Journal articles on the topic 'Architecture and state – United States – Washington (D.C.)'

To see the other types of publications on this topic, follow the link: Architecture and state – United States – Washington (D.C.).

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Architecture and state – United States – Washington (D.C.).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Longstreth, Richard. "The Neighborhood Shopping Center in Washington, D. C., 1930-1941." Journal of the Society of Architectural Historians 51, no. 1 (March 1, 1992): 5–34. http://dx.doi.org/10.2307/990638.

Full text
Abstract:
During the 1930s the neighborhood shopping center emerged as an important phenomenon in the development of retail facilities in the United States. Prior to that decade, the type was limited to a modest number of examples built as components of planned residential subdivisions for the well-to-do. By the eve of World War II, the neighborhood shopping center was seen as an advantageous means of meeting the routine needs of people in outlying urban areas generally. During the 1930s, the neighborhood center also became one of the first common building forms to experience a basic reconfiguration to accommodate patterns of widespread automobile usage. Washington, D. C., was the initial and by far the most intensive proving ground for this work at its formative stage. The results were influential nationwide in the shopping center's transformation from a novelty to a ubiquitous feature of the American landscape.
APA, Harvard, Vancouver, ISO, and other styles
2

Dung, J. K. S., L. M. Carris, and P. B. Hamm. "First Report of Ustilago cynodontis Causing Smut of Cynodon dactylon in Washington State, United States." Plant Disease 98, no. 2 (February 2014): 280. http://dx.doi.org/10.1094/pdis-05-13-0560-pdn.

Full text
Abstract:
Bermudagrass (Cynodon dactylon) is an important warm-season perennial turf and forage grass that is typically grown in warm, tropical and subtropical climates. Smutted inflorescences of bermudagrass were observed and collected in Benton County, Washington, United States, in October of 2012 in an unmanaged, naturalized area located near the banks of the Columbia River and adjacent to large expanses of managed turf containing bermudagrass. The climate in this area is favorable to bermudagrass due to the relatively mild winters and hot, dry summers that usually occur in this region. The infected plants occurred in patches alongside healthy plants and several disease foci were observed along a 100-m transect of non-contiguous bermudagrass. The disease was severe wherever it occurred. Diseased inflorescences were covered with black-brown teliospores, distorted, and frequently failed to fully emerge and develop. Teliospores (n = 80) were irregularly globose to subglobose, 5.3 to 7.0 × 4.5 to 6.2 μm (mean 6.4 × 5.9 μm) and 6.2 to 8.8 × 5.3 to 7.0 μm (mean 7.0 × 6.5 μm), with a smooth wall approximately 1 μm thick, and were consistent with previous descriptions of Ustilago cynodontis teliospores (1,3). Teliospores germinated within 24 h when plated on 0.2% malt agar at 16°C and produced 4-celled basidia in a 3+1 arrangement, also consistent with U. cynodontis (3). Basidia gave rise to lateral and terminal, ovoid to long ellipsoidal basidiospores. Basidiospores budded or germinated by hyphae from which lateral or terminal aerial sporidia developed as previously described (3,4). DNA was extracted from sporidia of three single-spored isolates grown in malt extract broth. Complete nucleotide sequences of the 5.8S ribosomal RNA coding region and partial sequences of the internal transcribed spacer (ITS) regions 1 and 2 were obtained from the three isolates using ITS1 and ITS4 primers. The corresponding regions of the three aligned sequences (GenBank Accession Nos. KC920742 to KC920744) were identical and exhibited 99 to 100% identity with U. cynodontis strains previously deposited in GenBank (HM143013, AY740168, AF038825, and AY345000). Representative specimens were deposited in the WSU Mycological Herbarium as WSP 72345 to WSP 72348. This is the first report of U. cynodontis causing smut on bermudagrass in Washington State and represents the northernmost record of this fungus in North America (2). The occurrence of U. cynodontis in Washington State suggests that the pathogen may exist in other hot and dry areas of northwestern North America where bermudagrass is found associated with turf in recreational, landscape, or natural settings. References: (1) S. D. Brook. Trans. R. Soc. N. Z. 84:643, 1957. (2) D. F. Farr and A. Y. Rossman. Fungal Databases, Systematic Mycology and Microbiology Laboratory, ARS, USDA. Online. Retrieved from http://nt.ars-grin.gov/fungaldatabases , April 18, 2013. (3) C. T. Ingold. Trans. Br. Mycol. Soc. 83:251, 1984. (4) C. T. Ingold. Trans. Br. Mycol. Soc. 89:471, 1987.
APA, Harvard, Vancouver, ISO, and other styles
3

Kravets, Danylo. "Functioning of Ukrainian Bureau in Washington D. C. (March 1939 – May 1940)." Proceedings of Vasyl Stefanyk National Scientific Library of Ukraine in Lviv, no. 11(27) (2019): 142–57. http://dx.doi.org/10.37222/2524-0315-2019-11(27)-8.

Full text
Abstract:
The aim of the Ukrainian Bureau in Washington was propaganda of Ukrainian question among US government and American publicity in general. Functioning of the Bureau is not represented non in Ukrainian neither in foreign historiographies, so that’s why the main goal of presented paper is to investigate its activity. The research is based on personal papers of Ukrainian diaspora representatives (O. Granovskyi, E. Skotzko, E. Onatskyi) and articles from American and Ukrainian newspapers. The second mass immigration of Ukrainians to the US (1914‒1930s) has often been called the «military» immigration and what it lacked in numbers, it made up in quality. Most immigrants were educated, some with college degrees. The founder of the Ukrainian Bureau Eugene Skotzko was born near Western Ukrainian town of Zoloczhiv and immigrated to the United States in late 1920s after graduating from Lviv Polytechnic University. In New York he began to collaborate with OUN member O. Senyk-Hrabivskyi who gave E. Skotzko task to create informational bureau for propaganda of Ukrainian case. On March 23 1939 the Bureau was founded in Washington D. C. E. Skotzko was an editor of its Informational Bulletins. The Bureau biggest problem was lack of financial support. It was the main reason why it stopped functioning in May 1940. During 14 months of functioning Ukrainian Bureau in Washington posted dozens of informational bulletins and send it to hundreds of addressees; E. Skotzko, as a director, personally wrote to American governmental institutions and foreign diplomats informing about Ukrainian problem in Europe. Ukrainian Bureau activity is an inspiring example for those who care for informational policy of modern Ukraine.Keywords: Ukrainian small encyclopedia, Yevhen Onatsky, journalism, worldview, Ukrainian state. Keywords: Ukrainian Bureau in Washington, Eugene Skotzko, public opinion, history of journalism, diaspora.
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Jianhua, Stephen T. Muench, Joe P. Mahoney, Nadarajah Sivaneswaran, Linda M. Pierce, and George C. White. "The Highway Development and Management System in Washington State." Transportation Research Record: Journal of the Transportation Research Board 1933, no. 1 (January 2005): 52–61. http://dx.doi.org/10.1177/0361198105193300107.

Full text
Abstract:
The Highway Development and Management System (HDM-4) developed by the World Bank is a powerful pavement management software tool capable of performing technical and economic appraisals of road projects, investigating road investment programs, and analyzing road network preservation strategies. Its effectiveness is dependent on the proper calibration of its predictive models to local conditions. Although significant work has been done in calibrating and applying HDM-4 worldwide (especially in developing nations), no substantial effort has been made within the United States. This paper describes the calibration and application of HDM-4 (Version 1.3) to the Washington State Department of Transportation's (WSDOT) road network. WSDOT hopes to use HDM-4 to supplement its existing Washington State Pavement Management System (WSPMS) in long-term pavement performance and financial needs. Significant findings are that ( a) HDM-4 can be used to analyze the WSDOT road network, ( b) HDM-4 was successfully calibrated for the network, ( c) the network requires calibration factors significantly different than HDM-4 default values, ( d) software issues seem to prevent use of HDM-4 portland cement concrete pavement analysis, and ( e) WSDOT can use HDM-4 to predict pavement preservation budgets quickly, select optimal preservation strategies under varying budget levels, and assist in determining the long-term effects of different funding scenarios on the road network.
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, W., F. M. Dugan, and R. McGee. "First Report of Dodder (Cuscuta pentagona) on Chickpea (Cicer arietinum) in the United States." Plant Disease 98, no. 1 (January 2014): 165. http://dx.doi.org/10.1094/pdis-03-13-0334-pdn.

Full text
Abstract:
Chickpea (Cicer arietinum L.) is an important rotational and an emerging specialty crop in the Pacific Northwest of the United States, in California, and in the Northern Great Plains of the United States and Canada. Dodders (Cuscuta spp.) are widespread parasitic weeds on many crops worldwide. Several Cuscuta species (primarily C. campestris Yuncker) have been reported to parasitize chickpea, and dodder is important on chickpea in the Indian subcontinent, the Middle East, and recently in Australia (4), but has previously not been reported from North America. On 28 July 2012, a chickpea field near Walla Walla, WA, was found parasitized by dodder. The chickpea was at late flowering and early pod filling stages and there were no other visible green weedy plants as observed from the canopy. There were about 15 dodder colonies varying in size from 2 to 15 meters in diameter in the field of about 500 acres. Chickpea plants in the center of the dodder colonies were wilting or dead. The colonies consisted of orange leafless twining stems wrapped around chickpea stems and spreading between chickpea plants. Haustoria of the dodder penetrating chickpea stems were clearly visible to the naked eye. Flowers, formed abundantly in dense clusters, were white and five-angled, with capitate stigmas, and lobes on developing calyxes were clearly overlapping. The dodder keyed to C. pentagona Engelm. in Hitchcock and Cronquest (3) and in Costea (1; and www.wlu.ca/page.php?grp_id=2147&p=8968 ). Specimens of dodder plants wrapping around chickpea stems with visible penetrating haustoria were collected on 28 July 2013 and vouchers (WS386115, WS386116, and WS386117) were deposited at the Washington State University Ownbey Herbarium. All dodder colonies in the field were eradicated before seed formation to prevent establishment of dodder. Total genomic DNA was isolated from dodder stems, and PCR primers ITS1 (5′TCCGTAGGTGAACCTGCGG) and ITS4 (5′TCCTCCGCTTATTGATATGC) were used to amplify the internal transcribed spacer (ITS) region of the nuclear rDNA. The ITS region was sequenced. BLAST search of the NCBI nucleotide database using the ITS sequence as query found that the most similar sequence was from C. pentagona (GenBank Accession No. DQ211589.1), and our ITS sequence was deposited in GenBank (KC832885). Dodder (C. approximata Bab.) has been historically a regional problem on alfalfa (Washington State Noxious Weed Control Board 2011). Another species stated to be “mainly” associated with legumes is C. epithymum Murr., and C. pentagona is “especially” associated with legumes (3). The latter species has sometimes been considered a variety (var. calycina) of C. campestris Yuncker (1,3). Although chickpea has been cultivated in the Walla Walla region for over 20 years, to our knowledge, this is the first time dodder has been observed on chickpea in North America. The likely source is from nearby alfalfa or other crop fields, with transmission by farm machinery or wild animals. Some chickpea germplasm exhibits partial resistance to C. campestris (2). References: (1) M. Costea et al. SIDA 22:151, 2006. (2) Y. Goldwasser et al. Weed Res. 52:122, 2012. (3) C. L. Hitchcock and A. Cronquist. Flora of the Pacific Northwest: An Illustrated Manual. University of Washington Press, Seattle, 1973. (4) D. Rubiales et al. Dodder. Page 98 in: Compendium of Chickpea and Lentil Diseases and Pests. W. Chen et al., eds. APS Press, St. Paul, Minnesota, 2011.
APA, Harvard, Vancouver, ISO, and other styles
6

Stanosz, G. R., and J. Cummings-Carlson. "Chrysomyxa weirii on Colorado Blue Spruce in Wisconsin." Plant Disease 86, no. 9 (September 2002): 1051. http://dx.doi.org/10.1094/pdis.2002.86.9.1051c.

Full text
Abstract:
In early June 2002, yellow spots and bands with erumpent telia on previous year's needles of Colorado blue spruce (Picea pungens) were noted in landscape tree nurseries in both northern (Sawyer County) and southern (Dane County) Wisconsin. Many 1 to 2 m tall trees were symptomatic at each location. Based on the age of affected needles, time of year of telium development, and telial characteristics including the size and shape of teliospores, the pathogen was identified as Chrysomyxa weirii, the cause of Weir's cushion rust (1,2). Identification of the pathogen was confirmed by Dale Bergdahl, (School of Natural Resources, University of Vermont), who also observed basidiospores. C. weirii is an autoecious microcyclic rust pathogen known to affect P. englemanii, P. glauca, P. mariana, P. pungens, and P. sitchensis. Although this fungus has been reported in the western United States from the Black Hills of South Dakota to Washington State, in the eastern United States from the southern Appalachian Mountains (Tennessee and West Virginia) to Vermont, and in most Canadian provinces and territories (1,2), to our knowledge, this is the first report from the Great Lakes Region of the United States. The occurrence of Weir's cushion rust in Wisconsin has direct implications for the economically important nursery and Christmas tree industry in this region. References: (1) D. Bergdahl and D. Smeltzer. Plant Dis. 67:918, 1983. (2) W. Ziller. The Tree Rusts of Western Canada. Canadian Forestry Service, Victoria, BC, 1974.
APA, Harvard, Vancouver, ISO, and other styles
7

Robilliard, Gordon A., Marion Fischel, William H. Desvousges, Richard W. Dunford, and Kristy Mathews. "EVALUATION OF COMPENSATION FORMULAE TO MEASURE NATURAL RESOURCE DAMAGES1." International Oil Spill Conference Proceedings 1993, no. 1 (March 1, 1993): 739–43. http://dx.doi.org/10.7901/2169-3358-1993-1-739.

Full text
Abstract:
ABSTRACT Most of the oil spills in marine, estuarine, or freshwater environments of the United States are small (less than 1,000 gallons) and result in minimal injury to natural resources or little to no loss of services. However, federal, state, and Indian tribe trustees for natural resources are entitled under a variety of laws, including the Oil Pollution Act of 1990, to collect damages (money) from responsible parties to compensate for the foregone services and restoration of the services provided by the natural resources. Alaska, Washington, and Florida have developed a formula-based approach to calculating natural resource damages resulting from most spills; the federal National Oceanic and Atmospheric Administration and several other states are considering developing a compensation formula. The ideal compensation formula is a simplified assessment process that (a) can be applied rapidly, (b) requires relatively small transaction or assessment costs, (c) requires minimal site- and spill-specific data as inputs, (d) is based on generally accepted scientific and economic principles and methods, and (e) results in damage values acceptable to both the trustees and the responsible party. In theory, a compensation formula could be applied to most small oil spills in United States waters.
APA, Harvard, Vancouver, ISO, and other styles
8

Korzhevsky, A. S., V. V. Tolstykh, and I. A. Kopylov. "Modern development of the international system and its impact on the management of the national defense of the Russian Federation." Diplomaticheskaja sluzhba (Diplomatic Service), no. 5 (September 27, 2022): 348–60. http://dx.doi.org/10.33920/vne-01-2205-02.

Full text
Abstract:
The article analyzes the current state of the system of international relations in the context of the transformation of the modern world order. It is determined that cardinal changes in the system of international relations occur due to the destructive policy of the collective West led by the United States, aimed at maintaining a unipolar world and dominance in the world political process. Under these conditions, the new centers of world development, to which the authors include Russia, China and India, tend to pursue an independent and uncontrolled foreign policy, which is not supported by Washington. It is noted that the confrontation between the leading centers of regional and world development for global leadership is accompanied by the destruction of the architecture of international security and the unleashing of a new arms race. It is stated that during the presidency of D. Trump, the United States, trying to stop the economic development of China, unleashed world sanctions wars, which resumed with the greatest force after the arrival of the new US President D. Biden and the start of a special military operation in Ukraine. It is determined that the sanctions wars gave rise to global risks, to which the authors include the destruction of the institutions of international law, the support of the West for organized transnational criminal groups in the areas of drug traffi cking and the organization of illegal migration, the fi nancing and support of the United States and its allies of terrorist and extremist organizations, radicals and Nazis. Numerous examples of numerous sanctions imposed against the Russian Federation in the political, economic, military, social, legal and other spheres of public life are given, which required the states to coordinate their actions to ensure the national security of the Russian Federation, and the federal executive authorities to develop and apply numerous countermeasures against them. The modern activities of the military-political leadership of the Russian Federation are analyzed, which made it possible to neutralize the main challenges and threats to the Russian state, increase the level of the country's defense capability, and protect the main spheres of public life of Russian society from the destructive impact of foreign policy factors. The results are summed up and the authors make a forecast about the further development of the system of international relations, as well as the place and role of the Russian Federation in them.
APA, Harvard, Vancouver, ISO, and other styles
9

Eastwell, K. C., and W. E. Howell. "Characterization of Cherry leafroll virus in Sweet Cherry in Washington State." Plant Disease 94, no. 8 (August 2010): 1067. http://dx.doi.org/10.1094/pdis-94-8-1067b.

Full text
Abstract:
A visual survey in 1998 of a commercial block of 594 sweet cherry trees (Prunus avium) in Yakima County, WA, revealed three trees of cv. Bing growing on Mazzard rootstock that exhibited a progressive decline characterized by a premature drop of yellowed leaves prior to fruit maturity and small, late ripening cherries that were unsuitable for the fresh market. Many young branches of these trees died during the winter, resulting in a sparse, open canopy depleted of fruiting shoots. The budded variety of a fourth tree had died, allowing the F12/1 rootstock to grow leaves that showed intense line patterns. Prunus necrotic ringspot virus or Prune dwarf virus are common ilarviruses of cherry trees but were only detected by ELISA (Agdia, Elkhart, IN) in two of the Bing trees. A virus was readily transmitted mechanically from young leaves of each of the two ilarvirus-negative trees to Chenopodium quinoa and Nicotiana occidentalis strain ‘37B’, which within 5 days, developed systemic mottle and necrotic flecking, respectively. Gel analysis of double-stranded RNA (dsRNA) isolated from C. quinoa revealed two abundant bands of approximately 6.5 and 8.0 kbp. The C. quinoa plants and the four symptomatic orchard trees were free of Arabis mosaic virus, Blueberry leaf mottle virus, Peach rosette mosaic virus, Raspberry ringspot virus, Strawberry latent ringspot virus, Tobacco ringspot virus, Tomato black ring virus, and Tomato ringspot virus when tested by ELISA. However, C. quinoa leaf extracts reacted positively in gel double diffusion assays with antiserum prepared to the cherry isolate of Cherry leafroll virus (CLRV) (2). A CLRV-specific primer (3) was used for first strand synthesis followed by self-primed second strand synthesis to generate cDNAs from the dsRNA. A consensus sequence of 1,094 bp generated from three clones of the 3′-untranslated region (3′-UTR) of CLRV (GenBank Accession No. GU362644) was 98% identical to the 3′-UTR of CLRV isolates from European white birch (GenBank Accession Nos. 87239819 and 87239633) and 96% identical to European CLRV isolates from sweet cherry (GenBank Accession Nos. 87239639 and 8729640) (1). Reverse transcription (RT)-PCR using primers specific for the 3′-UTR (CGACCGTGTAACGGCAACAG, modified from Werner et al. [3] and CACTGCTTGAGTCCGACACT, this study), amplified the expected 344-bp fragment from the original four symptomatic trees and two additional symptomatic trees in the same orchard. Seventy-two nonsymptomatic trees were negative by the RT-PCR for CLRV. In 1999, CLRV was detected by RT-PCR in six of eight samples and seven of eight samples from declining trees in two additional orchards located 2.5 km and 23.3 km from the original site, respectively. Sequences of the 344-bp amplicons from these sites were 99.7% identical to those obtained from the first site. To our knowledge, this is the first report of the natural occurrence of CLRV in sweet cherry in the United States. Unlike other nepoviruses, CLRV appears not to be nematode transmitted; however, since this virus can be seed and pollen borne in some natural and experimental systems, its presence in independent orchards of a major production region raises concern about its long term impact on sweet cherry production. References: (1) K. Rebenstorf et al. J. Virol. 80:2453, 2006. (2) D. G. A. Walkey et al. Phytopathology 63:566, 1973. (3) R. Werner et al. Eur. J. For. Pathol. 27:309, 1997.
APA, Harvard, Vancouver, ISO, and other styles
10

Márquez Roa, Ubaldo. "ACERCAMIENTO AL TERRORISMO (AN APPROACH TO TERRORISM)." Universos Jurídicos, no. 18 (June 8, 2022): 75–140. http://dx.doi.org/10.25009/uj.vi18.2626.

Full text
Abstract:
Resumen: El presente artículo se encuentra dividido en cinco apartados que permiten que su lectura y comprensión sea mucho más amigable. Es interesante y entender que el tema del terrorismo es un tema de naturaleza dinámica y cambiante, en el artículo se estudiara los diferentes tipos de terrorismo que existe y el impacto que ha tenido en el establecimiento de los estados de seguridad pública, así como la afectación a los derechos humanos de las personas y los regímenes jurídicos en los cuales se tipifica esta figura. Abstract: This article is divides into five sections that allow its reading and understanding to be much more user-friendly. It is interesting to understand that the issue of terrorism is a dynamic and changing issue, the article will study the different types of terrorism that exist and the impact it has had on the establishment of states of publica security as well as the impact to the human rights of persons and the legal regimes in which this figure is typified. Fuentes de consulta: Arendt H. (2006) Sobre la revolución, Madrid: Alianza. Báez Corona, J. F. (2015). El realismo mágico jurídico (recreación legal de una ficción literaria con especial referencia a Latinoamérica). Justicia. (28), 15-31. doi:http://dx.doi.org/10.17081/just.20.28.1032 Báez, J. (2021). Tradición contra innovación en los modelos de formación jurídica universitaria en México. Revista de Derecho. (56). 137-153. https://dx.doi.org/10.14482/dere.56.340 Bakke E. (2015) Terrorism and Conterterrorism studies, comparing theory and practice, Netherlands, Leiden University Press. Bobbio N. (2004) Estado, Gobierno y Sociedad por una teoría general de la política, México, Fondo de Cultura Económica. Caillois R. (1973) La cuesta de la guerra (trad.) Rufina Bórquez, México, Fondo de Cultura Económica. Coteño Muñoz A. (2018) “Terrorismo individual los atentados perpetrados por actores solitarios” Eunomía. Revista en Cultura de la Legalidad, número 15 Madrid, Universidad Carlos III. Donner, F. (2007) “Fight for God- But Do So with Kindness: Reflections on War, Peace, and Communal Identity in Early Islam”. In War and Peace in the Ancient World, Oxford. Blackwell. Durham M. (2000) The Christian right, the far right and the Boundaries of American Conservatism. Manchester: Manchester University Press. Dworkin R, (2013) “Foreword”, in Extreme Speech and Democracy, Oxford, Oxford University Press. Essig, C. (2001). Terrorism: Criminal Act of Act of War? Implications for National Security in the 21st Century. Pennsylvania: US Army War College. Foucault, M. (2009) Historia de la sexualidad 1. La voluntad de saber, México, Siglo XXI. Friedman B, H., Harper J, Preble C. (2010) Terrorizing ourselves. Why U.S. Counterterrorism Policy is Failing and How to Fix It. Washington D.C. Instituto Cato. Gallego, C. (2012). El concepto de seguridad jurídica en el Estado social. Revistas jurídicas. Vol 2, Núm 9, Recuperado de http://juridicas.ucaldas.edu.co/downloads/Juridicas9(2)_6.pdf Griset, P. L., Mahan, S. (2003) Terrorism in perspective, United States of America. Sage Publications Inc. González Calleja, E. (2013). El Laboratorio del Miedo, Madrid, Crítica. Habermas J. (1998) Derechos humanos y soberanía popular. Las versiones liberal y republicana, en Rafael del Águila, Fernando Val, Madrid, Alianza Habermas J. (1994) La desobediencia civil, piedra de toque del Estado democrático de Derecho, en Ensayos políticos, Barcelona, Península. Heydar S. (2017) Islamic Peace Ethics. Legitimate and Illegitimate Violence in Contemporary Islamic Thought. United States of America, Baden-Baden: NomosAschendorff Verlag. Hoffman B., Howard R. (2011) Terrorism and counterterrorism: Understandin the new security environment readings and interpretations: 4a eth, United States of America, Mcgraw-Hill. Hoffman, B. (2006). Inside Terrorism. New York: Columbia University Press. Jackson, R, et al., (2011) Terrorism. A Critical Introduction, New York, Palgrave Macmillian Jassies N. (2009) Mrinus Van Der Lubbe y el incendio del Reichstag. Trad., García Velasco C., España, Editorial Alikornio. Jellinek G (1954) Teoría Geenral de los Estados. Trad. Fernando de los Ríos. Buenos Aires, ed. Albatroz. Jenkins, B.M. (1975), "International Terrorism: A New Mode of Conflict", in Garitón D, y Schaerf C. Internactional Terrorism and World Security, Londres, Cromm Helm. Johnston, T. D. (1981). Selective costs and benefits in the evolution of learning. En J. S. Rosenblatt, R .A. Hinde, C. Beer y M. C. Busnel (Eds.). Advances of the study of behavior. New York: Academic Press Kilpatrick J (2020) Quand un état d’urgence temporarire devient permanent, le cas de la France. París, Transnational Institute. Khadduri, M. (1955) War and Peace in the Law of Islam. Baltimore, The Johns Hopkins Press. Kyrou, A. (2012). L’imaginaire des Anonymous, des luddites à V pour Vendetta. París Folis esssays Lasoen, K. (2018). “War of Nerves: The Domestic Terror Threat and the Belgian Army”. In Studies in Conflict & Terrorism, vol. 42, no. 11. Le Goff J. (1984) La Civilisation d l’occident médiéval, París, Foils Essay. Lillich, B. R. (1985) Paris Minimum Standards of Human Rights Norms in a State of Emergency, The American Journal of International Law, Vol. 79, No. 4 Locke J. (1997), Segundo tratado sobre el gobierno civil, Madrid, Alianza. Loubet Del Bayle, J. L. (1992) La Police. Approche socio-politique. Paris, Montchrestien. Luhmann, N. (2005) El derecho de la sociedad, 2a ed., México, Herder, Universidad Iberoamericana. Majoran, A. (2015). The illusion of war: Is terrorism a criminal act or an act of war? International Politics Reviews, Vol.3 Issue 1 Martin J-C, (2006) Les règles internationales relatives à la lutte contre le terrorismo. París, edición Bruylant. Nateras González M, E. (2018) Colombia Las autodefensas en Michoacán, México: ¿rescate de la ciudadanía ante la violencia? Revista Opinión Jurídica, Universidad de Medellín, Vol. 17, Núm. 33 Placido A. P., y Perkins L K. (2010) Drug Trafficking violence in México implications for the United States. Washington D.C. U.S. Senate Caucus on International Narcotics Control Departmente of Justice Poczynok, I. (2019). Fuerzas armadas y contraterrorismo. Apuntes para renovar un “debate crónico” en la Argentina. Revista Relaciones Internacionales, Estrategia Y Seguridad, vol. 2, Núm. 14 Poland J. (2004) Understanding Terrorism: Groups, Strategies and responses. New York. Pretince Hall. Rawls J (1999) La justificación de la desobediencia civil, en Justicia como equidad. Materiales para una teoría de la justicia, Madrid, Tecnos. Reinares, F y García-Calvo, C. (2016) Estado Islámico en España. Madrid: Real Instituto Elcano. Rivas, P., y Rey, P. (2008) Las autodefensas y el paramilitarismo en Colombia (1964-2003), Bogotá, CON Fines. Rapoport, D. (2004). “The four waves of modern terrorism”. En Audrey, C. y James, L. Attacking Terrorism: Elements of a Grand Strategy. Washington D.C. George town University Press Rodley N. (1985) International Human Rights Law, dans Evans, M. D, International Law, Oxford, Oxford University Press. Reitberger M (2013) “License to kill: is legitimate authority a requirement for just war? in International Theory, Cambridge, Cambridge University Press, Vol. 5, Issue 1. Robespierre Maximilien (2005) Por la felicidad y por la libertad, discursos. España, El viejo topo. Rousseau J. J., (2013) Discurso sobre el origen y fundamento de la desigualdad entre los hombres, Madrid, Calpe. Tinnes J. (2020) Bibliography: Defining and Conceptualizing Terrorism Compiled PERSPECTIVES ON TERRORISM Volume 14, Issue 6, The Netherlands Universiteit Leiden. recuperado de https://www.universiteitleiden.nl/perspectives-on-terrorism/archives/2020#volume-xiv-issue-6 Toboso Buezo M. (2020) Colección Segmentos de Seguridad Terrorismo y antiterrorismo. España. Institut de Seguretat Pública de Catalunya.. Saint Thomas Aquinas (2003) On law, morality and Politics, translated by Regan Richard United States of America, Hackett publishing company. Sinai, J. (2008) “How to Define Terrorism”, Perspectives on Terrorism, Journal of the Terrorism Research Initiative and the Center for Terrorism and Security Studies, The Netherlands, Universiteit Leiden, Vol. 2, No.4, recuperado de http://www.terrorismanalysts.com/pt/index.php/pot/article/view/33/html Skinner, B. F. (1953) Science and human behavior. New York, The Macmillan Company. United States Department of State. (2004) Patterns of Global Terrorism 2003 Washington, DC: Office of the Secretary of State, Office of the Coordinator for Counterterrorism. Valadés D. (1974) La dictadura constitucional en América Latina, México, UNAM. Walther T C., Höhn A., (2020) El ejército alemán y sus graves problemas con la ultraderecha. DW noticiero recuperado de https://www.dw.com/es/el-ej%C3%A9rcito-alem%C3%A1n-y-sus-graves-problemas-con-la-ultraderecha/a-54044495 Wallace, D. (2008). Combatiendo el terrorismo bajo las leyes de la guerra. Military Review Hispan-American, Vol. 88, Issue 2 Weber M. (1986) El político y el científico. (trad) Francisco Rubio Llorente, Madrid, Alianza Editorial.
APA, Harvard, Vancouver, ISO, and other styles
11

Wilson, A. W., J. L. Beckerman, and M. C. Aime. "First Report of the White Pine Blister Rust Fungus, Cronartium ribicola, on Ribes odoratum in Indiana." Plant Disease 98, no. 2 (February 2014): 277. http://dx.doi.org/10.1094/pdis-04-13-0442-pdn.

Full text
Abstract:
Cronartium ribicola J. C. Fisch., causal agent of white pine blister rust (WPBR), is one of the most damaging pathogens of five-needle pines, forming aecial states on the trunk and branches and causing cankering, topkill, and branch dieback. Infection can predispose hosts to attack by other pests such as bark beetles, and can result in host mortality. Various species of Ribes, Pedicularis, and Castilleja are alternate hosts on which C. ribicola forms its uredinial and telial states during the mid-summer to fall. In an effort to mitigate the damage caused by white pine blister rust, the planting of ornamental species of Ribes, such as R. occidentalis, is prohibited in 14 states. Indiana currently has no restrictions on the planting of Ribes spp. Since 2010, a Cronartium sp. has been observed producing uredinia and telia on R. odoratum ‘Crandall’ H.L. Wendl. leaves in an urban environment in West Lafayette, Indiana. Symptoms include yellow-orange lesions on the leaf upper surface with uredinia on the underside. These persist from late summer until leaf drop. Telia were collected in 2011 to establish the identity of the causal agent using morphological and molecular analyses. Morphological comparisons between this specimen and other Cronartium species were made using Arthur (2). Filiform telial columns ranged from 0.5 to 1.5 mm in length. Teliospores were cylindrical to sub-ventricose, truncate on either end with one end generally tapering more than the other, and measured 9.0 to 18.6 × 37.2 to 60.0 μm (average 11.9 × 47.4 μm from 30 spores across 4 leaves). These teliospore measurements overlap those of C. ribicola and C. occidentale, but are more consistent with C. ribicola, in which the spores are wider and longer (8 to 12 × 30 to 60 μm) than in C. occidentale (9 to 10 × 27 to 56 μm). For molecular analyses, two nuclear ribosomal loci were sequenced: the internal transcribed spacer regions 1, 2, and 5.8S (ITS) and the 5′ end of the large subunit (28S) (1). The ITS sequence was 665 bp long (KF387533) and the 28S was 892 bp (KC876675). These sequences were queried to GenBank using a BLASTn search. The 28S shared 99% identity (891/892 bp) and the ITS shared 100% identity (663/663 bp) to other published C. ribicola sequences with no close matches to any other species with either locus. Both morphological and molecular methods indicate this species to be C ribicola, making this a first report of white pine blister rust on R. odoratum in Indiana. This fungus has been observed previously on R. odoratum in the northeastern United States (Connecticut, Massachusetts, Rhode Island, Vermont, and New Hampshire), the Rockies (Colorado), northwestern United States (Washington), and Canada (3). In Indiana, C. ribicola has also been reported on R. cysnobati. There are no other reports of this fungus on any other host within the state. However, the aecial host, Pinus strobus, does grow within the state, and within West Lafayette. To our knowledge, WPBR has only been observed (not reported) once in Indiana in the past 30 years (Paul Pecknold, personal communication). Further monitoring of C. ribicola hosts is needed in Indiana to determine the extent of the disease. The specimen has been vouchered in the Arthur Herbarium (PUR N6734). References: (1) M. C. Aime. Mycoscience 47:112. 2006. (2) J. F. Arthur. Manual of the Rusts in United States and Canada. Purdue Research Foundation, 1934. (3) D. F. Farr and A. Y. Rossman. Fungal Databases Systematic Mycology and Microbiology Laboratory, ARS, USDA. Retrieved from http://nt.ars-grin.gov/fungaldatabases/ April 23, 2013.
APA, Harvard, Vancouver, ISO, and other styles
12

Toit, L. J. du, D. A. Inglis, and G. Q. Pelter. "Fusarium proliferatum Pathogenic on Onion Bulbs in Washington." Plant Disease 87, no. 6 (June 2003): 750. http://dx.doi.org/10.1094/pdis.2003.87.6.750a.

Full text
Abstract:
Fusarium oxysporum f. sp. cepae and an unidentified Fusarium species have been reported to cause bulb rot of onion (Allium cepa L.) in Washington (1). In August and September 2002, a salmon-pink discoloration was observed on the outer three to four layers of dry scales of approximately 20% of white onion bulbs of cv. Cometa F1, in each of two 20-acre fields in the Columbia Basin of central Washington. Isolations from the discolored areas of the dry scales onto water agar and potato dextrose agar (PDA) yielded fungal colonies characteristic of F. proliferatum (3). The isolates formed long, V-shaped chains of microconidia on polyphialides. Pathogenicity of the isolates of F. proliferatum was tested on white onion bulbs purchased at a local grocery store. The outermost dry scales of each bulb were removed, and the bulb was inoculated by one of three methods: (i) a 5-mm3 section of the fleshy scales was removed using a scalpel, the wound was filled with a 3-mm2 plug of PDA colonized by F. proliferatum, the plug was covered with the section of scale that had been removed, and the inoculation site was covered with Parafilm; (ii) the basal plate of the bulb was dipped into a suspension of 106 microconidia per ml; or (iii) the basal plate was dipped into the spore suspension after wounding by inserting a dissecting needle into the bulb to a depth of 1 cm. A noninoculated bulb provided a control treatment. Bulbs were incubated in a moist chamber at 13°C and examined for discoloration of the outer scales and development of bulb rot. After 2 weeks, salmon-pink discoloration of the outer scales was observed at the inoculation site for both methods of dip inoculation, but not for the plug inoculation method. After 3 weeks, water-soaked, tan to golden, shrunken, soft tissue was observed on the remainder of each dip inoculated bulb, but symptoms of basal rot did not develop. Symptoms were similar to those reported in Idaho for a bulb rot of stored onions caused by F. proliferatum (2). One of the nonwounded inoculated bulbs did not develop a bulb rot, but pinkish discoloration was observed beneath the outer scales and in the neck. F. proliferatum was reisolated from the inoculated bulb tissues. The discoloration observed on the white onions raised concern about the potential for infection to develop into bulb rot in storage. However, thorough curing of the bulbs immediately upon storage restricted infection to the outer dry scales. Similar symptoms were observed at harvest on the bulbs of other white onions in a cultivar trial located near Quincy, WA, although symptoms were not observed on yellow or red cultivars in the trial. The same symptoms were later observed on approximately 70% of bulbs harvested from a 32-acre fresh-market crop of the cv. Sterling in the Columbia Basin. These symptomatic bulbs were rejected for the fresh market. To our knowledge, this is the first report of infection of onion bulbs by F. proliferatum in Washington, which in 2001, had the third largest acreage of onions in the United States after California and Oregon (USDA National Agricultural Statistics Service). References: (1) D. F. Farr et al. Fungi on Plants and Plant Products in the United States. The American Phytopathological Society, St. Paul, MN, 1989. (2) S. K. Mohan et al. (Abstr.) Phytopathology 87:S67, 1997. (3) P. E. Nelson et al. Fusarium species: An Illustrated Manual for Identification. The Pennsylvania State University Press, University Park, 1983.
APA, Harvard, Vancouver, ISO, and other styles
13

Villamor, D. E. V., K. F. Ward, S. J. Collman, and K. C. Eastwell. "First Report of Infection of Cherry Rusty Mottle Associated Virus in Portuguese Laurel (Prunus lusitanica) in Washington State." Plant Disease 98, no. 5 (May 2014): 699. http://dx.doi.org/10.1094/pdis-09-13-0921-pdn.

Full text
Abstract:
During late spring of 2012 in Snohomish County of Washington State, chlorotic yellow leaf blotch symptoms suggestive of a virus infection were observed on Portuguese laurel (Prunus lusitanica) planted in a hedge row. Leaf samples from representative trees were initially tested for the presence of Cherry leaf roll virus (CLRV) and Plum pox virus (PPV) by ELISA with antibodies specific to CLRV and general potyvirus, respectively (Agdia, Inc., Elkhart, IN). The ELISA test yielded negative results for both viruses. Reverse transcription (RT)-PCR was pursued to detect other viruses known to infect Prunus spp., namely American plum line pattern virus (APLPV), Apple chlorotic leafspot virus (ACLSV), Cherry mottle leaf virus (CMLV), Cherry raspleaf virus (CRLV), Cherry virus A (CVA), Prune dwarf virus (PDV), and Prunus necrotic ringspot virus (PNRSV), as well as CLRV and PPV. None of these viruses were detected. However, RT-PCR with a generic primer pair Fovea2/AdPr (3) that amplifies the coat protein (CP) coding sequence and 3′-untranslated regions (3′-UTR) of several members of the family Betaflexiviridae yielded a 1.4-kb amplicon that was cloned into pCR2.1 (Invitrogen, Carlsbad, CA) and sequenced (GenBank Accession No. KF356396). The sequences from three clones were 99.8% identical to each other at the nucleotide level. Comparison of the consensus CP coding region with the nucleotide sequence database revealed 86 to 93% identity to Cherry rusty mottle associated virus (CRMaV), and only 73 to 75% identities to Cherry necrotic rusty mottle virus (CNRMV) (1) and 71 to 76% identities to Cherry green ring mottle virus (CGRMV) (4) isolates from sweet cherry (P. avium). This result suggested that the cloned fragment represents a strain of CRMaV. Prunus avium ‘Bing’ and ‘Sam,’ and P. serrulata ‘Kwanzan’ were grafted with bark patches from the symptomatic tree and observed for induction of cherry rusty mottle disease (CRMD) symptoms. Ninety days after grafting, symptoms typical of CRMD consisting of chlorotic yellow mottle appeared on ‘Bing,’ ‘Sam,’ and ‘Kwanzan’ indicators. Small necrotic spots also appeared on the leaves of the latter. Angular necrotic lesions on ‘Sam’ and epinasty of ‘Kwanzan’ that are diagnostic symptoms of cherry necrotic rusty mottle disease (CNRMD) and cherry green ring mottle disease (CGRMD), respectively, were absent from graft inoculated indicators. Further RT-PCR tests on the indicators using primers specific to CNRMV, CGRMV, and CRMaV (2) yielded negative results for CNRMV and CGRMV but showed positive amplification for CRMaV. The results of the woody indexing corroborate the presence of CRMaV but the absence of CNRMV and CGRMV in the symptomatic Portuguese laurel. To our knowledge, this is the first report of CRMaV in Portuguese laurel in the United States and the first description of symptoms associated with CRMaV in this host. As a potential reservoir of CRMaV, Portuguese laurel could play an important component in management of CRMD in cherry production areas where this ornamental cherry is also present. References: (1) M. E. Rott and W. Jelkmann. Arch. Virol. 146:395, 2001. (2) D. E. V. Villamor and K. C. Eastwell. Phytopathology 103:1287, 2012. (3) D. V. Villamor et al. Arch. Virol. 158:1805, 2013. (4) Y. P. Zhang et al. J. Gen. Virol. 79:2275, 1998.
APA, Harvard, Vancouver, ISO, and other styles
14

Stansbury, Kim L., Blake Beecher, Mitzi Schumacher, Fayetta Martin, and Mary Ann Clute. "Social service providers' perspectives on casino gambling in older adult clients." Journal of Gambling Issues, no. 30 (May 1, 2015): 57. http://dx.doi.org/10.4309/jgi.2015.30.11.

Full text
Abstract:
There has been an upward trend in gambling, particularly among older adults. With the baby-boomer generation moving toward retirement, this trend is expected to increase. Availability and social acceptability of casinos in the United States are 2 of many precipitating factors for older adults' increased enthusiasm for gambling. Noticeably absent from the literature on casino gambling is the perspective of senior social service providers (SSSPs). The present study used a cross-sectional open-ended questionnaire completed by 88 SSSPs in Washington State. The purpose of this study was to describe the SSSPs' (a) perceptions of older adults' motivations to participate in casino gambling, (b) experience with older adults who have gambling problems, (c) views and knowledge of problem gambling, and (d) perception of the need for training on gambling problems. The most prevalent reasons cited for older adults to patronize casinos were the entertainment of gambling and the desire to win money. The least prevalent reasons included peer pressure, to learn new things, and for a public smoking environment. Many respondents (42.0%) felt that their clients were aware of the risks of casino gambling. However, almost one third (29.5%) reported that their clients were largely unaware of the risks. Almost all of the respondents (85.2%) reported they had not received any training regarding problem gambling. The findings indicate the need to educate SSSPs about the potential positive and negative consequences of casino gambling.
APA, Harvard, Vancouver, ISO, and other styles
15

Lupien, S. L., B. C. Hellier, and F. M. Dugan. "First Report of Onion Rust Caused by Puccinia allii on Allium pskemense and A. altaicum." Plant Disease 88, no. 1 (January 2004): 83. http://dx.doi.org/10.1094/pdis.2004.88.1.83d.

Full text
Abstract:
In June 2003, uredinial and telial pustules were seen on leaves of accession W6-12755 Allium pskemense B. Fedtsch. originating from Uzbekistan and grown for germplasm increase in Pullman, WA. W6-18947 A. altaicum Pall., originating from Mongolia, displayed similar symptoms in the same garden in June 2000. A. altaicum is a wild onion exploited for food in its native range and is ancestral to A. fistulosum L., bunching onion (2). A. pskemense is a wild perennial sometimes propagated under cultivation (2). Both species have been exploited for research in breeding and systematics of Allium and used to a lesser degree in screening for pest or disease resistance. Clustered, golden orange, amphigenous uredinia were approximately 1 × 0.5 mm and surrounded by stromatic, subepidermal, blackish telia of variable size. Urediniospores (thick-walled, pale orange, echinulate, (25-) 27 to 32 (-34) × (19-) 21 to 25 μm, with as many as 10 scattered, indistinct pores), teliospores (two-celled, smooth, golden brown, 42 to 65 × 18 to 26 μm), and mesospores (27 to 42 × 15 to 21 μm, and approximately 30% as frequent as teliospores) all approximated the description for P. allii Rudolphi (4), but were more strongly congruent with the description of Puccinia blasdalei Diet. & Holw. (1), now considered a synonym (4). Specimens are deposited with WSP, Washington State University, Pullman. P. allii or its synonyms have been recorded from over 30 species of Allium (1,3,4), but to our knowledge, this is the first report of this rust on A. pskemense or A. altaicum. References: (1) J. C. Arthur. Manual of the Rusts in United States and Canada, Hafner Publishing, N.Y., 1962. (2) J. L. Brewster. Onions and Other Vegetable Alliums. CABI, Wallingford, Oxon, U.K, 1994. (3) D. F. Farr et al. Fungal Databases, Systematic Botany and Mycology Laboratory, On-line publication. ARS, USDA, 2003. (4) G. F. Laundon and J. M. Waterston. Puccinia allii. No. 52 in: Descriptions of Pathogenic Fungi and Bacteria. CMI, Kew, Surrey, U.K., 1965.
APA, Harvard, Vancouver, ISO, and other styles
16

Lee, H. B., H. W. Lee, and H. Y. Mun. "First Report of Powdery Mildew Caused by Erysiphe platani on Sycamore (Platanus occidentalis) in South Korea." Plant Disease 97, no. 6 (June 2013): 841. http://dx.doi.org/10.1094/pdis-10-12-0940-pdn.

Full text
Abstract:
Platanus occidentalis L. (sycamore) is an important shade tree distributed throughout the Northern Hemisphere and in South Korea. It has been widely used as an ornamental tree, especially in urban regions and by roadsides. The average rate of roadside planting throughout South Korea covers about 5.7% (up to 38% in Seoul), equivalent to 0.36 million trees. In early July 2012, after a rainy spell in summer, an outbreak of powdery mildew on sycamore was first observed on roadside trees in Gwangju, a southern province of South Korea. A more extensive nationwide survey revealed no powdery mildew in northern or central regions of South Korea. The disease has spread rapidly within Gwangju, even though fungicide applications were carried out after the rainy spell. Major symptoms included white, superficial mycelia, grey to brown lesions on the surface of the leaves due to the presence of a hyperparasite (tentatively identified as Ampelomyces sp.), a slight chlorosis, and severe leaf distortion followed by defoliation. Conidiophores were produced singly, straight, and unbranched, with lengths of 35.2 to 315.2 μm (average 170.4 μm). Conidia were ellipsoid or doliiform, ranging in size from 34.9 to 47.4 μm (average 38.2 μm) long × 16.5 to 26.8 μm (average 23.9 μm) wide. Primary conidia had a truncate base and rounded apex; secondary conidia had both a truncate base and apex. The conidial outer surface had a reticulated wrinkling. Cleistothecia (i.e., sexual spore structures) were not found during the survey, which extended from July to October. These characteristics and the host species match those of Microsphaera platani (syn. Erysiphe platani), which was described on P. occidentalis in Washington State (2). Fungal rDNA was amplified using primers ITS1 and LR5F (4) for one sample (EML-PLA1, GenBank JX485651). BLASTn searches of GenBank revealed high sequence identity to E. platani (99.5% to JQ365943 and 99.3% to JQ365940). Recently, Liang et al. (3) reported the first occurrence of powdery mildew by E. platani on P. orientalis in China based only on its morphology. Thus, in this study, author could only use ITS sequence data from the United States and Europe to characterize the isolate. To date, nine records of powdery mildews of Platanus spp. have been reported worldwide: on P. hispanica from Brazil, Japan, Hungary, and Slovakia; P. orientalis from Israel; P. racemosa from the United States; P. × acerifolia from the United Kingdom and Germany; and Platanus sp. from Argentina and Australia (1). Interestingly, the hyperparasite, Ampelomyces sp., was found with E. platani, suggesting that there may be some level of biocontrol in nature. Pathogenicity was confirmed by gently pressing diseased leaves onto six leaves of healthy sycamore plants in the field in September. The treated leaves were sealed in sterilized vinyl pack to maintain humid condition for 2 days. Similar symptoms were observed on the inoculated leaves 10 days after inoculation. Koch's postulates were fulfilled by re-observing the fungal pathogen. To our knowledge, this is the first report of powdery mildew caused by E. platani on sycamore in South Korea. References: (1) D. F. Farr and A. Y. Rossman. Fungal Databases, Systematic Mycology and Microbiology Laboratory, ARS, USDA. http://nt.ars-grin.gov/fungaldatabases/ , 2012. (2) D. A. Glawe. Plant Health Progress, doi:10.1094/PHP-2003-0818-01-HN, 2003. (3) C. Liang et al. Plant Pathol. 57:375, 2008. (4) T. J White et al., pp. 315-322 in: PCR Protocols: A Guide to Methods and Applications. M. A. Innis et al., ed. Academic Press, New York, 1990.
APA, Harvard, Vancouver, ISO, and other styles
17

Babu, B., E. Newberry, H. Dankers, L. Ritchie, J. Aldrich, G. Knox, and M. Paret. "First Report of Xanthomonas axonopodis Causing Bacterial Leaf Spot on Crape Myrtle." Plant Disease 98, no. 6 (June 2014): 841. http://dx.doi.org/10.1094/pdis-10-13-1082-pdn.

Full text
Abstract:
Crape myrtle (Lagerstroemia sp.) is a popular ornamental tree in the United States and the industry produced 2,781,089 trees in 2010 with a value exceeding US $42.8 million (1,4). A new disorder of crape myrtle has been observed since 2011 in numerous nurseries in Florida, which was characterized by dark brown, angular to irregularly shaped, oily-looking spots surrounded by yellow halos. The disease primarily affects lower leaves that eventually turn yellow and can lead to rapid defoliation of susceptible cultivars. Plants examined in field surveys at the University of Florida, North Florida Research and Education Center, Quincy, FL in 2012 and 2013 also had similar symptoms on cvs. Arapaho, Carolina Beauty, Tuscarora, Whit IV Red Rocket, Whit VIII Rhapsody in Pink, and White Chocolate. The disease severity ranged from 20 to 70% and all the plants were infected. A yellow-pigmented, gram-negative, oxidase negative bacterium was consistently isolated from symptomatic leaves (two leaves from each of five plants). Pathogenicity tests were performed using five isolated bacterial strains on potted crape myrtle cv. Arapaho. Three plants were inoculated with a 108 CFU/ml suspension of bacterial strains in sterile deionized water, and covered with transparent plastic bag for 48 h. Two control plants were inoculated with sterile distilled water. The inoculated plants were then incubated in a greenhouse at 30 to 34°C for 14 days. Symptoms of dark brown, angular to irregularly shaped lesions were observed only on the inoculated plants after 7 days. The bacterium was re-isolated from the inoculated symptomatic plants as described above, thus fulfilling Koch's postulates. Fatty acid methyl ester profiling of the five isolated bacteria using GC-MIDI (Microbial IDentification Inc, Newark, DE) revealed the identity of the bacterium as Xanthomonas axonopodis with an identity index of ~0.80, but matched multiple pathovars. Total genomic DNA was extracted from the pure bacterial culture using UltraClean Microbial DNA Isolation Kit (MO BIO Laboratories, Carlsbad, CA). The genomic DNA was subjected to PCR assay using universal primers 27f/1492R (3) targeting the complete 16S rRNA gene and primers 16F945/23R458 (2), which target the partial 16S-23S internal transcribed spacer region. PCR amplification using primer pairs 27f/1492R and 16F945/23R458 resulted in amplicons of 1,450 and 1,500 bp, respectively. The amplicons were gel purified and sequenced directly at Florida State University. BLAST analysis of the sequences (Accession Nos. KF926678, KF926679, KF926680, KF926681, and KF926682) revealed the identity of the bacterium as X. axonopodis, ranging from 98 to 99%, with several strains in the NCBI database. Phylogenetic analysis using the neighbor-joining method showed that our strains were distantly clustered with X. axonopodis pv. dieffenbachiae when compared to other available strains in the database. To our knowledge, this is the first worldwide report of a bacterial leaf spot on crape myrtle caused by X. axonopodis. This information should aid in the development of breeding lines with resistance to bacterial leaf spot and effective disease management practices. References: (1) C. S. Furtado. Garden Bull. 24:185, 1969. (2) C. Guasp. Int. J. Syst. Evol. Microbiol. 50:1629, 2000. (3) D. J. Lane. Page 115 in: Nucleic Acid Techniques in Bacterial Systematics, 1991. (4) USDA. 2007 Census of Agriculture, Washington, DC. 3:25, 2010.
APA, Harvard, Vancouver, ISO, and other styles
18

WASHINGTON, ELLIS. "EXCLUDING THE EXCLUSIONARY RULE: NATURAL LAW VS. JUDICIAL PERSONAL POLICY PREFERENCES*." Deakin Law Review 10, no. 2 (July 1, 2005): 772. http://dx.doi.org/10.21153/dlr2005vol10no2art304.

Full text
Abstract:
<div class="page" title="Page 1"><div class="layoutArea"><div class="column"><p><span>* </span><span>A previous versions of this article was published in C. James Newlan’s journal, T</span><span>HE </span><span>S</span><span>OCIAL </span><span>C</span><span>RITIC</span><span>, </span><span>as Ellis Washington, </span><span>Excluding the Exclusionary Rule</span><span>, 3 T</span><span>HE </span><span>S</span><span>OC</span><span>. C</span><span>RITIC </span><span>(1998), and in E</span><span>LLIS </span><span>W</span><span>ASHINGTON</span><span>, T</span><span>HE </span><span>I</span><span>NSEPARABILITY OF </span><span>L</span><span>AW AND </span><span>M</span><span>ORALITY</span><span>: T</span><span>HE </span><span>C</span><span>ONSTITUTION</span><span>, N</span><span>ATURAL </span><span>L</span><span>AW AND THE </span><span>R</span><span>ULE OF </span><span>L</span><span>AW </span><span>16-28 (2002) [</span><span>hereinafter </span><span>W</span><span>ASHINGTON</span><span>, I</span><span>NSEPARABILITY OF </span><span>L</span><span>AW AND </span><span>M</span><span>ORALITY</span><span>]. For a comprehensive legal and historical analysis regarding the integration of the rule of law, jurispru- dence, and society in modern times, </span><span>see generally </span><span>Ellis Washington, </span><span>Reply to Judge Richard A. Posner on the Inseparability of Law and Morality</span><span>, 3 R</span><span>UTGERS </span><span>J. L. &amp; R</span><span>ELIG</span><span>. 1 (2001-2002); </span><span>The Nuremberg Trials: The Death of the Rule of Law </span><span>(In International Law), 49 L</span><span>OY</span><span>. L. R</span><span>EV</span><span>. 471-518 (2003). </span></p><p><span>** </span><span>Ellis Washington, DePauw University; B.A. 1983, University of Michigan; M.M. 1986, John Marshall Law School; J.D. 1994. The author an editor at the U</span><span>NIVERSITY OF </span><span>M</span><span>ICHIGAN </span><span>L</span><span>AW </span><span>R</span><span>EVIEW </span><span>and a law clerk for the Rutherford Institute. He was a faculty member at Davenport University and member of the Board of Visitors at Ave Maria School of Law. Currently, Mr. Washington is a freelance writer and lecturer at high schools, universities, and law schools throughout America specializing in the history of law, legal and political philosophy, jurisprudence, constitutional law, critical race theory, and legal feminist theory. He also teaches composition at Lansing Community College. In addition to numerous articles, he has published three books: T</span><span>HE </span><span>D</span><span>EVIL IS IN THE </span><span>D</span><span>ETAILS</span><span>: E</span><span>SSAYS ON </span><span>L</span><span>AW</span><span>, R</span><span>ACE</span><span>, P</span><span>OLITICS AND </span><span>R</span><span>ELIGION </span><span>(1999); B</span><span>EYOND </span><span>T</span><span>HE </span><span>V</span><span>EIL</span><span>: E</span><span>SSAYS IN THE </span><span>D</span><span>IALECTICAL </span><span>S</span><span>TYLE OF </span><span>S</span><span>OCRATES </span><span>(2000, 2004); T</span><span>HE </span><span>I</span><span>NSEPRABILITY OF </span><span>L</span><span>AW AND </span><span>M</span><span>ORALITY</span><span>: T</span><span>HE </span><span>C</span><span>ONSTITUTION</span><span>, N</span><span>ATURAL </span><span>L</span><span>AW AND THE </span><span>R</span><span>ULE OF </span><span>L</span><span>AW </span><span>(2002). His article, </span><span>The Nuremberg Trials: The Death of the Rule of Law (In International Law)</span><span>, 49 L</span><span>OY</span><span>. L. R</span><span>EV</span><span>. 471-518 (2003), has received both national and international recognition and has been accepted into many prestigious archives and collections including–Chambers Library of the Supreme Court of the United States, State Museum of Auschwitz-Birkenau, The Simon Wiesenthal Center, The U.S. Holocaust Memorial Museum, The Elie Wiesel Foundation for Humanity. </span></p><p><span>*Exceeding gratitude to my friend, attorney Che Ali Karega (a.k.a. “Machiavelli”) for his antagonism, advice, ideas, source materials, and inspiration. To Arthur LaBrew, musicologist and historian, founder Michigan Music Research Center (Detroit), for his prescient comments and attention to detail on earlier drafts of the Article. To C. James Newlan, publisher of the Journal, T</span><span>HE </span><span>S</span><span>OCIAL </span><span>C</span><span>RITIC</span><span>, for being my friend, my first publisher, an intellectual, a visionary, and the first person to believe that I had ideas worthy to be published and read. </span></p></div></div></div>
APA, Harvard, Vancouver, ISO, and other styles
19

Segara, Nuansa Bayu, Enok Maryani, Nana Supriatna, and Mamat Ruhimat. "INVESTIGATED THE IMPLEMENTATION OF MAP LITERACY LEARNING MODEL." Geosfera Indonesia 3, no. 2 (August 28, 2018): 146. http://dx.doi.org/10.19184/geosi.v3i2.7808.

Full text
Abstract:
This article presents the results of the first implementation of map literacy learning model in middle school classes - this is the preliminary test. The implementation of this learning model will gain optimal results when it is conducted by following all the component of the model such as the syntax, theoretical framework, social system, teachers' roles, and support system. After the model implementation has been completed, the results showed that there was significantly different in students' spatial thinking skills before and after the treatment. However, the implementation also revealed that the model has some technical issues and thus to be improved. In a social system revision, the teacher has to be flexibly provide scaffolding every time he/she sees that the students need it. Teacher's book is significantly important to help a teacher lead the learning process. After improvement of the model has been completed, then it is ready to be implemented in the main field testing stage. Keywords: map literacy, social studies learning, spatial thinking References Abbasnasab, S., Rashid, M., & Saad, M. (2012). Knowledge with Professional Practice A Sociocultural Perspective on Assessment for Learning : The Case of a Malaysian Primary School ESL Context, 66, 343–353. http://doi.org/10.1016/j.sbspro.2012.11.277 Adeyemi, S. B., & Cishe, E. N. (2015). Effects of Cooperative and Individualistic Learning Strategies on Students’ Map Reading and Interpretation. International Journal of Arts & Sciences, 8(7), 383–395. Bednarz, S. W., Acheson, G., & Bednarz, R. S. (2006). Maps and Map Learning in Social Studies. Social Education, 70(7), 398–404. http://doi.org/10.4324/9780203841273 Brophy, J., & Alleman, J. (2009). Meaningful social studies for elementary students. Teachers and Teaching, 15(3), 357–376. http://doi.org/10.1080/13540600903056700 Cohen, L., Manion, L., Morrison, K., & Wyse, D. (2010). A Guide To Teaching Practice (5th ed.). London and New York: Rotledge. Churcher, K. M. A., Downs, E., & Tewksbury, D. (2014). “ Friending ” Vygotsky : A Social Constructivist P edagogy of Knowledge Building Through Classroom Social Media Use, 14(1), 33–50. Durmuş, Y. T. (2016). Effective Learning Environment Characteristics as a requirement of Constructivist Curricula: Teachers’ Needs and School Principals’ Views. International Journal of Instruction, 9(2), 183–198. http://doi.org/10.12973/iji.2016.9213a Fani, T., & Ghaemi, F. (2011). Implications of Vygotsky ’ s Zone of Proximal Development ( ZPD ) in Teacher Education : ZPTD and Self-scaffolding. Procedia - Social and Behavioral Sciences, 29(Iceepsy), 1549–1554. http://doi.org/10.1016/j.sbspro.2011.11.396 Gauvain, M. (1993). The Development of Spatial Thinking in Everyday Activity. Developmental Review, 13, 92–121. Hribar, G. C. (2015). Using Map-Based Investigations with Elementary Students. In ESRI Education GIS Conference (pp. 1–26). Huynh, N. T., & Sharpe, B. (2013). An Assessment Instrument to Measure Geospatial Thinking Expertise An Assessment Instrument to Measure Geospatial Thinking Expertise. Journal of Geography, 112(October 2014), 3–41. http://doi.org/10.1080/00221341.2012.682227 Ishikawa, T. (2012). Geospatial Thinking and Spatial Ability: An Empirical Examination of Knowledge and Reasoning in Geographical Science. The Professional Geographer, (July 2015), 121018062625002. http://doi.org/10.1080/00330124.2012.724350 Jessie A. (1951). Maps and Slow-Learners. Journal of Geography, 50:4, 145-149, DOI: 10.1080/00221345108982661 Jo, I., Bednarz, S., & Metoyer, S. (2010). Selecting and Designing Questions to Facilitate Spatial Thinking. The Geography Teacher, 7(2), 49–55. http://doi.org/10.1080/19338341.2010.510779 Joyce, B.R., Weil, M., & Calhoun, E. (2014). Models of Teaching (8th Ed). New Jersey: Pearson Education. Key, L.V., Bradley, J.A., & Bradley, K.A. (2010).Stimulating Instruction in Social Studies. The Social Studies, 101:3, 117-120, DOI: 10.1080/00377990903283932 Leinhardt, G., Stainton, C., & Bausmith, J. M. (1998). Constructing Maps Collaboratively. Journal of Geography, 97(1), 19–30. http://doi.org/10.1080/00221349808978821 Logan, J. R. (2012). Making a Place for Space: Spatial Thinking in Social Science. Annual Review of Sociology, 38(1), 507–524. http://doi.org/10.1146/annurev-soc-071811-145531 Logan, J. R., Zhang, W., & Xu, H. (2010). Applying spatial thinking in social science research. GeoJournal, 75(1), 15–27. http://doi.org/10.1007/s10708-010-9343-0 National Reseach Council. (2006). Learning to Think spatially. Washington, D.C.: The National Academic Press. Retrieved from www.nap.edu NCSS. (2016). A Vision of Powerful Teaching and Learning in the Social Studies, 80(3), 180–182. Saekhow, J. (2015). Steps of Cooperative Learning on Social Networking by Integrating Instructional Design based on Constructivist Approach. Procedia - Social and Behavioral Sciences, 197(February), 1740–1744. http://doi.org/10.1016/j.sbspro.2015.07.230 Uttal, D. H. (2000). Maps and spatial thinking: a two-way street. Developmental Science, 3(3), 283–286. http://doi.org/10.1111/1467-7687.00121 Verma, K. (2014). Geospatial Thinking of Undergraduate Students in Public Universities in The United States. Texas State University. Wiegand, P. (2006). Learning and Teaching with Maps. London and New York: Routledge Taylor & Francis Group. Retrieved from http://cataleg.udg.edu/record=b1373859~S10*cat
APA, Harvard, Vancouver, ISO, and other styles
20

Barreyro, Gladys Beatriz. "Novas regulações na educação superior: do Estado Avaliador à acreditação em escala global (New regulations in higher education: from the Evaluative State to accreditation at the global scale)." Revista Eletrônica de Educação 13, no. 3 (September 2, 2019): 837. http://dx.doi.org/10.14244/198271993530.

Full text
Abstract:
The text analyzes the transformation of the accreditation/evaluation) of higher education from a policy of the Evaluative State, in the ´80s, to a global policy with different modalities. Based on the concepts developed by Susan Robertson and Roger Dale in relation to the multi-scalar governance of higher education, it is shown the existence of accreditation policies at different scales, as well as the participation of different institutions and actors (international, private and non profit). The impact of the General Agreement on Trade and Services (GATS) in higher education, and specifically in evaluation/accreditation, generated policies such as global accreditation and regional accreditations. Also new institutions as accreditation agencies, and new strategies as guidelines for accreditation appeared, which are presented and analyzed in the text. It derives from a research, based on bibliography, documentary analysis and interviews with experts in internationalization and evaluation of higher education.ResumoO texto analisa a transformação da acreditação/avaliação da educação superior de uma política do Estado Avaliador na década de 1980 para uma política global desdobrada em diversas modalidades. A partir de conceitos desenvolvidos por Susan Robertson e Roger Dale acerca da governança multiescalar da educação, será mostrada a existência de políticas de avaliação em diversas escalas, assim como a participação de diversas instituições e atores (internacionais, privados e do terceiro setor). Mostra-se que o impacto do Acordo Geral de Comercio e Serviços (GATS) na educação superior e, especificamente na avaliação/acreditação, gerou políticas tais como o acreditador global e as acreditações regionais; e instituições como as agências de acreditação nacionais e/ou regionais e as redes dessas agências, que elaboram diretrizes apresentadas e analisadas no texto. Este é produto de pesquisa baseada em bibliografia, análise documental e entrevistas com especialistas em internacionalização e avaliação da educação superior.ResumenEl texto analiza la transformación de la acreditación/evaluación de la educación superior de una política del Estado Evaluador, en la década de 1980, a una política global desdoblada en diversas modalidades. A partir de conceptos desarrollados por Susan Robertson y Roger Dale acerca de la gobernanza multiescalar de la educación superior, será mostrada la existencia de políticas de evaluación en diferentes escalas, así como la participación de diversas instituciones y actores (internacionales, privados y del tercer sector). Se afirma que el impacto del Acuerdo General de Comercio y Servicios (GATS) en la educación superior y, específicamente en la evaluación/acreditación, generó políticas tales como el acreditador global y las acreditaciones regionales e instituciones como las agencias de acreditación, las redes de agencias que elaboran directrices para acreditación que son presentadas y analizadas en el texto. Este deriva de una investigación, basada en bibliografía, análisis documental y entrevistas con especialistas en internacionalización y evaluación de la educación superior.Palavras-chave: Educação superior, Avaliação da educação superior; Acreditação, Governança multiescalar.Keywords: Higher education, Higher education evaluation, Accreditation, Multi-scalar governance.Palabras clave: Educación superior, Evaluación de la educación superior, Acreditación, Gobernanza multiescalar.ReferencesAFONSO, Almerindo Janela. Mudanças no Estado-avaliador: comparativismo internacional e teoria da modernização revisitada. Rev. Bras. Educ., Rio de Janeiro, v. 18, n. 53, p. 267-284, jun. 2013.AFONSO, Almerindo Janela. Avaliação educacional. Regulação e emancipação. 3ª. ed. São Paulo: Cortez, 2000.ALTBACH, Philip; KNIGHT, Jane. The internationalization of higher education: motivations and realities. Journal of Studies in International Education, v. 11, n. 3-4, p. 290-305, 2007.ANDERSON, Perry. Balanço do neoliberalismo. In: SADER, Emir; GENTILI, Pablo. Pós-neoliberalismo. As políticas sociais e o estado democrático. São Paulo: Paz e Terra, 1996.BARREYRO, Gladys Beatriz. A “Acreditação Mercosul” e a Agenda Interna da Política de Educação Superior Brasileira. SOUSA. A. S.Q.; CAMARGO, A. M.M. Interfaces da Educação Superior no Brasil. Curitiba: Editora CVR, 2014, p.49-61.BARREYRO, Gladys Beatriz. A avaliação da educação superior em escala global: da acreditação aos rankings e os resultados de aprendizagem. Avaliação, Campinas; Sorocaba, v. 23, n. 1, p. 5-22, mar. 2018.BARREYRO, Gladys Beatriz. O discurso da qualidade da educação superior e seus desdobramentos em políticas globais, regionais e nacionais. 2017. 174p. ils.; grafs.; anexos. Tese (Livre Docência). Faculdade de Educação da Universidade de São Paulo, São Paulo, 2017.BARREYRO, Gladys Beatriz; HIZUME, Gabriela de Camargo. Agências de avaliação e acreditação. In: ROTHEN, J. C; SANTANA, A. C. M. (Orgs.) Avaliação da educação: referências para uma primeira conversa. São Carlos: EDUFSCar, 2018a. pp. 67-79. Disponível em: http://www.edufscar.com.br/farol/edufscar/ebook/avaliacao-da-educacao-referencias-para-uma-primeira-conversa-(e-book)/52929/, acesso em 8 de jan. 2019.BARREYRO, Gladys Beatriz; HIZUME, Gabriela de Camargo. El Paraguay y la acreditación de carreras de grado en el Mercosur. Eccos. Revista científica. v. 47, p. 41-59, 2018b.BARREYRO, Gladys Beatriz; LAGORIA, Silvana Lorena. Acreditação da Educação Superior na América Latina: os casos da Argentina e do Brasil no Contexto do Mercosul. Cadernos PROLAM/USP, v. 9, p. 7-27, 2010. Disponível em: http://www.usp.br/prolam/downloads/2010_1_1.pdfBARREYRO, Gladys Beatriz; LAGORIA, Silvana Lorena; HIZUME, Gabriella de Camargo. As Agências Nacionais de Acreditação no Sistema ARCU-SUL: primeiras considerações. Avaliação, Campinas-Sorocaba, v. 20, n. 1, p.49-72, 2015.BARREYRO, Gladys Beatriz; ROTHEN, J. C. Percurso da avaliação da educação superior nos Governos Lula. Educação & Pesquisa, v. 40, n. 1, p. 61-76, 2014. BATISTA, J. P. El impacto de las negociaciones comerciales internacionales sobre la educación superior: los casos de Argentina y Brasil. Buenos Aires: Eudeba, 2012, 112 p.BLANCO RAMÍREZ, G. Quality by Association Across North-South Divides: United States Accreditation of Mexican Institutions of Higher Education. 2013. 220p. Tese (Doutorado em Política Educacional). Universidade Estadual de Massachussets-Amherst, 2013.BLUMENSTYK, G.; MCMURTRIE, B. Educators lament a corporate takeover of international accreditor. Chronicle of Higher Education. v. 47, n. 9, p. A55-57, out. 2000.CHEA INTERNATINAL QUALITY GROUP (CIQG). Frequently asked questions. Disponível em: http://www.chea.org/userfiles/uploads/ciqg-fact%20sheet-2014.pdf, acesso em jan. 2015.DALE, R. Globalisation, knowledge economy and comparative education. Comparative Education, v. 41, n. 2, p. 117-149, 2005.DIAS, M. A. R. Comercialização no ensino superior: é possível manter a ideia de bem público? Educ. Soc., Campinas, v.24, n.84, pp.817-838, set. 2003.DIAS SOBRINHO, J. Dilemas da educação superior no mundo globalizado. Sociedade do conhecimento ou economia do conhecimento. São Paulo: Casa do Psicólogo, 2005.DRAIBE, S. As políticas sociais no neoliberalismo. Revista da USP, Dossiê Liberalismo-neoliberalismo. São Paulo, n. 17, p. 86-101, 1993.EUROPEAN NETWORK FOR QUALITY ASSURANCE (ENQA). Criterios y Directrices para la Garantía de Calidad en el Espacio Europeo de Educación Superior. European Association for Quality Assurance in Higher Education, 2005, Helsinki. Disponível em: http://www.enqa.net/bologna.lasso., acesso em: 12 maio 2017.GENTILI, P. (org.) Pedagogia da exclusão. Crítica ao neoliberalismo em educação. Petrópolis: Vozes, 1995.GINKEN, H.; DIAS, M. A. Retos institucionales y políticos de la acreditación en el ámbito internacional. In: GLOBAL UNIVERSITY NETWORK FOR INOVATION (GUNI) La educación superior en el mundo. 2007. Acreditación para la garantía de la calidad: Qué está en juego? Madri: Ed. Mundi Prensa, 2006, p. 37-57.GLOBAL INITIATIVE FOR QUALITY ASSURANCE CAPACITY (GIQAC) Governance Terms, París, UNESCO, 2008. Disponível em: http://unesdoc.unesco.org/images/0015/001591/159197E.pdf, acesso em 19 maio 2017.HARTMANN, Eva. The United Nations Educational, Scientific and Cultural Organization: pawn or global player? Globalisation, Societies and Education, v.8, n. 2, 2010, p. 307-318, 2010. HIZUME, Gabriela de Camargo. A implementação do sistema de Acreditação Regional de Cursos Universitários do MERCOSUR: um estudo sobre as Agências Nacionais de Acreditação da Argentina e do Brasil. 2013. 260p. Dissertação (Mestrado) Programa de Pós-Graduação em Integração da América Latina, Universidade de São Paulo. São Paulo, 2013.HIZUME, Gabriela de Camargo; BARREYRO, Gladys Beatriz. A acreditação de cursos de graduação no Processo de Bolonha e no Mercosul. In: BARREYRO, G. B.; HIZUME, G. C. Regionalismos e inter-regionalismos na Educação Superior: projetos, propostas e influências entre a América Latina e a Europa. Coletânea submetida à editora da UNIOESTE, Cascavel, 2018, pp. 135-154.INTERNATIONAL NETWORK FOR QUALITY ASSURANCE AGENCIES IN HIGHER EDUCATION. INQAAHE Guidelines of Good Practice. Ed. Revisada, INQAAHE, 2016. Disponível em: http://www.inqaahe.org/sites/default/files/INQAAHE_GGP2016.pdf, acesso em 12 mai. 2017.LAURELL, Asa. Avançando em direção ao passado: a política social do neoliberalismo. In: LAURELL, Asa. (org.) Estado e políticas sociais no neoliberalismo. São Paulo: Cortez, 1995, p. 151-178.LIMA, Licínio; AZEVEDO, Mário Neves de; CATANI, Afrânio Mendes. O processo de Bolonha, a avaliação da educação superior e algumas considerações sobre a Universidade Nova. Avaliação (Campinas), Sorocaba, v. 13, n. 1, p. 7-36, mar. 2008.MARQUINA, Mónica. Tendencias recientes de los sistemas de evaluación de la educación superior en el actual escenario internacional. Un nuevo "round' del Estado Evaluador? Avaliação (Campinas), v. 11, n. 4, p. 27-50, 2006.MICHAVILA, Francisco.; ZAMORANO, Silvia. La acreditación en el Espacio Europeo de Educación Superior. In: GLOBAL UNIVERSITY NETWORK FOR INOVATION (GUNI). La educación superior en el mundo. 2007. Acreditación para la garantía de la calidad: Qué está en juego? Madri: Ed. Mundi Prensa, 2006, p. 241-264.NEAVE, Guy. On the cultivation of quality, efficiency and enterprise: an overview of recent trends in higher education in Western Europe, 1986-1988. European Journal of Education, v.23, n.1/2, 1988, p. 7-23.NEAVE, Guy. Educación superior: historia y política. Barcelona: Gedisa, 2001.ROBERTSON, Susan. O processo de Bolonha da Europa torna-se global: modelo, mercado, mobilidade, força intelectual ou estratégia para construção do Estado? Revista Brasileira de Educação. v. 14, n. 42, p. 407-422. set./dez. 2009.ROBERTSON, Susan; DALE, Roger. Comparing policies in a globalising world: methodological reflections. Centre for Globalisation, Education and Social Futures. University of Bristol 2015a. Disponível em: https://edgesf.files.wordpress.com/2015/10/robertson-s-and-dale-r-2015-comparing-policies-in-a-globalising-world-methodological-reflections.pdf, acesso em 14 mai.2016.ROBERTSON, Susan; DALE, Roger. Critical cultural political economy of the globalisation of education, Globalisation, Societies and Education, v. 13, n. 1, p.149-170, 2015b.SGUISSARDI, Valdemar. O Banco Mundial e a educação superior: revisando teses e posições. In: Universidade brasileira no século XXI. Desafios do presente. São Paulo: Cortez Editora, 2009, p. 15-54.SGUISSARDI, Valdemar; BARREYRO, Gladys Beatriz. Evaluación/regulación de la educación superior en el Brasil: algunos aspectos históricos y actuales. Profesorado, revista de curriculum y formación del profesorado. v. 20, n.3, p. 171-206, 2016.STUBRIN, Adolfo Luis. Los mecanismos nacionales de garantía pública de calidad en el marco de la internacionalización de la educación superior. Avaliação, v. 10, n. 4, p. 9-22, 2005.UNESCO. Global Initiative for Quality Assurance Capacity (GIQAC) Governance Terms. Paris, UNESCO, 2008. Disponível em: http://unesdoc.unesco.org/images/0015/001591/159197E.pdf, acesso em 15 maio 2017UNESCO; OECD. Guidelines for Quality Provision in Cross-border Higher Education, Paris, 2005. Disponível em:http://unesdoc.unesco.org/images/0014/001433/143349e.pdf, acesso em 3 abr. 2017.UVALIC-TRUMBIC, Stamenka. Política internacional de garantía de la calidad y acreditación: de los instrumentos legales a las comunidades de práctica. In: GLOBAL UNIVERSITY NETWORK FOR INOVATION (GUNI). La educación superior en el mundo. 2007. Acreditación para la garantía de la calidad: Qué está en juego? Madri: Ed. Mundi Prensa, 2006, p. 58-72.VAN DAMME, Dirk. Trends and models international quality assurance and accreditation in higher education in relation to trade in education services. OECD/US Fórum on Trade in Educational Services. 23-24 may. 2002. Washington, DC. Disponível em: http://www.oecd.org/education/skills-beyond-school/2088479.pdf , acesso em 25 mar. 2017.VERGER, Antoni; HERMO, Javier. The governance of higher education regionalisation: comparative analysis of the Bologna Process and Mercosur educativo. Globalisation, Societies and Education, v. 8, n.1, p. 105-120, mar. 2010.WELLS, Peter. The DNA of a converging diversity: regional approaches to quality assurance in higher education, CHEA, 2014. Disponível em: https://www.chea.org/userfiles/Conference%20Presentations/DNA_Converging_Diversity.pdf, acesso em 8 maio 2017.WORLD BANK. Higher education: the lessons of experience. Washington: The World Bank Group, 1994.WORLD BANK. The financing and management of higher education – A status report on worldwide reforms. Elaborado por D. Bruce Johnstone, com colaboração de Alka Arora e William Experton. Washington: The World Bank, 1998.WORLD BANK. task Force on Higher Education and Society. Higher education in developing countries: peril and promise. Washington, DC: The World Bank, 2000.
APA, Harvard, Vancouver, ISO, and other styles
21

Fauzi, Chandra, and Basikin. "The Impact of the Whole Language Approach Towards Children Early Reading and Writing in English." JPUD - Jurnal Pendidikan Usia Dini 14, no. 1 (April 30, 2020): 87–101. http://dx.doi.org/10.21009/jpud.141.07.

Full text
Abstract:
This study aims to determine the effect of the whole language approach to the ability to read and write in English in early stages of children aged 5-6 years in one of the kindergartens in the Yogyakarta Special Region. The population in this study were 43 children who were in the age range of 5-6 years in the kindergarten. Twenty-nine participants were included in the experimental class subjects as well as the control class with posttest only control group design. Observation is a way to record data in research on early reading and writing ability. The results of Multivariate Anal- ysis of Covariance (Manova) to the data shows that 1) there is a difference in ability between the application of the whole language approach and the conventional approach to the ability to read the beginning of English; 2) there is a difference in ability between applying a whole language approach and a conventional approach to writing English beginning skills; 3) there is a difference in ability between the whole language approach and the conventional approach to the ability to read and write the beginning in English Keywords: Whole language approach, Early reading, Early writing, Early childhood Reference Abdurrahman, M. (2003). Pendidikan bagi Anak Berkesulitan Belajar. Jakarta: Rineka Cipta. Aisyah, S., Yarmi, G., & Bintoro, T. (2018). Pendekatan Whole Language dalam Pengembangan Kemampuan Membaca Permulaan Siswa Sekolah Dasar. Prosiding Seminar Nasional Pendidikan, 160–163. Alhaddad, A. S. (2014). Joedanian Literacy Education Should Whole Language be Implemented? European Scientific Journal, 10(8). Aulina, C. N., & Rezania, V. (2013). Metode Whole Language untuk Pembelajaran Bahasa Pada Anak TK. Pendidikan Usia Dini. Austring, B. D., & Sørensen, M. (2012). A Scandinavian View on the Aesthetics as a Learning Media. Journal of Modern Education Review, 2(2), 90–101. Cahyani, H., Courcy, M. de, & Barnett, J. (2018). Teachers’ code-switching in bilingual classrooms: exploring pedagogical and sociocultural functions. International Journal of Bilingual Education and Bilingualism, 21(4), 465–479. Cahyani, W. A. (2019). Pengembangan Model Pembelajaran Membaca pada Anak Usia Dini. Universitas Negeri Yogyakarta. CCSU NEWS. (2019). World’s Most Literate Nations Ranked. In WORLD’S MOST LITERATE NATIONS RANKED. Chodidjah, I. (2007). Teacher training for low proficiency level primary English language teachers: How it is working in Indonesia. In British Council (Ed.) Primary Innovations: A Collection of Papers, 87–94. Crystal, D. (2003). The Cambridge Encyclopedia of the English Language (second Edi). Cambridge: Cambridge University Press. Dhieni, N., Fridani, L., Muis, A., & Yarmi, G. (2014). Metode Perkembangan Bahasa. Universitas Terbuka, 1(155.4), 1–28. Dixon, J., & Sumon, T. (1996). Whole Language: An Integrated Approach to Reading and Writing. Action-Learning Manuals for Adult Literacy, 4. Doman, G. (1985). Ajaklah Balita Anda Belajar Meembaca. Bandung: CV. Yrama Widya. Fat, N. (2015). Ranking Minat Baca Pelajar Indonesia. In Minat Baca Indonesia. Flores, N. (2013). Undoing Truth in Language Teaching: Toward a Paradigm of Linguistic Aesthetics. Working Papers in Educational Linguistics (WPEL), 28(2). Folkmann, M. N. (2010). Evaluating aesthetics in design: A phenomenological approach. The MIT Press, 26(1), 40–53. Froese, V. (1991). Whole Language Practice and Theory. Boston: Allyn and Bacon.Gagne, R. M., & Briggs, L. J. (1996). Principle of Instructional Design. New York: Richard and Winston.Gardner, H. (2013). Multiple Intelegences : The Theory in ractice a Reader. New York: Basic. Goodman, K. (1986). What‟s whole in whole language. Portsmouth: NH: Heinemann. Goodman, K. S. (1986). What’s Whole in Whole Language? A Parent/Teacher Guide to Children’s Learning. Heinemann Educational Books, Inc: 70 Court St., Portsmouth, NH 03801. Hammerby, H. (1982). Synthesis in Second Language Teaching. Blane: Second Language. Hardinansyah, V. (2017). Analisis Kebutuhan pada Pengajaran Bahasa Inggris di PG-PAUD. Jurnal Pendidikan Dan Pembelajaran Anak Usia Dini, 4(2), 92–102. Jamaris, M. (2006). Perkembangan dan Pengembangan Anak Usia Dini Taman Kanak-kanak. Jakarta: Gramedia Widiasarana. Krashen, S. D. (1981). Second Language Acquisition and Second Language Learning (Wesley Longman Ltd, ed.). Addison. Krashen, S., Long, M. H., & Scarcella, R. (1979). Accounting for child-adult differences in second language rate and attainment. TESOL Quarterly, 13, 573-82. Ling-Ying, & Huang. (2014). Learning to Read with the Whole Language Approach: The Teacher’s View. Canadian Center of Science and Education : English Language Teaching, 5(7). Ling, P. (2012). The “Whole Language” Theory and Its Application to the Teaching of English Reading. Journal of Canadian Center of Science and Education, 5(3). Maulidia, C. R., Fadillah, & Miranda, D. (2019). Pengaruh Pendekatan Whole Language Terhadap Kemampuan Membaca 5-6 Tahun di TK Mawar Khatulistiwa. Program Studi Pendidikan Guru PAUD FKIP Untan Pontianak, 8(7). Mayuni, I., & Akhadiah, S. (2016). Whole Language-Based English Reading Materials. International Journal of Applied Linguistics & English Literature, 5(3). Meha, N., & Roshonah, A. F. (2014). Implementasi Whole Language Approach sebagai Pengembangan Model Pembelajaran Berbahasa Awal Anak Usia 5-6 Tahun di PAUD Non Formal. Jurnal Pendidikan, 15(1), 68–82. Moats, L. (2007). Whole language high jinks: How to Tell When “Scientifically-Based Reading Instruction” Isn’t. Washington: Thomas B. Fordham Institute. Montessori, D. M. (1991). The discovery of the Child. New York: Ballatine Books.Morrow, L. M. (1993). Literacy Development in the Early Years. United States of America: Allyn & Bacon.Munandar, A. (2013). Pemakaian Bahasa Jawa Dalam Situasi Kontak Bahasa di Daerah Istimewa Yogyakarta. Jurnal Sastra Inggris, 25(1), 92–102. Musfiroh, T. (2009). Menumbuhkembangkan Baca-Tulis Anak Usia Dini. Yogyakarta: Grasindo. Nirwana. (2015). Peningkatan Kemampuan Membaca Cepat Melalui Pendekatan Whole Language pada Siswa Kelas VI SD Negeri 246 Bulu-Bulu Kecamatan Tonra Kabupaten Bone. Jurnal Onoma: Pendidikan, Bahasa, Dan Sastra, 1(1), 79-94., 1(1), 79–94. Novitasari, D. R. (2010). Pembangunan Media Pembelajaran Bahasa Inggris Untuk Siswa Kelas 1 Pada Sekolah Dasar Negeri 15 Sragen. Sentra Penelitian Engineering Dan Edukas, Volume 2 N. Oladele, A. O., & Oladele, I. T. (2016). Effectiveness of Collaborative Strategic Reading and Whole Language Approach on Reading Comprehension Performance of Children with Learning Disabilities in Oyo State Nigeria Adetoun. International Journal on Language, Literature and Culture in Education, 3(1), 1–24. Olusegun, B. S. (2015). Constructivism Learning Theory: A Paradigm for Teaching and Learning. Journal of Research & Method in Education, 5(6), 66–70. Ortega, L. (2009). Understanding Second Language Acquisition. New York: Routledge.Otto, B. (2015). Perkembangan Bahasa Pada Anak Usia DIni (third Edit). Jakarta: Prenadamedia. Papalia, D., Old, S., & Feldman, R. (2008). Human Development (Psikologi Perkembangan). Jakarta: Kencana. Papalia, Old, & Feldman. (2009). Human Development (Psikologi Perkembangan (Kesembilan). Jakarta: Kencana. Pellini, A. PISA worldwide ranking; Indonesia’s PISA results show need to use education resources more efficiently. , (2016). Phakiti, A. (2014). Experimental Research Methods in Language Learning. London: Bloomsbury Academic. Rahim, F. (2015). Pengajaran Bahasa di Sekolah Dasar. Jakarta: PT Bumi Aksara. Routman, R. (2014). Read, write, lead: Breakthrough strategies for schoolwide literacy success. Sadtono, E. (2007). A concise history of TEFL in Indonesia. English Education in Asia: History and Policies, 205–234. Sani, R.A. (2013). Inovasi Pembelajaran. Jakarta: Bumi Aksara.Sani, Ridwan A. (2013). Inovasi Pembelajaran. Jakarta: PT Bumi Aksara. Santrock, J. W. (2016). Children (Thirteenth). New York: McGraw-Hill Education. Saracho, O. N. (2017). Literacy and language: new developments in research, theory, and practice. Early Childhood Development and Care, 3(4), 187. https://doi.org/10.1080/03004430.2017.1282235 Semiawan, C. R. (1983). Memupuk Bakat dan Minat Kreativitas Siswa Sekolah Menengah. Jakarta: Gramedia Pustaka Utama. Sikki, E. A. A., Rahman, A., Hamra, A., & Noni, N. (2013). The Competence of Primary School English Teachers in Indonesia. Journal of Education and Practice, 4(11), 139–146. Siskandar. (2009). Kurikulum Berbasis Kompetensi. Jakarta: Fasilitator. Solchan, T. W., Mulyati, Y., Syarif, M., Yunus, M., Werdiningsih, E., Pramuki, B. E., & Setiawati, L. (2008). Pendidikan Bahasa Indonesia di SD. Jakarta. Jakarta: Universitas Terbuka. Solehudin, O. (2007). Model Pembelajaran Membaca Reading Workshop: Studi Kuasi Eksperimen di SD Muhammadiyah VII Bandung (Doctoral dissertation, Universitas Pendidikan Indonesia). Universitas Pendidikan Indonesia. Suparno, S., & Yunus, M. (2007). Keterampilan Dasar Menulis. Jakarta: Universitas Terbuka. Susanto, A. (2011). Perkembangan Anak Usia Dini Pengantar dalam Berbagai Aspeknya. Jakarta: Kencana Prenada Media Group. Suyanto, K. K. E. (2010). Teaching English as foreign language to young learners. Jakarta: State University of Malang. Tarigan, D. (2001). Pendidikan Bahasa dan sastra Indonesia Kelas Rendah. Jakarta: Universitas Terbuka. Trask, R. L., & Trask, R. L. (1996). Historical linguistics. New York: Oxford University Press. Ur, P. (1996). A course in Language Teaching. Practice and Theory. Cambridge: Cambridge. University Press. Williams, A. L., McLeod, S., & McCauley, R. J. (2010). Interventions for Speech Sound Disorders in Children. Brookes Publishing Company.: PO Box 10624; Baltimore; MD 21285. Wright, P., Wallance, J., & McCAarthy, J. (2008). Aesthetics and experience-centered design. ACM Transactions on Computer-Human Interaction (TOCHI), 15(4), 18.
APA, Harvard, Vancouver, ISO, and other styles
22

Chowdhury, Uttam. "Selenium (Se) as well as mercury (Hg) may influence the methylation and toxicity of inorganic arsenic, but further research is needed with combination of Inorg-arsenic, Se, and Hg." Journal of Toxicology and Environmental Sciences 1, no. 1 (June 19, 2021): 1–8. http://dx.doi.org/10.55124/jtes.v1i1.46.

Full text
Abstract:
Our studies have indicated that the relative concentration of Se or Hg to As in urine and blood positively correlates with percentage of inorganic arsenic (% Inorg-As) and percentage of monomethlyarsonic acid [% MMA (V)]. We also found a negative correlation with percentage of dimethylarsinic acid [% DMA (V)] and the ratio of % DMA (V) to % MMA (V). In another study, we found that a group of proteins were significantly over expressed and conversely other groups were under-expressed in tissues in Na-As (III) treated hamsters. Introduction.Inorganic arsenic (Inorg-As) in drinking water.One of the largest public health problems at present is the drinking of water containing levels of Inorg-As that are known to be carcinogenic. At least 200 million people globally are at risk of dying because of arsenic (As) in their drinking water1-3. The chronic ingestion of Inorg-As can results in skin cancer, bladder cancer, lung cancer, and cancer of other organs1-3. The maximum contamination level (MCL) of U.S. drinking water for arsenic is 10 ug/L. The arsenic related public health problem in the U.S. is not at present anywhere near that of India4, Bangladesh4, and other countries5. Metabolism and toxicity of Inorg-As and arsenic species.Inorg-As is metabolized in the body by alternating reduction of pentavalent arsenic to trivalent form by enzymes and addition of a methyl group from S-adenosylmethionine6, 7; it is excreted mainly in urine as DMA (V)8. Inorganic arsenate [Inorg-As (V)]is biotransformed to Inorg-As (III), MMA (V), MMA (III), DMA (V), and DMA (III)6(Fig. 1). Therefore, the study of the toxicology of Inorg-As (V) involves at least these six chemical forms of arsenic. Studies reported the presence of 3+ oxidation state arsenic biotransformants [MMA (III) and DMA (III)] in human urine9and in animal tissues10. The MMA (III) and DMA (III) are more toxic than other arsenicals11, 12. In particular MMA (III) is highly toxic11, 12. In increased % MMA in urine has been recognized in arsenic toxicity13. In addition, people with a small % MMA in urine show less retention of arsenic14. Thus, the higher prevalence of toxic effects with increased % MMA in urine could be attributed to the presence of toxic MMA (III) in the tissue. Previous studies also indicated that males are more susceptible to the As related skin effects than females13, 15. A study in the U.S population reported that females excreted a lower % Inorg-As as well as % MMA, and a higher % DMA than did males16. Abbreviation: SAM, S-adenosyl-L-methionine; SAHC, S-adenosyl-L-homocysteine. Differences in susceptibility to arsenic toxicity might be manifested by differences in arsenic metabolism among people. Several factors (for examples, genetic factors, sex, duration and dosage of exposure, nutritional and dietary factors, etc.) could be influence for biotransformation of Inorg-As,6, 17 and other unknown factors may also be involved. The interaction between As, Se, and Hg.The toxicity of one metal or metalloid can be dramatically modulated by the interaction with other toxic and essential elements18. Arsenic and Hg are toxic elements, and Se is required to maintain good health19. But Se is also toxic at high levels20. Recent reports point out the increased risk of squamous cell carcinoma and non-melanoma skin cancer in those treated with 200 ug/day of selenium (Nutritional Prevention of Cancer Trial in the United States)21. However, it is well known that As and Se as well as Se and Hg act as antagonists22. It was also reported that Inorg-As (III) influenced the interaction between selenite and methyl mercury23. A possible molecular link between As, Se, and Hg has been proposed by Korbas et al. (2008)24. The identifying complexes between the interaction of As and Se, Se and Hg as well as As, Se, and Hg in blood of rabbit are shown in Table 1. Influence of Se and Hg on the metabolism of Inorg-As.The studies have reported that Se supplementation decreased the As-induced toxicity25, 26. The concentrations of urinary Se expressed as ug/L were negatively correlated with urinary % Inorg-As and positively correlated with % DMA27. The study did not address the urinary creatinine adjustment27. Other researchers suggested that Se and Hg decreased As methylation28-31(Table 2). They also suggested that the synthesis of DMA from MMA might be more susceptible to inhibition by Se (IV)29 as well as by Hg (II)30,31 compared to the production of MMA from Inorg-As (III). The inhibitory effects of Se and Hg were concentration dependent28-31. The literature suggests that reduced methylation capacity with increased % MMA (V), decreased % DMA (V), or decreased ratios of % DMA to % MMA in urine is positively associated with various lesions32. Lesions include skin cancer and bladder cancer32. The results were obtained from inorganic arsenic exposed subjects32. Our concern involves the combination of low arsenic (As) and high selenium (Se) ingestion. This can inhibit methylation of arsenic to take it to a toxic level in the tissue. Dietary sources of Se and Hg.Global selenium (Se) source are vegetables in the diet. In the United States, meat and bread are the common source. Selenium deficiency in the US is rare. The US Food and Drug Administration (FDA) has found toxic levels of Se in dietary supplements, up to 200 times greater than the amount stated on the label33. The samples contained up to 40,800 ug Se per recommended serving. For the general population, the most important pathway of exposure to mercury (Hg) is ingestion of methyl mercury in foods. Fish (including tuna, a food commonly eaten by children), other seafood, and marine mammals contain the highest concentrations. The FDA has set a maximum permissible level of 1 ppm of methyl mercury in the seafood34. The people also exposed mercury via amalgams35. Proteomic study of Inorg-As (III) injury.Proteomics is a powerful tool developed to enhance the study of complex biological system36. This technique has been extensively employed to investigate the proteome response of cells to drugs and other diseases37, 38. A proteome analysis of the Na-As (III) response in cultured lung cells found in vitro oxidative stress-induced apoptosis39. However, to our knowledge, no in vivo proteomic study of Inorg-As (III) has yet been conducted to improve our understanding of the cellular proteome response to Inorg-As (III) except our preliminary study 40. Preliminary Studies: Results and DiscussionThe existing data (Fig. 1) from our laboratory and others show the complex nature of Inorg-As metabolism. For many years, the major way to study, arsenic (As) metabolism was to measure InorgAs (V), Inorg-As (III), MMA (V), and DMA (V) in urine of people chronically exposed to As in their drinking water. Our investigations demonstrated for the first time that MMA (III) and DMA (III) are found in human urine9. Also we have identified MMA (III) and DMA (III) in the tissues of mice and hamsters exposed to sodium arsenate [Na-As (V)]10, 41. Influence of Se as well as Hg on the As methyltransferase.We have reported that Se (IV) as well as mercuric chloride (HgCl2) inhibited As (III) methyltransferase and MMA (III) methyltransferase in rabbit liver cytosol. Mercuric chloride was found to be a more potent inhibitor of MMA (III) methyltransferase than As (III) methyltransferase30. These results suggested that Se and Hg decreased arsenic methylation. The inhibitory effects of Se and Hg were concentration dependent30. Influence of Se and Hg in urine and blood on the percentage of urinary As metabolites.Our human studies indicated that the ratios of the concentrations of Se or Hg to As in urine and blood were positively correlated with % Inorg-As and % MMA (V). But it negatively correlated with % DMA (V) and the ratios of % DMA (V) to % MMA (V) in urine of both males and females (unpublished data) (Table 3). These results confirmed that the inhibitory effects of Se as well as Hg for the methylation of Inorg-As in humans were concentration dependent. We also found that the concentrations of Se and Hg were negatively correlated with % Inorg-As and % MMA (V). Conversely it correlated positively with % DMA (V) and the ratios of % DMA (V) to % MMA (V) in urine of both sexes (unpublished data). These correlations were not statistically significant when urinary concentrations of Se and Hg were adjusted for urinary creatinine (Table 3). Interactions of As, Se, Hg and its relationship with methylation of arsenic are summarized in Figure 2. Sex difference distribution of arsenic species in urine.Our results indicate that females have more methylation capacity of arsenic as compared to males. In our human studies (n= 191) in Mexico, we found that females (n= 98) had lower % MMA (p<0.001) and higher % DMA (p=0.006) when compared to males (n= 93) (Fig. 3). The means ratio of % MMA (V) to % Inorg-As and % DMA (V) to %MMA (V) were also lower (p<0.05) and higher (p<0.001), respectively in females compared to males. The protein expression profiles in the tissues of hamsters exposed to Na-As (III).In our preliminary studies40, hamsters were exposed to Na-As (III) (173 pg/ml as As) in their drinking water for 6 days and control hamsters were given only the water used to make the solutions for the experimental animals. After DIGE (Two-dimensional differential in gel electrophoresis) and analysis by the DeCyder software, several protein spots were found to be over-expressed (red spot) and several were under expressed (green spot) as compared to control (Figs. 4a-c). Three proteins (one was over-expressed and two were under-expressed) of each tissue (liver and urinary bladder) were identified by LC-MS/MS (liquid chromatography-tandem mass spectrometry).DIGE in combination with LC-MS/MS is a powerful tool that may help cancer investigators to understand the molecular mechanisms of cancer progression due to Inorg-As. Propose a new researchThese results suggested that selenium (Se) as well as mercury (Hg) may influence the methylation of Inorg-As and this influence could be dependent on the concentration of Se, Hg and/or the sex of the animal. Our study also suggested that the identification and functional assignment of the expressed proteins in the tissues of Inorg-As (III) exposed animals will be useful for understanding and helping to formulate a theory dealing with the molecular events of arsenic toxicity and carcinogenicity.Therefore, it would be very useful if we could do a research study with combination of Inorg-arsenic, Se, and Hg. The new research protocol could be the following:For metabolic processing, hamsters provide a good animal model. For carcinogenesis, mouse model is well accepted. The aims of this project are: 1) To map the differential distributions of arsenic (As) metabolites/species in relation to selenium (Se) and mercury (Hg) levels in male and female hamsters and 2) To chart the protein expression profile and identify the defense proteins in mice and hamsters after As injury. Experimental hamsters (male or female) will include four groups. The first group will be treated with Na arseniteNa-As(III), the second group with Na-As (III) and Na-selenite (Na-Se (IV)], the third group with Na As (III) and methyl mercuric chloride (MeHgCl), and the final group with Na-As (III), Na-Se (IV), and MeHgci at different levels. Urine and tissue will be collected at different time periods and measured for As species using high performance liquid chromatography/inductively coupled plasma-mass spectrometry (HPLC/ICP-MS). For proteomics, mice (male and female) and hamsters (male and female) will be exposed to Na-As (III)at different levels in tap water, and control mice and hamsters will be given only the tap water. Tissue will be harvested at different time periods. TWO dimensional differential in gel electrophoresis (2D-DIGE) combined with liquid chromatography-tandem mass spectrometry (LC-MS/MS) will be employed to identify the expressed protein. In summary, we intend to extend our findings to: 1) Differential distribution of As metabolites in kidney, liver, lung, and urinary bladder of male and female hamsters exposed to Na-As (III), and combined with Na-As (III) and Na-Se (IV) and/or MeHgCl at different levels and different time periods, 2) Show the correlation of As species distribution in the tissue and urine for both male and female hamsters treated with and without Na-Se (IV) and/or MeHgCl, and 3) Show protein expression profile and identify the defense proteins in the tissues (liver, lung, and urinary bladder epithelium) in mice after arsenic injury. The significance of this study: The results of which have the following significances: (A) Since Inorg-As is a human carcinogen, understanding how its metabolism is influenced by environmental factors may help understand its toxicity and carcinogenicity, (B) The interactions between arsenic (As), selenium (Se), and mercury (Hg) are of practical significance because populations in various parts of the world are simultaneously exposed to Inorg-As & Se and/or MeHg, (C) These interactions may inhibit the biotransformation of Inorg-As (III) which could increase the amount and toxicity of Inorg-As (III) and MMA (III) in the tissues, (D) Determination of arsenic species profile in the tissues after ingestion of Inorg-As (III), Se (IV), and/or MeHg+ will help understand the tissue specific influence of Se and Hg on Inorg-As (III) metabolism, (E) Correlation of arsenic species between tissue and urine might help to understand the tissue burden of arsenic species when researchers just know the distribution of arsenic species in urine, (F) The identification of the defense proteins (over-expressed and under-expressed) in the tissues of the mouse may lead to understanding the mechanisms of inorganic arsenic injury in human. The Superfund Basic Research Program NIEHS Grant Number ES 04940 from the National Institute of Environmental Health Sciences supported this work. Additional support for the mass spectrometry analyses was provided by grants from NIWHS ES 06694, NCI CA 023074 and the BIO5 Institute of the University of Arizona. Acknowledge:The Authorwantsto dedicate this paper to the memory of Dr. H. VaskenAposhian and Dr. Mary M. Aposhian who collected urine and bloodsamples from Mexican population. The work was done under Prof. H. V. Aposhian sole supervision and with his great contribution. References NRC (National Research Council). Arsenic in Drinking Water. Update to the 1999 Arsenic in Drinking Water Report. National Academy Press, Washington, DC. 2001. Gomez-Caminero, A.; Howe, P.; Hughes, M.; Kenyon, ; Lewis, D. R.; Moore, J.; Mg, J.; Aitio, A.; Becking, G. Environmental Health Criteria 224. Arsenic and Arsenic Compounds (Second Edition). International Programme on Chemical Safety, World Health Organization. 2001. Chen, C. J.; Chen, C. W.; Wu, M.; Kuo, T. L. Cancer potential in liver, lung, bladder, and kidney due to ingested inorganic arsenic in drinking water. Br. J. Cancer. 1992, 66, 888-892. Chakraborti, D.; Rahman, M.; Paul, K.; Chowdhury, U. K.; Sengupta, M. K.; Lodh, D.; Chanda, C. R.; Saha, K. C.; Mukherjee, S. C. Arsenic calamity in the Indian subcontinent. What lessons have been learned? 2002, 58, 3-22. Nordstrom, D. K. Worldwide occurrences of arsenic in ground water. Scienc 2002, 296, 2143-2145. Aposhian, H. V.; Aposhian, M. M. Arsenic toxicology: five question Chem. Res. Toxicol. 2006, 19, 1-15. Aposhian, H. V. Enzymatic methylation of arsenic species and other new approaches to arsenic toxicity. An Rev. Pharmacol. Toxicol. 1997, 37, 397-419. Vahter, M. Variation in human metabolism of arsenic. In: Abernathy, C. O.; Calderon, R. L.; Chappell, W. R., (eds) Arsenic exposure and Health effect Elsevier Science, New York, 1999, pp 267-279. Aposhian, H. V., Gurzau, E. , Le, X. C., Gurzau, A., Healy, S. M., Lu, X., Ma, M., Yip, L., Zakharyan, R. A., Maiorino, R. M., Dart, R. C., Tircus, M. G., Gonzalez-Ramirez, D., Morgan, D. L., Avram, D., Aposhian, M. M. (2000). Occurrence of monomethylarsonous acid in urine of humans exposed to inorganic arsenic. Chem. Res. Toxicol. 13, 693-697. ; U. K.; Zakharyan, R. A.; Hernandez, A.; Avram, M.D.; Kopplin, M. J.; Aposhian, H. V. Glutathione-S-transferase-omega [MMA (V) reductase] knockout mice: Enzyme and arsenic species concentrations in tissues after arsenate administration. Toxicol. Appl. Pharmacol. 2006, 216, 446-457. Styblo, M.; Del Razo, L. M.; Vega, L.; Germolec, D. R.; LeCluyse, E. L.; Hamilton, G. A.; Reed, W.; Wang, C.; Cullen, W. R.; Thomas, D.J. Comparative toxicity of trivalent and pentavalent inorganic and methylated arsenicals in rat and human cells. A Toxicol., 2000, 74, 289-299. Petrick, J. S.; Jagadish, B.; Mash, E. A.; Aposhian, H. V. Monomethylarsonous acid (MMAIII) and arsenite: LD50 in hamsters and in vitro inhibition of pyruvate dehydrogenase. Ch Res. Toxicol. 2001, 14, 651-656. Lindberg, A. L.; Rahman, M.; Persson, L. A.; Vahter, M. The risk of arsenic induced skin lesions in Bangladeshi men and women is affected by arsenic metabolism and the age at first exposure. Appl. Pharmacol. 2008, 230, 9-16. Vahter, M. Mechanisms of arsenic biotransformation. Toxicolog 2002, 181-182, 211-217. Chen, Y. C.; Guo, Y. L.; Su, H. J.; Hsueh, Y. M.; Smith, T. J.; Ryan, L. M.; Lee, M. S.; Chao, S. C.; Lee, J. Y.; Christiani, D. C. Arsenic methylation and skin cancer risk in southwestern Taiwan. Occup. Environ. Med. 2003, 45, 241-248. Steinmaus, C.; Carrigan, K.; Kalman, D.; Atallah, R.; Yuan, Y.; Smith, A.H. Dietary intake and arsenic methylation in a U.S. population. Health Perspect. 2005, 113, 1153-1159. Tseng, C. H. A review on environmental factors regulating arsenic methylation in humans. Appl. Pharmacol. 2009, 235, 338-350. Goyer, R. A. Factors influencing metal toxicity. In: Goyer, R. A.; Klaassen, C. D.; Waalkes, M. P. (eds) Metal toxicolog Academic Press, San Diego, 1995, pp 31-45. Wilber, C. G. Toxicology of selenium. Toxicol. 1980, 17, 171-230. Skerfving, S. Interaction between selenium and methylmercury. Environ. Health Persp 1978, 25, 57-65. Duffield-Lillico, A. J.; Slate, E. H.; Reid, M. E.; Turnbull, B. W.; Wilkins, P. A.; Combs, G. F.; Kim Park, Jr. H.; Gross, E. G.; Graham, G. F.; Stratton, M. S.; Marshall, J. R.; Clark, L. C. Selenium supplementation and secondary prevention of nonmelanoma skin cancer in a randomized trial. Natl. Cancer Inst. 2003, 95, 1477-1481. Gailer, J. Arsenic-selenium and mercury-selenium bonds in biology. Chem. Rev. 2007, 251, 234-254. Alexander, J. The influence of arsenite on the interaction between selenite and methyl mercury. Dev. Toxicol. Environ. Sci. 1980, 8, 585-590. Korbas, M.; Percy, J.; Gailer, J.; George, G. N. A possible molecular link between the toxicological effects of arsenic, selenium and methyl mercury: methyl mercury (II) selenobis (S glutathionyl) arsenic (III). J. Biol. Inorg. Chem. 2008, 13, 461-470. Yang, ; Wang, W.; Hou, S.; Peterson, P. J.; Williams, W. P. Effect of selenium supplementation on arsenism: an intervention trial in Inner Mongolia. Environ. Geochem. Health. 2002, 24, 359-374. Verret, W. J.; Chen, Y.; Ahmed, A.; Islam, T.; Parvez, F.; Kibriya, M. G.; Graziano, J. H.; Ahsan, H. Effects of vitamin E and selenium on arsenic-induced skin lesions. Occup. Environ. Med. 2005, 47, 1026-1035. Hsueh, Y. M.; Ko, Y. F.; Huang, Y. K.; Chen, H. W.; Chiou, H. Y.; Huang, Y. L.; Yang, M. ; Chen, C. J. Determinants of inorganic arsenic methylation capability among residents of the Lanyang Basin, Taiwan: arsenic and selenium exposure and alcohol consumption. Toxicol. Lett. 2003, 137, 49-63. Kenyon, E. M.; Hughes, M. K.; Levander, 0. Influence of dietary selenium on the disposition of arsenate in the female B6C3F1 mouse. J. Toxicol. Environ. Health. 1997, 51, 279-299. Styblo, M.; Thomas, D, J. Selenium modifies the metabolism and toxicity of arsenic in primary rat hepatocytes. Toxicol Appl. Pharmacol. 2001, 172, 52-61. Zakharyan, R.; Wu, Y.; Bogdan, G. M.; Aposhian, H. V. Enzymatic methylation of arsenic compounds: assay, partial purification, and properties of arsenite methyltransferase and monomethylarsonic acid methyltransferase of rabbit liver. Res. Toxicol.1995, 8, 1029-1038. Styblo, M.; Delnomdedieu, M.; Thomas, D. J. Mono- and dimethylation of arsenic in rat liver cytosol in vitro. -Biol. Interact. 1996, 99, 147-164. Tseng C. H. Arsenic methylation, urinary arsenic metabolites and human diseases: current perspective. J. Environ. Sci. Health Part C. 2007, 25, 1-22. FDA (The US Food and Drug administration). (2008). Hazardous levels of selenium in samples of "Total Body Formula" and "Total Body Mega Formula”. FDA Ne 2008. ATSDR (Agency for Toxic Substances and Disease Registry). Toxicological profile for mercury (CAS # 7439-97-6). Atlanta, GA: U.S. Department of Health and Human Services, Public Health Service. 1999. Dye, B. A.; Schober, S. E.; Dillon, C. F.; Jones, R. L.; Fryar, C.; McDowell, M.; Sinks, T. H. Urinary mercury concentrations associated with dental restorations in adults women aged 16-49 years: United States, 1999-2000. O Environ. Med. 2005, 62, 368-375. Lau, A. T.; He, Q. Y.; Chiu, J. F. Proteomic technology and its biomedical applications. A Biophys. Sin. 2003, 35, 965-975. Jungblut, P. R.; Zimny-Arndt, U.; Zeindl-Eberhart, E.; Stulik, J.; Koupilova, K.; Pleissner, K. P.; Otto, A.; Muller, E. C.; Sokolowska-Kohler, W.; Grabher, G.; Stoffler, G. Proteomics in human disease: cancer, heart and infectious diseases. Electrophoresis. 1999, 20, 2100-2110. Hanash, S. M.; Madoz-Gurpide, J.; Misek, D. E. Identification of novel targets for cancer therapy using expression proteomics. L 2002, 16, 478-485. Lau, A. T.; He, Q. Y.; Chiu, J. F. A proteome analysis of the arsenite response in cultured lung cells: evidence for in vitro oxidative stress-induced apoptosis. J. 2004, 382, 641-650. Chowdhury, U. K.; Aposhian, H. V. Protein expression in the livers and urinary bladders of hamsters exposed to sodium arsenite. A N. Y. Acad. Sci. 2008, 1140, 325-334. Sampayo-Reyes, A.; Zakharyan, R. A.; Healy, S. M.; Aposhian, A. V. Monomethylarsonic acid reductase and monomethylarsonou acid in hamster tissue. Chem. Res. Toxicol. 2000, 13, 1181-1186.
APA, Harvard, Vancouver, ISO, and other styles
23

KITLV, Redactie. "Book Reviews." New West Indian Guide / Nieuwe West-Indische Gids 66, no. 1-2 (January 1, 1992): 101–61. http://dx.doi.org/10.1163/13822373-90002009.

Full text
Abstract:
-Selwyn R. Cudjoe, John Thieme, The web of tradition: uses of allusion in V.S. Naipaul's fiction,-A. James Arnold, Josaphat B. Kubayanda, The poet's Africa: Africanness in the poetry of Nicolás Guillèn and Aimé Césaire. Westport CT: Greenwood, 1990. xiv + 176 pp.-Peter Mason, Robin F.A. Fabel, Shipwreck and adventures of Monsieur Pierre Viaud, translated by Robin F.A. Fabel. Pensacola: University of West Florida Press, 1990. viii + 141 pp.-Alma H. Young, Robert B. Potter, Urbanization, planning and development in the Caribbean, London: Mansell Publishing, 1989. vi + 327 pp.-Hymie Rubinstein, Raymond T. Smith, Kinship and class in the West Indies: a genealogical study of Jamaica and Guyana, Cambridge: Cambridge University Press, 1988. xiv + 205 pp.-Shepard Krech III, Richard Price, Alabi's world, Baltimore and London: Johns Hopkins University Press, 1990. xx + 445 pp.-Graham Hodges, Sandra T. Barnes, Africa's Ogun: Old world and new, Bloomington & Indianapolis: Indiana University Press, 1989. xi + 274 pp.-Pamela Wright, Philippe I. Bourgois, Ethnicity at work: divided labor on a Central American banana plantation, Baltimore MD: John Hopkins University Press, 1989. xviii + 311 pp.-Idsa E. Alegría-Ortega, Andrés Serbin, El Caribe zona de paz? geopolítica, integración, y seguridad, Caracas: Editorial Nueva Sociedad, 1989. 188 pp. (Paper n.p.) [Editor's note. This book is also available in English: Caribbean geopolitics: towards security through peace? Boulder CO: Lynne Rienner, 1990.-Gary R. Mormino, C. Neale Ronning, José Martí and the émigré colony in Key West: leadership and state formation, New York; Praeger, 1990. 175 pp.-Gary R. Mormino, Gerald E. Poyo, 'With all, and for the good of all': the emergence of popular nationalism in the Cuban communities of the United States, 1848-1898, Durham NC: Duke University Press, 1989. xvii + 182 pp.-Fernando Picó, Raul Gomez Treto, The church and socialism in Cuba, translated from the Spanish by Phillip Berryman. Maryknoll NY: Orbis, 1988. xii + 151 pp.-Fernando Picó, John M. Kirk, Between God and the party: religion and politics in revolutionary Cuba. Tampa FL: University of South Florida Press, 1989. xxi + 231 pp.-Andrés Serbin, Carmen Gautier Mayoral ,Puerto Rico en la economía política del Caribe, Río Piedras PR; Ediciones Huracán, 1990. 204 pp., Angel I. Rivera Ortiz, Idsa E. Alegría Ortega (eds)-Andrés Serbin, Carmen Gautier Mayoral ,Puerto Rico en las relaciones internacionales del Caribe, Río Piedras PR: Ediciones Huracán, 1990. 195 pp., Angel I. Rivera Ortiz, Idsa E. Alegría Ortega (eds)-Jay R. Mandle, Jorge Heine, A revolution aborted : the lessons of Grenada, Pittsburgh: University of Pittsburgh Press, 1990. x + 351 pp.-Douglas Midgett, Rhoda Reddock, Elma Francois: the NWCSA and the workers' struggle for change in the Caribbean in the 1930's, London: New Beacon Books, 1988. vii + 60 pp.-Douglas Midgett, Susan Craig, Smiles and blood: the ruling class response to the workers' rebellion of 1937 in Trinidad and Tobago, London: New Beacon Books, 1988. vii + 70 pp.-Ken Post, Carlene J. Edie, Democracy by default: dependency and clientelism in Jamaica, Kingston, Jamaica: Ian Randle Publishers, and Boulder CO: Lynne Rienner Publishers, 1991. xiv + 170 pp.-Ken Post, Trevor Munroe, Jamaican politics: a Marxist perspective in transition, Kingston, Jamaica: Heinemann Publishers (Caribbean) and Boulder CO: Lynne Rienner Publishers, 1991. 322 pp.-Wendell Bell, Darrell E. Levi, Michael Manley: the making of a leader, Athens GA: University of Georgia Press, 1990, 349 pp.-Wim Hoogbergen, Mavis C. Campbell, The Maroons of Jamaica, 1655-1796: a history of resistance, collaboration and betrayal, Granby MA Bergin & Garvey, 1988. vi + 296 pp.-Kenneth M. Bilby, Rebekah Michele Mulvaney, Rastafari and reggae: a dictionary and sourcebook, Westport CT: Greenwood, 1990. xvi + 253 pp.-Robert Dirks, Jerome S. Handler ,Searching for a slave cemetery in Barbados, West Indies: a bioarcheological and ethnohistorical investigation, Carbondale IL: Center for archaeological investigations, Southern Illinois University, 1989. xviii + 125 pp., Michael D. Conner, Keith P. Jacobi (eds)-Gert Oostindie, Cornelis Ch. Goslinga, The Dutch in the Caribbean and in Surinam 1791/1942, Assen, Maastricht: Van Gorcum, 1990. xii + 812 pp.-Rosemarijn Hoefte, Alfons Martinus Gerardus Rutten, Apothekers en chirurgijns: gezondheidszorg op de Benedenwindse eilanden van de Nederlandse Antillen in de negentiende eeuw, Assen/Maastricht: Van Gorcum, 1989. xx + 330 pp.-Rene A. Römer, Luc Alofs ,Ken ta Arubiano? sociale integratie en natievorming op Aruba, Leiden: Department of Caribbean studies, Royal Institute of Linguistics and Anthropology, 1990. xi + 232 pp., Leontine Merkies (eds)-Michiel van Kempen, Benny Ooft et al., De nacht op de Courage - Caraïbische vertellingen, Vreeland, the Netherlands: Basispers, 1990.-M. Stevens, F.E.R. Derveld ,Winti-religie: een Afro-Surinaamse godsdienst in Nederland, Amersfoort, the Netherlands: Academische Uitgeverij Amersfoort, 1988. 188 pp., H. Noordegraaf (eds)-Dirk H. van der Elst, H.U.E. Thoden van Velzen ,The great Father and the danger: religious cults, material forces, and collective fantasies in the world of the Surinamese Maroons, Dordrecht, the Netherlands and Providence RI: Foris Publications, 1988. xiv + 451 pp. [Second printing, Leiden: KITLV Press, 1991], W. van Wetering (eds)-Johannes M. Postma, Gert Oostindie, Roosenburg en Mon Bijou: twee Surinaamse plantages, 1720-1870, Dordrecht, Netherlands: Foris Publications, 1989. x + 548 pp.-Elizabeth Ann Schneider, John W. Nunley ,Caribbean festival arts: each and every bit of difference, Seattle/St. Louis: University of Washington Press / Saint Louis Art Museum, 1989. 217 pp., Judith Bettelheim (eds)-Bridget Brereton, Howard S. Pactor, Colonial British Caribbean newspapers: a bibliography and directory, Westport CT: Greenwood, 1990. xiii + 144 pp.-Marian Goslinga, Annotated bibliography of Puerto Rican bibliographies, compiled by Fay Fowlie-Flores. Westport CT: Greenwood Press, 1990. xxvi + 167 pp.
APA, Harvard, Vancouver, ISO, and other styles
24

McKenna, Julie. "The Actions of Teacher-Librarians Minimize or Reinforce Barriers to Adolescent Information Seeking." Evidence Based Library and Information Practice 4, no. 2 (June 14, 2009): 168. http://dx.doi.org/10.18438/b84903.

Full text
Abstract:
A Review of: Meyers, Eric M., Lisa P. Nathan, and Matthew L. Saxton. “Barriers to Information Seeking in School Libraries: Conflicts in Perceptions and Practice.” Information Research 12:2 (2007): paper 295. Objective – To study high school teacher-librarians and whether their actions and reactions are aligned with their perception of the role they play in creating an information seeking and learning environment. Design – Triangulation qualitative research undertaken over a 16 month period (Fall 2005 – 2007). Setting – Six high school libraries in the Puget Sound region of the state of Washington, United States. Subjects – Six teacher-librarians, each with a minimum of ten years experience and classroom teachers and students. This sample represented the range of school sizes, the rural, urban, and suburban mix, and the range of significant socioeconomic conditions (qualification for subsidized lunch and English as an additional language) in the region. Methods – Four interviews of one to two hours were held with each teacher-librarian during school hours. Initial interviews were recorded by hand and a set question protocol was used (and included in the appendix). Questions were asked about their professional background and training; their job duties, day to day activities and priorities; their perceptions as to how others (e.g., peers and administrators) support the library; the goals of their library’s services; how students use the library; and their critical assessment of their role. Subsequent interviews were undertaken within two days of a classroom visit to the library and also followed a set protocol of questions (Appendix D). The second set of interviews was audio recorded and transcribed. Two classroom teachers from each school were interviewed for 30 minutes and audio recorded using a set interview protocol (Appendix C) within two days of class participation in library instruction. Library observations ranging from two to three hours each occurred during a minimum of seven randomized times at each library. These observation sessions typically included class instructional sessions of thirty to ninety minutes. The observation protocols are described in an appendix to the study. Consistent note-taking, varying of observation times and days of week, use of triangulated methods, comparison of emergent themes with other studies, audio-taping interviews, inter-coder checks, analyzing data for observer effect, and a number of other approaches ensured validity. Kuhlthau’s theory of intermediation and Zone of Intervention was used as a theoretical framework to categorize the teacher-librarians’ perceptions of their roles and their observed activities. Harris and Dewdney’s principles of information seeking behaviour were used as an analytic framework to study the difference between the teacher-librarians’ perceptions of their roles and their observed practices. These five roles are organizer of information; expert in locating material; identifier and instructor of general sources; advisor of search strategy; and mediator in the process of constructing meaning (Kuhlthau). Main Results – The findings were framed in the six principles of information seeking (Harris & Dewdney) and were presented through use of narrative captured in both the observations and interviews. Principle 1: Information needs arise from the help-seeker’s situation. The high school students in the library to complete assignments about which the teacher-librarians were not apprised; therefore the teacher-librarians were unable to assist the students in meeting information needs. Principle 2: The decision to seek help or not seek help is affected by many factors. Principle 3: People tend to seek information that is most accessible. Issues of control were the greatest barrier to students’ successful information seeking behaviour. In the environments observed, the greatest balance of power was within the control of the teachers, including when and if the students would have access to the library, and whether the teacher-librarian would be informed of the assignment. Within the library facility, the teacher-librarians demonstrated a high need for control and power over the students’ activities and behaviour, and the students themselves had almost no power. Principle 4: People tend to first seek help or information from interpersonal sources, especially from people like themselves. Principle 5: Information seekers expect emotional support. The interpersonal style of each teacher-librarian had an affect on the nature of the students’ information seeking behaviour. The narratives demonstrated how the practices of staff, in particular, those actions that set expectations for student behaviour, had an affect on the actual information seeking activities undertaken by students. Principle 6: People follow habitual patterns in seeking information. The narrative used to recount the unsuccessful instruction and research session demonstrates that unless students are convinced of the reasons why they should change their approach, they will not change habitual patterns in seeking information. Students use familiar sources and their familiarity is with Google and Wikipedia. In order for them to understand why these sources alone are not adequate, the students would need to experience a situation that demonstrates this and would cause them to reconsider their habitual patterns. Conclusion – Students were not exposed to teacher-librarian behaviours and roles that would enable the development of information literacy skills. The absence of collaboration between teachers and teacher-librarians was detrimental to the support of students in their assigned tasks. Students were not able to carry out information seeking practices with any autonomy and were given no meaningful reason or evidence as to why they should consider different practices. The failure to recognize that students have information habits that must be validated in order to assist them in changing or establishing new information seeking behaviours was problematic. The adolescents’ need for affective support was negated and had consequences that affected their information seeking experience. These teacher-librarians perceive that they fulfill roles in support of information literacy learning, but their behaviours and actions contradict this perception. Teacher-librarians must be able to identify, analyze and change their behaviours and actions in order to better enable student achievement.
APA, Harvard, Vancouver, ISO, and other styles
25

Xing, Fei, Yi Ping Yao, Zhi Wen Jiang, and Bing Wang. "Fine-Grained Parallel and Distributed Spatial Stochastic Simulation of Biological Reactions." Advanced Materials Research 345 (September 2011): 104–12. http://dx.doi.org/10.4028/www.scientific.net/amr.345.104.

Full text
Abstract:
To date, discrete event stochastic simulations of large scale biological reaction systems are extremely compute-intensive and time-consuming. Besides, it has been widely accepted that spatial factor plays a critical role in the dynamics of most biological reaction systems. The NSM (the Next Sub-Volume Method), a spatial variation of the Gillespie’s stochastic simulation algorithm (SSA), has been proposed for spatially stochastic simulation of those systems. While being able to explore high degree of parallelism in systems, NSM is inherently sequential, which still suffers from the problem of low simulation speed. Fine-grained parallel execution is an elegant way to speed up sequential simulations. Thus, based on the discrete event simulation framework JAMES II, we design and implement a PDES (Parallel Discrete Event Simulation) TW (time warp) simulator to enable the fine-grained parallel execution of spatial stochastic simulations of biological reaction systems using the ANSM (the Abstract NSM), a parallel variation of the NSM. The simulation results of classical Lotka-Volterra biological reaction system show that our time warp simulator obtains remarkable parallel speed-up against sequential execution of the NSM.I.IntroductionThe goal of Systems biology is to obtain system-level investigations of the structure and behavior of biological reaction systems by integrating biology with system theory, mathematics and computer science [1][3], since the isolated knowledge of parts can not explain the dynamics of a whole system. As the complement of “wet-lab” experiments, stochastic simulation, being called the “dry-computational” experiment, plays a more and more important role in computing systems biology [2]. Among many methods explored in systems biology, discrete event stochastic simulation is of greatly importance [4][5][6], since a great number of researches have present that stochasticity or “noise” have a crucial effect on the dynamics of small population biological reaction systems [4][7]. Furthermore, recent research shows that the stochasticity is not only important in biological reaction systems with small population but also in some moderate/large population systems [7].To date, Gillespie’s SSA [8] is widely considered to be the most accurate way to capture the dynamics of biological reaction systems instead of traditional mathematical method [5][9]. However, SSA-based stochastic simulation is confronted with two main challenges: Firstly, this type of simulation is extremely time-consuming, since when the types of species and the number of reactions in the biological system are large, SSA requires a huge amount of steps to sample these reactions; Secondly, the assumption that the systems are spatially homogeneous or well-stirred is hardly met in most real biological systems and spatial factors play a key role in the behaviors of most real biological systems [19][20][21][22][23][24]. The next sub-volume method (NSM) [18], presents us an elegant way to access the special problem via domain partition. To our disappointment, sequential stochastic simulation with the NSM is still very time-consuming, and additionally introduced diffusion among neighbor sub-volumes makes things worse. Whereas, the NSM explores a very high degree of parallelism among sub-volumes, and parallelization has been widely accepted as the most meaningful way to tackle the performance bottleneck of sequential simulations [26][27]. Thus, adapting parallel discrete event simulation (PDES) techniques to discrete event stochastic simulation would be particularly promising. Although there are a few attempts have been conducted [29][30][31], research in this filed is still in its infancy and many issues are in need of further discussion. The next section of the paper presents the background and related work in this domain. In section III, we give the details of design and implementation of model interfaces of LP paradigm and the time warp simulator based on the discrete event simulation framework JAMES II; the benchmark model and experiment results are shown in Section IV; in the last section, we conclude the paper with some future work.II. Background and Related WorkA. Parallel Discrete Event Simulation (PDES)The notion Logical Process (LP) is introduced to PDES as the abstract of the physical process [26], where a system consisting of many physical processes is usually modeled by a set of LP. LP is regarded as the smallest unit that can be executed in PDES and each LP holds a sub-partition of the whole system’s state variables as its private ones. When a LP processes an event, it can only modify the state variables of its own. If one LP needs to modify one of its neighbors’ state variables, it has to schedule an event to the target neighbor. That is to say event message exchanging is the only way that LPs interact with each other. Because of the data dependences or interactions among LPs, synchronization protocols have to be introduced to PDES to guarantee the so-called local causality constraint (LCC) [26]. By now, there are a larger number of synchronization algorithms have been proposed, e.g. the null-message [26], the time warp (TW) [32], breath time warp (BTW) [33] and etc. According to whether can events of LPs be processed optimistically, they are generally divided into two types: conservative algorithms and optimistic algorithms. However, Dematté and Mazza have theoretically pointed out the disadvantages of pure conservative parallel simulation for biochemical reaction systems [31]. B. NSM and ANSM The NSM is a spatial variation of Gillespie’ SSA, which integrates the direct method (DM) [8] with the next reaction method (NRM) [25]. The NSM presents us a pretty good way to tackle the aspect of space in biological systems by partitioning a spatially inhomogeneous system into many much more smaller “homogeneous” ones, which can be simulated by SSA separately. However, the NSM is inherently combined with the sequential semantics, and all sub-volumes share one common data structure for events or messages. Thus, directly parallelization of the NSM may be confronted with the so-called boundary problem and high costs of synchronously accessing the common data structure [29]. In order to obtain higher efficiency of parallel simulation, parallelization of NSM has to firstly free the NSM from the sequential semantics and secondly partition the shared data structure into many “parallel” ones. One of these is the abstract next sub-volume method (ANSM) [30]. In the ANSM, each sub-volume is modeled by a logical process (LP) based on the LP paradigm of PDES, where each LP held its own event queue and state variables (see Fig. 1). In addition, the so-called retraction mechanism was introduced in the ANSM too (see algorithm 1). Besides, based on the ANSM, Wang etc. [30] have experimentally tested the performance of several PDES algorithms in the platform called YH-SUPE [27]. However, their platform is designed for general simulation applications, thus it would sacrifice some performance for being not able to take into account the characteristics of biological reaction systems. Using the similar ideas of the ANSM, Dematté and Mazza have designed and realized an optimistic simulator. However, they processed events in time-stepped manner, which would lose a specific degree of precisions compared with the discrete event manner, and it is very hard to transfer a time-stepped simulation to a discrete event one. In addition, Jeschke etc.[29] have designed and implemented a dynamic time-window simulator to execution the NSM in parallel on the grid computing environment, however, they paid main attention on the analysis of communication costs and determining a better size of the time-window.Fig. 1: the variations from SSA to NSM and from NSM to ANSMC. JAMES II JAMES II is an open source discrete event simulation experiment framework developed by the University of Rostock in Germany. It focuses on high flexibility and scalability [11][13]. Based on the plug-in scheme [12], each function of JAMES II is defined as a specific plug-in type, and all plug-in types and plug-ins are declared in XML-files [13]. Combined with the factory method pattern JAMES II innovatively split up the model and simulator, which makes JAMES II is very flexible to add and reuse both of models and simulators. In addition, JAMES II supports various types of modelling formalisms, e.g. cellular automata, discrete event system specification (DEVS), SpacePi, StochasticPi and etc.[14]. Besides, a well-defined simulator selection mechanism is designed and developed in JAMES II, which can not only automatically choose the proper simulators according to the modeling formalism but also pick out a specific simulator from a serious of simulators supporting the same modeling formalism according to the user settings [15].III. The Model Interface and SimulatorAs we have mentioned in section II (part C), model and simulator are split up into two separate parts. Thus, in this section, we introduce the designation and implementation of model interface of LP paradigm and more importantly the time warp simulator.A. The Mod Interface of LP ParadigmJAMES II provides abstract model interfaces for different modeling formalism, based on which Wang etc. have designed and implemented model interface of LP paradigm[16]. However, this interface is not scalable well for parallel and distributed simulation of larger scale systems. In our implementation, we accommodate the interface to the situation of parallel and distributed situations. Firstly, the neighbor LP’s reference is replaced by its name in LP’s neighbor queue, because it is improper even dangerous that a local LP hold the references of other LPs in remote memory space. In addition, (pseudo-)random number plays a crucial role to obtain valid and meaningful results in stochastic simulations. However, it is still a very challenge work to find a good random number generator (RNG) [34]. Thus, in order to focus on our problems, we introduce one of the uniform RNGs of JAMES II to this model interface, where each LP holds a private RNG so that random number streams of different LPs can be independent stochastically. B. The Time Warp SimulatorBased on the simulator interface provided by JAMES II, we design and implement the time warp simulator, which contains the (master-)simulator, (LP-)simulator. The simulator works strictly as master/worker(s) paradigm for fine-grained parallel and distributed stochastic simulations. Communication costs are crucial to the performance of a fine-grained parallel and distributed simulation. Based on the Java remote method invocation (RMI) mechanism, P2P (peer-to-peer) communication is implemented among all (master-and LP-)simulators, where a simulator holds all the proxies of targeted ones that work on remote workers. One of the advantages of this communication approach is that PDES codes can be transferred to various hardwire environment, such as Clusters, Grids and distributed computing environment, with only a little modification; The other is that RMI mechanism is easy to realized and independent to any other non-Java libraries. Since the straggler event problem, states have to be saved to rollback events that are pre-processed optimistically. Each time being modified, the state is cloned to a queue by Java clone mechanism. Problem of this copy state saving approach is that it would cause loads of memory space. However, the problem can be made up by a condign GVT calculating mechanism. GVT reduction scheme also has a significant impact on the performance of parallel simulators, since it marks the highest time boundary of events that can be committed so that memories of fossils (processed events and states) less than GVT can be reallocated. GVT calculating is a very knotty for the notorious simultaneous reporting problem and transient messages problem. According to our problem, another GVT algorithm, called Twice Notification (TN-GVT) (see algorithm 2), is contributed to this already rich repository instead of implementing one of GVT algorithms in reference [26] and [28].This algorithm looks like the synchronous algorithm described in reference [26] (pp. 114), however, they are essentially different from each other. This algorithm has never stopped the simulators from processing events when GVT reduction, while algorithm in reference [26] blocks all simulators for GVT calculating. As for the transient message problem, it can be neglect in our implementation, because RMI based remote communication approach is synchronized, that means a simulator will not go on its processing until the remote the massage get to its destination. And because of this, the high-costs message acknowledgement, prevalent over many classical asynchronous GVT algorithms, is not needed anymore too, which should be constructive to the whole performance of the time warp simulator.IV. Benchmark Model and Experiment ResultsA. The Lotka-Volterra Predator-prey SystemIn our experiment, the spatial version of Lotka-Volterra predator-prey system is introduced as the benchmark model (see Fig. 2). We choose the system for two considerations: 1) this system is a classical experimental model that has been used in many related researches [8][30][31], so it is credible and the simulation results are comparable; 2) it is simple but helpful enough to test the issues we are interested in. The space of predator-prey System is partitioned into a2D NXNgrid, whereNdenotes the edge size of the grid. Initially the population of the Grass, Preys and Predators are set to 1000 in each single sub-volume (LP). In Fig. 2,r1,r2,r3stand for the reaction constants of the reaction 1, 2 and 3 respectively. We usedGrass,dPreyanddPredatorto stand for the diffusion rate of Grass, Prey and Predator separately. Being similar to reference [8], we also take the assumption that the population of the grass remains stable, and thusdGrassis set to zero.R1:Grass + Prey ->2Prey(1)R2:Predator +Prey -> 2Predator(2)R3:Predator -> NULL(3)r1=0.01; r2=0.01; r3=10(4)dGrass=0.0;dPrey=2.5;dPredato=5.0(5)Fig. 2: predator-prey systemB. Experiment ResultsThe simulation runs have been executed on a Linux Cluster with 40 computing nodes. Each computing node is equipped with two 64bit 2.53 GHz Intel Xeon QuadCore Processors with 24GB RAM, and nodes are interconnected with Gigabit Ethernet connection. The operating system is Kylin Server 3.5, with kernel 2.6.18. Experiments have been conducted on the benchmark model of different size of mode to investigate the execution time and speedup of the time warp simulator. As shown in Fig. 3, the execution time of simulation on single processor with 8 cores is compared. The result shows that it will take more wall clock time to simulate much larger scale systems for the same simulation time. This testifies the fact that larger scale systems will leads to more events in the same time interval. More importantly, the blue line shows that the sequential simulation performance declines very fast when the mode scale becomes large. The bottleneck of sequential simulator is due to the costs of accessing a long event queue to choose the next events. Besides, from the comparison between group 1 and group 2 in this experiment, we could also conclude that high diffusion rate increased the simulation time greatly both in sequential and parallel simulations. This is because LP paradigm has to split diffusion into two processes (diffusion (in) and diffusion (out) event) for two interactive LPs involved in diffusion and high diffusion rate will lead to high proportional of diffusion to reaction. In the second step shown in Fig. 4, the relationship between the speedups from time warp of two different model sizes and the number of work cores involved are demonstrated. The speedup is calculated against the sequential execution of the spatial reaction-diffusion systems model with the same model size and parameters using NSM.Fig. 4 shows the comparison of speedup of time warp on a64X64grid and a100X100grid. In the case of a64X64grid, under the condition that only one node is used, the lowest speedup (a little bigger than 1) is achieved when two cores involved, and the highest speedup (about 6) is achieved when 8 cores involved. The influence of the number of cores used in parallel simulation is investigated. In most cases, large number of cores could bring in considerable improvements in the performance of parallel simulation. Also, compared with the two results in Fig. 4, the simulation of larger model achieves better speedup. Combined with time tests (Fig. 3), we find that sequential simulator’s performance declines sharply when the model scale becomes very large, which makes the time warp simulator get better speed-up correspondingly.Fig. 3: Execution time (wall clock time) of Seq. and time warp with respect to different model sizes (N=32, 64, 100, and 128) and model parameters based on single computing node with 8 cores. Results of the test are grouped by the diffusion rates (Group 1: Sequential 1 and Time Warp 1. dPrey=2.5, dPredator=5.0; Group 2: dPrey=0.25, dPredator=0.5, Sequential 2 and Time Warp 2).Fig. 4: Speedup of time warp with respect to the number of work cores and the model size (N=64 and 100). Work cores are chose from one computing node. Diffusion rates are dPrey=2.5, dPredator=5.0 and dGrass=0.0.V. Conclusion and Future WorkIn this paper, a time warp simulator based on the discrete event simulation framework JAMES II is designed and implemented for fine-grained parallel and distributed discrete event spatial stochastic simulation of biological reaction systems. Several challenges have been overcome, such as state saving, roll back and especially GVT reduction in parallel execution of simulations. The Lotka-Volterra Predator-Prey system is chosen as the benchmark model to test the performance of our time warp simulator and the best experiment results show that it can obtain about 6 times of speed-up against the sequential simulation. The domain this paper concerns with is in the infancy, many interesting issues are worthy of further investigated, e.g. there are many excellent PDES optimistic synchronization algorithms (e.g. the BTW) as well. Next step, we would like to fill some of them into JAMES II. In addition, Gillespie approximation methods (tau-leap[10] etc.) sacrifice some degree of precision for higher simulation speed, but still could not address the aspect of space of biological reaction systems. The combination of spatial element and approximation methods would be very interesting and promising; however, the parallel execution of tau-leap methods should have to overcome many obstacles on the road ahead.AcknowledgmentThis work is supported by the National Natural Science Foundation of China (NSF) Grant (No.60773019) and the Ph.D. Programs Foundation of Ministry of Education of China (No. 200899980004). The authors would like to show their great gratitude to Dr. Jan Himmelspach and Dr. Roland Ewald at the University of Rostock, Germany for their invaluable advice and kindly help with JAMES II.ReferencesH. Kitano, "Computational systems biology." Nature, vol. 420, no. 6912, pp. 206-210, November 2002.H. Kitano, "Systems biology: a brief overview." Science (New York, N.Y.), vol. 295, no. 5560, pp. 1662-1664, March 2002.A. Aderem, "Systems biology: Its practice and challenges," Cell, vol. 121, no. 4, pp. 511-513, May 2005. [Online]. Available: http://dx.doi.org/10.1016/j.cell.2005.04.020.H. de Jong, "Modeling and simulation of genetic regulatory systems: A literature review," Journal of Computational Biology, vol. 9, no. 1, pp. 67-103, January 2002.C. W. Gardiner, Handbook of Stochastic Methods: for Physics, Chemistry and the Natural Sciences (Springer Series in Synergetics), 3rd ed. Springer, April 2004.D. T. Gillespie, "Simulation methods in systems biology," in Formal Methods for Computational Systems Biology, ser. Lecture Notes in Computer Science, M. Bernardo, P. Degano, and G. Zavattaro, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008, vol. 5016, ch. 5, pp. 125-167.Y. Tao, Y. Jia, and G. T. Dewey, "Stochastic fluctuations in gene expression far from equilibrium: Omega expansion and linear noise approximation," The Journal of Chemical Physics, vol. 122, no. 12, 2005.D. T. Gillespie, "Exact stochastic simulation of coupled chemical reactions," Journal of Physical Chemistry, vol. 81, no. 25, pp. 2340-2361, December 1977.D. T. Gillespie, "Stochastic simulation of chemical kinetics," Annual Review of Physical Chemistry, vol. 58, no. 1, pp. 35-55, 2007.D. T. Gillespie, "Approximate accelerated stochastic simulation of chemically reacting systems," The Journal of Chemical Physics, vol. 115, no. 4, pp. 1716-1733, 2001.J. Himmelspach, R. Ewald, and A. M. Uhrmacher, "A flexible and scalable experimentation layer," in WSC '08: Proceedings of the 40th Conference on Winter Simulation. Winter Simulation Conference, 2008, pp. 827-835.J. Himmelspach and A. M. Uhrmacher, "Plug'n simulate," in 40th Annual Simulation Symposium (ANSS'07). Washington, DC, USA: IEEE, March 2007, pp. 137-143.R. Ewald, J. Himmelspach, M. Jeschke, S. Leye, and A. M. Uhrmacher, "Flexible experimentation in the modeling and simulation framework james ii-implications for computational systems biology," Brief Bioinform, vol. 11, no. 3, pp. bbp067-300, January 2010.A. Uhrmacher, J. Himmelspach, M. Jeschke, M. John, S. Leye, C. Maus, M. Röhl, and R. Ewald, "One modelling formalism & simulator is not enough! a perspective for computational biology based on james ii," in Formal Methods in Systems Biology, ser. Lecture Notes in Computer Science, J. Fisher, Ed. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008, vol. 5054, ch. 9, pp. 123-138. [Online]. Available: http://dx.doi.org/10.1007/978-3-540-68413-8_9.R. Ewald, J. Himmelspach, and A. M. Uhrmacher, "An algorithm selection approach for simulation systems," pads, vol. 0, pp. 91-98, 2008.Bing Wang, Jan Himmelspach, Roland Ewald, Yiping Yao, and Adelinde M Uhrmacher. Experimental analysis of logical process simulation algorithms in james ii[C]// In M. D. Rossetti, R. R. Hill, B. Johansson, A. Dunkin, and R. G. Ingalls, editors, Proceedings of the Winter Simulation Conference, IEEE Computer Science, 2009. 1167-1179.Ewald, J. Rössel, J. Himmelspach, and A. M. Uhrmacher, "A plug-in-based architecture for random number generation in simulation systems," in WSC '08: Proceedings of the 40th Conference on Winter Simulation. Winter Simulation Conference, 2008, pp. 836-844.J. Elf and M. Ehrenberg, "Spontaneous separation of bi-stable biochemical systems into spatial domains of opposite phases." Systems biology, vol. 1, no. 2, pp. 230-236, December 2004.K. Takahashi, S. Arjunan, and M. Tomita, "Space in systems biology of signaling pathways? Towards intracellular molecular crowding in silico," FEBS Letters, vol. 579, no. 8, pp. 1783-1788, March 2005.J. V. Rodriguez, J. A. Kaandorp, M. Dobrzynski, and J. G. Blom, "Spatial stochastic modelling of the phosphoenolpyruvate-dependent phosphotransferase (pts) pathway in escherichia coli," Bioinformatics, vol. 22, no. 15, pp. 1895-1901, August 2006.D. Ridgway, G. Broderick, and M. Ellison, "Accommodating space, time and randomness in network simulation," Current Opinion in Biotechnology, vol. 17, no. 5, pp. 493-498, October 2006.J. V. Rodriguez, J. A. Kaandorp, M. Dobrzynski, and J. G. Blom, "Spatial stochastic modelling of the phosphoenolpyruvate-dependent phosphotransferase (pts) pathway in escherichia coli," Bioinformatics, vol. 22, no. 15, pp. 1895-1901, August 2006.W. G. Wilson, A. M. Deroos, and E. Mccauley, "Spatial instabilities within the diffusive lotka-volterra system: Individual-based simulation results," Theoretical Population Biology, vol. 43, no. 1, pp. 91-127, February 1993.K. Kruse and J. Elf. Kinetics in spatially extended systems. In Z. Szallasi, J. Stelling, and V. Periwal, editors, System Modeling in Cellular Biology. From Concepts to Nuts and Bolts, pages 177–198. MIT Press, Cambridge, MA, 2006.M. A. Gibson and J. Bruck, "Efficient exact stochastic simulation of chemical systems with many species and many channels," The Journal of Physical Chemistry A, vol. 104, no. 9, pp. 1876-1889, March 2000.R. M. Fujimoto, Parallel and Distributed Simulation Systems (Wiley Series on Parallel and Distributed Computing). Wiley-Interscience, January 2000.Y. Yao and Y. Zhang, “Solution for analytic simulation based on parallel processing,” Journal of System Simulation, vol. 20, No.24, pp. 6617–6621, 2008.G. Chen and B. K. Szymanski, "Dsim: scaling time warp to 1,033 processors," in WSC '05: Proceedings of the 37th conference on Winter simulation. Winter Simulation Conference, 2005, pp. 346-355.M. Jeschke, A. Park, R. Ewald, R. Fujimoto, and A. M. Uhrmacher, "Parallel and distributed spatial simulation of chemical reactions," in 2008 22nd Workshop on Principles of Advanced and Distributed Simulation. Washington, DC, USA: IEEE, June 2008, pp. 51-59.B. Wang, Y. Yao, Y. Zhao, B. Hou, and S. Peng, "Experimental analysis of optimistic synchronization algorithms for parallel simulation of reaction-diffusion systems," High Performance Computational Systems Biology, International Workshop on, vol. 0, pp. 91-100, October 2009.L. Dematté and T. Mazza, "On parallel stochastic simulation of diffusive systems," in Computational Methods in Systems Biology, M. Heiner and A. M. Uhrmacher, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008, vol. 5307, ch. 16, pp. 191-210.D. R. Jefferson, "Virtual time," ACM Trans. Program. Lang. Syst., vol. 7, no. 3, pp. 404-425, July 1985.J. S. Steinman, "Breathing time warp," SIGSIM Simul. Dig., vol. 23, no. 1, pp. 109-118, July 1993. [Online]. Available: http://dx.doi.org/10.1145/174134.158473 S. K. Park and K. W. Miller, "Random number generators: good ones are hard to find," Commun. ACM, vol. 31, no. 10, pp. 1192-1201, October 1988.
APA, Harvard, Vancouver, ISO, and other styles
26

"Washington Watch." Practicing Anthropology 8, no. 1-2 (January 1, 1986): 20. http://dx.doi.org/10.17730/praa.8.1-2.4333t76206100337.

Full text
Abstract:
This first issue of the Watch plunges into a crucial phase of the Federal policy process known as rulemaking or regulation. Several factors prompted the choice of this topic. For one, effective intervention in the policy process requires familiarity with "policy culture," that is, with the scenarios, language, choices, etc. of all its interactive phases, from policy formulation and implementation to monitoring, evaluation and change. Rulemaking, one type of policy formulation, is especially important, not just because it can have widespread implications but also because it is amenable to anthropological input without major investments of time or funds. Anthropological involvement means writing responses to draft rules made by particular agencies, say the Department of Education, or rules covering actions about particular peoples, perhaps Native Americans, or topics, such as the natural environment. Involvement can also mean incorporating rulemaking issues into policy or American culture courses; students could be asked to track laws and subsequent draft and final rules (if time permits) or to write comments and track agency responses. Another factor prompting this discussion is the availability of Robert M. Wulff's paper, "Federal Rulemaking: Process and Access," based on his experience drafting HUD regulations. First published in Practicing Anthropology, Special Issue: Public Interest Anthropology (Vol.1, no.3, 1979), it is reprinted here somewhat more briefly as a springboard to the Federal Register and its published rules. Bob tells us that: "To understand and influence Federal decision-making, one must master and impact two arenas: Congress, and increasingly, the Executive branch agencies. This article will introduce the latter. … The Executive branch agencies include the twelve Cabinet Departments (e.g. HUD, HHS, Interior) plus fifty-one assorted sub-cabinet or quasi-independent agencies ranging from Action to the Veterans Administration. The scope and power of these agencies is great. (For a good synopsis of their programs and goals see the latest United States Government Manual—order from U.S. Government Printing Office, Washington, D. C. 20402). Agency power derives from their authority to issue rules or regulations (these words are synonymous but the latter will be used hereafter). Federal regulations have little visibility outside Washington D.C., but they are an extremely important instrument of Federal policy. The primary import of regulations is that they have the force and effect of law. Federal regulations can be thought of as "delegated legislation." Regulations are also important because they are ubiquitous and proliferating to the point where they rival Congressional legislation as instruments of Federal policy. This state of affairs is the result of a gradual shift in the decision-making role of Congress.
APA, Harvard, Vancouver, ISO, and other styles
27

Kozak, Nadine Irène. "Building Community, Breaking Barriers: Little Free Libraries and Local Action in the United States." M/C Journal 20, no. 2 (April 26, 2017). http://dx.doi.org/10.5204/mcj.1220.

Full text
Abstract:
Image 1: A Little Free Library. Image credit: Nadine Kozak.IntroductionLittle Free Libraries give people a reason to stop and exchange things they love: books. It seemed like a really good way to build a sense of community.Dannette Lank, Little Free Library steward, Whitefish Bay, Wisconsin, 2013 (Rumage)Against a backdrop of stagnant literacy rates and enduring perceptions of urban decay and the decline of communities in cities (NCES, “Average Literacy”; NCES, “Average Prose”; Putnam 25; Skogan 8), legions of Little Free Libraries (LFLs) have sprung up across the United States between 2009 and the present. LFLs are small, often homemade structures housing books and other physical media for passersby to choose a book to take or leave a book to share with others. People have installed the structures in front of homes, schools, libraries, churches, fire and police stations, community gardens, and in public parks. There are currently 50,000 LFLs around the world, most of which are in the continental United States (Aldrich, “Big”). LFLs encompass building in multiple senses of the term; LFLs are literally tiny buildings to house books and people use the structures for building neighbourhood social capital. The organisation behind the movement cites “building community” as one of its three core missions (Little Free Library). Rowan Moore, theorising humans’ reasons for building, argues desire and emotion are central (16). The LFL movement provides evidence for this claim: stewards erect LFLs based on hope for increased literacy and a desire to build community through their altruistic actions. This article investigates how LFLs build urban community and explores barriers to the endeavour, specifically municipal building and right of way ordinances used in attempts to eradicate the structures. It also examines local responses to these municipal actions and potential challenges to traditional public libraries brought about by LFLs, primarily the decrease of visits to public libraries and the use of LFLs to argue for defunding of publicly provided library services. The work argues that LFLs build community in some places but may threaten other community services. This article employs qualitative content analysis of 261 stewards’ comments about their registered LFLs on the organisation’s website drawn from the two largest cities in a Midwestern state and an interview with an LFL steward in a village in the same state to analyse how LFLs build community. The two cities, located in the state where the LFL movement began, provide a cross section of innovators, early adopters, and late adopters of the book exchanges, determined by their registered charter numbers. Press coverage and municipal documents from six cities across the US gathered through a snowball sample provide data about municipal challenges to LFLs. Blog posts penned by practising librarians furnish some opinions about the movement. This research, while not a representative sample, identifies common themes and issues around LFLs and provides a basis for future research.The act of building and curating an LFL is a representation of shared beliefs about literacy, community, and altruism. Establishing an LFL is an act of civic participation. As Nico Carpentier notes, while some civic participation is macro, carried out at the level of the nation, other participation is micro, conducted in “the spheres of school, family, workplace, church, and community” (17). Ruth H. Landman investigates voluntary activities in the city, including community gardening, and community bakeries, and argues that the people associated with these projects find themselves in a “denser web of relations” than previously (2). Gretchen M. Herrmann argues that neighbourhood garage sales, although fleeting events, build an enduring sense of community amongst participants (189). Ray Oldenburg contends that people create associational webs in what he calls “great good places”; third spaces separate from home and work (20-21). Little Free Libraries and Community BuildingEmotion plays a central role in the decision to become an LFL steward, the person who establishes and maintains the LFL. People recount their desire to build a sense of community and share their love of reading with neighbours (Charter 4684; Charter 8212; Charter 9437; Charter 9705; Charter 16561). One steward in the study reported, “I love books and I want to be able to help foster that love in our neighbourhood as well” (Charter 4369). Image 2: A Little Free Library, bench, water fountain, and dog’s water bowl for passersby to enjoy. Image credit: Nadine Kozak.Relationships and emotional ties are central to some people’s decisions to have an LFL. The LFL website catalogues many instances of memorial LFLs, tributes to librarians, teachers, and avid readers. Indeed, the first Little Free Library, built by Todd Bol in 2009, was a tribute to his late mother, a teacher who loved reading (“Our History”). In the two city study area, ten LFLs are memorials, allowing bereaved families to pass on a loved one’s penchant for sharing books and reading (Charter 1235; Charter 1309; Charter 4604; Charter 6219; Charter 6542; Charter 6954; Charter 10326; Charter 16734; Charter 24481; Charter 30369). In some cases, urban neighbours come together to build, erect, and stock LFLs. One steward wrote: “Those of us who live in this friendly neighborhood collaborated to design[,] build and paint a bungalow themed library” to match the houses in the neighbourhood (Charter 2532). Another noted: “Our neighbor across the street is a skilled woodworker, and offered to build the library for us if we would install it in our yard and maintain it. What a deal!” (Charter 18677). Community organisations also install and maintain LFLs, including 21 in the study population (e.g. Charter 31822; Charter 27155).Stewards report increased communication with neighbours due to their LFLs. A steward noted: “We celebrated the library’s launch on a Saturday morning with neighbors of all ages. We love sitting on our front porch and catching up with the people who stop to check out the books” (Charter 9673). Another exclaimed:within 24 hours, before I had time to paint it, my Little Free Library took on a life of its own. All of a sudden there were lots of books in it and people stopping by. I wondered where these books came from as I had not put any in there. Little kids in the neighborhood are all excited about it and I have met neighbors that I had never seen before. This is going to be fun! (Charter 15981)LFLs build community through social interaction and collaboration. This occurs when neighbours come together to build, install, and fill the structures. The structures also open avenues for conversation between neighbours who had no connection previously. Like Herrmann’s neighbourhood garage sales, LFLs create and maintain social ties between neighbours and link them by the books they share. Additionally, when neighbours gather and communicate at the LFL structure, they create a transitory third space for “informal public life”, where people can casually interact at a nearby location (Oldenburg 14, 288).Building Barriers, Creating CommunityThe erection of an LFL in an urban neighbourhood is not, however, always a welcome sight. The news analysis found that LFLs most often come to the attention of municipal authorities via citizen complaints, which lead to investigations and enforcement of ordinances. In Kansas, a neighbour called an LFL an “eyesore” and an “illegal detached structure” (Tapper). In Wisconsin, well-meaning future stewards contacted their village authorities to ask about rules, inadvertently setting off a six-month ban on LFLs (Stingl; Rumage). Resulting from complaints and inquiries, municipalities regulated, and in one case banned, LFLs, thus building barriers to citizens’ desires to foster community and share books with neighbours.Municipal governments use two major areas of established code to remove or prohibit LFLs: ordinances banning unapproved structures in residents’ yards and those concerned with obstructions to right of ways when stewards locate the LFLs between the public sidewalk and street.In the first instance, municipal ordinances prohibit either front yard or detached structures. Controversies over these ordinances and LFLs erupted in Whitefish Bay, Wisconsin, in 2012; Leawood, Kansas, in 2014; Shreveport, Louisiana, in 2015; and Dallas, Texas, in 2015. The Village of Whitefish Bay banned LFLs due to an ordinance prohibiting “front yard structures,” including mailboxes (Sanburn; Stingl). In Leawood, the city council argued that an LFL, owned by a nine-year-old boy, violated an ordinance that forbade the construction of any detached structures without city council permission. In Shreveport, the stewards of an LFL received a cease and desist letter from city council for having an “accessory structure” in the front yard (LaCasse; Burris) and Dallas officials knocked on a steward’s front door, informing her of a similar breach (Kellogg).In the second instance, some urban municipalities argued that LFLs are obstructions that block right of ways. In Lincoln, Nebraska, the public works director noted that the city “uses the area between the sidewalk and the street for snow storage in the winter, light poles, mailboxes, things like that.” The director continued: “And I imagine these little libraries are meant to congregate people like a water cooler, but we don’t want people hanging around near the road by the curb” (Heady). Both Lincoln in 2014 and Los Angeles (LA), California, in 2015, cited LFLs for obstructions. In Lincoln, the city notified the Southminster United Methodist Church that their LFL, located between the public sidewalk and street, violated a municipal ordinance (Sanburn). In LA, the Bureau of Street Services notified actor Peter Cook that his LFL, situated in the right of way, was an “obstruction” that Cook had to remove or the city would levy a fine (Moss). The city agreed at a hearing to consider a “revocable permit” for Cook’s LFL, but later denied its issuance (Condes).Stewards who found themselves in violation of municipal ordinances were able to harness emotion and build outrage over limits to individuals’ ability to erect LFLs. In Kansas, the stewards created a Facebook page, Spencer’s Little Free Library, which received over 31,000 likes and messages of support. One comment left on the page reads: “The public outcry will force those lame city officials to change their minds about it. Leave it to the stupid government to rain on everybody’s parade” (“Good”). Children’s author Daniel Handler sent a letter to the nine-year-old steward, writing as Lemony Snicket, “fighting against librarians is immoral and useless in the face of brave and noble readers such as yourself” (Spencer’s). Indeed, the young steward gave a successful speech to city hall arguing that the body should allow the structures because “‘lots of people in the neighborhood used the library and the books were always changing. I think it’s good for Leawood’” (Bauman). Other local LFL supporters also attended council and spoke in favour of the structures (Harper). In LA, Cook’s neighbours started a petition that gathered over 100 signatures, where people left comments including, “No to bullies!” (Lopez). Additionally, neighbours gathered to discuss the issue (Dana). In Shreveport, neighbours left stacks of books in their front yards, without a structure housing them due to the code banning accessory structures. One noted, “I’m basically telling the [Metropolitan Planning Commission] to go sod off” (Friedersdorf; Moss). LFL proponents reacted with frustration and anger at the perceived over-reach of the government toward harmless LFLs. In addition to the actions of neighbours and supporters, the national and local press commented on the municipal constraints. The LFL movement has benefitted from a significant amount of positive press in its formative years, a press willing to publicise and criticise municipal actions to thwart LFL development. Stewards’ struggles against municipal bureaucracies building barriers to LFLs makes prime fodder for the news media. Herbert J. Gans argues an enduring value in American news is “the preservation of the freedom of the individual against the encroachments of nation and society” (50). The juxtaposition of well-meaning LFL stewards against municipal councils and committees provided a compelling opportunity to illustrate this value.National media outlets, including Time (Sanburn), Christian Science Monitor (LaCasse), and The Atlantic, drew attention to the issue. Writing in The Atlantic, Conor Friedersdorf critically noted:I wish I was writing this to merely extol this trend [of community building via LFLs]. Alas, a subset of Americans are determined to regulate every last aspect of community life. Due to selection bias, they are overrepresented among local politicians and bureaucrats. And so they have power, despite their small-mindedness, inflexibility, and lack of common sense so extreme that they’ve taken to cracking down on Little Free Libraries, of all things. (Friedersdorf, n.p.)Other columnists mirrored this sentiment. Writing in the LA Times, one commentator sarcastically wrote that city officials were “cracking down on one of the country’s biggest problems: small community libraries where residents share books” (Schaub). Journalists argued this was government overreach on non-issues rather than tackling larger community problems, such as income inequality, homelessness, and aging infrastructure (Solomon; Schaub). The protests and negative press coverage led to, in the case of the municipalities with front yard and detached structure ordinances, détente between stewards and councils as the latter passed amendments permitting and regulating LFLs. Whitefish Bay, Leawood, and Shreveport amended ordinances to allow for LFLs, but also to regulate them (Everson; Topil; Siegel). Ordinances about LFLs restricted their number on city blocks, placement on private property, size and height, as well as required registration with the municipality in some cases. Lincoln officials allowed the church to relocate the LFL from the right of way to church property and waived the $500 fine for the obstruction violation (Sanburn). In addition to the amendments, the protests also led to civic participation and community building including presentations to city council, a petition, and symbolic acts of defiance. Through this protest, neighbours create communities—networks of people working toward a common goal. This aspect of community building around LFLs was unintentional but it brought people together nevertheless.Building a Challenge to Traditional Libraries?LFL marketing and communication staff member Margaret Aldrich suggests in The Little Free Library Book that LFLs are successful because they are “gratifyingly doable” projects that can be accomplished by an individual (16). It is this ease of building, erecting, and maintaining LFLs that builds concern as their proliferation could challenge aspects of library service, such as public funding and patron visits. Some professional librarians are in favour of the LFLs and are stewards themselves (Charter 121; Charter 2608; Charter 9702; Charter 41074; Rumage). Others envision great opportunities for collaboration between traditional libraries and LFLs, including the library publicising LFLs and encouraging their construction as well as using LFLs to serve areas without, or far from, a public library (Svehla; Shumaker). While lauding efforts to build community, some professional librarians question the nomenclature used by the movement. They argue the phrase Little Free Libraries is inaccurate as libraries are much more than random collections of books. Instead, critics contend, the LFL structures are closer to book swaps and exchanges than actual libraries, which offer a range of services such as Internet access, digital materials, community meeting spaces, and workshops and programming on a variety of topics (American Library Association; Annoyed Librarian). One university reference and instruction librarian worries about “the general public’s perception and lumping together of little free libraries and actual ‘real’ public libraries” (Hardenbrook). By way of illustration, he imagines someone asking, “‘why do we need our tax money to go to something that can be done for FREE?’” (Hardenbrook). Librarians holding this perspective fear the movement might add to a trend of neoliberalism, limiting or ending public funding for libraries, as politicians believe that the localised, individual solutions can replace publicly funded library services. This is a trend toward what James Ferguson calls “responsibilized” citizens, those “deployed to produce governmentalized results that do not depend on direct state intervention” (172). In other countries, this shift has already begun. In the United Kingdom (UK), governments are devolving formerly public services onto community groups and volunteers. Lindsay Findlay-King, Geoff Nichols, Deborah Forbes, and Gordon Macfadyen trace the impacts of the 2012 Localism Act in the UK, which caused “sport and library asset transfers” (12) to community and volunteer groups who were then responsible for service provision and, potentially, facility maintenance as well. Rather than being in charge of a “doable” LFL, community groups and volunteers become the operators of much larger facilities. Recent efforts in the US to privatise library services as governments attempt to cut budgets and streamline services (Streitfeld) ground this fear. Image 3: “Take a Book, Share a Book,” a Little Free Library motto. Image credit: Nadine Kozak. LFLs might have real consequences for public libraries. Another potential unintended consequence of the LFLs is decreasing visits to public libraries, which could provide officials seeking to defund them with evidence that they are no longer relevant or necessary. One LFL steward and avid reader remarked that she had not used her local public library since 2014 because “I was using the Little Free Libraries” (Steward). Academics and librarians must conduct more research to determine what impact, if any, LFLs are having on visits to traditional public libraries. ConclusionLittle Free Libraries across the United States, and increasingly in other countries, have generated discussion, promoted collaboration between neighbours, and led to sharing. In other words, they have built communities. This was the intended consequence of the LFL movement. There, however, has also been unplanned community building in response to municipal threats to the structures due to right of way, safety, and planning ordinances. The more threatening concern is not the municipal ordinances used to block LFL development, but rather the trend of privatisation of publicly provided services. While people are celebrating the community built by the LFLs, caution must be exercised lest central institutions of the public and community, traditional public libraries, be lost. Academics and communities ought to consider not just impact on their local community at the street level, but also wider structural concerns so that communities can foster many “great good places”—the Little Free Libraries and traditional public libraries as well.ReferencesAldrich, Margaret. “Big Milestone for Little Free Library: 50,000 Libraries Worldwide.” Little Free Library. Little Free Library Organization. 4 Nov. 2016. 25 Feb. 2017 <https://littlefreelibrary.org/big-milestone-for-little-free-library-50000-libraries-worldwide/>.Aldrich, Margaret. The Little Free Library Book: Take a Book, Return a Book. Minneapolis, MN: Coffee House Press, 2015.Annoyed Librarian. “How to Protect Little Free Libraries.” Library Journal Blog 9 Jul. 2015. 26 Mar. 2017 <http://lj.libraryjournal.com/blogs/annoyedlibrarian/2015/07/09/how-to-protect-little-free-libraries/>.American Library Association. “Public Library Use.” State of America’s Libraries: A Report from the American Library Association (2015). 25 Feb. 2017 <http://www.ala.org/tools/libfactsheets/alalibraryfactsheet06>.Bauman, Caroline. “‘Little Free Libraries’ Legal in Leawood Thanks to 9-year-old Spencer Collins.” The Kansas City Star 7 Jul. 2014. 25 Feb. 2017 <http://www.kansascity.com/news/politics-government/article687562.html>.Burris, Alexandria. “First Amendment Issues Surface in Little Free Library Case.” Shreveport Times 5 Feb. 2015. 25 Feb. 2017 <http://www.shreveporttimes.com/story/news/local/2015/02/05/expert-use-zoning-law-clashes-first-amendment/22922371/>.Carpentier, Nico. Media and Participation: A Site of Ideological-Democratic Struggle. Bristol: Intellect, 2011.Charter 121. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 1235. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 1309. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 2532. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 2608. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 4369. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 4604. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 4684. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 6219. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 6542. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 6954. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 8212. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 9437. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 9673. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 9702. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 9705. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 10326. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 15981. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 16561. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 16734. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 18677. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 24481. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 27155. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 30369. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 31822. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 41074. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Condes, Yvonne. “Save the Little Library!” MomsLA 10 Aug. 2015. 25 Feb. 2017 <http://momsla.com/save-the-micro-library/>.Dana. “The Tenn-Mann Library Controversy, Part 3.” Read with Dana (30 Jan. 2015). 25 Feb. 2017 <https://readwithdana.wordpress.com/2015/01/30/the-tenn-mann-library-controversy-part-three/>.Everson, Jeff. “An Ordinance to Amend and Reenact Chapter 106 of the Shreveport Code of Ordinances Relative to Outdoor Book Exchange Boxes, and Otherwise Providing with Respect Thereto.” City of Shreveport, Louisiana 9 Oct. 2015. 25 Feb. 2017 <http://ftpcontent4.worldnow.com/ksla/pdf/LFLordinance.pdf>.Ferguson, James. “The Uses of Neoliberalism.” Antipode 41.S1 (2009): 166-84.Findlay-King, Lindsay, Geoff Nichols, Deborah Forbes, and Gordon Macfadyen. “Localism and the Big Society: The Asset Transfer of Leisure Centres and Libraries—Fighting Closures or Empowering Communities.” Leisure Studies (2017): 1-13.Friedersdorf, Conor. “The Danger of Being Neighborly without a Permit.” The Atlantic 20 Feb. 2015. 25 Feb. 2017 <https://www.theatlantic.com/national/archive/2015/02/little-free-library-crackdown/385531/>.Gans, Herbert J. Deciding What’s News: A Study of CBS Evening News, NBC Nightly News, Newsweek, and Time. Evanston, IL: Northwestern University Press, 2004.“Good Luck Spencer.” Spencer’s Little Free Library Facebook Page 25 Jun. 2014. 26 Mar. 2017 <https://www.facebook.com/Spencerslittlefreelibrary/photos/pcb.527531327376433/527531260709773/?type=3>.Hardenbrook, Joe. “A Little Rant on Little Free Libraries (AKA Probably an Unpopular Post).” Mr. Library Dude (9 Apr. 2014). 25 Feb. 2017 <https://mrlibrarydude.wordpress.com/2014/04/09/a-little-rant-on-little-free-libraries-aka-probably-an-unpopular-post/>.Harper, Deb. “Minutes.” The Leawood City Council 7 Jul. 2014. <http://www.leawood.org/pdf/cc/min/07-07-14.pdf>. Heady, Chris. “City Wants Church to Move Little Library.” Lincoln Journal Star 9 Jul. 2014. 25 Feb. 2017 <http://journalstar.com/news/local/city-wants-church-to-move-little-library/article_7753901a-42cd-5b52-9674-fc54a4d51f47.html>. Herrmann, Gretchen M. “Garage Sales Make Good Neighbors: Building Community through Neighborhood Sales.” Human Organization 62.2 (2006): 181-191.Kellogg, Carolyn. “Officials Threaten to Destroy a Little Free Library in Texas.” Los Angeles Times (1 Oct. 2015). 25 Feb. 2017 <http://www.latimes.com/books/jacketcopy/la-et-jc-little-free-library-texas-20150930-story.html>.LaCasse, Alexander. “Why Are Some Cities Cracking Down on Little Free Libraries.” Christian Science Monitor (5 Feb. 2015). 25 Feb. 2017 <http://www.csmonitor.com/Books/chapter-and-verse/2015/0205/Why-are-some-cities-cracking-down-on-little-free-libraries>.Landman, Ruth H. Creating the Community in the City: Cooperatives and Community Gardens in Washington, DC Westport, CT: Bergin & Garvey, 1993. Little Free Library. Little Free Library Organization (2017). 25 Feb. 2017 <https://littlefreelibrary.org/>.Lopez, Steve. “Actor’s Curbside Libraries Is a Smash—for Most People.” LA Times 3 Feb. 2015. 25 Feb. 2017 <http://www.latimes.com/local/california/la-me-0204-lopez-library-20150204-column.html>.Moore, Rowan. Why We Build: Power and Desire in Architecture. New York: Harper Design, 2013.Moss, Laura. “City Zoning Laws Target Little Free Libraries.” Mother Nature Network 25 Aug. 2015. 25 Feb. 2017 <http://www.mnn.com/lifestyle/arts-culture/stories/city-zoning-laws-target-little-free-libraries>.National Center for Education Statistics (NCES). Average Literacy and Numeracy Scale Scores of 25- to 65-Year Olds, by Sex, Age Group, Highest Level of Educational Attainment, and Country of Other Education System: 2012, table 604.10. 25 Feb. 2017 <https://nces.ed.gov/programs/digest/d15/tables/dt15_604.10.asp?current=yes>.National Center for Education Statistics (NCES). Average Prose, Document, and Quantitative Literacy Scores of Adults: 1992 and 2003. National Assessment of Adult Literacy. 25 Feb. 2017 <https://nces.ed.gov/naal/kf_demographics.asp>.Oldenburg, Ray. The Great Good Place: Cafés, Coffee Shops, Bookstores, Bars, Hair Salons, and Other Hangouts at the Heart of a Community. New York: Marlowe & Company, 1999.“Our History.” Little Free Library. Little Free Library Organization (2017). 25 Feb. 2017 <https://littlefreelibrary.org/ourhistory/>.Putnam, Robert D. Bowling Alone: The Collapse and Revival of American Community. New York: Simon & Schuster, 2001.Rumage, Jeff. “Little Free Libraries Now Allowed in Whitefish Bay.” Whitefish Bay Patch (8 May 2013). 25 Feb. 2017 <http://patch.com/wisconsin/whitefishbay/little-free-libraries-now-allowed-in-whitefish-bay>.Sanburn, Josh. “What Do Kansas and Nebraska Have against Small Libraries?” Time 10 Jul. 2014. 25 Feb. 2017 <http://time.com/2970649/tiny-libraries-violating-city-ordinances/>.Schaub, Michael. “Little Free Libraries on the Wrong Side of the Law.” LA Times 4 Feb. 2015. 25 Feb. 2017 <http://www.latimes.com/books/jacketcopy/la-et-jc-little-free-libraries-on-the-wrong-side-of-the-law-20150204-story.html>.Shumaker, David. “Public Libraries, Little Free Libraries, and Embedded Librarians.” The Embedded Librarian (28 April 2014) 26 Mar. 2017 <https://embeddedlibrarian.com/2014/04/28/public-libraries-little-free-libraries-and-embedded-librarians/>.Siegel, Julie. “An Ordinance to Amend Section 16.13 of the Municipal Code with Regard to Exempt Certain Little Free Libraries from Front Yard Setback Requirements.” Village of Whitefish Bay, Wisconsin (5 Aug. 2013).Skogan, Wesley G. Police and Community in Chicago: A Tale of Three Cities. New York: Oxford University Press, 2006.Solomon, Dan. “Dallas Is Regulating ‘Little Free Libraries’ for Some Reason.” Texas Monthly (14 Sept. 2016). 25 Feb. 2017 <http://www.texasmonthly.com/the-daily-post/dallas-regulating-little-free-libraries-reason/>.“Spencer’s Little Free Library.” Facebook 15 Jul. 2014. 25 Feb. 2017 <https://www.facebook.com/Spencerslittlefreelibrary/photos/pcb.527531327376433/527531260709773/?type=3>.Steward, M. Personal Interview. 7 Feb. 2017.Stingl, Jim. “Village Slaps Endnote on Little Libraries.” Milwaukee Journal Sentinel 11 Nov. 2012: 1B, 7B.Streitfeld, David. “Anger as a Private Company Takes over Libraries.” The New York Times (26 Sept. 2010). 25 Feb. 2017 <http://www.nytimes.com/2010/09/27/business/27libraries.html>.Svehla, Louise. “Little Free Libraries—The Possibilities Are Endless.” Public Libraries Online (8 Mar. 2013). 25 Feb. 2017 <http://publiclibrariesonline.org/2013/03/little-free-libraries-the-possibilities-are-endless/>.Tapper, Jake. “Boy Fights Council to Save His Library.” CNN 4 Jul. 2014. 25 Feb. 2017 <http://thelead.blogs.cnn.com/2014/07/04/boy-fights-to-save-his-library/>.Topil, Greg. “Little Free Libraries in Lincoln.” City of Lincoln, Nebraska (n.d.). 25 Feb. 2017 <http://lincoln.ne.gov/City/pworks/engine/row/little-library.htm>.
APA, Harvard, Vancouver, ISO, and other styles
28

Perttula, Timothy K. "Documentation of Early Caddo Period Ceramic Vessels from the George C. Davis Site on the Neches River in Cherokee County, Texas." Index of Texas Archaeology Open Access Grey Literature from the Lone Star State, 2016. http://dx.doi.org/10.21112/.ita.2016.1.57.

Full text
Abstract:
The George C. Davis site (41CE19)/Caddo Mounds State Historic Site in Cherokee County, Texas, is a Caddo site that was occupied by ancestral Caddo peoples between ca. A.D. 940 and the late 1200s (based on an extensive suite of calibrated radiocarbon dates, see below) on a large alluvial terrace of the Neches River in East Texas. The site is a planned civic-ceremonial center that has three earthen mounds—Mound A, a large platform mound with elite residences and special purpose structures; Mound B, a second platform mound; and Mound C, a burial mound used as a cemetery for the elite or ranked members of the society—a borrow pit, and a large associated village (estimated at more than 110 acres) with more than 100 known or suspected structures. The structures include the domestic residences of the commoners that lived at the site as well as the residences for the elites. The George C. Davis site is an archaeological site that has yielded information of major scientific importance concerning the origins and development of the Caddo peoples, a still little-known but significant stratified and complex society that lived in the far western reaches of the Southeastern United States and whose cultural traditions have lasted for more than 1000 years. The expansive nature of the archaeological investigations at the George C. Davis site since 1939 has obtained unique information on Caddo community organization and social logic, the nature of Caddo symbolism and ideology, as well as the early existence of important community political, social, and religious activities within special precincts near Mounds A and B. The archaeological work has also obtained key insights into the domestic nature of the community, with residential domiciles dated as early as ca. A.D. 940 organized into compounds with small courtyards; this was not a vacant mound center. Demonstrating great continuity in Caddo community and social organization, the same kinds of domestic compounds seen ca. A.D. 940 and after at the George C. Davis site have also been documented from a 1691 map prepared by a Spanish expedition to a Nasoni Caddo civic-ceremonial center on the Red River in East Texas. The George C. Davis site archaeological record from sacred as well as domestic contexts contains important Caddo data relevant to each of these broad themes. This includes evidence from features for the earliest origins of the community at ca. A.D. 940 as well as features that demonstrate a continuous occupation that lasted until the late A.D. 1200s. The use of tropical cultigens preserved in features has been shown to have been an important subsistence resource in the community, intensifying in use after ca. A.D. 1200 among East Texas Caddo societies, during a period of climate (the Medieval Warm Period) favorable for agriculture in the Caddo area. A crystallization of religion, ideology, and iconographic practice as a measure of complexity is seen in the archaeological record of these early Caddos, denoted by the development of platform mounds with temples and other specialized structures for use by the political and religious elite, the acquisition and exchange of non-local prestige goods, details of architecture and mound construction (the use of berms and selective use of brightly colored soils), and the kinds of elaborate burial features (several with multiple individuals, probably indicative of retainer sacrifice) and associated grave goods in the Mound C mortuary at the site. The George C. Davis has had the most extensive investigations of any Caddo mound site, including very large scale archaeo-geophysical work, and archaeologists have done an exemplary job in publishing the results of their investigations, beginning with the seminal 1949 study prepared by H. Perry Newell and Alex D. Krieger. Taken together, the extensive nature of the work, the quality of the archaeological investigations, and the unique archaeo-geophysical data set, suggest that the George C. Davis site strongly exemplifies the character of a Caddo civic-ceremonial community in the Caddo archaeological area, and through its study has shed unique light on the origins and elaboration of the Caddo cultural tradition. In this article, I document, using a standardized protocol, the ancestral Caddo vessels and vessel sections that have been recovered from various kinds of features at the George C. Davis site since excavations began at the site in 1939. I also discuss the stylistic and functional character of this unique vessel assemblage. The analysis of the recovered ceramic vessels and sherds from the George C. Davis site has been ongoing since the 1940s, and has included innovative work in the chemical characterization of the ceramics as well as the preservation of lipids in samples of ceramic vessels and sherds. Dr. Robert Z. Selden has also obtained 3-D scans of many of the vessels discussed in this article.
APA, Harvard, Vancouver, ISO, and other styles
29

Trang, Pham Thi Quynh, Bui Manh Thang, and Dang Thanh Hai. "Single Concatenated Input is Better than Indenpendent Multiple-input for CNNs to Predict Chemical-induced Disease Relation from Literature." VNU Journal of Science: Computer Science and Communication Engineering 36, no. 1 (May 30, 2020). http://dx.doi.org/10.25073/2588-1086/vnucsce.237.

Full text
Abstract:
Chemical compounds (drugs) and diseases are among top searched keywords on the PubMed database of biomedical literature by biomedical researchers all over the world (according to a study in 2009). Working with PubMed is essential for researchers to get insights into drugs’ side effects (chemical-induced disease relations (CDR), which is essential for drug safety and toxicity. It is, however, a catastrophic burden for them as PubMed is a huge database of unstructured texts, growing steadily very fast (~28 millions scientific articles currently, approximately two deposited per minute). As a result, biomedical text mining has been empirically demonstrated its great implications in biomedical research communities. Biomedical text has its own distinct challenging properties, attracting much attetion from natural language processing communities. A large-scale study recently in 2018 showed that incorporating information into indenpendent multiple-input layers outperforms concatenating them into a single input layer (for biLSTM), producing better performance when compared to state-of-the-art CDR classifying models. This paper demonstrates that for a CNN it is vice-versa, in which concatenation is better for CDR classification. To this end, we develop a CNN based model with multiple input concatenated for CDR classification. Experimental results on the benchmark dataset demonstrate its outperformance over other recent state-of-the-art CDR classification models. Keywords: Chemical disease relation prediction, Convolutional neural network, Biomedical text mining References [1] Paul SM, S. Mytelka, C.T. Dunwiddie, C.C. Persinger, B.H. Munos, S.R. Lindborg, A.L. Schacht, How to improve R&D productivity: The pharmaceutical industry's grand challenge, Nat Rev Drug Discov. 9(3) (2010) 203-14. https://doi.org/10.1038/nrd3078. [2] J.A. DiMasi, New drug development in the United States from 1963 to 1999, Clinical pharmacology and therapeutics 69 (2001) 286-296. https://doi.org/10.1067/mcp.2001.115132. [3] C.P. Adams, V. Van Brantner, Estimating the cost of new drug development: Is it really $802 million? Health Affairs 25 (2006) 420-428. https://doi.org/10.1377/hlthaff.25.2.420. [4] R.I. Doğan, G.C. Murray, A. Névéol et al., "Understanding PubMed user search behavior through log analysis", Oxford Database, 2009. [5] G.K. Savova, J.J. Masanz, P.V. Ogren et al., "Mayo clinical text analysis and knowledge extraction system (cTAKES): Architecture, component evaluation and applications", Journal of the American Medical Informatics Association, 2010. [6] T.C. Wiegers, A.P. Davis, C.J. Mattingly, Collaborative biocuration-text mining development task for document prioritization for curation, Database 22 (2012) pp. bas037. [7] N. Kang, B. Singh, C. Bui et al., "Knowledge-based extraction of adverse drug events from biomedical text", BMC Bioinformatics 15, 2014. [8] A. Névéol, R.L. Doğan, Z. Lu, "Semi-automatic semantic annotation of PubMed queries: A study on quality, Efficiency, Satisfaction", Journal of Biomedical Informatics 44, 2011. [9] L. Hirschman, G.A. Burns, M. Krallinger, C. Arighi, K.B. Cohen et al., Text mining for the biocuration workflow, Database Apr 18, 2012, pp. bas020. [10] Wei et al., "Overview of the BioCreative V Chemical Disease Relation (CDR) Task", Proceedings of the Fifth BioCreative Challenge Evaluation Workshop, 2015. [11] P. Verga, E. Strubell, A. McCallum, Simultaneously Self-Attending to All Mentions for Full-Abstract Biological Relation Extraction, In Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies 1 (2018) 872-884. [12] Y. Shen, X. Huang, Attention-based convolutional neural network for semantic relation extraction, In: Proceedings of COLING 2016, the Twenty-sixth International Conference on Computational Linguistics: Technical Papers, The COLING 2016 Organizing Committee, Osaka, Japan, 2016, pp. 2526-2536. [13] Y. Peng, Z. Lu, Deep learning for extracting protein-protein interactions from biomedical literature, In: Proceedings of the BioNLP 2017 Workshop, Association for Computational Linguistics, Vancouver, Canada, 2016, pp. 29-38. [14] S. Liu, F. Shen, R. Komandur Elayavilli, Y. Wang, M. Rastegar-Mojarad, V. Chaudhary, H. Liu, Extracting chemical-protein relations using attention-based neural networks, Database, 2018. [15] H. Zhou, H. Deng, L. Chen, Y. Yang, C. Jia, D. Huang, Exploiting syntactic and semantics information for chemical-disease relation extraction, Database, 2016, pp. baw048. [16] S. Liu, B. Tang, Q. Chen et al., Drug–drug interaction extraction via convolutional neural networks, Comput, Math, Methods Med, Vol (2016) 1-8. https://doi.org/10.1155/2016/6918381. [17] L. Wang, Z. Cao, G. De Meloet al., Relation classification via multi-level attention CNNs, In: Proceedings of the Fifty-fourth Annual Meeting of the Association for Computational Linguistics 1 (2016) 1298-1307. https://doi.org/10.18653/v1/P16-1123. [18] J. Gu, F. Sun, L. Qian et al., Chemical-induced disease relation extraction via convolutional neural network, Database (2017) 1-12. https://doi.org/10.1093/database/bax024. [19] H.Q. Le, D.C. Can, S.T. Vu, T.H. Dang, M.T. Pilehvar, N. Collier, Large-scale Exploration of Neural Relation Classification Architectures, In Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing, 2018, pp. 2266-2277. [20] Y. LeCun, L. Bottou, Y. Bengio, P. Haffner, Gradient-based learning applied to document recognition, In Proceedings of the IEEE. 86(11) (1998) 2278-2324. [21] Y. Kim, Convolutional neural networks for sentence classification, ArXiv preprint arXiv:1408.5882. [22] C. Nagesh, Panyam, Karin Verspoor, Trevor Cohn and Kotagiri Ramamohanarao, Exploiting graph kernels for high performance biomedical relation extraction, Journal of biomedical semantics 9(1) (2018) 7. [23] H. Zhou, H. Deng, L. Chen, Y. Yang, C. Jia, D. Huang, Exploiting syntactic and semantics information for chemical-disease relation extraction, Database, 2016.
APA, Harvard, Vancouver, ISO, and other styles
30

Minh, Phan Hong, Vu Khanh Linh, Nguyen Thanh Hai, and Bui Thanh Tung. "A Comprehensive Review of Vaccines against Covid-19." VNU Journal of Science: Medical and Pharmaceutical Sciences 37, no. 3 (September 14, 2021). http://dx.doi.org/10.25073/2588-1132/vnumps.4365.

Full text
Abstract:
The globe is engulfed by one of the most extensive public health crises as COVID-19 has become a leading cause of death worldwide. COVID-19 was first detected in Wuhan, China, in December 2019, causing the severe acute respiratory syndrome. This review discusses issues related to Covid-19 vaccines, such as vaccine development targets, vaccine types, efficacy, limitations and development prospects. Keywords: Covid-19, SARS-CoV-2, vaccine, spike protein. References [1] C. Wang, P. W. Horby, F. G. Hayden, G. F. Gao, A Novel Coronavirus Outbreak of Global Health Concern, The Lancet, Vol. 395, No. 10223, 2020, pp. 470-473, https://doi.org/10.1016/S0140-6736(20)30185-9.[2] T. Singhal, A Review of Coronavirus Disease-2019 (COVID-19), The Indian Journal of Pediatrics, Vol. 87, 2020, pp. 281-286, https://doi.org/10.1007/s12098-020-03263-6.[3] World Health Organization, WHO Coronavirus (COVID-19) Dashboard, https://covid19.who.int/, (accessed on: August 21st, 2021).[4] A. Alimolaie, A Review of Coronavirus Disease-2019 (COVID-19), Biological Science Promotion Vol. 3, No. 6, 2020, pp. 152-157.[5] J. Yang, Y. Zheng, X. Gou, K. Pu, Z. Chen, Q. Guo et al., Prevalence of Comorbidities and Its Effects in Patients Infected with SARS-Cov-2: A Systematic Review and Meta-Analysis, International Journal of Infectious Diseases, Vol. 94, 2020, pp. 91-95, https://doi.org/10.1016/j.ijid.2020.03.017.[6] H. E. Randolph, L. B. Barreiro, Herd Immunity: Understanding COVID-19, Immunity, Vol. 52, No. 5, 2020, pp. 737-741, https://doi.org/10.1016/j.immuni.2020.04.012.[7] F. Jung, V. Krieger, F. Hufert, J. H. Küpper, Herd Immunity or Suppression Strategy to Combat COVID-19, Clinical Hemorheology and Microcirculation, Vol. 75, No. 1, 2020, pp. 13-17, https://doi.org/10.3233/CH-209006.[8] O. Sharma, A. A. Sultan, H. Ding, C. R. Triggle, A Review of the Progress and Challenges of Developing a Vaccine for COVID-19, Frontiers in Immunology, Vol. 11, No. 2413, 2020, pp. 1-17, https://doi.org/10.3389/fimmu.2020.585354.[9] G. D. Sempowski, K. O. Saunders, P. Acharya, K. J. Wiehe, B. F. Haynes, Pandemic preparedness: Developing Vaccines and Therapeutic Antibodies for COVID-19, Cell, Vol. 181, No. 7, 2020, pp. 1458-1463, https://doi.org/10.1016/j.cell.2020.05. 041.[10] A. J. R. Morales, J. A. C. Ospina, E. G. Ocampo, R. V. Peña, Y. H. Rivera, J. P. E. Antezana et al., Clinical, Laboratory and Imaging Features of COVID-19: A Systematic Review and Meta-Analysis. Travel Medicine and Infectious Disease, Vol. 34, 2020, pp. 101-623, https://doi.org/10.1016/j.tmaid.2020.101623.[11] C. Huang, Y. Wang, X. Li, L. Ren, J. Zhao, Y. Hu et al., Clinical Features of Patients Infected with 2019 Novel Coronavirus in Wuhan, China, The Lancet, Vol. 395, No. 10223, 2020, pp. 497-506, https://doi.org/10.1016/S0140-6736(20)30183-5.[12] R. Lu, X. Zhao, J. Li, P. Niu, B. Yang, H. Wu et al., Genomic Characterisation and Epidemiology of 2019 Novel Coronavirus: Implications for Virus Origins and Receptor Binding, The Lancet, Vol. 395, No. 10224, 2020, pp. 565-574, https://doi.org/10.1016/S0140-6736(20)30251-8.[13] L. Chen, W. Liu, Q. Zhang, K. Xu, G. Ye, W. Wu et al., RNA Based mNGS Approach Identifies a Novel Human Coronavirus From Two Individual Pneumonia Cases in 2019 Wuhan Outbreak, Emerging Microbes & Infections, Vol. 9, No. 1, 2020, pp. 313-319, https://doi.org/10.1080/22221751.2020.1725399.[14] Y. Chen, Q. Liu, D. Guo, Emerging Coronaviruses: Genome Structure, Replication, and Pathogenesis, Journal of Medical Virology, Vol. 92, No. 4, 2020, pp. 418-423, https://doi.org/10.1002/jmv.25681.[15] D. R. Beniac, A. Andonov, E. Grudeski, T. F. Booth, Architecture of The SARS Coronavirus Prefusion Spike, Nature Structural & Molecular Biology, Vol. 13, No. 8, 2006, pp. 751-752, https://doi.org/10.1038/nsmb1123.[16] B. W. Neuman, G. Kiss, A. H. Kunding, D. Bhella, M. F. Baksh, S. Connelly et al., A Structural Analysis of M Protein in Coronavirus Assembly and Morphology, Journal of Structural Biology, Vol. 174, No. 1, 2011, pp. 11-22, https://doi.org/10.1016/j.jsb.2010.11.021.[17] J. L. N. Torres, M. L. DeDiego, C. V. Báguena, J. M. J. Guardeño, J. A. R. Nava, R. F. Delgado et al., Severe Acute Respiratory Syndrome Coronavirus Envelope Protein Ion Channel Activity Promotes Virus Fitness and Pathogenesis, Plos Pathogens Vol. 10, No. 5, 2014, https://doi.org/10.1371/journal.ppat.1004077.[18] A. R. Fehr, S. Perlman. Coronaviruses: An Overview of Their Replication and Pathogenesis. Coronaviruses, New York, 2015, pp. 1-23.[19] M. Letko, A. Marzi, V. Munster, Functional Assessment of Cell Entry and Receptor Usage for SARS-CoV-2 and Other Lineage B Betacoronaviruses,. Nature Microbiology, Vol. 5, No. 4, 2020, pp. 562-569, https://doi.org/10.1038/s41564-020-0688-y.[20] A. Grifoni, D. Weiskopf, S. I. Ramirez, J. Mateus, J. M. Dan, C. R. Moderbacher et al., Targets of T Cell Responses to SARS-Cov-2 Coronavirus in Humans With COVID-19 Disease and Unexposed Individuals, Cell, Vol. 181, No. 7, 2020, pp. 1489-1501, https://doi.org/10.1016/j.cell.2020.05.015.[21] M. Leslie, T Cells Found in Coronavirus Patients Bode Well for Long-Term Immunity, American Association for the Advancement of Science, Vol. 368, No. 6493, 2020, pp. 809-810, https://doi.org/10.1126/science.368.6493.809.[22] N. L. Bert, A. T. Tan, K. Kunasegaran, C. Y. Tham, M. Hafezi, A. Chia et al., SARS-CoV-2-specific T Cell Immunity in Cases of COVID-19 and SARS, and Uninfected Controls, Nature, Vol. 584, No. 7821, 2020, pp. 457-462, https://doi.org/10.1038/s41586-020-2550-z .[23] E. R. Adams, M. Ainsworth, R. Anand, M. I. Andersson, K. Auckland, J. K. Baillie et al., Antibody Testing for COVID-19: A Report from the National COVID Scientific Advisory Panel, Wellcome Open Research, Vol. 5, 2020, pp. 139-156, https://doi.org/10.12688/wellcomeopenres.15927.1.[24] N. Vabret, G. J. Britton, C. Gruber, S. Hegde, J. Kim, M. Kuksin et al., Immunology of COVID-19: current state of the science, Immunity. Vol. 52, No. 6, 2020, pp. 910-941, https://doi.org/10.1016/j.immuni.2020.05.002[25] W. Liu, A. Fontanet, P. H. Zhang, L. Zhan, Z. T. Xin, L. Baril et al., Two-Year Prospective Study of The Humoral Immune Response of Patients with Severe Acute Respiratory Syndrome, The Journal of Infectious Diseases, Vol. 193, No. 6, 2006, pp. 792-795, https://doi.org/10.1086/500469.[26] E. Callaway, Coronavirus Vaccines Leap Through Safety Trials-But Which Will Work is Anybody's Guess, Nature, Vol. 583, No. 7818, 2020, pp. 669-671, https://doi.org/10.1038/d41586-020-02174-y.[27] Y. Dong, T. Dai, Y. Wei, L. Zhang, M. Zheng, F. Zhou. A Systematic Review of SARS-Cov-2 Vaccine Candidates, Signal Transduction and Targeted Therapy, Vol. 5, No. 1, 2020, pp. 1-14, https://doi.org/10.1038/s41392-020-00352-y. [28] E. P. Regalado, Vaccines for SARS-CoV-2: Lessons from Other Coronavirus Strains. Infectious Diseases and Therapy, Vol. 9, No. 2, 2020, pp. 255-274, https://doi.org/10.1007/s40121-020-00300-x.[29] Y. Cai, J. Zhang, T. Xiao, H. Peng, S. M. Sterling, R. M. Walsh et al., Distinct Conformational States of SARS-CoV-2 Spike Protein, Science, Vol. 369, No. 6511, 2020, pp. 1586-1592, https://doi.org/10.1126/science.abd4251.[30] M. S. Suthar, M. G. Zimmerman, R. C. Kauffman, G. Mantus, S. L. Linderman, W. H. Hudson et al., Rapid Generation of Neutralizing Antibody Responses in COVID-19 Patients, Cell Reports Medicine, Vol. 1, No. 3, 2020, pp. 100040-100047, https://doi.org/10.1016/j.xcrm.2020.100040.[31] Q. Gao, L. Bao, H. Mao, L. Wang, K. Xu, M. Yang et al., Development of an Inactivated Vaccine Candidate for SARS-CoV-2, Science, Vol. 36, No. 6499, 2020, pp. 77-81, https://doi.org/10.1126/science.abc1932.[32] L. Ni, F. Ye, M. L. Cheng, Y. Feng, Y. Q. Deng, H. Zhao et al., Detection of SARS-CoV-2-specific Humoral and Cellular Immunity in COVID-19 Convalescent Individuals, Immunity, Vol. 52, No. 6, 2020, pp. 971-977, https://doi.org/10.1016/j.immuni.2020.04.023.[33] B. D. Quinlan, H. Mou, L. Zhang, Y. Guo, W. He, A. Ojha et al., The SARS-CoV-2 Receptor-binding Domain Elicits a Potent Neutralizing Response Without Antibody-dependent Enhancement, Available at SSRN, Vol. 3575134, 2020, pp. 1-24, http://dx.doi.org/10.2139/ssrn.3575134.[34] D. B. Melo, B. E. N. Payant, W. C. Liu, S. Uhl, D. Hoagland, R. Moller et al., Imbalanced Host Responseto SARS-Cov-2 Drives Development of COVID-19, Cell, Vol. 181, No. 5, 2020, pp. 1036-1045, https://doi.org/10.1016/j.cell.2020.04.026.[35] J. Hadjadj, N. Yatim, L. Barnabei, A. Corneau, J. Boussier, N. Smith et al., Impaired Type I Interferon Activity and Inflammatory Responses in Severe COVID-19 Patients, Science, Vol. 36, No. 6504, 2020, pp. 718-724, https://doi.org/10.1126/science.abc6027.[36] H. Pang, Y. Liu, X. Han, Y. Xu, F. Jiang, D. Wu et al., Protective Humoral Responses to Severe Acute Respiratory Syndrome-associated Coronavirus: Implications for the Design of an Effective Protein-based Vaccine, Journal of General Virology, Vol. 85, No. 10, 2004, pp. 3109-3113, https://doi.org/10.1099/vir.0.80111-0.[37] Y. Li, R. Tenchov, J. Smoot, C. Liu, S. Watkins, Q. Zhou, A Comprehensive Review of The Global Efforts on COVID-19 Vaccine Development, ACS Central Science , Vol. 7, No. 4, 2021, pp. 512-533, https://doi.org/10.1021/acscentsci.1c00120.[38] J. A. Wolff, R. W. Malone, P. Williams, W. Chong, G. Acsadi, A. Jani et al., Direct Gene Transfer Into Mouse Muscle in Vivo, Science, Vol. 247, No. 4949, 1990, pp. 1465-1468,. https://doi.org/10.1126/science.1690918.[39] M. Ingolotti, O. Kawalekar, D. J. Shedlock, K. Muthumani, D. B. Weiner, DNA Vaccines for Targeting Bacterial Infections, Expert Review of Vaccines, Vol. 9, No. 7, 2010, pp. 747-763, https://doi.org/10.1586/erv.10.57.[40] S. Jones, K. Evans, H. M. Johnn, M. Sharpe, J. Oxford, R. L. Williams et al., DNA Vaccination Protects Against an Influenza Challenge in A Double-Blind Randomised Placebo-Controlled Phase 1b Clinical Trial, Vaccine, Vol. 27, No. 18, 2009, pp. 2506-2512, https://doi.org/10.1016/j.vaccine.2009.02.061.[41] J. Kim, INOVIO Doses First Subject in Phase 2 Segment of its INNOVATE Phase 2/3 Clinical Trial for INO-4800, its DNA Medicine to Prevent COVID-19, Cision PR Newswire: News Distribution, Targeting and Monitoring Home, https://www.prnewswire.com/newsreleases/inovio-doses-first-subject-in-phase-2-segment-of-its-innovate-phase-23-clinical-trial-for-ino-4800-its-dna-medicine-to-prevent-covid-19-301187002.html/, 2020, (accessed on: December 7th, 2020).[42] P. Tebas, S. Yang, J. D. Boyer, E. L. Reuschel, A. Patel, A. C. Quick et al., Safety and Immunogenicity of INO-4800 DNA Vaccine Against SARS-Cov-2: A Preliminary Report of an Open-Label, Phase 1 Clinical Trial, EClinical Medicine, Vol. 31, No. 1000689, 2021, https://doi.org/10.1016/j.eclinm.2020.100689.[43] T. Schlake, A. Thess, M. F. Mleczek, K. J. Kallen. Developing mRNA-vaccine Technologies, RNA Biology, Vol. 9, No. 11, 2012, pp. 1319-1330, https://doi.org/10.4161/rna.22269.[44] K. J. Hassett, K. E. Benenato, E. Jacquinet, A. Lee, A. Woods, O. Yuzhakov et al., Optimization of lipid Nanoparticles for Intramuscular Administration of mRNA Vaccines, Molecular Therapy-Nucleic Acids, Vol. 15, 2019, pp. 1-11, https://doi.org/10.1016/j.omtn.2019.01.013.[45] A. Bashirullah, R. L. Cooperstock, H. D. Lipshitz, Spatial and Temporal Control of RNA Stability, Proceedings of the National Academy of Sciences, Vol. 98, No. 13, 2001, pp. 7025-7028. [46] K. Kariko, H. Muramatsu, J. Ludwig, D. Weissman, Generating the Optimal mRNA for Therapy: HPLC Purification Eliminates Immune Activation and Improves Translation of Nucleoside-Modified, Protein-Encoding mRNA, Nucleic Acids Research, Vol. 39, No. 21, 2011, pp. 142-152, https://doi.org/10.1093/nar/gkr695.[47] N. Pardi, M. J. Hogan, M. S. Naradikian, K. Parkhouse, D. W. Cain, L. Jones et al., Nucleoside-Modified mRNA Vaccines Induce Potent T Follicular Helper and Germinal Center B Cell Responses, Journal of Experimental Medicine, Vol. 215, No. 6, 2018, pp. 1571-1588, https://doi.org/10.1084/jem.20171450.[48] L. A. Jackson, E. J. Anderson, N. G. Rouphael, P. C. Roberts, M. Makhene, R. N. Coler et al., An mRNA Vaccine Against SARS-CoV-2-Preliminary Report, New England Journal of Medicine, Vol. 383, No. 20, 2020, pp. 1920-1931, https://doi.org/10.1056/NEJMoa2022483.[49] K. S. Corbett, D. K. Edwards, S. R. Leist, O. M. Abiona, S. B. Barnum, R. A. Gillespie et al., SARS-CoV-2 mRNA Vaccine Design Enabled by Prototype Pathogen Preparedness, Nature, Vol. 586, No. 7830, 2020, pp. 567-571, https://doi.org/10.1038/s41586-020-2622-0.[50] K. S. Corbett, B. Flynn, K. E. Foulds, J. R. Francica, S. B. Barnum, A. P. Werner et al., Evaluation of the mRNA-1273 Vaccine Against SARS-CoV-2 in Nonhuman Primates, New England Journal of Medicine, Vol. 383, No. 16, 2020, pp. 1544-1555, https://doi.org/10.1056/NEJMoa2024671.[51] E. E. Walsh, R. Frenck, A. R. Falsey, N. Kitchin, J. Absalon, A. Gurtman et al., RNA-Based COVID-19 Vaccine BNT162b2 Selected for a Pivotal Efficacy Study, Medrxiv, Vol. 2, 2020, https://doi.org/10.1101/2020.08.17.20176651.[52] M. J. Mulligan, K. E. Lyke, N. Kitchin, J. Absalon, A. Gurtman, S. Lockhart et al., Phase 1/2 Study to Describe the Safety and Immunogenicity of a COVID-19 RNA Vaccine Candidate (BNT162b1) in Adults 18 to 55 Years of Age: Interim Report, Medrxiv, Vol. 586, 2020, pp. 589-593, https://doi.org/10.1056/NEJMoa2028436.[53] E. J. Anderson, N. G. Rouphael, A. T. Widge, L. A. Jackson, P. C. Roberts, M. Makhene et al., Safety and Immunogenicity of SARS-CoV-2 mRNA-1273 Vaccine in Older Adults, New England Journal of Medicine, Vol. 383, No. 25, 2020, pp. 2427-2438, https://doi.org/10.1038/s41586-020-2639-4.[54] P. F. McKay, K. Hu, A. K. Blakney, K. Samnuan, J. C. Brown, R. Penn et al., Self-amplifying RNA SARS-CoV-2 Lipid Nanoparticle Vaccine Candidate Induces High Neutralizing Antibody Titers in Mice, Nature Communications, Vol. 11, No. 1, 2020, pp. 1-7, https://doi.org/10.1038/s41467-020-17409-9.[55] J. H. Erasmus, A. P. Khandhar, A. C. Walls, E. A. Hemann, M. A. O’Connor, P. Murapa et al., Single-dose Replicating RNA vaccine Induces Neutralizing Antibodies Against SARS-CoV-2 in Nonhuman Primates, BioRxiv, 2020, https://doi.org/10.1101/2020.05.28.121640.[56] R. D. Alwis, E. S. Gan, S. Chen, Y. S. Leong, H. C. Tan, S. L. Zhang et al., A Single Dose of Self-Transcribing and Replicating RNA-based SARS-CoV-2 Vaccine Produces Protective Adaptive Immunity in Mice, Molecular Therapy, Vol. 29, No. 6, 2021, pp. 1970-1983, https://doi.org/10.1016/j.ymthe.2021.04.001.[57] M. R. Guroff, Replicating and Non-Replicating Viral Vectors for Vaccine Development, Current Opinion in Biotechnology, Vol. 18, No. 6, 2007, pp. 546-556, https://doi.org/10.1016/j.copbio.2007.10.010.[58] K. Benihoud, P. Yeh, M. Perricaudet, Adenovirus Vectors for Gene Delivery, Current Opinion in Biotechnology, Vol. 10, No. 5,1999, pp. 440-447, https://doi.org/10.1016/s0958-1669(99)00007-5.[59] Z. Xiang, G. Gao, A. R. Sandoval, C. J. Cohen, Y. Li, J. M. Bergelson et al., Novel, Chimpanzee Serotype 68-Based Adenoviral Vaccine Carrier for Induction of Antibodies to A Transgene Product, Journal of Virology, Vol. 76, No. 6, 2002, pp. 2667-2675, https://doi.org/10.1128/JVI.76.6.2667-2675.2002.[60] F. C. Zhu, X. H. Guan, Y. H. Li, J. Y. Huang, T. Jiang, L. H. Hou et al., Immunogenicity and Safety Of A Recombinant Adenovirus Type-5-Vectored COVID-19 Vaccine in Healthy Adults Aged 18 Years or Older: A Randomised, Double-Blind, Placebo-Controlled, Phase 2 Trial, The Lancet, Vol. 396, No. 10249, 2020, pp. 479-488, https://doi.org/10.1016/S0140-6736(20)31605-6.[61] F. C. Zhu, Y. H. Li, X. H. Guan, L. H. Hou, W. J. Wang, J. X. Li et al., Safety, Tolerability, and Immunogenicity of A Recombinant Adenovirus Type-5 Vectored COVID-19 Vaccine: A Dose-Escalation, Open-Label, Non-Randomised, First-in-Human Trial, The Lancet. Vol. 395, No. 10240, 2020, pp. 1845-1854.[62] S. Wu, G. Zhong, J. Zhang, L. Shuai, Z. Zhang, Z. Wen, et al. A Single Dose of An Adenovirus-Vectored Vaccine Provides Protection Against SARS-Cov-2 Challenge, Nature Communications Vol. 1, No. 11, 2020, pp. 1-7, https://doi.org/10.1016/s41467-020-17972-1.[63] P. M. Folegatti, K. J. Ewer, P. K. Aley, B. Angus, S. Becker, S. B. Rammerstorfer et al., Safety and Immunogenicity of The Chadox1 Ncov-19 Vaccine Against SARS-Cov-2: A Preliminary Report of A Phase 1/2, Single-Blind, Randomised Controlled Trial, The Lancet, Vol. 396, No. 10249, 2020, pp. 467-478, https://doi.org/10.1016/S0140-6736(20)31604-4.[64] N. V. Doremalen, T. Lambe, A. Spencer, S. B. Rammerstorfer, J. N. Purushotham, J. R. Port et al., ChAdOx1 nCoV-19 Vaccine Prevents SARS-Cov-2 Pneumonia in Rhesus Macaques, Nature, Vol. 586, No. 7830, 2020, pp. 578-582, https://doi.org/10.1016/s41586-020-2608-y.[65] D. Y. Logunov, I. V. Dolzhikova, O. V. Zubkova, A. I. Tukhvatullin, D. V. Shcheblyakov, A. S. Dzharullaeva et al., Safety and Immunogenicity of an Rad26 And Rad5 Vector-Based Heterologous Prime-Boost COVID-19 Vaccine in Two Formulations: Two Open, Non-Randomised Phase 1/2 Studies From Russia, The Lancet, Vol. 396, No. 10255, 2020, pp. 887-897, https://doi.org/10.1016/S0140-6736(20)31866-3.[66] S. Y. Jung, K. W. Kang, E. Y. Lee, D. W. Seo, H. L. Kim, H. Kim et al., Heterologous Prime-Boost Vaccination with Adenoviral Vector and Protein Nanoparticles Induces Both Th1 and Th2 Responses Against Middle East Respiratory Syndrome Coronavirus, Vaccine, Vol. 36, No. 24, 2018, pp. 3468-3476, https://doi.org/10.1016/j.vaccine.2018.04.082.[67] S. Lu, Heterologous Prime-Boost Vaccination. Current Opinion in Immunology, Vol. 21, No. 3, 2009, pp. 346-351, https://doi.org/10.1016/j.coi.2009.05.016.[68] D. Y. Logunov, I. V. Dolzhikova, D. V. Shcheblyakov, A. I. Tukhvatulin, O. V. Zubkova, A. S. Dzharullaeva et al., Safety and Efficacy of an Rad26 and Rad5 Vector-Based Heterologous Prime-Boost COVID-19 Vaccine: an Interim Analysis of A Randomised Controlled Phase 3 Trial in Russia, The Lancet, Vol. 397, No. 10275, 2021, pp. 671-681, https://doi.org/10.1016/S0140-6736(21)00234-8.[69] T. Ura, K. Okuda, M. Shimada. Developments in Viral Vector-Based Vaccines, Vaccines, Vol. 2, No. 3, 2014, pp. 624-641, https://doi.org/10.3390/vaccines2030624.[70] B. E. Bache, M. P. Grobusch, S. T. Agnandji. Safety, Immunogenicity and Risk-Benefit Analysis of Rvsv-ΔG-ZEBOV-GP (V920) Ebola Vaccine in Phase I-III Clinical Trials Across Regions. Future Microbiology, Vol. 15, No. 2, 2020, pp. 85-106, https://doi.org/10.2217/fmb-2019-0237.[71] Ebola Vaccines, NIH: National Institute of Allergy and Infectious Diseases Logo, 2020, https://www.niaid.nih.gov/diseases-conditions/ebola-vaccines/, (accessed on: January 9th, 2020).[72] F. Krammer, SARS-CoV-2 Vaccines in Development, Nature, Vol. 586, No. 7830, 2020, pp. 516-527, https://doi.org/10.1038/s41586-020-2798-3.[73] Y. Zhang, G. Zeng, H. Pan, C. Li, Y. Hu, K. Chu et al., Safety, Tolerability, and Immunogenicity of an Inactivated SARS-CoV-2 Vaccine in Healthy Adults Aged 18-59 Years: A Randomised, Double-Blind, Placebo-Controlled, Phase 1/2 Clinical Trial, The Lancet Infectious Diseases, Vol. 21, No. 2, 2021, pp. 181-192, https://doi.org/10.1016/S1473-3099(20)30843-4.[74] Sinovac Announces Phase III Results of Its COVID-19 Vaccine, Sinovac, 2021. https://www.businessswwire.com/news/home/20210205005496/en/Sinovac-Announces-Phase-III-Results-of-Its-COVID-19-Vaccine/, 2021, (accessed on: February 5th,2021).[75] Sinovac Receives Conditional Marketing Authorization in China for its COVID-19 Vaccine. Sinovac, https://www.businessswwire.com/news/ home/20210208005305/en/Sinovac-Receives-Conditional-Marketing-Authorization-in-China-for-its-COVID-19-Vaccin/, 2021, (accessed on: February 8th, 2021).[76] L. M. Rossen, A. M. Branum, F. B. Ahmad, P. Sutton, R. N. Anderson, Excess Deaths Associated with COVID-19, by Age and Race and Ethnicity-United States, January 26-October 3, 2020, Morbidity and Mortality Weekly Report, Vol. 69, No. 42, 2020, pp. 1522-1527.[77] China Grants Conditional Market Approval for Sinopharm CNBG’s COVID-19 Vaccine. Sinopharm, http://www.sinopharm.com/en/s/1395-4173-38862.html/, 2021, (accessed on: January 2nd, 2021).[78] V. A. Fulginiti, J. J. Eller, A. W. Downie, C. H. Kempe, Altered Reactivity to Measles Virus: Atypical Measles in Children Previously Immunized with Inactivated Measles Virus Vaccines, Jama, Vol. 202, No. 12, 1967, pp. 1075-1080, https://doi.org/10.1001/jama.1967.03130250057008.[79] H. W. Kim, J. G. Canchola, C. D. Brandt, G. Pyles, R. M. Chanock, K. Jensen et al., Respiratory Syncytial Virus Disease in Infants Despite Prior Administration of Antigenic Inactivated Vaccine. American Journal of Epidemiology, Vol. 89, No. 4, 1969, pp. 422-434, https://doi.org/10.1093/oxfordjournals.aje.a120955.[80] Novavax Confirms High Levels of Efficacy Against Original and Variant COVID-19 Strains in United Kingdom and South Africa Trials, Novavax 2021, https://www.prnewswire.com/news-releases/novavax-confirms-high-levels-of-efficacy-against-original-and-variant-covid-19-strains-in-united-kingdom-and-south-africa-trials-301246019.html/, (accessed on: March 11th, 2021).[81] Our Vaccine, Covaxx, 2020, https://www.gavi.org/covax-vaccine-roll-out/, (accessed on: August 14th, 2021).[82] M. O. Mohsen, G. Augusto, M. F. Bachmann, The 3Ds in Virus‐like Particle Based‐vaccines: Design, Delivery and Dynamics, Immunological Reviews Vol. 296, No. 1, 2020, pp. 155-168, https://doi.org/10.1111/imr.12863.
APA, Harvard, Vancouver, ISO, and other styles
31

Quan, Alexander. "Addressing Shortcomings in Contingency Standards of Care." Voices in Bioethics 8 (September 17, 2022). http://dx.doi.org/10.52214/vib.v8i.9991.

Full text
Abstract:
Photo by Adhy Savala on Unsplash ABSTRACT During a crisis, when healthcare capacity becomes overwhelmed and cannot meet regular standards of patient care, crisis standards of care are invoked to distribute scarce hospital space, staff, and supplies. When transitioning between conventional standards of care and crisis standards, hospitals may have to manage resources under scarcity constraints in an intermediate phase defined as the contingency phase. While much attention has been paid to the ethics of crisis standard of care protocols, contingency measures were more widely implemented, though little exists within the literature on the ethics of contingency measures or a clearly explicated contingency standard of care. This paper addresses three ethical issues with the current contingency response to COVID-19: the lack of formalization, the risks of using short-term solutions for prolonged contingency shortages, and the danger of exacerbating health disparities through hospital-level resource allocation. To mitigate these ethical issues, I offer recommendations for reimagining resource allocation during contingency standards of care. INTRODUCTION When transitioning between conventional standards of care and crisis standards, or in situations where shortages do not immediately threaten care delivery, hospitals may have to manage scarce resources in an intermediate phase, known as the “contingency” phase.[1] While much attention has been paid to the ethics of crisis standards, less literature covers the ethics of contingency measures or a clearly explicated contingency standard of care. Many states and hospital systems do not have contingency standards of care to dictate allocation absent an event triggering crisis standards. Crisis standards of care, used when healthcare capacity becomes overwhelmed and cannot meet regular standards of patient care, reflect ethical priorities relevant in times of shortage or other emergencies. These priorities include saving the most lives, the stewardship of scarce resources, and justice relating to equitable resource distribution.[2] Crisis standards of care delineate specialized allocation protocols and triage decision-making bodies at the institutional or state levels. Crisis standards of care require formal activation at the state level, and in the absence of clear triggers or governmental willingness to use them, hospitals may adopt informal strategies to manage allocation in the form of contingency measures. The contingency phase is defined by two simultaneous goals: prevent or stall crisis-level scarcity by managing limited resources and providing patient care that is functionally equivalent to usual care.[3] In other words, allocate scarce resources with no significant health consequences to patients. However, this is an unrealistic expectation: meeting a patient’s medical needs and allocating resources on the basis of scarcity instead of medical indications can be at odds, creating ethical tension. This paper addresses three ethical issues with the current contingency response stemming from this tension: the lack of formalization, the risk of using short-term solutions for prolonged contingency shortages, and the danger of exacerbating health disparities through hospital-level resource allocation. To mitigate these ethical issues, I offer recommendations for reimagining resource allocation during contingency standards of care. l. Lack of Formalization One shortcoming of current contingency measures is that they fail to meet the same level of procedural detail and clarity as crisis standards. The early COVID-19 surges in Italy and France demonstrated the pitfalls of bedside allocation in the absence of procedural guidance. The acute scarcity of critical care resources forced doctors in these countries to make allocation decisions at the bedside, which often resulted in de facto age-based allocation as well as experiences of moral distress and shame among providers.[4] In France, medical allocation guidelines and statistics were never released to the public, raising concerns over the role of transparency in implementing crisis standards and triage guidelines and causing the public to question the trustworthiness of provider triage.[5] Though many states in the US have crisis standards of care that can be implemented in the case of a large-scale triage event, these measures vary widely. A 2020 review of 31 crisis standards of care in the US found that only 18 contained strong “ethical grounding,” 28 used “evidence-based clinical processes and operations,” 21 included “ongoing community and provider engagement, education, and communication,” and 16 had “clear indicators, triggers, and lines of responsibility.”[6] The need for standardization, public transparency, and guidelines for crisis standards of care to prevent bedside allocation has been widely recognized. However, these issues remain unresolved by public policy or legislative efforts during the contingency period before (or after) crisis standards apply. A recent public health study that observed triage team members in a high-fidelity triage simulation highlighted the challenges of making equitable frontline allocation decisions.[7] In the simulation, participants nudged patient priority status up or down depending on what they subjectively identified as morally relevant factors. Through the simulation, participants reported difficulty separating implicit biases about patient characteristics from their clinical judgment. In the absence of formal institutional or regional guidelines for allocation during contingency-level shortages, there are few to no procedural safeguards against biased, ad hoc, and non-transparent rationing. Without formalized or standardized contingency allocation guidance, providers are left to make bedside allocation decisions that are susceptible to individual biases and patterns of unintended discrimination. An example of this susceptibility is seen when hospitals allow patients who no longer benefit from ICU resources to continue occupying ICU beds. This is based on a first-come-first-served (FCFS) approach to bed allocation. FCFS is often a default for patient intake, which led to disparities in care access during the early COVID-19 pandemic. Media reports of hospitals with “plenty of space” being unwilling to accept patients from overwhelmed, lower-income hospitals illustrate that the FCFS default advantages those who could show up first to a particular hospital: often privileged, well-funded healthcare systems that were inaccessible to low-income communities.[8] FCFS is blind to several morally relevant factors, including the likelihood of survival to discharge, reciprocity (i.e. prioritizing healthcare workers), and varying degrees of access to healthcare. Therefore, it inappropriately privileges those in proximity to healthcare systems or with social connections enabling greater initial access to care.[9] During crisis standards of care, excessive mortality that would result from FCFS is mitigated through formalized system-wide triage protocols based on current patient health status and potential benefit from resources. Crisis and contingency standards may provide liability coverage for providers who reallocate critical care beds away from those who no longer benefit during periods of scarcity. This liability coverage shifts bed allocation away from an FCFS model, but only if the policy is well-defined, clearly established, and known to providers. Without a formal system to guide the process or transition from the usual method of allocation to the contingency period, contingency decisions about who gets a scarce resource may continue to operate on an implicit FCFS basis, even when approaching crisis levels of scarcity. Additionally, these decisions will fall unsustainably on individual providers or transfer center workers, leading to moral distress on the frontlines when hospitals are already strained. Lessons from the crisis and contingency responses during COVID-19 can improve future contingency responses. There are multiple ways of achieving equity during contingency allocation, ranging from hospital-level to state-level policy changes. State-wide policies and interventions to facilitate resource-sharing can relieve some of the scarcity burdens that hospitals may face during the contingency period. For example, moving ICU patients to lower levels of care once they have sufficiently recovered is a challenge for doctors, who often call other hospitals to find open beds. In these situations, providers who do not move patients who no longer benefit from ICU beds unknowingly reinforce the FCFS system in which those who arrive first keep the scarce beds, while those who arrive later or wait for one are disadvantaged by having limited access to them. State-wide patient transfer centers, often facilitated by state public health departments, present an alternative by balancing patient needs and bed distribution more equitably and efficiently than individual physicians do, as demonstrated following COVID-19 surges in hospitalization.[10] These centers aid not only in allocating open tertiary care beds, but also in identifying open beds at lower levels of care and assisting physicians with transferring out patients who can be safely downgraded and no longer benefit from tertiary care resources. However, the simplest solution is to encourage the creation of ethics guidance or protocols for contingency allocation at the hospital level. In hospitals, institutional ethics guidance can help providers navigate difficult decisions and conversations with patients. When providers face time-sensitive allocation decisions, like the allocation of open ICU beds, the guidance would be a useful tool for making transparent, principled, and ethically justified allocation decisions in real-time to mitigate the risk of ad hoc or implicit rationing. ll. Unsuited for Prolonged Resource Shortages Secondly, neither contingency nor crisis standards are currently designed to respond to prolonged strains on the healthcare system. Since the start of the pandemic, a prolonged period of staffing shortages began and is projected to persist.[11] However, both crisis and contingency standards assume that the system will eventually return to conventional standards of care. For example, as a contingency or crisis standard, many hospitals deferred elective surgeries to preserve limited resources for emergency and life-saving procedures. Massachusetts, for instance, issued a public health emergency order that required hospitals to defer 50 percent of all non-essential and non-urgent (elective) surgeries. This order demonstrates the use of this contingency measure in response to prolonged staffing and bed shortages.[12] However, the deferral of elective procedures can result in adverse long-term community health consequences. Medical conditions typically addressed through elective surgery, such as joint replacement surgeries for osteoarthritis patients, may worsen if delayed. This can result in greater numbers of acute emergencies, the need for more complex surgical procedures later, increased reliance on pain medications, and longer recovery times.[13] Without a greater understanding of long-term complications in community health, existing contingency strategies, such as the deferral of elective surgeries, may be unsuitable for prolonged shortages. This becomes a greater threat to patient safety when contingency measures inappropriately take the place of crisis standards, risking the long-term implementation of emergency measures designed for temporary use. Although some state emergency planning documents identify indicators and triggers for activating contingency and crisis operations,[14] this transition is not always clear in action. For example, New York did not implement crisis standards of care during the early COVID-19 pandemic despite being one of the hardest-hit cities in the US.[15] Other states, including California, Texas, and Florida, did not activate crisis standards of care, leaving hospitals to implement informal contingency measures that ultimately required allocation strategies very similar or identical to many crisis standards of care protocols.[16] Due to the hesitance to activate crisis standards, ad hoc contingency measures and bedside decision-making prevailed over formal triage protocols. If contingency measures are not set forth in objective documents and are inappropriately used in the place of crisis standards, these short-term measures may result in an unfair or non-transparent distribution of scarce resources. When shortages in space, staff, or supplies jeopardize the ability to provide necessary care for critically ill patients under a conventional standard of care, failures to activate crisis standards risk the inappropriate use of ad hoc contingency measures in their place. With clear contingency standards of care, the duration of an ad hoc approach could be limited. Crisis standards are defined and activated at the regional or state-wide level, but outside of hospital-specific resource limitations, there are generally no standardized indications or triggers for transitioning into and out of contingency measures. Leaving contingency needs to individual hospitals may seem beneficial but defining the contingency period at the hospital level and the crisis period at the state or regional level blurs the line about when it is appropriate for decision makers to activate crisis standards, risking delayed activation or failure to activate them at all. Therefore, it is important that state policies implement automatic triggers for activation that clearly delineate between contingency and crisis responses.[17] Automatic triggers based on validated metrics like remaining available resources can inform the appropriate decision makers about when they must activate crisis standards. These triggers should be transparent to the public, validated, and updated over time with evolving data. These automatic triggers would prevent confusion, inconsistent guidelines, and inequitable contingency allocation at the hands of distressed providers when crisis standards are needed. Defining when to begin crisis standards could help limit the length of the contingency period. This would protect against the inappropriate application of contingency measures to crisis-level scarcity and prolonged shortages that they could not sustainably ameliorate. lll. Potential to Exacerbate Health Disparities Inconsistencies in contingency allocation open the door to disparities in care and unequal distribution of scarcity burdens among different communities based on their location or health needs. This is a concern because it is unclear whether contingency measures can meet their goal of achieving functionally equivalent patient outcomes when resource allocation must be balanced with patient-centered care.[18] The care under contingency standards is meant to be functionally equivalent to regular care. The definition assumes (or may wrongly suggest) that any contingency strategy in place to avoid critical scarcity has no significant impact on patient outcomes. While functional equivalence is attainable, there is currently little research into which contingency measures achieve functionally equivalent outcomes and which patient groups may be disproportionately affected by harmful resource allocation strategies. Although the transition from contingency standards to crisis standards is defined by the inability to provide functionally equivalent care, the difference in practice may merely be a distinction between visible, immediate sacrifices to patient well-being during crises and less-obvious, long-term decrements in community health due to protracted contingency care alterations. Two common contingency measures are cause for concern over disparate patient outcomes and the attainability of functional equivalence. First, restricting emergency room visits by the patient’s degree of need has worrying consequences. In late 2021 and early 2022, hospitals in Massachusetts faced widespread staffing shortages, leading to an emergency order that restricted emergency visits to emergency needs.[19] While this order is a reasonable method of allocating limited staff in the emergency department during severe shortages, it is doubtful that the outcomes of this restriction were equivalent to usual care. Health issues that are soon-to-be emergencies are filtered out until they worsen, resulting in patients overflowing to urgent care clinics or presenting to ERs with more severe forms of sicknesses later on. Given the empirical evidence demonstrating ER treatment and admission disparities that disadvantage Black and Hispanic patients, such a measure would only exacerbate these disparities by further limiting access to needed care.[20] Second, altered staffing ratios, which stretch a limited number of providers to meet patient needs during a staffing shortage, are another concerning yet common contingency measure. Staffing allocation is often viewed similarly to the allocation of space and medical equipment, such that contingency alterations to staffing operations may not seem like they significantly jeopardize patient care quality and outwardly appear functionally equivalent.[21] However, lower ratios of qualified nurses are associated with poor outcomes such as higher inpatient mortality[22] and lower survival rates of in-hospital cardiac arrest for Black patients.[23] These examples highlight the strong potential for contingency measures to amplify social health disparities, particularly when adopted over a prolonged time frame. Lowered standards of care in crisis allocation disproportionately impact racial and ethnic minorities.[24] For example, crisis standards of care used clinical scoring systems that were not developed or validated for crisis triage to prioritize access to life-saving treatments during the COVID-19 pandemic. This practice actively gives rise to racial health disparities and discrimination against disabled patients.[25] Not only were the standards inequitable in practice, but they varied widely from state to state and sometimes even from hospital to hospital, creating disparities across and within geographic regions.[26] If contingency measures are similarly implemented across hospitals or hospital departments without standardization or advance planning to ensure equitable outcomes, it is likely that the burden of a lower standard of care will fall primarily on disadvantaged patient groups and racial minorities. However, standardization alone may be insufficient. Other factors like varying levels of details on patients’ charts between hospitals could produce unfair outcomes if used to determine patient admission or transfer priority, even if the criteria for admissions and transfers are consistent. Thus, ongoing monitoring for unintended patterns of disparity must accompany standardization to ensure that blind spots in the allocation process are identified and corrected. Bioethics has long been preoccupied with the micro-allocation of limited resources within hospitals instead of confronting the structural inequities that underlie broader scarcity and patient needs. The traditional dilemma of allocating limited hospital resources among a certain number of patients overlooks questions about how other resources have already been allocated, which patients were present at the hospital in the first place, where hospitals have (and have not) been built, and whether previous allocation strategies created bias in the broader distribution of resources. Therefore, to achieve fairness, bioethicists must pay attention to aspects of the broader distribution of resources, such as social determinants of health and the allocation of preventative resources at the public health level. One strategy for measuring and addressing these disparities is the Area Deprivation Index (ADI). The ADI quantifies the effects of race, class, and socioeconomic background by geographic region for use in public health research and the prioritization of resources.[27] It has shown promise in identifying geographic regions in need of targeted community health efforts for diabetes management based on electronic patient health records.[28] The ADI and similar tools would be useful in proactively deciding how to allocate public health resources when hospitals are strained. Moreover, through using population health and resource data, public health organizations may forecast contingency shortages allowing for the adoption of early measures to mitigate health disparities that might otherwise be amplified from hospital-level contingency allocation decisions. CONCLUSION Meeting community health needs during periods of contingency scarcity, both before and after crisis standards of care apply, will require contingency standards of care rather than a bedside ad hoc distribution of scarce resources. While it is not inherently ethically unjustifiable for hospitals to adopt measures that may lower the standard of care during contingency standards, the necessity of these measures requires that bioethicists consider how equity, transparency, and the overall aim of functional equivalence can best be achieved under conditions of scarcity. The long-term health consequences of existing contingency measures, the potential for ad hoc and inconsistent allocation of scarce resources, and the need for consensus about when it becomes appropriate to make the formal transition to crisis standards of care demand further consideration. Because contingency measures will likely amplify existing disparities as crisis standards have, hospital-level management of scarcity is inadequate. Public health measures should be adopted in parallel to anticipate and manage health needs at the community or state level when resources are strained. - [1] Altevogt, B. M., Stroud, C., Hanson, S. L., Hanfling, D., & Gostin, L. O. (2009). Guidance for Establishing Crisis Standards of Care for Use in Disaster Situations: A Letter Report. The National Academies Press. https://doi.org/10.17226/12749 [2] Emanuel, E. J., Persad, G., Upshur, R., Thome, B., Parker, M., Glickman, A., Zhang, C., Boyle, C., Smith, M., & Phillips, J. P. (2020). Fair Allocation of Scarce Medical Resources in the Time of Covid-19. New England Journal of Medicine, 382(21), 2049–2055. https://doi.org/10.1056/NEJMsb2005114 [3] Alfandre, D., Sharpe, V. A., Geppert, C., Foglia, M. B., Berkowitz, K., Chanko, B., & Schonfeld, T. (2021). Between Usual and Crisis Phases of a Public Health Emergency: The Mediating Role of Contingency Measures. The American Journal of Bioethics, 21(8), 4–16. https://doi.org/10.1080/15265161.2021.1925778 [4] Rosenbaum, L. (2020). Facing Covid-19 in Italy—Ethics, Logistics, and Therapeutics on the Epidemic’s Front Line. New England Journal of Medicine, 382(20), 1873–1875. https://doi.org/10.1056/NEJMp2005492 [5] Orfali, K. (2020). What Triage Issues Reveal: Ethics in the COVID-19 Pandemic in Italy and France. Journal of Bioethical Inquiry, 17(4), 675–679. https://doi.org/10.1007/s11673-020-10059-y [6] Romney, D., Fox, H., Carlson, S., Bachmann, D., O’Mathuna, D., & Kman, N. (2020). Allocation of Scarce Resources in a Pandemic: A Systematic Review of US State Crisis Standards of Care Documents. Disaster Medicine and Public Health Preparedness, 14(5), 677–683. https://doi.org/10.1017/dmp.2020.101 [7] Butler, C. R., Webster, L. B., Diekema, D. S., Gray, M. M., Sakata, V. L., Tonelli, M. R., & Vranas, K. C. (2022). Perspectives of Triage Team Members Participating in Statewide Triage Simulations for Scarce Resource Allocation During the COVID-19 Pandemic in Washington State. JAMA Network Open, 5(4), e227639. https://doi.org/10.1001/jamanetworkopen.2022.7639 [8] Dwyer, J. (2020, May 14). One Hospital Was Besieged by the Virus. Nearby Was ‘Plenty of Space.’—The New York Times. The New York Times. https://www.nytimes.com/2020/05/14/nyregion/coronavirus-ny-hospitals.html [9] Persad, G., Wertheimer, A., & Emanuel, E. J. (2009). Principles for allocation of scarce medical interventions. Lancet (London, England), 373(9661), 423–431. https://doi.org/10.1016/S0140-6736(09)60137-9 [10] Mitchell, S. H., Rigler, J., & Baum, K. (2022). Regional Transfer Coordination and Hospital Load Balancing During COVID-19 Surges. JAMA Health Forum, 3(2), e215048. https://doi.org/10.1001/jamahealthforum.2021.5048 [11] ASPE. (2022, May 3). Impact of the COVID-19 Pandemic on the Hospital and Outpatient Clinician Workforce: Challenges and Policy Responses. ASPE. https://aspe.hhs.gov/reports/covid-19-health-care-workforce [12] Executive Office of Health and Human Services. (2021). Baker-Polito Administration Provides COVID-19 Update on Mask Advisory, Hospital Support | Mass.gov. https://www.mass.gov/news/baker-polito-administration-provides-covid-19-update-on-mask-advisory-hospital-support [13] The Lancet Rheumatology. (2021). Too long to wait: The impact of COVID-19 on elective surgery. The Lancet Rheumatology, 3(2), e83. https://doi.org/10.1016/S2665-9913(21)00001-1 [14] For an example of transition planning between crisis and contingency standards, see Minnesota Department of Health. (2021). Ethical Framework for Transitions Between Conventional, Contingency, and Crisis Conditions in Pervasive or Catastrophic Public Health Events with Medical Surge Implications (Minnesota Crisis Standards of Care). https://www.health.state.mn.us/communities/ep/surge/crisis/framework_transitions.pdf [15] Powell, T., & Chuang, E. (2020). COVID in NYC: What We Could Do Better. The American Journal of Bioethics, 20(7), 62–66. https://doi.org/10.1080/15265161.2020.1764146 [16] Persoff, J., & Wynia, M. K. (2021). Ethically Navigating the Murky Waters of “Contingency Standards of Care.” The American Journal of Bioethics, 21(8), 20–21. https://doi.org/10.1080/15265161.2021.1939810 [17] Board on Health Sciences Policy & Institute of Medicine. (2013). Indicators and Triggers. In Crisis Standards of Care: A Toolkit for Indicators and Triggers. National Academies Press (US). http://www.ncbi.nlm.nih.gov/books/NBK202381/ [18] Frith, L., Draper, H., Fovargue, S., Baines, P., Redhead, C., & Chiumento, A. (2021). Neither ‘Crisis Light’ nor ‘Business as Usual’: Considering the Distinctive Ethical Issues Raised by the Contingency and Reset Phases of a Pandemic. The American Journal of Bioethics, 21(8), 34–37. https://doi.org/10.1080/15265161.2021.1940363 [19] Rosseau, M. (2022, January 14). New emergency orders issued to help understaffed Mass. Hospitals. Boston.Com. https://www.boston.com/news/coronavirus/2022/01/14/new-emergency-orders-issued-to-help-understaffed-mass-hospitals/ [20] Zhang, X., Carabello, M., Hill, T., Bell, S. A., Stephenson, R., & Mahajan, P. (2020). Trends of Racial/Ethnic Differences in Emergency Department Care Outcomes Among Adults in the United States From 2005 to 2016. Frontiers in Medicine, 7. https://www.frontiersin.org/articles/10.3389/fmed.2020.00300 [21] Hick, J. L., Hanfling, D., & Wynia, M. (2022). Hospital Planning for Contingency and Crisis Conditions: Crisis Standards of Care Lessons from COVID-19. The Joint Commission Journal on Quality and Patient Safety. https://doi.org/10.1016/j.jcjq.2022.02.003 [22] Musy, S. N., Endrich, O., Leichtle, A. B., Griffiths, P., Nakas, C. T., & Simon, M. (2021). The association between nurse staffing and inpatient mortality: A shift-level retrospective longitudinal study. International Journal of Nursing Studies, 120, 103950. https://doi.org/10.1016/j.ijnurstu.2021.103950 [23] Brooks Carthon, M., Brom, H., McHugh, M., Sloane, D. M., Berg, R., Merchant, R., Girotra, S., & Aiken, L. H. (2021). Better Nurse Staffing Is Associated With Survival for Black Patients and Diminishes Racial Disparities in Survival After In-Hospital Cardiac Arrests. Medical Care, 59(2), 169–176. https://doi.org/10.1097/MLR.0000000000001464 [24] Annas, G. J., & Crosby, S. S. (2021). Standard Racism: Trying to Use “Crisis Standards of Care” in the COVID-19 Pandemic. The American Journal of Bioethics, 21(8), 1–3. https://doi.org/10.1080/15265161.2021.1941424 [25] Wynia, M. K., & Sottile, P. D. (2020). Ethical Triage Demands a Better Triage Survivability Score. The American Journal of Bioethics, 20(7), 75–77. https://doi.org/10.1080/15265161.2020.1779412 [26] Fink, S. (2020). Ethical Dilemmas in Covid-19 Medical Care: Is a Problematic Triage Protocol Better or Worse than No Protocol at All? The American Journal of Bioethics, 20(7), 1–5. https://doi.org/10.1080/15265161.2020.1788663 [27] Knighton, A. J., Savitz, L., Belnap, T., Stephenson, B., & VanDerslice, J. (2016). Introduction of an Area Deprivation Index Measuring Patient Socioeconomic Status in an Integrated Health System: Implications for Population Health. EGEMS (Washington, DC), 4(3), 1238. https://doi.org/10.13063/2327-9214.1238 [28] Kurani, S. S., Lampman, M. A., Funni, S. A., Giblon, R. E., Inselman, J. W., Shah, N. D., Allen, S., Rushlow, D., & McCoy, R. G. (2021). Association Between Area-Level Socioeconomic Deprivation and Diabetes Care Quality in US Primary Care Practices. JAMA Network Open, 4(12), e2138438. https://doi.org/10.1001/jamanetworkopen.2021.38438
APA, Harvard, Vancouver, ISO, and other styles
32

Nunes, Mark. "Distributed Terror and the Ordering of Networked Social Space." M/C Journal 7, no. 6 (January 1, 2005). http://dx.doi.org/10.5204/mcj.2459.

Full text
Abstract:
Truth be told, the “Y2K bug” was quite a disappointment. While the technopundits wooed us with visions of network failures worthy of millennial fervor, Jan. 1, 2000, came and went without even a glimmer of the catastrophic. Yet the Y2K “bug” did reveal the degree to which the American apocalypse now took the form of the network itself. The spaces of everyday life in America and elsewhere in a developed world produce and are produced by network structures that Manuel Castells has called “spaces of flow.” As such, Catastrophe today is marked more by dispersion and dissipation, rather than breakdown — a dis-strophe of social forms, structures, and experience. The dissipation of enactive networks does not, however, equate with a system failure. With the Internet “bubble burst” of March, 2000, the very exuberance of market flows were very much the conditions of possibility for both the irruption of a new economy and its sudden evaporation. It is not the ephemerality of these social forms and structures that disorients activities of everyday life in a network society, but rather our lack of control over distributed processes. The bubble burst, then, by no means sounded a death knell for distributed network functions. Rather, it marked a moment of increased misrecognition of the forms, structures, and practices that were the conditions of possibility for the event itself, as an ideology of authentication eclipsed a rhetoric of emergence and flow. Billions in capital disappeared in a matter of weeks, but the network forms and structures that allowed individual users “direct access” to the flows of capital remained in place for a normative virtual class, articulated as personalized and privatized spaces of control. As the bubble burst signaled an instance of digital dis-strophe, the 9/11 attacks on the World Trade Center marked a similar dissipative moment, articulated in the material terror of over 1,300 feet of skyscraper steel and human bodies turned to wreckage and dust. Much as the market crash of 2000 represented a collapse from within of the same network processes that enabled the market’s phenomenal growth, for all the “foreignness” of the terrorists, al Qaeda as an organization appeared decidedly at home in the globalized network society that it threatened to destroy. In an instance of Baudrillardian “ironic revenge,” terrorism appropriated all the trappings of a global space of flows in the name of subverting that same social structure (Baudrillard, “Spirit” 17-19). Only within the conditions of possibility of networked social space could such attacks occur. As such, terrorist cells functioned (the media informed us) as nodes in a distributed network, a human articulation of a space of flows capable of enacting horrifying acts beyond control. While in the years leading up to the market collapse of March, 2000, a growing number of an emerging virtual middle class (from cyberhippy to day-trader manqué) began to understand distributed networks as material expressions of a social revolution, the image of a distributed network changed after 9/11, becoming a global spatiality of fear and danger. As independent scholar Sam Smith notes on his weblog: I expect the organizing principle of the coming age – the era that began on September 12… – will be the distributed network, and we already have some early indications of what this period might look like. The decentralized potency of the Internet is a perfect metaphor in so many ways, and al Qaeda itself provides an apt demonstration of the character and power of the distributed network…. As our ill-prepared military has discovered, it’s hard to kill something you can’t find. Thank goodness for the Taliban, eh? Although figured as an anti-modern fundamentalism, the terrorist networks associated with September 11 served as an image of contemporary network structures themselves. The enemy, it seemed, was not some reclusive figurehead, but rather, the spatiality of the network itself, enacted by distributed, autonomous agents. Carl Conetta, writing on the nature of al Qaeda as a distributed network, notes in particular its ability to “[link] subnational elements together in a transnational web,” to thrive in nation-states that have collapsed or are about to collapse; in short, al Qaeda “lives in the interstices” of modern global space (Conetta). As globalization’s ironic revenge, distributed terror maps the interstitial flows that exploit the inability of centralized authority to coordinate emergent, enactive forms of network agency. In response, the US Congress passed the Patriot Act as an attempt to introduce modes of control into distributed networks and place them at the fingertips of state-based agencies. In an era of global flows, the Patriot Act reestablished the homeland as both a concept of social space and a delimited space of practice, articulated through global network structures. As part of President Bush’s “war on terror,” the Patriot Act declared war on the dispersive and dissipative nature of distributed networks by introducing what Deleuze and Guattari would call state-based apparatuses of capture. But as Deleuze notes, in a world of flows, “capture” occurs as a modulation, not an enclosure — a system of distributed control that is itself expressed in flows (4). The Patriot Act acknowledges networks themselves as modes of agency (noted in its frequent reference to an “intelligence service or network of a foreign power”), and as such institutes a legislative structure to “trap and trace” emergent network structures. In effect, the Patriot Act marks a modulation of networked social space that affirms the primacy of global flows in contemporary life at the same time that it initiates state-based systems of distributed control. Apparatuses of capture modulate flows by eliminating the interstitial and regulating transmission as a mode of order. The “homeland security” measures, then, are precisely this sort of effort to modulate the forms, structures, and practices of a space of flows. As the US military force mounted, one heard less and less talk of the distributed network form of terror, as an uncontrollable threat coalesced in the modulated image of a handful of figureheads: a “line up” in its most literal sense connecting bin Laden, Zakawi, and Hussein. The infamous Most Wanted card deck shifted our imagination from the shuffling networks of global terror to a linear ranking of Ba’ath Party players — a chain of command in a “rogue nation,” from ace of spades to the two of clubs. The topology of fear had changed. Within months, the U.S. government’s rhetoric had swayed our attention from terrorist networks to an “Axis of Evil.” Gone were the references to the complex webbings of distributed systems, and in its place, the reassuringly linear, gravitational orientations of good and evil. The “axis” not only revived the relatively clear lines of geopolitics of the Second World War; it also attempted to reestablish a representation of space predicated upon unidirectional movements and centralized control. Meanwhile, back in the homeland, DARPA’s Total Information Awareness (TIA) Program (renamed the Terrorist Information Awareness Program for better PR) promised a means of capturing flows of information through distributed control over the network. Whereas terrorist organizations exploit the interstitial spaces of a global network society, TIA as a state-based apparatus of capture promised to utilize these same networks to modulate a space of flows and extract orderly patterns of information. The agent of the state doesn’t necessarily control the flow of these networks, but rather, extracts mappings of emergent connections enacted by the network itself. Patterns of informatic exchange and transmission, then, provide distributed control over a network environment that can only be defined by flows and virtualities. In contrast to the data mining we are all used to in a commercial setting, where patterns of aggregate data give rise to “meaningful” market analysis, distributed control systems would instead focus on “rare but significant connections” mapped by the relational structures of a situated subject (DARPA A-14). Lines of contact emerge as pattern recognition allows authorized agents to “connect the dots” (a favored expression throughout DARPA’s report to Congress) within an undifferentiated network of data-flow. Distributed control creates a means for modulating what would otherwise appear as abject noise or aberrant links; the very fact that terrorist networks are represented as abject, interstitial social formations (and vice versa) becomes the condition of possibility for their recognition and capture. In a world in which networks of flows shape both state structures of power and the attempts to destroy those same structures, the lines have been drawn — and modulated. Through systems of distributed control, enactive networks now increasingly speak to a social space in which agency itself maps an emergent network. Less than two years after the Patriot Act was signed into law, DARPA lost Congressional funding for TIA. Again, it was the potential for success that induced our visions of digital catastrophe — that such a large body of data subjected to distributed control presented the potential for the network’s ironic revenge. Yet in many ways the modes of distributed control enacted by networks of pattern recognition are already matters of everyday life, misrecognized as “conveniences” in a network society. While spam filters and software agents hardly equate with the sophistication of TIA programs, the goal of each is the same — to modulate flows and cast off or capture the interstitial within programs of order. While information may want to be free, the forms, structures, and practices of everyday life reveal the degree to which a normative virtual class exerts a will to control, and an ironic willingness to distribute that control to the network itself. In a post-9/11 America, distributed controls are all the more implicated in everyday life, and all the more misrecognized as such by a citizenry terrified by middle eastern networks and placated by lines in the sand. References Baudrillard, Jean. The Spirit of Terrorism. Trans. Chris Turner. New York: Verso, 2003. ———. Symbolic Exchange and Death. Trans. Iain Hamilton Grant. Thousand Oaks, CA: Sage, 1993. Castells, Manuel. The Rise of the Network Society. Cambridge: Blackwell, 1996. Conetta, Carl. “Dislocating Alcyoneus: How to Combat al-Qaeda and the New Terrorism.” Project on Defense Alternatives. http://www.comw.org/pda/0206dislocate.html>. Defense Advanced Research Projects Agency (DARPA). “Report to Congress Regarding the Terrorism Information Awareness Program.” Washington, D.C. 20 May, 2003. http://www.eff.org/Privacy/TIA/TIA-report.pdf>. Deleuze, Gilles. “Postscript on the Societies of Control.” October 59 (Winter 1992): 3-7. Deleuze, Gilles and Felix Guattari. A Thousand Plateaus. Trans. Brian Massumi. Minneapolis: U Minnesota P, 1984. Trippi, Laura. “More Signs of 911’s Complex Effects.” Netvironments. http://www.netvironments.org/blog/archives/2001_09_01_archives1_html>. Smith, Sam. “Weblog: July/August 2002.” http://www.lullabypit.com/blog/02.jul_aug.html>. United States. Cong. Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT Act) Act of 2001. Washington: GPO, 2001. http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=107_cong_public_laws&docid=f:publ056.107.pdf>. Citation reference for this article MLA Style Nunes, Mark. "Distributed Terror and the Ordering of Networked Social Space." M/C Journal 7.6 (2005). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0501/01-nunes.php>. APA Style Nunes, M. (Jan. 2005) "Distributed Terror and the Ordering of Networked Social Space," M/C Journal, 7(6). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0501/01-nunes.php>.
APA, Harvard, Vancouver, ISO, and other styles
33

Soled, Derek. "Distributive Justice as a Means of Combating Systemic Racism in Healthcare." Voices in Bioethics 7 (June 21, 2021). http://dx.doi.org/10.52214/vib.v7i.8502.

Full text
Abstract:
Photo by Sharon McCutcheon on Unsplash ABSTRACT COVID-19 highlighted a disproportionate impact upon marginalized communities that needs to be addressed. Specifically, a focus on equity rather than equality would better address and prevent the disparities seen in COVID-19. A distributive justice framework can provide this great benefit but will succeed only if the medical community engages in outreach, anti-racism measures, and listens to communities in need. INTRODUCTION COVID-19 disproportionately impacted communities of color and lower socioeconomic status, sparking political discussion about existing inequities in the US.[1] Some states amended their guidelines for allocating resources, including vaccines, to provide care for marginalized communities experiencing these inequities, but there has been no clear consensus on which guidelines states should amend or how they should be ethically grounded. In part, this is because traditional justice theories do not acknowledge the deep-seated institutional and interpersonal discrimination embedded in our medical system. Therefore, a revamped distributive justice approach that accounts for these shortcomings is needed to guide healthcare decision-making now and into the post-COVID era. BACKGROUND Three terms – health disparity, health inequities, and health equity – help frame the issue. A health disparity is defined as any difference between populations in terms of disease incidence or adverse health events, such as morbidity or mortality. In contrast, health inequities are health disparities due to avoidable systematic structures rooted in racial, social, and economic injustice.[2] For example, current data demonstrate that Black, Latino, Indigenous Americans, and those living in poverty suffer higher morbidity and mortality rates from COVID-19.[3] Finally, health equity is the opportunity for anyone to attain his or her full health potential without interference from systematic structures and factors that generate health inequities, including race, socioeconomic status, gender, ethnicity, religion, sexual orientation, or geography.[4] ANALYSIS Health inequities for people of color with COVID-19 have led to critiques of states that do not account for race in their resource allocation guidelines.[5] For example, the Massachusetts Department of Public Health revised its COVID-19 guidelines regarding resource allocation to patients with the best chance of short-term survival.[6] Critics have argued that this change addresses neither preexisting structural inequities nor provider bias that may have led to comorbidities and increased vulnerability to COVID-19. By failing to address race specifically, they argue the policy will perpetuate poorer outcomes in already marginalized groups. As the inequities in COVID-19 outcomes continue to be uncovered and the data continue to prove that marginalized communities suffered disproportionately, we, as healthcare providers, must reconsider our role in addressing the injustices. Our actions must be ethically grounded in the concept of justice. l. Primary Theories of Justice The principle of justice in medical ethics relates to how we ought to treat people and allocate resources. Multiple theories have emerged to explain how justice should be implemented, with three of the most prominent being egalitarianism, utilitarianism, and distributive. This paper argues that distributive justice is the best framework for remedying past actions and enacting systemic changes that may persistently prevent injustices. An egalitarian approach to justice states all individuals are equal and, therefore, should have identical access to resources. In the allocation of resources, an egalitarian approach would support a strict distribution of equal value regardless of one’s attributes or characteristics. Putting this theory into practice would place a premium on guidelines based upon first-come, first-served basis or random selection.[7] However, the egalitarian approach taken in the UK continues to worsen health inequities due to institutional and structural discrimination.[8] A utilitarian approach to justice emphasizes maximizing overall benefits and achieving the greatest good for the greatest number of people. When resources are limited, the utilitarian principle historically guides decision-making. In contrast to the egalitarian focus on equal distribution, utilitarianism focuses on managing distributions to maximize numerical outcomes. During the COVID-19 pandemic, guidelines for allocating resources had utilitarian goals like saving the most lives, which may prioritize the youthful and those deemed productive in society, followed by the elderly and the very ill. It is important to reconsider using utilitarian approaches as the default in the post-COVID healthcare community. These approaches fail to address past inequity, sacrificing the marginalized in their emphasis on the greatest amount of good rather than the type of good. Finally, a distributive approach to justice mandates resources should be allocated in a manner that does not infringe individual liberties to those with the greatest need. Proposed by John Rawls in a Theory of Justice, this approach requires accounting for societal inequality, a factor absent from egalitarianism and utilitarianism.[9] Naomi Zack elaborates how distributive justice can be applied to healthcare, outlining why racism is a social determinant of health that must be acknowledged and addressed.[10] Until there are parallel health opportunities and better alignment of outcomes among different social and racial groups, the underlying systemic social and economic variables that are driving the disparities must be fixed. As a society and as healthcare providers, we should be striving to address the factors that perpetuate health inequities. While genetics and other variables influence health, the data show proportionately more exposure, more cases, and more deaths in the Black American and Hispanic populations. Preexisting conditions and general health disparities are signs of health inequity that increased vulnerability. Distributive justice as a theoretical and applied framework can be applied to preventable conditions that increase vulnerability and can justify systemic changes to prevent further bias in the medical community. During a pandemic, egalitarian and utilitarian approaches to justice are prioritized by policymakers and health systems. Yet, as COVID-19 has demonstrated, they further perpetuate the death and morbidity of populations that face discrimination. These outcomes are due to policies and guidelines that overall benefit white communities over communities of color. Historically, US policy that looks to distribute resources equally (focusing on equal access instead of outcomes), in a color-blind manner, has further perpetuated poor outcomes for marginalized communities.[11] ll. Historical and Ongoing Disparities Across socio-demographic groups, the medical system exacerbates historical and current inequities. Members of marginalized races,[12] women,[13] LGBTQ people,[14] and poor people[15] experience trauma caused by discrimination, marginalization, and failure to access high-quality public and private goods. Through the unequal treatment of marginalized communities, these historic traumas continue. In the US, people of color do not receive equal and fair medical treatment. A meta-analysis found that Hispanics and Black Americans were significantly undertreated for pain compared to their white counterparts over the last 20 years.[16] This is partly due to provider bias. Through interviewing medical trainees, a study by the National Academy of Science found that half of medical students and residents harbored racist beliefs such as “Black people’s nerve endings are less sensitive than white people’s” or “Black people’s skin is thicker than white people’s skin.”[17] More than 3,000 Indigenous American women were coerced, threatened, and deliberately misinformed to ensure cooperation in forced sterilization.[18] Hispanic people have less support in seeking medical care, in receiving culturally appropriate care, and they suffer from the medical community’s lack of resources to address language barriers.[19] In the US, patients of different sexes do not receive the same quality of healthcare. Despite having greater health needs, middle-aged and older women are more likely to have fewer hospital stays and fewer physician visits compared to men of similar demographics and health risk profiles.[20] In the field of critical care, women are less likely to be admitted to the ICU, less likely to receive interventions such as mechanical ventilation, and more likely to die compared to their male ICU counterparts.[21] In the US, patients of different socioeconomic statuses do not receive the same quality of healthcare. Low-income patients are more likely to have higher rates of infant mortality, chronic disease, and a shorter life span.[22] This is partly due to the insurance-based discrimination in the medical community.[23] One in three deaths of those experiencing homelessness could have been prevented by timely and effective medical care. An individual experiencing homelessness has a life expectancy that is decades shorter than that of the average American.[24] lll. Action Needed: Policy Reform While steps need to be taken to provide equitable care in the current pandemic, including the allocation of vaccines, they may not address the historical failures of health policy, hospital policy, and clinical care to eliminate bias and ensure equal treatment of patients. According to an applied distributive justice framework, inequities must be corrected. Rather than focusing primarily on fair resource allocation, medicine must be actively anti-racist, anti-sexist, anti-transphobic, and anti-discriminatory. Evidence has shown that the health inequities caused by COVID-19 are smaller in regions that have addressed racial wealth gaps through forms of reparations.[25] Distributive justice calls for making up for the past using tools of allocation as well as tools to remedy persistent problems. For example, Brigham and Women’s Hospital in Boston, MA, began “Healing ARC,” a pilot initiative that involves acknowledgement, redress, and closure on an institutional level.[26] Acknowledgement entails informing patients about disparities at the hospital, claiming responsibility, and incorporating community ideas for redress. Redress involves a preferential admission option for Black and Hispanic patients to specialty services, especially cardiovascular services, rather than general medicine. Closure requires that community and patient stakeholders work together to ensure that a new system is in place that will continue to prioritize equity. Of note, redress could take the form of cash transfers, discounted or free care, taxes on nonprofit hospitals that exclude patients of color,[27] or race-explicit protocol changes (such as those being instituted by Brigham and Women’s Hospital that admit patients historically denied access to certain forms of medical care). In New York, for instance, the New York State Bar Association drafted the COVID-19 resolutions to ensure that emergency regulations and guidelines do not discriminate against communities of color, and even mandate that diverse patient populations be included in clinical trials.[28] Also, physicians must listen to individuals from marginalized communities to identify needs and ensure that community members take part in decision-making. The solution is not to simply build new health centers in communities of color, as this may lead to tiers of care. Rather, local communities should have a chance to impact existing hospital policy and should also use their political participation to further their healthcare interests. Distributive justice does not seek to disenfranchise groups that hold power in the system. It aims to transform the system so that those in power do not continue to obtain unfair benefits at the expense of others. The framework accounts for unjust historical oppression and current injustices in our system to provide equitable outcomes to all who access the system. In this vein, we can begin to address the flagrant disparities between communities that have always – and continue to – exist in healthcare today.[29] CONCLUSION As equality focuses on access, it currently fails to do justice. Instead of outcomes, it is time to focus on equity. A focus on equity rather than equality would better address and prevent the disparities seen in COVID-19. A distributive justice framework can gain traction in clinical decision-making guidelines and system-level reallocation of resources but will succeed only if the medical community engages in outreach, anti-racism measures, and listens to communities in need. There should be an emphasis on implementing a distributive justice framework that treats all patients equitably, accounts for historical harm, and focuses on transparency in allocation and public health decision-making. [1] APM Research Lab Staff. 2020. “The Color of Coronavirus: COVID-19 Deaths by Race and Ethnicity in the U.S.” APM Research Lab. https://www.apmresearchlab.org/covid/deaths-by-race. [2] Bharmal, N., K. P. Derose, M. Felician, and M. M. Weden. 2015. “Understanding the Upstream Social Determinants of Health.” California: RAND Corporation 1-18. https://www.rand.org/pubs/working_papers/WR1096.html. [3] Yancy, C. W. 2020. “COVID-19 and African Americans.” JAMA. 323 (19): 1891-2. https://doi.org/10.1001/jama.2020.6548; Centers for Disease Control and Prevention. 2020. “COVID-19 in Racial and Ethnic Health Disparities.” Centers for Disease Control and Prevention. https://www.cdc.gov/coronavirus/2019-ncov/community/health-equity/racial-ethnic-disparities/index.html. [4] Braveman, P., E. Arkin, T. Orleans, D. Proctor, and A. Plough. 2017. “What is Health Equity?” Robert Wood Johnson Foundation. https://www.rwjf.org/en/library/research/2017/05/what-is-health-equity-.html. [5] Bedinger, M. 2020 Apr 22. “After Uproar, Mass. Revises Guidelines on Who Gets an ICU Bed or Ventilator Amid COVID-19 Surge.” Wbur. https://www.wbur.org/commonhealth/2020/04/20/mass-guidelines-ventilator-covid-coronavirus; Wigglesworth, A. 2020 May 11. “Institutional Racism, Inequity Fuel High Minority Death Toll from Coronavirus, L.A. Officials Say.” Los Angeles Times. https://www.latimes.com/california/story/2020-05-11/institutional-racism-inequity-high-minority-death-toll-coronavirus. [6] Executive Office of Health and Human Services Department of Public Health. 2020 Oct 20. “Crises Standards of Care Planning and Guidance for the COVID-19 Pandemic.” Commonwealth of Massachusetts. https://www.mass.gov/doc/crisis-standards-of-care-planning-guidance-for-the-covid-19-pandemic. [7] Emanuel, E. J., G. Persad, R. Upshur, et al. 2020. “Fair Allocation of Scarce Medical Resources in the Time of Covid-19. New England Journal of Medicine 382: 2049-55. https://doi.org/10.1056/NEJMsb2005114. [8] Salway, S., G. Mir, D. Turner, G. T. Ellison, L. Carter, and K. Gerrish. 2016. “Obstacles to "Race Equality" in the English National Health Service: Insights from the Healthcare Commissioning Arena.” Social Science and Medicine 152: 102-110. https://doi.org/10.1016/j.socscimed.2016.01.031. [9] Rawls, J. A Theory of Justice (Revised Edition) (Cambridge, MA: Belknap Press of Harvard University Press, 1999). [10] Zack, N. Applicative Justice: A Pragmatic Empirical Approach to Racial Injustice (New York: The Rowman & Littlefield Publishing Group, 2016). [11] Charatz-Litt, C. 1992. “A Chronicle of Racism: The Effects of the White Medical Community on Black Health.” Journal of the National Medical Association 84 (8): 717-25. http://hdl.handle.net/10822/857182. [12] Washington, H. A. Medical Apartheid: The Dark History of Medical Experimentation on Black Americans from Colonial Times to the Present (New York: Doubleday, 2006). [13] d'Oliveira, A. F., S. G. Diniz, and L. B. Schraiber. 2002. “Violence Against Women in Health-care Institutions: An Emerging Problem.” Lancet. 359 (9318): 1681-5. https://doi.org/10.1016/S0140-6736(02)08592-6. [14] Hafeez, H., M. Zeshan, M. A. Tahir, N. Jahan, and S. Naveed. 2017. “Health Care Disparities Among Lesbian, Gay, Bisexual, and Transgender Youth: A Literature Review. Cureus 9 (4): e1184. https://doi.org/10.7759/cureus.1184; Drescher, J., A. Schwartz, F. Casoy, et al. 2016. “The Growing Regulation of Conversion Therapy.” Journal of Medical Regulation 102 (2): 7-12. https://doi.org/10.30770/2572-1852-102.2.7; Stroumsa, D. 2014. “The State of Transgender Health Care: Policy, Law, and Medical Frameworks.” American Journal of Public Health. 104 (3): e31-8. https://doi.org/10.2105/AJPH.2013.301789. [15] Stepanikova, I., and G. R. Oates. 2017. “Perceived Discrimination and Privilege in Health Care: The Role of Socioeconomic Status and Race.” American Journal of Preventative Medicine. 52 (1s1): S86-s94. https://doi.org/10.1016/j.amepre.2016.09.024; Swartz, K. “Health Care for the Poor: For Whom, What Care, and Whose Responsibility?” In Cancian, M., and S. Danziger (Eds.). Changing Poverty, Changing Policies (New York: Russell Sage Foundation Press, 2009), 69-74. [16] Meghani, S. H., E. Byun, and R. M. Gallagher. 2012. “Time to Take Stock: A Meta-analysis and Systematic Review of Analgesic Treatment Disparities for Pain in the United States.” Pain Medicine 13 (2): 150-74. https://doi.org/10.1111/j.1526-4637.2011.01310.x; Williams, D. R., and T. D. Rucker. 2000. “Understanding and Addressing Racial Disparities in Health Care.” Health Care Financing Review 21 (4): 75-90. https://scholar.harvard.edu/davidrwilliams/dwilliam/publications/understanding-and-addressing-racial-disparities-health. [17] Hoffman, K. M., S. Trawalter, J. R. Axt, and M. N. Oliver. 2016. “Racial Bias in Pain assessment and treatment recommendations, and false beliefs about biological Differences Between Blacks and Whites.” PNAS 113 (16): 4296-4301. https://doi.org/10.1073/pnas.1516047113. [18] Pacheco, C. M., S. M. Daley, T. Brown, M. Filipp, K. A. Greiner, and C. M. Daley. 2013. “Moving Forward: Breaking the Cycle of Mistrust Between American Indians and Researchers.” American Journal of Public Health. 103 (12): 2152-9. https://doi.org/10.2105/AJPH.2013.301480. [19] Velasco-Mondragon, E., A. Jimenez, A. G. Palladino-Davis, D. Davis, and J. A. Escamilla-Cejudo. 2016. “Hispanic Health in the USA: A Scoping Review of the Literature.” Public Health Reviews 37:31. https://doi.org/10.1186/s40985-016-0043-2. [20] Cameron, K. A., J. Song, L. M. Manheim, and D. D. Dunlop. 2010. “Gender Disparities in Health and Healthcare Use Among Older Adults.” Journal of Women’s Health (Larchmt) 19 (9): 1643-50. https://doi.org/10.1089/jwh.2009.1701. [21] Bierman, A. S. 2007. “Sex Matters: Gender Disparities in Quality and Outcomes of Care. Canadian Medical Association Journal 177 (12): 1520-1. https://doi.org/10.1503/cmaj.071541; Fowler, R. A., S. Sabur, P. Li, et al. 2007. “Sex-and Age-based Differences in the Delivery and Outcomes of Critical Care. Canadian Medical Association Journal 177 (12): 1513-9. https://doi.org/10.1503/cmaj.071112. [22] McLaughlin, D. K., and C. S. Stokes. 2002. “Income Inequality and Mortality in US Counties: Does Minority Racial Concentration Matter?” American Journal of Public Health 92 (1): 99-104. https://doi.org/.10.2105/ajph.92.1.99; Shea, S., J. Lima, A. Diez-Roux, N. W. Jorgensen, and R. L. McClelland. 2016. “Socioeconomic Status and Poor Health Outcome at 10 years of Follow-up in the Multi-ethnic Study of Atherosclerosis.” PLoS One 11 (11): e0165651. https://doi.org/10.1371/journal.pone.0165651. [23] Han, X., K. T. Call, J. K. Pintor, G. Alarcon-Espinoza, and A. B. Simon. 2015. “Reports of Insurance-based Discrimination in Health care and its Association with Access to Care.” American Journal of Public Health 105 Suppl 3 (Suppl 3): S517-25. https://doi.org/10.2105/AJPH.2015.302668. [24] Aldridge, R. W., D. Menezes, D. Lewer, et al. 2019. “Causes of Death Among Homeless People: A Population-based Cross-sectional Study of Linked Hospitalization and Mortality Data in England.” Wellcome Open Research 4:49. https://doi.org/10.12688/wellcomeopenres.15151.1. [25] Richardson, E. T., M. M. Malik, W. A. Darity Jr., et al. 2021. “Reparations for Black American Descendants of Persons Enslaved in the U.S. and their Potential Impact on SARS-CoV-2 Transmission.” Social Science and Medicine 276: 113741. https://doi.org/10.1016/j.socscimed.2021.113741. [26] Wispelwey, B., and M. Morse. 2021. “An Antiracist Agenda for Medicine.” Boston Review. http://bostonreview.net/science-nature-race/bram-wispelwey-michelle-morse-antiracist-agenda-medicine. [27] Johnson, S. F., A. Ojo, and H. J. Warraich. 2021. “Academic Health Centers’ Antiracism Strategies Must Extend to their Business Practices.” Annals of Internal Medicine 174 (2): 254-5. https://doi.org/10.7326/M20-6203; Golub, M., N. Calman, C. Ruddock, et al. 2011. “A Community Mobilizes to End Medical Apartheid.” Progress in Community Health Partnerships: Research, Education, and Action 5 (3): 317-25. https://doi.org/10.1353/cpr.2011.0041. [28] New York State Bar Association. 2020. “New York State Bar Association House of Delegates: Revised COVID-19 Resolutions.” https://nysba.org/app/uploads/2020/10/Final-Health-Law-Section-COVID-19-Resolutions_10-8-20-1-1.pdf. [29] Egede, L. E. 2006. “Race, Ethnicity, Culture, and Disparities in Health Care.” Journal of General Internal Medicine 21 (6): 667-669. https://doi.org/10.1111%2Fj.1525-1497.2006.0512.x
APA, Harvard, Vancouver, ISO, and other styles
34

Rathke, Caelan. "The Women Who Don’t Get Counted." Voices in Bioethics 7 (September 27, 2021). http://dx.doi.org/10.52214/vib.v7i.8717.

Full text
Abstract:
Photo by Hédi Benyounes on Unsplash ABSTRACT The current incarceration facilities for the growing number of women are depriving expecting mothers of adequate care crucial for the child’s mental and physical development. Programs need to be established to counteract this. INTRODUCTION Currently, Diana Sanchez was eight months pregnant when she was arrested for identity theft and put in a prison cell in Denver. At five a.m., two weeks after being incarcerated, she announced to a deputy outside her cell that she was going into labor. Footage from a camera in her cell shows her pacing anxiously or writhing in her bed for the five hours preceding the arrival of her son. She banged on the door and begged for help. All she received was an absorbent pad. She gave birth alone in her prison cell on July 31, 2015, around 10:45 am. At 11:00 am, a prison nurse walked in to cut the umbilical cord and take Sanchez’s newborn baby without offering postnatal care. Sanchez was later sent to a hospital, and her baby was separated from her until she was put on probation. In 2018, on behalf of her three-year-old son, Sanchez sued Denver Health and Denver Sheriff Department and won a $480,000 settlement.[1] Though many more men are incarcerated than women, the rate of growth of female incarceration has exceeded that of male incarceration for decades. One study estimated that 231,000 women are currently incarcerated in the US,[2] 80 percent of whom are mothers, and 150,000 pregnant.[3] Another recent study of 1,396 incarcerated pregnant women found that 92 percent had live births, 6.5 percent had stillbirths or miscarriages, and 4 percent terminated the pregnancy. The authors found that there is no system of reporting pregnancy outcomes in US prisons. There is a noteworthy ethical lapse in mental, emotional, and medical care that threatens the well-being of pregnant women in prison. According to Carolyn Sufrin, “Pregnant incarcerated people are one of the most marginalized and forgotten groups in our country… and women who don't get counted don't count.” [4] Poor documentation, visibility, and transparency contribute to the systemic abuse of incarcerated women. Studies document women giving birth alone in cells and shackles in solitary confinement. Their complaints regarding contractions, bleeding, and other pains of labor are often ignored.[5] l. Prenatal Care in American Prisons Diana Sanchez was not offered any prenatal care after she was incarcerated. And neither she nor her son received appropriate postnatal care.[6] Sanchez was on medication for opioid withdrawal while pregnant, which could have been detrimental to her baby’s health.[7] There is an unacceptable absence of pre- and postnatal care in most US prisons. A lack of regulation makes the availability of perinatal care unpredictable and unreliable. Several studies confirmed that there is not a standard for prenatal care for women incarcerated during pregnancy. [8] Knowledge of the appropriate mental and physical care pregnant women require, addiction support, and support for maternal-infant bonding all exists outside the prison system and ought to be used as a benchmark. At the very least, pregnant women, birthing women, and new mothers should not be placed in solitary confinement or shackled.[9] In the prenatal arena, depriving an individual of adequate healthcare is not appropriate and could be cruel and unusual. Only 18 percent of funding in prisons goes to health care for the prisoners. That is roughly $5.7 thousand per prisoner, according to an NIH study done in 2015.[10] There should be an adequate amount of funding for the health needs of incarcerated pregnant women. By depriving pregnant women of healthcare, the prisons are depriving the fetus of adequate care. ll. Respect for Autonomy During Incarceration Women maintain healthcare autonomy even when incarcerated. The purpose of a prison sentence is retribution for crimes and rehabilitation to prevent reoffending.[11] The separation of a mother and newborn causes significant developmental and psychological harm to the child and the parent. Parent-child separation does not serve the purpose of retribution or rehabilitation and is authorized only due to prisons’ limited space and resources that make it difficult to accommodate children, as well as a state interest in children’s best interests or the custody rights of the other parent. When it is possible to keep a family together, prisons should make every effort to do so for the health of the mother-child relationship. Incarcerated people may become a burden to family or society due to prison medical neglect. For example, diabetes and hypertension, which can occur during pregnancy, can worsen without treatment. The inability to access the care they would otherwise want and need endangers women and poses a burden to the healthcare system after incarceration, Depersonalizing individuals convicted of crimes must be placed in the context of historical eugenics practices. State-sanctioned sterilization and efforts to prevent women from reproducing were widespread during the early 20th century.[12] Cases of coerced and nonconsensual sterilization of incarcerated women and men evidence the history of eugenics.[13]Abortions are offered to some incarcerated women.[14] However, many incarcerated women are denied the right to see healthcare providers to thoroughly discuss abortion or other options.[15] Although the abortions are consensual, the quality of consent is questionable. lll. Prison Nursery Programs, “I need something to live for…” Indiana Women’s Prison (IWP), a max security female prison, has a program called Wee Ones that enables women convicted of nonviolent crimes to spend 30 months bonding with their newborn child. It is one of eight programs in the country that allows pregnant mothers to spend the last few months of their sentence with their children. It is a voluntary program that allows pregnant offenders a private room in a housing unit. It offers parent education, resources that are accessible after release, and career education. The program application process and the rules to which women must adhere to remain in the program are stringent. The programs generally have a zero-tolerance policy. Even simply sleeping in the same bed as the child or arguing with other mothers can result in termination from the program. Kara, a pregnant woman incarcerated for drug possession, had a history of abuse in her family and tended to act out in anger against her peers in the program. She was learning how to have healthy reactions to anger when handling her child, but her temper ultimately led to her removal from the program. Her son was placed in foster care, and Kara returned to the regular cells. In an interview before her transfer, she told the camera that Charlie gave her a purpose. With tears in her eyes, she said, “Charlie was my way of life here [...] I need something to live for [,] and I screwed up.”[16] Pregnancy in prison can be a way to improve quality of life for some women. Studies demonstrate that nursery programs improve mental health of the incarcerated women.[17] The secure attachment of the infant to its primary caregiver promotes healthy development in the child and a bonded relationship with the mother.[18] The close bond between mother and child in prisons has been shown to decrease recidivism and to reduce the burden on the foster care system.[19] Women who do not qualify for these programs, or are incarcerated in prisons without them, are separated from their newborn babies and their other children. The disconnect can lead to the child rejecting the incarcerated mother once she is released.[20] Programs like Wee Ones honor women’s autonomy while they are incarcerated. During interviews, the women expressed that although raising a child in that environment is difficult, it was better than not being with their children. While rocking a baby in her lap, one inmate expressed her frustrations with Wee Ones but then paused to express gratitude and said, “After all, it’s prison. And prison ain’t supposed to be nice.”[21] The ethical issue of autonomy reflects a more difficult dilemma in the prison landscape. lV. Counter Arguments: Do the Nursery Programs Work for the Children and the Women Typically, newborns are taken from their incarcerated mothers within two to three days of birth and sent to live with a relative or placed in foster care. Many women are never reunited with their babies. There is much debate over whether the programs are beneficial to the children. One ethical issue is whether children, as innocents, are being punished either by being in the prison system or by being separated from their mothers. Skeptics, like James Dwyer, have argued against keeping innocent babies in the custody of incarcerated mothers asserting that there is little evidence demonstrating that the programs rehabilitate the women.[22] Dwyer commented on the “reckless” hopefulness the programs provide: "It might, in fact, be the babies distract them from rehabilitation they should be doing instead. […] They're so focused on childcare and have this euphoria — they think they'll be just fine when they get out of prison and they're not. We just don't know."[23] One study showed that 58 percent of incarcerated women are arrested again after release, 38 percent are reconvicted, and 30 percent return to prison within three years.[24] Dwyer uses this data to argue that the programs are not worthwhile. However, the data is not limited to the special population that had the prison nursery experience. The data applies to all incarcerated women limiting its applicability. More importantly, there is compelling evidence to support prison nursery programs.[25] The programs do decrease recidivism[26] and prison misconduct,[27] and they allow women to create stronger bonds with their children.[28] Bev Little argues that allowing mothers to bond with their babies only delays the inevitable separation and will cause trauma and have other ill effects on the baby. [29] But others feel that stronger maternal-fetal attachment is best for both parties. There is evidence that the bond, once formed, is long-lasting. Later in life, there is less drug addiction among children who stayed in the nursery rather than being separated from their mothers.[30] Another counterargument is that the policies in prison nurseries are not as useful for motherhood outside of the facility; thus, an issue with recidivism occurs because the women are less prepared for motherhood upon release from prison. Prison nursery programs establish methods and procedures for successful motherhood that are unique to operation within correctional environments. Yet, fortunately, parenting classes offered by prisons and jails emphasize sacrifice, self-restraint, and dedicated attention to the baby. These classes aptly apply to motherhood outside of prison.[31] One incarcerated mother experiencing addiction, Kima, was described as ambivalent toward her pregnancy. “It’s something about knowing but not knowing that makes me not accountable or makes me think I’m not accountable,” Kima shared.[32] After the nurse confirmed her pregnancy, she acknowledged fear and knew she would be held accountable to the baby. The occurrence of pregnancy ambivalence is common.[33] A study of a population of prisoners from Rhode Island found that 41 percent of the women expressed ambivalent attitudes about pregnancy. 70 of the women from a population in San Francisco expressed ambivalent or negative attitudes towards pregnancy.[34] But the ambivalence of some women toward pregnancy is not a reason to prevent women who feel differently from reaping the full benefits of programs that support them during pregnancy. Another counterargument is that prison is becoming a comfort that women might seek if they are homeless or housing insecure. For example, Evelyn was released from a San Francisco jail after being arrested for using cocaine. She was 26 weeks pregnant and had a four-year-old son in the custody of her aunt. Following her release, she was homeless and using drugs in the streets. She felt that her only hope of keeping her baby safe was to go back to jail. Like Kima, she had been in and out of jail from a young age. She grew accustomed to and dependent on the care provided there. While incarceration can provide a home and a nursery, there is no ethical reason to argue for making prison less comfortable by separating babies and children from incarcerated women. Instead, these facts suggest we are not doing enough for women outside prisons either. CONCLUSION Many experts stress the dearth of research and information on these women and their babies. There is no empirical data to show how big the problem is, but there is evidence that programs providing nursery care for the children of incarcerated women have many benefits. Because the research is not largescale enough, many pregnant women in the prison system are ignored. Many women give birth in unacceptable conditions, and their children are taken from them the moment the umbilical cord is cut. While the US incarcerates too many women, a movement to expand prison nurseries could help new mothers bond with their children. Strong educational programs could aid in lowering the rates of recidivism by providing therapeutic resources for mothers.[35] There is a growing problem of mass incarceration in the US as many women are placed in correctional facilities. Most of these women are convicted of possession or use of illegal substances.[36] Many women come from disadvantaged backgrounds, poverty, and have experienced addiction. Depriving an expectant mother of adequate care is cruel and irresponsible both to the mother and her innocent child. The criminal justice system is harming children both mentally and physically. Reform of the system is needed to provide the basic care those children need. Programs like IWP’s Wee Ones are necessary for physical, psychological, and social development. A program that offers a place for mothers to raise their babies in the community of other mothers would incentivize and facilitate healthy parental habits. Further programs for mothers who are released from prison would give them valuable resources to keep them from returning and encourage healthy relationships between the mother and the baby. - [1] Li, D. K. Video allegedly shows woman giving birth in Denver jail cell alone, with no assistance. Denver: NBC News, 2019. [2] Kajstura, Aleks. “Women's Mass Incarceration: The Whole Pie 2019.” Prison Policy Initiative, 29 Oct. 2019, https://www.prisonpolicy.org/reports/pie2019women.html. (“Including those in prisons, jails, and other correctional facilities.”) [3] Swavola, E, K Riley and R Subramanian. "Overlooked: Women and Jails in an Era of Reform." Vera Institute of Justice August 2016. [4] Sufrin, C. Pregnant Behind Bars: What We Do and Don't Know About Pregnancy and Incarceration Allison Chang. 21 March 2019. Transcript. [5] Sufrin, C., 2019. (Suffrin expressed that she had seen such practices firsthand working as an OB/GYN for incarcerated women.) [6] Padilla, M. “Woman Gave Birth in Denver Jail Cell Alone, Lawsuit Says,” New York Times, Sep. 1, 2019. [7] Li, D. “Video allegedly shows woman giving birth in Denver jail cell alone, with no assistance,” NBC U.S. News, Apr. 29. 2019. [8] Knittel, A. and C. Sufrin. "Maternal Health Equity and Justice for Pregnant Women Who Experience Incarceration." JAMA Network Open 3.8 (2020). A study in Ontario, Canada, coincided with a study done in Australia. [9] Sufrin, C., et al. "Pregnancy Outcomes in US Prisons, 2016–2017." p. 803-804. [10] Sridhar, S., R. Cornish and S. Fazel. "The Costs of Healthcare in Prison and Custody: Systematic Review of Current Estimates and Proposed Guidelines for Future Reporting." Frontiers in Psychiatry 9.716 (2018). [11] Kifer, M., Hemmens, C., Stohr, M. K. “The Goals of Corrections: Perspectives from the Line” Criminal Justice Review. 1 May 2003 [12] Perry, D. M. "Our Long, Troubling History of Sterilizing the Incarcerated." The Marshall Project: Sterilization of Women in Prison 26 July 2017. [13] Rachel Roth & Sara L. Ainsworth, If They Hand You a Paper, You Sign It: A Call to End the Sterilization of Women in Prison, 26 Hastings WOMEN's L.J. 7 (2015); See Skinner v. Oklahoma ex rel. Williamson, 316 U.S. 535 (1942) (procreation considered a fundamental right; fact pattern of male sterilization in prison based on type of crime.) [14] Sufrin, C., M. D. Creinin, J. C. Chang. “Incarcerated Women and Abortion Provision: A Survey of Correctional Health Providers.” Perspectives on Sexual and Reproductive Health. p. 6-11. 23 March 2009. [15] Kasdan, D. “Abortion Access for Incarcerated Women: Are Correctional Health Practices in Conflict with Constitutional Standards?” Guttmacher Institute. 26 March 2009. [16] Born Behind Bars. Season 1, Episode 5, “They Can Take Your Baby Away,” produced by Luke Ellis, Francis Gasparini, & Jen Wise, aired on 15 Nov. 2017 A&E Networks [17] Bick, J., & Dozier, M. (2008). Helping Foster Parents Change: The Role of Parental State of Mind. In H. Steele & M. Steele (Eds.), Clinical applications of the Adult Attachment Interview (pp. 452–470). New York: Guilford Press. [18]Sroufe, L. A., B. Egeland, E. A. Carlson, W. A. Collins. (2005). The Development of the Person: The Minnesota Study of Risk and Adaptation from Birth to Adulthood. New York: Guilford Press. [19] Goshin, L. S., & Byrne, M. W. “Converging Streams of Opportunity for Prison Nursery Programs in the United States.” Journal of Offender Rehabilitation. 15 Apr 2009. [20] Babies Behind Bars. Dirs. W. Serrill and S. O'Brien. 2015. Another IWP pregnant woman is Taylor. At the time of the show, she was pregnant and expecting twins. In interviews throughout the episode, she expressed how her pregnancies in prison had put her in a better mood and felt beneficial to her. She had tried to sign up for the nursery program for her previous pregnancy, but her sentence was too long to get it. Her child was sent to live with a caregiver, and when Taylor was on probation, Taylor’s daughter didn’t want to be around Taylor. Taylor was so distraught that she messed up and went back, this time, pregnant with twins. After she was reincarcerated, she was able to be accepted into Wee Ones. She expressed to the camera man that the program might help her feel more like a mother so that when she gets out, she will have someone to care for. Taylor, Kara, and many other women depend on their children or their pregnancy for a purpose while behind bars. They relied on their babies to be a boon for them. [21] Babies Behind Bars. Dirs. W. Serrill and S. O'Brien. 2015. [22] Corley, C. "Programs Help Incarcerated Moms Bond with Their Babies in Prison." Criminal Justice Collaborative (2018). [23] Corley, C. "Programs Help Incarcerated Moms Bond with Their Babies in Prison." Criminal Justice Collaborative (2018). [24] Owen, B. & Crow, J. “Recidivism among Female Prisoners: Secondary Analysis of the 1994 BJS Recidivism Data Set” Department of Criminology California State University (2006) p. 28 [25] Prison Nursery Programs: Literature Review and Fact Sheet for CT. Diamond Research Consulting, 2012, www.cga.ct.gov/2013/JUDdata/tmy/2013HB-06642-R000401-Sarah Diamond - Director, Diamond Research Consulting-TMY.PDF. [26] New York Department of Correction Services (NYDOCS). (1993). Profile of Participants: The Bedford and Taconic Nursery Program in 1992. Albany, NY. Department of Correction Services.Rowland, M., & Watts, A. (2007). Washington State’s effort to the generational impact on crime. Corrections Today. Retrieved September 12, 2007, from http://www. aca.org/publications/pdf/Rowland_Watts_Aug07.pdf. [27] Carlson, J. R. (2001). Prison nursery 2000: A five-year review of the prison nursery at the Nebraska Correctional Center for Women. Journal of Offender Rehabilitation, 33, 75–97. [28] Carlson, J.R. [29] Little, B. "What Happens When a Woman Gives Birth Behind Bars?" A+E Networks, 29 October 2019. <https://www.aetv.com/real-crime/what-happens-when-a-woman-gives-birth-in-jail-or-prison>. [30] Margolies, J. K., & Kraft-Stolar, T. When “Free” Means Losing Your Mother: The Collision of Child Welfare and the Incarceration of Women in New York State 1, 9 (Correctional Association of N.Y. Women in Prison Project 2006) [31] Sufrin, C. Jailcare: Finding the Safety Net for Women Behind Bars. Berkeley: University of California Press, 2017. [32] Sufrin, C. Jailcare: p. 155. [33] Peart, M. S. & Knittel, A. K. “Contraception need and available services among incarcerated women in the United States: a systematic review.” Contraception and Reproductive Medicine. 17 March 2020 [34] LaRochelle, F., C. Castro, J. Goldenson, J. P. Tulsky, D.L. Cohan, P. D. Blumenthal, et al. “Contraceptive use and barriers to access among newly arrested women.” J Correct Health Care. (2012) p. 111–119. [35] Goshin, L., & Byrne, M. (2009). “Converging streams of opportunity for prison nursery programs in the United States.” Journal of Offender Rehabilitation. 2009. p.271–295. [36] Elizabeth Swavola, Kristine Riley, Ram Subramanian. Overlooked: Women and Jails in an Era of Reform. New York: Vera Institute of Justice, 2016.
APA, Harvard, Vancouver, ISO, and other styles
35

Howley, Kevin. "Always Famous." M/C Journal 7, no. 5 (November 1, 2004). http://dx.doi.org/10.5204/mcj.2452.

Full text
Abstract:
Introduction A snapshot, not unlike countless photographs likely to be found in any number of family albums, shows two figures sitting on a park bench: an elderly and amiable looking man grins beneath the rim of a golf cap; a young boy of twelve smiles wide for the camera — a rather banal scene, captured on film. And yet, this seemingly innocent and unexceptional photograph was the site of a remarkable and wide ranging discourse — encompassing American conservatism, celebrity politics, and the end of the Cold War — as the image circulated around the globe during the weeklong state funeral of Ronald Wilson Reagan, 40th president of the United States. Taken in 1997 by the young boy’s grandfather, Ukrainian immigrant Yakov Ravin, during a chance encounter with the former president, the snapshot is believed to be the last public photograph of Ronald Reagan. Published on the occasion of the president’s death, the photograph made “instant celebrities” of the boy, now a twenty-year-old college student, Rostik Denenburg and his grand dad. Throughout the week of Reagan’s funeral, the two joined a chorus of dignitaries, politicians, pundits, and “ordinary” Americans praising Ronald Reagan: “The Great Communicator,” the man who defeated Communism, the popular president who restored America’s confidence, strength, and prosperity. Yes, it was mourning in America again. And the whole world was watching. Not since Princess Diana’s sudden (and unexpected) death, have we witnessed an electronic hagiography of such global proportions. Unlike Diana’s funeral, however, Reagan’s farewell played out in distinctly partisan terms. As James Ridgeway (2004) noted, the Reagan state funeral was “not only face-saving for the current administration, but also perhaps a mask for the American military debacle in Iraq. Not to mention a gesture of America’s might in the ‘war on terror.’” With non-stop media coverage, the weeklong ceremonies provided a sorely needed shot in the arm to the Bush re-election campaign. Still, whilst the funeral proceedings and the attendant media coverage were undeniably excessive in their deification of the former president, the historical white wash was not nearly so vulgar as the antiseptic send off Richard Nixon received back in 1994. That is to say, the piety of the Nixon funeral was at once startling and galling to many who reviled the man (Lapham). By contrast, given Ronald Reagan’s disarming public persona, his uniquely cordial relationship with the national press corps, and most notably, his handler’s mastery of media management techniques, the Reagan idolatry was neither surprising nor unexpected. In this brief essay, I want to consider Reagan’s funeral, and his legacy, in relation to what cultural critics, referring to the production of celebrity, have described as “fame games” (Turner, Bonner & Marshall). Specifically, I draw on the concept of “flashpoints” — moments of media excess surrounding a particular personage — in consideration of the Reagan funeral. Throughout, I demonstrate how Reagan’s death and the attendant media coverage epitomize this distinctive feature of contemporary culture. Furthermore, I observe Reagan’s innovative approaches to electoral politics in the age of television. Here, I suggest that Reagan’s appropriation of the strategies and techniques associated with advertising, marketing and public relations were decisive, not merely in terms of his electoral success, but also in securing his lasting fame. I conclude with some thoughts on the implications of Reagan’s legacy on historical memory, contemporary politics, and what neoconservatives, the heirs of the Reagan Revolution, gleefully describe as the New American Century. The Magic Hour On the morning of 12 June 2004, the last day of the state funeral, world leaders eulogized Reagan, the statesmen, at the National Cathedral in Washington, D.C. Among the A-List political stars invited to speak were Margaret Thatcher, former president George H. W. Bush and, to borrow Arundhati Roi’s useful phrase, “Bush the Lesser.” Reagan’s one-time Cold War adversary, Mikhail Gorbachev, as well as former Democratic presidents, Jimmy Carter and Bill Clinton were also on hand, but did not have speaking parts. Former Reagan administration officials, Supreme Court justices, and congressional representatives from both sides of the aisle rounded out a guest list that read like a who’s who of the American political class. All told, Reagan’s weeklong sendoff was a state funeral at its most elaborate. It had it all—the flag draped coffin, the grieving widow, the riderless horse, and the procession of mourners winding their way through the Rotunda of the US Capitol. In this last regard, Reagan joined an elite group of seven presidents, including four who died by assassination — Abraham Lincoln, James Garfield, William McKinley and John F. Kennedy — to be honored by having his remains lie in state in the Rotunda. But just as the deceased president was product of the studio system, so too, the script for the Gipper’s swan song come straight out of Hollywood. Later that day, the Reagan entourage made one last transcontinental flight back to the presidential library in Simi Valley, California for a private funeral service at sunset. In Hollywood parlance, the “magic hour” refers to the quality of light at dusk. It is an ideal, but ephemeral time favored by cinematographers, when the sunlight takes on a golden glow lending grandeur, nostalgia, and oftentimes, a sense of closure to a scene. This was Ronald Reagan’s final moment in the sun: a fitting end for an actor of the silver screen, as well as for the president who mastered televisual politics. In a culture so thoroughly saturated with the image, even the death of a minor celebrity is an occasion to replay film clips, interviews, paparazzi photos and the like. Moreover, these “flashpoints” grow in intensity and frequency as promotional culture, technological innovation, and the proliferation of new media outlets shape contemporary media culture. They are both cause and consequence of these moments of media excess. And, as Turner, Bonner and Marshall observe, “That is their point. It is their disproportionate nature that makes them so important: the scale of their visibility, their overwhelmingly excessive demonstration of the power of the relationship between mass-mediated celebrities and the consumers of popular culture” (3-4). B-Movie actor, corporate spokesman, state governor and, finally, US president, Ronald Reagan left an extraordinary photographic record. Small wonder, then, that Reagan’s death was a “flashpoint” of the highest order: an orgy of images, a media spectacle waiting to happen. After all, Reagan appeared in over 50 films during his career in Hollywood. Publicity stills and clips from Reagan’s film career, including Knute Rockne, All American, the biopic that earned Reagan his nickname “the Gipper”, King’s Row, and Bedtime for Bonzo provided a surreal, yet welcome respite from television’s obsessive (some might say morbidly so) live coverage of Reagan’s remains making their way across country. Likewise, archival footage of Reagan’s political career — most notably, images of the 1981 assassination attempt; his quip “not to make age an issue” during the 1984 presidential debate; and his 1987 speech at the Brandenburg Gate demanding that Soviet President Gorbachev, “tear down this wall” — provided the raw materials for press coverage that thoroughly dominated the global mediascape. None of which is to suggest, however, that the sheer volume of Reagan’s photographic record is sufficient to account for the endless replay and reinterpretation of Reagan’s life story. If we are to fully comprehend Reagan’s fame, we must acknowledge his seminal engagement with promotional culture, “a professional articulation between the news and entertainment media and the sources of publicity and promotion” (Turner, Bonner & Marshall 5) in advancing an extraordinary political career. Hitting His Mark In a televised address supporting Barry Goldwater’s nomination for the presidency delivered at the 1964 Republican Convention, Ronald Reagan firmly established his conservative credentials and, in so doing, launched one of the most remarkable and influential careers in American politics. Political scientist Gerard J. De Groot makes a compelling case that the strategy Reagan and his handlers developed in the 1966 California gubernatorial campaign would eventually win him the presidency. The centerpiece of this strategy was to depict the former actor as a political outsider. Crafting a persona he described as “citizen politician,” Reagan’s great appeal and enormous success lie in his uncanny ability to project an image founded on traditional American values of hard work, common sense and self-determination. Over the course of his political career, Reagan’s studied optimism and “no-nonsense” approach to public policy would resonate with an electorate weary of career politicians. Charming, persuasive, and seemingly “authentic,” Reagan ran gubernatorial and subsequent presidential campaigns that were distinctive in that they employed sophisticated public relations and marketing techniques heretofore unknown in the realm of electoral politics. The 1966 Reagan gubernatorial campaign took the then unprecedented step of employing an advertising firm, Los Angeles-based Spencer-Roberts, in shaping the candidate’s image. Leveraging their candidate’s ease before the camera, the Reagan team crafted a campaign founded upon a sophisticated grasp of the television industry, TV news routines, and the medium’s growing importance to electoral politics. For instance, in the days before the 1966 Republican primary, the Reagan team produced a five-minute film using images culled from his campaign appearances. Unlike his opponent, whose television spots were long-winded, amateurish and poorly scheduled pieces that interrupted popular programs, like Johnny Carson’s Tonight Show, Reagan’s short film aired in the early evening, between program segments (De Groot). Thus, while his opponent’s television spot alienated viewers, the Reagan team demonstrated a formidable appreciation not only for televisual style, but also, crucially, a sophisticated understanding of the nuances of television scheduling, audience preferences and viewing habits. Over the course of his political career, Reagan refined his media driven, media directed campaign strategy. An analysis of his 1980 presidential campaign reveals three dimensions of Reagan’s increasingly sophisticated media management strategy (Covington et al.). First, the Reagan campaign carefully controlled their candidate’s accessibility to the press. Reagan’s penchant for potentially damaging off-the-cuff remarks and factual errors led his advisors to limit journalists’ interactions with the candidate. Second, the character of Reagan’s public appearances, including photo opportunities and especially press conferences, grew more formal. Reagan’s interactions with the press corps were highly structured affairs designed to control which reporters were permitted to ask questions and to help the candidate anticipate questions and prepare responses in advance. Finally, the Reagan campaign sought to keep the candidate “on message.” That is to say, press releases, photo opportunities and campaign appearances focused on a single, consistent message. This approach, known as the Issue of the Day (IOD) media management strategy proved indispensable to advancing the administration’s goals and achieving its objectives. Not only was the IOD strategy remarkably effective in influencing press coverage of the Reagan White House, this coverage promoted an overwhelmingly positive image of the president. As the weeklong funeral amply demonstrated, Reagan was, and remains, one of the most popular presidents in modern American history. Reagan’s popular (and populist) appeal is instructive inasmuch as it illuminates the crucial distinction between “celebrity and its premodern antecedent, fame” observed by historian Charles L. Ponce de Leone (13). Whereas fame was traditionally bestowed upon those whose heroism and extraordinary achievements distinguished them from common people, celebrity is a defining feature of modernity, inasmuch as celebrity is “a direct outgrowth of developments that most of us regard as progressive: the spread of the market economy and the rise of democratic, individualistic values” (Ponce de Leone 14). On one hand, then, Reagan’s celebrity reflects his individualism, his resolute faith in the primacy of the market, and his defense of “traditional” (i.e. democratic) American values. On the other hand, by emphasizing his heroic, almost supernatural achievements, most notably his vanquishing of the “Evil Empire,” the Reagan mythology serves to lift him “far above the common rung of humanity” raising him to “the realm of the divine” (Ponce de Leone 14). Indeed, prior to his death, the Reagan faithful successfully lobbied Congress to create secular shrines to the standard bearer of American conservatism. For instance, in 1998, President Clinton signed a bill that officially rechristened one of the US capitol’s airports to Ronald Reagan Washington National Airport. More recently, conservatives working under the aegis of the Ronald Reagan Legacy Project have called for the creation of even more visible totems to the Reagan Revolution, including replacing Franklin D. Roosevelt’s profile on the dime with Reagan’s image and, more dramatically, inscribing Reagan in stone, alongside Washington, Jefferson, Lincoln and Teddy Roosevelt at Mount Rushmore (Gordon). Therefore, Reagan’s enduring fame rests not only on the considerable symbolic capital associated with his visual record, but also, increasingly, upon material manifestations of American political culture. The High Stakes of Media Politics What are we to make of Reagan’s fame and its implications for America? To begin with, we must acknowledge Reagan’s enduring influence on modern electoral politics. Clearly, Reagan’s “citizen politician” was a media construct — the masterful orchestration of ideological content across the institutional structures of news, public relations and marketing. While some may suggest that Reagan’s success was an anomaly, a historical aberration, a host of politicians, and not a few celebrities — Bill Clinton, George W. Bush, and Arnold Schwarzenegger among them — emulate Reagan’s style and employ the media management strategies he pioneered. Furthermore, we need to recognize that the Reagan mythology that is so thoroughly bound up in his approach to media/politics does more to obscure, rather than illuminate the historical record. For instance, in her (video taped) remarks at the funeral service, Margaret Thatcher made the extraordinary claim — a central tenet of the Reagan Revolution — that Ronnie won the cold war “without firing a shot.” Such claims went unchallenged, at least in the establishment press, despite Reagan’s well-documented penchant for waging costly and protracted proxy wars in Afghanistan, Africa, and Central America. Similarly, the Reagan hagiography failed to acknowledge the decisive role Gorbachev and his policies of “reform” and “openness” — Perestroika and Glasnost — played in the ending of the Cold War. Indeed, Reagan’s media managed populism flies in the face of what radical historian Howard Zinn might describe as a “people’s history” of the 1980s. That is to say, a broad cross-section of America — labor, racial and ethnic minorities, environmentalists and anti-nuclear activists among them — rallied in vehement opposition to Reagan’s foreign and domestic policies. And yet, throughout the weeklong funeral, the divisiveness of the Reagan era went largely unnoted. In the Reagan mythology, then, popular demonstrations against an unprecedented military build up, the administration’s failure to acknowledge, let alone intervene in the AIDS epidemic, and the growing disparity between rich and poor that marked his tenure in office were, to borrow a phrase, relegated to the dustbin of history. In light of the upcoming US presidential election, we ought to weigh how Reagan’s celebrity squares with the historical record; and, equally important, how his legacy both shapes and reflects the realities we confront today. Whether we consider economic and tax policy, social services, electoral politics, international relations or the domestic culture wars, Reagan’s policies and practices continue to determine the state of the union and inform the content and character of American political discourse. Increasingly, American electoral politics turns on the pithy soundbite, the carefully orchestrated pseudo-event, and a campaign team’s unwavering ability to stay on message. Nowhere is this more evident than in Ronald Reagan’s unmistakable influence upon the current (and illegitimate) occupant of the White House. References Covington, Cary R., Kroeger, K., Richardson, G., and J. David Woodward. “Shaping a Candidate’s Image in the Press: Ronald Reagan and the 1980 Presidential Election.” Political Research Quarterly 46.4 (1993): 783-98. De Groot, Gerard J. “‘A Goddamed Electable Person’: The 1966 California Gubernatorial Campaign of Ronald Reagan.” History 82.267 (1997): 429-48. Gordon, Colin. “Replace FDR on the Dime with Reagan?” History News Network 15 December, 2003. http://hnn.us/articles/1853.html>. Lapham, Lewis H. “Morte de Nixon – Death of Richard Nixon – Editorial.” Harper’s Magazine (July 1994). http://www.harpers.org/MorteDeNixon.html>. Ponce de Leon, Charles L. Self-Exposure: Human-Interest Journalism and the Emergence of Celebrity in America, 1890-1940. Chapel Hill: U of North Carolina P, 2002. Ridgeway, James. “Bush Takes a Ride in Reagan’s Wake.” Village Voice (10 June 2004). http://www.villagevoice.com/issues/0423/mondo5.php>. Turner, Graeme, Frances Bonner, and P. David Marshall. Fame Games: The Production of Celebrity in Australia. Cambridge: Cambridge UP, 2000. Zinn, Howard. The Peoples’ History of the United States: 1492-Present. New York: Harper Perennial, 1995. Citation reference for this article MLA Style Howley, Kevin. "Always Famous: Or, The Electoral Half-Life of Ronald Reagan." M/C Journal 7.5 (2004). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0411/17-howley.php>. APA Style Howley, K. (Nov. 2004) "Always Famous: Or, The Electoral Half-Life of Ronald Reagan," M/C Journal, 7(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0411/17-howley.php>.
APA, Harvard, Vancouver, ISO, and other styles
36

Harley, Alexis. "Resurveying Eden." M/C Journal 8, no. 4 (August 1, 2005). http://dx.doi.org/10.5204/mcj.2382.

Full text
Abstract:
The Garden of Eden is the original surveillance state. God creates the heavens and the earth, turns on the lights, inspects everything that he has made and, behold, finds it very good. But then the creation attempts to acquire the surveillant properties of the creator. In Genesis 3, a serpent explains to Eve the virtues of forbidden fruit: “Ye shall not die: For God doth know that in the day ye eat thereof, then your eyes shall be opened, and ye shall be as gods, knowing good and evil” (Genesis 3: 4–5). Adam’s and Eve’s eyes are certainly opened (sufficiently so to necessitate figleaves), but in the next verse, God’s superior surveillance system has found them out. The power relationship Genesis illustrates has prompted many – the Romantics in their seditious appropriations of Paradise Lost, for instance – to question whether Eden is all that “good” after all. Why was God so concerned for Eve and Adam not to see? For that matter, why was he not there to intercept the serpent, but so promptly on the scene of humanity’s crime? Various answers (that God planned the Fall because it would enable him to demonstrate supreme love through Jesus, that Eve and Adam were wilfully wrong to grasp for equality with the Creator of the Universe, that God could not intervene in the temptation because it would compromise humanity’s free will) do not alter the flaw in God’s perfect garden state. Consciousness of this imperfection surfaces repeatedly in Western utopian narratives. The very existence of such narratives points to a humanist distrust in God as social engineer; the fact that these secular Edens are themselves often flawed suggests both a parody of the original Eden and an admission that humans are not up to the task of social engineering either. Thomas More’s Utopia and Ridley Scott’s Blade Runner – one the ostensible depiction of a new Eden, the other an outright dystopic inferno – address the association of Eden (or the Creator) with surveillance, and so undermine the ideality of the prelapsarian Garden. The archetypal power relationship, that of All-Seeing Creator with always-seen creation, is reconfigured sans God: in Utopia, with society itself performing the work of a transcendent surveillance system; in Blade Runner, with the multi-planetary Tyrell corporation doing so. In both cases, the Omnisurveillant is stripped of the mitigating quality of being God, and so exposed as oppressive, unjust, an affront to the idea of perfection. Like Eden, the eponymous island of Thomas More’s Utopia is a surveillance state. Glass, we read, “is there much used” (More 55). Surveillance is decentralised and patriarchal: wives are expected to confess to their husbands, children to their mothers (More 65). Each year, every thirty families select a “syphogrant”, whose “chief and almost … only office … is to see and take heed that no man sit idle, but that every one apply his own craft with earnest diligence” (More 57). In the mess halls, “The Syphogrant and his wife sit in the midst of the high table … because from thence all the whole company is in their sight” (More 66). Elders are ranged amongst the young men so that “the sage gravity and reverence of the elders should keep the youngsters from wanton licence of words and behaviour. Forasmuch as nothing can be so secretly spoken or done at the table, but either they that sit on the one side or on the other must needs perceive it” (More 66). Not only are the Utopians subject to social surveillance, but also to a conviction of its inescapability. Believing that the dead move among them, the Utopians feel that they are being watched (even when they are not) and thus regulate their own behaviour. In his preface to The Panopticon, Jeremy Bentham extols the virtues of his surveillance machine: “Morals reformed – health preserved – industry invigorated instruction diffused – public burthens lightened – Economy seated, as it were, upon a rock – the gordian knot of the Poor-Laws are not cut, but untied – all by a simple idea in Architecture!” (Bentham 29). As Foucault points out in “Panopticism”, the Panopticon works so well because the prisoner can never know when she or he is being watched, and this uncertainty compels the prisoner into constant discipline. Atheist Bentham had created a transcendent surveillance system that would replace God in (he trusted) an increasingly secular society. Bentham’s catalogue of the Panopticon’s benefits is something of a Utopian manifesto in its own right, and his utilitarianism, based on the “greatest-happiness principle”, was prepared to embrace the surveillance system so long as that system maximised overall happiness. Perhaps Thomas More was a proto-utilitarian, prepared to take up the repressive aspects of panopticism in exchange for moral reform, health preservation, the invigoration of industry and the lightening of public burdens. On the other hand, Utopia is widely read as a deliberately ironic representation of the ideal state. Stephen Greenblatt has pointed out that More “remained ambivalent about many of his most intensely felt perceptions” in Utopia, and he offers the text’s various ironising elements (such as the name of More’s fictitious interlocutor, Hythlodaeus, “well learned in nonsense”) as evidence (Greenblatt 54). Even the text’s title undermines its Edenic vision: as Louis Marin argues, “Utopia” could derive equally from Greek ou-topos, no-place, or eu-topos, good-place (Marin 85). More’s ambivalence about Utopia – to the extent of attributing his account of No-place to a character called Nonsense – suggests his impatience with his own flawed social vision. While Utopia is ambivalent in its depiction of the perfect state, more recent utopian narratives – Aldous Huxley’s Brave New World (1931), for instance, or George Orwell’s Nineteen Eighty-Four (1949) – are unequivocally ironic about the subordination of the individual to the perfect state. The Bible’s account of human society begins with Eden and ends with Apocalypse, in which divine surveillance reaches its inevitable conclusion in divine judgement. The utopian genre has undergone a very similar trajectory, beginning with what seem to be sincere attempts to sketch the perfect state, briefly flourishing as Europeans became first aware of Cytherean islands in the South Pacific, and, more recently, representing outright apocalypse (as in Margaret Atwood’s The Handmaid’s Tale [1986] and Ridley Scott’s Blade Runner [1992]), or at least responding pessimistically to human attempts at social engineering. Blade Runner’s dystopic inversion of biblical creation illustrates an enduring distrust in both human and divine attempts to establish Eden. The year is 2019 (only one year off 2020, perfect vision); the place is Los Angeles, the City of Angels. Corporate biomechanic Eldon Tyrell manufactures a race of robots, “replicants”, who are physically indistinguishable from humans, capable of developing emotional responses, but burdened with a four-year self-destruct mechanism. When the replicants rebel, their leader, Roy Batty, demands of Tyrell, “I want more life, Father”. Tyrell is not only “Father”, but “the god of biomechanics”; and Batty is simultaneously a reworking of Adam (the disaffected creation), Lucifer (the rebel angel) and Christ (as shown in the accompanying iconography of crucifixion and doves). The Bible’s leading actors are all present, but the City of Angels, 2019, is unmistakeably not Eden. It is a polluted, dank, flame-spewing dragon of a city, more Inferno than human habitation. The film’s oppressive film noir atmosphere relays the nausea induced by the Tyrell Corporation’s surveillance system. The Voight-Kamff test – a means of assessing emotional response (and thus determining whether an individual is human or replicant) by scanning the pupils – is a surveillance mechanism so intrusive it measures not only behaviour, but feelings. The optical imagery throughout the film reinforces the idea of permanent visibility. The result is a claustrophobic paranoia. Blade Runner is unambiguous in its pessimism about human attempts to regulate society (attempts which it shows to be reliant on surveillance, slavery and swift punishment). It seems unlikely that the God of Genesis is specifically targeted by this film’s parody of the Creator-creation power relationship – its critiques of capitalism and environmental mismanagement are much more overt – but by configuring its dramatis personae in biblical roles, Blade Runner demonstrates that the paradigm for omnisurveillant creators comes from the Bible. In turn, by placing Los Angeles, 2019, at such a distant aesthetic remove from Eden, the film portrays the omnisurveillant creator unrelieved by natural beauty. Foucault’s formulation of panopticism, that power is seeing without being seen, that being seen without seeing is disempowerment, informs all three texts – Genesis, Utopia and Blade Runner. What differentiates them, determines how perfect each text would have its world believed to be, is the extent to which its authors approve this power relationship. References Bentham, Jeremy. The Panopticon; or, The Inspection House (1787). In The Panopticon Writings. Ed. Miran Bozovic. London: Verso, 1995. 29-95. Foucault, Michel. “Panopticism”. In Discipline and Punish: the Birth of the Prison. Trans. Alan Sheridan (1977). New York: Vintage Books, 1995. 195–228. Greenblatt, Stephen. Renaissance Self-Fashioning: From More to Shakespeare. Chicago and London: U of Chicago P, 1980. Marin, Louis. Utopics: The Semiological Play of Textual Spaces. Trans. Robert A. Vollrath. Atlantic Highlands, NJ: Humanities Press International, 1990. More, Thomas. Utopia (1516). In Susan Brice, ed. Three Early Modern Utopias: Utopia, New Atlantis, The Isle of Pines. Oxford: Oxford UP, 1996. Scott, Ridley. Blade Runner: The Director’s Cut. United States, 1992. Citation reference for this article MLA Style Harley, Alexis. "Resurveying Eden: Panoptica in Imperfect Worlds." M/C Journal 8.4 (2005). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0508/02-harley.php>. APA Style Harley, A. (Aug. 2005) "Resurveying Eden: Panoptica in Imperfect Worlds," M/C Journal, 8(4). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0508/02-harley.php>.
APA, Harvard, Vancouver, ISO, and other styles
37

Bruner, Michael Stephen. "Fat Politics: A Comparative Study." M/C Journal 18, no. 3 (June 3, 2015). http://dx.doi.org/10.5204/mcj.971.

Full text
Abstract:
Drawing upon popular magazines, newspapers, blogs, Web sites, and videos, this essay compares the media framing of six, “fat” political figures from around the world. Framing refers to the suggested interpretations that are imbedded in media reports (Entman; McCombs and Ghanem; Seo, Dillard and Shen). As Robert Entman explains, framing is the process of culling a few elements of perceived reality and assembling a narrative that highlights connections among them to promote a particular interpretation. Frames introduce or raise the salience of certain ideas. Fully developed frames typically perform several functions, such as problem definition and moral judgment. Framing is connected to the [covert] wielding of power as, for example, when a particular frame is intentionally applied to obscure other frames. This comparative international study is an inquiry into “what people and societies make of the reality of [human weight]” (Marilyn Wann as quoted in Rothblum 3), especially in the political arena. The cultural and historical dimensions of human weight are illustrated by the practice of force-feeding girls and young women in Mauritania, because “fat” women have higher status and are more sought after as brides (Frenkiel). The current study, however, focuses on “fat” politics. The research questions that guide the study are: [RQ1] which terms do commentators utilize to describe political figures as “fat”? [RQ2] Why is the term “fat” utilized in the political arena? [RQ3] To what extent can one detect gender, national, or other differences in the manner in which the term “fat” is used in the political arena? After a brief introduction to the current media obsession with fat, the analysis begins in 1908 with William Howard Taft, the 330 pound, twenty-seventh President of the United States. The other political figures are: Chris Christie (Governor of New Jersey), Bill Clinton (forty-second President of the United States), Michelle Obama (current First Lady of the United States), Carla Bruni (former First Lady of France), and Julia Gillard (former Prime Minister of Australia). The final section presents some conclusions that may help readers and viewers to take a more critical perspective on “fat politics.” All of the individuals selected for this study are powerful, rich, and privileged. What may be notable is that their experiences of fat shaming by the media are different. This study explores those differences, while suggesting that, in some cases, their weight and appearance are being attacked to undercut their legitimate and referent power (Gaski). Media Obsession with Fat “Fat,” or “obesity,” the more scientific term that reflects the medicalisation of “fat” (Sobal) and which seems to hold sway today, is a topic with which the media currently is obsessed, both in Asia and in the United States. A quick Google search using the word “obesity” reports over 73 million hits. Ambady Ramachandran and Chamukuttan Snehalatha report on “The Rising Burden of Obesity in Asia” in a journal article that emphasizes the term “burden.” The word “epidemic” is featured prominently in a 2013 medical news report. According to the latter, obesity among men was at 13.8 per cent in Mongolia and 19.3 per cent in Australia, while the overall obesity rate has increased 46 per cent in Japan and has quadrupled in China (“Rising Epidemic”). Both articles use the word “rising” in their titles, a fear-laden term that suggests a worsening condition. In the United States, obesity also is portrayed as an “epidemic.” While some progress is being made, the obesity rate nonetheless increased in sixteen states in 2013, with Louisiana at 34.7 per cent as the highest. “Extreme obesity” in the United States has grown dramatically over thirty years to 6.3 per cent. The framing of obesity as a health/medical issue has made obesity more likely to reinforce social stereotypes (Saguy and Riley). In addition, the “thematic framing” (Shugart) of obesity as a moral failure means that “obesity” is a useful tool for undermining political figures who are fat. While the media pay considerable attention to the psychological impact of obesity, such as in “fat shaming,” the media, ironically, participate in fat shaming. Shame is defined as an emotional “consequence of the evaluation of failure” and often is induced by critics who attack the person and not the behavior (Boudewyns, Turner and Paquin). However, in a backlash against fat shaming, “Who you callin' fat?” is now a popular byline in articles and in YouTube videos (Reagan). Nevertheless, the dynamics of fat are even more complicated than an attack-and-response model can capture. For example, in an odd instance of how women cannot win, Rachel Frederickson, the recent winner of the TV competition The Biggest Loser, was attacked for being “too thin” (Ceja and Valine). Framing fat, therefore, is a complex process. Fat shaming is only one way that the media frame fat. However, fat shaming does not appear to be a major factor in media coverage of William Howard Taft, the first person in this study. William Howard Taft William Howard Taft was elected the 27th President of the United States in 1908 and served 1909-1913. Whitehouse.com describes Taft as “Large, jovial, conscientious…” Indeed, comments on the happy way that he carried his “large” size (330 pounds) are the main focus here. This ‹happy fat› framing is much different than the media framing associated with ‹fat shaming›. His happy personality was often mentioned, as can be seen in his 1930 obituary in The New York Times: “Mr. Taft was often called the most human President who ever sat in the White House. The mantle of office did not hide his winning personality in any way” (“Taft Gained Peaks”). Notice how “large” and “jovial” are combined in the framing of Taft. Despite his size, Taft was known to be a good dancer (Bromley 129). Two other words associated with Taft are “rotund” (round, plump, chubby) and “pudgy.” These terms seem a bit old-fashioned in 2015. “Rotund” comes from the Latin for “round,” “circular,” “spherical.” “Pudgy,” a somewhat newer term, comes from the colloquial for “short and thick” (Etymology Online). Taft was comfortable with being called “pudgy.” A story about Taft’s portrait in the Smithsonian’s National Portrait Gallery in Washington, D.C. illustrates the point: Artist William Schevill was a longtime acquaintance of Taft and painted him several times between 1905 and 1910. Friendship did not keep Taft from criticizing the artist, and on one occasion he asked Schevill to rework a portrait. On one point, however, the rotund Taft never interfered. When someone said that he should not tolerate Schevill's making him look so pudgy in his likenesses, he simply answered, "But I am pudgy." (Kain) Taft’s self-acceptance, as seen in the portrait by Schevill (circa 1910), stands in contrast to the discomfort caused by media framing of other fat political figures in the era of more intense media scrutiny. Chris Christie Governor Christie has tried to be comfortable with his size (300+ pounds), but may have succumbed to the medicalisation of fat and the less than positive framing of his appearance. As Christie took the national stage in the aftermath of Hurricane Sandy (2012), and subsequently explored running for President, he may have felt pressure to look more “healthy” and “attractive.” Even while scoring political points for his leadership in the aftermath of Superstorm Sandy, Christie’s large size was apparent. Filmed in his blue Governor jacket during an ABC TV News report that can be accessed as a YouTube video, Christie obviously was much larger than the four other persons on the speakers’ platform (“Jersey Shore Devastated”). In the current media climate, being known for your weight may be a political liability. A 2015 Rutgers’ Eagleton Poll found that 53 percent of respondents said that Governor Christie did not have “the right look” to be President (Capehart). While fat traditionally has been associated with laziness, it now is associated with health issues, too. The media framing of fat as ‹morbidly obese› may have been one factor that led Christie to undergo weight loss surgery in 2013. After the surgery, he reportedly lost a significant amount of weight. Yet his new look was partially tarnished by media reports on the specifics of lap-band-surgery. One report in The New York Daily News stressed that the surgery is not for everyone, and that it still requires much work on the part of the patient before any long-term weight loss can be achieved (Engel). Bill Clinton Never as heavy as Governor Christie, Bill Clinton nonetheless received considerable media fat-attention of two sorts. First, he could be portrayed as a kind of ‹happy fat “Bubba”› who enjoyed eating high cholesterol fast food. Because of his charm and rhetorical ability (linked to the political necessity of appearing to understand the “average person”), Clinton could make political headway by emphasizing his Arkansas roots and eating a hamburger. This vision of Bill Clinton as a redneck, fast-food devouring “Bubba” was spoofed in a popular 1992 Saturday Night Live skit (“President-Elect Bill Clinton Stops by a McDonald's”). In 2004, after his quadruple bypass surgery, the media adopted another way to frame Bill Clinton. Clinton became the poster-child for coronary heart disease. Soon he would be framed as the ‹transformed Bubba›, who now consumed a healthier diet. ‹Bill Clinton-as-vegan› framing fit nicely with the national emphasis on nutrition, including the widespread advocacy for a largely plant-based diet (see film Forks over Knives). Michelle Obama Another political figure in the United States, whom the media has connected both to fast food and healthy nutrition, is Michelle Obama. Now in her second term as First Lady, Michelle Obama is associated with the national campaign for healthier school lunches. At the same time, critics call her “fat” and a “hypocrite.” A harsh diatribe against Obama was revealed by Media Matters for America in the personal attacks on Michelle Obama as “too fat” to be a credible source on nutrition. Dr. Keith Ablow, a FOX News medical adviser said, Michelle Obama needs to “drop a few” [pounds]. “Who is she to be giving nutrition advice?” Another biting attack on Obama can be seen in a mocking 2011 Breitbart cartoon that portrayed Michelle Obama devouring hamburgers while saying, “Please pass the bacon” (Hahn). Even though these attacks come from conservative media utterly opposed to the presidency of Barack Obama, they nonetheless reflect a more widespread political use of media framing. In the case of Michelle Obama, the media sometimes cannot decide if she is “statuesque” or “fat.” She is reported to be 5’11 tall, but her overall appearance has been described as “toned” (in her trademark sleeveless dresses) yet never as “thin.” The media’s ambivalence toward tall/large women is evident in the recent online arguments over whether Robyn Lawley, named one of the “rookies of the year” by the Sports Illustrated Swimsuit issue, has a “normal” body or a “plus-size” body (Blair). Therefore, we have two forms of media framing in the case of Michelle Obama. First, there is the ‹fat hypocrite› frame, an ad hominem framing that she should not be a spokesperson for nutrition. This first form of framing, perhaps, is linked to the traditional tendency to tear down political figures, to take them off their pedestals. The second form of media framing is a ‹large woman ambiguity› frame. If you are big and tall, are you “fat”? Carla Bruni Carla Bruni, a model and singer/songwriter, was married in 2008 to French President Nicolas Sarkozy (who served 2007 to 2012). In 2011, Bruni gave birth to a daughter, Giulia. After 2011, Bruni reports many attacks on her as being too “fat” (Kim; Strang). Her case is quite interesting, because it goes beyond ‹fat shaming› to illustrate two themes not previously discussed. First, the attacks on Bruni seem to connect age and fat. Specifically, Bruni’s narrative introduces the frame: ‹weight loss is difficult after giving birth›. Motherhood is taxing enough, but it becomes even more difficulty when the media are watching your waist line. It is implied that older mothers should receive more sympathy. The second frame represents an odd form of reverse fat shaming: ‹I am so sick and tired of skinny people saying they are fat›. As Bruni explains: “I’m kind of tall, with good-size shoulders, and when I am 40 pounds overweight, I don’t even look fat—I just look ugly” (Orth). Critics charge that celebs like Bruni not only do not look fat, they are not fat. Moreover, celebs are misguided in trying to cultivate sympathy that is needed by people who actually are fat. Several blogs echo this sentiment. The site Whisper displays a poster that states: “I am so sick and tired of skinny people saying they are fat.” According to Anarie in another blog, the comment, “I’m fat, too,” is misplaced but may be offered as a form of “sisterhood.” One of the best examples of the strong reaction to celebs’ fat claims is the case of actress Jennifer Lawrence. According The Gloss, Lawrence isn’t chubby. She isn’t ugly. She fits the very narrow parameters for what we consider beautiful, and has been rewarded significantly for it. There’s something a bit tone deaf in pretending not to have thin or attractive privilege when you’re one of the most successful actresses in Hollywood, consistently lauded for your looks. (Sonenshein) In sum, the attempt to make political gain out of “I’m fat” comments, may backfire and lead to a loss in political capital. Julia Gillard The final political figure in this study is Julia Eileen Gillard. She is described on Wikipedia as“…a former Australian politician who served as the 27th Prime Minister of Australia, and the Australian Labor Party leader from 2010 to 2013. She was the first woman to hold either position” (“Julia Gillard”). Gillard’s case provides a useful example of how the media can frame feminism and fat in almost opposite manners. The first version of framing, ‹woman inappropriately attacks fat men›, is set forth in a flashback video on YouTube. Political enemies of Gillard posted the video of Gillard attacking fat male politicians. The video clip includes the technique of having Gillard mouth and repeat over and over again the phrase, “fat men”…”fat men”…”fat men” (“Gillard Attacks”). The effect is to make Gillard look arrogant, insensitive, and shrill. The not-so-subtle message is that a woman should not call men fat, because a woman would not want men to call her fat. The second version of framing in the Gillard case, ironically, has a feminist leader calling Gillard “fat” on a popular Australian TV show. Australian-born Germaine Greer, iconic feminist activist and author of The Female Eunuch (1970 international best seller), commented that Gillard wore ill-fitting jackets and that “You’ve got a big arse, Julia” (“You’ve Got”). Greer’s remarks surprised and disappointed many commentators. The Melbourne Herald Sun offered the opinion that Greer has “big mouth” (“Germaine Greer’s”). The Gillard case seems to support the theory that female politicians may have a more difficult time navigating weight and appearance than male politicians. An experimental study by Beth Miller and Jennifer Lundgren suggests “weight bias exists for obese female political candidates, but that large body size may be an asset for male candidates” (p. 712). Conclusion This study has at least partially answered the original research questions. [RQ1] Which terms do commentators utilize to describe political figures as “fat”? The terms include: fat, fat arse, fat f***, large, heavy, obese, plus size, pudgy, and rotund. The media frames include: ‹happy fat›, ‹fat shaming›, ‹morbidly obese›, ‹happy fat “Bubba›, ‹transformed “Bubba›, ‹fat hypocrite›, ‹large woman ambiguity›, ‹weight gain women may experience after giving birth›, ‹I am so sick and tired of skinny people saying they are fat›, ‹woman inappropriately attacks fat men›, and ‹feminist inappropriately attacks fat woman›. [RQ2] Why is the term “fat” utilized in the political arena? Opponents in attack mode, to discredit a political figure, often use the term “fat”. It can imply that the person is “unhealthy” or has a character flaw. In the attack mode, critics can use “fat” as a tool to minimize a political figure’s legitimate and referent power. [RQ3] To what extent can one detect gender, national, or other differences in the manner in which the term “fat” is used in the political arena? In the United States, “obesity” is the dominant term, and is associated with the medicalisation of fat. Obesity is linked to health concerns, such as coronary heart disease. Weight bias and fat shaming seem to have a disproportionate impact on women. This study also has left many unanswered questions. Future research might fruitfully explore more of the international and intercultural differences in fat framing, as well as the differences between the fat shaming of elites and the fat shaming of so-called ordinary citizens.References Anarie. “Sick and Tired.” 7 July 2013. 17 May 2015 ‹http://www.sparkpeople.com/ma/sick-of--thin-people-saying-they-are-fat!/1/1/31404459›. Blair, Kevin. “Rookie Robyn Lawley Is the First Plus-Size Model to Be Featured in the Sports Illustrated Swimsuit Issue.” 6 Feb. 2015. 22 Apr. 2015 ‹http://www.starpulse.com/news/Kevin_Blair/2015/02/06/rookie-robin-lawley-is-the-first-pluss›. Boudewyns, Vanessa, Monique Turner, and Ryan Paquin. “Shame-Free Guilt Appeals.” Psychology & Marketing 23 July 2013. doi: 10.1002/mar.20647. Bromley, Michael L. William Howard Taft and the First Motoring Presidency. Jefferson, NC: McFarland & Company, 2007. Capehart, Jonathan. “Chris Christie’s Dirty Image Problem.” 18 Feb. 2015. 22 Apr. 2015 ‹http://www.washingtonpost.com/blogs/post-partisan/wp/2015/02/18/chris-christies-dirty-image-problem/›.“Carla Bruni.” n.d. 22 Apr. 2015 ‹http://www.biography.com/people/carla-bruni-17183782›. Ceja, Berenice, and Karissa Valine. “Women Can’t Win: Gender Irony and the E-Politics of Food in The Biggest Loser.” Unpublished manuscript. Humboldt State University, 2015. “Chris Christie to Consider.” 17 April 2012. 22 Apr. 2015 ‹http://www.seeyounexttuesday.com-468›. Conason, Joe. “Bill Clinton Explains Why He Became a Vegan.” AARP The Magazine, Aug./Sep. 2013. 22 Apr. 2015 ‹http://www.aarp.org/health/healthy-living/info-08-2013/bill-clinton-vegan.html›. Engel, Meredith. “Lap Band Surgery.” New York Daily News. 24 Sep. 2014. 22 Apr. 2015 ‹http://www.nydailynews.com/life-style/health/lap-band-surgery-helped-chris-christie-article-1.1951266›. Entman, Robert M. “Framing Bias: Media in the Distribution of Power.” Journal of Communication 57 (2007): 163-173. Etymology Online. n.d. 22 Apr. 2015 ‹http://etymonline.com/›. Frenkiel, Olenka. “Forced to Be Fat.” The Sunday Mail (Queensland, Australia). 13 Nov. 2005: 64. Gaski, John. “Interrelations among a Channel Entity's Power Sources: Impact of the Expert, Referent, and Legitimate Power Sources.” Journal of Marketing Research 23 (Feb. 1986): 62-77. Hahn, Laura. “Irony and Food Politics.” Communication and Critical/Cultural Studies 12 Feb. 2015. doi: 10.1080/14791420.2015.1014185.“Julia Gillard.” n.d. 22 Apr. 2015 ‹http://en.wikipedia.org/wiki/Julia_Gillard›. Kain, Erik. “A History of Fat Presidents.” Forbes.com 28 Sep. 2011. 22 Apr. 2015 ‹http://www.forbes.com/sites/erikkain/2011/09/28/a-history-of-fat-presidents/›.Kim, Eun Kyung. “Carla Bruni on Media: They Get Really Nasty.” 22 Apr. 2015 ‹http://www.today.com/news/carla-bruni-media-they-get-really-nasty-6C9733510›. McCombs, Max, and S.I. Ghanem. “The Convergence of Agenda Setting and Framing.” In Stephen D. Reese, Oscar. H. Gandy, Jr., and August Grant (eds.), Framing Public Life: Perspectives on Media and Our Understanding of the Social World. Mahwah, NJ: Erlbaum, 2001. 67-83. Miller, Beth, and Jennifer Lundgren. “An Experimental Study on the Role of Weight Bias in Candidate Evaluation.” Obesity 18 (Apr. 2010): 712-718. Orth, Maureen. “Carla on a Hot Tin Roof.” Vanity Fair June 2013. 22 Apr. 2015 ‹http://www.vanityfair.com/hollywood/2013/06/carla-bruni-musical-career-album›. “President-Elect Bill Clinton Stops by a McDonalds.” n.d. 22 Apr. 2015 ‹https://screen.yahoo.com/clinton-mcdonalds-000000491.html›. Ramachandran, Ambady, and Chamukuttan Snehalatha. “The Rising Burden of Obesity in Asia.” Journal of Obesity (2010). doi: 10.1155/2010868573. 22 Apr. 2015 ‹http://www.ncbi.nlm.nih.gov/pmc/articles/PMC2939400/›.Reagan, Gillian. “Ex-Chubettes Unite! Former Fat Kids Let It All Out.” New York Observer 22 Apr. 2008. 22 Apr. 2015 ‹http://observer.com/2008/04/exchubettes-unite-former-fat-kids-let-it-all-out/›. “Rising Epidemic of Obesity in Asia.” News Medical 21 Feb. 2013. 23 Apr. 2015 ‹http://www.ncbi.nlm.nih.gov/pmc/articles/PMC2939400/›. Rothblum, Esther. “Why a Journal on Fat Studies?” Fat Studies 1 (2012): 3-5. Saguy, Abigail C., and Kevin W. Riley. “Weighing Both Sides: Morality, Mortality, and Framing Contests over Obesity.” Journal of Health Politics, Policy and Law 30.5 (2005): 869-921. Seo, Kiwon, James P. Dillard, and Fuyuan Shen. “The Effects of Message Framing and Visual Image on Persuasion. Communication Quarterly 61 (2013): 564-583. Shugart, Helene A. “Heavy Viewing: Emergent Frames in Contemporary News Coverage of Obesity.” Health Communication 26 (Oct./Nov. 2011): 635-648. Sobal, Jeffery. “The Medicalization and Demedicalization of Obesity.” Eating Agendas: Food and Nutrition as Social Problems. Ed. Jeffery Sobal and Donna Maurer. New York: Aldine de Gruyter, 1995. 67-90. Sonenshein, Julia. “Jennifer Lawrence Does More Harm than Good with Her ‘I’m Chubby’ Comments.” 3 Jan. 2014. 16 May 2015 ‹http://www.thegloss.com/2014/01/03/culture/jennifer-lawrence-fat-comments-body-image/#ixzz3aWTEg35U›. Strang, Fay. ”Carla Bruni Admits Used Therapy.” 3 May 2013. 22 Apr. 2015 ‹http://www.dailymail.co.uk/tvshowbiz/article-2318719/Carla-Bruni-admits-used-therapy-deal-comments-fat-giving-birth-forties.html›. “Taft Gained Peaks in Unusual Career.” The New York Times 9 March 1930. 22 Apr. 2015 ‹http://www.nytimes.com/learning/general/onthisday/bday/0915.html›. Vedantam, Shankar. “Clinton's Heart Bypass Surgery Called a Success.” Washington Post 7 Sep. 2004: A01. “William Howard Taft.” Whitehouse.com. n.d. 12 May 2015. Whisper. n.d. 16 May 2015 ‹https://sh.whisper/o5o8bf3810d45295605bce53f8082Db6ddb29/I-am-so-sick-and-tired-of-skinny-people-saying-that-they-are-fat›. “You’ve Got a Big Arse, Julia. Germaine Greer Advice for Julia Gillard.” Politics and Porn in a Post-Feminist World. 24 Aug. 2012. 22 Apr. 2015 ‹https://www.youtube.com/watch?v=8lFtww!D3ss›. See also: ‹http://www.smh.com.au/federal-politics/political-news/greer-defends-fat-arse-pm-comment-20120827-24x5i.html›.
APA, Harvard, Vancouver, ISO, and other styles
38

Easterbrook, Tyler. "Page Not Found." M/C Journal 25, no. 1 (March 16, 2022). http://dx.doi.org/10.5204/mcj.2874.

Full text
Abstract:
One cannot use the Internet for long without encountering its many dead ends. Despite the adage that everything posted online stays there forever, users quickly discover how fleeting Web content can be. Whether it be the result of missing files, platform moderation, or simply bad code, the Internet constantly displaces its archival contents. Eventual decay is the fate of all digital media, as Wendy Hui Kyong Chun observed in a 2008 article. “Digital media is not always there”, she writes. “We suffer daily frustrations with digital sources that just disappear” (160). When the media content we seek is something trivial like a digitised vacation photo, our inability to retrieve it may merely disappoint us. But what happens when we lose access to Web content about significant cultural events, like viral misinformation about a school shooting? This question takes on great urgency as conspiracy content spreads online at baffling scale and unprecedented speed. Although conspiracy theories have long been a fixture of American culture, the contemporary Internet enables all manner of “information disorder” (Wardle and Derakhshan) to warp media coverage, sway public opinion, and even disrupt the function of government—as seen in the harrowing “Stop the Steal” attack on the U.S. Capitol on 6 January 2021, when rioters attempted to prevent Congress from verifying the results of the 2020 Presidential Election. Scholars across disciplines have sought to understand how conspiracy theories function within our current information ecosystem (Marwick and Lewis; Muirhead and Rosenblum; Phillips and Milner). Much contemporary research focusses on circulation, tracking how conspiracy theories and other types of misinformation travel from fringe Websites to mainstream news outlets such as the New York Times. While undoubtedly valuable, this emphasis on circulation provides an incomplete picture of online conspiracy theories’ lifecycle. How should scholars account for the afterlife of conspiracy content, such as links to conspiracy videos that get taken down for violating YouTube’s Community Guidelines? This and related questions about the dead ends of online conspiracy theorising are underexplored in the existing scholarly literature. This essay contends that the Internet’s tendency to decay ought to factor into our models of digital conspiracy theories. I focus on the phenomenon of malfunctional hyperlinks, one of the most common types of disrepair to which the Internet is prone. The product of so-called “link rot”, broken links would appear to signal an archival failure for online conspiracy theories. Yet recent work from rhetorical theorist Jenny Rice suggests that these broken hyperlinks instead function as a rhetorically potent archive in their own right. To understand this uncanny persuasive work, I draw from rhetorical theory to analyse broken links to conspiracy content on Reddit, the popular social news platform, surrounding the 2018 school shooting in Parkland, Florida, the worst high school shooting in American history. I show that broken links on the subreddit r/conspiracy, by virtue of their dysfunction, persuade conspiracy theorists that they possess “stigmatized knowledge” (Barkun 26) about the shooting that is being suppressed. Ultimately, I argue that link rot functions as a powerful source of evidence within digital conspiracy theories, imbuing broken links with enduring rhetorical force to validate marginalised belief systems. Link Rot—Archival Failure or Archival Possibility? As is suggested by the prefix ‘inter-’, connectivity has always been one of the Internet’s core functionalities. Indeed, the ability to hyperlink two different texts—and now images, videos, and other media—is so fundamental to navigating the Web that we often take these links for granted until they malfunction. In popular parlance, we then say we have clicked on a “broken” or “dead” link, and without proper care to prevent its occurrence, all URLs are susceptible to dying eventually (much like us mortals). This slow process of decay is known as “link rot”. The precise extent of link rot on the Internet is unknown—and likely unknowable, in practice if not principle—but multiple studies have been conducted to assess the degree of link rot in specific archives. One study from 2015 found that nearly 50% of the URLs cited in 406 library and information science journal articles published between 2008-2012 were no longer accessible (Kumar et al. 59). In the context of governmental Webpages, a 2010 study determined that while only 8% of the URLs sampled in 2008 had link rot, that number more than tripled to 28% of URLs with link rot when sampled only two years later (Rhodes 589-90). More recently, scholars from Harvard’s Berkman Klein Center for Internet and Society uncovered an alarming amount of link rot in the online archive of the New York Times, perhaps the most prominent newspaper in the United States: “25% of all links were completely inaccessible, with linkrot becoming more common over time – 6% of links from 2018 had rotted, as compared to 43% of links from 2008 and 72% of links from 1998” (Zittrain et al. 4). Taken together, these data indicate that link rot worsens over time, creating a serious obstacle for the study of Web-based phenomena. Link rot is particularly worrisome for researchers who study online misinformation (including digital conspiracy theories), because the associated links are often more vulnerable to removal due to content moderation or threats of legal action. How should scholars understand the function of link rot within digital conspiracy theories? If our academic focus is on how conspiracy theories circulate, these broken links might seem at best a roadblock to scholarly inquiry or at worst as totally insignificant or irrelevant. After all, users cannot access the material in question; they reach a dead end. Yet recent work by rhetoric scholar Jenny Rice suggests these dead ends might have enduring persuasive power. In her book Awful Archives: Conspiracy Rhetoric and Acts of Evidence, Rice argues that evidence is an “act rather than a thing” and that as a result, we ought to recalibrate what we consider an archive (12, original emphasis). For Rice, archives are more than simple aggregates of documents; instead, they are “ordinary and extraordinary experiences in public life that leave lasting, palpable residues, which then become our sources—our resources—for public discourse” (16-17). These “lasting, palpable residues” are deeply embodied, Rice maintains, for the evidence we gather is “always real in its reference, which is to a felt experience of proximities” (118). For conspiracy theorists in particular, an archive might evoke a profound sense of what Rice memorably describes as “Something intense, something real. Something off. Something fucked up. Something anomalous” (12, original emphasis). This is no less true when an archive fails to function as designed. Hence, for the remainder of this essay, I pivot to analysing how link rot functions within digital conspiracy theories about the 2018 school shooting in Parkland, Florida. As we will see, the shooting galvanised meaningful gun control activism via the March for Our Lives movement, but the event also quickly became fodder for proliferating conspiracy content. From Crisis to Crisis Actors: The Parkland Shooting and Its Aftermath On the afternoon of 14 February 2018, Nikolas Cruz entered his former high school, Marjory Stoneman Douglas, and murdered 17 people, including 14 students (Albright). While a horrific event, the Parkland shooting unfortunately marked merely the latest in a long line of similar tragedies in the United States, which has been punctuated by school shootings for decades. But the Parkland shooting stands out among the gruesome lineage of similar tragedies due to the profound resolve of its student-survivors, who agitated for gun policy reform through the March for Our Lives movement. In the weeks following the shooting, a group of Parkland students partnered with Everytown for Gun Safety, a non-profit organisation advocating for gun control, to coordinate a youth-led demonstration against gun violence. Held in the U.S. capitol of Washington, D.C. on 24 March 2018, the March for Our Lives protest was the largest demonstration against gun violence in American history (March for Our Lives). The protest drew around 200,000 participants to Washington; hundreds of thousands of protestors attended an estimated 800 smaller rallies held across the United States (CBS News). Furthermore, likeminded protestors across Europe, Asia, Africa, and Australia held allied events to show support for these American students’ cause (Russo). The broader March for Our Lives organisation developed out of the political demonstrations on 24 March 2018; four years later, March for Our Lives continues to be a major force in debates about gun violence in the United States. Although the Parkland shooting inspired meaningful gun control activism, it also quickly provoked a deluge of online conspiracy theories about the tragedy and the people involved, including the student-activists who survived the shooting and spearheaded March for Our Lives. This conspiracy content arrived at breakneck pace: according to an analysis by the Washington Post, the first conspiracy posts appeared on the platform 8chan a mere 47 minutes after the first news reports aired about the shooting (Timberg and Harwell). Later that day, Parkland conspiracy theories migrated from fringe haunts like 8chan to InfoWars, a mainstay of the conspiracy media circuit, where host/founder Alex Jones insinuated that the shooting could be a “false flag” event orchestrated by the Democratic Party (Media Matters Staff). Over the ensuing hours, days, weeks, and months, Parkland conspiracies continued to circulate, receiving mainstream news coverage when conversative activists and politicians publicly espoused conspiracy claims about the shooting (Arkin and Popken). Ultimately, the conspiracist backlash was so persistent and virulent throughout 2018 that PolitiFact, a fact-checking site run by the Poynter Institute, declared the Parkland conspiracy theories their 2018 “Lie of the Year” (Drobnic Holan and Sherman). As with many conspiracy theories, the Parkland conspiracies remixed novel information with longstanding conspiracist tropes. Predominantly, these theories alleged that the Parkland student-activists who founded March for Our Lives were being controlled by outside forces to do their bidding. Although conspiracy theorists diverged in who they named as the shadowy puppet master pulling the strings—was it the Democratic Party? George Soros? Someone else?—all agreed that a secretive agenda was afoot. The most extreme version of this theory held that David Hogg, X González, and other prominent March for Our Lives activists were “crisis actors”. This account envisions Hogg et al. as paid performers playing the part of angry and traumatised students for media coverage about a school shooting that either did not occur as reported or did not occur at all (Yglesias). While unnerving and callous, these crisis actor allegations are not new ideas; rather, they draw from a long history of loosely antisemitic “New World Order” conspiracy theories that see an ulterior motive behind significant historical events (Barkun 39-65). Parkland conspiracy theorists circulated a wide variety of media artifacts—anti-March for Our Lives memes, obscure blog posts, and manipulated video footage of the Parkland students, among other content—to propagate their crisis actor claims. But whether due to platform moderation, threat of legal action, or simply public pressure, much of this conspiracy material is now inaccessible, leaving behind only broken links to conspiracy content that once was. By closely examining these broken links through a rhetorical lens, we can trace the “lasting, palpable residues” (Rice 16) link rot leaves in its wake. “All part of the purge”: Parkland Link Rot on r/conspiracy In this final section, I use the tools of rhetorical analysis to demonstrate how link rot can function as a form of evidence for conspiracy theorists. Rhetorical analysis, when applied to digital infrastructure, requires that we expand our notion of rhetoric beyond intentional human persuasion. As James J. Brown, Jr. argues, digital infrastructure is rhetorical because it determines “what’s possible in a given space”, which may or may not involve human beings (99). Human intentionality still matters in many contexts, of course, but seeing digital infrastructure as a “possibility space” opens up productive new avenues for rhetorical inquiry (Brown, Jr. 72-99). This rhetorical perspective aligns with the method of “affordance analysis” derived from Science and Technology Studies and related fields, which investigates how technologies facilitate certain outcomes for users (Curinga). Much like an affordance analysis, my goal is to illustrate how broken links produce certain rhetorical effects, not to make broader empirical claims about the extent of link rot within Parkland conspiracy theories. The r/conspiracy page on Reddit, the popular social news platform, serves as an ideal site for conducting a rhetorical analysis of broken links. The r/conspiracy subreddit is a preeminent hub for digital conspiracy content, with nearly 1.7 million members as of March 2022 and thousands of active users viewing the site at any given time (r/conspiracy). Beyond its popularity, Reddit’s platform design makes link rot a common feature on r/conspiracy. As a forum-based social media platform, Reddit consists entirely of subreddits dedicated to various topics. In each subreddit, users generate and contribute to threads with relevant content, which often entails posting links to materials hosted elsewhere on the Internet. Importantly, Reddit allows each subreddit to set its own specific community rules for content moderation (so long as these rules themselves abide by Reddit’s general Content Policy), and unlike other profile-based social media platforms, Reddit allows anonymity through the use of pseudonyms. For all of these reasons, one finds a high frequency of link rot on r/conspiracy, as posts linking to external conspiracy media stay up even when the linked content itself disappears from the Web. Consider the following screenshot of an r/conspiracy Parkland post from 23 February 2018, a mere nine days after the Parkland shooting, which demonstrates what conspiracist link rot looks like on Reddit (fig. 1). Titling their thread “A compilation of anomalies from the Parkland shooting that the media won't address. The media wants to control the narrative. Feel free to use this if you find it helpful”, this unknown Redditor frames their post as an intervention against media suppression of suspicious details (“A compilation of anomalies”). Yet the archive this poster hoped to share with likeminded users has all but disintegrated—the poster’s account has been deleted (whether by will or force), and the promised “compilation of anomalies” no longer exists. Instead, the link under the headline sends users to a blank screen with the generic message “If you are looking for an image, it was probably deleted” (fig. 2). Fittingly, the links that the sole commenter assembled to support the original poster are also rife with link rot. Of the five links in the comment, only the first one works as intended; the other four videos have been removed from Google and YouTube, with corresponding error messages informing users that the linked content is inaccessible. Fig. 1: Parkland Link Rot on r/conspiracy. (As a precaution, I have blacked out the commenter’s username.) Fig. 2: Error message received when clicking on the primary link in Figure 1. Returning to Jenny Rice’s theory of “evidentiary acts” (173), how might the broken links in Figure 1 be persuasive despite their inability to transport users to the archive in question? For conspiracy theorists who believe they possess “stigmatized knowledge” (Barkun 26) about the Parkland shooting, link rot paradoxically serves as powerful validation of their beliefs. The unknown user who posted this thread alleges a media blackout of sorts, one in which “the media wants to control the narrative”. This claim, if true, would be difficult to verify. Interested users would have to scour media coverage of Parkland to assess whether the media have ignored the “compilation of anomalies” the poster insists they have uncovered and then evaluate the significance of those oddities. But link rot here produces a powerful evidentiary shortcut: the alleged “compilation of anomalies” cannot be accessed, seemingly confirming the poster’s claims to have secretive information about the Parkland shooting that the media wish to suppress. Indeed, what better proof of media censorship than seeing links to professed evidence deteriorate before your very eyes? In a strange way, then, it is through objective archival failure that broken links function as potent subjective evidence for Parkland conspiracy theories. Comments about Parkland link rot elsewhere on r/conspiracy further showcase how broken links can validate conspiracy theorists’ marginalised belief systems. For example, in a thread titled “Searching for video of Parkland shooting on bitchute”, a Redditor observes, “Once someone gives the link watch it go poof”, implying that links to conspiracy content disappear due to censorship by an unnamed force (“Searching for video”). That nearly everything else on this particular thread suffers from link rot—the original poster, the content of their post, and most of the other comments have since been deleted—seems only to confirm the commentor’s ominous prediction. In another thread about a since-deleted YouTube video supposedly “exposing” Parkland students as crisis actors, a user notes, “You can tell there’s an agenda with how quickly this video was removed by YouTube” (“Video Exposing”). Finally, in a thread dedicated to an alleged “Social Media Purge”, Redditors share strategies for combating link rot, such as downloading conspiracy materials and backing them up on external hard drives. The original poster warns their fellow users that even r/conspiracy is not safe from censorship, for removal of content about Parkland and other conspiracies is “all part of the purge” (“the coming Social Media Purge”). In sum, these comments suggest that link rot on r/conspiracy persuades users that their ideas and their communities are under threat, further entrenching their conspiratorial worldviews. I have argued in this article that link rot has a counterintuitive rhetorical effect: in generating untold numbers of broken links, link rot supplies conspiracy theorists with persuasive evidence for the validity of their beliefs. These and other dead ends on the Internet are significant yet understudied components of digital conspiracy theories that merit greater scholarly attention. Needless to say, I can only gesture here to the sheer scale of dead ends within online conspiracy communities on Reddit and elsewhere. Future research ought to trace other permutations of these dead ends, unearthing how they persuade users from beyond the Internet’s grave. References “A compilation of anomalies from the Parkland shooting that the media won't address. The media wants to control the narrative. Feel free to use this if you find it helpful.” Reddit. <https://www.reddit.com/r/conspiracy/comments/7ztc9l/a_compilation_of_anomalies_from_the_parkland/>. Albright, Aaron. “The 17 Lives Lost at Douglas High.” Miami Herald 21 Feb. 2018.<https://www.miamiherald.com/news/local/community/broward/article201139254.html>. Arkin, Daniel, and Ben Popken. “How the Internet’s Conspiracy Theorists Turned Parkland Students into ‘Crisis Actors’.” NBC News 21 Feb. 2018. <https://www.nbcnews.com/news/us-news/how-internet-s-conspiracy-theorists-turned-parkland-students-crisis-actors-n849921>. Barkun, Michael. A Culture of Conspiracy: Apocalyptic Visions in Contemporary America. 2nd ed. Berkeley: University of California Press, 2013. Brown, Jr., James J. Ethical Programs: Hospitality and the Rhetorics of Software. Ann Arbor: University of Michigan Press, 2015. CBS News. “How Many People Attended March for Our Lives? Crowd in D.C. Estimated at 200,000.” CBS News 25 Mar. 2018. <https://www.cbsnews.com/news/march-for-our-lives-crowd-size-estimated-200000-people-attended-d-c-march/>. Chun, Wendy Hui Kyong. “The Enduring Ephemeral, or the Future Is a Memory.” Critical Inquiry 35.1 (2008): 148-71. <https://www.jstor.org/stable/10.1086/595632>. Curinga, Matthew X. “Critical Analysis of Interactive Media with Software Affordances.” First Monday 19.9 (2014). <https://journals.uic.edu/ojs/index.php/fm/article/view/4757/4116>. Drobnic Holan, Angie, and Amy Sherman. “PolitiFact’s Lie of the Year: Online Smear Machine Tries to Take Down Parkland Students.” PolitiFact 11 Dec. 2018. <http://www.politifact.com/article/2018/dec/11/politifacts-lie-year-parkland-student-conspiracies/>. Kumar, D. Vinay, et al. “URLs Link Rot: Implications for Electronic Publishing.” World Digital Libraries 8.1 (2015): 59-66. March for Our Lives. “Mission and Story.” <https://marchforourlives.com/mission-story/>. Marwick, Alice, and Becca Lewis. Media Manipulation and Misinformation Online. Data & Society Research Institute, 2017. <https://datasociety.net/library/media-manipulation-and-disinfo-online/>. Media Matters Staff. “Alex Jones on Florida High School Shooting: It May Be a False Flag, and Democrats Are Suspects.” Media Matters for America 14 Feb. 2018. <https://www.mediamatters.org/alex-jones/alex-jones-florida-high-school-shooting-it-may-be-false-flag-and-democrats-are-suspects>. Muirhead, Russell, and Nancy L. Rosenblum. A Lot of People Are Saying: The New Conspiracism and the Assault on Democracy. Princeton: Princeton University Press, 2019. “I Posted A 4Chan Link a few days ago, that got deleted here, that mentions the coming Social Media Purge by a YouTube insider. Now we are seeing it happen.” Reddit. <https://www.reddit.com/r/conspiracy/comments/7zqria/i_posted_a_4chan_link_a_few_days_ago_that_got/>. Phillips, Whitney, and Ryan M. Milner. You Are Here: A Field Guide for Navigating Polarized Speech, Conspiracy Theories, and Our Polluted Media Landscape. Cambridge: MIT Press, 2021. r/conspiracy. Reddit. <https://www.reddit.com/r/conspiracy/>. Rhodes, Sarah. “Breaking Down Link Rot: The Chesapeake Project Legal Information Archive's Examination of URL Stability.” Law Library Journal 102. 4 (2010): 581-97. Rice, Jenny. Awful Archives: Conspiracy Theory, Rhetoric, and Acts of Evidence. Columbus: Ohio State UP, 2020. Russo, Carla Herreria. “The Rest of the World Showed Up to March for Our Lives.” Huffington Post 25 Mar. 2018. <https://www.huffpost.com/entry/world-protests-march-for-our-lives_n_5ab717f2e4b008c9e5f7eeca>. “Searching for video of Parkland shooting on bitchute.” Reddit. <https://www.reddit.com/r/conspiracy/comments/ddl1s8/searching_for_video_of_parkland_shooting_on/>. Timberg, Craig, and Drew Harwell. “We Studied Thousands of Anonymous Posts about the Parkland Attack – and Found a Conspiracy in the Making.” Washington Post 27 Feb. 2018. <https://www.washingtonpost.com/business/economy/we-studied-thousands-of-anonymous-posts-about-the-parkland-attack---and-found-a-conspiracy-in-the-making/2018/02/27/04a856be-1b20-11e8-b2d9-08e748f892c0_story.html>. “Video exposing David Hogg and Emma Gonzalez as crisis actors and other strange anomalies involving the parkland shooting.” Reddit. <https://www.reddit.com/r/conspiracy/comments/ae3xxp/video_exposing_david_hogg_and_emma_gonzalez_as/>. Wardle, Claire, and Hossein Derakhshan. Information Disorder: Toward and Interdisciplinary Framework for Research and Policymaking. Council of Europe, 2017. <https://rm.coe.int/information-disorder-toward-an-interdisciplinary-framework-for-researc/168076277c>. Yglesias, Matthew. “The Parkland Conspiracy Theories, Explained.” Vox 22 Feb. 2018. <https://www.vox.com/policy-and-politics/2018/2/22/17036018/parkland-conspiracy-theories>. Zittrain, Jonathan, et al. “The Paper of Record Meets an Ephemeral Web: An Examination of Linkrot and Content Drift within The New York Times.” Social Science Research Network 27 Apr. 2021. <https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3833133>.
APA, Harvard, Vancouver, ISO, and other styles
39

Morgan, Carol. "Capitalistic Ideology as an 'Interpersonal Game'." M/C Journal 3, no. 5 (October 1, 2000). http://dx.doi.org/10.5204/mcj.1880.

Full text
Abstract:
"Outwit, Outplay, Outlast" "All entertainment has hidden meanings, revealing the nature of the culture that created it" ( 6). This quotation has no greater relevance than for the most powerful entertainment medium of all: television. In fact, television has arguably become part of the "almost unnoticed working equipment of civilisations" (Cater 1). In other words, TV seriously affects our culture, our society, and our lives; it affects the way we perceive and approach reality (see Cantor and Cantor, 1992; Corcoran, 1984; Freedman, 1990; Novak, 1975). In this essay, I argue that the American television programme Survivor is an example of how entertainment (TV in particular) perpetuates capitalistic ideologies. In other words, Survivor is a symptom of American economic culture, which is masked as an "interpersonal game". I am operating under the assumption that television works "ideologically to promote and prefer certain meanings of the world, to circulate some meanings rather than others, and to serve some interests rather than others" (Fiske 20). I argue that Survivor promotes ideals on two levels: economic and social. On the economic level, it endorses the pursuit of money, fame, and successful careers. These values are prevalent in American society and have coalesced into the myth of the "American Dream", which stands for the opportunity for each individual to get ahead in life; someone can always become wealthy (see White, 1988; Cortes, 1982; Grambs, 1982; Rivlin, 1992). These values are an integral part of a capitalistic society, and, as I will illustrate later, Survivor is a symptom of these ideological values. On the second level, it purports preferred social strategies that are needed to "win" at the game of capitalism: forming alliances, lying, and deception. Ideology The discussion of ideology is critical if we are to better understand the function of Survivor in American culture. Ideologies are neither "ideal" nor "spiritual," but rather material. Ideologies appear in specific social institutions and practices, such as cultural artefacts (Althusser, For Marx 232). In that way, everyone "lives" in ideologies. Pryor suggests that ideology in cultural practices can operate as a "rhetoric of control" by structuring the way in which people view the world: Ideology `refracts' our social conditions of existence, structuring consciousness by defining for us what exists, what is legitimate and illegitimate, possible and impossible, thinkable and unthinkable. Entering praxis as a form of persuasion, ideology acts as a rhetoric of control by endorsing and legitimising certain economic, social and political arrangements at the expense of others and by specifying the proper role and position of the individual within those arrangements. (4) Similarly, Althusser suggests, "ideology is the system of ideas and representations which dominate the mind of a man or a social group" (Ideology 149). Thus, ideology, for Althusser, represents the way individuals "live" their relations to society (Eagleton 18). Grossberg suggests, "within such positions, textuality is a productive practice whose (imaginary) product is experience itself. Experience can no longer serve as a mediation between the cultural and the social since it is not merely within the cultural but is the product of cultural practices" (409). The "text" for study, then, becomes the cultural practices and structures, which determine humans. Althusser concludes that ideology reifies our affective, unconscious relations with the world, and determines how people are pre-reflectively bound up in social reality (Eagleton 18). Survivor as a Text In the United States, the "reality TV" genre of programming, such as The Real World, Road Rules, and Big Brother (also quite famous in Europe), are currently very popular. Debuting in May, 2000, Survivor is one of the newest additions to this "reality programming." Survivor is a game, and its theme is: "Outwit, Outplay, Outlast". The premise is the following: Sixteen strangers are "stranded" on a remote island in the South China Sea. They are divided into two "tribes" of eight, the "Pagong" and "Tagi." They have to build shelter, catch food, and establish a "new society". They must work together as a team to succeed, but ultimately, they are competitors. The tribes compete in games for "rewards" (luxury items such as food), and also for "immunity". Every third day, they attend a "tribal council" in which they vote one member off the island. Whoever won the "immunity challenge" (as a tribe early in the show, later, as an individual) cannot be voted off. After several episodes, the two tribes merge into one, "Rattana," as they try to "outwit, outlast, and outplay" the other contestants. The ultimate prize is $1,000,000. The Case of Survivor As Althusser (For Marx) and Pryor suggest, ideology exists in cultural artefacts and practices. In addition, Pryor argues that ideology defines for us what is "legitimate and illegitimate," and "thinkable and unthinkable" by "endorsing certain economic and social arrangements" (4). This is certainly true in the case of Survivor. The programme is definitely a cultural artefact that endorses certain practices. In fact, it defines for us the "preferred" economic and social arrangements. The show promotes for us the economic arrangement of "winning" money. It also defines the social arrangements that are legitimate, thinkable, and necessary to win the interpersonal and capitalistic game. First, let us discuss the economic arrangements that Survivor purports. The economic arrangements that Survivor perpetuates are in direct alignment with those of the "game" of capitalism: to "win" money, success, and/or fame (which will lead to money). While Richard, the $1,000,000 prize winner, is the personification of the capitalistic/American Dream come true, the other contestants certainly have had their share of money and fame. For example, after getting voted off the island, many of the former cast members appeared on the "talk show circuit" and have done many paid interviews. Joel Klug has done approximately 250 interviews (Abele, Alexander and Lasswell 62), and Stacey Stillman is charging $1200 for a "few quotes," and $1800 for a full-length interview (Millman et al. 16). Jenna Lewis has been busy with paid television engagements that require cross country trips (Abele, Alexander and Lasswell 63). In addition, some have made television commercials. Both B. B. Andersen and Stacey Stillman appeared in Reebok commercials that were aired during the remaining Survivor episodes. Others are making their way even farther into Hollywood. Most have their own talent agents who are getting them acting jobs. For example, Sean Kenniff is going to appear in a role on a soap opera, and Gervase Peterson is currently "sifting through offers" to act in television situation comedies and movies. Dirk Been has been auditioning for movie roles, and Joel Klug has moved to Los Angeles to "become a star". Even Sonja Christopher, the 63-year-old breast cancer survivor and the first contestant voted off, is making her acting debut in the television show, Diagnosis Murder (Abele, Alexander and Lasswell 57). Finally, two of the women contestants from Survivor were also tempted with a more "risky" offer. Both Colleen Haskell and Jenna Lewis were asked to pose for Playboy magazine. While these women are certainly attractive, they are not the "typical-looking" playboy model. It is obvious that their fame has put them in the mind of Hugh Heffner, the owner of Playboy. No one is revealing the exact amount of the offers, but rumours suggest that they are around $500,000. Thus, it is clear that even though these contestants did not win the $1,000,000, they are using their famous faces to "win" the capitalistic game anyway. Not only does Survivor purport the "preferred" economic arrangements, it also defines for us the social arrangements needed to win the capitalistic game: interpersonal strategy. The theme of the strategy needed to win the game is "nice guys don't last". This is demonstrated by the fact that Gretchen, a nice, strong, capable, and nurturing "soccer mother" was the seventh to be voted off the island. There were also many other "nice" contestants who were eventually voted off for one reason or another. However, on the other hand, Richard, the million-dollar winner, used "Machiavellian smarts" to scheme his way into winning. After the final episode, he said, "I really feel that I earned where I am. The first hour on the island I stepped into my strategy and thought, 'I'm going to focus on how to establish an alliance with four people early on.' I spend a lot of time thinking about who people are and why they interact the way they do, and I didn't want to just hurt people's feelings or do this and toss that one out. I wanted this to be planned and I wanted it to be based on what I needed to do to win the game. I don't regret anything I've done or said to them and I wouldn't change a thing" (Hatch, n.pag.). One strategy that worked to Richard's advantage was that upon arriving to the island, he formed an alliance with three other contestants: Susan, Rudy, and Kelly. They decided that they would all vote the same person off the island so that their chances of staying were maximised. Richard also "chipped in", did some "dirty work", and ingratiated himself by being the only person who could successfully catch fish. He also interacted with others strategically, and decided who to vote off based on who didn't like him, or who was more likeable than him (or the rest of the alliance). Thus, it is evident that being part of an alliance is definitely needed to win this capitalistic game, because the four people who were part of the only alliance on the island were the final contestants. In fact, in Rudy's (who came in third place) final comments were, "my advice for anybody who plays this game is form an alliance and stick with it" (Boesch, n.pag.). This is similar to corporate America, where many people form "cliques", "alliances", or "particular friendships" in order to "get ahead". Some people even betray others. We definitely saw this happen in the programme. This leads to another essential ingredient to the social arrangements: lying and deception. In fact, in episode nine, Richard (the winner) said to the camera, "outright lying is essential". He also revealed that part of his strategy was making a big deal of his fishing skills just to distract attention from his schemings. He further stated, "I'm not still on the island because I catch fish, I'm here because I'm smart" (qtd. in Damitol, n.pag.). For example, he once thought the others did not appreciate his fishing skills. Thus, he decided to stop fishing for a few days so that the group would appreciate him more. It was seemingly a "nasty plan", especially considering that at the time, the other tribe members were rationing their rice. However, it was this sort of behaviour that led him to win the game. Another example of the necessity for lying is illustrated in the fact that the alliance of Richard, Rudy, Sue, and Kelly (the only alliance) denied to the remaining competitors that they were scheming. Sue even blatantly lied to the Survivor host, Jeff Probst, when he asked her if there was an alliance. However, when talking to the cameras, they freely admitted to its existence. While the alliance strategy worked for most of the game, in the end, it was destined to dissolve when they had to start voting against each other. So, just as in a capitalistic society, it is ultimately, still "everyone for her/himself". The best illustration of this fact is the final quote that Kelly made, "I learned early on in the game [about trust and lying]. I had befriended her [Sue -- part of Kelly's alliance]; I trusted her and she betrayed me. She was lying to me, and was plotting against me from very early on. I realised that and I knew that. Therefore I decided not to trust her, not to be friends with her, not to be honest with her, for my own protection" (Wiglesworth, n.pag.). Therefore, even within the winning alliance, there was a fair amount of distrust and deception. Conclusion In conclusion, I have demonstrated how Survivor promotes ideals on two levels: economic and social. On the economic level, it endorses the pursuit of money, fame, and successful careers. On the social level, it purports preferred interpersonal strategies that are needed to "win" at the game of capitalism. In fact, it promotes the philosophy that "winning money at all costs is acceptable". We must win money. We must lie. We must scheme. We must deceive. We must win fame. Whether or not the audience interpreted the programme this way, what is obvious to everyone is the following: six months ago, the contestants on Survivor were ordinary American citizens; now they are famous and have endless opportunities for wealth. References Abele, R., M. Alexander and M. Lasswell. "They Will Survive." TV Guide 48.38 (2000): 56-63. Althusser, L. For Marx. Trans. Ben Brewster. New York: Vintage Books, 1969, 1970. ---. "Ideology and Ideological State Apparatuses." Lenin and Philosophy and Other Essays. Trans. Ben Brewster. London: New Left Books, 1971. ---. Philosophy and the Spontaneous Philosophy of the Scientists. Trans. Ben Brewster. London: Verso, 1990. Boesch, R. "Survivor Profiles: Rudy." CBS Survivors Website. 2000. 26 Sep. 2000 <http://www.cbs.com/primetime/survivor/survivors/rudy_f.shtml>. Cantor, M.G., and J. M. Cantor. Prime Time Television Content and Control. Newbury Park: Sage Publications, 1992. Cater, D. "Television and Thinking People." Television as a Social Force: New Approaches to TV Criticism. Ed. D. Cater and R. Adler. New York: Praeger Publications, 1975. 1-8. Corcoran, F. "Television as Ideological Apparatus: The Power and the Pleasure." Critical Studies in Mass Communication 1 (1984): 131-45. Cortes, C. E. "Ethnic Groups and the American Dream(s)." Social Education 47.6 (1982): 401-3. Damitol. "Episode 9A -- 'Oh God! My Eyes! My Eyes!' or 'Richard Gets Nekkid'." Survivorsucks.com. 2000. 16 Oct. 2000 <http://www.survivorsucks.com/summaries.s1.9a.php>. Eagleton, T. Ideology: An Introduction. London: Verso, 1991. Ellis, K. "Queen for One Day at a Time." College English 38.8 (1977): 775-81. Freedman, C. "History, Fiction, Film, Television, Myth: The Ideology of M*A*S*H." The Southern Review 26.1 (1990): 89-106. Grambs, J. D. "Mom, Apple Pie, and the American Dream." Social Education 47.6 (1982): 405-9. Grossberg, L. "Strategies of Marxist Cultural Interpretation." Critical Studies in Mass Communication 1 (1984): 392-421. Jones, G. Honey, I'm Home! Sitcoms Selling the American Dream. New York: Grove Weidenfeld, 1992. Hatch, R. "Survivor Profiles: Richard." CBS Survivors Website. 2000. 26 Sep. 2000 <http://www.cbs.com/primetime/survivor/survivors/richard_f.shtml>. Hofeldt, R. L. "Cultural Bias in M*A*S*H." Society 15.5 (1978): 96-9. Lichter, S. R., L. S. Lichter, and S. Rothman. Watching America. New York: Prentice Hall, 1991. Millman, J., J. Stark, and B. Wyman. "'Survivor,' Complete." Salon Magazine 28 June 2000. 16 Oct. 2000 <http://www.salon.com/ent/tv/feature/2000/06/28/survivor_episodes/index.php>. Novak, M. "Television Shapes the Soul." Television as a Social Force: New Approaches to TV Criticism. Ed. D. Cater and R. Adler. New York: Praeger Publications, 1975. 9-20. Pryor, R. "Reading Ideology in Discourse: Charting a Rhetoric of Control." Unpublished Essay. Northern Illinois University, 1992. Rivlin, A. M. Reviving the American Dream. Washington, D. C.: The Brookings Institution, 1992. White, J. K. The New Politics of Old Values. Hanover: UP of New England, 1988. Wiglesworth, K. "Survivor Profiles: Kelly." CBS Survivors Website. 2000. 26 Sep. 2000 <http://www.cbs.com/primetime/survivor/survivors/kelly_f.shtml>. Citation reference for this article MLA style: Carol Morgan. "Capitalistic Ideology as an 'Interpersonal Game': The Case of Survivor." M/C: A Journal of Media and Culture 3.5 (2000). [your date of access] <http://www.api-network.com/mc/0010/survivor.php>. Chicago style: Carol Morgan, "Capitalistic Ideology as an 'Interpersonal Game': The Case of Survivor," M/C: A Journal of Media and Culture 3, no. 5 (2000), <http://www.api-network.com/mc/0010/survivor.php> ([your date of access]). APA style: Carol Morgan. (2000) Capitalistic Ideology as an 'Interpersonal Game': The Case of Survivor. M/C: A Journal of Media and Culture 3(5). <http://www.api-network.com/mc/0010/survivor.php> ([your date of access]).
APA, Harvard, Vancouver, ISO, and other styles
40

Hoffman, David, Ashley Stewart, Jennifer Breznay, Kara Simpson, and Johanna Crane. "Vaccine Hesitancy Narratives." Voices in Bioethics 7 (October 18, 2021). http://dx.doi.org/10.52214/vib.v7i.8789.

Full text
Abstract:
Photo by Hush Naidoo Jade Photography on Unsplash INTRODUCTION In this collection of narratives, the authors describe their own experiences with and reflections on healthcare worker vaccine hesitancy. The narratives explore each author’s engagement with different communities experiencing vaccine hesitancy, touching on reasons for hesitancy, proposed solutions, and legal aspects. Author’s names appear above their narratives. l. Johanna T. Crane Vaccine hesitancy, defined as “a delay of acceptance or refusal of vaccination despite the availability of vaccination services,”[1] is a worldwide but locally shaped phenomenon that pre-dates the COVID-19 pandemic.[2] Contrary to some portrayals, vaccine hesitancy is not the same as the more absolute antivaccination stance, or what some call “anti-vax.” Many people who are hesitant are not ideologically opposed to vaccines. Hesitancy is also sometimes framed as anti-science, yet reluctance to vaccinate is often about managing risk, trustworthiness, and doubt in the context of uncertainty; it represents an effort to “talk back to science” about unaddressed needs and concerns.[3] In the US, the newness of the vaccines, the unprecedented speed at which they were developed, and their remaining under emergency use authorization at first complicated public confidence. Political polarization and racial and social inequality shape vaccine acceptance and public distrust as well. While vaccine acceptance has increased in the months since the vaccines first became available, many eligible individuals have not yet been vaccinated, including a significant number of healthcare workers.[4] Vaccine hesitancy among healthcare workers may seem surprising, especially given their frontline experience – I confess that it surprised me at first. But when I began interviewing health care workers for a study on COVID vaccine roll-out at community health centers, I learned to take a more complex view. Although the study was focused on patient vaccine access,[5] many of the frontline health care workers we spoke with also described hesitancy among some of their colleagues (and, in a few cases, themselves). From these conversations, I learned that these “healthcare heroes” are also regular people and members of communities. Their concerns about COVID vaccination often reflect the prevailing concerns advanced in their communities, such as worries about vaccine side effects and safety. Like other workers, some fear missing work and losing income, as not all healthcare employers offer paid time off for vaccination or recovery. (Importantly, reluctance to vaccinate is highest among healthcare workers in lower-paid positions with little job security, such as clerks, housekeepers, patient care assistants, and home health aides.)[6] For some healthcare workers of color, the protection offered by the vaccine sits in tension with both current and historical experiences of medical abuse and neglect. Some interviewees, fully vaccinated themselves, rejected the framework of “hesitancy” entirely, arguing that Black and Brown reluctance to be vaccinated first should be understood through the lens of “self-protection”. Due to the nature of their work, healthcare workers have faced great social pressure to vaccinate and vaccinate first. This is understandable, given that vaccination against COVID-19 protects not only workers themselves but aligns with the ethical duty to prevent harm to patients by reducing the risk of transmission in healthcare settings. When the FDA approved COVID-19 vaccines under emergency use authorization in December 2020, many healthcare workers were extremely grateful to be designated “1a” – the first group prioritized to receive the shots.[7] For many bioethicists, prioritization of healthcare workers represented a recognition of the extreme risks that many front-line workers had endured since the onset of the pandemic, including critical shortages in PPE. But it is important to remember that for some workers, going first may have felt like serving as guinea pigs for new vaccines that had yet to be granted full FDA approval. For these individuals, the expectation that they would vaccinate first may have felt like an additional risk rather than a reward. Healthcare workers who are hesitant to vaccinate may feel ashamed or be subject to shaming by others;[8] this may make it difficult to discuss their concerns in the workplace. Throughout the pandemic, healthcare workers have been lauded as “heroes”, and some healthcare employers have promoted vaccination among their workforce as a “heroic” action. This messaging implies that waiting to vaccinate is shameful or cowardly and is echoed in opinion pieces and op-eds describing unvaccinated people as “selfish” or “free riders.”[9] By fostering the proper dialogue, we can respond respectfully to hesitancy among healthcare workers while still working towards the goal of increased vaccination. We in the bioethics and medical community should be willing to listen to our colleagues’ concerns with respect. Top-down approaches aimed at “correcting” hesitancy cannot address the more fundamental issues of trust that are often at stake. Instead, there must be dialogue over time. Conversations with a trusted healthcare provider have a crucial role.[10] Blaming and shaming rhetoric, whether explicit or implicit, gets us nowhere – in fact, it likely moves us backward by likely exacerbating any existing distrust or resentment that workers may hold toward their employers.[11] Lastly, the onus of trust must be with institutions, not individuals. There is a lot of talk about getting communities of color, and Black people, particularly, to "trust" healthcare institutions and the COVID vaccines. This racializes trust and puts the burden on harmed communities rather than on institutions acting in trustworthy ways.[12] Dialogue, respect, and trustworthiness must guide us even in the new era of workplace mandates. Mandates make these strategies even more important as we look toward an uncertain future. As Heidi Larson, founder of the Vaccine Confidence Project, recently said, “We should not forget that we are making people's future history now. Are people going to remember that they were treated respectfully and engaged?”[13] ll. Kara Simpson Since the release of the vaccine for COVID-19 in late 2020, there have been robust discussions within the medical community, the media, and political arenas about vaccine hesitancy among healthcare workers. The public became aware that healthcare workers, the first group to become eligible for the vaccine, were not rushing to “take the shot.” Many people’s opinions were aligned by race, ethnicity, socioeconomic status, and political affiliation. People of color were one of the first groups to be labeled vaccine hesitant as our experiences of distrust of the medical community and the politicization of the vaccine explained the low turnout.[14] It was not uncommon to hear, “this vaccine just came out; let’s wait and see if there are side effects.” Interestingly, many people in the healthcare community and in the public did not understand why healthcare workers of color remained hesitant. Trust is a vital component of any viable relationship, especially in the clinical realm. To have successful health outcomes, it is essential for clinicians to build trusting relationships with their patients and peers. Many people of color are distrustful towards the medical institution due to the years of systemic racism and abuses that they have experienced, witnessed, or learned about. Healthcare workers of color are not excluded from the experiences of their communities outside of work. In fact, I assert that healthcare of color may have an additional burden of hesitation because of their lived experiences of distrust in receiving care and inequality within their professional environment. These dual traumas can work in tandem to strengthen hesitancy. I assert that building trusting clinical relationships will address hesitancy over time. Currently, many healthcare workers are worried about vaccine mandates. For a group of people that have experienced intergenerational enslavement and marginalization, mandates feel coercive and serve as a reminder of how “lesser” bodies are considered unworthy of voice, fundamental human rights, independent decision making. To call the vaccine mandate paternalistic would be an understatement. An unintended result of vaccine mandates will be the reinforcement of hesitancy and distrust of the medical institution as trust and coercion cannot coexist. This mandate will give more power to the conspiracy theories and harm those who already do not seek or receive adequate health care because of systemic inequalities. Furthermore, mandates can also dissuade people of color from becoming healthcare workers, and others may leave the field. In essence, vaccine hesitancy is a symptom of a much larger problem: the distrust of the medical establishment. As bioethicists, our mission should be to support interventions that foster “trustworthiness” of the institutions rather than those that cause trauma. Several organizations have proposed mask mandates and weekly testing as a measure to protect the population at large and still respect the autonomy of the unvaccinated.[15] lll. Jennifer Breznay I work in a very large community teaching hospital in Brooklyn, and we were extremely hard hit by COVID in March 2020. I worked on inpatient medical units and witnessed a lot of suffering. And after nine months of fear and despair about COVID’s toll, I felt tremendous frustration in December when I heard that many healthcare workers would reject the vaccine. As the co-chair of the Bioethics Committee, I drafted a statement recommending vaccination for all employees. When the draft was revised and approved by the Bioethics Committee, I began to discuss it with employees, and I appreciated different perspectives I had not heard before. In the end, rather than releasing the statement, we directed our efforts at creating a dialogue. I also volunteer at a not-for-profit which operates seven early childhood education centers in Northern Brooklyn. The Executive Director invited me to collaborate on strategies to encourage staff vaccination, and we decided to offer a Zoom conference to 20 members of the staff. I was extremely nervous about how the audience would perceive me, a white doctor whom they did not know. I felt awkward about coming to them with an agenda. And there was also the question of whether I was an appropriate messenger compared to a person of color. Yet, I felt like I shouldn't back away from this. So, I chose to simply disclose my discomfort at the beginning of the Zoom. I said, “Thanks for having me. You know, as a white physician, I understand you might have concerns about trusting what I say. Four hundred years of inequity and abuse by the healthcare system can create a lot of mistrust, but I’m here to try to answer your questions.” Ultimately the Executive Director reported that the Zoom was successful in stimulating a lot of conversation among the staff about the vaccine. I think the critical piece is the intimate but open conversation, where you can elicit values. lV. Ashley L. Stewart In the rural areas of our state, healthcare institutions are inextricably tied to their communities. Rural hospitals hire from, serve, and function in the community where they are located. Successful implementation of a vaccine roll-out in such rural areas requires explicit recognition of the role and influence of the community. After identifying issues common to the area, rural institutions can address them. Even when rural institutions find that healthcare worker concerns seem to be unique or personal, they are often related to the larger concerns of the community.[16] Community-based increased vaccine hesitancy may coincide with an underlying issue, such as lack of information rather than principled or experience-based resistance.[17] When the vaccines became available, rural vaccination coordinators encountered a wealth of misinformation that left many people initially undecided. Compounding this lack of information, workers expressed a sense of fear about the professional consequences of voicing concerns, especially in tight-knit communities. Many workers expressed concern about being judged merely for sharing their questions or decisions.[18] They also felt that saying or doing something to promote the value of vaccination might change their relationship with members of the community where they live and work.[19] As there was a fear of engaging in productive conversations, it was difficult for them to find valuable information, and the lack of information discouraged them from being vaccinated. Vaccine coordinators wanted to get information to the entire community based on the most current research and release unbiased, consistent, and timely information from sources all people in the community could trust, including from multiple sources at once. Communication must focus on answering many types of questions, which must often be done in private or anonymously. Where poorly supported or incorrect information is widely available, sharing objective information is crucial to turning the tide of distrust. If the healthcare community dismisses concerns or assumes that answering questions based on misinformation is a waste of time, the community-based institutions will further the distrust. Some may feel that vaccine coordinators should not address misinformation directly, yet avoidance has been widely unsuccessful.[20] Being respectful and non-judgmental in answering questions posed by people who do not know what is true can be hard, but in rural communities, answering completely and honestly without judgment is a critical component of any effort to inform people. Telling people to get vaccinated “for the greater good” can sound the same as being told not to get a vaccine because it is “bad” if both sources of information fail to back up their claims. Ultimately rural institutions are respected because they are a resource to their communities, a priority we must preserve. It is also critical to treat everyone respectfully regardless of vaccine status.[21] People may perceive mandates, divisive policies, or disrespectful treatment of people based on vaccination status as discriminatory or coercive, weakening the appeal of vaccination. Such practices may make people less trusting and more anchored to their position as they come to see vaccination proponents as untrustworthy or authoritarian. We must work to maintain respect for human autonomy. Using unethical means to achieve even a just end will not lead to a “greater good” but rather to the perception that people in positions of authority would achieve a result “by any means necessary.” V. David N. Hoffman The central moral quandary that arises whenever vaccine hesitancy among healthcare workers is discussed is whether workers who refuse to get vaccinated should or could be fired. We should clarify that we are applying a definition of mandate in the employment context for private employers, the violation of which results in loss of employment. Government-controlled provider organizations are just now weighing in on this topic and are generally pursuing strategies that impose periodic, usually weekly, testing requirements for those workers who decline to get vaccinated. In the private sector, employers can require their employees to do a great many things as a condition of employment, and one of them is to get vaccinated against COVID -19. In the most prominent case to date, just such a mandate gave rise to a lawsuit in Texas involving Houston Methodist Hospital. In that case, 170 employees asserted that an employer should not be allowed to force them to get vaccinated. The judge held that, while no employer can force an employee to get vaccinated, no employer is obligated to continue the employment of any employee who declines to follow rules established by that employer, including the obligation to get vaccinated.[22] In Texas, what the judge said is you are not being forced to get vaccinated, but your employer is allowed to set limits and conditions on employment, including vaccination. Employees do not have an obligation to get vaccinated, but they also have no right to their jobs. That is because of a widely misunderstood legal concept: “employment at will.” Employment at will sounds like a rule that employees can do what they want at work, but in fact, employment at will means only that you can quit your job whenever you want (we do not permit indentured servitude). At the same time, your employer can fire you at any time, for any reason or no reason, unless the reason is a pretext and involves one of the protected statuses (race, color, religion, sex, or national origin, and in some jurisdictions gender orientation, gender identity). Generally, any employers, including hospitals, can decide that if someone is not willing to get a vaccination, or if they are not willing to complete sexual harassment training or participate in the hospital’s infection control program, that is the employee’s right, but it will mean that an employer can similarly decline to continue providing employment. The evolution of this hesitancy discussion will be influenced by the narrower debate playing out in the court of public opinion, and the courts of law, over the enforceability of New York’s recently enacted vaccine mandate. Regardless of whether that mandate survives, with or without medical and religious exemptions, healthcare employers will be left with a profound ethical dilemma. At the end of all the litigation, if there is a religious exemption, employers will always be burdened with the responsibility to determine whether an individual employee has asserted a genuine and sincere religious objection to vaccination and whether the employer is able to provide an accommodation that is safe and effective in protecting the interests of co-workers and patients. The anticipated federal mandate, which reportedly will have a test/mask alternative, will only make this ethical task more challenging. This leads to the final point in this analysis, which is that while private employers, including hospitals, can deprive an individual of their employment if those individuals refuse to get vaccinated, just because an employer can do so does not mean it should do so.[23] - [1] MacDonald NE. Vaccine hesitancy: Definition, scope and determinants. Vaccine. 2015;33(34):4161-4164. doi:10.1016/j.vaccine.2015.04.036 [2] Larson HJ, de Figueiredo A, Xiahong Z, et al. The State of Vaccine Confidence 2016: Global Insights Through a 67-Country Survey. EBioMedicine. 2016;12:295-301. doi:10.1016/j.ebiom.2016.08.042 [3] Larson H. Stuck: How Vaccine Rumors Start - and Why They Don’t Go Away. Oxford University Press; 2020; Benjamin R. Informed Refusal: Toward a Justice-based Bioethics. Sci Technol Hum Values. 2016;41(6):967-990. doi:10.1177/0162243916656059 [4] Deepa Shivaram, In The Fight Against COVID, Health Workers Aren't Immune To Vaccine Misinformation September 18, 2021. NPR Special Series: The Coronavirus. https://www.npr.org/2021/09/18/1037975289/unvaccinated-covid-19-vaccine-refuse-nurses-heath-care-workers [5] Crane JT, Pacia D, Fabi R, Neuhaus C, and Berlinger N. Advancing Covid vaccination equity at Federally Qualified Health Centers: A rapid qualitative review. Accepted and awaiting publication at JGIM. [6] Ashley Kirzinger. “KFF/The Washington Post Frontline Health Care Workers Survey - Vaccine Intentions.” KFF, 22 Apr. 2021, https://www.kff.org/report-section/kff-washington-post-frontline-health-care-workers-survey-vaccine-intentions/. [7] Johanna Crane, Samuel Reis-Dennis and Megan Applewhite. “Prioritizing the ‘1a’: Ethically Allocating Scarce Covid Vaccines to Health Care Workers.” The Hastings Center, 21 Dec. 2020, https://www.thehastingscenter.org/prioritizing-the-1a-ethically-allocating-covid-vaccines-to-health-care-workers/. [8] “'I'm Not an Anti-Vaxxer, but...' US Health Workers' Vaccine Hesitancy Raises Alarm.” The Guardian, Guardian News and Media, 10 Jan. 2021, https://www.theguardian.com/world/2021/jan/10/coronavirus-covid-19-vaccine-hesitancy-us-health-workers. [9] Gerson M. If you are healthy and refuse to take the vaccine, you are a free-rider. Washington Post. April 15, 2021. [10] Crane JT, Pacia D, Fabi R, Neuhaus C, and Berlinger N. Advancing Covid vaccination equity at Federally Qualified Health Centers: A rapid qualitative review. Accepted and awaiting publication at JGIM. [11] Larson H. Stuck : How Vaccine Rumors Start - and Why They Don’t Go Away. Oxford University Press; 2020. [12] Benjamin R. Race for Cures: Rethinking the Racial Logics of ‘Trust’ in Biomedicine. Sociology Compass. 2014;8(6):755-769. doi:10.1111/soc4.12167; Warren RC, Forrow L, David Augustin Hodge S, Truog RD. Trustworthiness before Trust — Covid-19 Vaccine Trials and the Black Community. N Engl J Med. Published online October 16, 2020. doi:10.1056/NEJMp2030033 [13] Offri D. Heidi Larson, Vaccine Anthropologist. New Yorker. Published online June 12, 2021. Accessed August 11, 2021. https://www.newyorker.com/science/annals-of-medicine/heidi-larson-vaccine-anthropologist [14] Razai M S, Osama T, McKechnie D G J, Majeed A. Covid-19 Vaccine Hesitancy Among Ethnic Minority Groups. BMJ 2021; 372 :n513 doi:10.1136/bmj.n513 [15] Dasgupta, Sharoda, et al. “Differences in Rapid Increases in County-Level COVID-19 Incidence by Implementation of Statewide Closures and Mask Mandates — United States, June 1–September 30, 2020.” Annals of Epidemiology, vol. 57, Sept. 2021, pp. 46–53., https://doi.org/10.1016/j.annepidem.2021.02.006. [16] Do, Tuong Vi C et al. “COVID-19 Vaccine Acceptance Among Rural Appalachian Healthcare Workers (Eastern Kentucky/West Virginia): A Cross-Sectional Study.” Cureus vol. 13,8 e16842. 2 Aug. 2021, doi:10.7759/cureus.16842; Danabal, K.G.M., Magesh, S.S., Saravanan, S. et al. Attitude towards COVID 19 vaccines and vaccine hesitancy in urban and rural communities in Tamil Nadu, India – a community-based survey. BMC Health Serv Res 21, 994 (2021). https://doi.org/10.1186/s12913-021-07037-4 [17] Scott C. Ratzan MD, MPA, MA, Lawrence O. Gostin JD, Najmedin Meshkati PhD, CPE, Kenneth Rabin PhD & Ruth M. Parker MD (2020) COVID-19: An Urgent Call for Coordinated, Trusted Sources to Tell Everyone What They Need to Know and Do, Journal of Health Communication, 25:10, 747-749, DOI: 10.1080/10810730.2020.1894015 [18] Huang, Pien. “Some Health Care Workers Are Wary of Getting COVID-19 Vaccines.” NPR, NPR, 1 Dec. 2020, https://www.npr.org/sections/health-shots/2020/12/01/940158684/some-health-care-workers-are-wary-of-getting-covid-19-vaccines. Portnoy, Jenna. “Several Hundred Virginia Health-Care Workers Have Been Suspended or Fired over Coronavirus Vaccine Mandates.” The Washington Post, WP Company, 4 Oct. 2021, https://www.washingtonpost.com/local/covid-vaccine-mandate-hospitals-virginia/2021/10/01/b7976d16-21ff-11ec-8200-5e3fd4c49f5e_story.html. [19] Jennifer A. Lueck & Alaina Spiers (2020) Which Beliefs Predict Intention to Get Vaccinated against COVID-19? A Mixed-Methods Reasoned Action Approach Applied to Health Communication, Journal of Health Communication, 25:10, 790-798, DOI: 10.1080/10810730.2020.1865488 [20] Lockyer, Bridget, et al. “Understanding Covid-19 Misinformation and Vaccine Hesitancy in Context: Findings from a Qualitative Study Involving Citizens in Bradford, UK.” Health Expectations, vol. 24, no. 4, 4 May 2021, pp. 1158–1167., https://doi.org/10.1101/2020.12.22.20248259. Scott C. Ratzan & Ruth M. Parker (2020) Vaccine Literacy—Helping Everyone Decide to Accept Vaccination, Journal of Health Communication, 25:10, 750-752, DOI: 10.1080/10810730.2021.1875083. [21] Zimmerman, Anne. Columbia Academic Commons, 2020, Toward a Civilized Vaccination Discussion: Abandoning the False Assumption That Scientific Goals Are Shared by All, https://academiccommons.columbia.edu/doi/10.7916/d8-rzh0-1f73. [22] Bridges, et al v. Houston Methodist Hospital et al, https://docs.justia.com/cases/federal/districtcourts/texas/txsdce/4:2021cv01774/1830373/18 [23] David N. Hoffman, “Vaccine Mandates for Health Care Workers Raise Several Ethical Dilemmas,” Hasting Center Bioethics Forum. August 2021. https://www.thehastingscenter.org/vaccine-mandates-for-health-care-workers-raise-several-ethical-dilemmas/
APA, Harvard, Vancouver, ISO, and other styles
41

McGuire, Mark. "Ordered Communities." M/C Journal 7, no. 6 (January 1, 2005). http://dx.doi.org/10.5204/mcj.2474.

Full text
Abstract:
A rhetoric of freedom characterises much of the literature dealing with online communities: freedom from fixed identity and appearance, from the confines of geographic space, and from control. The prevailing view, a combination of futurism and utopianism, is that the lack of order in cyberspace enables the creation of social spaces that will enhance personal freedom and advance the common good. Sherry Turkle argues that computer-mediated communication allows us to create a new form of community, in which identity is multiple and fluid (15-17). Marcos Novak celebrates the possibilities of a dematerialized, ethereal virtual architecture in which the relationships between abstract elements are in a constant state of flux (250). John Perry Barlow employs the frontier metaphor to frame cyberspace as an unmapped, ungoverned territory in which a romantic and a peculiarly American form of individualism can be enjoyed by rough and ready pioneers (“Crime” 460). In his 1993 account as an active participant in The WELL (Whole Earth ‘Lectronic Link), one of the earliest efforts to construct a social space online, Howard Rheingold celebrates the freedom to create a “new kind of culture” and an “authentic community” in the “electronic frontier.” He worries, however, that the freedom enjoyed by early homesteaders may be short lived, because “big power and big money” might soon find ways to control the Internet, just as they have come to dominate and direct other communications media. “The Net,” he states, “is still out of control in fundamental ways, but it might not stay that way for long” (Virtual Community 2-5). The uses of order and disorder Some theorists have identified disorder as a necessary condition for the development of healthy communities. In The Uses of Disorder (1970), Richard Sennett argues that “the freedom to accept and to live with disorder” is integral to our search for community (xviii). In his 1989 study of social space, Ray Oldenburg maintains that public hangouts, which constitute the heart of vibrant communities, support sociability best when activities are unplanned, unorganized, and unrestricted (33). He claims that without the constraints of preplanned control we will be more in control of ourselves and more aware of one another (198). More recently, Charles Landry suggests that “structured instability” and “controlled disruption,” resulting from competition, conflict, crisis, and debate, make cities less comfortable but more exciting. Further, he argues that “endemic structural disorder” requiring ongoing adjustments can generate healthy creative activity and stimulate continual innovation (156-58). Kevin Robins, too, believes that any viable social system must be prepared to accept a level of uncertainty, disorder, and fear. He observes, however, that techno-communities are “driven by the compulsion to neutralize,” and they therefore exclude these possibilities in favour of order and security (90-91). Indeed, order and security are the dominant characteristics that less idealistic observers have identified with cyberspace. Alexander Galloway explains how, despite its potential as a liberating development, the Internet is based on technologies of control. This control is exercised at the code level through technical protocols, such as TCP/IP, DNS, and HTM, that determine disconnections as well as connections (Galloway). Lawrence Lessig suggests that in our examination of the ownership, regulation, and governance of the virtual commons, we must take into account three distinct layers. As well as the “logical” or “code” layer that Galloway foregrounds, we should also consider the “physical” layer, consisting of the computers and wires that carry Internet communications, and the “content” layer, which includes everything that we see and hear over the network. In principle, each of these layers could be free and unorganized, or privately owned and controlled (Lessig 23). Dan Schiller documents the increasing privatization of the Net and argues that corporate cyberspace extends the reach of the market, enabling it to penetrate into areas that have previously been considered to be part of the public domain. For Schiller, the Internet now serves as the main production and control mechanism of a global market system (xiv). Checking into Habbo Hotel Habbo Hotel is an example of a highly ordered and controlled online social space that uses community and game metaphors to suggest something much more open and playful. Designed to attract the teenage market, this graphically intensive cartoon-like hotel is like an interactive Legoland, in which participants assemble a toy-like “Habbo” character and chat, play games, and construct personal environments. The first Habbo Hotel opened its doors in the United Kingdom in 2000, and, by September 2004, localized sites were based in a dozen countries, including Canada, the Unites States, Finland, Japan, Switzerland and Spain, with further expansion planned. At that time, there were more than seventeen million registered Habbo characters worldwide with 2.3 million unique visitors each month (“Strong Growth”). The hotel contains thousands of private rooms and twenty-two public spaces, including a welcome lounge, three lobbies, cinema, game hall, café, pub, and an extensive hallway. Anyone can go to the Room-O-Matic and instantly create a free guest room. However, there are a limited number of layouts to choose from and the furnishings, which must be purchased, have be chosen from a catalog of fixed offerings. All rooms are located on one of five floors, which categorize them according to use (parties, games, models, mazes, and trading). Paradoxically, the so-called public spaces are more restricted and less public than the private guest quarters. The limited capacity of the rooms means that all of the public spaces are full most of the time. Priority is given to paying Habbo Club members and others are denied entry or are unceremoniously ejected from a room when it becomes full. Most visitors never make it into the front lobby. This rigid and restricted construction is far from Novak’s vision of a “liquid architecture” without barriers, that morphs in response to the constantly changing desires of individual inhabitants (Novak 250). Before entering the virtual hotel, individuals must first create a Lego-like avatar. Users choose a unique name for their Habbo (no foul language is allowed) and construct their online persona from a limited selection and colour of body parts. One of two different wardrobes is available, depending on whether “Boy” or “Girl” is chosen. The gender of every Habbo is easily recognizable and the restricted wardrobe results in remarkably similar looking young characters. The lack of differentiation encourages participants to treat other Habbos as generic “Boys” or “Girls” and it encourages limited and predictable conversations that fit the stereotype of male-female interactions in most chat sites. Contrary to Turkle’s contention that computer mediated communication technologies expose the fallacy of a single, fixed, identity, and free participants to experiment with alternative selves (15-17), Habbo characters are permitted just one unchangeable name, and are capable of only limited visual transformations. A fixed link between each Habbo character and its registered user (information that is not available to other participants) allows the hotel management to track members through the site and monitor their behavior. Habbo movements are limited to walking, waving, dancing and drinking virtual alcohol-free beverages. Movement between spaces is accomplished by entering a teleport booth, or by selecting a location by name from the hotel Navigator. Habbos cannot jump, fly or walk through objects or other Habbos. They have no special powers and only a limited ability to interact with objects in their environment. They cannot be hurt or otherwise affected by anything in their surroundings, including other Habbos. The emphasis is on safety and avoidance of conflict. Text chat in Habbo Hotel is limited to one sixty-one-character line, which appears above the Habbo, floats upward, and quickly disappears off the top of the screen. Text must be typed in real time while reading on-going conversations and it is not possible to archive a chat sessions or view past exchanges. There is no way of posting a message on a public board. Using the Habbo Console, shorter messages can also be exchanged between Habbos who may be occupying different rooms. The only other narratives available on the site are in the form of official news and promotions. Before checking into the hotel, Habbos can stop to read Habbo Today, which promotes current offers and activities, and HabboHood Happenings, which offers safety tips, information about membership benefits, jobs (paid in furniture), contest winners, and polls. According to Rheingold, a virtual community can form online when enough people participate in meaningful public discussions over an extended period of time and develop “webs of personal relationships” (Virtual Community 5). By restricting communication to short, fleeting messages between individual Habbos, the hotel frustrates efforts by members to engage in significant dialogue and create a viable social group. Although “community” is an important part of the Habbo Hotel brand, it is unlikely to be a substantial part of the actual experience. The virtual hotel is promoted as a safe, non-threatening environment suitable for the teenagers is designed to attract. Parents’ concerns about the dangers of an unregulated chat space provide the hotel management with a justification for creating a highly controlled social space. The hotel is patrolled twenty-four hours a day by professional moderators backed-up by a team of 180 volunteer “Hobbas,” or guides, who can issue warnings to misbehaving Habbos, or temporarily ban them from the site. All text keyed in by Habbos passes through an automated “Bobba Filter” that removes swearing, racist words, explicit sexual comments and “anything that goes against the “Habbo Way” (“Bad Language”). Stick to the rules and you’ll have fun, Habbos are told, “break them and you’ll get yourself banned” (“Habbo Way”). In Big Brother fashion, messages are displayed throughought the hotel advising members to “Stay safe, read the Habbohood Watch,” “Never give out your details!” and “Obey the Habbo way and you’ll be OK.” This miniature surveillance society contradicts Barlow’s observation that cyberspace serves as “a perfect breeding ground for both outlaws and new ideas about liberty” (“Crime” 460). In his manifesto declaring the independence of cyberspace from government control, he maintains that the state has no authority in the electronic “global social space,” where, he asserts, “[w]e are forming our own Social Contract” based on the Golden Rule (“Declaration”). However, Habbo Hotel shows how the rule of the marketplace, which values profits more than social practices, can limit the freedoms of online civil society just as effectively as the most draconian government regulation. Place your order Far from permitting the “controlled disruption” advocated by Landry, the hotel management ensures that nothing is allowed to disrupt their control over the participants. Without conflict and debate, there are few triggers for creative activity in the site, which is designed to encourage consumption, not community. Timo Soininen, the managing director of the company that designed the hotel, states that, because teenagers like to showcase their own personal style, “self-expression is the key to our whole concept.” However, since it isn’t possible to create a Habbo from scratch, or to import clothing or other objects from outside the site, the only way for members to effectively express themselves is by decorating and furnishing their room with items purchased from the Habbo Catalogue. “You see, this,” admits Soininen, “is where our revenue model kicks in” (Shalit). Real-world products and services are also marketed through ads and promotions that are integrated into chat, news, and games. The result, according to Habbo Ltd, is “the ideal vehicle for third party brands to reach this highly desired 12-18 year-old market in a cost-effective and creative manner” (“Habbo Company Profile”). Habbo Hotel is a good example of what Herbert Schiller describes as the corporate capture of sites of public expression. He notes that, when put at the service of growing corporate power, new technologies “provide the instrumentation for organizing and channeling expression” (5-6). In an afterword to a revised edition of The Virtual Community, published in 2000, Rheingold reports on the sale of the WELL to a privately owned corporation, and its decline as a lively social space when order was imposed from the top down. Although he believes that there is a place for commercial virtual communities on the Net, he acknowledges that as economic forces become more entrenched, “more controls will be instituted because there is more at stake.” While remaining hopeful that activists can leverage the power of many-to-many communications for the public good, he wonders what will happen when “the decentralized network infrastructure and freewheeling network economy collides with the continuing growth of mammoth, global, communication empires” (Virtual Community Rev. 375-7). Although the company that built Habbo Hotel is far from achieving global empire status, their project illustrates how the dominant ethos of privatization and the increasing emphasis on consumption results in gated virtual communities that are highly ordered, restricted, and controlled. The popularity of the hotel reflects the desire of millions of Habbos to express their identities and ideas in a playful environment that they are free to create and manipulate. However, they soon find that the rules are stacked against them. Restricted design options, severe communication limitations, and fixed architectural constraints mean that the only freedom left is the freedom to choose from a narrow range of provided options. In private cyberspaces like Habbo Hotel, the logic of the market rules out unrestrained many-to-many communications in favour of controlled commercial relationships. The liberating potential of the Internet that was recognized by Rheingold and others has been diminished as the forces of globalized commerce impose their order on the electronic frontier. References “Bad Language.” Habbo Hotel. 2004. Sulake UK Ltd. 15 Apr. 2004 http://www.habbohotel.co.uk/habbo/en/help/safety/badlanguage/>. Barlow, John Perry. “Crime and Puzzlement.” High Noon on the Electronic Frontier: Conceptual Issues in Cyberspace. Ed. Peter Ludlow. Cambridge, Mass.: MIT P, 1996. 459-86. ———. “A Declaration of the Independence of Cyberspace.” 8 Feb. 1996. 3 July 2004 http://www.eff.org/~barlow/Declaration-Final.html>. Galloway, Alexander R. Protocol: How Control Exists after Decentralization. Cambridge, Mass.: MIT P, 2004. “Habbo Company Profile.” Habbo Hotel. 2002. Habbo Ltd. 20 Jan. 2003 http://www.habbogroup.com>. “The Habbo Way.” Habbo Hotel. 2004. Sulake UK Ltd. 15 Apr. 2004 http://www.habbohotel.co.uk/habbo/en/help/safety/habboway/>. Landry, Charles. The Creative City: A Toolkit for Urban Innovators. London: Earthscan, 2000. Lessig, Lawrence. The Future of Ideas: The Fate of the Commons in a Connected World. New York: Random, 2001. Novak, Marcos. “Liquid Architecture in Cyberspace.” Cyberspace: First Steps. Ed. Michael Benedikt. Cambridge, Mass.: MIT P, 1991. 225-54. Oldenburg, Ray. The Great Good Place: Cafés, Coffee Shops, Community Centers, Beauty Parlors, General Stores, Bars, Hangouts and How They Get You through the Day. New York: Paragon, 1989. Rheingold, Howard. The Virtual Community: Homesteading on the Electronic Frontier. New York: Harper, 1993. ———. The Virtual Community: Homesteading on the Electronic Frontier. Rev. ed. Cambridge, Mass.: MIT P, 2000. Robins, Kevin. “Cyberspace and the World We Live In.” The Cybercultures Reader. Eds. David Bell and Barbara M. Kennedy. London: Routledge, 2000. 77-95. Schiller, Dan. Digital Capitalism: Networking the Global Market System. Cambridge, Mass.: MIT P, 1999. Schiller, Herbert I. Culture Inc.: The Corporate Takeover of Public Expression. New York: Oxford UP, 1991. Sennett, Richard. The Uses of Disorder: Personal Identity & City Life. New York: Vintage, 1970. Shalit, Ruth. “Welcome to the Habbo Hotel.” mpulse Magazine. Mar. 2002. Hewlett-Packard. 1 Apr. 2004 http://www.cooltown.com/cooltown/mpulse/0302-habbo.asp>. “Strong Growth in Sulake’s Revenues and Profit – Habbo Hotel Online Game Will Launch in the US in September.” 3 Sept. 2004. Sulake. Sulake Corp. 9 Jan. 2005 http://www.sulake.com/>. Turkle, Sherry. Life on the Screen: Identity in the Age of the Internet. New York: Simon, 1997. Citation reference for this article MLA Style McGuire, Mark. "Ordered Communities." M/C Journal 7.6 (2005). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0501/06-mcguire.php>. APA Style McGuire, M. (Jan. 2005) "Ordered Communities," M/C Journal, 7(6). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0501/06-mcguire.php>.
APA, Harvard, Vancouver, ISO, and other styles
42

Mason's, Eric D. "Border-Building." M/C Journal 7, no. 2 (March 1, 2004). http://dx.doi.org/10.5204/mcj.2332.

Full text
Abstract:
Borders seem to be dropping all around us. Interdisciplinary university curricula, international free trade, wireless broadband technologies—these and many other phenomena suggest a steady decline in the rigidity and quantity of borders delimiting social interactions. In response to this apparent loss of borders, critical scholars might point out that university hiring practices remain discipline-bound, international tariffs are widespread, and technological access is uneven. But even as this critical response points out the limited extent of border-loss, it still affirms the weakening of these borders. Since the 9/11 tragedy, the world has witnessed much fortification of national and cultural borders through essentializing discourses (epitomized by America’s “us versus them” response to terror). But can critical scholars, as affirmative as they are of the dissolution and the crossing of borders, also support the building of exclusionary national and cultural borders? More importantly, can this reasoning responsibly emerge from a postmodern or postcolonial perspective that both favors marginalized voices and recognizes the routinely violent excesses of nationalism? By considering the practice of hybridity within the context of international capitalism, I will argue that maintaining the “conditions of possibility” for hybridity, and thus, maintaining the possibility of resistance to essentializing discourses, requires the strategic reinforcement of national and cultural borders. Border-Crossing as Hybrid Practice The most critical aspect of hybridity in relation to culture is the hybrid’s position as border-crosser. Postmodern theory typically affirms individual instances of border-crossing, but its overall project in regards to boundaries is more comprehensive. Henri Giroux writes: …postmodernism constitutes a general attempt to transgress the borders sealed by modernism, to proclaim the arbitrariness of all boundaries, and to call attention to the sphere of culture as a shifting social and historical construction. (Border 55) The figure of the hybrid emerges in postcolonial discourses as the embodiment of this postmodern critique of borders. Hybrid identities such as Gloria Anzaldua’s “mestiza consciousness”—a hybrid of white, Indian, and Mexican identities—creates the possibility of resisting oppression because such multiplicity disavows the reductive and essentializing binaries that colonizers employ to maintain power (Anzaldua 892). By embracing these hybrid identities, colonized people thus affirm cultural differences in ways that resist essentialism and which conceive of these differences in ways that “are not identified with backwardness” (Martín-Barbero 352). In studying the border-crossing work of critical intellectual Paulo Freire, Giroux claims that border-crossing offers the hybrid the “opportunity for new subject positions, identities, and social relations that can produce resistance to and relief from the structures of domination and oppression” (“Paulo” 18). Prior to these claims, postcolonial theorist Homi Bhabha wrote that the “third space” of hybridity surfaces as an “ambivalence” toward colonial authority and as a “strategic reversal of the process of domination through disavowal” (34). But what if we take seriously Michael Hardt and Antonio Negri’s claim in their book, Empire, that postcolonial theory, with its acclaim of the subversive potential of the hybrid, is “entirely insufficient for theorizing contemporary global power”? Or what if we admit that, unfortunately, the postcolonial hybrid is nowhere near as successful or as efficient a border-crosser as corporations have become, corporations which have made their own successful ‘runs for the borders’ by colonizing the markets of nations across the globe? In what forms can the ambivalence and disavowal identified by Bhabha emerge when cultures are now being colonized, not by other cultures, but by the influence of corporations? In the context of this new state of empire, Hardt and Negri warn that traditional hybridity becomes “an empty gesture … or worse, these gestures risk reinforcing imperial power rather than challenging it” (216–17). But in a world where “the freedom of self-fashioning is often indistinguishable from the powers of an all-encompassing control,” how can scholars approve a program of aggressive national self-fashioning (Hardt 216)? Stanley Fish suggests one answer. In Professional Correctness, Fish states that only enterprises “bent on suicide” would fail to establish their “distinctiveness.” He writes: An enterprise acquires an identity by winning a space at the table of enterprises …. Within the space that has been secured, all questions, including questions on basic concepts, remain open. Nor are the boundaries between enterprises fixed and impermeable; negotiations on the borders go on continually, and at times border skirmishes can turn into large-scale territorial disputes (19) If we substitute the word “nations” or “cultures” here for “enterprises,” Fish’s text reminds us that the building of national and cultural borders is always at best a temporary event, and that ‘openness’ is only available within a “space that has [previously] been secured.” Although nations may risk many things when they resist colonization, cultural fixity is not one of them. Cultures can thus maintain distinctiveness from other cultures without giving up their aspirations to hybridity. Pragmatically, Fish might say, one needs to secure a space at the table before one can negotiate. Essentialist border-building is just such a pragmatic effort. Building Borders That Disavow Cultural turf and national turf are inseparable. In the idealistic American view of culture as a “melting pot,” cultural identity relinquishes its substance to a greater national identity. Especially in the wake of 9/11, nationalistic maintenance of identity has prompted a host of culturally-focused turf disputes ranging from the bombing of mosques to the deliberate dumping of French champagne. Such disputes reveal cultural antagonisms that emerge from essentializing discourses. In his speech to the United Nations only two months after the September 11th attack, President George W. Bush explicitly connected the willingness of countries to form a coalition against terror (and thus to accept the essentializing “us versus them” mentality) with the ability to maintain secure borders by stating “Some nations want to play their part in the fight against terror, but tell us they lack the means to enforce their laws and control their borders” (n.pag.). Clear and manageable borders are presented here as stabilizing influences that enable the war against terror. By maintaining Western economic and political interests, these borders appear to delimit a space most unlike the subversive hybrid space that Bhabha imagines. Although essentializing discourses naturally seem to threaten the space of hybridity, it is important here to recall Bhabha’s definition of hybridity as a “strategic reversal of the process of domination” (emphasis added). Gayatri Spivak reminds us that “it’s the idea of strategy that has been forgotten” in current critiques of essentialism (5). In fact, essentialism, properly situated, can be used as a strategy against essentialism. While Spivak warns that a “strategic use of essentialism can turn into an alibi for proselytizing academic essentialisms,” she more forcefully claims that the “strategic use of a positivist essentialism in a scrupulously visible political interest” is “something one cannot not use”; a strategy that is “unavoidably useful” (4, 5). For Spivak, the critical qualities of a strategic essentialism are its “self-conscious” use (i.e. its “scrupulously visible political interest”) and its ongoing “critique of the ‘fetish-character’” of its own master terms (3–4). Three short examples will serve to highlight this strategic use of border-building in service of “scrupulously visible political interests.” While Russians may have the distinction of being the first to turn a candy bar’s name (“Snickers”) into a swear word, there have been no more visible borders that disavow multinational capitalism than those in France. Predictably, the key sites of struggle are the traditional repositories of French high culture: art, language, and food. One highly visible effort in this struggle is the ten per cent cinema tax (which, based on American dominance in the industry, affects mainly American films), the revenue from which is used to subsidize French filmmaking. Also, the controversial 1997 Toubon Law built borders by establishing fines and even prison sentences for refusal to use French language in venues such as advertising; as did the 1999 “dismantling” of a McDonald’s restaurant by José Bové, a French sheep farmer protesting U.S. sanctions, the WTO, and “Americanization” in general (Gordon 23, 35). Two nations that erected “borders of disavowal” in regards to the war on terror are Turkey and the Philippines. In March of 2003, even after being offered $6 billion in aid from the U.S., Turkey refused to allow 62,000 U.S. troops to be deployed in Turkey to facilitate the war in Iraq (Lee). While Turkey did allow the U.S. the use of airbases for certain purposes, the refusal to allow U.S. troops to cross the Turkey-Iraq border marked a significant site of cultural resistance. Even after the Philippines accepted a $78 billion increase in military aid from the U.S. to fight terrorism, public outcry there forced the U.S. to remove its “active” military presence since it violated a portion of the Philippines’s constitution that banned combat by foreign soldiers on its soil. (Klein). Also significant here is the degree to which the negotiation of national and cultural borders is primarily a negotiation of capital. As The Nation reported: For [Philippine President Arroyo], the global antiterrorist campaign is first and foremost a business proposition, and she made this very clear when she emerged from her meeting with President Bush in Washington in November and boasted to Filipino reporters that "it's $4.6 billion, and counting.” (Bello) All of these examples reinforce cultural and national borders in order to resist domination by capital. In French Foreign Minister Védrine’s words, the “desire to preserve cultural diversity in the world is in no way a sign of anti-Americanism but of antihegemonism, a refusal of impoverishment” (qtd. in Gordon 30). This “refusal of impoverishment” is the accomplishment of identities that refuse to supplant culture with capital. As these examples show, borders need not simply reinforce existing power relations, but are sites of resistance as well. But Is This Turf Really Cultural? Can one legitimately refer to the examples of Turkey and the Philippines, as well as the web of forces that structure the interactions of all nations in a system of multinational capitalism, as being “cultural”? If the subtitle of Fredric Jameson’s book, Postmodernism: Or, the Cultural Logic of Late Capitalism, does not suggest strongly enough the particularly cultural turf of these systems, Jameson makes this explicit when he states that we have witnessed . . . a prodigious expansion of culture throughout the social realm, to the point at which everything in our social life—from economic value and state power to practices and to the very structure of the psyche itself—can be said to have become ”cultural.” (48). One of Jameson’s basic arguments in his second chapter is that “every position on postmodernism in culture . . . is also at one and the same time, and necessarily, an implicitly or explicitly political stance on the nature of multinational capitalism today” (3). I would like to transpose this statement somewhat by asserting that every position on culture in postmodernism is necessarily a political stance on the nature of multinational capitalism. Therefore, actions that negotiate cultural turf and modify national identities can be methods of influencing the contours of multinational capitalism. In other words, strategic border-building maintains the space of hybridity because it seeks to disavow the dominance of cultural turf by capital. Without such protectionist and essentializing efforts, the conditions of possibility for hybrid identities would be at the mercy of market forces. The pragmatic use of essentialism as a mode of resistance is a move one can imagine Fish would approve of, and that Hardt and Negri hint at the necessity of when they state: The creative forces that sustain Empire are also capable of autonomously constructing a counter-Empire, an alternative political organization of global flows and exchanges. The struggles to contest and subvert Empire, as well as those to construct a real alternative, will thus take place on the imperial terrain itself. (xv) Essentialism is admittedly one of the “creative forces that sustain Empire.” The dangers of struggling “on the imperial terrain itself” lie in not retaining the critical self-consciousness of one’s own strategies that Spivak argues for, and in not remaining mindful of the histories of genocide and tyranny that have accompanied much modern nationalism. In constructing a “counter-Empire,” cultures can resist both the seductions of aggressive nationalism and the homogenizing forces of multinational capitalism. The turf of hybridity provides a space from which to launch this counter-Empire, but this space may only exist between cultural identities, not between multiple versions of a homogenized consumer identity maintained by corporate influence. Nations should neither be afraid to rebuild self-consciously their cultural borders nor to act strategically to maintain their distinctiveness, despite postmodern theory’s acclamation of the dissolution of borders and political appeals for global solidarity against the terrorist ‘Other.’ In order to establish resistance in the context of international capitalism, the strategic disavowal necessary to hybridity may need to emerge as a disavowal of hybridity itself. Works Cited Anzaldua, Gloria. “Borderlands/La Frontera.” Literary Theory, An Anthology. Ed. Julie Rivkin and Michael Ryan. Malden: Blackwell, 2001. 887–902. Bello, Waldo. “A ‘Second Front’ in the Philippines.” The Nation 18 Mar. 2002. 16 Feb. 2004. <http://www.thenation.com/doc.mhtml?i=20020318&s=bello>. Bhabha, Homi. K. “Signs Taken for Wonders: Questions of Ambivalence and Authority Under a Tree Outside Delhi, May 1817.” The Postcolonial Studies Reader. Ed. Bill Ashcroft, et al. New York: Routledge, 1995. 29–35. Bush, George W. “President Bush Speaks to United Nations.” The White House. 11 Jan. 2004. <http://www.whitehouse.gov/news/releases/2001/11/20011110-3.php>. Fish, Stanley. Professional Correctness: Literary Studies and Political Change. Oxford: Clarendon Press, 1995. Giroux, Henry. Border Crossings: Cultural Workers and the Politics of Education. New York: Routledge, 1992. ---. “Paulo Freire and the Politics of Postcolonialism.” JAC 12.1 (1992): 15–26. Gordon, Philip H., and Sophie Meunier. “Globalization and French Cultural Identity.”French Politics, Culture, and Society 19.1 (2001): 22–41. Hardt, Michael, and Antonio Negri. Empire. Cambridge: Harvard UP, 2000. Jameson, Fredric. Postmodernism: Or, the Cultural Logic of Late Capitalism. Durham: Duke UP, 1991. Klein, Naomi. “Mutiny in Manila.” The Nation 1 Sep. 2003. 16 Feb. 2004. <http://www.thenation.com/doc.mhtml?i=20030901&s=klein>. Lee, Matthew. “Turkey’s Refusal Stuns U.S.” Common Dreams News Center. 1 Mar. 2003. 12 Jan. 2004. <http://www.commondreams.org/headlines03/0301-10.htm>. Martín-Barbero, Jésus. “The Processes: From Nationalisms to Transnationals.” Media and Cultural Studies: Keyworks. Ed. Meenakshi Gigi Durham and Douglas M. Kellner. Oxford: Blackwell, 2001. 351–84. Spivak, Gayatri Chakravorty. Outside in the Teaching Machine. New York: Routledge, 1993. Citation reference for this article MLA Style Mason's, Eric D. "Border-Building" M/C: A Journal of Media and Culture <http://www.media-culture.org.au/0403/03-border-building.php>. APA Style Mason's, E. (2004, Mar17). Border-Building. M/C: A Journal of Media and Culture, 7, <http://www.media-culture.org.au/0403/03-border-building.php>
APA, Harvard, Vancouver, ISO, and other styles
43

Gardner, Paula. "The Perpetually Sick Self." M/C Journal 5, no. 5 (October 1, 2002). http://dx.doi.org/10.5204/mcj.1986.

Full text
Abstract:
Since the mid-eighties, personality and mood have undergone vigorous surveillance and repair across new populations in the United States. While government and the psy-complexes 1 have always had a stake in promoting citizen health, it is unique that, today, State, industry, and non-governmental organisations recruit consumers to act upon their own mental health. And while citizen behaviours in public spaces have long been fodder for diagnosis, the scope of behaviours and the breadth of the surveyed population has expanded significantly over the past twenty years. How has the notion of behavioural illness been successfully spun to recruit new populations to behavioural diagnosis and repair? Why is it a reasonable proposition that our personalities might be sick, our moods ill? This essay investigates the cultural promotion of a 'script' that assumes sick moods are possible, encourages the self-assessment of risk and self-management of dysfunctional mood, and has thus helped to create a new, adjustable subject. Michel Foucault (1976, 1988) contended that in order for subjects to act upon their selves -- for example, assess themselves via the behavioural health script -- we must view the Self as a construction, a work in progress that is alterable and in need of alteration in order for psychiatric action to seem appropriate. This conception of the self constitutes an extreme theoretical shift from the early modern belief (of Rousseau or Kant) that a core soul inhabited and shaped being, or the moral self.2 Foucault (1976) insisted that subjects are 'not born but made' through formal and informal social discourses that construct knowledge of the 'normal' self. Throughout the 19th century and the modern era, as medical, juridical, and psychiatric institutions gained increasing cultural capital, the normal self became allegedly 'knowable' through science. In turn, the citizen became 'professionalised' (Funicello 1993) -- answerable to these constructed standards, or subject to what Foucault termed biopower. In order to avoid punishments wrested upon the 'deviant' such as being placed in asylum or criminalised, citizens capitulated to social norms, and thus helped the State to achieve social order. 3 While 'technologies of power' or domination determined the conduct of individuals in the premodern era, 'technologies of the self' became prominent in the modern era.4 (Foucault, 'Technologies of the Self') These, explained Foucault, permit individuals to act upon their 'bodies, souls, thoughts, conduct and ways of being' to transform them, to attain happiness, or perfection, among other things (18). Contemporary psychiatric discourses, for example, call upon citizens to transform via self-regulation, and thus lessened the State's disciplinary burden. Since the mid-twentieth century, biopsychiatry has been embraced nationally, and played a key role in propagating self-disciplining citizens. Biopsychiatric logic is viewed culturally as common sense due to a number of occurrences. The dominant media have enthusiastically celebrated so-called biotechnical successes, such as sheep cloning and the development of better drugs to treat Schizophrenia. Hype has also surrounded newer drugs to treat depression (i.e. Prozac) and anxiety (i.e. Paxil), as well as the 'cosmetic' use of antidepressants to allegedly improve personality.5 Citizens, then, are enlisted to trust in psychiatric science to repair mood dysfunction, but also to reveal the 'true' self, occluded by biologically impaired mood. Suggesting that biopsychiatry's 'knowledge' of the human brain has revealed the human condition and can repair sick selves, these discourses have helped to launch the behavioural health script into the national psyche. The successful marketing of the script was also achieved by the diagnostic philosophy encouraged by revisions of Diagnostic and Statistical Manual or Mental Disorders(the DSM; these renovations increased the number of affective (mood) and personality diagnoses and broadened diagnostic criteria. The new DSMs 6 institutionalised the pathologisation of common personality and mood distresses as biological or genetic disorders. The texts constitute 'knowledge' of normal personality and behaviour, and press consumers toward biotechnical tools to repair the defunct self. Ian Hacking (1995) suggests that new moral concepts emerge when old ones acquire new connotations, thereby affecting our sense of who we are. The once moral self, known through introspection, is thus transformed via biopsychiatry into a self that is constructed in accordance with scientific 'knowledge'. The State and various private industries have a stake in promoting this Sick Self script. Promoting Diagnosis of the Sick Self Employing the DSM's broad criteria, research by the National Institute of Mental Health (NIMH), contends that a significant percentage of the population is behaviourally ill. The most recent Surgeon General report on Mental Health (from 1999) which also employed broad criteria, argues that a striking 50 million Americans are afflicted with a mental illness each year, most of which were non-major disorders affecting behaviour, personality and mood.7 Additionally, studies suggest that behavioural illness results in lost work days and increases demand for health services, thus constituting a severe financial burden to the State. Such studies consequently provide the State with ample reason to promote behavioural illness. In predicting an epidemic in behavioural illness and a huge increase in mental health service needs, the State has constructed health policy in accordance with the behavioural sickness script. Health policy embraces DSM diagnostic tools that sweep in a wide population by diagnosing risk as illness and links diagnosis with biotechnical recovery methods. Because criteria for these disorders have expanded and diagnoses have become more vague, however, over-diagnosis of the population has become common . 8 Depression, for example, is broadly defined to include moods ranging from the blues to suicidal ideation. Yet, the Sick Self script is ubiquitously embraced by NGO, industry, and State discourses, calling for consumer self-scrutiny and strongly promoting psychopharmaceuticals. These activities has been most successful; to wit: personality disorders were among the most common diagnoses of the 80's, and depression, which was a rare disorder thirty-five years ago, became the most common mental illness in the late 90's (Healy). Consumer Health Groups & Industry Promotions Health institutions and drug industries promote mood illness and market drug remedies as a means of profit maximisation. Broad spectrum diagnoses are, by definition, easy to sell to a wide population and create a vast market for recovery products. Pharmaceutical and insurance companies (each multibillion dollar industries), an expanding variety of self-help industries, consumer health web sites, and an array of psy-complex workers all have a stake in promoting the broad diagnosis of mood and behavioural disorders. 9 In so doing, consumer groups and the health and pharmaceutical industries not only encourage self-discipline (aligning themselves with State productivity goals), but create a vast, ongoing market for recovery products. Promoting Illness and Recovery So strong is the linkage between illness and recovery that pharmaceutical company Eli Lilly sells Prozac by promoting the broad notion of depression, rather than the drug itself. It does so through depression brochures (advertised on TV) and a web page that discusses depression symptoms and offers a depression quiz, instead of product information. Likewise, Psych Central, a typical informational health site, provides consumers standard DSM depression definitions and information (from the biopsychiatric-driven American Psychiatric Association (APA) or the NIMH, and liberal behavioural illness quizzes that typically over-diagnose consumers. 10The Psych Central site also lists a broad range of depression symptoms, while its FAQ link promotes the self-management of mood ailments. For example, the site directs those who believe that they are depressed and want help to contact a physician, obtain a diagnosis, and initiate antidepressant treatment. Such web sites, viewed as a whole, appear to deliver certified knowledge that a 'normal' mood exists, that mood disorders are common, and that abiding citizens should diagnosis and treat their mood ailment. Another essential component of the behavioural script is the suggestion that the modern self's mood is interminably sick. Because common mood distresses are fodder for diagnosis, the self is always at risk of illness, and requires vigilant self-scrutiny. The self is never a finished product. Moreover, mood sickness is insidious and quickly spirals from risk to full-blown disorder. 11 As such, behavioural illness requires on-going self-assessment. Finally, because mood sickness threatens social productivity and State financial solvency, a moral overtone is added to the mix -- good citizens are encouraged to treat their mood dysfunctions promptly, for the common good. The script thus constructs citizenship as a motive for behavioural self-scrutiny; as such, it can naturally recommend that individuals, rather than experts, take charge of the surveillance process. The recommendation of self-determined illness is also a sales feature of the script, appealing to the American ethic of individualism -- even, paradoxically, as the script proposes that science best directs us to our selves. Self-Managed Recovery Health institutions and industries that deploy this script recommend not only self-diagnosis, but also self-managed treatment as the ideal treatment. Health information web sites, for example, tend to displace the expert by encouraging consumers to pre-diagnose their selves (often via on-line quizzes) and to then consult an expert for formal diagnosis and to organise a treatment program. Like governmental heath organisation's web sites, these commonly link consumer-driven, broad-spectrum diagnosis to psycho-pharmaceutical treatment, primarily by listing drugs as the first line of treatment, and linking consumers to drug information. Unsurprisingly, pharmaceutical companies support or own many 'informational' sites. Depression-net.com, for example, is owned by Organon, maker of Remeron, an SSRI in competition with Prozac.12 Still, even sites that receive little or no funding tend to display drugs prominently; for example, Internet Mental Health, which accepts no drug funding lists drugs immediately after diagnosis on the sidebar. This trend illustrates the extent to which drugs are viewed by consumers as a first step in addressing all types of mood sicknesses. Consumer health sites, geared toward Internet users seeking health care information (estimated to be 43% of the 120 million users) promote the illness-recovery link more aggressively. Dr.koop.com, one of the most visited sites on the Internet, describes itself as 'consumer-focused' and 'interactive'. Yet, the homepage of this site tends to include 'news' stories that relay the success of drugs or report on new biopsychiatric studies in depression or mental health. Some consumer sites such as Consumer health sites, geared toward Internet users seeking health care information (estimated to be 43% of the 120 million users) promote the illness-recovery link more aggressively. Dr.koop.com, one of the most visited sites on the Internet, describes itself as 'consumer-focused' and 'interactive'. Yet, the homepage of this site tends to include 'news' stories that relay the success of drugs or report on new biopsychiatric studies in depression or mental health. Some consumer sites such as WebMD prominently display links to drugstores, (such as Drugstore.com), many of which are owned in part or entirely by pharmaceutical companies.13 Similar to the common practices of direct-to-consumer advertising, both informational and consumer sites by-pass the expert, promote recovery via drugs, and direct the consumer to a doctor in search of a prescription, rather than health care advice. State, informational and consumer web sites all help to construct certain populations as at-risk for behavioural sickness. The NIMH information page on depression -- uncanny in its likeness to consumer health and pharmaceutical sites -- utilises the DSM definition of depression and recommends the standard regime of diagnosis and biotechnical treatments (highlighting antidepressants) most appropriate for a diagnosis of major, rather than minor, depression. The site also elaborates the broad approach to mood illness, and recommends that women, children and seniors -- groups deemed at-risk by the broad criteria -- be especially scrutinised for depression. By articulating the broad DSM definition of depression, a generalisable 'self' -- anyone suffering common ailments including sadness, lethargy or weight change -- is deemed at risk of depression or other behavioural illness. At the same time, at-risk groups are constructed as populations in need of more urgent scrutiny, namely society's less powerful individuals, rather than middle-aged males. That is, society's decision-makers--psychiatric researchers, State policy-makers, pharmaceutical CEO's, (etc) are considered least at risk for having defunct selves and productivity functioning. Selling Mood Sickness These brief examples illustrate the standard presentation of behavioural illness information on the Web and from traditional resources such as mailings, brochures, and consumer manuals. Presenting the ideal self as knowable and achievable with the help of bio-psychiatric science, these discourses encourage citizens to self-scrutinise, self-define, and even self-manage the possibility of mood or behavioural dysfunction. Because the individual gathers information, determines her pre-diagnosis, and seeks out a recovery technology, the many choices involved in behavioural scrutiny make it appear to be a free and 'democratic' activity. Additionally, as individuals take on the role of the expert, self-diagnosing via questionnaires, the highly disciplinary nature of the behavioural diagnosis appears unthreatening to individual sovereignty. Thus, this technology of the self solves an age-old problem of capitalist democracy -- how to simultaneously instill citizen's faith in absolute individual liberty (as a source of good government), and, at the same time, the need to achieve the absolute governance of the individual (Miller). Foucault contended that citizens are brought into the social contract of citizenship not simply through social and governmental contracts but by processes of policing that become embedded in our notions of citizenship. The process of self-management recommended by the ubiquitous behavioural script functions smoothly as a technology of surveillance in this era, where the ideal self is known and repaired through biopsychiatric science, the democratic responsibility of a good citizen. The liberal contract has always entailed an exchange of rights for freedoms -- in Rousseau's terms 'making men free by making them subjects.' (Miller xviii) When we make ourselves subjects to ongoing behavioural scrutiny, the resulting Self is not freed, rather it is constrained by a perpetual sickness. Notes 1 This term is used in a Foucaultian sense, to refer to all those who work under and benefit or profit from the dominant biological model of psychiatry dominant since the 1950's in the U.S. 2 For more discussion, see Ian Hacking, Rewriting the Soul; Multiple Personality and the Sciences of Memory. (1995) 3 In his essay 'Technologies of the Self' (1988) Foucault outlines the four major types of technologies that function as practical reason and entice citizens to behave according to constructed social standards. Among these are technologies of production (that permit us to produce things), technologies of sign systems (permitting us to use symbols), and the technologies of power and self mentioned in the above text. Through these technologies, operations of individuals become highly regulated, some visible and some difficult to perceive. The less visible technologies of the self became essential to the smooth functioning of society in the modern era. 4 'Technologies' is used to refer to mechanisms and actions of institutions or simply social norms and habits, that work, ultimately, to govern the individual, or create behaviour that serves desires of the State and dominant social bodies. 5 Peter Kramer, author of the best-selling book Listening to Prozac (1995) contends that his patients using Prozac often credited the drug with helping their true personalities to surface. 6 The two revisions occurred in 1987 and 1994. 7 Of that group, only five percent of that group suffers a 'severe' form of mental illness (such as schizophrenia, or extreme form of bipolar or obsessive compulsive disorder), while the rest suffer less severe behavioural and mood disorders. Similar research (also based on broad criteria) was published throughout the 90's suggesting an American epidemic of behavioural illness; it was claimed that 17% of the population is neurotic, while 10-15% of the population (and 30-50% of those seeking care) was said to possess a personality disorder. (Hales and Hales, 1995) 8 The most widely assigned diagnoses in this category today are: depression, multiple personality, adjustment disorder, eating disorders and Attention Deficit Hyperactivity Disorder (ADHD), which have extremely broad criteria, and are easily assigned to a wide segment of the population. 9The quizzes offered at these sites are standard in psychiatry; the difference here is that these are consumer-conducted. Lilly uses the Zung Self-Assessment Tool, which asks 20 broad questions regarding mood, and overdiagnoses individuals with potential depression. By responding to vague questions such as 'Morning is when I feel the best', 'I notice that I am losing weight', and 'I feel downhearted, blue and sad' with the choice of 'sometimes', individuals are thereby pre-diagnosed with potential depression. (https://secure.prozac.com/Main/zung.jsp) Psych central uses the Goldberg Inventory that is similarly broad, consumer-operated, and also tends to overdiagnose. 10 The DSM and other psychiatric texts and consumer manuals commonly suggest that undiagnosed depression will lead, eventually, to full-blown major depression. While a minority of individuals who suffer ongoing episodes of major depression will eventually suffer chronic major depression, it has not been found that minor depression will snowball into major depression or chronic major depression. This in fact, is one of the many suspicions among researchers that is referred to as fact in psychiatric literature and consumer manuals. A similar case in point is the suggestion that depression is a brain disorder, when in fact, research has not determined biochemistry or genetics to be the 'cause' of major depression. 11 Increasingly, Pharmaceutical sites are indistinguishable from consumer sites, as in the case of Bristol-Meyers Squibb's depression page, (http://www.livinglifebetter.com/src/htdo...) offering a layperson's depression definition and, immediately thereafter, information on its antidepressant Serzone. 12 Like the informational and State sites, these also link consumers to depression information (generally NIMH, FDA or APA research), as well as questionnaires. References American Psychiatric Association. Diagnostic and Statistical Manual of Mental Disorders. 4th ed. Washington, D.C: American Psychiatric Press, Inc., 1994. Cruikshank, Barbara. The Will to Empower: Democratic Citizens and Other Subjects. Ithaca, NY: Cornell University Press, 1999. Foucault, Michel. Madness and Civilization; A History of Insanity in the Age of Reason. New York: Vintage, 1961. - - - . The Order of Things; An Archaeology of the Human Science., New York: Vintage, 1966. - - - . The History of Sexuality; An Introduction, Volume I. New York: Vintage, 1976. - - - . 'Technologies of the Self', Technologies of the Self; A Seminar with Michel Foucault. Ed. Luther Martin, Huck Gutman, and Patrick H. Hutton. Amherst: University of Amherst Press, 1988. 16-49. Funicello, Theresa. The Tyranny of Kindness; Dismantling the Welfare System to End Poverty in America. New York: Atlantic Monthly Press, 1993. Hales, Dianne R. and Robert E. Hales. Caring For the Mind: The Comprehensive Guide to Mental Health. New York: Bantam Books, 1995. Healy, David. The Anti-Depressant Era. Cambridge, Mass: Harvard University Press, 1997. Kramer, Peter D. Listening to Prozac; A Psychiatrist Explores Antidepressant Drugs and the Remaking of the Self. New York: Viking, 1993. Miller, Toby. The Well-Tempered Self; Citizenship, Culture and the Postmodern Subject. Baltimore: The John Hopkins University Press, 1993. - - - . Technologies of Truth: Cultural Citizenship and the Popular Media. Minneapolis: University of Minnesota Press, 1998. Office of the Surgeon General. Mental Health: A Report of the Surgeon General. 1999. <http://www.surgeongeneral.gov/library/me...> Rose, Nickolas. Governing the Soul; The Shaping of the Private Self. London: Routledge, 1990. Links http://www.drugstore.com http://psychcentral.com/library/depression_faq.htm http://www.wikipedia.com/wiki/DSM-IV http://www.nimh.nih.gov/publicat/depression.cfm http://www.livinglifebetter.com/src/htdocs/index.asp?keyword=depression_index http://my.webmd.com http://www.mentalhealth.com http://www.surgeongeneral.gov/library/mentalhealth/home.html http://www.prozac.com http://my.webmd.com/ http://www.a-silver-lining.org/BPNDepth/criteria_d.html#MDD http://psychcentral.com/depquiz.htm Citation reference for this article Substitute your date of access for Dn Month Year etc... MLA Style Gardner, Paula. "The Perpetually Sick Self" M/C: A Journal of Media and Culture 5.5 (2002). [your date of access] < http://www.media-culture.org.au/mc/0210/Gardner.html &gt. Chicago Style Gardner, Paula, "The Perpetually Sick Self" M/C: A Journal of Media and Culture 5, no. 5 (2002), < http://www.media-culture.org.au/mc/0210/Gardner.html &gt ([your date of access]). APA Style Gardner, Paula. (2002) The Perpetually Sick Self. M/C: A Journal of Media and Culture 5(5). < http://www.media-culture.org.au/mc/0210/Gardner.html &gt ([your date of access]).
APA, Harvard, Vancouver, ISO, and other styles
44

Collins, Steve. "Recovering Fair Use." M/C Journal 11, no. 6 (November 28, 2008). http://dx.doi.org/10.5204/mcj.105.

Full text
Abstract:
IntroductionThe Internet (especially in the so-called Web 2.0 phase), digital media and file-sharing networks have thrust copyright law under public scrutiny, provoking discourses questioning what is fair in the digital age. Accessible hardware and software has led to prosumerism – creativity blending media consumption with media production to create new works that are freely disseminated online via popular video-sharing Web sites such as YouTube or genre specific music sites like GYBO (“Get Your Bootleg On”) amongst many others. The term “prosumer” is older than the Web, and the conceptual convergence of producer and consumer roles is certainly not new, for “at electric speeds the consumer becomes producer as the public becomes participant role player” (McLuhan 4). Similarly, Toffler’s “Third Wave” challenges “old power relationships” and promises to “heal the historic breach between producer and consumer, giving rise to the ‘prosumer’ economics” (27). Prosumption blurs the traditionally separate consumer and producer creating a new creative era of mass customisation of artefacts culled from the (copyrighted) media landscape (Tapscott 62-3). Simultaneously, corporate interests dependent upon the protections provided by copyright law lobby for augmented rights and actively defend their intellectual property through law suits, takedown notices and technological reinforcement. Despite a lack demonstrable economic harm in many cases, the propertarian approach is winning and frequently leading to absurd results (Collins).The balance between private and public interests in creative works is facilitated by the doctrine of fair use (as codified in the United States Copyright Act 1976, section 107). The majority of copyright laws contain “fair” exceptions to claims of infringement, but fair use is characterised by a flexible, open-ended approach that allows the law to flex with the times. Until recently the defence was unique to the U.S., but on 2 January Israel amended its copyright laws to include a fair use defence. (For an overview of the new Israeli fair use exception, see Efroni.) Despite its flexibility, fair use has been systematically eroded by ever encroaching copyrights. This paper argues that copyright enforcement has spun out of control and the raison d’être of the law has shifted from being “an engine of free expression” (Harper & Row, Publishers, Inc. v. Nation Enterprises 471 U.S. 539, 558 (1985)) towards a “legal regime for intellectual property that increasingly looks like the law of real property, or more properly an idealized construct of that law, one in which courts seeks out and punish virtually any use of an intellectual property right by another” (Lemley 1032). Although the copyright landscape appears bleak, two recent cases suggest that fair use has not fallen by the wayside and may well recover. This paper situates fair use as an essential legal and cultural mechanism for optimising creative expression.A Brief History of CopyrightThe law of copyright extends back to eighteenth century England when the Statute of Anne (1710) was enacted. Whilst the length of this paper precludes an in depth analysis of the law and its export to the U.S., it is important to stress the goals of copyright. “Copyright in the American tradition was not meant to be a “property right” as the public generally understands property. It was originally a narrow federal policy that granted a limited trade monopoly in exchange for universal use and access” (Vaidhyanathan 11). Copyright was designed as a right limited in scope and duration to ensure that culturally important creative works were not the victims of monopolies and were free (as later mandated in the U.S. Constitution) “to promote the progress.” During the 18th century English copyright discourse Lord Camden warned against propertarian approaches lest “all our learning will be locked up in the hands of the Tonsons and the Lintons of the age, who will set what price upon it their avarice chooses to demand, till the public become as much their slaves, as their own hackney compilers are” (Donaldson v. Becket 17 Cobbett Parliamentary History, col. 1000). Camden’s sentiments found favour in subsequent years with members of the North American judiciary reiterating that copyright was a limited right in the interests of society—the law’s primary beneficiary (see for example, Wheaton v. Peters 33 US 591 [1834]; Fox Film Corporation v. Doyal 286 US 123 [1932]; US v. Paramount Pictures 334 US 131 [1948]; Mazer v. Stein 347 US 201, 219 [1954]; Twentieth Century Music Corp. v. Aitken 422 U.S. 151 [1975]; Aronson v. Quick Point Pencil Co. 440 US 257 [1979]; Dowling v. United States 473 US 207 [1985]; Harper & Row, Publishers, Inc. v. Nation Enterprises 471 U.S. 539 [1985]; Luther R. Campbell a.k.a. Luke Skyywalker, et al. v. Acuff-Rose Music, Inc. 510 U.S 569 [1994]). Putting the “Fair” in Fair UseIn Folsom v. Marsh 9 F. Cas. 342 (C.C.D. Mass. 1841) (No. 4,901) Justice Storey formulated the modern shape of fair use from a wealth of case law extending back to 1740 and across the Atlantic. Over the course of one hundred years the English judiciary developed a relatively cohesive set of principles governing the use of a first author’s work by a subsequent author without consent. Storey’s synthesis of these principles proved so comprehensive that later English courts would look to his decision for guidance (Scott v. Stanford L.R. 3 Eq. 718, 722 (1867)). Patry explains fair use as integral to the social utility of copyright to “encourage. . . learned men to compose and write useful books” by allowing a second author to use, under certain circumstances, a portion of a prior author’s work, where the second author would himself produce a work promoting the goals of copyright (Patry 4-5).Fair use is a safety valve on copyright law to prevent oppressive monopolies, but some scholars suggest that fair use is less a defence and more a right that subordinates copyrights. Lange and Lange Anderson argue that the doctrine is not fundamentally about copyright or a system of property, but is rather concerned with the recognition of the public domain and its preservation from the ever encroaching advances of copyright (2001). Fair use should not be understood as subordinate to the exclusive rights of copyright owners. Rather, as Lange and Lange Anderson claim, the doctrine should stand in the superior position: the complete spectrum of ownership through copyright can only be determined pursuant to a consideration of what is required by fair use (Lange and Lange Anderson 19). The language of section 107 suggests that fair use is not subordinate to the bundle of rights enjoyed by copyright ownership: “Notwithstanding the provisions of sections 106 and 106A, the fair use of a copyrighted work . . . is not an infringement of copyright” (Copyright Act 1976, s.107). Fair use is not merely about the marketplace for copyright works; it is concerned with what Weinreb refers to as “a community’s established practices and understandings” (1151-2). This argument boldly suggests that judicial application of fair use has consistently erred through subordinating the doctrine to copyright and considering simply the effect of the appropriation on the market place for the original work.The emphasis on economic factors has led courts to sympathise with copyright owners leading to a propertarian or Blackstonian approach to copyright (Collins; Travis) propagating the myth that any use of copyrighted materials must be licensed. Law and media reports alike are potted with examples. For example, in Bridgeport Music, Inc., et al v. Dimension Films et al 383 F. 3d 400 (6th Cir. 2004) a Sixth Circuit Court of Appeals held that the transformative use of a three-note guitar sample infringed copyrights and that musicians must obtain licence from copyright owners for every appropriated audio fragment regardless of duration or recognisability. Similarly, in 2006 Christopher Knight self-produced a one-minute television advertisement to support his campaign to be elected to the board of education for Rockingham County, North Carolina. As a fan of Star Wars, Knight used a makeshift Death Star and lightsaber in his clip, capitalising on the imagery of the Jedi Knight opposing the oppressive regime of the Empire to protect the people. According to an interview in The Register the advertisement was well received by local audiences prompting Knight to upload it to his YouTube channel. Several months later, Knight’s clip appeared on Web Junk 2.0, a cable show broadcast by VH1, a channel owned by media conglomerate Viacom. Although his permission was not sought, Knight was pleased with the exposure, after all “how often does a local school board ad wind up on VH1?” (Metz). Uploading the segment of Web Junk 2.0 featuring the advertisement to YouTube, however, led Viacom to quickly issue a take-down notice citing copyright infringement. Knight expressed his confusion at the apparent unfairness of the situation: “Viacom says that I can’t use my clip showing my commercial, claiming copy infringement? As we say in the South, that’s ass-backwards” (Metz).The current state of copyright law is, as Patry says, “depressing”:We are well past the healthy dose stage and into the serious illness stage ... things are getting worse, not better. Copyright law has abandoned its reason for being: to encourage learning and the creation of new works. Instead, its principal functions now are to preserve existing failed business models, to suppress new business models and technologies, and to obtain, if possible, enormous windfall profits from activity that not only causes no harm, but which is beneficial to copyright owners. Like Humpty-Dumpty, the copyright law we used to know can never be put back together.The erosion of fair use by encroaching private interests represented by copyrights has led to strong critiques leveled at the judiciary and legislators by Lessig, McLeod and Vaidhyanathan. “Free culture” proponents warn that an overly strict copyright regime unbalanced by an equally prevalent fair use doctrine is dangerous to creativity, innovation, culture and democracy. After all, “few, if any, things ... are strictly original throughout. Every book in literature, science and art, borrows, and must necessarily borrow, and use much which was well known and used before. No man creates a new language for himself, at least if he be a wise man, in writing a book. He contents himself with the use of language already known and used and understood by others” (Emerson v. Davis, 8 F. Cas. 615, 619 (No. 4,436) (CCD Mass. 1845), qted in Campbell v. Acuff-Rose, 62 U.S.L.W. at 4171 (1994)). The rise of the Web 2.0 phase with its emphasis on end-user created content has led to an unrelenting wave of creativity, and much of it incorporates or “mashes up” copyright material. As Negativland observes, free appropriation is “inevitable when a population bombarded with electronic media meets the hardware [and software] that encourages them to capture it” and creatively express themselves through appropriated media forms (251). The current state of copyright and fair use is bleak, but not beyond recovery. Two recent cases suggest a resurgence of the ideology underpinning the doctrine of fair use and the role played by copyright.Let’s Go CrazyIn “Let’s Go Crazy #1” on YouTube, Holden Lenz (then eighteen months old) is caught bopping to a barely recognizable recording of Prince’s “Let’s Go Crazy” in his mother’s Pennsylvanian kitchen. The twenty-nine second long video was viewed a mere twenty-eight times by family and friends before Stephanie Lenz received an email from YouTube informing her of its compliance with a Digital Millennium Copyright Act (DMCA) take-down notice issued by Universal, copyright owners of Prince’s recording (McDonald). Lenz has since filed a counterclaim against Universal and YouTube has reinstated the video. Ironically, the media exposure surrounding Lenz’s situation has led to the video being viewed 633,560 times at the time of writing. Comments associated with the video indicate a less than reverential opinion of Prince and Universal and support the fairness of using the song. On 8 Aug. 2008 a Californian District Court denied Universal’s motion to dismiss Lenz’s counterclaim. The question at the centre of the court judgment was whether copyright owners should consider “the fair use doctrine in formulating a good faith belief that use of the material in the manner complained of is not authorized by the copyright owner, its agent, or the law.” The court ultimately found in favour of Lenz and also reaffirmed the position of fair use in relation to copyright. Universal rested its argument on two key points. First, that copyright owners cannot be expected to consider fair use prior to issuing takedown notices because fair use is a defence, invoked after the act rather than a use authorized by the copyright owner or the law. Second, because the DMCA does not mention fair use, then there should be no requirement to consider it, or at the very least, it should not be considered until it is raised in legal defence.In rejecting both arguments the court accepted Lenz’s argument that fair use is an authorised use of copyrighted materials because the doctrine of fair use is embedded into the Copyright Act 1976. The court substantiated the point by emphasising the language of section 107. Although fair use is absent from the DMCA, the court reiterated that it is part of the Copyright Act and that “notwithstanding the provisions of sections 106 and 106A” a fair use “is not an infringement of copyright” (s.107, Copyright Act 1976). Overzealous rights holders frequently abuse the DMCA as a means to quash all use of copyrighted materials without considering fair use. This decision reaffirms that fair use “should not be considered a bizarre, occasionally tolerated departure from the grand conception of the copyright design” but something that it is integral to the constitution of copyright law and essential in ensuring that copyright’s goals can be fulfilled (Leval 1100). Unlicensed musical sampling has never fared well in the courtroom. Three decades of rejection and admonishment by judges culminated in Bridgeport Music, Inc., et al v. Dimension Films et al 383 F. 3d 400 (6th Cir. 2004): “Get a license or do not sample. We do not see this stifling creativity in any significant way” was the ruling on an action brought against an unlicensed use of a three-note guitar sample under section 114, an audio piracy provision. The Bridgeport decision sounded a death knell for unlicensed sampling, ensuring that only artists with sufficient capital to pay the piper could legitimately be creative with the wealth of recorded music available. The cost of licensing samples can often outweigh the creative merit of the act itself as discussed by McLeod (86) and Beaujon (25). In August 2008 the Supreme Court of New York heard EMI v. Premise Media in which EMI sought an injunction against an unlicensed fifteen second excerpt of John Lennon’s “Imagine” featured in Expelled: No Intelligence Allowed, a controversial documentary canvassing alleged chilling of intelligent design proponents in academic circles. (The family of John Lennon and EMI had previously failed to persuade a Manhattan federal court in a similar action.) The court upheld Premise Media’s arguments for fair use and rejected the Bridgeport approach on which EMI had rested its entire complaint. Justice Lowe criticised the Bridgeport court for its failure to examine the legislative intent of section 114 suggesting that courts should look to the black letter of the law rather than blindly accept propertarian arguments. This decision is of particular importance because it establishes that fair use applies to unlicensed use of sound recordings and re-establishes de minimis use.ConclusionThis paper was partly inspired by the final entry on eminent copyright scholar William Patry’s personal copyright law blog (1 Aug. 2008). A copyright lawyer for over 25 years, Patry articulated his belief that copyright law has swung too far away from its initial objectives and that balance could never be restored. The two cases presented in this paper demonstrate that fair use – and therefore balance – can be recovered in copyright. The federal Supreme Court and lower courts have stressed that copyright was intended to promote creativity and have upheld the fair doctrine, but in order for the balance to exist in copyright law, cases must come before the courts; copyright myth must be challenged. As McLeod states, “the real-world problems occur when institutions that actually have the resources to defend themselves against unwarranted or frivolous lawsuits choose to take the safe route, thus eroding fair use”(146-7). ReferencesBeaujon, Andrew. “It’s Not the Beat, It’s the Mocean.” CMJ New Music Monthly. April 1999.Collins, Steve. “Good Copy, Bad Copy: Covers, Sampling and Copyright.” M/C Journal 8.3 (2005). 26 Aug. 2008 ‹http://journal.media-culture.org.au/0507/02-collins.php›.———. “‘Property Talk’ and the Revival of Blackstonian Copyright.” M/C Journal 9.4 (2006). 26 Aug. 2008 ‹http://journal.media-culture.org.au/0609/5-collins.php›.Donaldson v. Becket 17 Cobbett Parliamentary History, col. 953.Efroni, Zohar. “Israel’s Fair Use.” The Center for Internet and Society (2008). 26 Aug. 2008 ‹http://cyberlaw.stanford.edu/node/5670›.Lange, David, and Jennifer Lange Anderson. “Copyright, Fair Use and Transformative Critical Appropriation.” Conference on the Public Domain, Duke Law School. 2001. 26 Aug. 2008 ‹http://www.law.duke.edu/pd/papers/langeand.pdf›.Lemley, Mark. “Property, Intellectual Property, and Free Riding.” Texas Law Review 83 (2005): 1031.Lessig, Lawrence. The Future of Ideas. New York: Random House, 2001.———. Free Culture. New York: Penguin, 2004.Leval, Pierre. “Toward a Fair Use Standard.” Harvard Law Review 103 (1990): 1105.McDonald, Heather. “Holden Lenz, 18 Months, versus Prince and Universal Music Group.” About.com: Music Careers 2007. 26 Aug. 2008 ‹http://musicians.about.com/b/2007/10/27/holden-lenz-18-months-versus-prince-and-universal-music-group.htm›.McLeod, Kembrew. “How Copyright Law Changed Hip Hop: An interview with Public Enemy’s Chuck D and Hank Shocklee.” Stay Free 2002. 26 Aug. 2008 ‹http://www.stayfreemagazine.org/archives/20/public_enemy.html›.———. Freedom of Expression: Overzealous Copyright Bozos and Other Enemies of Creativity. United States: Doubleday, 2005.McLuhan, Marshall, and Barrington Nevitt. Take Today: The Executive as Dropout. Ontario: Longman Canada, 1972.Metz, Cade. “Viacom Slaps YouTuber for Behaving like Viacom.” The Register 2007. 26 Aug. 2008 ‹http://www.theregister.co.uk/2007/08/30/viacom_slaps_pol/›.Negativland, ed. Fair Use: The Story of the Letter U and the Numeral 2. Concord: Seeland, 1995.Patry, William. The Fair Use Privilege in Copyright Law. Washington DC: Bureau of National Affairs, 1985.———. “End of the Blog.” The Patry Copyright Blog. 1 Aug. 2008. 27 Aug. 2008 ‹http://williampatry.blogspot.com/2008/08/end-of-blog.html›.Tapscott, Don. The Digital Economy: Promise and Peril in the Age of Networked Intelligence. New York: McGraw Hill, 1996.Toffler, Alvin. The Third Wave. London, Glasgow, Sydney, Auckland. Toronto, Johannesburg: William Collins, 1980.Travis, Hannibal. “Pirates of the Information Infrastructure: Blackstonian Copyright and the First Amendment.” Berkeley Technology Law Journal, Vol. 15 (2000), No. 777.Vaidhyanathan, Siva. Copyrights and Copywrongs: The Rise of Intellectual Property and How It Threatens Creativity. New York; London: New York UP, 2003.
APA, Harvard, Vancouver, ISO, and other styles
45

Losh, Elizabeth. "Artificial Intelligence." M/C Journal 10, no. 5 (October 1, 2007). http://dx.doi.org/10.5204/mcj.2710.

Full text
Abstract:
On the morning of Thursday, 4 May 2006, the United States House Permanent Select Committee on Intelligence held an open hearing entitled “Terrorist Use of the Internet.” The Intelligence committee meeting was scheduled to take place in Room 1302 of the Longworth Office Building, a Depression-era structure with a neoclassical façade. Because of a dysfunctional elevator, some of the congressional representatives were late to the meeting. During the testimony about the newest political applications for cutting-edge digital technology, the microphones periodically malfunctioned, and witnesses complained of “technical problems” several times. By the end of the day it seemed that what was to be remembered about the hearing was the shocking revelation that terrorists were using videogames to recruit young jihadists. The Associated Press wrote a short, restrained article about the hearing that only mentioned “computer games and recruitment videos” in passing. Eager to have their version of the news item picked up, Reuters made videogames the focus of their coverage with a headline that announced, “Islamists Using US Videogames in Youth Appeal.” Like a game of telephone, as the Reuters videogame story was quickly re-run by several Internet news services, each iteration of the title seemed less true to the exact language of the original. One Internet news service changed the headline to “Islamic militants recruit using U.S. video games.” Fox News re-titled the story again to emphasise that this alert about technological manipulation was coming from recognised specialists in the anti-terrorism surveillance field: “Experts: Islamic Militants Customizing Violent Video Games.” As the story circulated, the body of the article remained largely unchanged, in which the Reuters reporter described the digital materials from Islamic extremists that were shown at the congressional hearing. During the segment that apparently most captured the attention of the wire service reporters, eerie music played as an English-speaking narrator condemned the “infidel” and declared that he had “put a jihad” on them, as aerial shots moved over 3D computer-generated images of flaming oil facilities and mosques covered with geometric designs. Suddenly, this menacing voice-over was interrupted by an explosion, as a virtual rocket was launched into a simulated military helicopter. The Reuters reporter shared this dystopian vision from cyberspace with Western audiences by quoting directly from the chilling commentary and describing a dissonant montage of images and remixed sound. “I was just a boy when the infidels came to my village in Blackhawk helicopters,” a narrator’s voice said as the screen flashed between images of street-level gunfights, explosions and helicopter assaults. Then came a recording of President George W. Bush’s September 16, 2001, statement: “This crusade, this war on terrorism, is going to take a while.” It was edited to repeat the word “crusade,” which Muslims often define as an attack on Islam by Christianity. According to the news reports, the key piece of evidence before Congress seemed to be a film by “SonicJihad” of recorded videogame play, which – according to the experts – was widely distributed online. Much of the clip takes place from the point of view of a first-person shooter, seen as if through the eyes of an armed insurgent, but the viewer also periodically sees third-person action in which the player appears as a running figure wearing a red-and-white checked keffiyeh, who dashes toward the screen with a rocket launcher balanced on his shoulder. Significantly, another of the player’s hand-held weapons is a detonator that triggers remote blasts. As jaunty music plays, helicopters, tanks, and armoured vehicles burst into smoke and flame. Finally, at the triumphant ending of the video, a green and white flag bearing a crescent is hoisted aloft into the sky to signify victory by Islamic forces. To explain the existence of this digital alternative history in which jihadists could be conquerors, the Reuters story described the deviousness of the country’s terrorist opponents, who were now apparently modifying popular videogames through their wizardry and inserting anti-American, pro-insurgency content into U.S.-made consumer technology. One of the latest video games modified by militants is the popular “Battlefield 2” from leading video game publisher, Electronic Arts Inc of Redwood City, California. Jeff Brown, a spokesman for Electronic Arts, said enthusiasts often write software modifications, known as “mods,” to video games. “Millions of people create mods on games around the world,” he said. “We have absolutely no control over them. It’s like drawing a mustache on a picture.” Although the Electronic Arts executive dismissed the activities of modders as a “mustache on a picture” that could only be considered little more than childish vandalism of their off-the-shelf corporate product, others saw a more serious form of criminality at work. Testifying experts and the legislators listening on the committee used the video to call for greater Internet surveillance efforts and electronic counter-measures. Within twenty-four hours of the sensationalistic news breaking, however, a group of Battlefield 2 fans was crowing about the idiocy of reporters. The game play footage wasn’t from a high-tech modification of the software by Islamic extremists; it had been posted on a Planet Battlefield forum the previous December of 2005 by a game fan who had cut together regular game play with a Bush remix and a parody snippet of the soundtrack from the 2004 hit comedy film Team America. The voice describing the Black Hawk helicopters was the voice of Trey Parker of South Park cartoon fame, and – much to Parker’s amusement – even the mention of “goats screaming” did not clue spectators in to the fact of a comic source. Ironically, the moment in the movie from which the sound clip is excerpted is one about intelligence gathering. As an agent of Team America, a fictional elite U.S. commando squad, the hero of the film’s all-puppet cast, Gary Johnston, is impersonating a jihadist radical inside a hostile Egyptian tavern that is modelled on the cantina scene from Star Wars. Additional laughs come from the fact that agent Johnston is accepted by the menacing terrorist cell as “Hakmed,” despite the fact that he utters a series of improbable clichés made up of incoherent stereotypes about life in the Middle East while dressed up in a disguise made up of shoe polish and a turban from a bathroom towel. The man behind the “SonicJihad” pseudonym turned out to be a twenty-five-year-old hospital administrator named Samir, and what reporters and representatives saw was nothing more exotic than game play from an add-on expansion pack of Battlefield 2, which – like other versions of the game – allows first-person shooter play from the position of the opponent as a standard feature. While SonicJihad initially joined his fellow gamers in ridiculing the mainstream media, he also expressed astonishment and outrage about a larger politics of reception. In one interview he argued that the media illiteracy of Reuters potentially enabled a whole series of category errors, in which harmless gamers could be demonised as terrorists. It wasn’t intended for the purpose what it was portrayed to be by the media. So no I don’t regret making a funny video . . . why should I? The only thing I regret is thinking that news from Reuters was objective and always right. The least they could do is some online research before publishing this. If they label me al-Qaeda just for making this silly video, that makes you think, what is this al-Qaeda? And is everything al-Qaeda? Although Sonic Jihad dismissed his own work as “silly” or “funny,” he expected considerably more from a credible news agency like Reuters: “objective” reporting, “online research,” and fact-checking before “publishing.” Within the week, almost all of the salient details in the Reuters story were revealed to be incorrect. SonicJihad’s film was not made by terrorists or for terrorists: it was not created by “Islamic militants” for “Muslim youths.” The videogame it depicted had not been modified by a “tech-savvy militant” with advanced programming skills. Of course, what is most extraordinary about this story isn’t just that Reuters merely got its facts wrong; it is that a self-identified “parody” video was shown to the august House Intelligence Committee by a team of well-paid “experts” from the Science Applications International Corporation (SAIC), a major contractor with the federal government, as key evidence of terrorist recruitment techniques and abuse of digital networks. Moreover, this story of media illiteracy unfolded in the context of a fundamental Constitutional debate about domestic surveillance via communications technology and the further regulation of digital content by lawmakers. Furthermore, the transcripts of the actual hearing showed that much more than simple gullibility or technological ignorance was in play. Based on their exchanges in the public record, elected representatives and government experts appear to be keenly aware that the digital discourses of an emerging information culture might be challenging their authority and that of the longstanding institutions of knowledge and power with which they are affiliated. These hearings can be seen as representative of a larger historical moment in which emphatic declarations about prohibiting specific practices in digital culture have come to occupy a prominent place at the podium, news desk, or official Web portal. This environment of cultural reaction can be used to explain why policy makers’ reaction to terrorists’ use of networked communication and digital media actually tells us more about our own American ideologies about technology and rhetoric in a contemporary information environment. When the experts come forward at the Sonic Jihad hearing to “walk us through the media and some of the products,” they present digital artefacts of an information economy that mirrors many of the features of our own consumption of objects of electronic discourse, which seem dangerously easy to copy and distribute and thus also create confusion about their intended meanings, audiences, and purposes. From this one hearing we can see how the reception of many new digital genres plays out in the public sphere of legislative discourse. Web pages, videogames, and Weblogs are mentioned specifically in the transcript. The main architecture of the witnesses’ presentation to the committee is organised according to the rhetorical conventions of a PowerPoint presentation. Moreover, the arguments made by expert witnesses about the relationship of orality to literacy or of public to private communications in new media are highly relevant to how we might understand other important digital genres, such as electronic mail or text messaging. The hearing also invites consideration of privacy, intellectual property, and digital “rights,” because moral values about freedom and ownership are alluded to by many of the elected representatives present, albeit often through the looking glass of user behaviours imagined as radically Other. For example, terrorists are described as “modders” and “hackers” who subvert those who properly create, own, legitimate, and regulate intellectual property. To explain embarrassing leaks of infinitely replicable digital files, witness Ron Roughead says, “We’re not even sure that they don’t even hack into the kinds of spaces that hold photographs in order to get pictures that our forces have taken.” Another witness, Undersecretary of Defense for Policy and International Affairs, Peter Rodman claims that “any video game that comes out, as soon as the code is released, they will modify it and change the game for their needs.” Thus, the implication of these witnesses’ testimony is that the release of code into the public domain can contribute to political subversion, much as covert intrusion into computer networks by stealthy hackers can. However, the witnesses from the Pentagon and from the government contractor SAIC often present a contradictory image of the supposed terrorists in the hearing transcripts. Sometimes the enemy is depicted as an organisation of technological masterminds, capable of manipulating the computer code of unwitting Americans and snatching their rightful intellectual property away; sometimes those from the opposing forces are depicted as pre-modern and even sub-literate political innocents. In contrast, the congressional representatives seem to focus on similarities when comparing the work of “terrorists” to the everyday digital practices of their constituents and even of themselves. According to the transcripts of this open hearing, legislators on both sides of the aisle express anxiety about domestic patterns of Internet reception. Even the legislators’ own Web pages are potentially disruptive electronic artefacts, particularly when the demands of digital labour interfere with their duties as lawmakers. Although the subject of the hearing is ostensibly terrorist Websites, Representative Anna Eshoo (D-California) bemoans the difficulty of maintaining her own official congressional site. As she observes, “So we are – as members, I think we’re very sensitive about what’s on our Website, and if I retained what I had on my Website three years ago, I’d be out of business. So we know that they have to be renewed. They go up, they go down, they’re rebuilt, they’re – you know, the message is targeted to the future.” In their questions, lawmakers identify Weblogs (blogs) as a particular area of concern as a destabilising alternative to authoritative print sources of information from established institutions. Representative Alcee Hastings (D-Florida) compares the polluting power of insurgent bloggers to that of influential online muckrakers from the American political Right. Hastings complains of “garbage on our regular mainstream news that comes from blog sites.” Representative Heather Wilson (R-New Mexico) attempts to project a media-savvy persona by bringing up the “phenomenon of blogging” in conjunction with her questions about jihadist Websites in which she notes how Internet traffic can be magnified by cooperative ventures among groups of ideologically like-minded content-providers: “These Websites, and particularly the most active ones, are they cross-linked? And do they have kind of hot links to your other favorite sites on them?” At one point Representative Wilson asks witness Rodman if he knows “of your 100 hottest sites where the Webmasters are educated? What nationality they are? Where they’re getting their money from?” In her questions, Wilson implicitly acknowledges that Web work reflects influences from pedagogical communities, economic networks of the exchange of capital, and even potentially the specific ideologies of nation-states. It is perhaps indicative of the government contractors’ anachronistic worldview that the witness is unable to answer Wilson’s question. He explains that his agency focuses on the physical location of the server or ISP rather than the social backgrounds of the individuals who might be manufacturing objectionable digital texts. The premise behind the contractors’ working method – surveilling the technical apparatus not the social network – may be related to other beliefs expressed by government witnesses, such as the supposition that jihadist Websites are collectively produced and spontaneously emerge from the indigenous, traditional, tribal culture, instead of assuming that Iraqi insurgents have analogous beliefs, practices, and technological awareness to those in first-world countries. The residual subtexts in the witnesses’ conjectures about competing cultures of orality and literacy may tell us something about a reactionary rhetoric around videogames and digital culture more generally. According to the experts before Congress, the Middle Eastern audience for these videogames and Websites is limited by its membership in a pre-literate society that is only capable of abortive cultural production without access to knowledge that is archived in printed codices. Sometimes the witnesses before Congress seem to be unintentionally channelling the ideas of the late literacy theorist Walter Ong about the “secondary orality” associated with talky electronic media such as television, radio, audio recording, or telephone communication. Later followers of Ong extend this concept of secondary orality to hypertext, hypermedia, e-mail, and blogs, because they similarly share features of both speech and written discourse. Although Ong’s disciples celebrate this vibrant reconnection to a mythic, communal past of what Kathleen Welch calls “electric rhetoric,” the defence industry consultants express their profound state of alarm at the potentially dangerous and subversive character of this hybrid form of communication. The concept of an “oral tradition” is first introduced by the expert witnesses in the context of modern marketing and product distribution: “The Internet is used for a variety of things – command and control,” one witness states. “One of the things that’s missed frequently is how and – how effective the adversary is at using the Internet to distribute product. They’re using that distribution network as a modern form of oral tradition, if you will.” Thus, although the Internet can be deployed for hierarchical “command and control” activities, it also functions as a highly efficient peer-to-peer distributed network for disseminating the commodity of information. Throughout the hearings, the witnesses imply that unregulated lateral communication among social actors who are not authorised to speak for nation-states or to produce legitimated expert discourses is potentially destabilising to political order. Witness Eric Michael describes the “oral tradition” and the conventions of communal life in the Middle East to emphasise the primacy of speech in the collective discursive practices of this alien population: “I’d like to point your attention to the media types and the fact that the oral tradition is listed as most important. The other media listed support that. And the significance of the oral tradition is more than just – it’s the medium by which, once it comes off the Internet, it is transferred.” The experts go on to claim that this “oral tradition” can contaminate other media because it functions as “rumor,” the traditional bane of the stately discourse of military leaders since the classical era. The oral tradition now also has an aspect of rumor. A[n] event takes place. There is an explosion in a city. Rumor is that the United States Air Force dropped a bomb and is doing indiscriminate killing. This ends up being discussed on the street. It ends up showing up in a Friday sermon in a mosque or in another religious institution. It then gets recycled into written materials. Media picks up the story and broadcasts it, at which point it’s now a fact. In this particular case that we were telling you about, it showed up on a network television, and their propaganda continues to go back to this false initial report on network television and continue to reiterate that it’s a fact, even though the United States government has proven that it was not a fact, even though the network has since recanted the broadcast. In this example, many-to-many discussion on the “street” is formalised into a one-to many “sermon” and then further stylised using technology in a one-to-many broadcast on “network television” in which “propaganda” that is “false” can no longer be disputed. This “oral tradition” is like digital media, because elements of discourse can be infinitely copied or “recycled,” and it is designed to “reiterate” content. In this hearing, the word “rhetoric” is associated with destructive counter-cultural forces by the witnesses who reiterate cultural truisms dating back to Plato and the Gorgias. For example, witness Eric Michael initially presents “rhetoric” as the use of culturally specific and hence untranslatable figures of speech, but he quickly moves to an outright castigation of the entire communicative mode. “Rhetoric,” he tells us, is designed to “distort the truth,” because it is a “selective” assembly or a “distortion.” Rhetoric is also at odds with reason, because it appeals to “emotion” and a romanticised Weltanschauung oriented around discourses of “struggle.” The film by SonicJihad is chosen as the final clip by the witnesses before Congress, because it allegedly combines many different types of emotional appeal, and thus it conveniently ties together all of the themes that the witnesses present to the legislators about unreliable oral or rhetorical sources in the Middle East: And there you see how all these products are linked together. And you can see where the games are set to psychologically condition you to go kill coalition forces. You can see how they use humor. You can see how the entire campaign is carefully crafted to first evoke an emotion and then to evoke a response and to direct that response in the direction that they want. Jihadist digital products, especially videogames, are effective means of manipulation, the witnesses argue, because they employ multiple channels of persuasion and carefully sequenced and integrated subliminal messages. To understand the larger cultural conversation of the hearing, it is important to keep in mind that the related argument that “games” can “psychologically condition” players to be predisposed to violence is one that was important in other congressional hearings of the period, as well one that played a role in bills and resolutions that were passed by the full body of the legislative branch. In the witness’s testimony an appeal to anti-game sympathies at home is combined with a critique of a closed anti-democratic system abroad in which the circuits of rhetorical production and their composite metonymic chains are described as those that command specific, unvarying, robotic responses. This sharp criticism of the artful use of a presentation style that is “crafted” is ironic, given that the witnesses’ “compilation” of jihadist digital material is staged in the form of a carefully structured PowerPoint presentation, one that is paced to a well-rehearsed rhythm of “slide, please” or “next slide” in the transcript. The transcript also reveals that the members of the House Intelligence Committee were not the original audience for the witnesses’ PowerPoint presentation. Rather, when it was first created by SAIC, this “expert” presentation was designed for training purposes for the troops on the ground, who would be facing the challenges of deployment in hostile terrain. According to the witnesses, having the slide show showcased before Congress was something of an afterthought. Nonetheless, Congressman Tiahrt (R-KN) is so impressed with the rhetorical mastery of the consultants that he tries to appropriate it. As Tiarht puts it, “I’d like to get a copy of that slide sometime.” From the hearing we also learn that the terrorists’ Websites are threatening precisely because they manifest a polymorphously perverse geometry of expansion. For example, one SAIC witness before the House Committee compares the replication and elaboration of digital material online to a “spiderweb.” Like Representative Eshoo’s site, he also notes that the terrorists’ sites go “up” and “down,” but the consultant is left to speculate about whether or not there is any “central coordination” to serve as an organising principle and to explain the persistence and consistency of messages despite the apparent lack of a single authorial ethos to offer a stable, humanised, point of reference. In the hearing, the oft-cited solution to the problem created by the hybridity and iterability of digital rhetoric appears to be “public diplomacy.” Both consultants and lawmakers seem to agree that the damaging messages of the insurgents must be countered with U.S. sanctioned information, and thus the phrase “public diplomacy” appears in the hearing seven times. However, witness Roughhead complains that the protean “oral tradition” and what Henry Jenkins has called the “transmedia” character of digital culture, which often crosses several platforms of traditional print, projection, or broadcast media, stymies their best rhetorical efforts: “I think the point that we’ve tried to make in the briefing is that wherever there’s Internet availability at all, they can then download these – these programs and put them onto compact discs, DVDs, or post them into posters, and provide them to a greater range of people in the oral tradition that they’ve grown up in. And so they only need a few Internet sites in order to distribute and disseminate the message.” Of course, to maintain their share of the government market, the Science Applications International Corporation also employs practices of publicity and promotion through the Internet and digital media. They use HTML Web pages for these purposes, as well as PowerPoint presentations and online video. The rhetoric of the Website of SAIC emphasises their motto “From Science to Solutions.” After a short Flash film about how SAIC scientists and engineers solve “complex technical problems,” the visitor is taken to the home page of the firm that re-emphasises their central message about expertise. The maps, uniforms, and specialised tools and equipment that are depicted in these opening Web pages reinforce an ethos of professional specialisation that is able to respond to multiple threats posed by the “global war on terror.” By 26 June 2006, the incident finally was being described as a “Pentagon Snafu” by ABC News. From the opening of reporter Jake Tapper’s investigative Webcast, established government institutions were put on the spot: “So, how much does the Pentagon know about videogames? Well, when it came to a recent appearance before Congress, apparently not enough.” Indeed, the very language about “experts” that was highlighted in the earlier coverage is repeated by Tapper in mockery, with the significant exception of “independent expert” Ian Bogost of the Georgia Institute of Technology. If the Pentagon and SAIC deride the legitimacy of rhetoric as a cultural practice, Bogost occupies himself with its defence. In his recent book Persuasive Games: The Expressive Power of Videogames, Bogost draws upon the authority of the “2,500 year history of rhetoric” to argue that videogames represent a significant development in that cultural narrative. Given that Bogost and his Watercooler Games Weblog co-editor Gonzalo Frasca were actively involved in the detective work that exposed the depth of professional incompetence involved in the government’s line-up of witnesses, it is appropriate that Bogost is given the final words in the ABC exposé. As Bogost says, “We should be deeply bothered by this. We should really be questioning the kind of advice that Congress is getting.” Bogost may be right that Congress received terrible counsel on that day, but a close reading of the transcript reveals that elected officials were much more than passive listeners: in fact they were lively participants in a cultural conversation about regulating digital media. After looking at the actual language of these exchanges, it seems that the persuasiveness of the misinformation from the Pentagon and SAIC had as much to do with lawmakers’ preconceived anxieties about practices of computer-mediated communication close to home as it did with the contradictory stereotypes that were presented to them about Internet practices abroad. In other words, lawmakers found themselves looking into a fun house mirror that distorted what should have been familiar artefacts of American popular culture because it was precisely what they wanted to see. References ABC News. “Terrorist Videogame?” Nightline Online. 21 June 2006. 22 June 2006 http://abcnews.go.com/Video/playerIndex?id=2105341>. Bogost, Ian. Persuasive Games: Videogames and Procedural Rhetoric. Cambridge, MA: MIT Press, 2007. Game Politics. “Was Congress Misled by ‘Terrorist’ Game Video? We Talk to Gamer Who Created the Footage.” 11 May 2006. http://gamepolitics.livejournal.com/285129.html#cutid1>. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York UP, 2006. julieb. “David Morgan Is a Horrible Writer and Should Be Fired.” Online posting. 5 May 2006. Dvorak Uncensored Cage Match Forums. http://cagematch.dvorak.org/index.php/topic,130.0.html>. Mahmood. “Terrorists Don’t Recruit with Battlefield 2.” GGL Global Gaming. 16 May 2006 http://www.ggl.com/news.php?NewsId=3090>. Morgan, David. “Islamists Using U.S. Video Games in Youth Appeal.” Reuters online news service. 4 May 2006 http://today.reuters.com/news/ArticleNews.aspx?type=topNews &storyID=2006-05-04T215543Z_01_N04305973_RTRUKOC_0_US-SECURITY- VIDEOGAMES.xml&pageNumber=0&imageid=&cap=&sz=13&WTModLoc= NewsArt-C1-ArticlePage2>. Ong, Walter J. Orality and Literacy: The Technologizing of the Word. London/New York: Methuen, 1982. Parker, Trey. Online posting. 7 May 2006. 9 May 2006 http://www.treyparker.com>. Plato. “Gorgias.” Plato: Collected Dialogues. Princeton: Princeton UP, 1961. Shrader, Katherine. “Pentagon Surfing Thousands of Jihad Sites.” Associated Press 4 May 2006. SonicJihad. “SonicJihad: A Day in the Life of a Resistance Fighter.” Online posting. 26 Dec. 2005. Planet Battlefield Forums. 9 May 2006 http://www.forumplanet.com/planetbattlefield/topic.asp?fid=13670&tid=1806909&p=1>. Tapper, Jake, and Audery Taylor. “Terrorist Video Game or Pentagon Snafu?” ABC News Nightline 21 June 2006. 30 June 2006 http://abcnews.go.com/Nightline/Technology/story?id=2105128&page=1>. U.S. Congressional Record. Panel I of the Hearing of the House Select Intelligence Committee, Subject: “Terrorist Use of the Internet for Communications.” Federal News Service. 4 May 2006. Welch, Kathleen E. Electric Rhetoric: Classical Rhetoric, Oralism, and the New Literacy. Cambridge, MA: MIT Press, 1999. Citation reference for this article MLA Style Losh, Elizabeth. "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/08-losh.php>. APA Style Losh, E. (Oct. 2007) "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/08-losh.php>.
APA, Harvard, Vancouver, ISO, and other styles
46

Gregg, Melissa. "Normal Homes." M/C Journal 10, no. 4 (August 1, 2007). http://dx.doi.org/10.5204/mcj.2682.

Full text
Abstract:
…love is queered not when we discover it to be resistant to or more than its known forms, but when we see that there is no world that admits how it actually works as a principle of living. Lauren Berlant – “Love, A Queer Feeling” As the sun beats down on a very dusty Musgrave Park, the crowd is hushed in respect for the elder addressing us. It is Pride Fair Day and we are listening to the story of how this place has been a home for queer and black people throughout Brisbane’s history. Like so many others, this park has been a place of refuge in times when Boundary Streets marked the lines aboriginal people couldn’t cross to enter the genteel heart of Brisbane’s commercial district. The street names remain today, and even if movements across territory are somewhat less constrained, a manslaughter trial taking place nearby reminds us of the surveillance aboriginal people still suffer as a result of their refusal to stay off the streets and out of sight in homes they don’t have. In the past few years, Fair Day has grown in size. It now charges an entry fee to fence out unwelcome guests, so that those who normally live here have been effectively uninvited from the party. On this sunny Saturday, we sit and talk about these things, and wonder at the number of spaces still left in this city for spontaneous, non-commercial encounters and alliances. We could hardly have known that in the course of just a few weeks, the distance separating us from others would grow even further. During the course of Brisbane’s month-long Pride celebrations in 2007, two events affected the rights agendas of both queer and black Australians. First, The Human Rights and Equal Opportunity Commission Report, Same Sex, Same Entitlements, was tabled in parliament. Second, the Federal government decided to declare a state of emergency in remote indigenous communities in the Northern Territory in response to an inquiry on the state of aboriginal child abuse. (The full title of the report is “Ampe Akelyernemane Meke Mekarle”: Little Children are Sacred, and the words are from the Arrandic languages of the Central Desert Region of the Northern Territory. The report’s front cover also explains the title in relation to traditional law of the Yolngu people of Arnhem Land.) While the latter issue has commanded the most media and intellectual attention, and will be discussed later in this piece, the timing of both reports provides an opportunity to consider the varying experiences of two particularly marginalised groups in contemporary Australia. In a period when the Liberal Party has succeeded in pitting minority claims against one another as various manifestations of “special interests” (Brett, Gregg) this essay suggests there is a case to be made for queer and black activists to join forces against wider tendencies that affect both communities. To do this I draw on the work of American critic, Lauren Berlant, who for many years has offered a unique take on debates about citizenship in the United States. Writing from a queer theory perspective, Berlant argues that the conservative political landscape in her country has succeeded in convincing people that “the intimacy of citizenship is something scarce and sacred, private and proper, and only for members of families” (Berlant Queen 2-3). The consequence of this shift is that politics moves from being a conversation conducted in the public sphere about social issues to instead resemble a form of adjudication on the conduct of others in the sphere of private life. In this way, Berlant indicates how heteronormative culture “uses cruel and mundane strategies both to promote change from non-normative populations and to deny them state, federal, and juridical supports because they are deemed morally incompetent to their own citizenship” (Berlant, Queen 19). In relation to the so-called state of emergency in the Northern Territory, coming so soon after attempts to encourage indigenous home-ownership in the same region, the compulsion to promote change from non-normative populations currently affects indigenous Australians in ways that resonate with Berlant’s argument. While her position reacts to an environment where the moral majority has a much firmer hold on the national political spectrum, in Australia these conservative forces have no need to be so eloquent—normativity is already embedded in a particular form of “ordinariness” that is the commonsense basis for public political debate (Allon, Brett and Moran). These issues take on further significance as home-ownership and aspirations towards it have gradually become synonymous with the demonstration of appropriate citizenship under the Coalition government: here, phrases like “an interest rate election” are assumed to encapsulate voter sentiment while “the mortgage belt” has emerged as the demographic most keenly wooed by precariously placed politicians. As Berlant argues elsewhere, the project of normalization that makes heterosexuality hegemonic also entails “material practices that, though not explicitly sexual, are implicated in the hierarchies of property and propriety” that secure heteronormative privilege (Berlant and Warner 548). Inhabitants of remote indigenous communities in Australia are invited to desire and enact normal homes in order to be accepted and rewarded as valuable members of the nation; meanwhile gay and lesbian couples base their claims for recognition on the adequate manifestation of normal homes. In this situation black and queer activists share an interest in elaborating forms of kinship and community that resist the limited varieties of home-building currently sanctioned and celebrated by the State. As such, I will conclude this essay with a model for this alternative process of home-building in the hope of inspiring others. Home Sweet Home Ever since the declaration of terra nullius, white Australia has had a hard time recognising homes it doesn’t consider normal. To the first settlers, indigenous people’s uncultivated land lacked meaning, their seasonal itinerancy challenged established notions of property, while their communal living and wider kinship relations confused nuclear models of procreative responsibility and ancestry. From the homes white people still call “camps” many aboriginal people were moved against their will on to “missions” which even in name invoked the goal of assimilation into mainstream society. So many years later, white people continue to maintain that their version of homemaking is the most superior, the most economically effective, the most functional, with government policy and media commentators both agreeing that “the way out of indigenous disadvantage is home ownership.”(The 1 July broadcast of the esteemed political chat show Insiders provides a representative example of this consensus view among some of the country’s most respected journalists.) In the past few months, low-interest loans have been touted as the surest route out of the shared “squalor” (Weekend Australian, June 30-July1) of communal living and the right path towards economic development in remote aboriginal communities (Karvelas, “New Deal”). As these references suggest, The Australian newspaper has been at the forefront of reporting these government initiatives in a positive light: one story from late May featured a picture of Tiwi Islander Mavis Kerinaiua watering her garden with the pet dog and sporting a Tigers Aussie Rules singlet. The headline, “Home, sweet home, for Mavis” (Wilson) was a striking example of a happy and contented black woman in her own backyard, especially given how regularly mainstream national news coverage of indigenous issues follows a script of failed aboriginal communities. In stories like these, communal land ownership is painted as the cause of dysfunction, and individual homes are crucial to “changing the culture.” Never is it mentioned that communal living arrangements clearly were functional before white settlement, were an intrinsic part of “the culture”; nor is it acknowledged that the option being offered to indigenous people is land that had already been taken away from them in one way or another. That this same land can be given back only on certain conditions—including financially rewarding those who “prove they are doing well” by cultivating their garden in recognisably right ways (Karvelas, “New Deal”)— bolsters Berlant’s claim that government rhetoric succeeds by transforming wider structural questions into matters of individual responsibility. Home ownership is the stunningly selective neoliberal interpretation of “land rights”. The very notion of private property erases the social and cultural underpinnings of communal living as a viable way of life, stigmatising any alternative forms of belonging that might form the basis for another kind of home. Little Children Are Sacred The latest advance in efforts to encourage greater individual responsibility in indigenous communities highlights child abuse as the pivotal consequence of State and Local government inaction. The innocent indigenous child provides the catalyst for a myriad of competing political positions, the most vocal of which welcomes military intervention on behalf of powerless, voiceless kids trapped in horrendous scenarios (Kervalas, “Pearson’s Passion”). In these representations, the potentially abused aboriginal child takes on “supericonicity” in public debate. In her North American context, Berlant uses this concept to explain how the unborn child figures in acrimonious arguments over abortion. The foetus has become the most mobilising image in the US political scene because: it is an image of an American, perhaps the last living American, not yet bruised by history: not yet caught up in the processes of secularisation and centralisation… This national icon is too innocent of knowledge, agency, and accountability and thus has ethical claims on the adult political agents who write laws, make culture, administer resources, control things. (Berlant, Queen 6) In Australia, the indigenous child takes on supericonicity because he or she is too young to formulate a “black armband” view of history, to have a point of view on why their circumstance happens to be so objectionable, to vote out the government that wants to survey and penetrate his or her body. The child’s very lack of agency is used as justification for the military action taken by those who write laws, make the culture that will be recognized as an appropriate performance of indigeneity, administer (at the same time as they cut) essential resources; those who, for the moment, control things. However, and although a government perspective would not recognize this, in Australia the indigenous child is always already bruised by conventional history in the sense that he or she will have trouble accessing the stories of ancestors and therefore the situation that affects his or her entry into the world. Indeed, it is precisely the extent to which the government denies its institutional culpability in inflicting wounds on aboriginal people throughout history that the indigenous child’s supericonicity is now available as a political weapon. Same-Sex: Same Entitlements A situation in which the desire for home ownership is pedagogically enforced while also being economically sanctioned takes on further dimensions when considered next to the fate of other marginalised groups in society—those for whom an appeal for acceptance and equal rights pivots on the basis of successfully performing normal homes. While indigenous Australians are encouraged to aspire for home ownership as the appropriate manifestation of responsible citizenship, the HREOC report represents a group of citizens who crave recognition for already having developed this same aspiration. In the case studies selected for the Same-Sex: Same Entitlements Report, discrimination against same-sex couples is identified in areas such as work and taxation, workers’ compensation, superannuation, social security, veterans’ entitlements and childrearing. It recommends changes to existing laws in these areas to match those that apply to de facto relationships. When launching the report, the commissioner argued that gay people suffer discrimination “simply because of whom they love”, and the report launch quotes a “self-described ‘average suburban family’” who insist “we don’t want special treatment …we just want equality” (HREOC). Such positioning exercises give some insight into Berlant’s statement that “love is a site that has perhaps not yet been queered enough” (Berlant, “Love” 433). A queer response to the report might highlight that by focussing on legal entitlements of the most material kind, little is done to challenge the wider situation in which one’s sexual relationship has the power to determine intimate possessions and decisions—whether this is buying a plane ticket, getting a loan, retiring in some comfort or finding a nice nursing home. An agenda calling for legislative changes to financial entitlement serves to reiterate rather than challenge the extent to which economically sanctioned subjectivities are tied to sexuality and normative models of home-building. A same-sex rights agenda promoting traditional notions of procreative familial attachment (the concerned parents of gay kids cited in the report, the emphasis on the children of gay couples) suggests that this movement for change relies on a heteronormative model—if this is understood as the manner in which the institutions of personal life remain “the privileged institutions of social reproduction, the accumulation and transfer of capital, and self-development” (Berlant and Warner 553). What happens to those who do not seek the same procreative path? Put another way, the same-sex entitlements discourse can be seen to demand “intelligibility” within the hegemonic understanding of love, when love currently stands as the primordial signifier and ultimate suturing device for all forms of safe, reliable and useful citizenly identity (Berlant, “Love”). In its very terminology, same-sex entitlement asks to access the benefits of normativity without challenging the ideological or economic bases for its attachment to particular living arrangements and rewards. The political agenda for same-sex rights taking shape in the Federal arena appears to have chosen its objectives carefully in order to fit existing notions of proper home building and the economic incentives that come with them. While this is understandable in a conservative political environment, a wider agenda for queer activism in and outside the home would acknowledge that safety, security and belonging are universal desires that stretch beyond material acquisitions, financial concerns and procreative activity (however important these things are). It is to the possibilities this perspective might generate that I now turn. One Size Fits Most Urban space is always a host space. The right to the city extends to those who use the city. It is not limited to property owners. (Berlant and Warner, 563) The affective charge and resonance of a concept like home allows an opportunity to consider the intimacies particular to different groups in society, at the same time as it allows contemplation of the kinds of alliances increasingly required to resist neoliberalism’s impact on personal space. On one level, this might entail publicly denouncing representations of indigenous living conditions that describe them as “squalor” as some kind of hygienic short-hand that comes at the expense of advocating infrastructure suited to the very different way of living that aboriginal kinship relations typically require. Further, as alternative cultural understandings of home face ongoing pressure to fit normative ideals, a key project for contemporary queer activism is to archive, document and publicise the varied ways people choose to live at this point in history in defiance of sanctioned arrangements (eg Gorman-Murray 2007). Rights for gay and lesbian couples and parents need not be called for in the name of equality if to do so means reproducing a logic that feeds the worst stereotypes around non-procreating queers. Such a perspective fares poorly for the many literally unproductive citizens, queer and straight alike, whose treacherous refusal to breed banishes them from the respectable suburban politics to which the current government caters. Which takes me back to the park. Later that afternoon on Fair Day, we’ve been entertained by a range of performers, including the best Tina Turner impersonator I’ll ever see. But the highlight is the festival’s special guest, Vanessa Wagner who decides to end her show with a special ceremony. Taking the role of celebrant, Vanessa invites three men on to the stage who she explains are in an ongoing, committed three-way relationship. Looking a little closer, I remember meeting these blokes at a friend’s party last Christmas Eve: I was the only girl in an apartment full of gay men in the midst of some serious partying (and who could blame them, on the eve of an event that holds dubious relevance for their preferred forms of intimacy and celebration?). The wedding takes place in front of an increasingly boisterous crowd that cannot fail to appreciate the gesture as farcically mocking the sacred bastion of gay activism—same-sex marriage. But clearly, the ceremony plays a role in consecrating the obvious desire these men have for each other, in a safe space that feels something like a home. Their relationship might be a long way from many people’s definition of normal, but it clearly operates with care, love and a will for some kind of longevity. For queer subjects, faced with a history of persecution, shame and an unequal share of a pernicious illness, this most banal of possible definitions of home has been a luxury difficult to afford. Understood in this way, queer experience is hard to compare with that of indigenous people: “The queer world is a space of entrances, exits, unsystematised lines of acquaintance, projected horizons, typifying examples, alternate routes, blockages, incommensurate geographies” (Berlant and Warner 558). In many instances, it has “required the development of kinds of intimacy that bear no necessary relation to domestic space, to kinship, to the couple form, to property, or to the nation” (ibid) in liminal and fleeting zones of improvisation like parties, parks and public toilets. In contrast, indigenous Australians’ distinct lines of ancestry, geography, and story continue through generations of kin in spite of the efforts of a colonising power to reproduce others in its own image. But in this sense, what queer and black Australians now share is the fight to live and love in more than one way, with more than one person: to extend relationships of care beyond the procreative imperative and to include land that is beyond the scope of one’s own backyard. Both indigenous and queer Australians stand to benefit from a shared project “to support forms of affective, erotic and personal living that are public in the sense of accessible, available to memory, and sustained through collective activity” (Berlant and Warner 562). To build this history is to generate an archive that is “not simply a repository” but “is also a theory of cultural relevance” (Halberstam 163). A queer politics of home respects and learns from different ways of organising love, care, affinity and responsibility to a community. This essay has been an attempt to document other ways of living that take place in the pockets of one city, to show that homes often exist where others see empty space, and that love regularly survives beyond the confines of the couple. In learning from the history of oppression experienced in the immediate territories I inhabit, I also hope it captures what it means to reckon with the ongoing knowledge of being an uninvited guest in the home of another culture, one which, through shared activism, will continue to survive much longer than this, or any other archive. References Allon, Fiona. “Home as Cultural Translation: John Howard’s Earlwood.” Communal/Plural 5 (1997): 1-25. Berlant, Lauren. The Queen of America Goes to Washington City: Essays on Sex and Citizenship. Durham: Duke University Press, 1997. ———. “Love, A Queer Feeling.” Homosexuality and Psychoanalysis. Eds. Tim Dean and Christopher Lane. Chicago and London: The University of Chicago Press, 2001. 432-51. ———, and Michael Warner. “Sex in Public.” Critical Inquiry 24.2 (1998): 547-566. Brett, Judith. Australian Liberals and the Moral Middle Class: From Alfred Deakin to John Howard. Cambridge: Cambridge University Press, 2003. ———, and Anthony Moran. Ordinary People’s Politics: Australians Talk About Politics, Life and the Future of Their Country. Melbourne: Pluto Press, 2006. Gorman-Murray, Andrew. “Contesting Domestic Ideals: Queering the Australian Home.” Australian Geographer 38.2 (2007): 195-213. Gregg, Melissa. “The Importance of Being Ordinary.” International Journal of Cultural Studies 10.1 (2007): 95-104. Halberstam, Judith. In a Queer Time and Place: Transgender Bodies, Subcultural Lives. New York and London: NYU Press, 2005 Human Rights and Equal Opportunity Commission. Same-Sex: Same Entitlements Report. 2007. 21 Aug. 2007 http://www.hreoc.gov.au/human_rights/samesex/report/index.html>. ———. Launch of Final Report of the Human Rights and Equal Opportunity Commission’s Same-Sex: Same Entitlements Inquiry (transcript). 2007. 5 July 2007 . Insiders. ABC TV. 1 July 2007. 5 July 2007 http://www.abc.net.au/insiders/content/2007/s1966728.htm>. Karvelas, Patricia. “It’s New Deal or Despair: Pearson.” The Weekend Australian 12-13 May 2007: 7. ———. “How Pearson’s Passion Moved Howard to Act.” The Australian. 23 June 2007. 5 July 2007 http://www.theaustralian.news.com.au/story/0,20867,21952951-5013172,00.html>. Northern Territory Government Inquiry Report into the Protection of Aboriginal Children from Sexual Abuse. Ampe Akelyernemane Meke Mekarle: Little Children Are Sacred. 2007. 5 July 2007 http://www.nt.gov.au/dcm/inquirysaac/pdf/bipacsa_final_report.pdf>. Wilson, Ashleigh. “Home, Sweet Home, for Mavis.” The Weekend Australian 12-13 May 2007: 7. Citation reference for this article MLA Style Gregg, Melissa. "Normal Homes." M/C Journal 10.4 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0708/02-gregg.php>. APA Style Gregg, M. (Aug. 2007) "Normal Homes," M/C Journal, 10(4). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0708/02-gregg.php>.
APA, Harvard, Vancouver, ISO, and other styles
47

Lee, Ashlin. "In the Shadow of Platforms." M/C Journal 24, no. 2 (April 27, 2021). http://dx.doi.org/10.5204/mcj.2750.

Full text
Abstract:
Introduction This article explores the changing relational quality of “the shadow of hierarchy”, in the context of the merging of platforms with infrastructure as the source of the shadow of hierarchy. In governance and regulatory studies, the shadow of hierarchy (or variations thereof), describes the space of influence that hierarchal organisations and infrastructures have (Héritier and Lehmkuhl; Lance et al.). A shift in who/what casts the shadow of hierarchy will necessarily result in changes to the attendant relational values, logics, and (techno)socialities that constitute the shadow, and a new arrangement of shadow that presents new challenges and opportunities. This article reflects on relevant literature to consider two different ways the shadow of hierarchy has qualitatively changed as platforms, rather than infrastructures, come to cast the shadow of hierarchy – an increase in scalability; and new socio-technical arrangements of (non)participation – and the opportunities and challenges therein. The article concludes that more concerted efforts are needed to design the shadow, given a seemingly directionless desire to enact data-driven solutions. The Shadow of Hierarchy, Infrastructures, and Platforms The shadow of hierarchy refers to how institutional, infrastructural, and organisational hierarchies create a relational zone of influence over a particular space. This commonly refers to executive decisions and legislation created by nation states, which are cast over private and non-governmental actors (Héritier and Lehmkuhl, 2). Lance et al. (252–53) argue that the shadow of hierarchy is a productive and desirable thing. Exploring the shadow of hierarchy in the context of how geospatial data agencies govern their data, Lance et al. find that the shadow of hierarchy enables the networked governance approaches that agencies adopt. This is because operating in the shadow of institutions provides authority, confers bureaucratic legitimacy and top-down power, and offers financial support. The darkness of the shadow is thus less a moral or ethicopolitical statement (such as that suggested by Fisher and Bolter, who use the idea of darkness to unpack the morality of tourism involving death and human suffering), and instead a relationality; an expression of differing values, logics, and (techno)socialities internal and external to those infrastructures and institutions that cast it (Gehl and McKelvey). The shadow of hierarchy might therefore be thought of as a field of relational influences and power that a social body casts over society, by virtue of a privileged position vis-a-vis society. It modulates society’s “light”; the resources (Bourdieu) and power relationships (Foucault) that run through social life, as parsed through a certain institutional and infrastructural worldview (the thing that blocks the light to create the shadow). In this way the shadow of hierarchy is not a field of absolute blackness that obscures, but instead a gradient of light and dark that creates certain effects. The shadow of hierarchy is now, however, also being cast by decentralised, privately held, and non-hierarchal platforms that are replacing or merging with public infrastructure, creating new social effects. Platforms are digital, socio-technical systems that create relationships between different entities. They are most commonly built around a relatively fixed core function (such as a social media service like Facebook), that then interacts with a peripheral set of complementors (advertising companies and app developers in the case of social media; Baldwin and Woodard), to create new relationships, forms of value, and other interactions (van Dijck, The Culture of Connectivity). In creating these relationships, platforms become inherently political (Gillespie), shaping relationships and content on the platform (Suzor) and in embodied life (Ajunwa; Eubanks). While platforms are often associated with optional consumer platforms (such as streaming services like Spotify), they have increasingly come to occupy the place of public infrastructure, and act as a powerful enabler to different socio-technical, economic, and political relationships (van Dijck, Governing Digital Societies). For instance, Plantin et al. argue that platforms have merged with infrastructures, and that once publicly held and funded institutions and essential services now share many characteristics with for-profit, privately held platforms. For example, Australia has had a long history of outsourcing employment services (Webster and Harding), and nearly privatised its entire visa processing data infrastructure (Jenkins). Platforms therefore have a greater role in casting the shadow of hierarchy than before. In doing so, they cast a shadow that is qualitatively different, modulated through a different set of relational values and (techno)socialities. Scalability A key difference and selling point of platforms is their scalability; since they can rapidly and easily up- and down-scale their functionalities in a way that traditional infrastructure cannot (Plantin et al.). The ability to respond “on-demand” to infrastructural requirements has made platforms the go-to service delivery option in the neo-liberalised public infrastructure environment (van Dijck, Governing Digital Societies). For instance, services providers like Amazon Web Services or Microsoft Azure provide on demand computing capacity for many nations’ most valuable services, including their intelligence and security capabilities (Amoore, Cloud Ethics; Konkel). The value of such platforms to government lies in the reduced cost and risk that comes with using rented capabilities, and the enhanced flexibility to increase or decrease their usage as required, without any of the economic sunk costs attached to owning the infrastructure. Scalability is, however, not just about on-demand technical capability, but about how platforms can change the scale of socio-technical relationships and services that are mediated through the platform. This changes the relational quality of the shadow of hierarchy, as activities and services occurring within the shadow are now connected into a larger and rapidly modulating scale. Scalability allows the shadow of hierarchy to extend from those in proximity to institutions to the broader population in general. For example, individual citizens can more easily “reach up” into governmental services and agencies as a part of completing their everyday business through platform such as MyGov in Australia (Services Australia). Using a smartphone application, citizens are afforded a more personalised and adaptive experience of the welfare state, as engaging with welfare services is no-longer tied to specific “brick-and-mortar” locations, but constantly available through a smartphone app and web portal. Multiple government services including healthcare and taxation are also connected to this platform, allowing users to reach across multiple government service domains to complete their personal business, seeking information and services that would have once required separate communications with different branches of government. The individual’s capacities to engage with the state have therefore upscaled with this change in the shadow, retaining a productivity and capacity enhancing quality that is reminiscent of older infrastructures and institutions, as the individual and their lived context is brought closer to the institutions themselves. Scale, however, comes with complications. The fundamental driver for scalability and its adaptive qualities is datafication. This means individuals and organisations are inflecting their operational and relational logics with the logic of datafication: a need to capture all data, at all times (van Dijck, Datafication; Fourcade and Healy). Platforms, especially privately held platforms, benefit significantly from this, as they rely on data to drive and refine their algorithmic tools, and ultimately create actionable intelligence that benefits their operations. Thus, scalability allows platforms to better “reach down” into individual lives and different social domains to fuel their operations. For example, as public transport services become increasingly datafied into mobility-as-a-service (MAAS) systems, ride sharing and on-demand transportation platforms like Uber and Lyft become incorporated into the public transport ecosystem (Lyons et al.). These platforms capture geospatial, behavioural, and reputational data from users and drivers during their interactions with the platform (Rosenblat and Stark; Attoh et al.). This generates additional value, and profits, for the platform itself with limited value returned to the user or the broader public it supports, outside of the transport service. It also places the platform in a position to gain wider access to the population and their data, by virtue of operating as a part of a public service. In this way the shadow of hierarchy may exacerbate inequity. The (dis)benefits of the shadow of hierarchy become unevenly spread amongst actors within its field, a function of an increased scalability that connects individuals into much broader assemblages of datafication. For Eubank, this can entrench existing economic and social inequalities by forcing those in need to engage with digitally mediated welfare systems that rely on distant and opaque computational judgements. Local services are subject to increased digital surveillance, a removal of agency from frontline advocates, and algorithmic judgement at scale. More fortunate citizens are also still at risk, with Nardi and Ekbia arguing that many digitally scaled relationships are examples of “heteromation”, whereby platforms convince actors in the platform to labour for free, such as through providing ratings which establish a platform’s reputational economy. Such labour fuels the operation of the platform through exploiting users, who become both a product/resource (as a source of data for third party advertisers) and a performer of unrewarded digital labour, such as through providing user reviews that help guide a platform’s algorithm(s). Both these examples represent a particularly disconcerting outcome for the shadow of hierarchy, which has its roots in public sector institutions who operate for a common good through shared and publicly held infrastructure. In shifting towards platforms, especially privately held platforms, value is transmitted to private corporations and not the public or the commons, as was the case with traditional infrastructure. The public also comes to own the risks attached to platforms if they become tied to public services, placing a further burden on the public if the platform fails, while reaping none of the profit and value generated through datafication. This is a poor bargain at best. (Non)Participation Scalability forms the basis for a further predicament: a changing socio-technical dynamic of (non)participation between individuals and services. According to Star (118), infrastructures are defined through their relationships to a given context. These relationships, which often exist as boundary objects between different communities, are “loosely structured in common use, and become tightly bound in particular locations” (Star, 118). While platforms are certainly boundary objects and relationally defined, the affordances of cloud computing have enabled a decoupling from physical location, and the operation of platforms across time and space through distributed digital nodes (smartphones, computers, and other localised hardware) and powerful algorithms that sort and process requests for service. This does not mean location is not important for the cloud (see Amoore, Cloud Geographies), but platforms are less likely to have a physically co-located presence in the same way traditional infrastructures had. Without the same institutional and infrastructural footprint, the modality for participating in and with the shadow of hierarchy that platforms cast becomes qualitatively different and predicated on digital intermediaries. Replacing a physical and human footprint with algorithmically supported and decentralised computing power allows scalability and some efficiency improvements, but it also removes taken-for-granted touchpoints for contestation and recourse. For example, ride-sharing platform Uber operates globally, and has expressed interest in operating in complement to (and perhaps in competition with) public transport services in some cities (Hall et al.; Conger). Given that Uber would come to operate as a part of the shadow of hierarchy that transport authorities cast over said cities, it would not be unreasonable to expect Uber to be subject to comparable advocacy, adjudication, transparency, and complaint-handling requirements. Unfortunately, it is unclear if this would be the case, with examples suggesting that Uber would use the scalability of its platform to avoid these mechanisms. This is revealed by ongoing legal action launched by concerned Uber drivers in the United Kingdom, who have sought access to the profiling data that Uber uses to manage and monitor its drivers (Sawers). The challenge has relied on transnational law (the European Union’s General Data Protection Regulation), with UK-based drivers lodging claims in Amsterdam to initiate the challenge. Such costly and complex actions are beyond the means of many, but demonstrate how reasonable participation in socio-technical and governance relationships (like contestations) might become limited, depending on how the shadow of hierarchy changes with the incorporation of platforms. Even if legal challenges for transparency are successful, they may not produce meaningful change. For instance, O’Neil links algorithmic bias to mathematical shortcomings in the variables used to measure the world; in the creation of irritational feedback loops based on incorrect data; and in the use of unsound data analysis techniques. These three factors contribute to inequitable digital metrics like predictive policing algorithms that disproportionately target racial minorities. Large amounts of selective data on minorities create myopic algorithms that direct police to target minorities, creating more selective data that reinforces the spurious model. These biases, however, are persistently inaccessible, and even when visible are often unintelligible to experts (Ananny and Crawford). The visibility of the technical “installed base” that support institutions and public services is therefore not a panacea, especially when the installed base (un)intentionally obfuscates participation in meaningful engagement like complaints handling. A negative outcome is, however, also not an inevitable thing. It is entirely possible to design platforms to allow individual users to scale up and have opportunities for enhanced participation. For instance, eGovernance and mobile governance literature have explored how citizens engage with state services at scale (Thomas and Streib; Foth et al.), and the open government movement has demonstrated the effectiveness of open data in understanding government operations (Barns; Janssen et al.), although these both have their challenges (Chadwick; Dawes). It is not a fantasy to imagine alternative configurations of the shadow of hierarchy that allow more participatory relationships. Open data could facilitate the governance of platforms at scale (Box et al.), where users are enfranchised into a platform by some form of membership right and given access to financial and governance records, in the same way that corporate shareholders are enfranchised, facilitated by the same app that provides a service. This could also be extended to decision making through voting and polling functions. Such a governance form would require radically different legal, business, and institutional structures to create and enforce this arrangement. Delacoix and Lawrence, for instance, suggest that data trusts, where a trustee is assigned legal and fiduciary responsibility to achieve maximum benefit for a specific group’s data, can be used to negotiate legal and governance relationships that meaningfully benefit the users of the trust. Trustees can be instructed to only share data to services whose algorithms are regularly audited for bias and provide datasets that are accurate representations of their users, for instance, avoiding erroneous proxies that disrupt algorithmic models. While these developments are in their infancy, it is not unreasonable to reflect on such endeavours now, as the technologies to achieve these are already in use. Conclusions There is a persistent myth that data will yield better, faster, more complete results in whatever field it is applied (Lee and Cook; Fourcade and Healy; Mayer-Schönberger and Cukier; Kitchin). This myth has led to data-driven assemblages, including artificial intelligence, platforms, surveillance, and other data-technologies, being deployed throughout social life. The public sector is no exception to this, but the deployment of any technological solution within the traditional institutions of the shadow of hierarchy is fraught with challenges, and often results in failure or unintended consequences (Henman). The complexity of these systems combined with time, budgetary, and political pressures can create a contested environment. It is this environment that moulds societies' light and resources to cast the shadow of hierarchy. Relationality within a shadow of hierarchy that reflects the complicated and competing interests of platforms is likely to present a range of unintended social consequences that are inherently emergent because they are entering into a complex system – society – that is extremely hard to model. The relational qualities of the shadow of hierarchy are therefore now more multidimensional and emergent, and experiences relating to socio-technical features like scale, and as a follow-on (non)participation, are evidence of this. Yet by being emergent, they are also directionless, a product of complex systems rather than designed and strategic intent. This is not an inherently bad thing, but given the potential for data-system and platforms to have negative or unintended consequences, it is worth considering whether remaining directionless is the best outcome. There are many examples of data-driven systems in healthcare (Obermeyer et al.), welfare (Eubanks; Henman and Marston), and economics (MacKenzie), having unintended and negative social consequences. Appropriately guiding the design and deployment of theses system also represents a growing body of knowledge and practical endeavour (Jirotka et al.; Stilgoe et al.). Armed with the knowledge of these social implications, constructing an appropriate social architecture (Box and Lemon; Box et al.) around the platforms and data systems that form the shadow of hierarchy should be encouraged. This social architecture should account for the affordances and emergent potentials of a complex social, institutional, economic, political, and technical environment, and should assist in guiding the shadow of hierarchy away from egregious challenges and towards meaningful opportunities. To be directionless is an opportunity to take a new direction. The intersection of platforms with public institutions and infrastructures has moulded society’s light into an evolving and emergent shadow of hierarchy over many domains. With the scale of the shadow changing, and shaping participation, who benefits and who loses out in the shadow of hierarchy is also changing. Equipped with insights into this change, we should not hesitate to shape this change, creating or preserving relationalities that offer the best outcomes. Defining, understanding, and practically implementing what the “best” outcome(s) are would be a valuable next step in this endeavour, and should prompt considerable discussion. If we wish the shadow of hierarchy to continue to be productive, then finding a social architecture to shape the emergence and directionlessness of socio-technical systems like platforms is an important step in the continued evolution of the shadow of hierarchy. References Ajunwa, Ifeoma. “Age Discrimination by Platforms.” Berkeley J. Emp. & Lab. L. 40 (2019): 1-30. Amoore, Louise. Cloud Ethics: Algorithms and the Attributes of Ourselves and Others. Durham: Duke University Press, 2020. ———. “Cloud Geographies: Computing, Data, Sovereignty.” Progress in Human Geography 42.1 (2018): 4-24. Ananny, Mike, and Kate Crawford. “Seeing without Knowing: Limitations of the Transparency Ideal and Its Application to Algorithmic Accountability.” New Media & Society 20.3 (2018): 973–89. Attoh, Kafui, et al. “‘We’re Building Their Data’: Labor, Alienation, and Idiocy in the Smart City.” Environment and Planning D: Society and Space 37.6 (2019): 1007-24. Baldwin, Carliss Y., and C. Jason Woodard. “The Architecture of Platforms: A Unified View.” Platforms, Markets and Innovation. Ed. Annabelle Gawer. Cheltenham: Edward Elgar, 2009. 19–44. Barns, Sarah. “Mine Your Data: Open Data, Digital Strategies and Entrepreneurial Governance by Code.” Urban Geography 37.4 (2016): 554–71. Bourdieu, Pierre. Distinction: A Social Critique of the Judgement of Taste. Cambridge, MA: Harvard University Press, 1984. Box, Paul, et al. Data Platforms for Smart Cities – A Landscape Scan and Recommendations for Smart City Practice. Canberra: CSIRO, 2020. Box, Paul, and David Lemon. The Role of Social Architecture in Information Infrastructure: A Report for the National Environmental Information Infrastructure (NEII). Canberra: CSIRO, 2015. Chadwick, Andrew. “Explaining the Failure of an Online Citizen Engagement Initiative: The Role of Internal Institutional Variables.” Journal of Information Technology & Politics 8.1 (2011): 21–40. Conger, Kate. “Uber Wants to Sell You Train Tickets. And Be Your Bus Service, Too.” The New York Times, 7 Aug. 2019. 19 Jan. 2021. <https://www.nytimes.com/2019/08/07/technology/uber-train-bus-public-transit.html>. Dawes, Sharon S. “The Evolution and Continuing Challenges of E‐Governance.” Public Administration Review 68 (2008): 86–102. Delacroix, Sylvie, and Neil D. Lawrence. “Bottom-Up Data Trusts: Disturbing the ‘One Size Fits All’ Approach to Data Governance.” International Data Privacy Law 9.4 (2019): 236-252. Eubanks, Virginia. Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor. New York: St. Martin’s Press, 2018. Fisher, Joshua A., and Jay David Bolter. “Ethical Considerations for AR Experiences at Dark Tourism Sites”. IEEE Explore 29 April. 2019. 13 Apr. 2021 <https://ieeexplore.ieee.org/document/8699186>. Foth, Marcus, et al. From Social Butterfly to Engaged Citizen: Urban Informatics, Social Media, Ubiquitous Computing, and Mobile Technology to Support Citizen Engagement. Cambridge MA: MIT Press, 2011. Fourcade, Marion, and Kieran Healy. “Seeing like a Market.” Socio-Economic Review, 15.1 (2017): 9–29. Gehl, Robert, and Fenwick McKelvey. “Bugging Out: Darknets as Parasites of Large-Scale Media Objects.” Media, Culture & Society 41.2 (2019): 219–35. Gillespie, Tarleton. “The Politics of ‘Platforms.’” New Media & Society 12.3 (2010): 347–64. Hall, Jonathan D., et al. “Is Uber a Substitute or Complement for Public Transit?” Journal of Urban Economics 108 (2018): 36–50. Henman, Paul. “Improving Public Services Using Artificial Intelligence: Possibilities, Pitfalls, Governance.” Asia Pacific Journal of Public Administration 42.4 (2020): 209–21. Henman, Paul, and Greg Marston. “The Social Division of Welfare Surveillance.” Journal of Social Policy 37.2 (2008): 187–205. Héritier, Adrienne, and Dirk Lehmkuhl. “Introduction: The Shadow of Hierarchy and New Modes of Governance.” Journal of Public Policy 28.1 (2008): 1–17. Janssen, Marijn, et al. “Benefits, Adoption Barriers and Myths of Open Data and Open Government.” Information Systems Management 29.4 (2012): 258–68. Jenkins, Shannon. “Visa Privatisation Plan Scrapped, with New Approach to Tackle ’Emerging Global Threats’.” The Mandarin. 23 Mar. 2020. 19 Jan. 2021 <https://www.themandarin.com.au/128244-visa-privatisation-plan-scrapped-with-new-approach-to-tackle-emerging-global-threats/>. Jirotka, Marina, et al. “Responsible Research and Innovation in the Digital Age.” Communications of the ACM 60.6 (2016): 62–68. Kitchin, Rob. The Data Revolution: Big Data, Open Data, Data Infrastructures and Their Consequences. Thousand Oaks, CA: Sage, 2014. Konkel, Frank. “CIA Awards Secret Multibillion-Dollar Cloud Contract.” Nextgov 20 Nov. 2020. 19 Jan. 2021 <https://www.nextgov.com/it-modernization/2020/11/exclusive-cia-awards-secret-multibillion-dollar-cloud-contract/170227/>. Lance, Kate T., et al. “Cross‐Agency Coordination in the Shadow of Hierarchy: ‘Joining up’Government Geospatial Information Systems.” International Journal of Geographical Information Science, 23.2 (2009): 249–69. Lee, Ashlin J., and Peta S. Cook. “The Myth of the ‘Data‐Driven’ Society: Exploring the Interactions of Data Interfaces, Circulations, and Abstractions.” Sociology Compass 14.1 (2020): 1–14. Lyons, Glenn, et al. “The Importance of User Perspective in the Evolution of MaaS.” Transportation Research Part A: Policy and Practice 121(2019): 22-36. MacKenzie, Donald. “‘Making’, ‘Taking’ and the Material Political Economy of Algorithmic Trading.” Economy and Society 47.4 (2018): 501-23. Mayer-Schönberger, V., and K. Cukier. Big Data: A Revolution That Will Change How We Live, Work and Think. London: John Murray, 2013. Michel Foucault. Discipline and Punish. London: Penguin, 1977. Nardi, Bonnie, and Hamid Ekbia. Heteromation, and Other Stories of Computing and Capitalism. Cambridge, MA: MIT Press, 2017. O’Neil, Cathy. Weapons of Math Destruction – How Big Data Increases Inequality and Threatens Democracy. London: Penguin, 2017. Obermeyer, Ziad, et al. “Dissecting Racial Bias in an Algorithm Used to Manage the Health of Populations.” Science 366.6464 (2019): 447-53. Plantin, Jean-Christophe, et al. “Infrastructure Studies Meet Platform Studies in the Age of Google and Facebook.” New Media & Society 20.1 (2018): 293–310. Rosenblat, Alex, and Luke Stark. “Algorithmic Labor and Information Asymmetries: A Case Study of Uber’s Drivers.” International Journal of Communication 10 (2016): 3758–3784. Sawers, Paul. “Uber Drivers Sue for Data on Secret Profiling and Automated Decision-Making.” VentureBeat 20 July. 2020. 19 Jan. 2021 <https://venturebeat.com/2020/07/20/uber-drivers-sue-for-data-on-secret-profiling-and-automated-decision-making/>. Services Australia. About MyGov. Services Australia 19 Jan. 2021. 19 Jan. 2021 <https://www.servicesaustralia.gov.au/individuals/subjects/about-mygov>. Star, Susan Leigh. “Infrastructure and Ethnographic Practice: Working on the Fringes.” Scandinavian Journal of Information Systems 14.2 (2002):107-122. Stilgoe, Jack, et al. “Developing a Framework for Responsible Innovation.” Research Policy 42.9 (2013):1568-80. Suzor, Nicolas. Lawless: The Secret Rules That Govern Our Digital Lives. Cambridge: Cambridge University Press, 2019. Thomas, John Clayton, and Gregory Streib. “The New Face of Government: Citizen‐initiated Contacts in the Era of E‐Government.” Journal of Public Administration Research and Theory 13.1 (2003): 83-102. Van Dijck, José. “Datafication, Dataism and Dataveillance: Big Data between Scientific Paradigm and Ideology.” Surveillance & Society 12.2 (2014): 197–208. ———. “Governing Digital Societies: Private Platforms, Public Values.” Computer Law & Security Review 36 (2020) 13 Apr. 2021 <https://www.sciencedirect.com/science/article/abs/pii/S0267364919303887>. ———. The Culture of Connectivity: A Critical History of Social Media. Oxford: Oxford University Press, 2013. Webster, Elizabeth, and Glenys Harding. “Outsourcing Public Employment Services: The Australian Experience.” Australian Economic Review 34.2 (2001): 231-42.
APA, Harvard, Vancouver, ISO, and other styles
48

Menendez Domingo, Ramon. "Ethnic Background and Meanings of Authenticity: A Qualitative Study of University Students." M/C Journal 18, no. 1 (January 20, 2015). http://dx.doi.org/10.5204/mcj.945.

Full text
Abstract:
IntroductionThis paper explores the different meanings that individuals from diverse ethnic backgrounds associate with being authentic. It builds on previous research (Menendez 11) that found quantitative differences in terms of the meanings individuals from Eastern and Western backgrounds tend to associate with being authentic. Using qualitative analysis, it describes in more detail how individuals from these two backgrounds construct their different meanings of authenticity.Authenticity has become an overriding moral principle in contemporary Western societies and has only recently started to be contested (Feldman). From cultural products to individuals’ discourses, authenticity pervades Western culture (Lindholm; Potter; Vannini and Williams). On an individual level, the ideal of authenticity is reflected in the maxim “be true to yourself.” The social value of authenticity has a relatively recent history in the Western world of approximately 200 years (Trilling). It started to develop alongside the notion of individuality during modernity (Taylor, Sources; Trilling). The Romantic movement consolidated its cultural influence (Taylor, Sources). In the 1960s, the Hippy movement revived authenticity as a countercultural discourse, although it has progressively become mainstream through consumer culture and therapeutic discourses (Binkley).Most of the studies in the literature on authenticity as a cultural phenomenon are theoretical, conducted from a philosophical perspective (Ferrara; Guignon; Taylor, Ethics), but few of them are empirical, mostly from sociology (Erickson; Franzese, Thine; Turner, Quest; Vannini, Authenticity). Part of this dearth of empirical research on authenticity is due to the difficulties that researchers encounter in attempting to define what it means to be authentic (Franzese, Authenticity 87). Sociologists study the phenomenological experience of being true to oneself, but are less attentive to the metaphysical notion of being a “true self” (Vannini, Dead 236–37). Trying to preserve this open approach, without judging individuals on how “authentic” they are, is what makes defining authenticity difficult. For this reason, sociologists have defined being authentic in a broad sense as “an individual’s subjective sense that their behaviour, appearance, self, reflects their sense of core being. One’s sense of core being is composed of their values, beliefs, feelings, identities, self-meanings, etc.” (Franzese, Authenticity 87); this is the definition of authenticity that I use here. Besides being scarce, the sociological empirical studies on authenticity have been conducted with individuals from Western backgrounds and, thus, have privileged authenticity as a Western cultural construct. This paper tries to contribute to this field of research by: (1) contributing more empirical investigation and (2) providing cross-cultural comparison between individuals from Eastern and Western backgrounds.The literature on cross-cultural values associates Eastern societies with collective (Hofstede, Hofstede and Mirkov 95–97; 112–17) and material or survival (Inglehart and Welzel 51–57; 61–65) values, while Western societies tend to be linked to the opposite kind of values: individual, post-material or self-expression (WVS). For example, societies that score high in survival values are likely to be African (e.g., Zimbabwe) Middle Eastern (e.g., Morocco and Jordan) or Asian (e.g., Bangladesh) countries, while societies that score high in self-expression values tend to be European (e.g., Sweden) or English speaking (e.g., Australia) countries. Nevertheless, there are some exceptions, the case of Japan, for example, which tends to score high in self-expression values despite being an “Eastern” society (WVS). These differences also tend to be reflected among Eastern minorities living in Western countries (Chua and Rubenfeld). Collective values emphasise harmony in relations and prioritise the needs of the group over the individual; on the other hand, individual values emphasise self-expression. Material or survival values accentuate the satisfaction of “basic” needs, in Abraham Maslow’s terms (21), such as physiological or security needs, and imply practising thrift and delaying immediate gratification; by contrast, post-material or self-expression values stress the satisfaction of “higher” needs, such as freedom of speech, equality, or aesthetic needs.The sociologist Ralph Turner (Real) created a theoretical framework to organize individuals’ discourses around authenticity: the “impulsive” and “institutional” categories. One of Turner’s assumptions is particularly important in understanding the differences between these two categories: individuals tend to consider the self as an objective entity that, despite only existing in their minds, feels “real” to them. This can have consequences for the meanings they ascribe to certain internal subjective states, such as cognitions or emotions, which can be interpreted as indicators of their authentic selves (990–91).The institutional and impulsive categories are two different ways of understanding authenticity that present several differences (991–95). Two among them are most relevant to understand the differences that I discuss in this paper. The first one has to do with the individual’s locus of the self, whether the self is conceptualized as located “outside” or “inside” the individual. Impulsive interpretations of authenticity have an internal sense of authenticity as “being,” while institutional conceptualizations have an external sense of authenticity as “becoming.” For “impulsives,” the authentic self is something that must be searched for. Impulsives look within to discover their “true self,” which is often in opposition to society’s roles and its expectations of the individual. On the other hand, for “institutionals” authentic is achieved through external effort (Turner, Quest 155); it is something that individuals achieve through regular practice, often aligned with society’s roles and their expectations of the individual (Turner, Real 992).The second difference has to do with the management of emotions. For an institutional understanding of authenticity, individuals are true to their own authentic selves when they are in full control of their capacities and emotions. By contrast, from an impulsive point of view, individuals are true to themselves when they are spontaneous, accepting and freely expressing their emotions, often by breaking the internal or external controls that society imposes on them (Turner, Real 993).Although individuals can experience both types of authenticity, previous research on this topic (Menendez) has shown that institutional experiences tend to happen more frequently among Easterners, and impulsive experiences tend to occur more frequently among Westerners. In this paper, I show how Easterners and Westerners construct institutional and impulsive meanings of authenticity respectively; what kind of authenticity work individuals from these two backgrounds do when they conceptualize their authentic selves; how they interpret internal subjective states as expressions of who they are; and what stories they tell themselves about who they are.I suggest that these stories, although they may look purely individual, can also be social. Individuals from Western backgrounds tend to interpret impulsive experiences of authenticity as expressing their authentic selves, as they are informed by the individual and post-material values of Western societies. In contrast, individuals from Eastern backgrounds tend to interpret institutional experiences of authenticity as expressing their authentic selves, as they have been socialized in the more collective and material values of Eastern societies.Finally, and before I proceed to the analysis, I would like to acknowledge a limitation of this study. The dichotomies that I use to explain my argument, such as the Western and Eastern or the impulsive and institutional categories, can constitute a limitation for this paper because they cannot reflect nuances. They can be easily contested. For example, the division between Eastern and Western societies is often seen as ideological and Turner’s distinction between institutional and impulsive experiences of authenticity can create artificial separations between the notions of self and society or reason and passion (Solomon 173). However, these concepts have not been used for ideological or simplifying purposes, but to help explain distinguishable cultural orientations towards authenticity in the data.MethodologyI completed 20 interviews (from 50 minutes to 2 hours in length) with 20 students at La Trobe University (Australia), between September 2012 and April 2013. The 20 interviewees (9 females and 11 males), ranged from 18 to 58 years old (the median age was 24 years old). The sample was theoretically designed to cover as many diverse cultural backgrounds as possible. I asked the interviewees questions about: moments they had experienced that felt either authentic and inauthentic, what constitutes a life worth-living, and the impact their cultural backgrounds might have had on their conceptions of their true selves.The 20 interviewees were born in 13 different countries. According to the extensive dataset on cultural values, the World Values Survey (WVS), these 13 countries have different percentages of post-materialists—individuals who choose post-material instead of material values (Inglehart and Welzel 54–56). Table 1 shows the percentages of post-materialists in each of the interviewees’ countries of birth. Table 1: Percentages of post-materialists in the interviewees’ countries of birth Country % of post-materialists WVS Wave United Kingdom 22.8 2005 – 2009 Australia 20.5 2010 – 2014 United States 16.7 2010 – 2014 Israel 11.6 2000 – 2004 Finland 11.3 2005 – 2009 Greece (Turkey) 10.7 2010 – 2014 South Africa 7.7 2005 – 2009 Malaysia 5.6 2010 – 2014 Ghana 4.2 2010 – 2014 India 4 2005 – 2009 China 2.5 2010 – 2014 Egypt 1.1 2010 – 2014 Note: These data are based on the 4-item post-materialism index question (Y002) of World Values Survey (WVS). I use three different waves of data (2000–2004, 2005–2009, and 2010–2014). Greece did not have any data in World Values Survey, so its data have been estimated considering the results from Turkey, which is the most similar country in geographical and cultural terms that had data available.In my model, I consider “Western” societies as those that have more than 10% post-materialists, while “Eastern” societies have less than 10% post-materialists. As shown in Table 1 and mentioned earlier, Western countries (English speaking or European) tend to have higher percentages of post-materialists than Eastern societies (African, Asian and Middle Eastern).Thus, as Table 2 shows, the interviewees who were born in a Western society are ascribed to one group, while individuals born in an Eastern society are ascribed to another group. Although many overseas-born interviewees have lived in Australia for periods that range from 6 months to 10 years, they were ascribed to the “East” and “West” groups solely based on their country of birth. Even though these individuals may have had experiences of socialization in Australia, I assume that they have been primarily socialized in the values of their ethnic backgrounds and the countries where they were born, via their parents’ educational values or through direct experience, during the time that they lived in their countries of birth. According to my definition of authenticity, individuals’ values inform their understanding of authenticity, therefore, the values from their ethnic backgrounds can also influence their understanding of authenticity.In the first phase of the analysis, I used Grounded Theory (Charmaz), with categories directly emerging from the data, to analyse my interviewees’ stories. In the second stage, I reviewed these categories in combination with Turner’s categories of impulsive and institutional, applying them to classify the stories.Table 2: Distribution of participants between “East” and “West” West (n=11) East (n=9) Australia (n=5) China (n=2) United Kingdom (n=2) India (n=2) United States (n=1) South Korea (n=1) Greece (n=1) South Africa (n=1) Finland (n=1) Egypt (n=1) Israel (n=1) Ghana (n=1) Malaysia (n=1) ResultsAlthough I interviewed 20 participants, due to space-constraints, I illustrate my argument with only 4 interview extracts from 4 of the interviewees: 2 interviewees from Western backgrounds and 2 from Eastern backgrounds. However, these stories are representative of the trends found for the whole sample. I show how Easterners and Westerners construct their authentic selves in institutional and impulsive senses respectively through the two key characteristics that I presented in the introduction: locus of the self and management of emotions.In the first instance, Rachel (from Australia, 24 years old), a Western respondent, shows an impulsive locus of the self as “being.” Authenticity is discovered through self-acceptance of an uncomfortable emotion, like a “bad mood:”I think the times when I want to say, ‘oh, I wasn’t myself’, I usually was. My bad moods are more ‘me’. My bad moods are almost always the ‘real me’. [So you consider that your authentic self is something that is there, inside you, that you have to discover, or it is something outside yourself, that you can achieve?] I think it is something that you have to discover for yourself. I think it is different for everyone. [But would you say that it is something that is there already or it is something that you become?] No, I think it is something that is there already.On the other hand, Rani (from China, 24 years old), an Eastern respondent, interprets authenticity as “becoming;” authenticity does not pre-exist—as in the case of Rachel—but is something “external” to her idea of self. Rani becomes herself by convincing herself that she conforms to society’s ideals of physical beauty. Unlike the process of self-acceptance that Rachel described, Rani develops authentic selfhood by “lying” to herself or, as she says, “through some lies”:I have heard this sentence, like ‘you have to be yourself to others’, but I think it is really hard to do this. I think people still need some ‘acting’ things in their life. You need to act, not to say to act as another person, but sometimes like let’s say to be polite or make other people like you, you need acting. And sometimes if you are doing the ‘acting things’ a lot, you are going to believe this is true (she laughs). [Like others will believe that you are something that you are not?] I think at the beginning, maybe that’s not, but… because some people wake up every morning and say to the mirror, ‘you are very beautiful, you are the most beautiful girl in the world’, then, you will be happy and you will actually become beautiful. I think it is not like lie to yourself, but it is just being confident. Maybe at the beginning you are not going to believe that you are beautiful… like, what is this sentence? ‘Being true to yourself’, but actually doing this everyday, then that’s true, you will become, you will be confident. [So that means you can be yourself also through…] Through some lies. [So you don’t think that there is something inside you that you have to kind of discover?] No.Eastern and Western respondents also tend to interpret emotions differently. Westerners are more likely to interpret them in more impulsive terms than Easterners, who interpret them in a more institutional light. As we can see in the following extract, Sean, a Western respondent (born in Australia, but raised in England, 41 years old), feels inauthentic because he could not express his dislike of a co-worker he did not get along with:In a six months job I had before I came to Australia, I was an occupational therapist in a community. There was a girl in the administration department who was so rude. I wanted to say: ‘look darling you are so rude. It is really unpleasant talking to you. Can you just be nice? It would be just so much better and you will get more done and you will get more from me’. That’s what I should have said, but I didn’t say it. I didn’t, why? Maybe it is that sort of culture of not saying things or maybe it is me not being assertive enough. I don’t think I was being myself. Because my real self wanted to say: ‘look darling, you are not helping matters by being a complete bitch’. But I didn’t say that. I wasn’t assertive enough.In a similar type of incident, Ben, an Eastern respondent (from Ghana, 32 years old), describes an outburst he had with a co-worker who was annoying him. Unlike Sean, Ben expressed his anger to the co-worker, but he does not consider this to be a manifestation of his authentic self. For Ben, to act authentically one must control their emotions and try help others:I don’t know if that is myself or if that is not myself, but sometimes I get angry, I get upset, and I am the open type. I am the type that I can’t keep something in me, so sometimes when you make me annoyed, I just response. There is this time about this woman, in a class, that I was in Ghana. She was an older woman, a respected woman, she kept annoying me and there was one day that I couldn’t take it any longer, so I just burst up and I just… I don’t know what I said, I just… said a lot of bad things to her. The woman, she was shocked. I also felt shocked because I thought I could control myself, so that’s me… I don’t want to hide my feelings, I just want to come out with what I think when you make me annoyed, but those times, when I come out, I don’t like them, because I think it contradicts who I really am, someone who is supposed to help or care. I don’t like that aspect. You know somebody could be bossy, so he or she enjoys shouting everybody. I don’t enjoy that, but sometimes it is something that I cannot even control. Someone pushes me to the limit, and I just can’t keep that anger, and it comes out. I won’t say that is ‘me,’ I wouldn’t say that that is me. I don’t think that is a ‘true me’. [Why?] Because the true me would enjoy that experience the way I enjoy helping people instead.Unlike the two accounts from Rachel and Rani, these two last passages from Sean and Ben describe experiences of inauthenticity, where the authentic self cannot be expressed. What is important in these two passages is not their behaviour, but how they attribute their own emotions to their sense of authentic selfhood. Sean identifies his authentic self with the “impulsive” self who expresses his emotions, while Ben identifies his authentic self with the “institutional” self who is in control of his emotions. Sean feels inauthentic because he could not express his angry feelings to the co-worker, whereas Ben feels inauthentic because he could not control his outburst. Ben still hesitates about which side of himself can be attributed to his authentic self, for example, he says that he is “the open type” or that he does not want to “hide [his] feelings”, but he eventually identifies his authentic self with his institutional self.The choices that Sean and Ben make about the emotions that they attribute to their authentic selves could be motivated by their respective ethnic backgrounds. Like Rachel, Sean identifies his authentic self with a socially unacceptable emotion: anger. Consistent with his Western background, Sean’s sense of authenticity emphasizes the needs of the individual over the group and sees suppression of emotions as repressive. On the other hand, Ben reasons that since he does not enjoy being angry as much as he enjoys helping others, expressing anger is not a manifestation of authenticity. His authentic self is linked to his institutional self. Ben’s values are infused with altruism, which reflects the collective values that tend to be associated with his Eastern background. For him, suppression of emotions might not mean repression, but can foster authenticity instead.DiscussionBoth ways of interpreting authenticity, impulsive and institutional, look for self-consistency and the need to tell a coherent story to ourselves about who we are. The results section of this paper showed how Easterners and Westerners conceptualize authenticity. Easterners understand authenticity differently to Western discourses of the authentic. These alternative understandings offer viable solutions to the self-consistency problem. They present external, rather than internal, ways of conceiving the authentic self, and regulative, rather than expressive, approaches to emotions. As I mentioned earlier, Eastern societies are associated with collective and material values, while Western ones are related to individual and post-material values. These divisions in terms of values are reflected in individuals’ self-constructs. Individuals in Western societies tend to have a more independent idea of the self, whereas individuals in Eastern societies are more likely to have an interdependent one (Kitayama). An interdependent idea of the self values connectedness and conceptualizes the self in relation to others, so it can generate an institutional approach to authenticity, where the idea of the authentic self is not something that individuals search for inside themselves, but something that individuals become through their participation in social roles. This was evident in the example of Rani, whose idea of being authentic as “becoming” seemed to be an extension of her more interdependent self-construct and the need to fit in society.A regulative approach to emotions has also been associated with Easterners (Cheung and Park), on the basis of their collective values and interdependent self-constructs. For individuals from a Western background, with a more independent sense of self, as in the case of Sean, suppressing emotions tends to be seen negatively as being inauthentic, a form of repression. However, for individuals with interdependent self-constructs, this can be not only less harmful (feeling less inauthentic), but can even be beneficial because they tend to prioritize the needs of others (Le and Impett). This is evident in the example of Ben, for whom suppressing aanger does not make him feel inauthentic because he identifies his authentic self with the self that is in control of his emotions and helps others. This understanding of authenticity is aligned with the collective values of his ethnic background.In sum, ideas of authenticity seem to vary culturally according to the repertoires and values systems that inform them. Thus, even what we think might be our most intimate or individual experiences, like our experiences of authenticity and ideas of who we are, can also be socially constructed. This paper has tried to demonstrate the importance of sociology for the study of authenticity as a cultural phenomenon.ReferencesBinkley, Sam. Getting Loose: Lifestyle Consumption in the 1970s. Durham: Duke UP, 2007.Charmaz, Kathy. Constructing Grounded Theory. London: Sage, 2013.Cheung, Rebecca and Irene Park. “Anger Supression, Interdependent Self-Construal, and Depression among Asian American and European American College Students”. Cultural Diversity and Ethnic Minority Psychology 16.4 (2010): 517–25.Chua, Amy, and Jed Rubenfeld. The Triple Package: How Three Unlikely Traits Explain the Rise and Fall of Cultural Groups in America. New York: The Penguin P, 2014.Erickson, Rebecca J. When Emotion Is the Product: Self, Society, and (In)Authenticity in a Postmodern World. Ph.D. Thesis, Washington: Whasington State U, 1991.Feldman, Simon. Against Authenticity: Why You Shouldn't Be Yourself. Kentucky: Lexington Books, 2014.Ferrara, Alessandro. Reflective Authenticity Rethinking the Project of Modernity. London: Routledge, 2002.Franzese, Alexis D. To Thine Own Self Be True? An Exploration of Authenticity. Ph.D. Thesis, Durham: Duke University, 2007.———. “Authenticity: Perspectives and Experiences.” Authenticity in Culture, Self, and Society. Eds. Phillip Vannini and J. Patrick Williams. Farnham: Ashgate, 2009. 87–101.Guignon, Charles B. On Being Authentic. London: Routledge, 2004.Hofstede, Geert, and Michael Minkov. Cultures and Organizations: Software of the Mind. USA: McGraw Hill, 2010.Inglehart, Ronald, and Christian Welzel. Modernization, Cultural Change and Democracy: The Human Development Sequence. New York: Cambridge UP, 2005.Kitayama, Shinobu, and Hazel R. Markus. “Culture and the Self: Implications for Cognition, Emotion, and Motivation.” Psychological Review 98.2 (1991): 224–53.Le, Bonnie M., and Emily A. Impett. “When Holding Back Helps: Supressing Negative Emotions during Sacrifice Feels Authentic and Is Beneficial for Highly Interdependent People”. Pscyhological Science 24.9 (2013): 1809–15.Lindholm, Charles. Culture and Authenticity. Malden: Blackwell, 2008.Maslow, Abraham H. Toward a Psychology of Being. Princeton: Van Nostrand, 1968.Menendez, Ramon. “The Culture of Authenticity: An Empirical Study of La Trobe University Students from Diverse Cultural Backgrounds.” Proceedings of The Australian Sociological Association (TASA) Conference, 25-28 November. Melbourne: Monash U, 2013.Potter, Andrew. The Authenticity Hoax How We Get Lost Finding Ourselves. Carlton North: Scribe, 2010.Solomon, Robert C. “Notes on Emotion, ‘East and West.’” Philosophy East and West 45.2 (1995): 171–202.Taylor, Charles. Sources of the Self: The Making of the Modern Identity. Cambridge: Cambridge UP, 1989.———. The Ethics of Authenticity. Cambridge: Harvard UP, 1991.Trilling, Lionel. Sincerity and Authenticity. Cambridge: Harvard UP, 1972.Turner, Ralph. “Is There a Quest for Identity?” The Sociological Quarterly 16.2 (1975): 148–61.———. “The Real Self: From Institution to Impulse.” The American Journal of Sociology 81.5 (1976): 989–1016.Vannini, Phillip. Authenticity and Power in the Academic Profession. Ph.D. Thesis, Whasington: Whashington State U, 2004.———. “Dead Poet’s Society: Teaching, Publish-or-Perish, and Professors’ Experiences of Authenticity.” Symbolic Interaction 29.2 (2006): 235–57.———, and J. Patrick Williams. Authenticity in Culture, Self, and Society. Farnham: Ashgate, 2009.WVS. World Values Survey. World Values Survey Association. 18 Feb. 2015 ‹http://www.worldvaluessurvey.org/wvs.jsp›.
APA, Harvard, Vancouver, ISO, and other styles
49

Kabir, Nahid. "Why I Call Australia ‘Home’?" M/C Journal 10, no. 4 (August 1, 2007). http://dx.doi.org/10.5204/mcj.2700.

Full text
Abstract:
Introduction I am a transmigrant who has moved back and forth between the West and the Rest. I was born and raised in a Muslim family in a predominantly Muslim country, Bangladesh, but I spent several years of my childhood in Pakistan. After my marriage, I lived in the United States for a year and a half, the Middle East for 5 years, Australia for three years, back to the Middle East for another 5 years, then, finally, in Australia for the last 12 years. I speak Bengali (my mother tongue), Urdu (which I learnt in Pakistan), a bit of Arabic (learnt in the Middle East); but English has always been my medium of instruction. So where is home? Is it my place of origin, the Muslim umma, or my land of settlement? Or is it my ‘root’ or my ‘route’ (Blunt and Dowling)? Blunt and Dowling (199) observe that the lives of transmigrants are often interpreted in terms of their ‘roots’ and ‘routes’, which are two frameworks for thinking about home, homeland and diaspora. Whereas ‘roots’ might imply an original homeland from which people have scattered, and to which they might seek to return, ‘routes’ focuses on mobile, multiple and transcultural geographies of home. However, both ‘roots’ and ‘routes’ are attached to emotion and identity, and both invoke a sense of place, belonging or alienation that is intrinsically tied to a sense of self (Blunt and Dowling 196-219). In this paper, I equate home with my root (place of birth) and route (transnational homing) within the context of the ‘diaspora and belonging’. First I define the diaspora and possible criteria of belonging. Next I describe my transnational homing within the framework of diaspora and belonging. Finally, I consider how Australia can be a ‘home’ for me and other Muslim Australians. The Diaspora and Belonging Blunt and Dowling (199) define diaspora as “scattering of people over space and transnational connections between people and the places”. Cohen emphasised the ethno-cultural aspects of the diaspora setting; that is, how migrants identify and position themselves in other nations in terms of their (different) ethnic and cultural orientation. Hall argues that the diasporic subjects form a cultural identity through transformation and difference. Speaking of the Hindu diaspora in the UK and Caribbean, Vertovec (21-23) contends that the migrants’ contact with their original ‘home’ or diaspora depends on four factors: migration processes and factors of settlement, cultural composition, structural and political power, and community development. With regard to the first factor, migration processes and factors of settlement, Vertovec explains that if the migrants are political or economic refugees, or on a temporary visa, they are likely to live in a ‘myth of return’. In the cultural composition context, Vertovec argues that religion, language, region of origin, caste, and degree of cultural homogenisation are factors in which migrants are bound to their homeland. Concerning the social structure and political power issue, Vertovec suggests that the extent and nature of racial and ethnic pluralism or social stigma, class composition, degree of institutionalised racism, involvement in party politics (or active citizenship) determine migrants’ connection to their new or old home. Finally, community development, including membership in organisations (political, union, religious, cultural, leisure), leadership qualities, and ethnic convergence or conflict (trends towards intra-communal or inter-ethnic/inter-religious co-operation) would also affect the migrants’ sense of belonging. Using these scholarly ideas as triggers, I will examine my home and belonging over the last few decades. My Home In an initial stage of my transmigrant history, my home was my root (place of birth, Dhaka, Bangladesh). Subsequently, my routes (settlement in different countries) reshaped my homes. In all respects, the ethno-cultural factors have played a big part in my definition of ‘home’. But on some occasions my ethnic identification has been overridden by my religious identification and vice versa. By ethnic identity, I mean my language (mother tongue) and my connection to my people (Bangladeshi). By my religious identity, I mean my Muslim religion, and my spiritual connection to the umma, a Muslim nation transcending all boundaries. Umma refers to the Muslim identity and unity within a larger Muslim group across national boundaries. The only thing the members of the umma have in common is their Islamic belief (Spencer and Wollman 169-170). In my childhood my father, a banker, was relocated to Karachi, Pakistan (then West Pakistan). Although I lived in Pakistan for much of my childhood, I have never considered it to be my home, even though it is predominantly a Muslim country. In this case, my home was my root (Bangladesh) where my grandparents and extended family lived. Every year I used to visit my grandparents who resided in a small town in Bangladesh (then East Pakistan). Thus my connection with my home was sustained through my extended family, ethnic traditions, language (Bengali/Bangla), and the occasional visits to the landscape of Bangladesh. Smith (9-11) notes that people build their connection or identity to their homeland through their historic land, common historical memories, myths, symbols and traditions. Though Pakistan and Bangladesh had common histories, their traditions of language, dress and ethnic culture were very different. For example, the celebration of the Bengali New Year (Pohela Baishakh), folk dance, folk music and folk tales, drama, poetry, lyrics of poets Rabindranath Tagore (Rabindra Sangeet) and Nazrul Islam (Nazrul Geeti) are distinct in the cultural heritage of Bangladesh. Special musical instruments such as the banshi (a bamboo flute), dhol (drums), ektara (a single-stringed instrument) and dotara (a four-stringed instrument) are unique to Bangladeshi culture. The Bangladeshi cuisine (rice and freshwater fish) is also different from Pakistan where people mainly eat flat round bread (roti) and meat (gosh). However, my bonding factor to Bangladesh was my relatives, particularly my grandparents as they made me feel one of ‘us’. Their affection for me was irreplaceable. The train journey from Dhaka (capital city) to their town, Noakhali, was captivating. The hustle and bustle at the train station and the lush green paddy fields along the train journey reminded me that this was my ‘home’. Though I spoke the official language (Urdu) in Pakistan and had a few Pakistani friends in Karachi, they could never replace my feelings for my friends, extended relatives and cousins who lived in Bangladesh. I could not relate to the landscape or dry weather of Pakistan. More importantly, some Pakistani women (our neighbours) were critical of my mother’s traditional dress (saree), and described it as revealing because it showed a bit of her back. They took pride in their traditional dress (shalwar, kameez, dopatta), which they considered to be more covered and ‘Islamic’. So, because of our traditional dress (saree) and perhaps other differences, we were regarded as the ‘Other’. In 1970 my father was relocated back to Dhaka, Bangladesh, and I was glad to go home. It should be noted that both Pakistan and Bangladesh were separated from India in 1947 – first as one nation; then, in 1971, Bangladesh became independent from Pakistan. The conflict between Bangladesh (then East Pakistan) and Pakistan (then West Pakistan) originated for economic and political reasons. At this time I was a high school student and witnessed acts of genocide committed by the Pakistani regime against the Bangladeshis (March-December 1971). My memories of these acts are vivid and still very painful. After my marriage, I moved from Bangladesh to the United States. In this instance, my new route (Austin, Texas, USA), as it happened, did not become my home. Here the ethno-cultural and Islamic cultural factors took precedence. I spoke the English language, made some American friends, and studied history at the University of Texas. I appreciated the warm friendship extended to me in the US, but experienced a degree of culture shock. I did not appreciate the pub life, alcohol consumption, and what I perceived to be the lack of family bonds (children moving out at the age of 18, families only meeting occasionally on birthdays and Christmas). Furthermore, I could not relate to de facto relationships and acceptance of sex before marriage. However, to me ‘home’ meant a family orientation and living in close contact with family. Besides the cultural divide, my husband and I were living in the US on student visas and, as Vertovec (21-23) noted, temporary visa status can deter people from their sense of belonging to the host country. In retrospect I can see that we lived in the ‘myth of return’. However, our next move for a better life was not to our root (Bangladesh), but another route to the Muslim world of Dhahran in Saudi Arabia. My husband moved to Dhahran not because it was a Muslim world but because it gave him better economic opportunities. However, I thought this new destination would become my home – the home that was coined by Anderson as the imagined nation, or my Muslim umma. Anderson argues that the imagined communities are “to be distinguished, not by their falsity/genuineness, but by the style in which they are imagined” (6; Wood 61). Hall (122) asserts: identity is actually formed through unconscious processes over time, rather than being innate in consciousness at birth. There is always something ‘imaginary’ or fantasized about its unity. It always remains incomplete, is always ‘in process’, always ‘being formed’. As discussed above, when I had returned home to Bangladesh from Pakistan – both Muslim countries – my primary connection to my home country was my ethnic identity, language and traditions. My ethnic identity overshadowed the religious identity. But when I moved to Saudi Arabia, where my ethnic identity differed from that of the mainstream Arabs and Bedouin/nomadic Arabs, my connection to this new land was through my Islamic cultural and religious identity. Admittedly, this connection to the umma was more psychological than physical, but I was now in close proximity to Mecca, and to my home of Dhaka, Bangladesh. Mecca is an important city in Saudi Arabia for Muslims because it is the holy city of Islam, the home to the Ka’aba (the religious centre of Islam), and the birthplace of Prophet Muhammad [Peace Be Upon Him]. It is also the destination of the Hajj, one of the five pillars of Islamic faith. Therefore, Mecca is home to significant events in Islamic history, as well as being an important present day centre for the Islamic faith. We lived in Dhahran, Saudi Arabia for 5 years. Though it was a 2.5 hours flight away, I treasured Mecca’s proximity and regarded Dhahran as my second and spiritual home. Saudi Arabia had a restricted lifestyle for women, but I liked it because it was a Muslim country that gave me the opportunity to perform umrah Hajj (pilgrimage). However, Saudi Arabia did not allow citizenship to expatriates. Saudi Arabia’s government was keen to protect the status quo and did not want to compromise its cultural values or standard of living by allowing foreigners to become a permanent part of society. In exceptional circumstances only, the King granted citizenship to a foreigner for outstanding service to the state over a number of years. Children of foreigners born in Saudi Arabia did not have rights of local citizenship; they automatically assumed the nationality of their parents. If it was available, Saudi citizenship would assure expatriates a secure and permanent living in Saudi Arabia; as it was, there was a fear among the non-Saudis that they would have to leave the country once their job contract expired. Under the circumstances, though my spiritual connection to Mecca was strong, my husband was convinced that Saudi Arabia did not provide any job security. So, in 1987 when Australia offered migration to highly skilled people, my husband decided to migrate to Australia for a better and more secure economic life. I agreed to his decision, but quite reluctantly because we were again moving to a non-Muslim part of the world, which would be culturally different and far away from my original homeland (Bangladesh). In Australia, we lived first in Brisbane, then Adelaide, and after three years we took our Australian citizenship. At that stage I loved the Barossa Valley and Victor Harbour in South Australia, and the Gold Coast and Sunshine Coast in Queensland, but did not feel at home in Australia. We bought a house in Adelaide and I was a full time home-maker but was always apprehensive that my children (two boys) would lose their culture in this non-Muslim world. In 1990 we once again moved back to the Muslim world, this time to Muscat, Sultanate of Oman. My connection to this route was again spiritual. I valued the fact that we would live in a Muslim country and our children would be brought up in a Muslim environment. But my husband’s move was purely financial as he got a lucrative job offer in Muscat. We had another son in Oman. We enjoyed the luxurious lifestyle provided by my husband’s workplace and the service provided by the housemaid. I loved the beaches and freedom to drive my car, and I appreciated the friendly Omani people. I also enjoyed our frequent trips (4 hours flight) to my root, Dhaka, Bangladesh. So our children were raised within our ethnic and Islamic culture, remained close to my root (family in Dhaka), though they attended a British school in Muscat. But by the time I started considering Oman to be my second home, we had to leave once again for a place that could provide us with a more secure future. Oman was like Saudi Arabia; it employed expatriates only on a contract basis, and did not give them citizenship (not even fellow Muslims). So after 5 years it was time to move back to Australia. It was with great reluctance that I moved with my husband to Brisbane in 1995 because once again we were to face a different cultural context. As mentioned earlier, we lived in Brisbane in the late 1980s; I liked the weather, the landscape, but did not consider it home for cultural reasons. Our boys started attending expensive private schools and we bought a house in a prestigious Western suburb in Brisbane. Soon after arriving I started my tertiary education at the University of Queensland, and finished an MA in Historical Studies in Indian History in 1998. Still Australia was not my home. I kept thinking that we would return to my previous routes or the ‘imagined’ homeland somewhere in the Middle East, in close proximity to my root (Bangladesh), where we could remain economically secure in a Muslim country. But gradually I began to feel that Australia was becoming my ‘home’. I had gradually become involved in professional and community activities (with university colleagues, the Bangladeshi community and Muslim women’s organisations), and in retrospect I could see that this was an early stage of my ‘self-actualisation’ (Maslow). Through my involvement with diverse people, I felt emotionally connected with the concerns, hopes and dreams of my Muslim-Australian friends. Subsequently, I also felt connected with my mainstream Australian friends whose emotions and fears (9/11 incident, Bali bombing and 7/7 tragedy) were similar to mine. In late 1998 I started my PhD studies on the immigration history of Australia, with a particular focus on the historical settlement of Muslims in Australia. This entailed retrieving archival files and interviewing people, mostly Muslims and some mainstream Australians, and enquiring into relevant migration issues. I also became more active in community issues, and was not constrained by my circumstances. By circumstances, I mean that even though I belonged to a patriarchally structured Muslim family, where my husband was the main breadwinner, main decision-maker, my independence and research activities (entailing frequent interstate trips for data collection, and public speaking) were not frowned upon or forbidden (Khan 14-15); fortunately, my husband appreciated my passion for research and gave me his trust and support. This, along with the Muslim community’s support (interviews), and the wider community’s recognition (for example, the publication of my letters in Australian newspapers, interviews on radio and television) enabled me to develop my self-esteem and built up my bicultural identity as a Muslim in a predominantly Christian country and as a Bangladeshi-Australian. In 2005, for the sake of a better job opportunity, my husband moved to the UK, but this time I asserted that I would not move again. I felt that here in Australia (now in Perth) I had a job, an identity and a home. This time my husband was able to secure a good job back in Australia and was only away for a year. I no longer dream of finding a home in the Middle East. Through my bicultural identity here in Australia I feel connected to the wider community and to the Muslim umma. However, my attachment to the umma has become ambivalent. I feel proud of my Australian-Muslim identity but I am concerned about the jihadi ideology of militant Muslims. By jihadi ideology, I mean the extremist ideology of the al-Qaeda terrorist group (Farrar 2007). The Muslim umma now incorporates both moderate and radical Muslims. The radical Muslims (though only a tiny minority of 1.4 billion Muslims worldwide) pose a threat to their moderate counterparts as well as to non-Muslims. In the UK, some second- and third-generation Muslims identify themselves with the umma rather than their parents’ homelands or their country of birth (Husain). It should not be a matter of concern if these young Muslims adopt a ‘pure’ Muslim identity, providing at the same time they are loyal to their country of residence. But when they resort to terrorism with their ‘pure’ Muslim identity (e.g., the 7/7 London bombers) they defame my religion Islam, and undermine my spiritual connection to the umma. As a 1st generation immigrant, the defining criteria of my ‘homeliness’ in Australia are my ethno-cultural and religious identity (which includes my family), my active citizenship, and my community development/contribution through my research work – all of which allow me a sense of efficacy in my life. My ethnic and religious identities generally co-exist equally, but when I see some Muslims kill my fellow Australians (such as the Bali bombings in 2002 and 2005) my Australian identity takes precedence. I feel for the victims and condemn the perpetrators. On the other hand, when I see politics play a role over the human rights issues (e.g., the Tampa incident), my religious identity begs me to comment on it (see Kabir, Muslims in Australia 295-305). Problematising ‘Home’ for Muslim Australians In the European context, Grillo (863) and Werbner (904), and in the Australian context, Kabir (Muslims in Australia) and Poynting and Mason, have identified the diversity within Islam (national, ethnic, religious etc). Werbner (904) notes that in spite of the “wishful talk of the emergence of a ‘British Islam’, even today there are Pakistani, Bangladeshi and Arab mosques, as well as Turkish and Shia’a mosques”; thus British Muslims retain their separate identities. Similarly, in Australia, the existence of separate mosques for the Bangladeshi, Pakistani, Arab and Shia’a peoples indicates that Australian Muslims have also kept their ethnic identities discrete (Saeed 64-77). However, in times of crisis, such as the Salman Rushdie affair in 1989, and the 1990-1991 Gulf crises, both British and Australian Muslims were quick to unite and express their Islamic identity by way of resistance (Kabir, Muslims in Australia 160-162; Poynting and Mason 68-70). In both British and Australian contexts, I argue that a peaceful rally or resistance is indicative of active citizenship of Muslims as it reveals their sense of belonging (also Werbner 905). So when a transmigrant Muslim wants to make a peaceful demonstration, the Western world should be encouraged, not threatened – as long as the transmigrant’s allegiances lie also with the host country. In the European context, Grillo (868) writes: when I asked Mehmet if he was planning to stay in Germany he answered without hesitation: ‘Yes, of course’. And then, after a little break, he added ‘as long as we can live here as Muslims’. In this context, I support Mehmet’s desire to live as a Muslim in a non-Muslim world as long as this is peaceful. Paradoxically, living a Muslim life through ijtihad can be either socially progressive or destructive. The Canadian Muslim feminist Irshad Manji relies on ijtihad, but so does Osama bin Laden! Manji emphasises that ijtihad can be, on the one hand, the adaptation of Islam using independent reasoning, hybridity and the contesting of ‘traditional’ family values (c.f. Doogue and Kirkwood 275-276, 314); and, on the other, ijtihad can take the form of conservative, patriarchal and militant Islamic values. The al-Qaeda terrorist Osama bin Laden espouses the jihadi ideology of Sayyid Qutb (1906-1966), an Egyptian who early in his career might have been described as a Muslim modernist who believed that Islam and Western secular ideals could be reconciled. But he discarded that idea after going to the US in 1948-50; there he was treated as ‘different’ and that treatment turned him against the West. He came back to Egypt and embraced a much more rigid and militaristic form of Islam (Esposito 136). Other scholars, such as Cesari, have identified a third orientation – a ‘secularised Islam’, which stresses general beliefs in the values of Islam and an Islamic identity, without too much concern for practices. Grillo (871) observed Islam in the West emphasised diversity. He stressed that, “some [Muslims were] more quietest, some more secular, some more clamorous, some more negotiatory”, while some were exclusively characterised by Islamic identity, such as wearing the burqa (elaborate veils), hijabs (headscarves), beards by men and total abstinence from drinking alcohol. So Mehmet, cited above, could be living a Muslim life within the spectrum of these possibilities, ranging from an integrating mode to a strict, militant Muslim manner. In the UK context, Zubaida (96) contends that marginalised, culturally-impoverished youth are the people for whom radical, militant Islamism may have an appeal, though it must be noted that the 7/7 bombers belonged to affluent families (O’Sullivan 14; Husain). In Australia, Muslim Australians are facing three challenges. First, the Muslim unemployment rate: it was three times higher than the national total in 1996 and 2001 (Kabir, Muslims in Australia 266-278; Kabir, “What Does It Mean” 63). Second, some spiritual leaders have used extreme rhetoric to appeal to marginalised youth; in January 2007, the Australian-born imam of Lebanese background, Sheikh Feiz Mohammad, was alleged to have employed a DVD format to urge children to kill the enemies of Islam and to have praised martyrs with a violent interpretation of jihad (Chulov 2). Third, the proposed citizenship test has the potential to make new migrants’ – particularly Muslims’ – settlement in Australia stressful (Kabir, “What Does It Mean” 62-79); in May 2007, fuelled by perceptions that some migrants – especially Muslims – were not integrating quickly enough, the Howard government introduced a citizenship test bill that proposes to test applicants on their English language skills and knowledge of Australian history and ‘values’. I contend that being able to demonstrate knowledge of history and having English language skills is no guarantee that a migrant will be a good citizen. Through my transmigrant history, I have learnt that developing a bond with a new place takes time, acceptance and a gradual change of identity, which are less likely to happen when facing assimilationist constraints. I spoke English and studied history in the United States, but I did not consider it my home. I did not speak the Arabic language, and did not study Middle Eastern history while I was in the Middle East, but I felt connected to it for cultural and religious reasons. Through my knowledge of history and English language proficiency I did not make Australia my home when I first migrated to Australia. Australia became my home when I started interacting with other Australians, which was made possible by having the time at my disposal and by fortunate circumstances, which included a fairly high level of efficacy and affluence. If I had been rejected because of my lack of knowledge of ‘Australian values’, or had encountered discrimination in the job market, I would have been much less willing to embrace my host country and call it home. I believe a stringent citizenship test is more likely to alienate would-be citizens than to induce their adoption of values and loyalty to their new home. Conclusion Blunt (5) observes that current studies of home often investigate mobile geographies of dwelling and how it shapes one’s identity and belonging. Such geographies of home negotiate from the domestic to the global context, thus mobilising the home beyond a fixed, bounded and confining location. Similarly, in this paper I have discussed how my mobile geography, from the domestic (root) to global (route), has shaped my identity. Though I received a degree of culture shock in the United States, loved the Middle East, and was at first quite resistant to the idea of making Australia my second home, the confidence I acquired in residing in these ‘several homes’ were cumulative and eventually enabled me to regard Australia as my ‘home’. I loved the Middle East, but I did not pursue an active involvement with the Arab community because I was a busy mother. Also I lacked the communication skill (fluency in Arabic) with the local residents who lived outside the expatriates’ campus. I am no longer a cultural freak. I am no longer the same Bangladeshi woman who saw her ethnic and Islamic culture as superior to all other cultures. I have learnt to appreciate Australian values, such as tolerance, ‘a fair go’ and multiculturalism (see Kabir, “What Does It Mean” 62-79). My bicultural identity is my strength. With my ethnic and religious identity, I can relate to the concerns of the Muslim community and other Australian ethnic and religious minorities. And with my Australian identity I have developed ‘a voice’ to pursue active citizenship. Thus my biculturalism has enabled me to retain and merge my former home with my present and permanent home of Australia. References Anderson, Benedict. Imagined Communities: Reflections on the Origin and Spread of Nationalism. London, New York: Verso, 1983. Australian Bureau of Statistics: Census of Housing and Population, 1996 and 2001. Blunt, Alison. Domicile and Diaspora: Anglo-Indian Women and the Spatial Politics of Home. Oxford: Blackwell, 2005. Blunt, Alison, and Robyn Dowling. Home. London and New York: Routledge, 2006. Cesari, Jocelyne. “Muslim Minorities in Europe: The Silent Revolution.” In John L. Esposito and Burgat, eds., Modernising Islam: Religion in the Public Sphere in Europe and the Middle East. London: Hurst, 2003. 251-269. Chulov, Martin. “Treatment Has Sheik Wary of Returning Home.” Weekend Australian 6-7 Jan. 2007: 2. Cohen, Robin. Global Diasporas: An Introduction. Seattle: University of Washington, 1997. Doogue, Geraldine, and Peter Kirkwood. Tomorrow’s Islam: Uniting Old-Age Beliefs and a Modern World. Sydney: ABC Books, 2005. Esposito, John. The Islamic Threat: Myth or Reality? 3rd ed. New York, Oxford: Oxford UP, 1999. Farrar, Max. “When the Bombs Go Off: Rethinking and Managing Diversity Strategies in Leeds, UK.” International Journal of Diversity in Organisations, Communities and Nations 6.5 (2007): 63-68. Grillo, Ralph. “Islam and Transnationalism.” Journal of Ethnic and Migration Studies 30.5 (Sep. 2004): 861-878. Hall, Stuart. Polity Reader in Cultural Theory. Cambridge: Polity Press, 1994. Huntington, Samuel, P. The Clash of Civilisation and the Remaking of World Order. London: Touchstone, 1998. Husain, Ed. The Islamist: Why I Joined Radical Islam in Britain, What I Saw inside and Why I Left. London: Penguin, 2007. Kabir, Nahid. Muslims in Australia: Immigration, Race Relations and Cultural History. London: Kegan Paul, 2005. ———. “What Does It Mean to Be Un-Australian: Views of Australian Muslim Students in 2006.” People and Place 15.1 (2007): 62-79. Khan, Shahnaz. Aversion and Desire: Negotiating Muslim Female Identity in the Diaspora. Toronto: Women’s Press, 2002. Manji, Irshad. The Trouble with Islam Today. Canada:Vintage, 2005. Maslow, Abraham. Motivation and Personality. New York: Harper, 1954. O’Sullivan, J. “The Real British Disease.” Quadrant (Jan.-Feb. 2006): 14-20. Poynting, Scott, and Victoria Mason. “The Resistible Rise of Islamophobia: Anti-Muslim Racism in the UK and Australia before 11 September 2001.” Journal of Sociology 43.1 (2007): 61-86. Saeed, Abdallah. Islam in Australia. Sydney: Allen and Unwin, 2003. Smith, Anthony D. National Identity. Harmondsworth: Penguin, 1991. Spencer, Philip, and Howard Wollman. Nationalism: A Critical Introduction. London: Sage, 2002. Vertovec, Stevens. The Hindu Diaspora: Comparative Patterns. London: Routledge. 2000. Werbner, Pnina, “Theorising Complex Diasporas: Purity and Hybridity in the South Asian Public Sphere in Britain.” Journal of Ethnic and Migration Studies 30.5 (2004): 895-911. Wood, Dennis. “The Diaspora, Community and the Vagrant Space.” In Cynthia Vanden Driesen and Ralph Crane, eds., Diaspora: The Australasian Experience. New Delhi: Prestige, 2005. 59-64. Zubaida, Sami. “Islam in Europe: Unity or Diversity.” Critical Quarterly 45.1-2 (2003): 88-98. Citation reference for this article MLA Style Kabir, Nahid. "Why I Call Australia ‘Home’?: A Transmigrant’s Perspective." M/C Journal 10.4 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0708/15-kabir.php>. APA Style Kabir, N. (Aug. 2007) "Why I Call Australia ‘Home’?: A Transmigrant’s Perspective," M/C Journal, 10(4). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0708/15-kabir.php>.
APA, Harvard, Vancouver, ISO, and other styles
50

Simpson, Catherine. "Communicating Uncertainty about Climate Change: The Scientists’ Dilemma." M/C Journal 14, no. 1 (January 26, 2011). http://dx.doi.org/10.5204/mcj.348.

Full text
Abstract:
Photograph by Gonzalo Echeverria (2010)We need to get some broad-based support, to capture the public’s imagination … so we have to offer up scary scenarios, make simplified, dramatic statements and make little mention of any doubts … each of us has to decide what the right balance is between being effective and being honest (Hulme 347). Acclaimed climate scientist, the late Stephen Schneider, made this comment in 1988. Later he regretted it and said that there are ways of using metaphors that can “convey both urgency and uncertainty” (Hulme 347). What Schneider encapsulates here is the great conundrum for those attempting to communicate climate change to the everyday public. How do scientists capture the public’s imagination and convey the desperation they feel about climate change, but do it ethically? If scientific findings are presented carefully, in boring technical jargon that few can understand, then they are unlikely to attract audiences or provide an impetus for behavioural change. “What can move someone to act?” asks communication theorists Susan Moser and Lisa Dilling (37). “If a red light blinks on in a cockpit” asks Donella Meadows, “should the pilot ignore it until in speaks in an unexcited tone? … Is there any way to say [it] sweetly? Patiently? If one did, would anyone pay attention?” (Moser and Dilling 37). In 2010 Tim Flannery was appointed Panasonic Chair in Environmental Sustainability at Macquarie University. His main teaching role remains within the new science communication programme. One of the first things Flannery was emphatic about was acquainting students with Karl Popper and the origin of the scientific method. “There is no truth in science”, he proclaimed in his first lecture to students “only theories, hypotheses and falsifiabilities”. In other words, science’s epistemological limits are framed such that, as Michael Lemonick argues, “a statement that cannot be proven false is generally not considered to be scientific” (n.p., my emphasis). The impetus for the following paper emanates precisely from this issue of scientific uncertainty — more specifically from teaching a course with Tim Flannery called Communicating climate change to a highly motivated group of undergraduate science communication students. I attempt to illuminate how uncertainty is constructed differently by different groups and that the “public” does not necessarily interpret uncertainty in the same way the sciences do. This paper also analyses how doubt has been politicised and operates polemically in media coverage of climate change. As Andrew Gorman-Murray and Gordon Waitt highlight in an earlier issue of M/C Journal that focused on the climate-culture nexus, an understanding of the science alone is not adequate to deal with the cultural change necessary to address the challenges climate change brings (n.p). Far from being redundant in debates around climate change, the humanities have much to offer. Erosion of Trust in Science The objectives of Macquarie’s science communication program are far more ambitious than it can ever hope to achieve. But this is not necessarily a bad thing. The initiative is a response to declining student numbers in maths and science programmes around the country and is designed to address the perceived lack of communication skills in science graduates that the Australian Council of Deans of Science identified in their 2001 report. According to Macquarie Vice Chancellor Steven Schwartz’s blog, a broader, and much more ambitious aim of the program is to “restore public trust in science and scientists in the face of widespread cynicism” (n.p.). In recent times the erosion of public trust in science was exacerbated through the theft of e-mails from East Anglia University’s Climate Research Unit and the so-called “climategate scandal” which ensued. With the illegal publication of the e-mails came claims against the Research Unit that climate experts had been manipulating scientific data to suit a pro-global warming agenda. Three inquiries later, all the scientists involved were cleared of any wrongdoing, however the damage had already been done. To the public, what this scandal revealed was a certain level of scientific hubris around the uncertainties of the science and an unwillingness to explain the nature of these uncertainties. The prevailing notion remained that the experts were keeping information from public scrutiny and not being totally honest with them, which at least in the short term, damaged the scientists’s credibility. Many argued that this signalled a shift in public opinion and media portrayal on the issue of climate change in late 2009. University of Sydney academic, Rod Tiffen, claimed in the Sydney Morning Herald that the climategate scandal was “one of the pivotal moments in changing the politics of climate change” (n.p). In Australia this had profound implications and meant that the bipartisan agreement on an emissions trading scheme (ETS) that had almost been reached, subsequently collapsed with (climate sceptic) Tony Abbott's defeat of (ETS advocate) Malcolm Turnbull to become opposition leader (Tiffen). Not long after the reputation of science received this almighty blow, albeit unfairly, the federal government released a report in February 2010, Inspiring Australia – A national strategy for engagement with the sciences as part of the country’s innovation agenda. The report outlines a commitment from the Australian government and universities around the country to address the challenges of not only communicating science to the broader community but, in the process, renewing public trust and engagement in science. The report states that: in order to achieve a scientifically engaged Australia, it will be necessary to develop a culture where the sciences are recognized as relevant to everyday life … Our science institutions will be expected to share their knowledge and to help realize full social, economic, health and environmental benefits of scientific research and in return win ongoing public support. (xiv-xv) After launching the report, Innovation Minister Kim Carr went so far as to conflate “hope” with “science” and in the process elevate a discourse of technological determinism: “it’s time for all true friends of science to step up and defend its values and achievements” adding that, "when you denigrate science, you destroy hope” (n.p.). Forever gone is our naïve post-war world when scientists were held in such high esteem that they could virtually use humans as guinea pigs to test out new wonder chemicals; such as organochlorines, of which DDT is the most widely known (Carson). Thanks to government-sponsored nuclear testing programs, if you were born in the 1950s, 1960s or early 1970s, your brain carries a permanent nuclear legacy (Flannery, Here On Earth 158). So surely, for the most part, questioning the authority and hubristic tendencies of science is a good thing. And I might add, it’s not just scientists who bear this critical burden, the same scepticism is directed towards journalists, politicians and academics alike – something that many cultural theorists have noted is characteristic of our contemporary postmodern world (Lyotard). So far from destroying hope, as the former Innovation Minister Kim Carr (now Minister for Innovation, Industry, Science and Research) suggests, surely we need to use the criticisms of science as a vehicle upon which to initiate hope and humility. Different Ways of Knowing: Bayesian Beliefs and Matters of Concern At best, [science] produces a robust consensus based on a process of inquiry that allows for continued scrutiny, re-examination, and revision. (Oreskes 370) In an attempt to capitalise on the Macquarie Science Faculty’s expertise in climate science, I convened a course in second semester 2010 called SCOM201 Science, Media, Community: Communicating Climate Change, with invaluable assistance from Penny Wilson, Elaine Kelly and Liz Morgan. Mike Hulme’s provocative text, Why we disagree about climate change: Understanding controversy, inaction and opportunity provided an invaluable framework for the course. Hulme’s book brings other types of knowledge, beyond the scientific, to bear on our attitudes towards climate change. Climate change, he claims, has moved from being just a physical, scientific, and measurable phenomenon to becoming a social and cultural phenomenon. In order to understand the contested nature of climate change we need to acknowledge the dynamic and varied meanings climate has played in different cultures throughout history as well as the role that our own subjective attitudes and judgements play. Climate change has become a battleground between different ways of knowing, alternative visions of the future, competing ideas about what’s ethical and what’s not. Hulme makes the point that one of the reasons that we disagree about climate change is because we disagree about the role of science in today’s society. He encourages readers to use climate change as a tool to rigorously question the basis of our beliefs, assumptions and prejudices. Since uncertainty was the course’s raison d’etre, I was fortunate to have an extraordinary cohort of students who readily engaged with a course that forced them to confront their own epistemological limits — both personally and in a disciplinary sense. (See their blog: https://scom201.wordpress.com/). Science is often associated with objective realities. It thus tends to distinguish itself from the post-structuralist vein of critique that dominates much of the contemporary humanities. At the core of post-structuralism is scepticism about everyday, commonly accepted “truths” or what some call “meta-narratives” as well as an acknowledgement of the role that subjectivity plays in the pursuit of knowledge (Lyotard). However if we can’t rely on objective truths or impartial facts then where does this leave us when it comes to generating policy or encouraging behavioural change around the issue of climate change? Controversial philosophy of science scholar Bruno Latour sits squarely in the post-structuralist camp. In his 2004 article, “Why has critique run out of steam? From matters of fact to matters of concern”, he laments the way the right wing has managed to gain ground in the climate change debate through arguing that uncertainty and lack of proof is reason enough to deny demands for action. Or to use his turn-of-phrase, “dangerous extremists are using the very same argument of social construction to destroy hard-won evidence that could save our lives” (Latour n.p). Through co-opting (the Left’s dearly held notion of) scepticism and even calling themselves “climate sceptics”, they exploited doubt as a rationale for why we should do nothing about climate change. Uncertainty is not only an important part of science, but also of the human condition. However, as sociologist Sheila Jasanoff explains in her Nature article, “Technologies of Humility”, uncertainty has become like a disease: Uncertainty has become a threat to collective action, the disease that knowledge must cure. It is the condition that poses cruel dilemmas for decision makers; that must be reduced at all costs; that is tamed with scenarios and assessments; and that feeds the frenzy for new knowledge, much of it scientific. (Jasanoff 33) If we move from talking about climate change as “a matter of fact” to “a matter of concern”, argues Bruno Latour, then we can start talking about useful ways to combat it, rather than talking about whether the science is “in” or not. Facts certainly matter, claims Latour, but they can’t give us the whole story, rather “they assemble with other ingredients to produce a matter of concern” (Potter and Oster 123). Emily Potter and Candice Oster suggest that climate change can’t be understood through either natural or cultural frames alone and, “unlike a matter of fact, matters of concern cannot be explained through a single point of view or discursive frame” (123). This makes a lot of what Hulme argues far more useful because it enables the debate to be taken to another level. Those of us with non-scientific expertise can centre debates around the kinds of societies we want, rather than being caught up in the scientific (un)certainties. If we translate Latour’s concept of climate change being “a matter of concern” into the discourse of environmental management then what we come up with, I think, is the “precautionary principle”. In the YouTube clip, “Stephen Schneider vs Skeptics”, Schneider argues that when in doubt about the potential environmental impacts of climate change, we should always apply the precautionary principle. This principle emerged from the UN conference on Environment and Development in Rio de Janeiro in 1992 and concerns the management of scientific risk. However its origins are evident much earlier in documents such as the “Use of Pesticides” from US President’s Science Advisory Committee in 1962. Unlike in criminal and other types of law where the burden of proof is on the prosecutor to show that the person charged is guilty of a particular offence, in environmental law the onus of proof is on the manufacturers to demonstrate the safety of their product. For instance, a pesticide should be restricted or disproved for use if there is “reasonable doubt” about its safety (Oreskes 374). Principle 15 of the Rio Declaration on Environment and Development in 1992 has its foundations in the precautionary principle: “Where there are threats of serious or irreversible environmental damage, lack of full scientific certainty should not be used as a reason for postponing measures to prevent environmental degradation” (n.p). According to Environmental Law Online, the Rio declaration suggests that, “The precautionary principle applies where there is a ‘lack of full scientific certainty’ – that is, when science cannot say what consequences to expect, how grave they are, or how likely they are to occur” (n.p.). In order to make predictions about the likelihood of an event occurring, scientists employ a level of subjectivity, or need to “reveal their degree of belief that a prediction will turn out to be correct … [S]omething has to substitute for this lack of certainty” otherwise “the only alternative is to admit that absolutely nothing is known” (Hulme 85). These statements of “subjective probabilities or beliefs” are called Bayesian, after eighteenth century English mathematician Sir Thomas Bayes who developed the theory of evidential probability. These “probabilities” are estimates, or in other words, subjective, informed judgements that draw upon evidence and experience about the likelihood of event occurring. The Intergovernmental Panel on Climate Change (IPCC) uses Bayesian beliefs to determine the risk or likelihood of an event occurring. The IPCC provides the largest international scientific assessment of climate change and often adopts a consensus model where viewpoint reached by the majority of scientists is used to establish knowledge amongst an interdisciplinary community of scientists and then communicate it to the public (Hulme 88). According to the IPCC, this consensus is reached amongst more than more than 450 lead authors, more than 800 contributing authors, and 2500 scientific reviewers. While it is an advisory body and is not policy-prescriptive, the IPCC adopts particular linguistic conventions to indicate the probability of a statement being correct. Stephen Schneider convinced the IPCC to use this approach to systemise uncertainty (Lemonick). So for instance, in the IPCC reports, the term “likely” denotes a chance of 66%-90% of the statement being correct, while “very likely” denotes more than a 90% chance. Note the change from the Third Assessment Report (2001), indicating that “most of the observed warming in over the last fifty years is likely to have been due to the increase in greenhouse gas emissions” to the Fourth Assessment (February 2007) which more strongly states: “Most of the observed increase in global average temperatures since the mid twentieth century is very likely due to the observed increase in anthropogenic greenhouse gas concentrations” (Hulme 51, my italics). A fiery attack on Tim Flannery by Andrew Bolt on Steve Price’s talkback radio show in June 2010 illustrates just how misunderstood scientific uncertainty is in the broader community. When Price introduces Flannery as former Australian of the Year, Bolt intercedes, claiming Flannery is “Alarmist of the Year”, then goes on to chastise Flannery for making various forecasts which didn’t eventuate, such as that Perth and Brisbane might run out of water by 2009. “How much are you to blame for the swing in sentiment, the retreat from global warming policy and rise of scepticism?” demands Bolt. In the context of the events of late 2009 and early 2010, the fact that these events didn’t materialise made Flannery, and others, seem unreliable. And what Bolt had to say on talkback radio, I suspect, resonated with a good proportion of its audience. What Bolt was trying to do was discredit Flannery’s scientific credentials and in the process erode trust in the expert. Flannery’s response was to claim that, what he said was that these events might eventuate. In much the same way that the climate sceptics have managed to co-opt scepticism and use it as a rationale for inaction on climate change, Andrew Bolt here either misunderstands basic scientific method or quite consciously misleads and manipulates the public. As Naomi Oreskes argues, “proof does not play the role in science that most people think it does (or should), and therefore it cannot play the role in policy that skeptics demand it should” (Oreskes 370). Doubt and ‘Situated’ Hope Uncertainty and ambiguity then emerge here as resources because they force us to confront those things we really want–not safety in some distant, contested future but justice and self-understanding now. (Sheila Jasanoff, cited in Hulme, back cover) In his last published book before his death in mid-2010, Science as a contact sport, Stephen Schneider’s advice to aspiring science communicators is that they should engage with the media “not at all, or a lot”. Climate scientist Ann Henderson-Sellers adds that there are very few scientists “who have the natural ability, and learn or cultivate the talents, of effective communication with and through the media” (430). In order to attract the public’s attention, it was once commonplace for scientists to write editorials and exploit fear-provoking measures by including a “useful catastrophe or two” (Moser and Dilling 37). But are these tactics effective? Susanne Moser thinks not. She argues that “numerous studies show that … fear may change attitudes … but not necessarily increase active engagement or behaviour change” (Moser 70). Furthermore, risk psychologists argue that danger is always context specific (Hulme 196). If the risk or danger is “situated” and “tangible” (such as lead toxicity levels in children in Mt Isa from the Xstrata mine) then the public will engage with it. However if it is “un-situated” (distant, intangible and diffuse) like climate change, the audience is less likely to. In my SCOM201 class we examined the impact of two climate change-related campaigns. The first one was a short film used to promote the 2010 Copenhagen Climate Change Summit (“Scary”) and the second was the State Government of Victoria’s “You have the power: Save Energy” public awareness campaign (“You”). Using Moser’s article to guide them, students evaluated each campaign’s effectiveness. Their conclusions were that the “You have the power” campaign had far more impact because it a) had very clear objectives (to cut domestic power consumption) b) provided a very clear visualisation of carbon dioxide through the metaphor of black balloons wafting up into the atmosphere, c) gave viewers a sense of empowerment and hope through describing simple measures to cut power consumption and, d) used simple but effective metaphors to convey a world progressed beyond human control, such as household appliances robotically operating themselves in the absence of humans. Despite its high production values, in comparison, the Copenhagen Summit promotion was more than ineffective and bordered on propaganda. It actually turned viewers off with its whining, righteous appeal of, “please help the world”. Its message and objectives were ambiguous, it conveyed environmental catastrophe through hackneyed images, exploited children through a narrative based on fear and gave no real sense of hope or empowerment. In contrast the Victorian Government’s campaign focused on just one aspect of climate change that was made both tangible and situated. Doubt and uncertainty are productive tools in the pursuit of knowledge. Whether it is scientific or otherwise, uncertainty will always be the motivation that “feeds the frenzy for new knowledge” (Jasanoff 33). Articulating the importance of Hulme’s book, Sheila Jasanoff indicates we should make doubt our friend, “Without downplaying its seriousness, Hulme demotes climate change from ultimate threat to constant companion, whose murmurs unlock in us the instinct for justice and equality” (Hulme back cover). The “murmurs” that Jasanoff gestures to here, I think, can also be articulated as hope. And it is in this discussion of climate change that doubt and hope sit side-by-side as bedfellows, mutually entangled. Since the “failed” Copenhagen Summit, there has been a distinct shift in climate change discourse from “experts”. We have moved away from doom and gloom discourses and into the realm of what I shall call “situated” hope. “Situated” hope is not based on blind faith alone, but rather hope grounded in evidence, informed judgements and experience. For instance, in distinct contrast to his cautionary tale The Weather Makers: The History & Future Impact of Climate Change, Tim Flannery’s latest book, Here on Earth is a biography of our Earth; a planet that throughout its history has oscillated between Gaian and Medean impulses. However Flannery’s wonder about the natural world and our potential to mitigate the impacts of climate change is not founded on empty rhetoric but rather tempered by evidence; he presents a series of case studies where humanity has managed to come together for a global good. Whether it’s the 1987 Montreal ban on CFCs (chlorinated fluorocarbons) or the lesser-known 2001 Stockholm Convention on POP (Persistent Organic Pollutants), what Flannery envisions is an emerging global civilisation, a giant, intelligent super-organism glued together through social bonds. He says: If that is ever achieved, the greatest transformation in the history of our planet would have occurred, for Earth would then be able to act as if it were as Francis Bacon put it all those centuries ago, ‘one entire, perfect living creature’. (Here on Earth, 279) While science might give us “our most reliable understanding of the natural world” (Oreskes 370), “situated” hope is the only productive and ethical currency we have. ReferencesAustralian Council of Deans of Science. What Did You Do with Your Science Degree? A National Study of Employment Outcomes for Science Degree Holders 1990-2000. Melbourne: Centre for the Study of Higher Education, University of Melbourne, 2001. Australian Government Department of Innovation, Industry, Science and Research, Inspiring Australia – A National Strategy for Engagement with the Sciences. Executive summary. Canberra: DIISR, 2010. 24 May 2010 ‹http://www.innovation.gov.au/SCIENCE/INSPIRINGAUSTRALIA/Documents/InspiringAustraliaSummary.pdf›. “Andrew Bolt with Tim Flannery.” Steve Price. Hosted by Steve Price. Melbourne: Melbourne Talkback Radio, 2010. 9 June 2010 ‹http://www.mtr1377.com.au/index2.php?option=com_newsmanager&task=view&id=6209›. Carson, Rachel. Silent Spring. London: Penguin, 1962 (2000). Carr, Kim. “Celebrating Nobel Laureate Professor Elizabeth Blackburn.” Canberra: DIISR, 2010. 19 Feb. 2010 ‹http://minister.innovation.gov.au/Carr/Pages/CELEBRATINGNOBELLAUREATEPROFESSORELIZABETHBLACKBURN.aspx›. Environmental Law Online. “The Precautionary Principle.” N.d. 19 Jan 2011 ‹http://www.envirolaw.org.au/articles/precautionary_principle›. Flannery, Tim. The Weather Makers: The History & Future Impact of Climate Change. Melbourne: Text Publishing, 2005. ———. Here on Earth: An Argument for Hope. Melbourne: Text Publishing, 2010. Gorman-Murray, Andrew, and Gordon Waitt. “Climate and Culture.” M/C Journal 12.4 (2009). 9 Mar 2011 ‹http://journal.media-culture.org.au/index.php/mcjournal/article/viewArticle/184/0›. Harrison, Karey. “How ‘Inconvenient’ Is Al Gore’s Climate Change Message?” M/C Journal 12.4 (2009). 9 Mar 2011 ‹http://journal.media-culture.org.au/index.php/mcjournal/article/viewArticle/175›. Henderson-Sellers, Ann. “Climate Whispers: Media Communication about Climate Change.” Climatic Change 40 (1998): 421–456. Hulme, Mike. Why We Disagree about Climate Change: Understanding, Controversy, Inaction and Opportunity. Cambridge: Cambridge UP, 2009. Intergovernmental Panel on Climate Change. A Picture of Climate Change: The Current State of Understanding. 2007. 11 Jan 2011 ‹http://www.ipcc.ch/pdf/press-ar4/ipcc-flyer-low.pdf›. Jasanoff, Sheila. “Technologies of Humility.” Nature 450 (2007): 33. Latour, Bruno. “Why Has Critique Run Out of Steam? From Matters of Fact to Matters of Concern.” Critical Inquiry 30.2 (2004). 19 Jan 2011 ‹http://criticalinquiry.uchicago.edu/issues/v30/30n2.Latour.html›. Lemonick, Michael D. “Climate Heretic: Judith Curry Turns on Her Colleagues.” Nature News 1 Nov. 2010. 9 Mar 2011 ‹http://www.nature.com/news/2010/101101/full/news.2010.577.html›. Lyotard, Jean-Francois. The Postmodern Condition: A Report on Knowledge. Minneapolis: U of Minnesota P, 1984. Moser, Susanne, and Lisa Dilling. “Making Climate Hot: Communicating the Urgency and Challenge of Global Climate Change.” Environment 46.10 (2004): 32-46. Moser, Susie. “More Bad News: The Risk of Neglecting Emotional Responses to Climate Change Information.” In Susanne Moser and Lisa Dilling (eds.), Creating a Climate for Change: Communicating Climate Change and Facilitating Social Change. Cambridge: Cambridge UP, 2007. 64-81. Oreskes, Naomi. “Science and Public Policy: What’s Proof Got to Do with It?” Environmental Science and Policy 7 (2004): 369-383. Potter, Emily, and Candice Oster. “Communicating Climate Change: Public Responsiveness and Matters of Concern.” Media International Australia 127 (2008): 116-126. President’s Science Advisory Committee. “Use of Pesticides”. Washington, D.C.: The White House, 1963. United Nations Declaration on Environment and Development. Rio de Janeiro, 1992. 19 Jan 2011 ‹http://www.unep.org/Documents.Multilingual/Default.asp?DocumentID=78&ArticleID=1163›. “Scary Global Warming Propaganda Video Shown at the Copenhagen Climate Meeting – 7 Dec. 2009.” YouTube. 21 Mar. 2011‹http://www.youtube.com/watch?v=jzSuP_TMFtk&feature=related›. Schneider, Stephen. Science as a Contact Sport: Inside the Battle to Save Earth’s Climate. National Geographic Society, 2010. ———. “Stephen Schneider vs. the Sceptics”. YouTube. 21 Mar. 2011 ‹http://www.youtube.com/watch?v=7rj1QcdEqU0›. Schwartz, Steven. “Science in Search of a New Formula.” 2010. 20 May 2010 ‹http://www.vc.mq.edu.au/blog/2010/03/11/science-in-search-of-a-new-formula/›. Tiffen, Rodney. "You Wouldn't Read about It: Climate Scientists Right." Sydney Morning Herald 26 July 2010. 19 Jan 2011 ‹http://www.smh.com.au/environment/climate-change/you-wouldnt-read-about-it-climate-scientists-right-20100727-10t5i.html›. “You Have the Power: Save Energy.” YouTube. 21 Mar. 2011 ‹http://www.youtube.com/watch?v=SCiS5k_uPbQ›.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography