To see the other types of publications on this topic, follow the link: American Thread Company.

Journal articles on the topic 'American Thread Company'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'American Thread Company.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kim, Dong-Woon. "The British Multinational Enterprise in the United States before 1914: The Case of J. & P. Coats." Business History Review 72, no. 4 (1998): 523–51. http://dx.doi.org/10.2307/3116621.

Full text
Abstract:
In this article Dong-Woon Kim continues his investigation of the multinational activities of the British thread-making company, J. & P. Coats. Dr. Kim previously published “J. & P. Coats in Tsarist Russia, 1889-1917” in the winter 1995 edition of this journal (pp. 465-493). Here he explores the experiences of J. & P. Coats in the United States. Coats began selling its thread in the U.S. soon after the company's founding in 1830. From a modest start, it established a system of agencies to sell its own “Coats” brand and, in 1869, began local manufacture of thread in Rhode Island. Through a careful series of direct investments and the development of a flexible managerial structure, Coats eventually came to dominate the American cotton thread market.
APA, Harvard, Vancouver, ISO, and other styles
2

GORLOVA, EKATERINA V., and NATALYA S. RESHETNIKOVA. "DEVELOPMENT OF CORPORATE CULTURE DURING THE SPREAD OF COVID-19 ON THE EXAMPLE OF AMERICAN SOCIETY." CASPIAN REGION: Politics, Economics, Culture 66, no. 1 (2021): 138–43. http://dx.doi.org/10.21672/1818-510x-2021-66-1-138-143.

Full text
Abstract:
The many changes caused by COVID-19 have impacted all areas of our lives. Since the beginning of the pandemic in every country, people have experienced the same fears: getting sick, being left without a livelihood, dying, losing loved ones, etc. In many states, support was provided by both the government and the employer. Our analyze show how the employees themselves assessed the level of relations between them and the company through the connecting thread of corporate culture. We have determined that, in general, in many cases there is an increase in corporate values, information coming from managers is more trustworthy than information from the mass media. Honesty, openness and communication are becoming the new flagships for the development of corporate culture.
APA, Harvard, Vancouver, ISO, and other styles
3

Zhuravleva, V., and M. Cherkashin. "Shaping of the “China Threat” Concept in the U.S. Expert-Political Discourse." World Economy and International Relations 67, no. 11 (2023): 35–45. http://dx.doi.org/10.20542/0131-2227-2023-67-11-35-45.

Full text
Abstract:
In 2011, Andrew Liveris, a former CEO and chairman of The Dow Chemical Company, one of the three largest chemical producers in the world, published the book “Make in America. Re-invention solved”. During the 2016 presidential campaign, he was one of D. Trump’s top donors. In 2017, the President appointed him to lead his American Manufacturing Council. The slogan “make in America” became the second key ideological element of Donald Trump’s presidency, along with the popular “make America great again”. The strategy of restoring American industry has become the basis of D. Trump’s economic policy and is continued by J. Biden. It also in many ways strengthened and accelerated the confrontational vector in the U.S. policy towards China. This is a vivid example of how ideas can get into American political discourse, become official concepts that determine not only the country’s internal development, but also foreign policy strategies. In American politics, there is a well-established mechanism for such transition of ideas into political concepts and big strategies. Through this mechanism, the authors are striving to track the dynamics of the U.S. – China confrontation. This article explores the evolution of the “China Threat” concept in American policy from “think tanks” analytical papers to Senate hearings and annual reports towards, finally, the National Security Strategies of the last three administrations. This research shows the gradual change in narratives from the “U.S. – China partnership” to the “U.S. – China confrontation”. The principles of systems analysis allowed us to consider the process of formulating current foreign policy approaches to China through the interaction of the main elements of the U.S. foreign policy strategic conceptualization. In this systemic process, there are three interrelated actors – research centers, Congress and the President. The research period is limited to the term of the last three presidents, with a view to trace, if possible, the point of transition from the declared “well-being” in bilateral relations to the declared confrontation. The authors came to the conclusion that the escalation of the “China Threat” in political discourse starts from the period of B. Obama’s defense budget reduction and was highly promoted by the U.S. Department of Defense and military-industrial complex interest groups through conceptualization of the threat by think tanks.
APA, Harvard, Vancouver, ISO, and other styles
4

Romero Somme, G. "Expropriation and consequence: Peru-United States relations (1963–1975)." Cuadernos Iberoamericanos 9, no. 4 (May 11, 2022): 34–52. http://dx.doi.org/10.46272/2409-3416-2021-9-4-34-52.

Full text
Abstract:
This article studies the nature of Peru-United States relations during the period 1963–1975 through an analysis of the dispute over the potential expropriation of the US-owned International Petroleum Company. The United States government implemented a tough policy towards the first government of Fernando Belaúnde – who sough a “special” relation with the Unites States –characterized by the threat of economic sanctions if the Peruvian government did not solve the issue in favor of the company. The threat of the Hickenlooper Amendment, which sought to penalize countries that expropriated American owned businesses, was a clear sign of this. Once the company was expropriated by the Revolutionary Government of the Armed Forces in 1968 the American government was ironically forced to follow a more flexible approach, as the new military regime sought to diversify its bilateral relations in the bipolar context of the Cold War. The American policy of supporting the IPC had negative long-term effects fo American interests in the region, as it accelerated the overthrown of Belaúnde and ushered in the arrival of a military junta which sought a more independent foreign policy. A country that had been solid American ally camp since the end of World War II had become a nonaligned nation.
APA, Harvard, Vancouver, ISO, and other styles
5

Andrea, Daphne, and Theresa Aurel Tanuwijaya. "Weak State as a Security Threat: Study Case of El Salvador (2014-2019)." Jurnal Sentris 4, no. 1 (June 16, 2023): 14–33. http://dx.doi.org/10.26593/sentris.v4i1.6545.14-33.

Full text
Abstract:
The World Trade Center Attack or 9/11 tragedy has awakened the international community, particularly the United States (US) to sharpen its foreign policy in facing security threats coming from ‘weak states’. One of the most prominent weak states examples that pose a grave threat to other countries are the Northern Triangle Countries of Central America that referred to Guatemala, Honduras, and El Salvador. Hence, this paper will discuss the rationale behind US initiatives in dealing with security threats in El Salvador as one of the Northern Triangle Countries. In analyzing the case, the writers will use the weak state concept and national interest concept. The result of this paper finds that El Salvador corresponds to the elements of a weak state and further poses security threats by giving rise to transnational criminal organizations, drug trafficking, and migrant problems in which overcoming those security threats has become US vital national interest. However, we also find that although decreasing security threats and strengthening El Salvador government capacity is highly correlated, strengthening El Salvador governance through the providence of aid and assistance is actually classified as US important national interest. Keywords: Security threats; Northern Triangle; weak state; El Salvador; national interest REFERENCES Ambrus, Steven. “Guatemala: The Crisis of Rule of Law and a Weak Party System.” Ideas Matter, January 28, 2019. https://blogs.iadb.org/ideas-matter/en/guatemala-the-crisis-of-rule-of-law-and-a-weak-party-system/. Andrade, Laura. Transparency In El Salvador. 1st ed. 1. El Salvador: University Institute for Public Opinion, Asmann, Parker. “El Salvador Citizens Say Gangs, Not Government 'Rule' the Country.” InSight Crime, August 19, 2020. https://insightcrime.org/news/brief/el-salvador-citizens-say-gangs-not- government-rules-country/. Accessed July 11, 2021. Art, Robert J. A. Grand Strategy for America. Ithaca: Century Foundation/Cornell UP, 2004. BBC News Indonesia "Kisah Di Balik MS-13, Salah Satu Geng Jalanan Paling Brutal Di Dunia." BBC News Indonesia. BBC, April 21, 2017.https://www.bbc.com/indonesia/majalah-39663817.Accessed July 11, 2021. Bureau of Western Hemisphere Affairs “U.S. Relations With El Salvador - United States Department of State.” U.S. Department of State. U.S. Department of State, April 14, 2021.https://www.state.gov/u-s-relations-with-el-salvador/. Accessed July 11, 2021. “Bureau of International Narcotics and Law ENFORCEMENT Affairs: El Salvador Summary -United States Department of State.” U.S. Department of State. U.S. Department of State, February3, 2021. https://www.state.gov/bureau-of-international-narcotics-and-law-enforcement-affairs-work-by-country/el-salvador-summary/. Central Intelligence Agency. Central Intelligence Agency, July 6, 2021. https://www.cia.gov/the-world-factbook/countries/el-salvador/. Accessed July 11, 2021. Dudley, Steven, and Avalos, Silva “MS13 In the Americas: How the World’s Most Notorious Gang Defies Logic, Resists Destruction. National Institute of Justice”, 2018. “El Salvador Homicides Jump 56 Percent as Gang Truce Unravels.” Reuters, December 30,2014.https://www.reuters.com/article/us-el-salvador-violence-idUSKBN0K81HR20141230. Eizenstat, Stuart E., John Edward Porter, and Jeremy M. Weinstein. “Rebuilding Weak States.”Foreign Affairs 84, no. 1 (2005): 134. https://doi.org/10.2307/20034213. FOXBusiness. “How MS-13, One of America's Most Dangerous Gangs, Is Funded.” Fox Business.Fox Business, April 19, 2017.https://www.foxbusiness.com/features/how-ms-13-one-of-americas-most-dangerous-gangs-is-funded. Accessed July 11, 2021. Fukuyama, Francis.Cornell University Press. Ithaca, USA: Cornell University Press, 2004. Galdamez, Eddie. “Water Pollution in El Salvador. Getting Worse Every Year.” El Salvador INFO,June 30, 2021. https://elsalvadorinfo.net/water-pollution-in-el-salvador/. Accessed July 11, 2021. Gies, Heather. “Once Lush, El Salvador Is Dangerously Close to Running out of Water.” Environment. National Geographic, May 4, 2021.https://www.nationalgeographic.com/environment/article/el-salvador-water-crisis-drought-climate-change. Accessed July 11, 2021. Giedraityte, Ieva. “Empire, Leadership OR Hegemony: US Strategies towards the Northern Triangle Countries in the 21st Century.” Latin American Yearbook – Political Science and International Relations 7 (2019): 175. https://doi.org/10.17951/al.2019.7.175-192. “Government Revenues.” Government Revenues - Countries - List. Accessed August 4, 2021.https://tradingeconomics.com/country-list/government-revenues. “Guatemala: An Assessment of Poverty.” Poverty Analysis - Guatemala: An Assessment of Poverty. Accessed August 4, 2021. https://web.archive.org/web/20161225194831/http://web.worldbank.org/WBSITE/EXTERNAL/ TOPICS/EXTPOVERTY/EXTPA/0,,contentMDK:20207581~menuPK:443285~pagePK:148956~piPK:216618~theSitePK:430367,00.html. Herningtyas, Ratih. "Weak State As A Security Threat: A Case Study Of Colombia." Journal of International Relations 2, no. 2 (2014): 146-156. “Honduras.” World Bank. Accessed August 4, 2021. https://www.worldbank.org/en/country/honduras#:~:text=Honduras%20is%20a%20low%20middle,than%20US%241.90%20per%20day. Iesue, Laura. “The Alliance for Prosperity Plan: A Failed Effort for Stemming Migration,” COHA, November 21, 2019, https://www.coha.org/the-alliance-for-prosperity-plan-a-failed-effort-for-stemming-migration/. Accessed July 11, 2021 Indexmundi. “Countries Ranked by Intentional Homicides (per 100,000 People)." Countries ranked by Intentional homicides (per 100,000 people), n.d.,https://www.indexmundi.com/facts/indicators/VC.IHR.PSRC.P5/rankings. Accessed July 11,2021. Insight Crime. “Central America Regional Security Initiative (CARSI)." InSight Crime, October 18,2011, https://insightcrime.org/uncategorized/central-america-regional-security-initiative/. Accessed July 11, 2021 “Income Held by Top 20 Percent in El Salvador.” Statista, July 5, 2021.https://www.statista.com/statistics/1075313/el-salvador-income-inequality/. International Monetary Fund. “El Salvador: Selected Issues.” IMF Staff Country Reports 16, no. 206 (2016): 1. https://doi.org/10.5089/9781498342346.002. Interpol "El Salvador." El Salvador, n.d.,https://www.interpol.int/en/Who-we-are/Member-countries/Americas/EL-SALVADOR. Accessed July 11, 2021. “Key Issues AFFECTING Youth in El Salvador - OCDE.” Key Issues affecting Youth in El Salvador - OCDE. Accessed August 8, 2021.https://www.oecd.org/fr/pays/elsalvador/youth-issues-in-el-salvador.htm. Lakhani, Nina. “Gang Violence in El Salvador Fuelling Country's Child Migration Crisis.” The Guardian. Guardian News and Media, November 18, 2014.https://www.theguardian.com/world/2014/nov/18/el-salvador-gang-violence-child-migration-crisis. Accessed July 11, 2021. “Life under Gang Rule in El Salvador.” Crisis Group, December 10, 2018. https://www.crisisgroup.org/latin-america-caribbean/central-america/el-salvador/life-under-gang-rule-el-salvador. Löwenheim, Oded. “Transnational Criminal Organizations and Security: The Case against Inflating the Threat.” International Journal 57, no. 4 (2002): 513–36. https://doi.org/10.2307/40203690. “Mano Dura: El Salvador Responds to Gangs.” Taylor & Francis. Accessed August 5, 2021.https://www.tandfonline.com/doi/abs/10.1080/09614520701628121?journalCode=cdip20.Menjivar, Cecilia, and Andrea Gomez Cervates. “El Salvador: Civil War, Natural Disasters, and Gang Violence Drive Migration.” migrationpolicy.org, May 11, 2021.https://www.migrationpolicy.org/article/el-salvador-civil-war-natural-disasters-and-gang-violence-drive-migration. Accessed July 11, 2021. Meyer, Peter J., and Ribando Clare Seelke. Central America Regional Security Initiative: Background and Policy Issues for Congress. Washington, D.C.: Library of Congress, Congressional Research Service, 2014. Michaels, Peter S. Lawless Intervention: United States Foreign Policy in El Salvador and Nicaragua, 6, 7, no. 2 (January 5, 1987). https://doi.org/https://core.ac.uk/download/pdf/71463263.pdf. OSAC. “El Salvador 2020 Crime & Safety Report,” https://www.osac.gov/Content/Report/b4884604- 977e-49c7-9e4a-1855725d032e. Days on July 9, 2021. “Overview.” World Bank. Accessed August 4, 2021. https://www.worldbank.org/en/country/elsalvador/overview. Patrick, Stewart. “Weak States and Global Threats: Assessing Evidence of Spillovers.” SSRN Electronic Journal, 2006, 1–31. https://doi.org/10.2139/ssrn.984057. Published by Teresa Romero, and Jul 5. “Gini Coefficient: Wealth Inequality in El Salvador.” Statista,July 5, 2021.https://www.statista.com/statistics/983230/income-distribution-gini-coefficient-el-salvador/. “Remarks by President Obama after Meeting with Central American Presidents.” National Archives and Records Administration. National Archives and Records Administration. Accessed August 8, 2021. https://obamawhitehouse.archives.gov/the-press-office/2014/07/25/remarks-president-obama-after-meeting-central-american-presidents. Riney, Lt Col Thomas J. “How Is MS-13 a Threat to US National Security? .” AIR WAR COLLEGE AIR UNIVERSITY , February 12, 2009. https://apps.dtic.mil/sti/pdfs/ADA540139.pdf. Rivera, Mauricio. “Drugs, Crime, and NONSTATE Actors in Latin America: Latin American Politics and Society.” Cambridge Core. Cambridge University Press, October 12, 2020. https://www.cambridge.org/core/journals/latin-american-politics-and-society/article/abs/drugs-crime-and-nonstate-actors-in-latin-america/67CF0B66AB8673D0C50F2F99AC93A1B7. Schneider, Mark. “Where Are the Northern Triangle Countries Headed? And What Is U.S. Policy?” Center for Strategic and International Studies (CSIS), July 9, 2021. https://www.csis.org/analysis/where-are-northern-triangle-countries-headed-and-what-us-policy. Seelke, Clare Ribando. “CRS Report for Congress.” El Salvador: Political, Economic, and Social Conditions and U.S. Relations, November 18, 2008. https://doi.org/https://www.refworld.org/pdfid/4951ec75e.pdf. Silva Avalos, Hector. “Corruption in El Salvador: Politicians, Police, and Transportistas.” SSRN, April 2, 2014. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2419174. Sleinan, Julett Pineda. “Salvadoran Court: Ex-President and Wife Guilty of Illicit Enrichment.” OCCRP. Accessed August 5, 2021. https://www.occrp.org/en/daily/13586-salvadoran-court-ex- president-and-wife-guilty-of-illicit-enrichment. The United States Department of Justice. “MS-13's Highest-Ranking Leaders Charged with Terrorism Offenses in the United States.”, January 19, 2021. https://www.justice.gov/opa/pr/ms-13-s-highest-ranking-leaders-charged-terrorism-offenses-united-states. Retrieved July 9, 2021. Transformation Index. “BTI 2020 El Salvador Country Report.” BTI Blog, 2020. https://www.bti-project.org/en/reports/country-report-SLV.html. Accessed July 11, 2021. “U.S. Strategy for Engagement in Central America Results Architecture – Overall Summary.”State.gov. Accessed August 8, 2021. https://www.state.gov/wp-content/uploads/2019/04/U.S.-Central-America-Strategy-Objectives.pdf. United Nations High Commissioner for Refugees. “Death Threats and Gang Violence Forcing More Families to FLEE Northern Central America – UNHCR and Unicef Survey.” UNHCR. Accessed August 5, 2021. https://www.unhcr.org/news/press/2020/12/5fdb14ff4/death-threats-gang-violence-forcing-families-flee-northern-central-america.html. U.S. Department of Homeland Security, “Combating Gangs,” https://www.ice.gov/features/gangs.Diakses pada 9 Juli 2021. USAID, “GENERATING HOPE: USAID IN EL SALVADOR, GUATEMALA, AND HONDURAS,”https://www.usaid.gov/generating-hope-usaid-el-salvador-guatemala-and honduras. Diakses pada 8 Juli 2021. United States General Accounting Office, “EL SALVADOR Military Assistance Has Helped Counter but Not Overcome the Insurgency,” https://www.gao.gov/assets/nsiad-91-166.pdf. Retrieved July 8, 2021. U.S. Immigration and Customs Enforcement “Combating Gangs.”, January 27, 2021. https://www.ice.gov/features/gangs. Accessed July 9, 2021. Valencia, Robert. “MS-13 and Barrio 18 Gangs Allegedly Employ More People in El Salvador than the Country's Largest Employers.” Newsweek. Newsweek, November 2, 2018.https://www.newsweek.com/ms-13-barrio-18-gangs-employ-more-people-el-salvador-largest-employers-1200029. Accessed July 11, 2021 Wang, Shaoguang. "China's Changing of the Guard: The Problem of State Weakness." Journal of Democracy 14, no. 1 (2003): 36-42. doi:10.1353/jod.2003.0022. Weber, Max. “Economy and society: An outline of interpretive sociology. Vol. 1. Univ of California Press, 1978. Welsh, Teresa. “US to Resume Northern Triangle Aid, Pompeo Says.” devex, 2019.https://www.devex.com/news/us-to-resume-northern-triangle-aid-pompeo-says-95846. Whelan, Robbie. “Why Are People Fleeing Central America? A New Breed of Gangs Is Taking Over.” The Wall Street Journal. Dow Jones & Company, November 2, 2018. https://www.wsj.com/articles/pay-or-die-extortion-economy-drives-latin-americas-murder-crisis-1541167619. Retrieved July 8, 2021. Williams, Phil. "Transnational criminal enterprises, conflict, and instability." Turbulent Peace: The challenges of managing international conflict (2001): 97-112. World Bank. “Overview.” World Bank, October 9, 2020.https://www.worldbank.org/en/country/elsalvador/overview. Retrieved July 8, 2021.
APA, Harvard, Vancouver, ISO, and other styles
6

Deshevykh, M. S., and V. V. Yudaev. "SpaceX As the Challenge to National Security." Contemporary problems of social work 6, no. 2 (June 29, 2020): 51–57. http://dx.doi.org/10.17922/2412-5466-2020-6-2-51-57.

Full text
Abstract:
today, the traditional nature of the activities of the national states and business structures in the space sector has been modified. Favorable legal conditions laid the foundation for increasing the role of private space agencies on the world stage. New business structures related to space issues. The American company SpaceX, in particular, the design of this company under the name “Starlink” provides access to high-performance Internet technologies in all territories through the use of satellite technology of 1200 satellites, which are of interest in the analysis of existing space programs. This Starlink program is a political research methodology that allows you to investigate the possible threat of state space programs. The results of this work can be taken as a basis for future developers. In the end, the author came to the conclusion that there is a threat of monopolization of the space sphere, which requires additional study and discussion at the level of government states.
APA, Harvard, Vancouver, ISO, and other styles
7

Surveyandini, Mayla. "The Results of the SWOT Analysis Approach in Formulating Company Strategy at the American English Course Purwokerto." ProBisnis : Jurnal Manajemen 13, no. 1 (April 3, 2022): 7–14. http://dx.doi.org/10.35335/probisnis.v13i1.22.

Full text
Abstract:
This research is entitled "The results of the SWOT analysis approach in formulating company strategy at the american english course purwokerto". The purpose of this study is to determine and measure the company's strengths (Strength), company weaknesses (Weakness), analyze opportunities (Opportunities) and threats (Threats) at the American English Course Purwokerto. This research is a descriptive qualitative research by collecting information about research subjects and the behavior of research subjects in a certain period. Data processing is carried out with a SWOT analysis process as a strategy formulation tool. The SWOT analysis that has been formed is then formulated in the form of a SWOT matrix with 4 (four) strategic formulas, namely SO Strategy, WO Strategy, ST Strategy and WT Strategy. The results of the study show that the American English Course is a business engaged in services. An effective and optimal planning strategy is needed that covers all aspects from planning to marketing. Quality products, optimal services supported by the right infrastructure including promotional activities will certainly bring success to the company's progress. Customer satisfaction is the key that must be prioritized to seize market share that is increasingly growing and competitive. The findings in this study have several important implications for the company to further improve and improve strategies both in terms of planning and marketing, namely the need to improve product quality and human resources, improve service and creativity to consumers so that consumers do not move to other competitors, use technological developments as learning and promotion facilities.
APA, Harvard, Vancouver, ISO, and other styles
8

Enis, Ben M., and E. Thomas Sullivan. "The AT&T Settlement: Legal Summary, Economic Analysis, and Marketing Implications." Journal of Marketing 49, no. 1 (January 1985): 127–36. http://dx.doi.org/10.1177/002224298504900112.

Full text
Abstract:
A review of one of the most significant events in modern economic history, the restructuring of American Telephone and Telegraph Company, this article gives a concise summary of the legal issues, from first allegations in 1974 through the final order in 1983. It offers a six-category product-market framework for considering the economic and marketing implications of the settlement, and provides a foundation for continued study of the many opportunities and threats implicit in greatly increasing the scope and diversity of telecommunications marketing.
APA, Harvard, Vancouver, ISO, and other styles
9

Putra Eryawan, I. Gusti Ngurah Made, Gusti Made Arya Sasmita, and Anak Agung Ketut Agung Cahyawan Wiranatha. "Information Security Risk Strategy at PT. X Using NIST SP 800-30." Jurnal Ilmiah Merpati (Menara Penelitian Akademika Teknologi Informasi) 9, no. 3 (May 27, 2021): 213. http://dx.doi.org/10.24843/jim.2021.v09.i03.p03.

Full text
Abstract:
Information security is a vital aspect that must be considered in use of information technology devices by active users. PT. X runs a business that applies information technology related to distribution aspects through company resource planning. Information technology formed assets IT infrastructure, information systems, operating procedures, and network infrastructure. This asset has a potential threat that causes disruption resulting losses. This problem arises to cope through the response to the risk strategy. NIST SP 800-30 method has a flexible risk perspective for the organization and federation standards of American security. Research is divided into risk measurement as a risk, risk mitigation as risk planning, and risk evaluation embodied risk reports. Results of the research show the value of risk through the calculation of the likelihood and impact matrix of the highest threat is at a low level is 14, medium at 12, and high of 4 are categorized good enough. Keywords: Risk Strategy, Information Security, NIST SP 800-30, Risk
APA, Harvard, Vancouver, ISO, and other styles
10

Tsvietkov, Oleksandr. "Threats and Challenges of the Nuclear Arms Race on the Current Stage." Mìžnarodnì zv’âzki Ukraïni: naukovì pošuki ì znahìdki, no. 29 (November 10, 2020): 147–65. http://dx.doi.org/10.15407/mzu2020.29.147.

Full text
Abstract:
Contemporary issues of nuclear weapons and the nuclear arms race in the modern world are examined, based mainly on the assessments of the German “Statista” company, the American Federation of Scientists and the Stockholm International Peace Research Institute. It is emphasized that invented more than seventy years ago, nuclear weapon has not lost its basic qualities of the most massive and large-scale destruction, but also added to this the latest factors of global threat of its proliferation and the challenges of innovative technological advances in its means of delivery. The latter is increasingly imposed on the growing conflict of the modern multipolarworld order, thereby giving impetus to global competition in the accumulation of all forms of nuclear weapons and allocating unprecedented financial resources from nuclear and non-nuclear powers. It is shown that the most fierce competition in the nuclear arms race is developing in the triangle of relations and national interests between the US, Russia and China. On the same fact base, it is argued that China cannot be compared to the other two nations in the accumulated nuclear weapon arsenals, but that its technological positions and growing military potential lead to major changes in the bilateral concepts of international security and even to the termination of a number of Russian-American treaty agreements, above all in development of medium- and short-range ground-based missiles. There is also a gradual transition to a new deployment of forces and global strategies in the field of nuclear arms. World awareness of these changes is needed in a kind of the Swedish proposal on implementation of strategy for the “step-by-step” approach to nuclear disarmament. In general, challenges and threats should stimulate international dialogue in defense of the principle of peace-sharing in a global age
APA, Harvard, Vancouver, ISO, and other styles
11

Minami, Nathan A. "Employing Dynamic Models to Enhance Corporate IT Security Policy." International Journal of Agent Technologies and Systems 4, no. 2 (April 2012): 42–59. http://dx.doi.org/10.4018/jats.2012040103.

Full text
Abstract:
Since 9/11 and the creation of the U.S. Patriot Act, the intrusion of government surveillance into the lives of ordinary Americans has become a topic of great concern to many citizens. While many Americans view surveillance as a necessity in the name of national security, the government is not the only organization conducting surveillance. As technological capacity increases, an increasing number of employers are implementing technologies that allow them to maintain vigilance over the actions of their employees in the workplace. Despite many attempts to implement surveillance technologies, there is little evidence that companies are any safer now than they were ten years ago. This paper demonstrates how System Dynamics modeling can be utilized to help model the insider threat as a system. It provides analysis of the non-linear affect of decision making, assessing the 2nd, 3rd, and 4th order impacts of decisions, and demonstrates the important impact of delays in the system. A mathematical model is presented and simulations are conducted to determine the likely affect of company decisions and individual agent behavior.
APA, Harvard, Vancouver, ISO, and other styles
12

Changwei, Pang, Zhou Xiaojia, and Sun Lu. "US hegemony and Sino-Russia energy security cooperation." E3S Web of Conferences 77 (2019): 01002. http://dx.doi.org/10.1051/e3sconf/20197701002.

Full text
Abstract:
Why China and Russia give up previous suspicious attitudes toward each other, and going toward close cooperation on Energy security? We argue the threat of American hegemony push China and Russia together. Facing US sanction and strategic pressure, Russia changed its perception about China, and regarded China rise as opportunity. As a consequence, Russia strengthened its ties with China, and completed the oil pipe line which favored China. In addition to this, Russia permitted China Energy company access to its upstream and downstream Energy industry. With the rise of China, the structural conflict between China and US intensified. Trump administration explicitly described China as adversary. The fact that China’s energy transportation line is under the control of US Navy is a source of vulnerability. Out of consideration of reducing risk of cutting off energy supply, China developed a close cooperation with Russia on Energy safety.
APA, Harvard, Vancouver, ISO, and other styles
13

Valenti, Michael. "Double Wrapped." Mechanical Engineering 121, no. 01 (January 1, 1999): 52–56. http://dx.doi.org/10.1115/1.1999-jan-2.

Full text
Abstract:
This article discusses that a probabilistic study showed that the use of double-hulled shuttle tankers could reduce the probability of spillage resulting from collisions, contact with non-ship objects, and groundings by 75 percent. American petroleum companies are already using double-hulled tankers. The efficacy of double-hulled vessels in preventing environmental threats was borne out in October 1997 by Conoco Inc.’s tanker Guardian. Conoco, based in Houston, has operated a 100 percent double-hulled U.S. tanker fleet since August 1998. Indeed, the company decided to build only double-hulled tankers months before Congress passed OPA 1990. Two new craft will join Conoco’s flotilla of four twin-hulled vessels in 1999. Conoco engineers met a number of challenges when they embarked on building a double-hulled fleet. Double-hulled vessels are inherently more expensive than single-hulled vessels. Maritrans Operating Partners LP, a wholly owned subsidiary of Maritrans Inc. in Philadelphia, operator and owner of one of the nation’s largest fleets of oil tankers, tugboats, and oceangoing petroleum tank barges, found a way to reduce those costs, which may serve as a model for other shipping firms. The 65-year-old company converted a two-decade-old single-hulled tank barge into a double-hulled vessel.
APA, Harvard, Vancouver, ISO, and other styles
14

Mattingly, Cheryl. "Love’s Imperfection." Suomen Antropologi: Journal of the Finnish Anthropological Society 39, no. 1 (January 1, 2014): 53–67. http://dx.doi.org/10.30676/jfas.124708.

Full text
Abstract:
This paper concerns friendship as an aspect of family love and its fragilities. I explore love as an on-going ethical demand and problem in family life, one that can present continual obstacles to the ability to continue as a family. I also look at intra-family friendship as a means for addressing such threats. Drawing upon long-term fieldwork among African American families caring for children with chronic illnesses and disabilities (Mattingly 2010a), I explore a situation faced by one of these families when a household accident badly injures one of the children. Although I examine a family rupture, I part company with the widely held view in anthropology that the properly moral (or ethical) needs to be radically contrasted with the ordinary. Rather, I argue that the ordinary can provide resources for what Stanley Cavell calls ‘moral transcendence’. Keywords: ethics, anthropology of morality, Cavell, kinship, love, friendship,moral psychology
APA, Harvard, Vancouver, ISO, and other styles
15

Ma, Kuizi, and Ya Xiao. "Construction of Huawei’s Image in News Reports: Take China Daily and The New York Times for Example." International Journal of English Linguistics 10, no. 4 (April 11, 2020): 1. http://dx.doi.org/10.5539/ijel.v10n4p1.

Full text
Abstract:
In recent years, as China’s largest smartphone company, Huawei’s position in the international market has gradually increased and received widespread attention from foreign media. The rapid development of China’s impact on the hegemony of the US has also changed the direction of US media’s reporting on Chinese companies. At this stage, it is meaningful to study the image of Huawei in both Chinese and US media reports. Therefore, based on the corpus approach and critical discourse analysis, this paper builds two corpora of China Daily (576 reports with 438,261 words) and The New York Times (429 reports with 347,025 words). It is found that (1) both sides acknowledge that Huawei ranks top in world telecommunication technology, particularly in the 5G network; (2) two newspapers focus on different aspects in their reports. For the Chinese media, Huawei’s technological prowess, innovation capacity in the global market, cooperation with many other European and African countries are given more attention, while for the American media, more focus is shifted to Huawei’s threat to national security; (3) two newspapers hold different attitudes towards the rise of Huawei. China Daily’s positive construction of Huawei’s image is obvious. While for the American media, the Trump administration is more likely to project a threatening image of Huawei; (4) the reporting frameworks and the styles of materials selected differ in two newspapers. China Daily’s framework concentrates on “Huawei” itself, while The New York Times tends to construct a reporting framework from multiple perspectives from the third-party.
APA, Harvard, Vancouver, ISO, and other styles
16

Boamah, Mavis. "Analysing Crisis Communication Strategies of Airline Companies in United States: A Case Study of Southwest Airline 2016 Power Outage Crisis." Studies in Media and Communication 7, no. 1 (April 1, 2019): 7. http://dx.doi.org/10.11114/smc.v7i1.4190.

Full text
Abstract:
Companies are vulnerable to crisis. Crisis are a threat to organisational reputation and can harm stakeholders physically, emotionally and financially. One key technique to ensuring the happenings of crisis are minimised is communication. Communication plays the role of ensuring the reputation and credibility of a company is safeguarded. The modern way of communication and information sharing has been a vital part for businesses to survive. Emergency situations in airlines are inevitable and as such the company’s ability to communicate through its online sites is critical to averting and combating future crisis. As one of the famous airline companies in America, Southwest airline is present on all social media platforms to connect with its stakeholders. This was evident in its crisis management strategy during the 15-hour power outage in July 2016 which led to the cancellation of over 2.000 flights and delayed 250.000 travellers. The innovative communication strategies and tactics employed by southwest communications team reduced the level of damage the crisis could have caused. This paper analyses the airline’s communication strategies and tactics in the crisis and its impact on victims of the crisis.
APA, Harvard, Vancouver, ISO, and other styles
17

Goldrick-Rab, Sara, and David Labaree. "Policy Dialogue: The Problems and Promises of Higher Education in the United States." History of Education Quarterly 61, no. 3 (August 2021): 341–50. http://dx.doi.org/10.1017/heq.2021.27.

Full text
Abstract:
AbstractNearly 70 percent of American students enroll in postsecondary education immediately after graduating high school. Yet college and university completion rates remain highly disparate across social and economic groups. White students in the US are 20 percent more likely than Black and Latino students to graduate, and students from high-income backgrounds are roughly five times more likely to graduate than their lower-income peers. As a result, many students leave higher education without a degree, bearing debt that cannot be discharged through bankruptcy. The upshot is that much of the $1.7 trillion in student loan obligations today is held by those who cannot afford to repay it—an immediate crisis for millions of individuals and a looming threat to the US economy. How did we arrive at this juncture? And what should we do from here?For this Policy Dialogue, the HEQ editors asked Sara Goldrick-Rab and David Labaree to explore the past, present, and future of pressing issues facing American higher education. Goldrick-Rab is professor of sociology and medicine at Temple University as well as President and Founder of the Hope Center for College, Community, and Justice in Philadelphia. She is also the chief strategy officer for emergency aid at Edquity, a student financial success and emergency aid company, and founder of Believe in Students, a nonprofit distributing emergency aid. Labaree is a past president of the History of Education Society and the Lee L. Jacks Professor Emeritus at Stanford University. Their dialogue takes readers on a quick and heady jaunt across time, across the country, and across almost all institutional types in higher education.HEQ Policy Dialogues are, by design, intended to promote an informal, free exchange of ideas between scholars. At the end of the exchange, we offer a list of references for readers who wish to follow up on sources relevant to the discussion.
APA, Harvard, Vancouver, ISO, and other styles
18

Kinderman, Daniel. "Donald Trump, anti-establishment populism and the revolving door between business and politics in the United States." Zeitschrift für Unternehmensgeschichte 68, no. 2 (September 11, 2023): 289–314. http://dx.doi.org/10.1515/zug-2023-0015.

Full text
Abstract:
Abstract Revolving door dynamics are pervasive in the United States. There are vast literatures on the revolving door and on Donald Trump, but so far, no attempts to bring these literatures together. This paper represents a first attempt to do so and answer the following questions: Can Trump’s rise be understood as a culmination of revolving door dynamics, under which managers become politicians and politicians become lobbyists? What motivated Trump to revolve, and how has Trump’s presidency affected the revolving door? The paper places Trump into the context of the revolving door and compares him with previous presidents and presidential candidates. In recent decades, revolving door activity has increased. While this suggests that the revolving door paved the way for Trump, a close examination of the evidence reveals a more complex picture. Many American businesspeople have unsuccessfully run for president. Like the businessmen-turned-presidents who preceded him, Trump is a family businessman, not a manager or a CEO of a listed company. A multitude of additional factors contributed to Trump’s 2016 win including his status as a reality TV celebrity, his charisma, and his right-wing populism: Trump is from business but not from the business establishment. In addition, Trump revolved from business into politics, rather than from Capitol Hill to K Street. Candidate Trump railed against the revolving door and pledged to drain the swamp. President Trump swamped the drain and precipitated one of the most serious crises and threats to American democracy in the country’s history.
APA, Harvard, Vancouver, ISO, and other styles
19

Xu, Jie, and Yiye Wu. "Using Twitter in crisis management for organizations bearing different country-of-origin perceptions." Journal of Communication Management 19, no. 3 (August 3, 2015): 239–53. http://dx.doi.org/10.1108/jcom-06-2013-0050.

Full text
Abstract:
Purpose – The purpose of this paper is to investigate the effects of using Twitter on American stakeholders’ crisis appraisal for organizations originated from two foreign countries with distinctively different perceptions. Design/methodology/approach – This study uses a 2 (medium: Twitter vs news release)×2 (country-of-origin: China vs France) factorial experiment. The participants (n=393) are recruited through the Amazon Mechanical Turk system (Mturks). Findings – The findings suggest that using Twitter substantially mitigates participants’ negative evaluation of the organization undergoing a crisis. Country-of-origin affects how individuals perceive the organization after it has experienced a crisis. In addition, participants’ product involvement intensifies the reputational threat specifically for the organization with a less favorable country-of-origin perception. Originality/value – This study is one of the few empirically based studies in international public relations research, using an experiment to extrapolate the effects of social media and country-of-origin on consumers’ crisis appraisal. This investigation reinforces the need to consider social media not just at the individual level, but also as a form of communication that can have broader consequences at the organizational level. In addition, it is important for company leaders to understand that the organization’s home country image may exacerbate the negative management outcomes during a crisis. It is expected that this study yields theoretically indicative, empirically informative, and culturally relevant results.
APA, Harvard, Vancouver, ISO, and other styles
20

Mudzamiri, Justice, and Patrick Osode. "Reconciling the "Bittersweet Chemistry" between Technology and Corporate Takeovers through Reinforcing National Security Interests in Merger Control." Potchefstroom Electronic Law Journal 24 (August 23, 2021): 1–32. http://dx.doi.org/10.17159/1727-3781/2021/v24i0a10741.

Full text
Abstract:
This article argues that company takeover regulation regimes must carefully balance two opposing notions. On the one hand, the regime must be designed to enable or facilitate the initiation and successful implementation of takeovers and mergers in the interests of economic growth and technological advancement. On the other hand, such a regulatory framework ought to be sensitive to the ever-increasing need to protect national security interests, especially from veiled threats. These threats include cybercrimes, private data hacking and espionage, which are endemic to takeovers contemplated by foreign persons that possess technological sophistication and are leaders in the rapidly unfolding Fourth Industrial Revolution. Recently some jurisdictions, such as the United States of America and the United Kingdom, have been active in reforming their investment laws to particularly strengthen the protection of national security interests. Similarly, in South Africa the debut introduction of section 18A of the Competition Amendment Act 18 of 2018 has enabled the addition of a concurrent but parallel standard to the pre-existing merger control criteria prescribed under section 12A of the Competition Act 89 of 1998. This article evaluates the efficacy of South Africa's framework for national security interests' protection in the context of merger control using its US and UK counterparts as comparators. Ultimately, the article proposes reforming the existing statutory and institutional framework to effectively accommodate national security interests in South African merger control.
APA, Harvard, Vancouver, ISO, and other styles
21

Hall, Kristin. "Selling Sexual Certainty? Advertising Lysol as a Contraceptive in the United States and Canada, 1919–1939." Enterprise & Society 14, no. 1 (March 2013): 71–98. http://dx.doi.org/10.1093/es/khs041.

Full text
Abstract:
During the interwar period, Lysol Disinfectant was sold throughout Canada and the United States as a contraceptive douche for women. In fact, Lysol became the leading over-the-counter contraceptive sold on the euphemistically termed “feminine hygiene” market. Though the sale of contraceptives were illegal in both Canada and the United States since the latter part of the nineteenth century, by the 1920s, astute manufacturers were selling goods with supposedly contraceptive properties, including vaginal jellies, foaming tablets, and as was the case with Lysol, vaginal douches. As contemporaries argued, advertising played a central role in the success of the feminine hygiene industry. This article investigates Lysol's interwar advertising campaign to determine how the company attempted to communicate the purpose of its product to white, literate, married, Anglo-Saxon, middle-class female consumers while evading legal ramifications. It argues that North American Lysol advertisements were designed using euphemistic language and emergent modern advertising techniques that appealed to consumers' emotions (as opposed to their sense of reason as had previously been the case) to capitalize upon contextually specific trends, including women's fear of premature aging and loss of sexual attractiveness, the danger of maternal morbidity and mortality, as well as the threat of marital disunity, to convey the intended purpose of the product. This work also demonstrates the central importance of considering the historical context of companies' intended consumers when analyzing historical advertising and marketing campaigns.
APA, Harvard, Vancouver, ISO, and other styles
22

Geelen, Alexander, Bram van den Hout, Merve Tosun, Mike de Windt, and Matthias van Rossum. "On the Run: Runaway Slaves and Their Social Networks in Eighteenth-Century Cochin." Journal of Social History 54, no. 1 (2020): 66–87. http://dx.doi.org/10.1093/jsh/shaa007.

Full text
Abstract:
Abstract Despite growing attention to the history of slavery in the Indian Ocean and Indonesian Archipelago worlds, the debate on the nature or characteristics of slavery in these regions has been left largely unsettled. Whereas some scholars emphasize the existence of harsh forms of hereditary slavery similar to those found in the Americas, others argue that the nature of slavery in Asia was urban, status-based, and milder than in the Atlantic world. This article explores case studies of slaves escaping in and around the Dutch East India Company (VOC) city of Cochin. Studying court records that bring to light the strategies and social networks of enslaved runaways provides new insights into the characteristics of slavery and the conditions of slaves in and around VOC-Cochin. The findings indicate that the social and everyday conditions under which slaves lived were highly diverse and shaped by the direct relations between slave and master, influenced by elements of trust, skill, and control. Relations of slavery nevertheless remained engrained by the recurrence of physical punishments and verbal threats, despite sometimes relatively open situations. This reminds us that easy dichotomies of “benign,” “Asian,” “household,” or “urban” versus “European,” “Atlantic,” or “plantation” slavery obscure as much as they reveal.
APA, Harvard, Vancouver, ISO, and other styles
23

León, Federico R., and Fanny Barrantes. "Mining managers’ causal attributions of socio-environmental conflicts and intergroup perceptions." Interdisciplinaria Revista de Psicología y Ciencias Afines 38, no. 2 (January 19, 2021): 25–40. http://dx.doi.org/10.16888/interd.2021.38.2.2.

Full text
Abstract:
The unprecedented mining boom of the 1990s in Latin America may or may have not contributed to socioeconomic development in the region, but it has certainly been accompanied by increased socio-environmental conflicts. Economists and sociologists have developed taxonomies for such conflicts and have attempted to explain them based on theories of resource mobilization, rational options, social cohesion, and identity construction applied to settings of generally extreme poverty. This study developed and tested psychological hypotheses based on personal values, attribution theory, reputational concern of the firm, intergroup threat theory, and UV radiation theory entailing mining managers’ reactions to socio-environmental conflicts in Peru and effects of latitude and altitude. Forty-three Corporate Social Responsibility managers of the 49 mining corporations registered in the Society of Mining, Petroleum, and Energy of Peru filled-in a 20-minute questionnaire in the presence of one of the investigators at company offices (December 2017). 100 % of respondents were male, most of them middle-aged. A 3-factor structure of political, economic, and ecological concerns sustained the attributions of cause whereas mine’s surrounding populations were perceived as moral, incompetent, and positive; in balance, these perceptions represent favorable conditions for conflict resolution. However, contrary to expectations, firm’s experience of socio-environmental conflicts was not associated with these outcomes. Rather, geography emerged as a moderator of the relationship between the level of socio-environmental conflict experienced and managers’ perceptions of the surrounding populations. These results suggest that mining managers more affected by socio-environmental conflict strengthened racial stereotypes in response to the external challenge.
APA, Harvard, Vancouver, ISO, and other styles
24

Belkin, V. N., N. A. Belkina, and O. A. Antonova. "Opportunistic Behaviour of Employees: its Causes and Ways of Overcoming it." Zhurnal Economicheskoj Teorii 17, no. 4 (2020): 849–58. http://dx.doi.org/10.31063/2073-6517/2020.17-4.9.

Full text
Abstract:
The article shows that the root of opportunistic behavior of employees in Russia is alienation of labor as employees are excluded from participation in property and management relations. The main reasons behind opportunism among employees are the discrepancy between the economic interests of the owners of labor-power (workers) and the owners of the means of production (employers), information asymmetry, and the fact that slacking often goes unnoticed in enterprises. The study relies on the data collected by the authors in a number of enterprises. Thus, the analysis brings to light the main factors that determine the tendency of workers to slack off and the scale of this problem in Russian enterprises and leads the authors to propose their own definition of the term “opportunistic behavior of workers”. The article discusses opportunistic behavior of employers, which is also a widely spread phenomenon. Employers’ opportunism may occur both before and after the conclusion of the employment contract and stems from the employer’ s desire to reduce labour costs. To a great extent such behaviour is caused by employers’ dominant position in relation to the vast majority of workers. Under the threat of unemployment, most workers are forced to agree to the conditions dictated by employers. Thus, the authors also propose a definition of the term “opportunistic behavior of employers”. The collapse of the North American company ENRON is considered as a practical example of harmful socio-economic effects of employer opportunism. The authors’ findings concerning the reasons behind opportunistic behaviour at work are further used to suggest ways of overcoming this problem. Keywords: opportunism, opportunistic behavior of employees, opportunistic behavior of employers, alienation of labor, overcoming opportunism of employees, values of corporate culture, stages to overcome opportunistic behavior of employees, concept to overcome opportunistic behavior of employees in Russian enterprises.
APA, Harvard, Vancouver, ISO, and other styles
25

Patel, Sina, Karina Kasztelnik, and Maja Zelihic. "Global overview of modern financing typologies to mitigate financial risks in developed countries." SocioEconomic Challenges 7, no. 2 (2023): 54–66. http://dx.doi.org/10.21272/sec.7(2).54-66.2023.

Full text
Abstract:
In this study, we reviewed the laws and legal regulations that mandate banks and financial services organizations to implement anti-money laundering efforts which are responsible to detect and mitigate the risks of money laundering and modern financing. We examined the topics of money laundering and modern financing in greater depth to understand the risk factors related to each financial crime. Understanding the aspects of each financial crime is necessary to comprehend predicate offense typologies. We continued with a review and synthesis of the literature on money laundering and modern financing typologies. We concluded the review with an analysis of Gary Becker’s economic theory of criminal behavior and the neoclassical approach to criminal behavior. As suggested by the key concepts reviewed in this literature review, predicate offenses are evolving as prevailing conditions of society change. A major global challenge in recent times is the Covid-19 pandemic crisis which has increased financial risks worldwide (Klimczak et al., 2021). Understanding the different types of predicate offenses and typologies portrays a holistic process of how criminals launder money or finance modern acts. A review of the existing literature demonstrated intensive research on the topic of financial crime but there is a gap in the current legislative and financial risk management framework. The legislative and financial risk management framework detects economic uncertainties and risk factors requiring a reevaluation of financial risk measurement methodologies to mitigate the risk consequences of money laundering and modern financing activities. A best practice to provide a sound framework to manage financial risks is for U.S. banking and financial service company compliance managers to identify predicate offense typologies. American society could benefit from the results of the study (Klimczak et al., 2021). The banking and financial industries ought to be prepared for the future and continue to adapt to new emerging threats, varying consumer classification, and changing environment. It is essential for compliance leaders to implement public education initiatives and help their customers recognize their role in combating money laundering and modern financing activities. Overall, the study has contributed to positive social change by identifying predicate offense typologies that can help U.S. banking and financial services company compliance managers reduce the risks of money laundering and modern financing activities (Klimczak et al., 2021).
APA, Harvard, Vancouver, ISO, and other styles
26

Shuangshuang, Li. "Developing measures to improve the performance of transnational corporations in the context of a pandemic." Transbaikal State University Journal 26, no. 8 (2020): 122–28. http://dx.doi.org/10.21209/2227-9245-2020-26-8-122-128.

Full text
Abstract:
This article presents the conditions of transnational corporations’ activity in the period of aggravated situation associated with coronavirus infection. The activities of large multinational companies in such industries as digital electronics (“Apple”, “Intel”, “Qualcomm”), automotive (“General Motors”, “Ford”, “Toyota”), air transportation (“American Airlines”, “Delta Air Lines”, “United Airlines”, “Lufthansa” and “British Airways”) are revealed. A list of measures that contribute to a painless way out of the crisis for multinational companies is presented. It is proposed to create agencies based on a multinational company to make decisions in emergency situations, which should contribute to earlier detection of threats and quickly make the right management decisions. The role of potential risk assessment and implementation of emergency response mechanisms is described. There is a need to create a positive and active mechanism for exchanging information for employees, customers and suppliers, as well as the formation of standard communication documents. The importance of maintaining the physical and psychological health of employees and the need to analyze the nature of jobs for the adoption of appropriate recovery plans is determined. The article presents the importance for multinational companies in establishing plans to respond to supply chain risks. This will make it possible to manage inventory more effectively in the short term in the context of reduced consumption. It is proposed to pay special attention to solutions for identifying risks related to productivity and maintaining customer relationships caused by the inability to resume production in the short term. It is stated that multinational companies should create or modernize mechanisms for systematic risk management and control, identify the main risks in advance and develop plans to respond to them
APA, Harvard, Vancouver, ISO, and other styles
27

Kandyral, O. "ECONOMIC ANALYSIS AS A METHOD FOR DETERMINING THE EFFECTIVE FINANCIAL SITUATION OF THE ENTERPRISE." Criminalistics and Forensics, no. 64 (May 7, 2019): 763–71. http://dx.doi.org/10.33994/kndise.2019.64.71.

Full text
Abstract:
The article analyzes the issues and problems of conducting an economic analysis in order to determine the actual financial condition of enterprises and prevent the possibility of bankruptcy. An assessment of the importance of timely diagnosis of the actual financial condition of an enterprise and of an economic analysis of the financial prerequisites of a possible bankruptcy of an enterprise under current market conditions is made. Also the concept of “bankruptcy” and “insolvency” of the enterprise in accordance with the current legislation of Ukraine are described. As world practice shows, bankruptcy of an enterprise is not an accidental phenomenon, but a consistent pattern which can be detected and eliminated in a timely manner. The most common methodological approach to diagnosing the state and the threat of bankruptcy is the coefficient approach which involves the use of a list of special financial ratios-indicators of an enterprise — relative indicators calculated by comparing certain absolute measures of economic activity with one another. The author reviewed the classical models of economic express analysis of the financial condition of the company to identify possible bankruptcy, developed by American scientists, economists William Beaver and Edward Altman. Depending on the values of indicators of these models, an assessment was made of the degree of proximity of a business entity to bankruptcy. Advantages and disadvantages of using these models in practice in the conditions of a modern market economy taking into account the specifics of the financial situation in Ukraine are described and analyzed. According to the results of the study, a list of measures for the exit of enterprises that are at risk of possible bankruptcy from the current unfavorable situations has been proposed. The author also concluded that further scientific developments on this topic are necessary and will be of interest both among scientists and among the participants of financial and economic relations. Key words: economic analysis, test method, enterprise, financial condition
APA, Harvard, Vancouver, ISO, and other styles
28

Parkhitko, Oleg, and Vladyslav Danylov. "PECULIARITIES OF COVERAGE OF THE PALESTINIAN-ISRAELI CONFLICT IN THE WORLD MEDIA." Bulletin of Lviv Polytechnic National University: journalism 1, no. 7 (2024): 35–43. http://dx.doi.org/10.23939/sjs2024.01.035.

Full text
Abstract:
The article attempts to identify the peculiarities of the coverage of the Palestinian-Israeli conflict in the world media. The research was based on publications from the websites of three media outlets - «The Washington Post», «The Guardian» and «Al Jazeera». The author talks about the difficulties that journalists may face when covering armed conflicts. Firstly, it is the threats to the physical and mental health of the journalist. Secondly, it is the difficulty of abstracting from one's own preferences in the conflict. Thirdly, it is difficulty in determining the status of the parties to the conflict. The author notes that in the Palestinian-Israeli conflict there are difficulties in determining the status of Hamas, since not all countries in the world consider the group to be terrorists. The article examines the views on the conflict of two high-quality private newspapers - «The Washington Post» and «The Guardian». The intrigue of the position of quality publications is that they are located in the United States and Europe, i.e., they should hypothetically support Israel against the collective Arab world. In fact, both media outlets have maintained a high level of quality and have covered the conflict in a balanced manner. Moreover, the newspapers' coverage is somewhat critical of the Jewish state. While «The Washington Post's» criticism is more of a guess, the Guardian's journalists express it quite frankly and emotionally. When expressing its attitude, an American newspaper must take into account the views of the powerful Jewish diaspora in the United States. As for the Guardian, the newspaper criticizes Israel from the liberal anti-war position of the British and European elite. The state-owned Qatari television company Al Jazeera has long been criticized for its bias and rather open communication with individuals whose activities are considered terrorist by some parts of the world. The intrigue with the Qatari media's coverage of the conflict is whether they will at least try to pretend to be objective to a global audience. In practice, the Arab media's website is falling into outright anti-Israeli and anti-American propaganda. It uses a selection of «correct» sources of information, mockery and manipulation of facts. The author of the article assumes that media workers are well aware of their target audience, which is quite effectively influenced by such publications.
APA, Harvard, Vancouver, ISO, and other styles
29

Douglas, Megan, Sarah Holtzen, Sinéad G. Ruane, Kim Sherman, and Aimee Williamson. "Abrupt policy reversal amid Black Lives Matter: Starbucks’ grande employee dress code problem." CASE Journal 17, no. 5 (November 25, 2021): 673–90. http://dx.doi.org/10.1108/tcj-02-2021-0030.

Full text
Abstract:
Theoretical basis Organizational Justice Theory serves as a useful frame for discussion of this case, focusing on perceptions of fairness in the workplace. Such perceptions are shaped by outcomes, procedures, information and interpersonal treatment. Perceptions of justice in these four dimensions are associated with job performance, citizenship behaviors and some mental health outcomes. The Exit, Voice, Loyalty, Neglect (EVLN) Model outlines four potential responses (exit, voice, loyalty and neglect) to perceived job dissatisfaction, serving as a useful framework for students to discuss potential employee reactions to Starbucks’ decisions. Research methodology This case was developed from secondary sources, including news reports, company annual reports and websites. The case has been classroom tested with undergraduate students in Principles of Management (online and face-to-face) Human Resource Management (online asynchronous) and Labor/Management Relations (online synchronous). Case overview/synopsis In June 2020, Starbucks became immersed in controversy when its dress code policy conflicted with its public support for national protests over police brutality against Black Americans, including the death of George Floyd while in police custody. While publicly supporting the protests in a series of tweets, an internal memo forbidding employees from wearing Black Lives Matter attire was leaked to the press, generating national outcry, threats of a boycott and forcing Starbucks to reverse course immediately. This case examines the benefits and challenges of a corporate dress/uniform policy, and the implications of corporate involvement in social justice issues. Complexity academic level This case can be used in a wide range of undergraduate and graduate courses, but particularly in Principles of Management and Human Resources courses.
APA, Harvard, Vancouver, ISO, and other styles
30

Márquez Roa, Ubaldo. "ACERCAMIENTO AL TERRORISMO (AN APPROACH TO TERRORISM)." Universos Jurídicos, no. 18 (June 8, 2022): 75–140. http://dx.doi.org/10.25009/uj.vi18.2626.

Full text
Abstract:
Resumen: El presente artículo se encuentra dividido en cinco apartados que permiten que su lectura y comprensión sea mucho más amigable. Es interesante y entender que el tema del terrorismo es un tema de naturaleza dinámica y cambiante, en el artículo se estudiara los diferentes tipos de terrorismo que existe y el impacto que ha tenido en el establecimiento de los estados de seguridad pública, así como la afectación a los derechos humanos de las personas y los regímenes jurídicos en los cuales se tipifica esta figura. Abstract: This article is divides into five sections that allow its reading and understanding to be much more user-friendly. It is interesting to understand that the issue of terrorism is a dynamic and changing issue, the article will study the different types of terrorism that exist and the impact it has had on the establishment of states of publica security as well as the impact to the human rights of persons and the legal regimes in which this figure is typified. Fuentes de consulta: Arendt H. (2006) Sobre la revolución, Madrid: Alianza. Báez Corona, J. F. (2015). El realismo mágico jurídico (recreación legal de una ficción literaria con especial referencia a Latinoamérica). Justicia. (28), 15-31. doi:http://dx.doi.org/10.17081/just.20.28.1032 Báez, J. (2021). Tradición contra innovación en los modelos de formación jurídica universitaria en México. Revista de Derecho. (56). 137-153. https://dx.doi.org/10.14482/dere.56.340 Bakke E. (2015) Terrorism and Conterterrorism studies, comparing theory and practice, Netherlands, Leiden University Press. Bobbio N. (2004) Estado, Gobierno y Sociedad por una teoría general de la política, México, Fondo de Cultura Económica. Caillois R. (1973) La cuesta de la guerra (trad.) Rufina Bórquez, México, Fondo de Cultura Económica. Coteño Muñoz A. (2018) “Terrorismo individual los atentados perpetrados por actores solitarios” Eunomía. Revista en Cultura de la Legalidad, número 15 Madrid, Universidad Carlos III. Donner, F. (2007) “Fight for God- But Do So with Kindness: Reflections on War, Peace, and Communal Identity in Early Islam”. In War and Peace in the Ancient World, Oxford. Blackwell. Durham M. (2000) The Christian right, the far right and the Boundaries of American Conservatism. Manchester: Manchester University Press. Dworkin R, (2013) “Foreword”, in Extreme Speech and Democracy, Oxford, Oxford University Press. Essig, C. (2001). Terrorism: Criminal Act of Act of War? Implications for National Security in the 21st Century. Pennsylvania: US Army War College. Foucault, M. (2009) Historia de la sexualidad 1. La voluntad de saber, México, Siglo XXI. Friedman B, H., Harper J, Preble C. (2010) Terrorizing ourselves. Why U.S. Counterterrorism Policy is Failing and How to Fix It. Washington D.C. Instituto Cato. Gallego, C. (2012). El concepto de seguridad jurídica en el Estado social. Revistas jurídicas. Vol 2, Núm 9, Recuperado de http://juridicas.ucaldas.edu.co/downloads/Juridicas9(2)_6.pdf Griset, P. L., Mahan, S. (2003) Terrorism in perspective, United States of America. Sage Publications Inc. González Calleja, E. (2013). El Laboratorio del Miedo, Madrid, Crítica. Habermas J. (1998) Derechos humanos y soberanía popular. Las versiones liberal y republicana, en Rafael del Águila, Fernando Val, Madrid, Alianza Habermas J. (1994) La desobediencia civil, piedra de toque del Estado democrático de Derecho, en Ensayos políticos, Barcelona, Península. Heydar S. (2017) Islamic Peace Ethics. Legitimate and Illegitimate Violence in Contemporary Islamic Thought. United States of America, Baden-Baden: NomosAschendorff Verlag. Hoffman B., Howard R. (2011) Terrorism and counterterrorism: Understandin the new security environment readings and interpretations: 4a eth, United States of America, Mcgraw-Hill. Hoffman, B. (2006). Inside Terrorism. New York: Columbia University Press. Jackson, R, et al., (2011) Terrorism. A Critical Introduction, New York, Palgrave Macmillian Jassies N. (2009) Mrinus Van Der Lubbe y el incendio del Reichstag. Trad., García Velasco C., España, Editorial Alikornio. Jellinek G (1954) Teoría Geenral de los Estados. Trad. Fernando de los Ríos. Buenos Aires, ed. Albatroz. Jenkins, B.M. (1975), "International Terrorism: A New Mode of Conflict", in Garitón D, y Schaerf C. Internactional Terrorism and World Security, Londres, Cromm Helm. Johnston, T. D. (1981). Selective costs and benefits in the evolution of learning. En J. S. Rosenblatt, R .A. Hinde, C. Beer y M. C. Busnel (Eds.). Advances of the study of behavior. New York: Academic Press Kilpatrick J (2020) Quand un état d’urgence temporarire devient permanent, le cas de la France. París, Transnational Institute. Khadduri, M. (1955) War and Peace in the Law of Islam. Baltimore, The Johns Hopkins Press. Kyrou, A. (2012). L’imaginaire des Anonymous, des luddites à V pour Vendetta. París Folis esssays Lasoen, K. (2018). “War of Nerves: The Domestic Terror Threat and the Belgian Army”. In Studies in Conflict & Terrorism, vol. 42, no. 11. Le Goff J. (1984) La Civilisation d l’occident médiéval, París, Foils Essay. Lillich, B. R. (1985) Paris Minimum Standards of Human Rights Norms in a State of Emergency, The American Journal of International Law, Vol. 79, No. 4 Locke J. (1997), Segundo tratado sobre el gobierno civil, Madrid, Alianza. Loubet Del Bayle, J. L. (1992) La Police. Approche socio-politique. Paris, Montchrestien. Luhmann, N. (2005) El derecho de la sociedad, 2a ed., México, Herder, Universidad Iberoamericana. Majoran, A. (2015). The illusion of war: Is terrorism a criminal act or an act of war? International Politics Reviews, Vol.3 Issue 1 Martin J-C, (2006) Les règles internationales relatives à la lutte contre le terrorismo. París, edición Bruylant. Nateras González M, E. (2018) Colombia Las autodefensas en Michoacán, México: ¿rescate de la ciudadanía ante la violencia? Revista Opinión Jurídica, Universidad de Medellín, Vol. 17, Núm. 33 Placido A. P., y Perkins L K. (2010) Drug Trafficking violence in México implications for the United States. Washington D.C. U.S. Senate Caucus on International Narcotics Control Departmente of Justice Poczynok, I. (2019). Fuerzas armadas y contraterrorismo. Apuntes para renovar un “debate crónico” en la Argentina. Revista Relaciones Internacionales, Estrategia Y Seguridad, vol. 2, Núm. 14 Poland J. (2004) Understanding Terrorism: Groups, Strategies and responses. New York. Pretince Hall. Rawls J (1999) La justificación de la desobediencia civil, en Justicia como equidad. Materiales para una teoría de la justicia, Madrid, Tecnos. Reinares, F y García-Calvo, C. (2016) Estado Islámico en España. Madrid: Real Instituto Elcano. Rivas, P., y Rey, P. (2008) Las autodefensas y el paramilitarismo en Colombia (1964-2003), Bogotá, CON Fines. Rapoport, D. (2004). “The four waves of modern terrorism”. En Audrey, C. y James, L. Attacking Terrorism: Elements of a Grand Strategy. Washington D.C. George town University Press Rodley N. (1985) International Human Rights Law, dans Evans, M. D, International Law, Oxford, Oxford University Press. Reitberger M (2013) “License to kill: is legitimate authority a requirement for just war? in International Theory, Cambridge, Cambridge University Press, Vol. 5, Issue 1. Robespierre Maximilien (2005) Por la felicidad y por la libertad, discursos. España, El viejo topo. Rousseau J. J., (2013) Discurso sobre el origen y fundamento de la desigualdad entre los hombres, Madrid, Calpe. Tinnes J. (2020) Bibliography: Defining and Conceptualizing Terrorism Compiled PERSPECTIVES ON TERRORISM Volume 14, Issue 6, The Netherlands Universiteit Leiden. recuperado de https://www.universiteitleiden.nl/perspectives-on-terrorism/archives/2020#volume-xiv-issue-6 Toboso Buezo M. (2020) Colección Segmentos de Seguridad Terrorismo y antiterrorismo. España. Institut de Seguretat Pública de Catalunya.. Saint Thomas Aquinas (2003) On law, morality and Politics, translated by Regan Richard United States of America, Hackett publishing company. Sinai, J. (2008) “How to Define Terrorism”, Perspectives on Terrorism, Journal of the Terrorism Research Initiative and the Center for Terrorism and Security Studies, The Netherlands, Universiteit Leiden, Vol. 2, No.4, recuperado de http://www.terrorismanalysts.com/pt/index.php/pot/article/view/33/html Skinner, B. F. (1953) Science and human behavior. New York, The Macmillan Company. United States Department of State. (2004) Patterns of Global Terrorism 2003 Washington, DC: Office of the Secretary of State, Office of the Coordinator for Counterterrorism. Valadés D. (1974) La dictadura constitucional en América Latina, México, UNAM. Walther T C., Höhn A., (2020) El ejército alemán y sus graves problemas con la ultraderecha. DW noticiero recuperado de https://www.dw.com/es/el-ej%C3%A9rcito-alem%C3%A1n-y-sus-graves-problemas-con-la-ultraderecha/a-54044495 Wallace, D. (2008). Combatiendo el terrorismo bajo las leyes de la guerra. Military Review Hispan-American, Vol. 88, Issue 2 Weber M. (1986) El político y el científico. (trad) Francisco Rubio Llorente, Madrid, Alianza Editorial.
APA, Harvard, Vancouver, ISO, and other styles
31

Aviles Conesa, Ángel David, and Mauricio Genet Guzmán Chávez. "Más de un Wirikuta pero menos de dos: Geopolítica versus cosmopolítica como estrategia de resistencia." Revista Murciana de Antropología, no. 29 (December 20, 2022): 47–68. http://dx.doi.org/10.6018/rmu.521511.

Full text
Abstract:
We propose a look at the socio-environmental conflict in the Sacred Natural Site of Wirikuta (SSNW), in the semi-arid zone of northern Mexico, caused by the mining exploitation project carried out by the Canadian company First Majestic Silver Corp. El Frente of Defense of Wirikuta (FDW), a social movement against this project, obtained the precautionary suspension of the mining concessions. This movement and the resistance it produced became a particularly symbolic and significant emblem of social resistance in Mexico and Latin America. The analysis we propose pays attention to the changes promoted in the general context of neoliberal policies that have given way to flexible national legislation on investment and looting of natural resources that has an effect that transforms the territories. This transformation will allow certain uses of the resources and sanction others depending on the actors who implant the meanings in the territories. The premise that weaves the discussion and leads us to an appreciation of what has been learned in this case refers to the importance of the sacred as a discursive and practical element for the defense of the territory. To delimit the proposed theme, we will carry out a deductive tour of the transformation processes of the territory, beginning extensively in Latin America, Mexico and finally to the specific threat in Wirikuta as contexts of relational action. En este artículo proponemos una mirada del conflicto socioambiental en el Sitio Sagrado Natural de Wirikuta (SSNW), en la zona semiárida del norte de México, originado por el proyecto de explotación minera que llevaría a cabo la empresa canadiense First Majestic Silver Corp. El Frente de Defensa de Wirikuta (FDW), movimiento social en contra de este proyecto, logró la suspensión cautelar de las concesiones mineras. Este movimiento y las resistencias que produjeron se constituyó como un emblema especialmente simbólico y significativo de las resistencias sociales en México y en América Latina. El análisis que proponemos presta atención a los cambios promovidos en el contexto general de las políticas neoliberales que han dado paso a legislaciones nacionales flexibles en materia de inversión y saqueo de los recursos naturales que tiene un efecto que transforma los territorios. Esta transformación va a permitir determinados usos de los recursos y a sancionar otros en función de los actores que implanten los significados a los territorios. La premisa que urde la discusión y nos conduce a una apreciación de lo aprendido en este caso remite a la importancia de lo sagrado como elemento discursivo y práctico para defensa del territorio. Para acotar la temática propuesta realizaremos un recorrido deductivo de los procesos de transformación del territorio comenzando de modo extensivo en América Latina, México y finalmente a la amenaza concreta en Wirikuta como contextos de acción relacionales.
APA, Harvard, Vancouver, ISO, and other styles
32

Leroy, I., and I. Zolotaryova. "Critical infrastructure defense: perspectives from the EU and USA cyber experts." Naukovyi Visnyk Natsionalnoho Hirnychoho Universytetu, no. 5 (October 30, 2023): 165–70. http://dx.doi.org/10.33271/nvngu/2023-5/165.

Full text
Abstract:
Purpose. To examine the components of cyber autonomy according to the insights of seasoned professionals from the European Union (EU) and the United States of America (USA). The value of each element will be calculated by obtaining data from structured in-depth interviews. Methodology. Through an investigation of different aspects of the research, we used the Delphi technique and research interviews include the option of the Interviewee Transcript Review (ITR). The Delphi method is processed in several rounds, usually three, with two rounds being considered as a minimum and in that respect the Delphi method helps our study explore, predict and identify the nature and fundamental elements of Cyber Autonomy. Findings. The study findings demonstrate that elements such as “Policies”, “Reputation management”, and “Infrastructure and Architecture” hold substantial importance within Cyber Autonomy. These elements are considered critical for future perspectives. The research highlights the role of Cyber Autonomy in streamlining cybersecurity approaches, mitigating the impact of cyber-attacks, and safeguarding possible reputation damage. The study also highlights the importance of well-defined implementation methods and the organizational structure in successfully deploying Cyber Autonomy. Originality. The research demonstrates the interdisciplinary nature of cybersecurity and applies a comprehensive approach covering information security, information security policy, technical and economic aspects, noting the important role of governance in the company share value recovery process. Cyber Autonomy could offer a concept of defense reputation that helps to identify potential cyber threats that are further intensified in connection with the development of various platforms for remote control of artificial intelligence, distance learning, and opportunities for autonomous operation of enterprise systems, the influence of multinational companies on financial markets, and automated decision-making systems. Practical value. Experts’ insights are analyzed that can help to provide practical solutions for the Cyber Autonomy and risk management methods for implementing cyber resilience strategy for critical infrastructure. The research provides adjustments to existing cybersecurity frameworks and directives which consider new cyber elements of information security realities. The current study can be used as a guide to confidence-building measures for possible reputation and financial loss, reinforces protection actions against disinformation or negative cyber impact.
APA, Harvard, Vancouver, ISO, and other styles
33

Szymański, Piotr. "Polityka obronna Litwy w latach 2014-2018." Gdańskie Studia Międzynarodowe 16, no. 1-2 (November 30, 2018): 65–89. http://dx.doi.org/10.5604/01.3001.0012.7625.

Full text
Abstract:
The annexation of Crimea in 2014 marks the turning point in Lithuania’s defence policy. Previously, Lithuanian armed forces developed expeditionary capabilities in line with NATO’s out-of-area requirements and had to face substantial manning and equipment shortages as a result of the financial crisis. After 2014 clarion call, Lithuania responded with the most comprehensive measures of all the Eastern Flank states to strengthen its military capabilities. Lithuania’s main strategic concerns encompass both the Russian A2/AD bubble in Kaliningrad as well as the development of Russian offensive capabilities in the Baltic Sea region. The Lithuanian strive for security included a big hike in defence spending and a gradual increase in military personnel, with the reinstatement of conscription, faster modernisation of armed forces, development of military infrastructures, investments in combat readiness and an update of military exercises. This was supplemented by the strengthening of defence co-operation with key partners – both bilaterally and within the NATO framework. Lithuania’s main goal was to convince Allies to establish permanent military presence on its territory in order to strengthen deterrence against Russia. Between the NATO Wales Summit in 2014 and the Warsaw Summit in 2016, Lithuania was focused mainly on a closer military collaboration with the US – a country which then took a leading role in the military reassurance of the Eastern Flank. In Lithuania, the US has traditionally been perceived as the main security provider. The Warsaw Summit constituted a milestone in bolstering the Allied defence posture vis-à-vis Russia, which influenced Lithuania’s defence policy. American rotational company-size units in the Baltic states were subsequently replaced by NATO’s Enhanced Forward Presence, i.e. the deployment of German-led battalion-size battlegroup in Lithuania. Therefore, between 2016 and 2018 Lithuania tried to augment its strong defence ties with US while deepening military integration with Germany. The most significant sign of a closer military co-operation with Germany was the procurement of 88 Boxer infantry fighting vehicles. Recently, Germany has become the biggest supplier of military equipment to the Lithuanian army. Although Lithuania prefers to develop military co-operation primarily with US and Germany, Poland remains its important orientation point (mainly due to a similar threat perception and Poland’s geographic location). The core dimensions of the Polish-Lithuanian defence collaboration are the strengthening of air defence, including Grom systems deliveries, training of special forces and development of the trilateral brigade (LITPOLUKRBRIG) together with Ukraine. In the coming years, the ongoing depopulation will remain the biggest internal challenge for the Lithuanian defence policy. Emigration and an ageing society result not only in a decreasing number of citizens reaching the enlistment age, but may also adversely affect the economic situation and - as a consequence - defence expenditure.
APA, Harvard, Vancouver, ISO, and other styles
34

Boyar, Lee B., and Paquita Davis-Friday. "Assessing a golden opportunity: CEO performance at McDonald’s." CASE Journal 15, no. 5 (March 30, 2019): 397–415. http://dx.doi.org/10.1108/tcj-12-2017-0118.

Full text
Abstract:
Theoretical basis Financial accounting to assess stewardship: the case requires students to evaluate Thompson’s stewardship of McDonald’s, in part based on the company’s financial accounting information. Financial reporting performs an important societal role by helping control agency problems that arise from the separation of ownership and management. Since external stakeholders cannot “observe directly the extent and quality of managerial effort on their behalf […] the manager may be tempted to shirk […] blaming any deterioration of firm performance on factors beyond his/her control” (Scott, 2014, p. 23). However, although financial reporting helps hold managers accountable to shareholders, accounting information is not fully informative about managerial effort. For example, while net income provides useful information regarding the CEO’s stewardship, it is also “noisy,” due to recognition lags and other factors (Scott, 2014, p. 364). Efforts undertaken by Thompson in a particular period, such as marketing expenditures, might reduce current earnings, yet boost future profitability. Additionally, Thompson’s predecessor’s past efforts might have positive or negative effects on current earnings. Evaluating stewardship effectively involves considerable judgment, in addition to knowledge of financial accounting. The implication of poor firm performance is that the CEO is ineffective at formulating and implementing strategies and policies to enhance firm value (Dikolli et al., 2014). Specifically, it appears that missing earnings benchmarks matter more for relatively inexperienced CEOs. Don Thompson’s tenure of 33 months at McDonalds is 42 percent lower than median CEO tenure documented in academic research, where the median tenure of chief executives documented in large sample empirical studies is about 57 months (Dikolli et al., 2014). The evidence suggests that the longer a CEO serves, the less likely he is to be dismissed for performance-related reasons. This appears to be the result of the resolution of uncertainty about CEO’s ability and leads to subsequent declines in the level of monitoring by the Board of Directors. Performance evaluation and bias: a significant body of research explores the extent to which female managers are assessed differently than their male counterparts (Powell and Butterfield, 2002). For example, female CEOs face more threats from activist investors than male CEOs. Therefore, even after women achieve the highest managerial rank, they experience more professional challenges than their male counterparts (Gupta et al., 2018). However, the question of whether black CEOs are assessed differently is more challenging to answer empirically as a result of a smaller sample size (only one percent of S&P 500 companies are run by black CEOs). Our case attempts to develop the inference that if female CEOs are subject to bias, analogous forces are likely at work when black CEOs are assessed. Recent evidence further suggests that business students sometimes demonstrate bias in making assessments (Mengel et al., 2018). The authors discuss these findings – as well as strategies for including them in the case discussion – in the “Teaching Strategy” section herein below. Research methodology The case was written from the public record surrounding the appointment of Don Thompson and McDonald’s company filings. The record includes articles from The New York Times and The Wall Street Journal, as well as local and industry publications. Case overview/synopsis The case examines the role of financial accounting in evaluating CEO performance in the context of the appointment of McDonald’s first African-American chief executive and his subsequent two-and-a-half years on the job. The case deepens students’ understanding of the link between financial reporting and stewardship, while highlighting the subjectivity inherent in assessing managerial performance, particularly over relatively short time periods. As students analyze the case, they must consider the extent to which a firm’s results are attributable to luck vs skill. We use “skill” to refer to CEO effort and other controllable factors, while “luck” refers to exogenous factors, such as macroeconomic conditions. Assessing stewardship is of practical significance. It allows pay to be better aligned with performance and empowers stakeholders to identify when a change of leadership may be warranted. The case may also be used to spur reflection, in an applied context, on the importance of being alert to unconscious bias, even when evaluating seemingly objective financial reporting data. Recent research, discussed herein, suggests that business students sometimes exhibit bias when making assessments. Complexity academic level The case should be included in discussions of corporate governance, executive compensation and the role of accounting information in efficient contracting. It is appropriate in intermediate financial accounting courses for undergraduates, introductory graduate accounting courses, or other courses with an element of financial statement analysis. Standard introductory accounting textbooks offer helpful supplementary reading for students. Horngren et al.’s (2014) book, Introduction to Financial Accounting (12th ed.), Pearson, London, provides an overview of the income statement and its role in assessing performance (see Chapter 2) as well as a useful discussion on evaluating the components and trends of a business (see Chapter 12). More advanced students may benefit from the in-depth discussion of earnings quality, operating income and non-operating income found in Chapter 4 of Intermediate Accounting (9th ed.), McGraw Hill Education, New York by Spiceland et al. (2018).
APA, Harvard, Vancouver, ISO, and other styles
35

Mack, Andrew R., Christopher Bethel, Steven Marshall, Robin Patel, Robin Patel, David van Duin, Vance G. Fowler, et al. "1055. ARGONAUT-IV: Susceptibility of Carbapenem-resistant Klebsiellae to Ceftibuten/VNRX-5236." Open Forum Infectious Diseases 8, Supplement_1 (November 1, 2021): S619—S620. http://dx.doi.org/10.1093/ofid/ofab466.1249.

Full text
Abstract:
Abstract Background Carbapenem resistance in Klebsiellae spp. arises through mutational and acquired mechanisms and is considered an “urgent threat” by the CDC. VNRX-5236 is a bicyclic boronate β-lactamase inhibitor (BLI) that combines oral bioavailability (via etzadroxil prodrug VNRX-7145; Figure 1) and activity against all three Ambler classes of serine β-lactamases. VNRX-7145 is currently in development with the oral cephalosporin, ceftibuten (CTB) (Figure 1). Figure 1. Structures of VNRX-7145, VNRX-5236, and ceftibuten. The β-lactamase inhibitors are in red and the β-lactam antibiotic is in black. Methods The activity of CTB/VNRX-5236 against 200 carbapenem-resistant Klebsiellae from the Consortium on Resistance against Carbapenems in Klebsiella (CRACKLE) was assessed in this study. Among these, 193 expressed class A KPC enzymes, one expressed a class B NDM enzyme, and six expressed a class D OXA-48 or variant enzyme. Minimum inhibitory concentrations (MIC) were determined by broth microdilution (CLSI M07 Ed. 11) using the ThermoFisher Sensititre system with custom assay panels. MICs were interpreted using CLSI M100 Ed. 30, except the EUCAST breakpoint for CTB (S≤1 µg/mL) was used for CTB and was applied for comparative purposes to CTB/VNRX-5236 MICs where VNRX-5236 was fixed at 4 µg/mL. American Type Culture Collection strains were used for quality control. Results 92.5% of stains studied in this CRACKLE collection were provisionally susceptible to CTB/VNRX-5236. In comparison, strains were 95.5% and 98% susceptible to meropenem-vaborbactam (MVB) and ceftazidime-avibactam (CZA), respectively. MIC50s were in the susceptible range for CZA, MVB, and CTB/VNRX-5236; and resistant for CTB, ceftazidime (CAZ) and meropenem (MEM). MIC90s were in the susceptible range for CZA, MVB, and CTB/VNRX-5236 and resistant range for CAZ, MEM, and CTB (Table 1). One of four CZA-resistant and three of nine MVB non-susceptible strains were provisionally susceptible to CTB/VNRX-5236. MIC50 and MIC90 values (µg/mL) and percent susceptibility for Klebsiella pneumoniae strains (n=200). AMK, amikacin; CST, colistin; CAZ, ceftazidime; CZA, ceftazidime-avibactam; FEP, cefepime; MEM, meropenem; MVB, meropenem-vaborbactam; CTB, ceftibuten; TGC, tigecycline. * The breakpoint for CST is intermediate, as no susceptible breakpoint is available. ** The CTB breakpoint is valid only for urinary tract isolates. *** The breakpoint for CTB was provisionally used for CTB/VNRX-5236, where VNRX-5236 was fixed at 4 µg/mL. Conclusion The addition of VNRX-5236 enhanced the activity of CTB against the 200 Klebsiella isolates tested, reaching a total of 92.5% susceptibility. The prodrug (VNRX-7145) allows for oral administration, making it a potential option for step-down therapy. Importantly, VNRX-5236 has a broader spectrum of activity than existing oral BLIs, opening new treatment options for resistant infections as a key addition to the existing antibiotic arsenal. Disclosures Robin Patel, MD, 1928 Diagnostics (Consultant)BioFire Diagnostics (Grant/Research Support)ContraFect Corporation (Grant/Research Support)Curetis (Consultant)Hylomorph AG (Grant/Research Support)IDSA (Other Financial or Material Support, Editor’s Stipend)Infectious Diseases Board Review Course (Other Financial or Material Support, Honoraria)Mammoth Biosciences (Consultant)NBME (Other Financial or Material Support, Honoraria)Netflix (Consultant)Next Gen Diagnostics (Consultant)PathoQuest (Consultant)PhAST (Consultant)Qvella (Consultant)Samsung (Other Financial or Material Support, Patent Royalties)Selux Diagnostics (Consultant)Shionogi & Co., Ltd. (Grant/Research Support)Specific Technologies (Consultant)TenNor Therapeutics Limited (Grant/Research Support)Torus Biosystems (Consultant)Up-to-Date (Other Financial or Material Support, Honoraria) Robin Patel, MD, BioFire (Individual(s) Involved: Self): Grant/Research Support; Contrafect (Individual(s) Involved: Self): Grant/Research Support; IDSA (Individual(s) Involved: Self): Editor’s stipend; NBME, Up-to-Date and the Infectious Diseases Board Review Course (Individual(s) Involved: Self): Honoraria; Netflix (Individual(s) Involved: Self): Consultant; TenNor Therapeutics Limited (Individual(s) Involved: Self): Grant/Research Support; to Curetis, Specific Technologies, Next Gen Diagnostics, PathoQuest, Selux Diagnostics, 1928 Diagnostics, PhAST, Torus Biosystems, Mammoth Biosciences and Qvella (Individual(s) Involved: Self): Consultant David van Duin, MD, PhD, Entasis (Advisor or Review Panel member)genentech (Advisor or Review Panel member)Karius (Advisor or Review Panel member)Merck (Grant/Research Support, Advisor or Review Panel member)Pfizer (Consultant, Advisor or Review Panel member)Qpex (Advisor or Review Panel member)Shionogi (Grant/Research Support, Scientific Research Study Investigator, Advisor or Review Panel member)Utility (Advisor or Review Panel member) Vance G. Fowler, Jr., MD, MHS, Achaogen (Consultant)Advanced Liquid Logics (Grant/Research Support)Affinergy (Consultant, Grant/Research Support)Affinium (Consultant)Akagera (Consultant)Allergan (Grant/Research Support)Amphliphi Biosciences (Consultant)Aridis (Consultant)Armata (Consultant)Basilea (Consultant, Grant/Research Support)Bayer (Consultant)C3J (Consultant)Cerexa (Consultant, Other Financial or Material Support, Educational fees)Contrafect (Consultant, Grant/Research Support)Debiopharm (Consultant, Other Financial or Material Support, Educational fees)Destiny (Consultant)Durata (Consultant, Other Financial or Material Support, educational fees)Genentech (Consultant, Grant/Research Support)Green Cross (Other Financial or Material Support, Educational fees)Integrated Biotherapeutics (Consultant)Janssen (Consultant, Grant/Research Support)Karius (Grant/Research Support)Locus (Grant/Research Support)Medical Biosurfaces (Grant/Research Support)Medicines Co. (Consultant)MedImmune (Consultant, Grant/Research Support)Merck (Grant/Research Support)NIH (Grant/Research Support)Novadigm (Consultant)Novartis (Consultant, Grant/Research Support)Pfizer (Grant/Research Support)Regeneron (Consultant, Grant/Research Support)sepsis diagnostics (Other Financial or Material Support, Pending patent for host gene expression signature diagnostic for sepsis.)Tetraphase (Consultant)Theravance (Consultant, Grant/Research Support, Other Financial or Material Support, Educational fees)Trius (Consultant)UpToDate (Other Financial or Material Support, Royalties)Valanbio (Consultant, Other Financial or Material Support, Stock options)xBiotech (Consultant) Daniel D. Rhoads, MD, Becton, Dickinson and Company (Grant/Research Support) Michael Jacobs, MBBS, Venatorx Pharmaceuticals, Inc. (Grant/Research Support) Focco van den Akker, PhD, Venatorx Pharmaceuticals, Inc. (Grant/Research Support) David A. Six, PhD, Venatorx Pharmaceuticals, Inc. (Employee) Greg Moeck, PhD, Venatorx Pharmaceuticals, Inc. (Employee) Krisztina M. Papp-Wallace, Ph.D., Merck & Co., Inc. (Grant/Research Support)Spero Therapeutics, Inc. (Grant/Research Support)Venatorx Pharmaceuticals, Inc. (Grant/Research Support)Wockhardt Ltd. (Other Financial or Material Support, Research Collaborator) Robert A. Bonomo, MD, entasis (Research Grant or Support)Merck (Grant/Research Support)NIH (Grant/Research Support)VA Merit Award (Grant/Research Support)VenatoRx (Grant/Research Support)
APA, Harvard, Vancouver, ISO, and other styles
36

Kok, Cynthia. "Worldly Threads." Early Modern Low Countries 7, no. 1 (June 26, 2023). http://dx.doi.org/10.51750/emlc12428.

Full text
Abstract:
This article examines the layered history of Japonse rokken, European silk production, and self-fashioning in Dutch-American portraiture. First imported from Japan and subsequently copied by European tailors, Japonse rokken became popular in the Dutch Republic as the Dutch East India Company developed an exclusive trade relationship with Japan. By the early eighteenth century, European weavers had begun producing silks, referred to as indiennes, with dynamic patterns inspired by Asian design motifs. On both sides of the Atlantic, elite Dutchmen fashioned themselves in these silk robes: a ca. 1700-1705 patroon portrait, for example, presents New York merchant Isaac de Peyster (1662-1728) wearing a Japonse rok cut from an indienne. While the Dutch community in early New York has been considered peripheral to the Dutch Republic, I argue that in adopting a garment styled after Japanese robes, tailored from silk woven in Europe, and painted in a Hudson Valley style, the Dutch-American elite signalled their ability to access, understand, and participate in intellectual and mercantile networks that spanned from Asia to Europe to the Americas.
APA, Harvard, Vancouver, ISO, and other styles
37

Tuters, Marc, Emilija Jokubauskaitė, and Daniel Bach. "Post-Truth Protest: How 4chan Cooked Up the Pizzagate Bullshit." M/C Journal 21, no. 3 (August 15, 2018). http://dx.doi.org/10.5204/mcj.1422.

Full text
Abstract:
IntroductionOn 4 December 2016, a man entered a Washington, D.C., pizza parlor armed with an AR-15 assault rifle in an attempt to save the victims of an alleged satanic pedophilia ring run by prominent members of the Democratic Party. While the story had already been discredited (LaCapria), at the time of the incident, nearly half of Trump voters were found to give a measure of credence to the same rumors that had apparently inspired the gunman (Frankovic). Was we will discuss here, the bizarre conspiracy theory known as "Pizzagate" had in fact originated a month earlier on 4chan/pol/, a message forum whose very raison d’être is to protest against “political correctness” of the liberal establishment, and which had recently become a hub for “loose coordination” amongst members the insurgent US ‘alt-right’ movement (Hawley 48). Over a period of 25 hours beginning on 3 November 2016, contributors to the /pol/ forum combed through a cache of private e-mails belonging to Hillary Clinton’s campaign manager John Podesta, obtained by Russian hackers (Franceschi-Bicchierai) and leaked by Julian Assange (Wikileaks). In this short time period contributors to the forum thus constructed the basic elements of a narrative that would be amplified by a newly formed “right-wing media network”, in which the “repetition, variation, and circulation” of “repeated falsehoods” may be understood as an “important driver towards a ‘post-truth’ world” (Benkler et al). Heavily promoted by a new class of right-wing pundits on Twitter (Wendling), the case of Pizzagate prompts us to reconsider the presumed progressive valence of social media protest (Zuckerman).While there is literature, both popular and academic, on earlier protest movements associated with 4chan (Stryker; Olson; Coleman; Phillips), there is still a relative paucity of empirical research into the newer forms of alt-right collective action that have emerged from 4chan. And while there have been journalistic exposés tracing the dissemination of the Pizzagate rumors across social media as well as deconstructing its bizarre narrative (Fisher et al.; Aisch; Robb), as of yet there has been no rigorous analysis of the provenance of this particular story. This article thus provides an empirical study of how the Pizzagate conspiracy theory developed out of a particular set of collective action techniques that were in turn shaped by the material affordances of 4chan’s most active message board, the notorious and highly offensive /pol/.Grammatised Collective ActionOur empirical approach is partially inspired by the limited data-scientific literature of 4chan (Bernstein et al.; Hine et al.; Zannettou et al.), and combines close and distant reading techniques to study how the technical design of 4chan ‘grammatises’ new forms of collective action. Our coinage of grammatised collective action is based on the notion of “grammars of action” from the field of critical information studies, which posits the radical idea that innovations in computational systems can also be understood as “ontological advances” (Agre 749), insofar as computation tends to break the flux of human activity into discrete elements. By introducing this concept our intent is not to minimise individual agency, but rather to emphasise the ways in which computational systems can be conceptualised in terms of an individ­ual-milieu dyad where the “individual carries with it a certain inheritance […] animated by all the potentials that characterise [...] the structure of a physical system” (Simondon 306). Our argument is that grammatisation may be thought to create new kinds of niches, or affordances, for new forms of sociality and, crucially, new forms of collective action — in the case of 4chan/pol/, how anonymity and ephemerality may be thought to afford a kind of post-truth protest.Affordance was initially proposed as a means by which to overcome the dualistic tendency, inherited from phenomenology, to bracket the subject from its environment. Thus, affordance is a relational concept “equally a fact of the environment and a fact of behaviour” (Gibson 129). While, in the strictly materialist sense affordances are “always there” (Gibson 132), their capacity to shape action depends upon their discovery and exploitation by particular forms of life that are capable of perceiving them. It is axiomatic within ethology that forms of life can be understood to thrive in their own dynamic, yet in some real sense ontologically distinct, lifeworlds (von Uexküll). Departing from this axiom, affordances can thus be defined, somewhat confusingly but accurately, as an “invariant combination of variables” (Gibson 134). In the case of new media, the same technological object may afford different actions for specific users — for instance, the uses of an online platform appears differently from the perspective of the individual users, businesses, or a developer (Gillespie). Recent literature within the field of new media has sought to engage with this concept of affordance as the methodological basis for attending to “the specificity of platforms” (Bucher and Helmond 242), for example by focussing on how a platform’s affordances may be used as a "mechanism of governance" (Crawford and Gillespie 411), how they may "foster democratic deliberation" (Halpern and Gibbs 1159), and be implicated in the "production of normativity" (Stanfill 1061).As an anonymous and essentially ephemeral peer-produced image-board, 4chan has a quite simple technical design when compared with the dominant social media platforms discussed in the new media literature on affordances. Paradoxically however in the simplicity of their design 4chan boards may be understood to afford rather complex forms of self-expression and of coordinated action amongst their dedicated users, whom refer to themselves as "anons". It has been noted, for example, that the production of provocative Internet memes on 4chan’s /b/ board — the birthplace of Rickrolling — could be understood as a type of "contested cultural capital", whose “media literate” usage allows anons to demonstrate their in-group status in the absence of any persistent reputational capital (Nissenbaum and Shiffman). In order to appreciate how 4chan grammatises action it is thus useful to study its characteristic affordances, the most notable of which is its renowned anonymity. We should thus begin by noting how the design of the site allows anyone to post anything virtually anonymously so long as comments remain on topic for the given board. Indeed, it was this particular affordance that informed the emergence of the collective identity of the hacktivist group “Anonymous”, some ten years before 4chan became publicly associated with the rise of the alt-right.In addition to anonymity the other affordance that makes 4chan particularly unique is ephemerality. As stated, the design of 4chan is quite straightforward. Anons post comments to ongoing threaded discussions, which start with an original post. Threads with the most recent comments appear first in order at the top of a given board, which result in the previous threads getting pushed down the page. Even in the case of the most popular threads 4chan boards only allow a finite number of comments before threads must be purged. As a result of this design, no matter how popular a discussion might be, once having reached the bump-limit threads expire, moving down the front page onto the second and third page either to be temporarily catalogued or else to disappear from the site altogether (see Image 1 for how popular threads on /pol/, represented in red, are purged after reaching the bump-limit).Image 1: 55 minutes of all 4chan/pol/ threads and their positions, sampled every 2 minutes (Hagen)Adding to this ephemerality, general discussion on 4chan is also governed by moderators — this in spite of 4chan’s anarchic reputation — who are uniquely empowered with the ability to effectively kill a thread, or a series of threads. Autosaging, one of the possible techniques available to moderators, is usually only exerted in instances when the discussion is deemed as being off-topic or inappropriate. As a result of the combined affordances, discussions can be extremely rapid and intense — in the case of the creation of Pizzagate, this process took 25 hours (see Tokmetzis for an account based on our research).The combination of 4chan’s unique affordances of anonymity and ephemerality brings us to a third factor that is crucial in order to understand how it is that 4chan anons cooked-up the Pizzagate story: the general thread. This process involves anons combing through previous discussion threads in order to create a new thread that compiles all the salient details on a given topic often archiving this data with services like Pastebin — an online content hosting service usually used to share snippets of code — or Google Docs since the latter tend to be less ephemeral than 4chan.In addition to keeping a conversation alive after a thread has been purged, in the case of Pizzagate we noticed that general threads were crucial to the process of framing those discussions going forward. While multiple general threads might emerge on a given topic, only one will consolidate the ongoing conversation thereby affording significant authority to a single author (as opposed to the anonymous mass) in terms of deciding on which parts of a prior thread to include or exclude. While general threads occur relatively commonly in 4chan, in the case of Pizzagate, this process seemed to take on the form of a real-time collective research effort that we will refer to as bullshit accumulation.The analytic philosopher Harry Frankfurt argues that bullshit is form of knowledge-production that appears unconcerned with objective truth, and as such can be distinguished from misinformation. Frankfurt sees bullshit as “more ambitious” than misinformation defining it as “panoramic rather than particular” since it is also prepared to “fake the context”, which in his estimation makes bullshit a “greater enemy of the truth” than lies (62, 52). Through an investigation into the origins of Pizzagate on /pol/, we thus are able to understand how grammatised collective action assists in the accumulation of bullshit in the service of a kind of post-truth political protest.Bullshit Accumulation4chan has a pragmatic and paradoxical relationship with belief that has be characterised in terms of kind of quasi-religious ironic collectivism (Burton). Because of this "weaponizing [of] irony" (Wilson) it is difficult to objectively determine to what extent anons actually believed that Pizzagate was real, and in a sense it is beside the point. In combination then with the site’s aforementioned affordances, it is this peculiar relationship with the truth which thus makes /pol/ so uniquely productive of bullshit. Image 2: Original pizzagate post on 4chan/pol/When #Pizzagate started trending on Twitter on 4 November 2017, it became clear that much of the narrative, and in particular the ‘pizza connection’, was based on arcane (if not simply ridiculous) interpretations of a cache of e-mails belonging to Hillary Clinton’s campaign manager John Podesta released by Wikileaks during the final weeks of the campaign. While many of the subsequent journalistic exposé would claim that Pizzagate began on 4chan, they did not explore its origins, perhaps because of the fact that 4chan does not consistently archive its threads. Our analysis overcame this obstacle by using a third party archive, Archive4plebs, which allowed us to pinpoint the first instance of a thread (/pol/) that discussed a connection between the keyword “pizza” and the leaked e-mails (Image 2).Image 3: 4chan/pol/ Pizzagate general threadsStarting with the timestamp of the first thread, we identified a total of 18 additional general threads related to the topic of Pizzagate (see Image 3). This establishes a 25-hour timeframe in which the Pizzagate narrative was formed (from Wednesday 2 November 2016, 22:17:20, until Thursday 3 November 2016, 23:24:01). We developed a timeline (Image 4) identifying 13 key moments in the development of the Pizzagate story such as the first attempts at disseminating the narrative to other platforms such as the Reddit forum r/The_Donald a popular forum whose reactionary politics had arguably set the broader tone for the Trump campaign (Heikkila).Image 4: timeline of the birth of Pizzagate. Design by Elena Aversa, information design student at Density Design Lab.The association between the Clinton campaign and pedophilia came from another narrative on 4chan known as ‘Orgy Island’, which alleged the Clintons flew to a secret island for sex tourism aboard a private jet called "Lolita Express" owned by Jeffrey Epstein, an American financier who had served 13 months in prison for soliciting an underage prostitute. As with the Pizzagate story, this narrative also appears to have developed through the shared infrastructure of Pastebin links included in general posts (Pastebin) often alongside Wikileaks links.Image 5: Clues about “pizza” being investigatedOrgy Island and other stories were thus combined together with ‘clues’, many of which were found in the leaked Podesta e-mails, in order to imagine the connections between pedophila and pizza. It was noticed that several of Podesta’s e-mails, for example, mentioned the phrase ‘cheese pizza’ (see Image 5), which on 4chan had long been used as a code word for ‘child pornography’ , the latter which is banned from the site.Image 6: leaked Podesta e-mail from Marina AbramovicIn another leaked e-mail, for example, sent to Podesta from the renowned performance artist Marina Abramovich (see Image 6), a reference to one of her art projects, entitled ‘Spirit Cooking’ — an oblique reference to the mid-century English occultist Aleister Crowley — was interpreted as evidence of Clinton’s involvement in satanic rituals (see Image 7). In the course of this one-day period then, many if not most of the coordinates for the Pizzagate narrative were thus put into place subsequently to be amplified by a new breed of populist social media activists in protest against a corrupt Democratic establishment.Image 7: /pol/ anon’s reaction to the e-mail in Image 6During its initial inception on /pol/, there was the apparent need for visualisations in order make sense of all the data. Quite early on in the process, for example, one anon posted:my brain is exploding trying to organize the connections. Anyone have diagrams of these connections?In response, anons produced numerous conspiratorial visualisations, such as a map featuring all the child-related businesses in the neighbourhood of the D.C. pizza parlor — owned by the boyfriend of the prominent Democratic strategist David Brock — which seemed to have logos of the same general shape as the symbols apparently used by pedophiles, and whose locations seems furthermore to line up in the shape of a satanic pentagram (see Image 8). Such visualisations appear to have served three purposes: they helped anons to identify connections, they helped them circumvent 4chan’s purging process — indeed they were often hosted on third-party sites such as Imgur — and finally they helped anons to ultimately communicate the Pizzagate narrative to a broader audience.Image 8. Anonymously authored Pizzagate map revealing a secret pedophilia network in D.C.By using an inductive approach to categorise the comments in the general threads a set of non-exclusive codes emerged, which can be grouped into five overarching categories: researching, interpreting, soliciting, archiving and publishing. As visualised in Image 9, the techniques used by anons in the genesis of Pizzagate appears as a kind of vernacular rendition of many of the same “digital methods” that we use as Internet researchers. An analysis of these techniques thus helps us to understanding how a grammatised form of collective action arises out of anons’ negotiations with the affordances of 4chan — most notably the constant purging of threads — and how, in special circumstances, this can lead to bullshit accumulation.Image 9: vernacular digital methods on /pol/ ConclusionWhat this analysis ultimately reveals is how 4chan/pol/’s ephemerality affordance contributed to an environment that is remarkably productive of bullshit. As a type of knowledge-accumulation, bullshit confirms preconceived biases through appealing to emotion — this at the expense of the broader shared epistemic principles, an objective notion of “truth” that arguably forms the foundation for public reason in large and complex liberal societies (Lynch). In this sense, the bullshit of Pizzagate resonates with Hannah Arendt’s analysis of totalitarian discourse which nurtures a conspiratorial redefining of emotional truth as “whatever respectable society had hypocritically passed over, or covered with corruption" (49).As right-wing populism establishes itself evermore firmly in many countries in which technocratic liberalism had formerly held sway, the demand for emotionally satisfying post-truth, will surely keep the new online bullshit factories like /pol/ in business. Yet, while the same figures who initially assiduously sought to promote Pizzagate have subsequently tried to distance themselves from the story (Doubeck; Colbourn), Pizzagate continues to live on in certain ‘alternative facts’ communities (Voat).If we conceptualise the notion of a ‘public’ as a local and transient entity that is, above all, defined by its active engagement with a given ‘issue’ (Marres), then perhaps we should consider Pizzagate as representing a new post-truth species of issue-public. Indeed, one could go so far as to argue that, in the era of post-truth, the very ‘reality’ of contemporary issues-publics are increasingly becoming a function of their what communities want to believe. Such a neopragmatist theory might even be used to support the post-truth claim — as produced by the grammatised collective actions of 4chan anons in the course of a single day — that Pizzagate is real!References Agre, Phillip E. “Surveillance and Capture.” The New Media Reader. Eds. Noah Wardrip-Fruin and Nick Montfort. Cambridge, MA: MIT P, 2003 [1994]. 740–60.Aisch, Gregor, Jon Huang, and Cecilia Kang. “Dissecting the #PizzaGate Conspiracy Theories.” New York Times, 10 Dec. 2016. 1 Aug. 2018 <https://www.nytimes.com/interactive/2016/12/10/business/media/pizzagate.html>.Arendt, Hannah. Origins of Totalitarianism. New York: Houghton Mifflin Harcourt, 1968.Benkler, Yochai, Robert Faris, Hal Roberts, and Ethan Zuckerman. “Study: Breitbart-Led Right-Wing Media Ecosystem Altered Broader Media Agenda.” Columbia Journalism Review, 3 Mar. 2017. 1 Aug. 2018 <https://www.cjr.org/analysis/breitbart-media-trump-harvard-study.php>.Bernstein, Michael S., Andres Monroy-Hernandez, Harry Drew, Paul Andre, Katrina Panovich, and Greg Vargas. "4chan and /b/: An Analysis of Anonymity and Ephemerality in a Large Online Community.” Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media, 2011.Bucher, Taina, and Anne Helmond. “The Affordances of Social Media Platforms.” The SAGE Handbook of Social Media. Eds. Jean Burgess, Thomas Poell, and Alice Marwick. London and New York: SAGE, 2017.Burton, Tara Isabella. “Apocalypse Whatever — Real Life.” Reallifemag, 13 Dec. 2017. 1 Aug. 2018 <http://reallifemag.com/apocalypse-whatever/>.Colburn, Randall. “Celebrate the 1-Year Anniversary of the #Pizzagate Shooting by Getting Mike Cernovich Kicked Off Twitter." AVclub, 4 Dec. 2017. 1 Aug. 2018 <https://www.avclub.com/celebrate-the-1-year-anniversary-of-the-pizzagate-shoo-1820983596>.Coleman, Gabriella. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous. New York: Verso, 2014.Crawford, Kate, and Tarleton L. Gillespie. “What Is a Flag For? Social Media Reporting Tools and the Vocabulary of Complaint.” New Media & Society 18.3 (2016): 410-428.Doubeck, James. “Conspiracy Theorist Alex Jones Apologizes For Promoting ‘Pizzagate’.” NPR, 26 Mar. 2017. 1 Aug. 2018 <https://www.npr.org/sections/thetwo-way/2017/03/26/521545788/conspiracy-theorist-alex-jones-apologizes-for-promoting-pizzagate>.Fisher, Marc, John Woodrow Cox, and Peter Hermann. “Pizzagate: From Rumor, to Hashtag, to Gunfire in D.C.” The Washington Post, 6 Dec. 2016. 1 Aug. 2018 <https://www.washingtonpost.com/local/pizzagate-from-rumor-to-hashtag-to-gunfire-in-dc/2016/12/06/4c7def50-bbd4-11e6-94ac-3d324840106c_story.html?utm_term=.ef9c2b1edc2f>.Franceschi-Bicchierai, Lorenzo. “How Hackers Broke into John Podesta and Colin Powell's Gmail Accounts.” Motherboard, 22 Oct. 2016. 1 Aug. 2018 <https://motherboard.vice.com/en_us/article/mg7xjb/how-hackers-broke-into-john-podesta-and-colin-powells-gmail-accounts>.Frankfurt, Harry. On Bullshit. Princeton: Princeton UP, 2005.Frankovic, Kathy. “Belief in Conspiracies Largely Depends on Political Identity.” YouGov, 2016. 1 Aug. 2018 <https://today.yougov.com/topics/politics/articles-reports/2016/12/27/belief-conspiracies-largely-depends-political-iden>.Gibson, James J. The Ecological Approach to Visual Perception. New York: Taylor & Francis, 1986.Gillespie, Tarleton. “The Politics of ‘Platforms’.” New Media & Society 12.3 (2010): 347–64.Halpern, Daniel, and Jennifer Gibbs. “Social Media as a Catalyst for Online Deliberation? Exploring the Affordances of Facebook and YouTube for Political Expression.” Computers in Human Behavior 29.3 (2013): 1159–1168.Hawley, George. Making Sense of the Alt-Right. New York: Columbia UP, 2017.Heikkilä, Nico. “Online Antagonism of the Alt-Right in the 2016 Election.” European Journal of American Studies 12.2 (2017): 1–23.Hagen, Sal. "Rendering Legible the Ephemerality of 4chan/pol/." OILab.eu, 12 Apr. 2018. 1 Aug. 2018 <https://oilab.eu/rendering-legible-the-ephemerality-of-4chanpol/>.Hine, Gabriel, Jeremiah Onaolapo, Emiliano De Cristafora, Niclas Kourtellis, Ilias Leontiadis, Riginos Samaras, Gianluca Stringhini, and Jeremy Blackburn. “Kek, Cucks, and God Emperor Trump: A Measurement Study of 4chan's Politically Incorrect Forum and Its Effects on the Web.” 11th International AAAI Conference on Web and Social Media (ICWSM'17). 2017.LaCapria, Kim. "FALSE: Comet Ping Pong Pizzeria Home to Child Abuse Ring Led by Hillary Clinton." Snopes, 21 Nov. 2016. 1 Aug. 2018 <https://www.snopes.com/fact-check/pizzagate-conspiracy/>.Lynch, Michael. P. The Internet of Us: Knowing More and Understanding Less in the Age of Big Data. New York: W.W. Norton & Company, 2016.Marres, Noortje. “The Issues Deserve More Credit.” Social Studies of Science 37.5 (2007): 759–80.Nissenbaum, Asaf, and Limor Shifman. “Internet Memes as Contested Cultural Capital: The Case of 4chan’s /b/ Board.” New Media & Society 19.4 (2015): 483–501.Olson, Parmy. We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency. New York: Back Bay Books, 2013.Pastebin – Epstein's Little Black Book. 9 Mar. 2015. 1 Aug. 2018 <https://pastebin.com/m7FYj73Z>.Phillips, Whitney. This Is Why We Can't Have Nice Things: Mapping the Relationship between Online Trolling and Mainstream Culture. Cambridge MA: MIT P, 2015./Pol/ – Politically Incorrect » Thread #95752720. 2 Nov. 2016. 1 Aug. 2018 <http://archive.4plebs.org/pol/thread/95752720/#95752720>.Robb, Amanda. “Anatomy of a Fake News Scandal: Inside the Web of Conspiracy Theorists, Russian Operatives, Trump Campaigners and Twitter Bots Who Manufactured the “News” that Hillary Clinton Ran a Pizza-Restaurant Child-Sex Ring.” Rolling Stone, 16 Nov. 2017. 1 Aug. 2018 <https://www.rollingstone.com/politics/news/pizzagate-anatomy-of-a-fake-news-scandal-w511904>.Simondon, Gilbert. “Genesis of the Individual.” Incorporations. Eds. Jonathan Crary and Stanford Kwinter. New York: Zone Books, 1992 [1964]. 297–319.Stanfill, Mel. “The Interface as Discourse: the Production of Norms through Web Design.” New Media & Society 17.7 (2014): 1059–74.Stryker, Cole. Epic Win for Anonymous: How 4chan’s Army Conquered the Web. New York: Overlook P, 2011.Tokmetzis, Dimitri. “De Zaak ‘Pizzagate’ – of Hoe Nepnieuws en Complottheorieën Hun Weg Vinden Naar Een Breed Publiek.” De Correspondent, 25 Apr. 2018. 1 Aug. 2018 <https://decorrespondent.nl/7938/de-zaak-pizzagate-of-hoe-nepnieuws-en-complottheorieen-hun-weg-vinden-naar-een-breed-publiek/386556786-1c0b5a60>.Voat.com/v/pizzagate. 1 Aug. 2018 <https://voat.co/v/pizzagate>.Von Uexküll, Joseph. A Foray into the Worlds of Animals and Humans: With a Theory of Meaning. Trans. J.D. ONeil. Minneapolis: U of Minnesota P, 2010 [1934].Wendling, Mike. "The Saga of 'Pizzagate': The Fake Story That Shows How Conspiracy Theories Spread." BBC News, 2 Dec. 2016. 1 Aug. 2018 <https://www.bbc.co.uk/news/blogs-trending-38156985>.Wilson, Jason. “Hiding in Plain Sight: How the ‘Alt-Right’ Is Weaponizing Irony to Spread Fascism.” Guardian, 23 May 2017. 1 Aug. 2018 <https://www.theguardian.com/technology/2017/may/23/alt-right-online-humor-as-a-weapon-facism>.WikiLeaks. "The Podesta Emails – Part 1." 7 Oct. 2016. 1 Aug. 2018 <https://wikileaks.org/podesta-emails/press-release>.Zannettou, Savvas, Tristan Caulfield, Jeremy Blackburn, Emiliano De Cristofaro, Michael Sirivianos, Gianluca Stringhini, and Guillermo Suarez-Tangil. “On the Origins of Memes by Means of Fringe Web Communities.” arXiv 1805.12512 (2018): 1–20.Zuckerman, Ethan. “Cute Cats to the Rescue? Participatory Media and Political Expression.” MIT Open Access Journals, 2013. 1 Aug. 2018 <http://ethanzuckerman.com/papers/cutecats2013.pdf>.
APA, Harvard, Vancouver, ISO, and other styles
38

Garthwaite, Craig, Meghan Busse, Jennifer Brown, and Greg Merkley. "Starbucks: A Story of Growth." Kellogg School of Management Cases, January 20, 2017, 1–20. http://dx.doi.org/10.1108/case.kellogg.2016.000317.

Full text
Abstract:
Founded in 1971 and acquired by CEO Howard Schultz in 1987, Starbucks was an American success story. In forty years it grew from a single-location coffee roaster in Seattle, Washington to a multibillion-dollar global enterprise that operated more than 17,000 retail coffee shops in fifty countries and sold coffee beans, instant coffee, tea, and ready-to-drink beverages in tens of thousands of grocery and mass merchandise stores. However, as Starbucks moved into new market contexts as part of its aggressive growth strategy, the assets and activities central to its competitive advantage in its retail coffee shops were altered or weakened, which made it more vulnerable to competitive threats from both higher and lower quality entrants. The company also had to make decisions on vertical integration related to its expansion into consumer packaged goods.Understand how strategy needs to be adapted to new contexts. Understand how to manage tradeoffs involved in growth. Be able to identify possible threats to competitive advantage as a result of growth.
APA, Harvard, Vancouver, ISO, and other styles
39

Gomis, Benoît, Allen William Andrew Gallagher, Andy Rowell, and Anna B. Gilmore. "Turning a threat into an opportunity: British American Tobacco’s weakening of the Protocol to Eliminate Illicit Trade in Tobacco Products." Tobacco Control, September 16, 2021, tobaccocontrol—2020–055837. http://dx.doi.org/10.1136/tobaccocontrol-2020-055837.

Full text
Abstract:
BackgroundPrevious research has outlined transnational tobacco company (TTC) efforts to undermine implementation of the Protocol to Eliminate Illicit Trade in Tobacco Products (Protocol) and evidence of ongoing TTC complicity in the illicit tobacco trade (ITT). However, the industry’s views on the Protocol and role in its development are not well understood.MethodsSystematic searching and analysis of leaked documents—approximately 15 000 from British American Tobacco (BAT) and 35 from Philip Morris International, triangulated via searches of online resources and interviews with five stakeholders across academia, international organisations, governments, civil society and the private sector.FindingsEvidence indicates that after privately viewing the Protocol as a significant threat (2003), BAT worked to influence its content, while publicly signalling support for it (2007–2012), and was largely satisfied with the final text. BAT successfully pushed for a non-prescriptive text which enabled further country-level TTC influence during the Protocol’s implementation phase. The final text also reflected other BAT policy preferences, including preventing outright bans on duty-free sales and intermingling, and making it difficult to sanction and hold tobacco companies accountable for ongoing involvement in the ITT. TTC representatives were present during early Protocol negotiations, despite rules against this, and BAT obtained draft texts before they were public and paid at least one delegate to support its position.ConclusionsBAT’s primary interest in shaping the Protocol was to minimise its financial and legal costs for BAT while maximising potential costs to small competitors. These findings raise concern about the Protocol’s ability to control the ITT, particularly given TTCs’ intention to influence ongoing national implementation. An effective Protocol is vital to controlling both the ITT and ongoing tobacco industry involvement in it and, in turn, governments’ ability to increase tobacco taxes and thereby save lives.
APA, Harvard, Vancouver, ISO, and other styles
40

"Cascading Effect of Boeing’s 737 Max Technology Development." International Journal of Recent Technology and Engineering 8, no. 5 (January 30, 2020): 5208–15. http://dx.doi.org/10.35940/ijrte.e4863.018520.

Full text
Abstract:
During March and April 2019, many countries had grounded Boeing’s 737 Max 8 jets following two fatal crashes in a space of five months, between October 2018 and March 2019, killing 346 people. It was widely reported that the problem was with the software called Maneuvering Characteristics Augmentation System (MCAS). Aviation experts across the world accused Boeing of being lax in following safety protocols during 737 Max jet’s development stage. It was reported that the company was in a hurry to face the fast growing competition from archival Airbus. Boeing faced a sever threat of losing its market share in the North American short haul market after the runaway success of Airbus A320. The A320 deployed several first of the kind technologies and grabbed significant market share in European and Asian short haul market. This article explores the strategies that Boeing followed while developing Boeing 737 jet technology over the years. Also the article focuses on the competitive strategy of Boeing in general while playing catch-up with its competitor Airbus. Secondary data was analysed to illustrate cascading effect on the technology development.
APA, Harvard, Vancouver, ISO, and other styles
41

Pascual, Manuel E., and Lisa Nicole Cain. "Loyalty programs: the vital safety feature for airlines to survive COVID-19." International Hospitality Review ahead-of-print, ahead-of-print (June 3, 2021). http://dx.doi.org/10.1108/ihr-03-2021-0017.

Full text
Abstract:
PurposeThe airline industry has been severely impacted by COVID-19 due to widespread travel restrictions. Its current response is crucial to ensure continued operations after the global pandemic is resolved. One resource the airlines are leveraging is loyalty programs. This study aims to examine the viability of leveraging loyalty programs in times of crisis.Design/methodology/approachThis study employs a case study methodology to examine how one company, American Airlines, has used its loyalty program to survive a pandemic and alleviate the financial costs associated with limited and restricted travel.FindingsAmerican Airlines' AAdvantage loyalty program structure may be used as a benchmark to understand how airlines can anchor their loyalty base to reinvigorate travel interest and use these programs as safeguards in critical instances that may arise in the future.Research limitations/implicationsThe case was bound by the fact that the pandemic was still a threat during the time of analysis. The findings of this case study go beyond the airline industry and may inform other hospitality and tourism organizations on the benefits of loyalty programs in times of financial distress.Originality/valueThis is the first known case study examining the strengths and opportunities of the structure of the American Airlines' AAdvantage program as a means for surviving in a time of crisis. Moreover, understanding how to mitigate the long-term effects of crises may help to inform future short-term strategies of airlines and other hospitality and tourism organizations for navigating unexpected shocks to their ecosystem.
APA, Harvard, Vancouver, ISO, and other styles
42

Hardack, Richard. "Bad Company: The Corporate Appropriation of Nature, Divinity, and Personhood in U.S. Culture." British Journal of American Legal Studies, November 28, 2019. http://dx.doi.org/10.2478/bjals-2019-0015.

Full text
Abstract:
Abstract In this article, I provide a cultural history of some of the critical predicates of corporate personhood. I track the Hobbesian lineage of the corporate form, but also the ways the corporation, ascribed with numinous agency and personhood, has filled the cultural space vacated by our transcendence of anthropomorphic notions of god and Nature. The corporation was created through the consent of the sovereign, and its charter was formulated to reflect not only its uses, but its potential threat, particularly with regard to its concentration of power. Established under the aegis of individual states, the U.S. corporation was initially restricted to specific functions for limited periods. But corporations in many contexts not only have supplanted the Hobbesian state that created them, but displaced the individual person. Corporations have become super-persons and forms of sovereigns themselves, in part by acquiring human rights and “personalities” and tethering them to the corporation’s inhuman attributes. However, corporations don’t just mimic human behaviors; at best simulacra, or imitations of human life, corporations challenge and destabilize the status of personhood, and what it means to be a person. In the process, corporations have amassed not just wealth, but personhood (for example, in perhaps surprising ways, the personhood of African Americans). In many ways, the ever-increasing wealth gap in the United States is actually a personhood gap. The overarching effect of corporate personhood, which operates in tandem with privatization, is to dehumanize people, turning them into things that have no rights. Created to encourage entrepreneurial (or reckless and socially irresponsible) risk-taking and minimize personal liability, the corporation evolved into an entity that dynamically diminishes the personal. The corporation represents a collective, transcendental body that has taken on the role of a deity, and, in U.S. ontology, of nature. The relationships between human and corporate personhood and identity implicate fantasies of the supernal; the superhuman; immortality; and the transcendence of individuality. For these reasons, I treat the corporation not primarily as a commercial enterprise, but as a cultural phantasm, a kind of black hole that draws in more and more cultural phenomena into its orbit. The modern corporation has come to guarantee certain rights at a price, in much the way the Hobbesian state once did. People barter their attributes to corporations; but they are no longer trading liberty for security, but “souls” for identity. As the corporation comes to serve as the de facto guarantor and distributor of culture, it remains amoral at best, and in practice serves as a dominant pathological personality that helps reduce all human endeavor to commercial interest.
APA, Harvard, Vancouver, ISO, and other styles
43

Maxwell, Lori, and Kara E. Stooksbury. "No "Country" for Just Old Men." M/C Journal 11, no. 5 (August 22, 2008). http://dx.doi.org/10.5204/mcj.71.

Full text
Abstract:
Introduction Presidents “define who Americans are—often by declaring who they aren’t”, and “by their very utterances […] have shaped our sense of who we are as Americans” (Stuckey, front cover). This advocacy of some groups and policies to the exclusion of others has been facilitated in the United States’ political culture by the country music industry. Indeed, President Richard Nixon said of country music that it “radiates a love of this nation—a patriotism,” adding that it “makes America a better country” (Bufwack and Oermann 328). Country music’s ardent support of American military conflict, including Vietnam, has led to its long-term support of Republican candidates. There has been a general lack of scholarly interest, however, in how country music has promoted Republican definitions of what it means to be an American. Accordingly, we have two primary objectives. First, we will demonstrate that Republicans, aided by country music, have used the theme of defence of “country,” especially post-9/11, to attempt to intimidate detractors. Secondly, Republicans have questioned the love of “country,” or “patriotism,” of their electoral opponents just as country musicians have attempted to silence their own critics. This research is timely in that little has been done to merge Presidential advocacy and country music; furthermore, with the election of a new President mere days away, it is important to highlight the tendencies toward intolerance that both conservatism and country music have historically shared. Defence of ‘Country’ After the 9/11 attacks, President George W. Bush addressed the nation before a Joint Session of Congress on 20 September 2001. During this speech, the president threatened the international community and raised the spectre of fear in Americans both while drawing distinctions between the United States and its enemies. This message was reflected and reinforced by several patriotic anthems composed by country artists, thus enhancing its effect. In his remarks before Congress, Bush challenged the international community: “Either you are with us, or you are with the terrorists;” thus “advocating some groups to the exclusion of others” on the international stage (20 September 2001). With these words, the President expanded the definition of the United States’ enemies to include not only those responsible for the 9/11 attacks, but also anyone who refused to support him. Republican Senator John McCain’s hawkishness regarding the attacks mirrored the President’s. “There is a system out there or network, and that network is going to have to be attacked,” McCain said the next morning on ABC (American Broadcasting Company) News. Within a month he made clear his priority: “Very obviously Iraq is the first country,” he declared on CNN. Later he yelled to a crowd of sailors and airmen: “Next up, Baghdad!” (http://www.iht.com/articles/2008/08/17/america/mccain.php). Bush’s address also encouraged Americans at home to “be calm and resolute, even in the face of a continuing threat” (20 September 2001). The subtle “us vs. them” tension here is between citizens and those who would threaten them. Bush added that “freedom and fear” had always “been at war” and “God is not neutral between them” (20 September 2001) suggesting a dualism between God and Satan with God clearly supporting the cause of the United States. Craig Allen Smith’s research refers to this as Bush’s “angel/devil jeremiad.” The President’s emphasis on fear, specifically the fear that the American way of life was being assailed, translated into public policy including the creation of the Department of Homeland Security and the Patriot Act. This strategic nomenclature strengthened the power of the federal government and has been used by Republicans to suggest that if a candidate or citizen is not a terrorist then what does he/she have to fear from the government? The impact of Bush’s rhetoric of fear has of late been evaluated by scholars who have termed it “melodrama” in international affairs (Anker; Sampert and Treiberg). To disseminate his message for Americans to support his defence of “country,” Bush needed look no further than country music. David Firestein, a State Department diplomat and published authority on country music, asserted that the Bush team “recognised the power of country music as a political communication device” (86). The administration’s appeal to country music is linked to what Firestein called the “honky-tonk gap” which delineates red states and blue states. In an analysis of census data, Radio-Locator’s comprehensive listing by state of country music radio stations, and the official 2004 election results, he concluded that If you were to overlay a map of the current country music fan base onto the iconic red-and-blue map of the United States, you would find that its contours coincide virtually identically with those of the red state region. (84) And country musicians were indeed powerful in communicating the Republican message after 9/11. Several country musicians tapped into Bush’s defence of country rhetoric with a spate of songs including Alan Jackson’s Where Were You? (When the World Stopped Turning), Toby Keith’s Courtesy of the Red, White, and Blue (the Angry American), and Darryl Worley’s Have You Forgotten? to name a few. Note how well the music parallels Bush’s attempt to define Americans. For instance, one of the lines from Keith’s Courtesy of the Red, White, and Blue (the Angry American) speaks of those who have given their lives so that other Americans may rest peacefully. This sentiment is reiterated by the theme of Worley’s Have You Forgotten? in which he talks of spending time with soldiers who have no doubts about why they are at war. Both songs implicitly indict the listener for betraying United States soldiers if his/her support for the Iraqi war wanes or, put in Bush terms, the listener would become a supporter of “terrorism.” Country music’s appeal to middle-America’s red state conservatism has made the genre a natural vehicle for supporting the defence of country. Indeed, country songs have been written about every war in United States history; most expressing support for the conflict and the troops as opposed to protesting the United States’ action: “Since the Civil War and Reconstruction, ‘Dixie’ has always been the bellwether of patriotic fervour in time of war and even as the situation in Vietnam reached its lowest point and support for the war began to fade, the South and its distinctive music remained solidly supportive” (Andresen 105). Historically, country music has a long tradition of attempting to “define who Americans were by defining who they weren’t” (Stuckey). As Bufwack and Oermann note within country music “images of a reactionary South were not hard to find.” They add “Dixie fertilized ‘three r’s’ – the right, racism, and religion” (328). Country musicians supported the United States’ failed intervention in Vietnam with such songs as It’s for God and Country and You Mom (That’s Why I’m Fighting In Vietnam), and even justified the American massacre of noncombatants at My Lai in the Battle Hymn of Lt. Calley (328). Thus, a right-wing response to the current military involvement in Iraq was not unexpected from the industry and the honky-tonk state listeners. During the current election, Republican presidential nominee McCain has also received a boost from the country music genre as John Rich, of Big and Rich, wrote Raising McCain, a musical tribute to McCain’s military service used as his campaign theme song. The song, debuted at a campaign rally on 1 August 2008, in Florida, mentions McCain’s ‘Prisoner of War’ status to keep the focus on the war and challenge those who would question it. Scholars have researched the demographics of the country music listener as they have evaluated the massification theory: the notion that the availability of a widespread media culture would break down social and cultural barriers and result in a “homogenised” society as opposed to the results of government-controlled media in non-democratic countries (Peterson and DiMaggio). They have determined that the massification theory has only been partially demonstrated in that regional and class barriers have eroded to some extent but country music listeners are still predominately white and older (Peterson and DiMaggio 504). These individuals do tend to be more conservative within the United States’ political culture, and militarism has a long history within both country music and conservatism. If the bad news of the massification theory is that a mass media market may not perpetuate a homogenous society, there is good news. The more onerous fears that the government will work in tandem with the media to control the people in a democracy seem not to have been borne out over time. Although President Bush’s fear tactics were met with obsequious silence initially, resistance to the unquestioning support of the war has steadily grown. In 2003, a worldwide rally opposed the invasion of Iraq because it was a sovereign state and because the Bush doctrine lacked United Nations’ support. Further opposition in the United States included rallies and concerts as well as the powerful display in major cities across the nation of pairs of combat boots representing fallen soldiers (Olson). Bush’s popularity has dropped precipitously, with his disapproval ratings higher than any President in history at 71% (Steinhauser). While the current economic woes have certainly been a factor, the campaigns of Barack Obama and John McCain can also be viewed as a referendum on the Bush war. The American resistance to the Bush rhetoric and the Iraq war is all the more significant in light of research indicating that citizens incorrectly believe that the opposition to the Vietnam War was typified by protests against the troops rather than the war itself (Beamish). This false notion has empowered the Republicans and country musicians to challenge the patriotism of anyone who would subsequently oppose the military involvement of the United States, and it is to this topic of patriotism that we now turn. Patriotism Patriotism can be an effective way for presidential candidates to connect with voters (Sullivan et al). It has been a particularly salient issue since the 9/11 attacks and the wars in Iraq and Afghanistan. Ironically, George W. Bush, a man whose limited military service had been the subject of debate in 2000, was able to employ the persistent patriotic themes of country music to his electoral advantage. In fact, Firestein argued that country music radio had a greater effect on the 2004 election than any ads run by issue groups because it “inculcated and reinforced conservative values in the red state electorate, helped frame the issues of the day on terms favourable to the conservative position on those issues, and primed red state voters to respond positively to President Bush’s basic campaign message of family, country, and God” (Firestein 83). Bush even employed Only in America, a patriotic anthem performed by Brooks and Dunn, as a campaign theme song, because the war and patriotism played such a prominent role in the election. That the Bush re-election campaign successfully cast doubt on the patriotism of three-time Purple Heart winner, Democratic Senator John Kerry, during the campaign is evidence of Firestein’s assertion. The criticism was based on a book: Unfit for Command: Swift Boat Veterans Speak Out Against John Kerry (O’Neill and Corsi). The book was followed by advertisements funded by Swift Boat Veterans for Truth which included unsubstantiated claims that Kerry lied or exaggerated his combat role in Vietnam in order to obtain two of his Purple Hearts and his Bronze Star; the testimony of Kerry’s crewmen and Navy records notwithstanding, these ads were effective in smearing Kerry’s service record and providing the President with an electoral advantage. As far as country music was concerned, the 2004 election played out against the backdrop of the battle between the patriotic Toby Keith and the anti-American Dixie Chicks. The Dixie Chicks were berated after lead singer Natalie Maines’s anti-Bush comments during a concert in London. The trio’s song about an American soldier killed in action, Travelin’ Soldier, quickly fell from the top spot of the country music charts. Moreover, while male singers such as Keith, Darryl Worley, and Alan Jackson received accolades for their post 9/11 artistic efforts, the Dixie Chicks endured a vitriolic reaction from country music fans as their CDs were burned, country radio refused to play their music, their names were added to an internet list of traitors, their concerts were protested by Bush supporters, and their lives were even threatened (http://www.poppolitics.com/archives/2003/04/Bandwagon). Speaking from experience at the 2008 Democratic National Convention, Kerry addressed the issue of patriotism stating: This election is a chance for America to tell the merchants of fear and division: you don’t decide who loves this country; you don’t decide who is a patriot; you don’t decide whose service counts and whose doesn’t. […] After all, patriotism is not love of power or some cheap trick to win votes; patriotism is love of country. (http://www.clipsandcomment.com/2008/08/27/full-text-john-kerry-speech-democratic-national-convention/) Kerry broached the issue because of the constant attacks on the patriotism of Democratic nominee, Senator Barack Obama. At the most basic level, many of the attacks questioned whether Obama was even an American. Internet rumours persisted that Obama was a Muslim who was not even an American citizen. The attacks intensified when the Obamas’ pastor, Reverend Jeremiah Wright, came under fire for comments made during a sermon in which he stated “God damn America.” As a result, Obama was forced to distance himself from his pastor and his church. Obama was also criticised for not wearing a United States flag lapel pin. When Michelle Obama stated for the “first time [she was] proud of her country” for its willingness to embrace change in February of 2008, Cindy McCain responded that she “had always been proud of her country” with the implication being, of course, a lack of patriotism on the part of Michelle Obama. Even the 13 July 2008 cover of the liberal New Yorker portrayed the couple as flag-burning Muslim terrorists. During the 2008 election campaign, McCain has attempted to appeal to patriotism in a number of ways. First, McCain’s POW experience in Vietnam has been front and centre as he touts his experience in foreign policy. Second, the slogan of the campaign is “Country First” implying that the Obama campaign does not put the United States first. Third, McCain’s running mate, Alaska Governor Sarah Palin, insisted in a speech on 4 October 2008, that Barack Obama has been “palling around with terrorists who would target their own country.” Her reference was to Obama’s acquaintance, Bill Ayers, who was involved in a series of Vietnam era bombings; the implication, however, was that Obama has terrorist ties and is unpatriotic. Palin stood behind her comments even though several major news organisations had concluded that the relationship was not significant as Ayers’ terrorist activities occurred when Obama was eight-years-old. This recent example is illustrative of Republican attempts to question the patriotism of Democrats for their electoral advantage. Country music has again sided with the Republicans particularly with Raising McCain. However, the Democrats may have realised the potential of the genre as Obama chose Only in America as the song played after his acceptance speech at the Democratic Convention. He has also attempted to reach rural voters by starting his post-convention campaign in Bristol, Virginia, a small, conservative town. Conclusion Thus, in the wake of 9/11, Republicans seized the opportunity to control the culture through fear and patriotic fervour. They were facilitated in this endeavor by the country music industry with songs that that would questions the motives, defence of “country,” and patriotism, of anyone who would question the Bush administration. This alliance between country music and the right is an historically strong one, and we recommend more research on this vital topic. While this election may indeed be a referendum on the war, it has been influenced by an economic downturn as well. Ultimately, Democrats will have to convince rural voters that they share their values; they don’t have the same edge as Republicans without the reliance of country music. However, the dynamic of country music has changed to somewhat reflect the war fatigue since the 2004 campaign. The Angry American, Toby Keith, has admitted that he is actually a Democrat, and country music listeners have grown tired of the “barrage of pro-troop sentiment,” especially since the summer of 2005 (Willman 115). As Joe Galante, the chief of the RCA family of labels in Nashville, stated, “It’s the relatability. Kerry never really spent time listening to some of those people” (Willman 201). Bill Clinton, a Southern governor, certainly had relatability, carrying the normally red states and overcoming the honky-tonk gap, and Obama has seen the benefit of country music by playing it as the grand finale of the Democratic Convention. Nevertheless, we recommend more research on the “melodrama” theory of the Presidency as the dynamics of the relationship between the Presidency and the country music genre are currently evolving. References Andreson, Lee. Battle Notes: Music of the Vietnam War. 2nd ed. Superior, WI: Savage Press, 2003. Anker, Elisabeth. “Villains, Victims and Heroes: Melodrama, Media and September 11th.” Journal of Communication. 55.1 (2005): 22-37. Baker, Peter and David Brown. “Bush Tries to Tone Down High-Pitched Debate on Iraq.” Monday, 21November 2005, Page A04. washingtonpost.com Beamish, Thomas D., Harvey Molotch, and Richard Flacks. “Who Supports the Troops? Vietnam, the Gulf War, and the Making of Collective Memory.” Social Problems. 42.3 (1995): 344-60. Brooks and Dunn. Only in America. Arista Records, 2003. Bufwack, Mary A. and Robert K. Oermann. Finding Her Voice The Saga of Women in Country Music. New York: Crown Publishers, 1993. Dixie Chicks. “Travelin Soldier.” Home. Columbia. 27 August 2002. Firestein, David J. “The Honky-Tonk Gap.” Vital Speeches of the Day. 72.3 (2006): 83-88. Jackson, Alan. Where Were You? (When the World Stopped Turning) Very Best of Alan Jackson. Nashville: Arista, 2004. Keith, Toby. Courtesy of the Red, White and Blue (The Angry American). Nashville: Dreamworks. November 9, 2004. Olson, Scott. “Chicago remembers war dead with 500 pairs of empty boots.” 22 January 2004. http://www.usatoday.com/news/nation/2004-01-22-chicago-boots_x.htm O’Neill, John E. and Jerome L. Corsi. “Unfit for Command Swift Boat Veterans Speak Out Against John Kerry.” Washington D.C.: Regnery Publishing, 2004. Peterson, Richard A. and Peter Di Maggio. “From Region to Class, the Changing Locus of Country Music. A Test of the Massification Hypothesis.” Social Forces. 53.3 (1975): 497-506. Rich, John. Raising McCain. Production information unavailable. Sampert, Shannon, and Natasja Treiberg. “The Reification of the ?American Soldier?: Popular Culture, American Foreign Policy, and Country Music.” Paper presented at the International Studies Association 48th Annual Convention, Chicago, Illinois, United States, 28 February 2007. Smith, Craig Allen. “President Bush’s Enthymeme of Evil: The Amalgamation of 9/11, Iraq, and Moral Values.” American Behavioral Scientist. 49 (2005): 32-47. Steinhauser, Paul. “Poll: More disapprove of Bush that any other president.” Politics Cnn.politics.com. 1 May 2008. Stuckey, Mary E. Defining Americans: The Presidency and National Identity. Lawrence: UP of Kansas, 2004. Sullivan, John L., Amy Fried, Mary G. Dietz. 1992. “Patriotism, Politics, and the Presidential Election of 1988.” American Journal of Political Science. 36.1 (1992): 200-234. Willman, Chris. Rednecks and Bluenecks: The Politics of Country Music. New York: The New Press, 2005. Worley, Darryl. Have You Forgotten? Nashville: Dreamworks, 2003.
APA, Harvard, Vancouver, ISO, and other styles
44

Dean, Norman John. "Gaza City: A Profound Personal Journey." Journal of Contemporary Issues in Education 11, no. 1 (May 23, 2016). http://dx.doi.org/10.20355/c51g6q.

Full text
Abstract:
In 2012 I made two trips into Gaza City to work with staff of the American International School, Gaza. My employing company at the time had a contract with USAID to support the school in its development and progress toward accreditation. My role was to undertake an analysis of the school academic program and develop an improvement plan with the leadership group and board, incorporating pedagogical training for teaching staff that had extremely limited opportunities to external support and expertise due to isolation from the outside world. What I experienced in my visits to Gaza had a profound effect on me as a person and as an educator as I witnessed the passion and commitment of teachers working with students in the most trying of circumstances. The first three days of my initial visit coincided with a serious escalation of hostilities, and observing the school in operation throughout this time was inspiring and terrifying at the same time. My paper will recount my experience working alongside colleagues in challenging facilities, with minimal resources, amid the constant threat of danger. It will tell the story of how teacher commitment and dedication, matched by a strong student desire to learn can create truly inspiring learning communities. I will focus partly on the pedagogical training to assist teachers in sustaining an engaging learning environment in this environment, but also on the centrality of the school culture in a hostile environment where hope and aspiration emerge, and bring hope for the future.
APA, Harvard, Vancouver, ISO, and other styles
45

Feddersen, Timothy. "Saks Fifth Avenue and Transgender Rights." Kellogg School of Management Cases, November 8, 2018, 1–14. http://dx.doi.org/10.1108/case.kellogg.2021.000070.

Full text
Abstract:
In September 2014 Leyth Jamal, a transgender woman, filed suit against her employer, luxury retailer Saks Fifth Avenue. Jamal alleged that she experienced harassment from managers and other employees because of her gender identity while employed by Saks, including verbal abuse and threats of violence. At the time she filed suit, no federal, state, or local laws protected transgender employees from discrimination. However, some federal district courts had recently begun to allow such suits on the premise that discrimination based on gender identity was a form of sex discrimination. Other suits and amicus briefs brought by the Equal Employment Opportunity Commission (EEOC) furthered this trend. The EEOC is the federal agency charged with investigating and supporting claims of discrimination under Title VII of the Civil Rights Act of 1964, so district and appellate courts watched the EEOC's position on the application of Title VII. Socio-culturally, many Americans supported transgender rights, even as they voiced anxiety about transgender men in women's bathrooms. This case has students assume the role of a trusted member of the executive team of Hudson's Bay Company, which owns Saks Fifth Avenue. One Friday afternoon in late December 2014, the Hudson's Bay CEO sends an email to his executive team notifying them that he has approved corporate counsel's motion to dismiss Jamal's case based on the argument that transgender people are not a protected class according to Title VII. The motion will be filed in federal court on Monday. The CEO shares that he personally believes it is preposterous for anyone to think that Saks Fifth Avenue is anything but a strong advocate for LGBT rights, but he invites executive team members to call him if they have any concerns. Members of the executive team have a responsibility to consider the broader strategic implications for the company, so students must decide if and how to respond to the CEO.
APA, Harvard, Vancouver, ISO, and other styles
46

Henley, Nadine. "You will die!" M/C Journal 5, no. 1 (March 1, 2002). http://dx.doi.org/10.5204/mcj.1942.

Full text
Abstract:
Scenario: You are exhausted after a long day at work and collapse in front of the television for some mindless entertainment. One of your favourite comedy shows is on. You begin to relax. You laugh a couple of times. There's a commercial break. You watch the first ad for a hardware store, giving it only half your attention. And then there's another ad, something about a father and son in a car together and then ". WOOOMPH! A truck slams into the car. The message is "Speed kills!" Or there are people playing and sunbathing on a beach, happy holidays, and then vultures descend and surround them. The message is "Slip! Slop! Slap! Don't die in the sun this summer". Or someone is shown smoking a cigarette and the caption reads : "Give up now. You'll soon stop dying for a cigarette". This might be accompanied by scenes of a post-mortem, dissections of human lungs or brain. Context Threat appeals are used frequently in health and road safety promotion. Many use the threat of death as the consequence of undesirable behaviours, for example, "Quit smoking or you'll die' (Henley and Donovan). ("Non-death threats' appeal to other consequences such as "Quit smoking or your skin will age'.) There is an implicit notion of premature death threat, although this is rarely stated explicitly. When reminded of our risk of premature death, we are reminded by extension of the ultimate inevitability of our death. An understanding of the philosophy of existentialism can help us understand why consumers may, quite reasonably, tune out, or literally switch off health promotion messages that remind them of their own death. This paper explores the effect on consumers of these mass media invocations of the fear of death, or "death threats'. Verbatim comments are included from six focus groups conducted on fear and health promotion. Groups were delineated by age (16-20 years, 21-29 years and 30-49 years), gender, and socio-economic status (blue collar/white collar) (Henley). What is existential dread? Fear is one of the primary human emotions (along with anger, sadness, love, joy and surprise) and "dread' is one of the emotion names associated with fear (Shaver et al. 1067). We do not need to learn how to feel fear. We have to learn what to fear, however. Despite the joke about death and taxes, death is uniquely inevitable. (Some people do manage to avoid taxes!) In his definitive work, Denial of Death, Becker stated his belief that knowledge of our own death is the source of 'man's peculiar and greatest anxiety' (70); it's what makes us human. Existentialists think that knowing about the inevitability of our own death can be overwhelming, arousing the worst fear imaginable, "existential dread' (Bugental 287). Existential philosophers and psychologists believe that part of this anxiety stems from the existential dread of "not being'. Discussing Heidegger's analysis of the meaning of death in Being and Time, Barrett put it this way: The point is that I may die at any moment, and therefore death is my possibility now. It is like a precipice at my feet. It is also the most extreme and absolute of my possibilities: extreme, because it is the possibility of not being and hence cuts off all other possibilities; absolute, because man can surmount all other heartbreaks, even the deaths of those he loves, but his own death puts an end to him (201). The essence of existential philosophy is this idea that we are all deeply, terribly afraid of death. Fear of death can be seen even in very young children (Anthony, The child's; Anthony, The discovery; Nagy) who express considerable anxiety about death, but quickly learn from their parents and others how to deny it (Yalom). Existential psychologists have suggested that the fear of our own death is the cause of much of our psychopathology (Yalom). Existentialists believe that the most common response to existential anxiety is to deny it, creating in oneself a 'state of forgetfulness of being' as far as possible. Weisman described three levels of denial in terminally ill patients: "first-order denial' of the facts of illness; "second-order denial' of the implications of the illness; and "third-order denial' of death itself. He noted that often a patient moves from first and second order denial into "middle knowledge' (i.e., acceptance of near death), but then relapses. Weisman remarked that this relapse is often the signal that the terminal phase has begun. This aspect of denial is a complicated factor in the complex measurement of death anxiety. When people say they are not afraid of death, who can say whether they are denying fear or truly not afraid? In either case, health promotion appeals that threaten death may not be effective, either because the fear is denied or because there is no fear. In focus groups exploring people's concepts of death (Henley 111), few people acknowledged being afraid of their own death and many specifically stated that they were not afraid of their own death. One woman voiced the universal difficulty of truly conceiving what it might be like "not to be' (Kastenbaum and Aisenberg) when she said: 'death seems like such an unrealistic proposition'. People did acknowledge fears about death, such as dying painfully, so health promotion messages that threaten these other dimensions of death anxiety may be more effective. Health promotion practitioners frequently use these related death fears. The fear of causing death, for example, is used in road safety advertisements. However, this discussion on existential fear is limited to threat appeals of death per se. Death threats in health promotion Is arousing existential dread an effective way to market healthy behaviours? At first sight, it seems logical that the threat of death would be more persuasive than lesser threats and yet it may not be the most effective approach. There is some evidence that lesser threats may be more effective for some groups of adolescents and young adults for smoking (Donovan and Leivers), and for road safety behaviours (Donovan et al.). For example, for some 18 year old males, the threat of being caught drinking and driving, of losing their driving licence and, thus, their new-found independence may be a more effective deterrent than the threat of dying in a car accident (Donovan et al.). The humiliation of being arrested and charged for drink-driving may be the most powerful persuader for adults of all ages (Bevins). For men attending the Jerusalem Centre for Impotency and Fertility, impotence was reported a more persuasive threat than death: 78% of men who were told that smoking causes impotence quit smoking, compared to 40% who quit when told that smoking causes heart attacks ("No smoking tip"). One woman in a focus group said, 'you tend to think short-term, "can I afford a $100 fine?" rather than long-term, "this is my life." If I stop to think about it, obviously I'm more afraid of dying than $100 [fine], but that's not what I think about' (Henley 95). This makes sense in the context of forgetfulness, the denial of death. We don't want to be reminded of our death so we switch off the death message. Lesser threats may be more easily internalised. Does arousing existential dread do any harm? Perhaps. Job suggested that fear arousal is likely to be effective only for specific behaviours that successfully reduce the level of fear arousal and that high-fear messages may actually increase behaviours that people employ to reduce anxiety, such as smoking and alcohol consumption. People high in anxiety are hypothesised to be hypersensitive to threats and likely to employ a restricted range of self-soothing coping behaviours to reduce negative affect (Wickramasekera and Price). Death threat appeals such as "Quit smoking or you'll die' may arouse defensive, counter-productive responses, at least in some people, because it is impossible to identify any specific behaviour that could successfully reduce the particular, unique fear of death per se. Firestone identified a number of psychological defences against death anxiety, including self-nourishing and addictive habits, such as smoking and overeating. Ironically, these same behaviours are frequently the subject of health promotion campaigns. If such campaigns arouse death anxiety in an effort to curb defensive responses to death anxiety, there clearly could be an increase rather than a decrease in those defensive responses. Arousing death anxiety might contribute to fatalistic thinking. Job described some people's defenses against very high fear, for example, "...you've got to go sometime' or "...when your number's up, your number's up'. In focus groups, people commented, 'if an accident is going to happen, it's going to happen' and 'what's the point of giving up [unhealthy behaviours] if you get run over by a bus tomorrow?' (Henley 95, 108). Rippetoe and Rogers found that fatalistic thinking occurred when subjects did not believe that the recommended behaviour would avert the threat. That is, people may realise that quitting smoking could avert lung cancer and even some causes of premature death but that nothing can avert death itself. Fatalism may be one of the most maladaptive responses because the threat is acknowledged but rendered ineffective (Rippetoe and Rogers). Social marketers can make some of their persuasive communications more effective if they are more mindful of consumers' existential fears. A sensitivity to consumers' psychological defences against existential fear may result in more effective use of threat appeals in health promotion. Mindfulness Mindful that the title of this paper itself may arouse some existential dread, I end with a comment on the existentialist alternative to denial. Existentialists advocate a state of 'mindfulness of being' or 'ontological mode' (Heidegger, quoted in Yalom 31) in which "one remains mindful of being, not only mindful of the fragility of being but mindful, too ... of one's responsibility for one's own being." (Yalom 31). The existentialist strives to be as mindful, as present in the moment, and therefore as authentic as possible. This involves the acceptance of existential anxiety as an appropriate and reasonable response to the human condition (Bugental). Some focus group participants wanted to know in advance that they were going to die, 'so you can fit things in you'd want to do and say goodbye'. Others thought it was better not to know or 'you'd start having regrets'. One person pointed out that we do know in advance: 'you know you're going to die sometime!'. This last comment was followed by a sober, almost shocked silence suggesting that, even while we are freely discussing death on one level, the full meaning of death may still elude us. As consumers of health promotion messages, we are exposed to many reminders of our finite existence. If we sit mindlessly in front of the television receiving these messages, we may feel some unresolved discomfort. People talk about looking away, or switching channels when particularly shocking ads are shown. The existentialist alternative response would be to embrace these reminders and use them to sustain a state of mindfulness. With this state of mindfulness comes a heightened sense of responsibility for one's own being. It is in this ontological mode that we are most likely to adopt the healthy behaviours recommended in health promotion messages. By hearing the death threat openly, and acting to protect ourselves from at least those causes of premature death that may lie within our control, we may be able to discover a fuller experience of what it means to be alive. References Anthony, Sylvia. The Child's Discovery of Death. New York: Harcourt, Brace & World, 1940. Anthony, Sylvia. The Discovery of Death in Childhood and After. Harmondsworth, Middlesex: Penguin Education, 1973. Barrett, W. Irrational Man, A Study in Existential Philosophy. London: Heinemann, 1958. Becker, Ernest. The Denial of Death. New York: The Free Press, 1973. Bevins, John. "Using Advertising to Sell and Promote Health and Healthy Products". Paper presented at the ACHPER Health Products and Services Marketing Seminar. Kuring-gai College, Sydney, 1987. Bugental, J. F. T. The Search for Authenticity: An Existential-analytic Approach to Psychotherapy. New York: Holt, Rinehart and Winston, Inc., 1965. Donovan, Robert J., and Sue Leivers. Young Women and Smoking. Report to Commonwealth Department of Human Services and Health. Perth: Donovan Research, 1988. Donovan, Robert J., Nadine Henley, Geoffrey Jalleh, and Clive Slater. Road Safety Advertising: An Empirical Study and Literature Review. Canberra: Federal Office of Road Safety, 1995. Firestone, Robert W. "Psychological Defenses against Death Anxiety." Death Anxiety Handbook: Research, Instrumentation, and Application. Series in Death Education, Aging, and Health Care. Ed. Robert A. Neimeyer. Washington, DC: Taylor & Francis, 1994. 217-241. Henley, Nadine R. "Fear Arousal in Social Marketing: Death vs Non-death Threats." Doctoral Dissertation, University of Western Australia, Perth, 1997. Henley, Nadine and Robert J. Donovan. "Threat Appeals in Social Marketing: Death as a "Special Case'". International Journal of Nonprofit and Voluntary Sector Marketing, 4.4 (1999): 300-319. Job, R. F. Soames. "Effective and Ineffective Use of Fear in Health Promotion Campaigns." American Journal of Public Health, 78 (1988): 163-167. Kastenbaum, R., and R. Aisenberg. The Psychology of Death. London: Duckworth, 1974. Nagy, Maria H. "The Child's View of Death." The Meaning of Death. Ed. Herman Feifel. New York: McGraw-Hill Book Company, 1959. 79-98. "No Smoking Tip for Lovers". Daily Telegraph, (1994, September 24): p. 4. Rippetoe, P.A. and Rogers, R.W. "Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat." Journal of Personality and Social Psychology, 52.3 (1987): 596-604. Shaver, P., J. Schwartz, D. Kirson, and C. O'Connor. "Emotion Knowledge: Further Exploration of a Prototype Approach." Journal of Personality and Social Psychology, 52.6 (1987): 1061-1086. Weisman, A.D. On dying and denying: A psychiatric study of terminality. New York: Behavioral Publications, 1972. Wickramasekera, Ian and Daniel C. Price. "Morbid Obesity, Absorption, Neuroticism, and the High Risk Model of Threat Perception." American Journal of Clinical Hypnosis, 39 (1997): 291-301. Yalom, I. D. Existential Psychotherapy. New York: Basic Books, 1980. Citation reference for this article MLA Style Henley, Nadine. "You will die! " M/C: A Journal of Media and Culture 5.1 (2002). [your date of access] < http://www.media-culture.org.au/0203/youwilldie.php>. Chicago Style Henley, Nadine, "You will die! " M/C: A Journal of Media and Culture 5, no. 1 (2002), < http://www.media-culture.org.au/0203/youwilldie.php> ([your date of access]). APA Style Henley, Nadine. (2002) You will die! . M/C: A Journal of Media and Culture 5(1). < http://www.media-culture.org.au/0203/youwilldie.php> ([your date of access]).
APA, Harvard, Vancouver, ISO, and other styles
47

Gabatbat, Ma Emperatriz. "Exploring the Issue of Ecological Crisis Through the Four Paths Of Matthew Fox’s Creation Spirituality." Scientia - The International Journal on the Liberal Arts 8, no. 2 (September 30, 2019). http://dx.doi.org/10.57106/scientia.v8i2.107.

Full text
Abstract:
This paper examined the causes that affect the people’s behavior toward the environment and their response to the increasing ecological crisis of our country. It explored the specific contributions of people to the crisis and the possible measures that each can do to help somehow lessen if not resolve the problem. The Four Paths in Matthew Fox’s Creation Spirituality were helpful tools in determining the various characteristics of people in relation to creation and the challenges that beset it. The VIA POSITIVA, VIA NEGATIVA, VIA CREATIVA AND VIA TRANSFORMATIVA are paths which bring us into the realities of our roles in this cosmos and can in turn help us reflect and realize our major role to bring about change. The analysis of this exploration include the problem of nonchalance, laziness, materialism, greed and a lack of knowledge on the interconnectedness of human beings and other living beings and non-beings. Anthropocentrism also poses a threat to the way we relate to the environment for we have comfortably became used to being the center of all creations and thus, tend to treat the other beings as immaterial. Each ‘crowning glory’ of creation is in no way superior to all others as to freely harm and abuse them in satisfying their self-centered desires. All are called to participate in a genuine stewardship, a sincere care and concern for the common good. Every ‘Juan dela Cruz’ must submit into renewal of perspectives, even changing paradigms in organizations if we truly desire a more harmonious relationship among all creations. References Books:Berry, Thomas & Swimme, Brian. The Universe Story, From the Primordial Flaring Forth to the Ecozoic Era-A Celebration of the Unfolding of the Cosmos. New York: Harper Collins Publishers, 1994. Craine, Renate. Hildegarde, Prophet of the Cosmic Christ. New York, NY: The Crossroad Publishing Company, 1998. Dejillas, Paul J. Our Cosmic Origins. USA: Tatay Jobe Elizes Publisher, 2017. Fox, Matthew. Creation Spirituality, Liberating Gifts for the Peoples of the Earth. Harper San Francisco, 1991. Fox, Matthew. Original Blessing, A Primer in Creation Spirituality. Bear and Company, Inc., 1983. Pope Francis. Laudato Si, Encyclical Letter ON Care for our Common Home. Vatican City: Libreria Editrice Vaticana, 2015. _______________. The New American Bible. Makati City, Philippines: St. Paul’s Philippines. 2004. Websites: Conserve Energy Future. Current Environmental Issues. Accessed January 11, 2017. http://www.conserve-energy-future.com/ DENR. Eyeing Displaced Mine Workers For Bamboo, Mangrove Expansion Program. Accessed January 10, 2017. http://www.denr.gov.ph/ Ecological Society of the Philippines. Environment Updates. Accessed January 11, 2017. http://www.esp.org.ph/ Seed, John, et.al. Beyond Anthropocentrism, From Thinking Like a Mountain-Towards a Council of all Beings. Accessed June 14, 2019 from http://www.rainbowbody.net/Ongwhehonwhe/beyondanthro_seed.pdf
APA, Harvard, Vancouver, ISO, and other styles
48

Hagen, Sal. "“Trump Shit Goes into Overdrive”: Tracing Trump on 4chan/pol/." M/C Journal 23, no. 3 (July 7, 2020). http://dx.doi.org/10.5204/mcj.1657.

Full text
Abstract:
Content warning: although it was kept to a minimum, this text displays instances of (anti-Semitic) hate speech. During the 2016 U.S. election and its aftermath, multiple journalistic accounts reported on “alt-right trolls” emanating from anonymous online spaces like the imageboard 4chan (e.g. Abramson; Ellis). Having gained infamy for its nihilist trolling subcultures (Phillips, This Is Why) and the loose hacktivist movement Anonymous (Coleman), 4chan now drew headlines because of the alt-right’s “genuinely new” concoction of white supremacy, ironic Internet humour, and a lack of clear leadership (Hawley 50). The alt-right “anons”, as imageboard users call themselves, were said to primarily manifest on the “Politically Incorrect” subforum of 4chan: /pol/. Gradually, a sentiment arose in the titles of several news articles that the pro-Trump “alt-right trolls” had successfully won the metapolitical battle intertwined with the elections (Phillips, Oxygen 5). For instance, articles titled that “trolls” were “The Only True Winners of this Election” (Dewey) or even “Plotting a GOP Takeover” (Stuart).The headlines were as enticing as questionable. As trolling-expert Whitney Phillips headlined herself, the alt-right did not attain political gravity solely through its own efforts but rather was “Conjured Out of Pearl Clutching and Media Attention” (“The Alt-Right”), with news outlets being provoked to criticise, debunk, or sensationalise its trolling activities (Faris et al. 131; Phillips, “Oxygen” 5-6). Even with the right intentions, attempts at denouncement through using vague, structuralist notions–from “alt-right” and “trolls” to “the basket of deplorables” (Robertson) – arguably only strengthened the coherence of those it was meant to disavow (Phillips, Oxygen; Phillips et al.; Marantz). Phillips et al. therefore lamented such generalisations, arguing attributing Trump’s win to vague notions of “4chan”, “alt-right”, or “trolls” actually bestowed an “atemporal, almost godlike power” to what was actually an “ever-reactive anonymous online collective”. Therefore, they called to refrain from making claims about opaque spaces like 4chan without first “plotting the landscape” and “safeguarding the actual record”. Indeed, “when it comes to 4chan and Anonymous”, Phillips et al. warned, “nobody steps in the same river twice”.This text answers the call to map anonymous online groups by engaging with the complexity of testing the muddy waters of the ever-changing and dissimulative 4chan-current. It first argues how anti-structuralist research outlooks can answer to many of the pitfalls arising from this complex task. Afterwards, it traces the word trump as it was used on 4chan/pol/ to problematise some of the above-mentioned media narratives. How did anons consider Trump, and how did the /pol/-current change during the build-up of the 2016 U.S. elections and afterwards?On Researching Masked and Dissimulative ExtremistsWhile potentially playing into the self-imagination of malicious actors (Phillips et al.), the frequent appearance of overblown narratives on 4chan is unsurprising considering the peculiar affordances of imageboards. Imageboards are anonymous – no user account is required to post – and ephemeral – posts are deleted after a certain amount of activity, sometimes after days, sometimes after minutes (Bernstein et al.; Hagen). These affordances complicate studying collectives on imageboards, with the primary reasons being that 1) they prevent insights into user demographics, 2) they afford particularly dissimulative, playful discourse that can rarely be taken at face value (Auerbach; de Zeeuw and Tuters), and 3) the sheer volume of auto-deleted activity means one has to stay up-to-date with a rapid waterfall of subcultural ephemera. Additionally, the person stepping into the muddy waters of the chan-river also changes their gaze over time. For instance, Phillips bravely narrates how she once saw parts of the 4chan-stream as “fun” to only later realise the blatantly racist elements present from the start (“It Wasn’t Just”).To help render legible the changing currents of imageboard activity without relying on vague understandings of the “alt-right”, “trolls”, or “Anonymous”, anti-structuralist research outlooks form a possible answer. Around 1900, sociologists like Gabriel Tarde already argued to refrain from departing from structuralist notions of society and instead let social compositions arise through iterative tracing of minute imitations (11). As described in Bruno Latour’s Reassembling the Social, actor-network theory (ANT) revitalises the Tardean outlook by similarly criticising the notion of the “social” and “society” as distinct, sui-generis entities. Instead, ANT advocates tracing “flat” networks of agency made up of both human and non-human actors (165-72). By tracing actors and describing the emerging network of heterogeneous mediators and intermediaries (105), one can slowly but surely get a sense of collective life. ANT thus takes a page from ethnomethodology, which advocates a similar mapping of how participants of a group produce themselves as such (Garfinkel).For multiple reasons, anti-structuralist approaches like ANT can be useful in tracing elusive anonymous online groups and their changing compositions. First, instead of grasping collectives on imageboards from the outset through structuralist notions, as networked individuals, or as “amorphous and formless entities” (see e.g. Coleman 113-5), it only derives its composition after following where its actors lead. This can result in an empirical and literally objective mapping of their collectivity while refraining from mystifications and non-existent connections–so often present in popular narratives about “trolls” and the “alt-right”. At the same time, it allows prominent self-imaginations and mythologizations – or, in ANT-parlance, “localisations of the global” (Latour 173-190) – rise to the surface whenever they form important actors, which, as we will see, tends to happen on 4chan.Second, ANT offers a useful lens with which to consider how non-human actors can uphold a sense of collectivity within anonymous imageboards. This can include digital objects as part of the infrastructure–e.g. the automatically assigned post numbers having mythical value on 4chan (Beran, It Came From 69)–but also cultural objects like words or memes. Considering 4chan’s anonymity, this focus on objects instead of individuals is partly a necessity: one cannot know the exact amount and flow of users. Still, as this text seeks to show, non-human actors like words or memes can form suitable actors to map the changing collectivity of anonymous imageboard users in the absence of demographic insights.There are a few pitfalls worth noting when conducting ANT-informed research into extremist spaces like 4chan/pol/. The aforementioned ironic and dissimulative rhetoric of anonymous forum culture (de Zeeuw and Tuters) means tracing is complicated by implicit (yet omnipresent) intertextual references undecipherable to the untrained eye. Even worse, when misread or exaggerated, such tracing efforts can play into trolling tactics. This can in turn risk what Phillips calls “giving oxygen” to bigoted narratives by amplifying their presence (“Oxygen”). Since ANT does not prescribe what sort of description is needed (Latour 149), this exposure can be limited and/or critically engaged with by the researcher. Still, it is inevitable that research on extremist collectives adds at least some garbage to already polluted information ecologies (Phillips and Milner 2020), even when “just” letting the actors speak (Venturini). Indeed, this text will unfortunately also show hate speech terms below.These complications of irony and amplification can be somewhat mitigated by mixing ethnographic involvement with computational methods. Together, they can render implicit references explicit while also mapping broad patterns in imitation and preventing singular (misleading) actors from over-dominating the description. When done well, such descriptions do not only have to amplify but can also marginalise and trivialise. An accurate mapping can thereby counter sensationalist media narratives, as long as that is where the actors lead. It because of this potentiality that anti-structuralist tracing of extremist, dissimulative online groups should not be discarded outright.Stopping Momentarily to Test the WatersTo put the above into practice, what follows is a brief case study on the term trump on 4chan/pol/. Instead of following users, here the actor trump is taken an entry point for tracing various assemblages: not only referring to Donald J. Trump as an individual and his actions, but also to how /pol/-anons imagine themselves in relation to Trump. In this way, the actor trump is a fluid one: each of its iterations contains different boundaries and variants of its environment (de Laet and Mol 252). By following these environments, can we make sense of how the delirious 2016 U.S. election cycle played out on /pol/, a space described as the “skeleton key to the rise of Trump” (Beran, 4chan)?To trace trump, I use the 4plebs.com archive, containing almost all posts made on /pol/ between late-2013 and early 2018 (the time of research). I subsequently use two text mining methods to trace various connections between trump and other actors and use this to highlight specific posts. As Latour et al. note, computational methods allow “navigations” (593) of different data points to ensure diverse empirical perspectives, preventing both structuralist “zoomed-out” views and local contexts from over-dominating. Instead of moving between micro and macro views, such a navigation should therefore be understood as a “circulation” around the data, deploying various perspectives that each assemble the actors in a different way. In following this, the case study aims to demonstrate how, instead of a lengthy ethnographic account, a brief navigation using both quali- and quantitative perspectives can quickly demystify some aspects of seemingly nebulous online groups.Tracing trump: From Meme-Wizard to Anti-Semitic TargetTo get a sense of the centrality of Trump on /pol/, I start with post frequencies of trump assembled in two ways. The first (Figure 1) shows how, soon after the announcement of Trump’s presidential bid on 16 June 2015, around 100,000 comments mention the word (2% of the total amount of posts). The frequencies spike to a staggering 8% of all comments during the build-up to Trump’s win of the Republican nomination in early 2016 and presidential election in November 2016. Figure 1: The absolute and relative amount of posts on 4chan/pol/ containing the word trump (prefixes and suffixes allowed).To follow the traces between trump and the more general discourse surrounding it, I compiled a more general “trump-dense threads” dataset. These are threads containing thirty or more posts, with at least 15% of posts mentioning trump. As Figure 2 shows, at the two peaks, 8% of any thread on /pol/ was trump-dense, accounting for approximately 15,000 monthly threads. While Trump’s presence is unsurprising, these two views show just how incredibly central the former businessman was to /pol/ at the time of the 2016 U.S. election. Figure 2: The absolute and relative amount of threads on 4chan/pol/ that are “trump-dense”, meaning they have thirty comments or more, out of which at least 15% contain the word trump (prefixes and suffixes allowed).Instead of picking a certain moment from these aggregate overviews and moving to the “micro” (Latour et al.), I “circulate” further with Figure 3, showing another perspective on the trump­-dense thread dataset. It shows a scatter plot of trump-dense threads grouped per week and plotted according to how similar their vocabulary is. First, all the words per week are weighted with tf-idf, a common information retrieval algorithm that scores units on the basis if they appear a lot in one of the datasets but not in others (Spärck-Jones). The document sets are then plotted according to the similarity of their weighted vocabulary (cosine similarity). The five highest-scoring terms for the five clusters (identified with K-means) are listed in the bottom-right corner. For legibility, the scatterplot is compressed by the MDS algorithm. To get a better sense of specific vocabulary per week, terms that appeared in all weeks are filtered out (like trump or hillary). Read counterclockwise, the nodes roughly increase in time, thus showing a clear temporal change of discourse, with the first clusters being more similar in vocabulary than the last, and the weeks before and after the primary election (orange cluster) showing a clear gap. Figure 3: A scatterplot showing cosine distances between tf-idf weighted vocabularies of trump-dense threads per week. Compressed with MDS and coloured by five K-means clusters on the underlying tf-idf matrix (excluding terms that appeared in all weeks). Legend shows the top five tf-idf terms within these clusters. ★ denotes the median week in the cluster.With this map, we can trace other words appearing around trump as significant actors in the weekly documents. For instance, Trump-supportive words like stump (referring to “Can’t Stump the Trump”) and maga (“Make America Great Again”) are highly ranked in the first two clusters. In later weeks, less clearly pro-Trump terms appear: drumpf reminds of the unattractive root of the Trump family name, while impeached and mueller show the Russia probe in 2017 and 2018 were significant in the trump-dense threads of that time. This change might thus hint at growing scepticism towards Trump after his win, but it is not shown how these terms are used. Fortunately, the scatterplot offers a rudder with which to navigate to further perspectives.In keeping with Latour’s advice to keep “aggregate structures” and “local contexts” flat (165-72), I contrast the above scatterplot with a perspective on the data that keeps sentence structures intact instead of showing abstracted keyword sets. Figure 4 uses all posts mentioning trump in the median weeks of the first and last clusters in the scatterplot (indicated with ★) and visualises word trees (Wattenberg and Viégas) of most frequent words following “trump is a”. As such, they render explicit ontological associations about Trump; what is Trump, according to /pol/-anons? The first word tree shows posts from 2-8 November 2015, when fifteen Republican competitors were still in the race. As we have seen in Figure 1, Trump was in this month still “only” mentioned in around 50,000 posts (2% of the total). This word tree suggests his eventual nomination was at this point seen as an unlikely and even undesirable scenario, showing derogatory associations like retard and failure, as well as more conspiratorial words like shill, fraud, hillary plant, and hillary clinton puppet. Notably, the most prominent association, meme, and others like joke and fucking comic relief, imply Trump was not taken too seriously (see also Figure 5). Figure 4: Word trees of words following “trump is a” in the median weeks of the first and last clusters of the scatterplot. Made with Jason Davies’s Word Tree application. Figure 5: Anons who did not take Trump seriously. Screencapture taken from archive.4plebs.org (see post 1 and post 2 in context).The first word tree contrast dramatically with the one from the last median week from 18 to 24 December 2017. Here, most associations are anti-Semitic or otherwise related to Judaism, with trump most prominently related to the hate speech term kike. This prompts several questions: did /pol/ become increasingly anti-Semitic? Did already active users radicalise, or were more anti-Semites drawn to /pol/? Or was this nefarious current always there, with Trump merely drawing anti-Semitic attention after he won the election? Although the navigation did not depart from a particular critical framework, by “just following the actors” (Venturini), it already stumbled upon important questions related to popular narratives on 4chan and the alt-right. While it is tempting to stop here and explain the change as “radicalisation”, the navigation should continue to add more empirical perspectives. When doing so, the more plausible explanation is that the unlikely success of Trump briefly attracted (relatively) more diverse and playful visitors to /pol/, obscuring the presence and steady growth of overt extremists in the process.To unpack this, I first focus on the claim that a (relatively) diverse set of users flocked to /pol/ because of the Trump campaign. /pol/’s overall posting activity rose sharply during the 2016 election, which can point to already active users becoming more active, but is likely mostly caused by new users flocking to /pol/. Indeed, this can be traced in actor language. For instance, many anons professed to be “reporting in” from other 4chan boards during crucial moments in the campaing. One of the longest threads in the trump-dense threads dataset (4,504 posts) simply announces “Cruz drops out”. In the comments below, multiple anons state they arrived from other boards to join the Trump-infused activity. For instance, Figure 6 shows an anon replying “/v/ REPORTING IN”, to which sixty other users reacted by similarly affirming themselves as representatives from other boards (e.g. “/mu/ here. Ready to MAGA”). While but another particular view, this implies Trump’s surprising nomination stimulated a crowd-like gathering of different anons jumping into the vortex of trump-related activity on /pol/. Figure 6: Replies by outside-anons “reporting in” the sticky thread announcing Ted Cruz's drop out, 4 May 2016. Screenshots taken from 4plebs.org (see post 1 and post 2 in context).Other actor-language further expresses Trump’s campaign “drew in” new and unadjusted (or: less extreme) users. Notably, many anons claimed the 2016 election led to an “invasion of Reddit users”. Figure 7 shows one such expression: an annotated timeline of /pol/’s posting activity graph (made by 4plebs), posted to /pol/ on 26 February 2016 and subsequently reposted 34 times. It interprets 2016 as a period where “Trump shit goes into overdrive, meme shit floods /pol/, /pol/ is now reddit”. Whether these claims hold any truth is difficult to establish, but the image forms an interesting case of how the entirety “/pol/” is imagined and locally articulated. Such simplistic narratives relate to what Latour calls “panoramas”: totalising notions of some imagined “whole” (188-90) that, while not to be “confused with the collective”, form crucial data since they express how actors understand their own composition (190). Especially in the volatile conditions of anonymous and ephemeral imageboards, repeated panoramic narratives can help in constructing a sense of cohesion–and thereby also form interesting actors to trace. Indeed, following the panoramic statement “/pol/ is now reddit”, other gatekeeping-efforts are not hard to find. For instance, phrases urging other anons to go “back to reddit” (occurring in 19,069 posts in the total dataset) or “back to The_Donald” (a popular pro-Trump subreddit, 1,940 posts) are also particularly popular in the dataset. Figure 7: An image circulated on /pol/ lamenting that "/pol/ is now reddit" by annotating 4plebs’s posting metrics. Screenshot taken from archive.4plebs.org (see posts).Did trump-related activity on /pol/ indeed become more “meme-y” or “Reddit-like” during the election cycle, as the above panorama articulates? The activity in the trump-dense threads seems to suggest so. Figure 8 again uses the tf-idf terms from these threads, but here with the columns denoting the weeks and the rows the top scoring tf-idf terms of their respective week. To highlight relevant actors, all terms are greyed out (see the unedited sheet here), except for several keywords that indicate particularly playful or memetic vernacular: the aforementioned stump, emperor, referring to Trump’s nickname as “God Emperor”; energy, referring to “high energy”, a common catchphrase amongst Trump supporters; magic, referring to “meme magic”, the faux-ironic belief that posting memes affects real-life events; and pepe, the infamous cartoon frog. In both the tf-idf ranking and the absolute frequencies, these keywords flourish in 2016, but disappear soon after the presidential election passes. The later weeks in 2017 and 2018 rarely contain similarly playful and memetic terms, and if they do, suggest mocking discourse regarding Trump (e.g. drumpf). This perspective thus pictures the environment around trump in the run-up to the election as a particularly memetic yet short-lived carnival. At least from this perspective, “meme shit” thus indeed seemed to have “flooded /pol/”, but only for a short while. Figure 8: tf-idf matrix of trump-dense threads, columns denoting weeks and rows denoting the top hundred most relevant terms per week. Download the full tf-idf matrix with all terms here.Despite this carnivalesque activity, further perspectives suggest it did not go at the expense of extremist activity on /pol/. Figure 9 shows the absolute and relative counts of the word "jew" and its derogatory synonym "kike". Each of these increases from 2015 onwards. As such, it seems to align with claims that Trump’s success and /pol/ becoming increasingly extremist were causally related (Thompson). However, apart from possibly confusing correlation with causation, the relative presence remains fairly stable, even slightly decreasing during the frenzy of the Trump campaign. Since we also saw Trump himself become a target for anti-Semitic activity, these trendlines rather imply /pol/’s extremist current grew proportionally to the overall increase in activity, and increased alongside but not but necessarily as a partisan contingent as a result of Trump’s campaign. Figure 9: The absolute and relative frequency of the terms "jew" and "kike" on 4chan/pol/.ConclusionCombined, the above navigation implies two main changes in 4chan/pol/’s trump-related current. First, the climaxes of the 2016 Republican primaries and presidential elections seem to have invoked crowd-like influxes of (relatively) heterogeneous users joining the Trump-delirium, marked by particularly memetic activity. Second, /pol/ additionally seemed to have formed a welcoming hotbed for anti-Semites and other extremists, as the absolute amount of (anti-Semitic) hate speech increased. However, while already-present and new users might have been energised by Trump, they were not necessarily loyal to him, as professed by the fact that Trump himself eventually became a target. Together with the fact that anti-Semitic hate speech stayed relatively consistent, instead of being “countercultural” (Nagle) or exclusively pro-Trump, /pol/ thus seems to have been composed of quite a stable anti-Semitic and Trump-critical contingent, increasing proportionally to /pol/’s general growth.Methodologically, this text sought to demonstrate how a brief navigation of trump on 4chan/pol/ can provide provisional yet valuable insights regarding continuously changing current of online anonymous collectives. As the cliché goes, however, this brief exploration has left more many questions, or rather, it did not “deploy the content with all its connections” (Latour 147). For instance, I have not touched on how many of the trump-dense threads are distinctly separated and pro-Trump “general threads” (Jokubauskaitė and Peeters). Considering the vastness of such tasks, the necessity remains to find appropriate ways to “accurately map” the wild currents of the dissimulative Web–despite how muddy they might get.NoteThis text is a compressed and edited version of a longer MA thesis available here.ReferencesAbramson, Seth. “Listen Up, Progressives: Here’s How to Deal with a 4Chan (“Alt-Right”) Troll.” Medium, 2 May 2017. <https://medium.com/@Seth_Abramson/listen-up-progressives-heres-how-to-deal-with-a-4chan-alt-right-troll-48594f59a303>.Auerbach, David. “Anonymity as Culture: Treatise.” Triple Canopy, n.d. 22 June 2020 <https://www.canopycanopycanopy.com/contents/anonymity_as_culture__treatise>.Beran, Dale. “4chan: The Skeleton Key to the Rise of Trump”. Medium, 14 Feb. 2017. <https://medium.com/@DaleBeran/4chan-the-skeleton-key-to-the-rise-of-trump-624e7cb798cb>.Beran, Dale. It Came from Something Awful: How a Toxic Troll Army Accidentally Memed Donald Trump into Office. New York: All Points Books, 2019.Bernstein, Michael S, Andrés Monroy-Hernández, Drew Harry, Paul André, Katrina Panovich, and Greg Vargas. “4chan and /b/: An Analysis of Anonymity and Ephemerality in a Large Online Community.” Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media, 2011.Coleman, Gabriella. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous. London: Verso Books, 2014.De Laet, Marianne, and Annemarie Mol. “The Zimbabwe Bush Pump: Mechanics of a Fluid Technology.” Social Studies of Science 30.2 (2000): 225–263. 1 May 2020 <https://journals.sagepub.com/doi/10.1177/030631200030002002>. De Zeeuw, Daniel, and Marc Tuters. “Teh Internet Is Serious Business: On the Deep Vernacular Web Imaginary.” Cultural Politics 16.2 (2020).Dewey, Caitlin. “The Only True Winners of this Election are Trolls.” The Washington Post, 3 Nov. 2016. <https://www.washingtonpost.com/news/the-intersect/wp/2016/11/03/the-only-true-winners-of-this-election-are-trolls/>.Faris, Robert, Hal Roberts, Bruce Etling, Nikki Bourassa, Ethan Zuckerman, and Yochai Benkler. “Partisanship, Propaganda, and Disinformation: Online Media and the 2016 U.S. Presidential Election.” Berkman Klein Center Research Publication, 2017. <http://nrs.harvard.edu/urn-3:HUL.InstRepos:33759251>.Garfinkel, Harold. Studies in Ethnomethodology. New Jersey: Prentice-Hall, 1967.Hagen, Sal. “Rendering Legible the Ephemerality of 4chan/pol/.” OILab.eu, 12 Apr. 2020. <https://oilab.eu/rendering-legible-the-ephemerality-of-4chanpol/>.Hawley, George. Making Sense of the Alt-Right. New York: Columbia UP, 2017.Jokubauskaitė, Emilija, and Stijn Peeters. “Generally Curious: Thematically Distinct Datasets of General Threads on 4chan/Pol/”. Proceedings of the International AAAI Conference on Web and Social Media 14.1 (2020): 863-7. <https://www.aaai.org/ojs/index.php/ICWSM/article/view/7351>.Latour, Bruno. Reassembling the Social: An Introduction to Actor-Network Theory. New York: Oxford UP, 2005.Latour, Bruno, Pablo Jensen, Tommaso Venturini, Sébastian Grauwin, and Dominique Boullier. “‘The Whole Is Always Smaller than Its Parts’. A Digital Test of Gabriel Tarde’s Monads.” British Journal of Sociology 63.4 (2012): 590-615.Marantz, Andrew. Antisocial: Online Extremists, Techno-Utopians, and the Hijacking of the American Conversation. New York: Penguin Random House, 2019.Nagle, Angela. Kill All Normies: Online Culture Wars from 4chan and Tumblr to Trump and the White House. Winchester: Zero Books, 2017.Phillips, Whitney. This Is Why We Can’t Have Nice Things: Mapping the Relationship between Online Trolling and Mainstream Culture. Cambridge: MIT Press, 2015.———. “The Alt-Right Was Conjured Out of Pearl Clutching and Media Attention.” Motherboard, 12 Oct. 2016 <https://www.vice.com/en_us/article/jpgaeb/conjuring-the-alt-right>.———. “The Oxygen of Amplification: Better Practices for Reporting on Extremists, Antagonists, and Manipulators Online.” Data & Society, 2018. <https://datasociety.net/wp-content/uploads/2018/05/1_PART_1_Oxygen_of_Amplification_DS.pdf>.———. “It Wasn’t Just the Trolls: Early Internet Culture, ‘Fun,’ and the Fires of Exclusionary Laughter.” Social Media + Society (2019). <https://journals.sagepub.com/doi/10.1177/2056305119849493>.Phillips, Whitney, Gabriella Coleman, and Jessica Beyer. “Trolling Scholars Debunk the Idea That the Alt-Right’s Shitposters Have Magic Powers.” Motherboard, 22 Mar. 2017. <https://motherboard.vice.com/en_us/article/z4k549/trolling-scholars-debunk-the-idea-that-the-alt-rights-trolls-have-magic-powers>.Robertson, Adi. “Hillary Clinton Exposing Pepe the Frog Is the Death of Explainers.” The Verge, 15 Sep. 2016. <https://www.theverge.com/2016/9/15/12926976/hillary-clinton-trump-pepe-the-frog-alt-right-explainer>.Spärck Jones, Karen. “A Statistical Interpretation of Term Specificity and its Application in Retrieval.” Journal of Documentation 28.1 (1972): 11-21.Stuart, Tessa. “Inside the DeploraBall: The Trump-Loving Trolls Plotting a GOP Takeover.” Rolling Stone, 20 Jan. 2017. <https://www.rollingstone.com/politics/politics-features/inside-the-deploraball-the-trump-loving-trolls-plotting-a-gop-takeover-128128/>.Tarde, Gabriel. The Laws of Imitation. Ed. and trans. Elsie Clews Parsons. New York: Henry Holt and Company, 1903.Thompson, Andrew. “The Measure of Hate on 4chan.” Rolling Stone, 10 May 2018. <https://www.rollingstone.com/politics/politics-news/the-measure-of-hate-on-4chan-627922/>.Venturini, Tommaso. “Diving in Magma: How to Explore Controversies with Actor-Network Theory.” Public Understanding of Science 19.3 (2010): 258-273.Wattenberg, Martin, and Fernanda Viégas. “The Word Tree, an Interactive Visual Concordance.” IEEE Transactions on Visualization and Computer Graphics 14.6 (2008): 1221-1228.
APA, Harvard, Vancouver, ISO, and other styles
49

Krause, Olga, Iryna Pinyak, and Svitlana Shpylyk. "SOCIAL RESPONSIBILITY IN THE CONTEXT OF BUSINESS DEVELOPMENT." International scientific journal "Internauka". Series: "Economic Sciences", no. 11(67) (2022). http://dx.doi.org/10.25313/2520-2294-2022-11-8381.

Full text
Abstract:
The need to implement the principles of social responsibility of business arose in 1970 in the USA and Great Britain as a result of the requirements of the public regarding the necessity to ensure compliance with the following conditions: social protection and prevention of discrimination of hired workers; responsible choice of business partners; guarantee of quality and safety of products; careful attitude of business to society and ecology; compliance with the norms of openness and transparency of business conduct; taking into account public interests in making strategic business decisions. The norms and principles of social responsibility of business are established by the International Standard ISO 26000:2010. Principles and norms of social responsibility of business are aimed at regulation of the following issues: organizational management; human rights; labor relations; environment; good business practices; social and economic development of society. In the current situation, the time of companies that are focused on maximizing their current profits has passed, modern business should be oriented toward long-term development prospects with clear adherence to the norms and principles of social responsibility and transition in the digital economy. In accordance with the requirements of Directive 2014/95/EU, since 2018, large companies have to reflect non-financial indicators in annual reports, at that, having the right to choose which recommendations to follow – International, EU or national norms. In the world practice it is accepted to distinguish several models of social responsibility of business: european, british, american, asian and african. The development of social responsibility of business in Ukraine began in 2000 years, to achieve systemic and qualitative changes in 2008 an expert organization has been established on public institutions in Kyiv «Development of corporate social responsibility». In 2010-2011, the working group of the Committee on Industry and Regulatory Policy and Entrepreneurship of the Verkhovna Rada of Ukraine the concept of the national strategy of social responsibility of business has been developed. The need to ensure the cyber-stability of management and production business processes, the need to provide a remote business environment, The transition to the Internet of things has become an incentive to move business to the digital square economy. The process of forming social responsibility under the conditions of business deditalization has an impact external and internal factors, some of which pose threats. Conduct business in the context of ensuring social responsibility rules and regulations creates additional value of the company and competitive advantages.
APA, Harvard, Vancouver, ISO, and other styles
50

Nicholson, Judith. "Sick Cell." M/C Journal 4, no. 3 (June 1, 2001). http://dx.doi.org/10.5204/mcj.1913.

Full text
Abstract:
The mobile telephone, or cellular telephone as it is called in North America, is the fastest-growing consumer product of the past decade. [1] Despite its popularity, metaphors of risk, contamination, and illness frequently run through stories about cellphone use. These representations are based mostly on a lingering but unproven link between brain cancer and cellphone use. Despite numerous scientific studies, none have definitively ruled out the risk and none have found conclusive evidence of harm. The claim that cellphone use is potentially dangerous or downright carcinogenic is supported instead by plenty of anecdotal evidence, rumour, urban myth, and "junk science." What is interesting to me is that these different representations of cellphone use as a practice that poses relative, absolute and no risk can coexist and persist, despite obvious contradictions. I suggest that Donna Haraway's concept of breached boundaries and Ulrich Beck's notion of "risk society" can be employed superficially to make sense of how we negotiate these different representations. In order to begin a discussion about why cellphone use in North America continues to be represented as a potentially risky practice, it is necessary to mention one story that is frequently credited as being the starting point for the narrative of fear and anxiety informing these representations. In spite of its germinal status, the story is but the latest embodiment of the narrative. It begins in August 1988 in Florida when David Reynard gave his wife Susan the gift of a cellphone. Seven months later, a medical scan revealed a tumour in Susan's brain. She claimed that as a result of being bombarded by radiation from the cellphone, the damaged cells either caused her tumour or accelerated the growth of an existing tumour. In April 1992, Susan launched a lawsuit against the phone's manufacturer, the company that provided the cellular service, and the retail store that sold the phone. A month after filing the lawsuit, Susan died of brain cancer. In January 1993, David Reynard was interviewed on the highly-rated CNN show Larry King Live. The interview sent shockwaves through the telecommunications industry. Stock prices of the major cellphone companies fell and some subscribers cancelled their contracts and returned their phones. Spokespeople for the industry countered David's accusations with claims that electromagnetic energy is as harmless as the oxygen we breathe. In fact, they said, it is already all around us in natural and artificial forms, including in emissions from the earth and sun. A spokesperson for Motorola, a major cellphone manufacturer, predicted that Susan's lawsuit would fail because "thousands" of studies had been conducted, which proved that radiation emitted by cellphones was not dangerous to users. In fact, no such studies existed. The lie was revealed when journalists and Susan's lawyer asked to see the studies. Almost as if to make up for the lie, the Cellular Telecommunications Industry Association,[2] a lobby group for North American cellular service providers, created the Wireless Research Center. Not surprisingly, the Center produced findings during its six-year mandate that were mostly favourable to the industry. In 1995, Susan's lawsuit was dismissed by a judge who said no reliable scientific evidence had been presented to link cellphone use to cancer. Expert witnesses for the defence had argued that the evidence presented on her behalf was merely wild speculation, "junk science," and a perversion of science masquerading as real science. Over a dozen similar lawsuits have been filed in the U.S. and the U.K. since. Few of them have surpassed Susan's lawsuit in notoriety and none have earned a favourable ruling. While it is still both mocked and venerated in the popular media and is the focus of derision in the telecom industry press and in medical science journals, the question central to the case (but does it cause cancer?) is still unresolved and so are the contradictions now associated with it. Did Susan's own body generate her tumour or was it generated by cellphone radiation? Where is the line between junk science and real science? Is artificial radiation from a cellphone as harmless as natural radiation from the earth or sun? These questions are indicative of some of the boundary breakdowns that Haraway claims are causing disorder and contradiction in late twentieth-century Western culture, namely between human and machine, between the physical and non-physical, and between natural and artificial. According to Beck, the degeneration of these boundaries are also indicative of a risk society characterised by environmental degradation. Because this degeneration is both perceived and potential, it hardly matters anymore what is rational or irrational, legitimate science or junk science. Both factual and fictional texts contribute to our knowledge of risks surrounding cellphone use as a biohazard that is a threat to individual bodies and to the social body. A series of events occurring throughout the 90s in North America added to the ambiguity and mystery surrounding cellphone use. Numerous rumours circulated about the practice sparking explosions at petrol stations and causing interference with car brakes, airbags, and electric wheelchairs. In addition, Health Canada and the U.S . Food and Drug Administration issued several bulletins to alert the public that cellphone use could cause heart pacemakers, hospital monitoring equipment, and aeroplane navigational instruments to malfunction. Susan's lawsuit ended when the court imposed closure, but the narrative embodied by the lawsuit continued in these rumours and warnings. The lawsuit was an event with a clear beginning and end. The narrative of fear and anxiety about contamination that could lead to illness, disease, and death preceded the lawsuit and was already embodied in other stories, particularly ones surrounding cancer and AIDS. When Susan launched her lawsuit, in some media reports, the cellphone was called the "new cancer villain" and the potential link between cancer and cellphone use was deemed the "yuppies version of AIDS." The comparison of cellphone use to cancer and AIDS functions both as a cultural and biological metaphor. It links the practice explicitly with disease and implicitly with death, and it also recalls the narrative of fear and anxiety surrounding cancer and AIDS, two potentially fatal diseases which preceded the introduction of cellphones. Seventeen years have passed since the cellphone became widely available in North America. Currently, almost nine million Canadians, or one in three people, own a cellphone. In the United States, there are 108 million users. Subscriptions there are increasing at the rate of approximately 46,000 each day or about one new owner every two seconds. The recent flood of private talk in public places in North America is being represented in popular media as a contamination of the social body, a morally repugnant practice, and a menace to civil society. A moral panic has arisen over cellphone use because it allows conversations to be audible and the user to be visible where before they were inaudible and the user was invisible by virtue of being hidden away in homes, offices, and phone booths. In public places the voice of the cellphone user extends the self and claims more space, which in turn impinges on the personal space of others. It is like a stranger's unwelcome touch. Proof that the moral panic has reached a new level in Canada may be evident in a request from the federal government last March for public opinion on whether devices known as silencers or jammers should be licensed for use so that businesses and institutions can disable cellphones within a particular radius when necessary. As a result of the popular use of the term "cellphone" in North America, a neat conflation of meaning is occurring between cellphone use as a potential threat to biological cells in the human body and the practice as a perceived threat to the physical spatial cells of personal spaces that comprise the social body. Stories about cellphone use as hazard articulate a narrative of fear and anxiety we share that cannot simply be dismissed as absurd. How people respond to cellphone use and the health questions and moral panic surrounding it cannot be decided by medical or legal experts alone. Consequently, in a risk society characterised by a peculiar synthesis of "empirical knowledge" and "indefinite uncertainty," the question "does it cause cancer?" becomes irrelevant. According to Beck, it may be more useful to ask "how do we want to live?" Endnotes [1] "Cellphone" (a contraction of cellular and telephone) is the popular term for "mobile telephone" in North America. "Mobile phone" usually refers to car phones with an antennae mounted on the roof or window of the car. [2] The Cellular Telecommunications Industry Association was recently renamed the Cellular Telecommunications & Internet Association. References Adams, Barbara, Ulrich Beck, and Joost van Loon, eds. The Risk Society and Beyond: Critical Issues for Social Theory. London: Sage Publications, 2000. Carlo, George, and Martin Schram. Cell Phones: Invisible Hazards in the Wireless Age. New York: Carroll & Graf Publishers, 2001. Erni, John. Unstable Frontiers: Technomedicine and the Cultural Politics of "Curing" AIDS. Minneapolis: University of Minnesota Press, 1994. Haraway, Donna. Simians, Cyborgs and Women: The Reinvention of Nature. New York: Routledge, 1991. Industry Canada. "Notice No. DGTP-002-01 Silencers (Devices Capable of Interfering with or Blocking Mobile Telephone Communications)." Gazette Notices Pertaining to Broadcasting, Radiocommunications and Telecommunications (Mar. 9, 2001). Lakoff, Georg, and Mark Johnson. Metaphors We Live By. Chicago: Chicago University Press, 1980. Milloy, Stephen J. "Cellphone Hysteric." National Post (June 23, 2000): C19. Nelson, Nancy J. "Recent Studies Show Cell Phone Use is Not Associated with Increased Cancer Risk." Journal of the National Cancer Institute 93.3 (Feb. 7, 2001): 170-172. Park, Robert L. "Cellular Telephones and Cancer: How Should Science Respond?" Journal of the National Cancer Institute 93.3 (Feb. 7, 2001): 166-167. Stacey, Jackie. Teratologies: A Cultural Study of Cancer. London & New York: Routledge, 1997.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography