the mind such that when we engage with these collections, we are not only reading and learning, but also remembering.

Clay envelopes, pigeons, and drones

Cybersecurity sounds like a definitively contemporary term, alluding both to new fears and to the new technologies we create to cope with them. At Ohio State, Dr. Dan Gauthier is on the forefront of cutting edge encryption technology, promising to keep information traveling by drone secure. But as new as it sounds, information security is an ancient practice, and as technical as it seems, its social, economic, and political dimensions affect society in increasingly pressing ways. Meme of Michael Scott from the television show The Office saying. White text on top and bottom says,

Dr. Denise Schmandt-Besserat, an archaeologist and scholar of the history of writing, spent her long career looking for clues as to how writing came to be. Her token theory of writing is widely accepted, but also hidden in this history is the foundation of information security. Tokens were used to represent objects, especially in trade. Before the advent of writing, these tokens were counted, then sealed inside clay envelopes and delivered with the goods as a receipt. Upon delivery, the receiver could then break the envelope to be sure that the order matched what was supposed to be sent. This protection of trade data is an early form of information security.

Long after writing was invented, and long before the invention of the Internet, this tradition of defense continued. The introduction to The History of Information Security describes a 17th century example of encryption by putting letters carried by couriers into written code. These coded letters had multiple lines of defense: the fitness and physical defense of the courier, the encryption of the letter contents, and even international diplomatic immunity all served as mechanisms of information security.

In more modern settings, carrier pigeons evolved into drones, hand-written encryption evolved into digital code sequences, and international protections evolved into massive organizational innovations like ICANN’s Security and Stability Advisory Committee, the European Network and Information Security Agency, and the creation of national Computer Emergency Response Teams. Beyond information security, privacy as a concept has evolved into a right secured by laws like Europe’s General Data Protection Regulation and the state of Illinois’s Biometric Information Privacy Act.

As more individuals become hyper-connected, the importance of privacy and security takes on a new role. State secrets and mercantile arrangements aren’t all that needs protecting, though the potential for some information to cause political conflict and social instability is lost on no one. Now, the most sensitive details of our lives are now available for the hacking. While encryption and other information security measures may not themselves be forms of writing, their use to protect the knowledge we hold dear has made them an indispensable part of the information ecosystem, and an understanding of historical and contemporary information security is important for active and informed participation in the digital age.

Wow, this is so sad…

In 2018, digital rhetoric scholar Dr. Heather Suzanne Woods wrote a scathing article on our misplaced trust in artificial intelligence virtual assistants. Paradoxically, the title, “Asking more of Siri and Alexa,” reflects the opposite of what the article suggests. And she is far from alone in concluding that we need to be wiser about asking anything of technologies such as these– the nodes that comprise the Internet of Things, while marketed as product-service hybrids intended to make things easier, more often add complexity to already complicated lives, making people anxious, overloaded, and unable to cope with an excess of data. But it seems humanity might have bigger fish to fry than our chronic information pathology.

Dr. Shoshana Zuboff keys us into these concerns in her book, Surveillance Capitalism, the ultimate claim of which is that by continuing to engage in technophilia, or if not technophilia then techno-ambivalence, society is slipping toward a weakening of autonomy, privacy, and individual decision-making powerful enough to threaten our most prized institution: democracy.

Meme of an anime man labeled Silcon Valley, gesturing to a butterfly labeled

Surveillance capitalism, like all other forms of capitalism, evolved by claiming something not yet a part of the market dynamic. Older forms of capitalism claimed natural resources, land, and labor as commodities to be sold and repurposed. Surveillance capitalism claims data, but not just any data. The data interests of surveillance capitalism lie in the private lives of technology users: what do people say, to whom, and how? where do they go, with whom, and how? what do they buy, for what, and how? This raw data can then be transformed into metadata profiles used to super-target individuals, nudging people toward actions that serve commercial interests.

The common refrain of “I’d rather see something I’m interested in” is enough to assuage the creeping anxiety of most while scrolling Instagram, ignoring pointed ads of a product mentioned in passing to a friend or partner. But this surplus accumulation of data goes far beyond nudging users toward purchases. In 2016, Cambridge Analytica used this same metadata to make political predictions about people. In an age of smart cities, ubiquitous computing, and quantified selves, digital platforms become the new battlegrounds of our most pressing battles: freedom from government surveillance, freedom of speech, racial justice, labor relations, and safety from bad actors. When Google can set paid customer lures via Pokémon Go to modify shopping behaviors, when advertisement becomes propaganda, when the digital is instrumentalized to the purpose of instrumentalizing people, that is how democracy finds itself in peril. When all it takes is money to buy the data and the algorithm, new poverties of information emerge that in many ways will enforce and supersede those of economics. Too much trust is put into large technological organizations to protect the data of millions, the same kind of trust generally reserved for fiduciary relationships.

“[Surveillance capitalism] substitutes computation for politics, so it’s post-democracy,” says Zuboff. “It substitutes populations for societies, statistics for citizens, and computation for politics.”

…Alexa, play Despacito.