Journal articles on the topic 'Ball passes network'

To see the other types of publications on this topic, follow the link: Ball passes network.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 17 journal articles for your research on the topic 'Ball passes network.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Browne, P., S. Morgan, J. Bahnisch, and S. Robertson. "Discovering patterns of play in netball with network motifs and association rules." International Journal of Computer Science in Sport 18, no. 1 (July 1, 2019): 64–79. http://dx.doi.org/10.2478/ijcss-2019-0004.

Full text
Abstract:
Abstract In netball, analysis of the movement of players and the ball across different court locations can provide information about trends otherwise hidden. This study aimed to develop a method to discover latent passing patterns in women’s netball. Data for both pass location and playing position were collected from centre passes during selected games in the 2016 Trans-Tasman Netball Championship season and 2017 Australian National Netball League. A motif analysis was used to characterise passing-sequence observations. This revealed that the most frequent, sequential passing style from a centre pass was the “ABCD” motif in an alphabetical system, or in a positional system “Centre–Goal Attack–Wing Attack–Goal Shooter” and rarely was the ball passed back to the player it was received from. An association rule mining was used to identify frequent ball movement sequences from a centre pass play. The most confident rule flowed down the right-hand side of the court, however seven of the ten most confident rules demonstrated a preference for ball movement down the left-hand side of the court. These results can offer objective insight into passing sequences, and potentially inform team strategy and tactics. This method can also be generalised to other invasion sports.
APA, Harvard, Vancouver, ISO, and other styles
2

Fernández, Javier, Luke Bornn, and Daniel Cervone. "A framework for the fine-grained evaluation of the instantaneous expected value of soccer possessions." Machine Learning 110, no. 6 (May 24, 2021): 1389–427. http://dx.doi.org/10.1007/s10994-021-05989-6.

Full text
Abstract:
AbstractThe expected possession value (EPV) of a soccer possession represents the likelihood of a team scoring or conceding the next goal at any time instance. In this work, we develop a comprehensive analysis framework for the EPV, providing soccer practitioners with the ability to evaluate the impact of observed and potential actions, both visually and analytically. The EPV expression is decomposed into a series of subcomponents that model the influence of passes, ball drives and shot actions on the expected outcome of a possession. We show we can learn from spatiotemporal tracking data and obtain calibrated models for all the components of the EPV. For the components related with passes, we produce visually-interpretable probability surfaces from a series of deep neural network architectures built on top of flexible representations of game states. Additionally, we present a series of novel practical applications providing coaches with an enriched interpretation of specific game situations. This is, to our knowledge, the first EPV approach in soccer that uses this decomposition and incorporates the dynamics of the 22 players and the ball through tracking data.
APA, Harvard, Vancouver, ISO, and other styles
3

J.T, Fakoya, Olarinde M.O., and Adeola A.A. "Evaluating Player Interaction and Performance using Network Analysis." International Journal of Computer Science and Mobile Computing 11, no. 9 (September 30, 2022): 1–10. http://dx.doi.org/10.47760/ijcsmc.2022.v11i09.001.

Full text
Abstract:
In professional sports, a team's biggest concern is winning a game every time they step on the pitch. All teams aspire to give their best effort during a game, and doing so necessitates taking into account players interaction with their teammates during playing time. Therefore, determining each players interaction and evaluating their performance plays an important role in basketball. The study reviewed and evaluated players interaction for the 2017/2018 NBA season. Though there are known techniques for analysis and player performance evaluation which have been developed overtime, several other techniques have been proposed. However, in order to better manage the game and positioning of players, network analysis a better way to understand players preference in passing the ball to other players. The study used Network analysis to assess and analyze basketball players interaction and general performance. Statistics for every player for 2017/2018 season were gathered by scraping data from Basketball-Reference and used custom R scripts to gather box score data from basketball reference. Precisely there were 30 teams and had initially 23 variables related to their performance with attributes such as fields goals made, field goals made, points scored with field goals, points scored and so on. Network nodes for each players assist performance was highlighted. Network diagram were then generated for different teams such as Milwaukee Bucks, Cleveland which shown the consistency of passes for each player and interaction.
APA, Harvard, Vancouver, ISO, and other styles
4

Anzer, Gabriel, and Pascal Bauer. "Expected passes." Data Mining and Knowledge Discovery 36, no. 1 (January 2022): 295–317. http://dx.doi.org/10.1007/s10618-021-00810-3.

Full text
Abstract:
AbstractPasses are by far football’s (soccer) most frequent event, yet surprisingly little meaningful research has been devoted to quantify them. With the increase in availability of so-called positional data, describing the positioning of players and ball at every moment of the game, our work aims to determine the difficulty of every pass by calculating its success probability based on its surrounding circumstances. As most experts will agree, not all passes are of equal difficulty, however, most traditional metrics count them as such. With our work we can quantify how well players can execute passes, assess their risk profile, and even compute completion probabilities for hypothetical passes by combining physical and machine learning models. Our model uses the first 0.4 seconds of a ball trajectory and the movement vectors of all players to predict the intended target of a pass with an accuracy of $$93.0\%$$ 93.0 % for successful and $$72.0\%$$ 72.0 % for unsuccessful passes much higher than any previously published work. Our extreme gradient boosting model can then quantify the likelihood of a successful pass completion towards the identified target with an area under the curve (AUC) of $$93.4\%$$ 93.4 % . Finally, we discuss several potential applications, like player scouting or evaluating pass decisions.
APA, Harvard, Vancouver, ISO, and other styles
5

El-Eskandarany, M. Sherif, Naser Ali, Mohammad Banyan, and Fahad Al-Ajmi. "Cold Gas-Dynamic Spray for Catalyzation of Plastically Deformed Mg-Strips with Ni Powder." Nanomaterials 11, no. 5 (April 29, 2021): 1169. http://dx.doi.org/10.3390/nano11051169.

Full text
Abstract:
Magnesium hydride (MgH2) has received significant attention due to its potential applications as solid-state hydrogen storage media for useful fuel cell applications. Even though MgH2 possesses several attractive hydrogen storage properties, it cannot be utilized in fuel cell applications due to its high thermal stability and poor hydrogen uptake/release kinetics. High-energy ball milling, and mechanically-induced cold-rolling processes are the most common techniques to introduce severe plastic deformation and lattice imperfection in the Mg/MgH2. Furthermore, using one or more catalytic agents is considered a practical solution to improve both the de-/rehydrogenation process of MgH2.These treatments are usually dedicated to enhance its hydrogen storage properties and deduce its thermal stability. However, catalyzation of Mg/MgH2 powders with a desired catalytic agent using ball milling process has shown some disadvantages due to the uncontrolled distribution of the agent particles in the MgH2 powder matrix. The present study has been undertaken to employ a cold gas-dynamic spray process for catalyzing the fresh surfaces of mechanically-induced cold-rolled Mg ribbons with Ni powder particles. The starting Mg-rods were firstly heat treated and forged 200 times before cold rolling for 300 passes. The as-treated ribbons were then catalyzed by Ni particles, using cold gas-dynamic spray process. In this catalyzation approach, the Ni particles were carried by a stream of Ar gas via a high-velocity jet at a supersonic velocity. Accordingly, the pelted Ni particles penetrated the Mg-substrate ribbons, and hence created numerous micropores into the Mg, allowed the Ni particles to form a homogeneous network of catalytic active sites in Mg substrate. As the number of coating time increased to three times, the Ni concentration increased (5.28 wt.%), and this led to significant enhancement of the Mg-hydrogen storage capacity, as well as improving the de-/rehydrogenation kinetics. This is evidenced by the high value of hydrogen storage capacity (6.1 wt.% hydrogen) and the fast gas uptake kinetics (5.1 min) under moderate pressure (10 bar) and temperature (200 °C). The fabricated nanocomposite MgH2/5.28 wt.% Ni strips have shown good dehydrogenation behavior, indicated by their capability to desorb 6.1 wt.% of hydrogen gas within 11 min at 200 °C under 200 mbar of hydrogen pressure. Moreover, this system possessed long cycle-life-time, which extended to 350 h with a minimal degradation in the storage and kinetics behavior.
APA, Harvard, Vancouver, ISO, and other styles
6

Liu, Wei, Zhen Liu, and Zhenjia Huang. "Artificial Intelligence Technology to Record the Number of Times the Ball Passes the Net in Tennis Matches." Wireless Communications and Mobile Computing 2022 (September 6, 2022): 1–11. http://dx.doi.org/10.1155/2022/7522725.

Full text
Abstract:
Tennis competition is one of sports events. The vigorous development of sports can promote people’s pursuit of sports spirit and promote social unity and stability. However, in the course of social modernization development, sports events also need to follow closely, and we can no longer rely on traditional tools to support the development of events, which is not conducive to the positive development of sports. Due to the problem that the number of times the ball crosses the net in the traditional tennis game is too backward and the error rate is high, this paper uses artificial intelligence technology to record the number of times the ball crosses the net in tennis games and introduces the Center Net target based on the diagnostic criteria and comprehensive evaluation of tennis nets. Detect and track tennis balls by target recognition, feature extraction, and other methods, and record the times of net passing. However, considering that abnormal behaviors will also occur in the process of tennis passing through the net, the density-based DBSCAN clustering algorithm is used to discriminate and record abnormal behaviors in tennis matches. In order to verify the detection performance of DBSCAN clustering algorithm and Center Net target detection, the video of tennis match was analyzed and compared by drone from the perspective of time and space. By recording the number of times the ball crosses the net during the tennis receiving, connecting and attacking, and stalemate phases, the performance of the two recording times is compared. R 2 are all higher than 0.94, and R values are 0.982 and 0.963, respectively, so the recall rate of DBSCAN clustering algorithm is 0.02 higher, which is better than Center Net target detection. Using artificial intelligence technology to record the number of times the ball crosses the net in tennis games can not only improve the scientificity and accuracy of the record but also promote the development of the sports industry.
APA, Harvard, Vancouver, ISO, and other styles
7

Panji Palguna, I. Gusti Agung Ngurah, and I. Made Widiartha. "Prediction Of The Number Of Tourists To Visit Bali Province Using Backpropagation Artificial Neural Network (Case Study: Data 1990-2016)." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 8, no. 3 (January 25, 2020): 243. http://dx.doi.org/10.24843/jlk.2020.v08.i03.p05.

Full text
Abstract:
Bali Island is the most popular tourist destination in Indonesia. The total number of foreign tourists visiting Indonesia through the entrance of Ngurah Rai Airport reached 40% as of October 2016, with the value of Bali's foreign exchange receipts for Indonesia from the tourism sector amounting to 70 Trillion Rupiah. Minister of Tourism (Menpar) Arief Yahya always uses the password "Bali" in promoting destinations throughout the world. Because in tourism, Bali is a gate that is passed by 40 percent of foreign tourists (tourists) to Indonesia. In support of more accurate decision making, the author makes a system of forecasting numbers of foreign tourists visiting Bali Province by taking a sample of Japan. Factors that are used as input to make predictions include the number of tourists visiting before, the population of the country of origin of foreign tourists, Gross Domestic Product, and the Relative Consumer Price Index of the countries of origin of foreign tourists. In this research, optimization of the activation function, hidden neuron, and learning rate parameters is performed. Forecasting results using the backpropagation method produce a pretty good accuracy with an accuracy of Mean Square Error = 0.0050558, and test data accuracy of MSE = 0.031695. ANN architecture in the training process is then used to calculate predictions of visits by foreign tourists in the testing process
APA, Harvard, Vancouver, ISO, and other styles
8

Muliarta, I. Nengah, I. Wayan Suanda, and Ni Luh Suriani. "Local Wisdom of Balinese People Managing Water in Tirta (Holy Water) Concept." AJARCDE | Asian Journal of Applied Research for Community Development and Empowerment 5, no. 3 (October 16, 2021): 28–31. http://dx.doi.org/10.29165/ajarcde.v5i3.76.

Full text
Abstract:
Water is a source of life on the surface of the earth because it becomes a necessity for every organism. The need for water continues to increase, but the availability of clean water continues to decrease. Efforts to preserve important water sources are made to meet current and future water needs. Hindus in Bali have long practiced water resources conservation and managing water quality through various forms of local wisdom. Local wisdom is passed down through generations of routine activities in daily life. Water as a gift because it gives life is placed as a holy one which is then referred to as holy water or tirta. The use of tirta in various ceremonial activities causes Hinduism in Bali to be often identified with tirta religion. For Balinese people, water is a symbol of Vishnu which is a manifestation of God as the preserver of world life. Positioning water as a sacred thing has the meaning of obligation to maintain the quality and quantity of water to be maintained. Positioning the water source as a sacred area is also a form of effort to protect the springs to avoid pollution. The ceremony of mendak tirta and mendak toya became a form of local wisdom on the procedures of water use and efficient use of water. The concept of nyegara-Gunung (sea-mountain) is one of the proofs that Balinese Hindus commit to maintaining the hydrological cycle, so that life is maintained.
APA, Harvard, Vancouver, ISO, and other styles
9

Tarayana, Andhara Ersa. "SKKL PERFORMANCE ANALYSIS OF SUBMARINE CABLE COMMUNICATION SYSTEM (SKKL) EDFA - SOA AMPLIFIER LINK JAVA – BALI USING OPTISYSTEM." Journal of Telecommunication, Electronics, and Control Engineering (JTECE) 3, no. 1 (July 17, 2021): 48–53. http://dx.doi.org/10.20895/jtece.v3i1.148.

Full text
Abstract:
The Submarine Cable Communication System (SKKL) is a communication backbone that is deployed under the sea that used to connect networks between islands and between countries. DWDM (Dense Wavelength Division Multiplexing) technology can support long distance communication. Repeater used to reduce the impact of loss, on the detector side the signal can be detected properly. EDFA (Erbium Doped Fiber Amplifier) and Semiconductor Optical Amplifier (SOA) amplifiers can minimize the impact of loss and increasing the gain of each amplifier. The EDFA (Erbium Doped Fiber Amplifier) is an optical amplifier that can work at a wavelength of 1550 nm which provides amplification for the input signal that passes through it which is doped with the element erbium (Er). SOA amplifier is an optical amplifier that utilizes cavity or room cavity to strengthen light. By using branching unit configuration and repeaterless, repeatered, and parallel in-line amplifier configuration and optical system software 7.0 with system reliability parameters such as Q-factor, Bit Error Rate, Power Receiver, and Signal to Noise Ratio with power variations (0 dBm, 2 dBm, 4 dBm, 6 dBm, 8 dBm) at a frequency of 100 GHz for 10 channels. The best result on the Q-Factor parameter is 15,928, the BER parameter is 5.87 x 10-057, the receiver power parameter is -10,319 dBm, and the SNR is 42,713 dB. In this research the best value obtained in the Parallel in-line configuration. So as the best average is in the Repeatered EDFA configuration.
APA, Harvard, Vancouver, ISO, and other styles
10

de Jong, Laura M. S., Paul B. Gastin, Lyndell Bruce, and Dan B. Dwyer. "Teamwork and performance in professional women's football: A network-based analysis." International Journal of Sports Science & Coaching, April 11, 2022, 174795412210923. http://dx.doi.org/10.1177/17479541221092355.

Full text
Abstract:
Analysis of the underlying tactics and teamwork in women's football is rare and it is unknown how professional women's teams cooperate to be successful. The aim of this study was to investigate teamwork using network analysis while comparing match-outcome, match-type, ladder halves and tournament phases, to determine whether teamwork is related to success. Ball transfer data in 694 matches from the 2015, 2016 and 2017/18 Football Association Women's Super League (FA WSL) seasons; 2016–2018 National Women's Football League (NWSL) seasons; 2013 and 2017 European Cups; and 2011 and 2013 World Cups were analysed. The network metrics: edge density, transitivity, mean distance, out degree centrality, closeness centrality, betweenness centrality and eigenvector centrality were calculated. Success was categorised in match outcomes, ladder halves, tournament phases and ladder positions. It was found that successful professional women's football teams are highly connected (p = 0.006), and the distribution of ball possession is centralised (p = 0.001). There is a tendency for key players to send out a high number of passes, but there is no dependency on these key players for the total ball flow within a team, which is a characteristic that may be unique to women's football. Differences in teamwork exist between single matches and full seasons or tournaments, with successful teams having more effective ball movement and successful passes over the course of a season or tournament (p < 0.001). Moreover, successful league teams have more players with connecting roles than tournament teams and match tactics should be adapted to this.
APA, Harvard, Vancouver, ISO, and other styles
11

Pacheco, Rui, João Ribeiro, Micael Couceiro, Keith Davids, Júlio Garganta, Inês Marques-Aleixo, Fábio Nakamura, Filipe Casanova, and Sixto González-Víllora. "Development of an innovative method for evaluating a network of collective defensive interactions in football." Proceedings of the Institution of Mechanical Engineers, Part P: Journal of Sports Engineering and Technology, December 14, 2022, 175433712211415. http://dx.doi.org/10.1177/17543371221141584.

Full text
Abstract:
Social network analysis (SNA) has been increasingly applied to performance analytics in team sports, seeking to better understand the dynamic properties of competitive interactions. Despite considerable potential to analyze individual (micro) and team (macro) behavioral patterns of play, there are important limitations that can undermine the potential applicability of SNA. One important limitation in existing research is the lack of network analyses of defensive interactions, curtailing understanding of the functionality and adaptability of teams during competitive performance. This study developed an innovative network method for assessing interactions between players in defensive phases of play in football. The networking method was evaluated using a small-sided and conditioned game (SSCG; GK+7v7+GK) of 20 min duration (two halves of 10 min each, interspersed by 5 min intervals of active recovery). The method traced interactions between groups of three players (effective defensive triangulations) as network nodes, weighted according to the number of passes performed by the attacking players. Results showed how this social network analysis method may provide researchers, coaches and performance analysts with relevant information regarding the functional properties of teams in the defensive phase of the game. For instance, coaches and performance analysts can evaluate the geometry of a team’s defense, with players engaged in effective triangular-shaped positioning, that allowed them to provide defensive cover and balance, to protect the goal and recover ball possession.
APA, Harvard, Vancouver, ISO, and other styles
12

Mattsson, Carolina E. S., and Frank W. Takes. "Trajectories through temporal networks." Applied Network Science 6, no. 1 (May 3, 2021). http://dx.doi.org/10.1007/s41109-021-00374-7.

Full text
Abstract:
AbstractWhat do football passes and financial transactions have in common? Both are networked walk processes that we can observe, where records take the form of timestamped events that move something tangible from one node to another. Here we propose an approach to analyze this type of data that extracts the actual trajectories taken by the tangible items involved. The main advantage of analyzing the resulting trajectories compared to using, e.g., existing temporal network analysis techniques, is that sequential, temporal, and domain-specific aspects of the process are respected and retained. As a result, the approach lets us produce contextually-relevant insights. Demonstrating the usefulness of this technique, we consider passing play within association football matches (an unweighted process) and e-money transacted within a mobile money system (a weighted process). Proponents and providers of mobile money care to know how these systems are used—using trajectory extraction we find that 73% of e-money was used for stand-alone tasks and only 21.7% of account holders built up substantial savings at some point during a 6-month period. Coaches of football teams and sports analysts are interested in strategies of play that are advantageous. Trajectory extraction allows us to replicate classic results from sports science on data from the 2018 FIFA World Cup. Moreover, we are able to distinguish teams that consistently exhibited complex, multi-player dynamics of play during the 2017–2018 club season using ball passing trajectories, coincidentally identifying the winners of the five most competitive first-tier domestic leagues in Europe.
APA, Harvard, Vancouver, ISO, and other styles
13

Peixoto, Diogo, Gibson Moreira Praça, Sarah Bredt, and Filipe Manuel Clemente. "Comparison of network processes between successful and unsuccessful offensive sequences in elite soccer." Human Movement 18, no. 5 (December 20, 2017). http://dx.doi.org/10.1515/humo-2017-0044.

Full text
Abstract:
AbstractPurpose. The study aimed to compare social network analysis (SNA) general measures and centrality levels of successful and unsuccessful offensive sequences performed by elite national teams in 64 matches of the FIFA World Cup 2014 tournament and to compare the level of centrality between playing positions. Methods. Adjacency matrices of passing sequences within an offensive unit were built and treated in a dedicated SNA software. Results. The main results indicated significantly lower values of total links and network density in successful sequences in comparison with unsuccessful ones in the teams that achieved the round of 8, semifinals, and the final. The comparisons between playing positions revealed that forwards showed the highest values of indegree centrality (balls received) and that midfielders presented the highest values of outdegree centrality (ball passed) in both successful and unsuccessful offensive units. Midfielders also exhibited the highest values of betweenness centrality (intermediation between teammates) in unsuccessful sequences and forwards in successful ones. Conclusions. Greater cooperation among teammates may not be determinant for successful sequences. Forwards are the prominent players to receive the ball and intermediate the passing sequence in offenses that end in a goal.
APA, Harvard, Vancouver, ISO, and other styles
14

Dick, Uwe, Daniel Link, and Ulf Brefeld. "Who can receive the pass? A computational model for quantifying availability in soccer." Data Mining and Knowledge Discovery, March 22, 2022. http://dx.doi.org/10.1007/s10618-022-00827-2.

Full text
Abstract:
AbstractThe paper presents a computational approach to Availability of soccer players. Availability is defined as the probability that a pass reaches the target player without being intercepted by opponents. Clearly, a computational model for this probability grounds on models for ball dynamics, player movements, and technical skills of the pass giver. Our approach aggregates these quantities for all possible passes to the target player to compute a single Availability value. Empirically, our approach outperforms state-of-the-art competitors using data from 58 professional soccer matches. Moreover, our experiments indicate that the model can even outperform soccer coaches in assessing the availability of soccer players from static images.
APA, Harvard, Vancouver, ISO, and other styles
15

Ibrahim, Yasmin. "Commodifying Terrorism." M/C Journal 10, no. 3 (June 1, 2007). http://dx.doi.org/10.5204/mcj.2665.

Full text
Abstract:
Introduction Figure 1 The counter-Terrorism advertising campaign of London’s Metropolitan Police commodifies some everyday items such as mobile phones, computers, passports and credit cards as having the potential to sustain terrorist activities. The process of ascribing cultural values and symbolic meanings to some everyday technical gadgets objectifies and situates Terrorism into the everyday life. The police, in urging people to look out for ‘the unusual’ in their normal day-to-day lives, juxtapose the everyday with the unusual, where day-to-day consumption, routines and flows of human activity can seemingly house insidious and atavistic elements. This again is reiterated in the Met police press release: Terrorists live within our communities making their plans whilst doing everything they can to blend in, and trying not to raise suspicions about their activities. (MPA Website) The commodification of Terrorism through uncommon and everyday objects situates Terrorism as a phenomenon which occupies a liminal space within the everyday. It resides, breathes and co-exists within the taken-for-granted routines and objects of ‘the everyday’ where it has the potential to explode and disrupt without warning. Since 9/11 and the 7/7 bombings Terrorism has been narrated through the disruption of mobility, whether in mid-air or in the deep recesses of the Underground. The resonant thread of disruption to human mobility evokes a powerful meta-narrative where acts of Terrorism can halt human agency amidst the backdrop of the metropolis, which is often a metaphor for speed and accelerated activities. If globalisation and the interconnected nature of the world are understood through discourses of risk, Terrorism bears the same footprint in urban spaces of modernity, narrating the vulnerability of the human condition in an inter-linked world where ideological struggles and resistance are manifested through inexplicable violence and destruction of lives, where the everyday is suspended to embrace the unexpected. As a consequence ambient fear “saturates the social spaces of everyday life” (Hubbard 2). The commodification of Terrorism through everyday items of consumption inevitably creates an intertextuality with real and media events, which constantly corrode the security of the metropolis. Paddy Scannell alludes to a doubling of place in our mediated world where “public events now occur simultaneously in two different places; the place of the event itself and that in which it is watched and heard. The media then vacillates between the two sites and creates experiences of simultaneity, liveness and immediacy” (qtd. in Moores 22). The doubling of place through media constructs a pervasive environment of risk and fear. Mark Danner (qtd. in Bauman 106) points out that the most powerful weapon of the 9/11 terrorists was that innocuous and “most American of technological creations: the television set” which provided a global platform to constantly replay and remember the dreadful scenes of the day, enabling the terrorist to appear invincible and to narrate fear as ubiquitous and omnipresent. Philip Abrams argues that ‘big events’ (such as 9/11 and 7/7) do make a difference in the social world for such events function as a transformative device between the past and future, forcing society to alter or transform its perspectives. David Altheide points out that since September 11 and the ensuing war on terror, a new discourse of Terrorism has emerged as a way of expressing how the world has changed and defining a state of constant alert through a media logic and format that shapes the nature of discourse itself. Consequently, the intensity and centralisation of surveillance in Western countries increased dramatically, placing the emphasis on expanding the forms of the already existing range of surveillance processes and practices that circumscribe and help shape our social existence (Lyon, Terrorism 2). Normalisation of Surveillance The role of technologies, particularly information and communication technologies (ICTs), and other infrastructures to unevenly distribute access to the goods and services necessary for modern life, while facilitating data collection on and control of the public, are significant characteristics of modernity (Reiman; Graham and Marvin; Monahan). The embedding of technological surveillance into spaces and infrastructures not only augment social control but also redefine data as a form of capital which can be shared between public and private sectors (Gandy, Data Mining; O’Harrow; Monahan). The scale, complexity and limitations of omnipresent and omnipotent surveillance, nevertheless, offer room for both subversion as well as new forms of domination and oppression (Marx). In surveillance studies, Foucault’s analysis is often heavily employed to explain lines of continuity and change between earlier forms of surveillance and data assemblage and contemporary forms in the shape of closed-circuit television (CCTV) and other surveillance modes (Dee). It establishes the need to discern patterns of power and normalisation and the subliminal or obvious cultural codes and categories that emerge through these arrangements (Fopp; Lyon, Electronic; Norris and Armstrong). In their study of CCTV surveillance, Norris and Armstrong (cf. in Dee) point out that when added to the daily minutiae of surveillance, CCTV cameras in public spaces, along with other camera surveillance in work places, capture human beings on a database constantly. The normalisation of surveillance, particularly with reference to CCTV, the popularisation of surveillance through television formats such as ‘Big Brother’ (Dee), and the expansion of online platforms to publish private images, has created a contradictory, complex and contested nature of spatial and power relationships in society. The UK, for example, has the most developed system of both urban and public space cameras in the world and this growth of camera surveillance and, as Lyon (Surveillance) points out, this has been achieved with very little, if any, public debate as to their benefits or otherwise. There may now be as many as 4.2 million CCTV cameras in Britain (cf. Lyon, Surveillance). That is one for every fourteen people and a person can be captured on over 300 cameras every day. An estimated £500m of public money has been invested in CCTV infrastructure over the last decade but, according to a Home Office study, CCTV schemes that have been assessed had little overall effect on crime levels (Wood and Ball). In spatial terms, these statistics reiterate Foucault’s emphasis on the power economy of the unseen gaze. Michel Foucault in analysing the links between power, information and surveillance inspired by Bentham’s idea of the Panopticon, indicated that it is possible to sanction or reward an individual through the act of surveillance without their knowledge (155). It is this unseen and unknown gaze of surveillance that is fundamental to the exercise of power. The design and arrangement of buildings can be engineered so that the “surveillance is permanent in its effects, even if it is discontinuous in its action” (Foucault 201). Lyon (Terrorism), in tracing the trajectory of surveillance studies, points out that much of surveillance literature has focused on understanding it as a centralised bureaucratic relationship between the powerful and the governed. Invisible forms of surveillance have also been viewed as a class weapon in some societies. With the advancements in and proliferation of surveillance technologies as well as convergence with other technologies, Lyon argues that it is no longer feasible to view surveillance as a linear or centralised process. In our contemporary globalised world, there is a need to reconcile the dialectical strands that mediate surveillance as a process. In acknowledging this, Giles Deleuze and Felix Guattari have constructed surveillance as a rhizome that defies linearity to appropriate a more convoluted and malleable form where the coding of bodies and data can be enmeshed to produce intricate power relationships and hierarchies within societies. Latour draws on the notion of assemblage by propounding that data is amalgamated from scattered centres of calculation where these can range from state and commercial institutions to scientific laboratories which scrutinise data to conceive governance and control strategies. Both the Latourian and Deleuzian ideas of surveillance highlight the disparate arrays of people, technologies and organisations that become connected to make “surveillance assemblages” in contrast to the static, unidirectional Panopticon metaphor (Ball, “Organization” 93). In a similar vein, Gandy (Panoptic) infers that it is misleading to assume that surveillance in practice is as complete and totalising as the Panoptic ideal type would have us believe. Co-optation of Millions The Metropolitan Police’s counter-Terrorism strategy seeks to co-opt millions where the corporeal body can complement the landscape of technological surveillance that already co-exists within modernity. In its press release, the role of civilian bodies in ensuring security of the city is stressed; Keeping Londoners safe from Terrorism is not a job solely for governments, security services or police. If we are to make London the safest major city in the world, we must mobilise against Terrorism not only the resources of the state, but also the active support of the millions of people who live and work in the capita. (MPA Website). Surveillance is increasingly simulated through the millions of corporeal entities where seeing in advance is the goal even before technology records and codes these images (William). Bodies understand and code risk and images through the cultural narratives which circulate in society. Compared to CCTV technology images, which require cultural and political interpretations and interventions, bodies as surveillance organisms implicitly code other bodies and activities. The travel bag in the Metropolitan Police poster reinforces the images of the 7/7 bombers and the renewed attempts to bomb the London Underground on the 21st of July. It reiterates the CCTV footage revealing images of the bombers wearing rucksacks. The image of the rucksack both embodies the everyday as well as the potential for evil in everyday objects. It also inevitably reproduces the cultural biases and prejudices where the rucksack is subliminally associated with a specific type of body. The rucksack in these terms is a laden image which symbolically captures the context and culture of risk discourses in society. The co-optation of the population as a surveillance entity also recasts new forms of social responsibility within the democratic polity, where privacy is increasingly mediated by the greater need to monitor, trace and record the activities of one another. Nikolas Rose, in discussing the increasing ‘responsibilisation’ of individuals in modern societies, describes the process in which the individual accepts responsibility for personal actions across a wide range of fields of social and economic activity as in the choice of diet, savings and pension arrangements, health care decisions and choices, home security measures and personal investment choices (qtd. in Dee). While surveillance in individualistic terms is often viewed as a threat to privacy, Rose argues that the state of ‘advanced liberalism’ within modernity and post-modernity requires considerable degrees of self-governance, regulation and surveillance whereby the individual is constructed both as a ‘new citizen’ and a key site of self management. By co-opting and recasting the role of the citizen in the age of Terrorism, the citizen to a degree accepts responsibility for both surveillance and security. In our sociological imagination the body is constructed both as lived as well as a social object. Erving Goffman uses the word ‘umwelt’ to stress that human embodiment is central to the constitution of the social world. Goffman defines ‘umwelt’ as “the region around an individual from which signs of alarm can come” and employs it to capture how people as social actors perceive and manage their settings when interacting in public places (252). Goffman’s ‘umwelt’ can be traced to Immanuel Kant’s idea that it is the a priori categories of space and time that make it possible for a subject to perceive a world (Umiker-Sebeok; qtd. in Ball, “Organization”). Anthony Giddens adapted the term Umwelt to refer to “a phenomenal world with which the individual is routinely ‘in touch’ in respect of potential dangers and alarms which then formed a core of (accomplished) normalcy with which individuals and groups surround themselves” (244). Benjamin Smith, in considering the body as an integral component of the link between our consciousness and our material world, observes that the body is continuously inscribed by culture. These inscriptions, he argues, encompass a wide range of cultural practices and will imply knowledge of a variety of social constructs. The inscribing of the body will produce cultural meanings as well as create forms of subjectivity while locating and situating the body within a cultural matrix (Smith). Drawing on Derrida’s work, Pugliese employs the term ‘Somatechnics’ to conceptualise the body as a culturally intelligible construct and to address the techniques in and through which the body is formed and transformed (qtd. in Osuri). These techniques can encompass signification systems such as race and gender and equally technologies which mediate our sense of reality. These technologies of thinking, seeing, hearing, signifying, visualising and positioning produce the very conditions for the cultural intelligibility of the body (Osuri). The body is then continuously inscribed and interpreted through mediated signifying systems. Similarly, Hayles, while not intending to impose a Cartesian dichotomy between the physical body and its cognitive presence, contends that the use and interactions with technology incorporate the body as a material entity but it also equally inscribes it by marking, recording and tracing its actions in various terrains. According to Gayatri Spivak (qtd. in Ball, “Organization”) new habits and experiences are embedded into the corporeal entity which then mediates its reactions and responses to the social world. This means one’s body is not completely one’s own and the presence of ideological forces or influences then inscribe the body with meanings, codes and cultural values. In our modern condition, the body and data are intimately and intricately bound. Outside the home, it is difficult for the body to avoid entering into relationships that produce electronic personal data (Stalder). According to Felix Stalder our physical bodies are shadowed by a ‘data body’ which follows the physical body of the consuming citizen and sometimes precedes it by constructing the individual through data (12). Before we arrive somewhere, we have already been measured and classified. Thus, upon arrival, the citizen will be treated according to the criteria ‘connected with the profile that represents us’ (Gandy, Panoptic; William). Following September 11, Lyon (Terrorism) reveals that surveillance data from a myriad of sources, such as supermarkets, motels, traffic control points, credit card transactions records and so on, was used to trace the activities of terrorists in the days and hours before their attacks, confirming that the body leaves data traces and trails. Surveillance works by abstracting bodies from places and splitting them into flows to be reassembled as virtual data-doubles, and in the process can replicate hierarchies and centralise power (Lyon, Terrorism). Mike Dee points out that the nature of surveillance taking place in modern societies is complex and far-reaching and in many ways insidious as surveillance needs to be situated within the broadest context of everyday human acts whether it is shopping with loyalty cards or paying utility bills. Physical vulnerability of the body becomes more complex in the time-space distanciated surveillance systems to which the body has become increasingly exposed. As such, each transaction – whether it be a phone call, credit card transaction, or Internet search – leaves a ‘data trail’ linkable to an individual person or place. Haggerty and Ericson, drawing from Deleuze and Guattari’s concept of the assemblage, describe the convergence and spread of data-gathering systems between different social domains and multiple levels (qtd. in Hier). They argue that the target of the generic ‘surveillance assemblage’ is the human body, which is broken into a series of data flows on which surveillance process is based. The thrust of the focus is the data individuals can yield and the categories to which they can contribute. These are then reapplied to the body. In this sense, surveillance is rhizomatic for it is diverse and connected to an underlying, invisible infrastructure which concerns interconnected technologies in multiple contexts (Ball, “Elements”). The co-opted body in the schema of counter-Terrorism enters a power arrangement where it constitutes both the unseen gaze as well as the data that will be implicated and captured in this arrangement. It is capable of producing surveillance data for those in power while creating new data through its transactions and movements in its everyday life. The body is unequivocally constructed through this data and is also entrapped by it in terms of representation and categorisation. The corporeal body is therefore part of the machinery of surveillance while being vulnerable to its discriminatory powers of categorisation and victimisation. As Hannah Arendt (qtd. in Bauman 91) had warned, “we terrestrial creatures bidding for cosmic significance will shortly be unable to comprehend and articulate the things we are capable of doing” Arendt’s caution conveys the complexity, vulnerability as well as the complicity of the human condition in the surveillance society. Equally it exemplifies how the corporeal body can be co-opted as a surveillance entity sustaining a new ‘banality’ (Arendt) in the machinery of surveillance. Social Consequences of Surveillance Lyon (Terrorism) observed that the events of 9/11 and 7/7 in the UK have inevitably become a prism through which aspects of social structure and processes may be viewed. This prism helps to illuminate the already existing vast range of surveillance practices and processes that touch everyday life in so-called information societies. As Lyon (Terrorism) points out surveillance is always ambiguous and can encompass genuine benefits and plausible rationales as well as palpable disadvantages. There are elements of representation to consider in terms of how surveillance technologies can re-present data that are collected at source or gathered from another technological medium, and these representations bring different meanings and enable different interpretations of life and surveillance (Ball, “Elements”). As such surveillance needs to be viewed in a number of ways: practice, knowledge and protection from threat. As data can be manipulated and interpreted according to cultural values and norms it reflects the inevitability of power relations to forge its identity in a surveillance society. In this sense, Ball (“Elements”) concludes surveillance practices capture and create different versions of life as lived by surveilled subjects. She refers to actors within the surveilled domain as ‘intermediaries’, where meaning is inscribed, where technologies re-present information, where power/resistance operates, and where networks are bound together to sometimes distort as well as reiterate patterns of hegemony (“Elements” 93). While surveillance is often connected with technology, it does not however determine nor decide how we code or employ our data. New technologies rarely enter passive environments of total inequality for they become enmeshed in complex pre-existing power and value systems (Marx). With surveillance there is an emphasis on the classificatory powers in our contemporary world “as persons and groups are often risk-profiled in the commercial sphere which rates their social contributions and sorts them into systems” (Lyon, Terrorism 2). Lyon (Terrorism) contends that the surveillance society is one that is organised and structured using surveillance-based techniques recorded by technologies, on behalf of the organisations and governments that structure our society. This information is then sorted, sifted and categorised and used as a basis for decisions which affect our life chances (Wood and Ball). The emergence of pervasive, automated and discriminatory mechanisms for risk profiling and social categorising constitute a significant mechanism for reproducing and reinforcing social, economic and cultural divisions in information societies. Such automated categorisation, Lyon (Terrorism) warns, has consequences for everyone especially in face of the new anti-terror measures enacted after September 11. In tandem with this, Bauman points out that a few suicidal murderers on the loose will be quite enough to recycle thousands of innocents into the “usual suspects”. In no time, a few iniquitous individual choices will be reprocessed into the attributes of a “category”; a category easily recognisable by, for instance, a suspiciously dark skin or a suspiciously bulky rucksack* *the kind of object which CCTV cameras are designed to note and passers-by are told to be vigilant about. And passers-by are keen to oblige. Since the terrorist atrocities on the London Underground, the volume of incidents classified as “racist attacks” rose sharply around the country. (122; emphasis added) Bauman, drawing on Lyon, asserts that the understandable desire for security combined with the pressure to adopt different kind of systems “will create a culture of control that will colonise more areas of life with or without the consent of the citizen” (123). This means that the inhabitants of the urban space whether a citizen, worker or consumer who has no terrorist ambitions whatsoever will discover that their opportunities are more circumscribed by the subject positions or categories which are imposed on them. Bauman cautions that for some these categories may be extremely prejudicial, restricting them from consumer choices because of credit ratings, or more insidiously, relegating them to second-class status because of their colour or ethnic background (124). Joseph Pugliese, in linking visual regimes of racial profiling and the shooting of Jean Charles de Menezes in the aftermath of 7/7 bombings in London, suggests that the discursive relations of power and visuality are inextricably bound. Pugliese argues that racial profiling creates a regime of visuality which fundamentally inscribes our physiology of perceptions with stereotypical images. He applies this analogy to Menzes running down the platform in which the retina transforms him into the “hallucinogenic figure of an Asian Terrorist” (Pugliese 8). With globalisation and the proliferation of ICTs, borders and boundaries are no longer sacrosanct and as such risks are managed by enacting ‘smart borders’ through new technologies, with huge databases behind the scenes processing information about individuals and their journeys through the profiling of body parts with, for example, iris scans (Wood and Ball 31). Such body profiling technologies are used to create watch lists of dangerous passengers or identity groups who might be of greater ‘risk’. The body in a surveillance society can be dissected into parts and profiled and coded through technology. These disparate codings of body parts can be assembled (or selectively omitted) to construct and represent whole bodies in our information society to ascertain risk. The selection and circulation of knowledge will also determine who gets slotted into the various categories that a surveillance society creates. Conclusion When the corporeal body is subsumed into a web of surveillance it often raises questions about the deterministic nature of technology. The question is a long-standing one in our modern consciousness. We are apprehensive about according technology too much power and yet it is implicated in the contemporary power relationships where it is suspended amidst human motive, agency and anxiety. The emergence of surveillance societies, the co-optation of bodies in surveillance schemas, as well as the construction of the body through data in everyday transactions, conveys both the vulnerabilities of the human condition as well as its complicity in maintaining the power arrangements in society. Bauman, in citing Jacques Ellul and Hannah Arendt, points out that we suffer a ‘moral lag’ in so far as technology and society are concerned, for often we ruminate on the consequences of our actions and motives only as afterthoughts without realising at this point of existence that the “actions we take are most commonly prompted by the resources (including technology) at our disposal” (91). References Abrams, Philip. Historical Sociology. Shepton Mallet, UK: Open Books, 1982. Altheide, David. “Consuming Terrorism.” Symbolic Interaction 27.3 (2004): 289-308. Arendt, Hannah. Eichmann in Jerusalem: A Report on the Banality of Evil. London: Faber & Faber, 1963. Bauman, Zygmunt. Liquid Fear. Cambridge, UK: Polity, 2006. Ball, Kristie. “Elements of Surveillance: A New Framework and Future Research Direction.” Information, Communication and Society 5.4 (2002): 573-90 ———. “Organization, Surveillance and the Body: Towards a Politics of Resistance.” Organization 12 (2005): 89-108. Dee, Mike. “The New Citizenship of the Risk and Surveillance Society – From a Citizenship of Hope to a Citizenship of Fear?” Paper Presented to the Social Change in the 21st Century Conference, Queensland University of Technology, Queensland, Australia, 22 Nov. 2002. 14 April 2007 http://eprints.qut.edu.au/archive/00005508/02/5508.pdf>. Deleuze, Gilles, and Felix Guattari. A Thousand Plateaus. Minneapolis: U of Minnesota P, 1987. Fopp, Rodney. “Increasing the Potential for Gaze, Surveillance and Normalization: The Transformation of an Australian Policy for People and Homeless.” Surveillance and Society 1.1 (2002): 48-65. Foucault, Michel. Discipline and Punish: The Birth of the Prison. London: Allen Lane, 1977. Giddens, Anthony. Modernity and Self-Identity. Self and Society in the Late Modern Age. Stanford: Stanford UP, 1991. Gandy, Oscar. The Panoptic Sort: A Political Economy of Personal Information. Boulder, CO: Westview, 1997. ———. “Data Mining and Surveillance in the Post 9/11 Environment.” The Intensification of Surveillance: Crime, Terrorism and War in the Information Age. Eds. Kristie Ball and Frank Webster. Sterling, VA: Pluto Press, 2003. Goffman, Erving. Relations in Public. Harmondsworth: Penguin, 1971. Graham, Stephen, and Simon Marvin. Splintering Urbanism: Networked Infrastructures, Technological Mobilities and the Urban Condition. New York: Routledge, 2001. Hier, Sean. “Probing Surveillance Assemblage: On the Dialectics of Surveillance Practices as Process of Social Control.” Surveillance and Society 1.3 (2003): 399-411. Hayles, Katherine. How We Became Posthuman: Virtual Bodies in Cybernetics, Literature and Informatics. Chicago: U of Chicago P, 1999. Hubbard, Phil. “Fear and Loathing at the Multiplex: Everyday Anxiety in the Post-Industrial City.” Capital & Class 80 (2003). Latour, Bruno. Science in Action. Cambridge, Mass: Harvard UP, 1987 Lyon, David. The Electronic Eye – The Rise of Surveillance Society. Oxford: Polity Press, 1994. ———. “Terrorism and Surveillance: Security, Freedom and Justice after September 11 2001.” Privacy Lecture Series, Queens University, 12 Nov 2001. 16 April 2007 http://privacy.openflows.org/lyon_paper.html>. ———. “Surveillance Studies: Understanding Visibility, Mobility and the Phonetic Fix.” Surveillance and Society 1.1 (2002): 1-7. Metropolitan Police Authority (MPA). “Counter Terrorism: The London Debate.” Press Release. 21 June 2006. 18 April 2007 http://www.mpa.gov.uk.access/issues/comeng/Terrorism.htm>. Pugliese, Joseph. “Asymmetries of Terror: Visual Regimes of Racial Profiling and the Shooting of Jean Charles de Menezes in the Context of the War in Iraq.” Borderlands 5.1 (2006). 30 May 2007 http://www.borderlandsejournal.adelaide.edu.au/vol15no1_2006/ pugliese.htm>. Marx, Gary. “A Tack in the Shoe: Neutralizing and Resisting the New Surveillance.” Journal of Social Issues 59.2 (2003). 18 April 2007 http://web.mit.edu/gtmarx/www/tack.html>. Moores, Shaun. “Doubling of Place.” Mediaspace: Place Scale and Culture in a Media Age. Eds. Nick Couldry and Anna McCarthy. Routledge, London, 2004. Monahan, Teri, ed. Surveillance and Security: Technological Politics and Power in Everyday Life. Routledge: London, 2006. Norris, Clive, and Gary Armstrong. The Maximum Surveillance Society: The Rise of CCTV. Oxford: Berg, 1999. O’Harrow, Robert. No Place to Hide. New York: Free Press, 2005. Osuri, Goldie. “Media Necropower: Australian Media Reception and the Somatechnics of Mamdouh Habib.” Borderlands 5.1 (2006). 30 May 2007 http://www.borderlandsejournal.adelaide.edu.au/vol5no1_2006 osuri_necropower.htm>. Rose, Nikolas. “Government and Control.” British Journal of Criminology 40 (2000): 321–399. Scannell, Paddy. Radio, Television and Modern Life. Oxford: Blackwell, 1996. Smith, Benjamin. “In What Ways, and for What Reasons, Do We Inscribe Our Bodies?” 15 Nov. 1998. 30 May 2007 http:www.bmezine.com/ritual/981115/Whatways.html>. Stalder, Felix. “Privacy Is Not the Antidote to Surveillance.” Surveillance and Society 1.1 (2002): 120-124. Umiker-Sebeok, Jean. “Power and the Construction of Gendered Spaces.” Indiana University-Bloomington. 14 April 2007 http://www.slis.indiana.edu/faculty/umikerse/papers/power.html>. William, Bogard. The Simulation of Surveillance: Hypercontrol in Telematic Societies. Cambridge: Cambridge UP, 1996. Wood, Kristie, and David M. Ball, eds. “A Report on the Surveillance Society.” Surveillance Studies Network, UK, Sep. 2006. 14 April 2007 http://www.ico.gov.uk/upload/documents/library/data_protection/ practical_application/surveillance_society_full_report_2006.pdf>. Citation reference for this article MLA Style Ibrahim, Yasmin. "Commodifying Terrorism: Body, Surveillance and the Everyday." M/C Journal 10.3 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0706/05-ibrahim.php>. APA Style Ibrahim, Y. (Jun. 2007) "Commodifying Terrorism: Body, Surveillance and the Everyday," M/C Journal, 10(3). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0706/05-ibrahim.php>.
APA, Harvard, Vancouver, ISO, and other styles
16

Harrison, Karey. "Building Resilient Communities." M/C Journal 16, no. 5 (August 24, 2013). http://dx.doi.org/10.5204/mcj.716.

Full text
Abstract:
This paper will compare the metaphoric structuring of the ecological concept of resilience—with its roots in Holling's 1973 paper; with psychological concepts of resilience which followed from research—such as Werner, Bierman, and French and Garmezy and Streitman) published in the early 1970s. This metaphoric analysis will expose the difference between complex adaptive systems models of resilience in ecology and studies related to resilience in relation to climate change; compared with the individualism of linear equilibrium models of resilience which have dominated discussions of resilience in psychology and economics. By examining the ontological commitments of these competing metaphors, I will show that the individualistic concept of resilience which dominates psychological discussions of resilience is incompatible with the ontological commitments of ecological concepts of resilience. Because the ontological commitments of the concepts of ecological resilience on the one hand, and psychological resilience on the other, are so at odds with one another, it is important to be clear which concept of resilience is being evaluated for its adequacy as a concept. Having clearly distinguished these competing metaphors and their ontological commitments, this paper will show that it is the complex adaptive systems model of resilience from ecology, not the individualist concept of psychological resilience, that has been utilised by both the academic discussions of adaptation to climate change, and the operationalisation of the concept of resilience by social movements like the permaculture, ecovillage, and Transition Towns movements. Ontological Metaphors My analysis of ontological metaphors draws on insights from Kuhn's (114) account of gestalt perception in scientific paradigm shifts; the centrality of the role of concrete analogies in scientific reasoning (Masterman 77); and the theorisation of ontological metaphors in cognitive linguistics (Gärdenfors). Figure 1: Object Ontological commitments reflect the shared beliefs within a community about the sorts of things that exist. Our beliefs about what exists are shaped by our sensory and motor interactions with objects in the physical world. Physical objects have boundaries and surfaces that separate the object from not-the-object. Objects have insides and outsides, and can be described in terms of more-or-less fixed and stable “objective” properties. A prototypical example of an “object” is a “container”, like the example shown in Figure 1. Ontological metaphors allow us to conceive of “things” which are not objects as if they were objects by picking “out parts of our experience and treat them as [if they were] discrete entities or substances of a uniform kind” (Lakoff and Johnson 25). We use ontological metaphors when we imagine a boundary around a collection of things, such as the members of a team or trees in a forest, and conceive of them as being in a container (Langacker 191–97). We can then think of “things” like a team or forest as if they were a single entity. We can also understand processes and activities as if they were things with boundaries. Whether or not we characterise some aspect of our experience as a noun (a bounded entity) or as a verb (a process that occurs over time) is not determined by the nature of things in themselves, but by our understanding and interpretation of our experience (Langacker 233). In this paper I employ a technique that involves examining the details of “concrete images” from the source domains for metaphors employed in the social sciences to expose for analysis their ontological commitments (Harrison, “Politics” 215; Harrison, “Economics” 7). By examining the ontological metaphors that structure the resilience literature I will show how different conceptions of resilience reflect different beliefs and commitments about the sorts of “things” there are in the world, and hence how we can study and understand these “things.” Engineering Metaphors In his discussion of engineering resilience, Holling (“Engineering Vs. Ecological” 33) argues that this conception is the “foundation for economic theory”, and defined in terms of “resistance to disturbance and the speed of return to the equilibrium” or steady state of the system. Whereas Holling takes his original example of the use of the engineering concept of resilience from economics, Pendall, Foster, & Cowell (72), and Martin-Breen and Anderies (6) identify it as the concept of resilience that dominates the field of psychology. They take the stress loading of bridges to be the engineering source for the metaphor. Figure 2: Pogo stick animation (Source: Blacklemon 67, CC http://en.wikipedia.org/wiki/File:Pogoanim.gif). In order to understand this metaphor, we need to examine the characteristics of the source domain for the metaphor. A bridge can be “under tension, compression or both forces at the same time [and] experiences what engineers define as stress” (Matthews 3). In order to resist these forces, bridges need to be constructed of material which “behave much like a spring” that “strains elastically (deforms temporarily and returns to its original shape after a load has been removed) under a given stress” (Gordon 52; cited in Matthews). The pogostick shown in Figure 2 illustrates how a spring returns to its original size and configuration once the load or stress is removed. WGBH Educational Foundation provides links to simple diagrams that illustrate the different stresses the three main designs of bridges are subject to, and if you compare Computers & Engineering's with Gibbs and Bourne's harmonic spring animation you can see how both a bridge under live load and the pogostick in Figure 2 oscillate just like an harmonic spring. Subject to the elastic limits of the material, the deformation of a spring is proportional to the stress or load applied. According to the “modern theory of elasticity [...] it [is] possible to deduce the relation between strain and stress for complex objects in terms of intrinsic properties of the materials it is made of” (“Hooke’s Law”). When psychological resilience is characterised in terms of “properties of individuals [that] are identified in isolation” (Martin-Breen and Anderies 12); and in terms of “behaviours and attributes [of individuals] that allow people to get along with one another and to succeed socially” (Pendall, Foster, and Cowell 72), they are reflecting this engineering focus on the properties of materials. Martin-Breen and Anderies (42) argue that “the Engineering Resilience framework” has been informed by ontological metaphors which treat “an ecosystem, person, city, government, bridge, [or] society” as if it were an object—“a unified whole”. Because this concept of resilience treats individuals as “objects,” it leads researchers to look for the properties or characteristics of the “materials” which individuals are “made of”, which are either elastic and allow them to “bounce” or “spring” back after stress; or are fragile and brittle and break under load. Similarly, the Designers Institute (DINZ), in its conference on “Our brittle society,” shows it is following the engineering resilience approach when it conceives of a city or society as an object which is made of materials which are either “strong and flexible” or “brittle and fragile”. While Holling characterises economic theory in terms of this engineering metaphor, it is in fact chemistry and the kinetic theory of gases that provides the source domain for the ontological metaphor which structures both static and dynamic equilibrium models within neo-classical economics (Smith and Foley; Mirowski). However, while springs are usually made out of metals, they can be made out of any “material [that] has the required combination of rigidity and elasticity,” such as plastic, and even wood (in a bow) (“Spring (device)”). Gas under pressure turns out to behave the same as other springs or elastic materials do under load. Because both the economic metaphor based on equilibrium theory of gases and the engineering analysis of bridges under load can both be subsumed under spring theory, we can treat both the economic (gas) metaphor and the engineering (bridge) metaphor as minor variations of a single overarching (spring) metaphor. Complex Systems Metaphors Holling (“Resilience & Stability” 13–15) critiques equilibrium models, arguing that non-deterministic, complex, non-equilibrium and multi-equilibrium ecological systems do not satisfy the conditions for application of equilibrium models. Holling argues that unlike the single equilibrium modelled by engineering resilience, complex adaptive systems (CAS) may have multi or no equilibrium states, and be non-linear and non-deterministic. Walker and Salt follow Holling by calling for recognition of the “dynamic complexity of the real world” (8), and that “these [real world] systems are complex adaptive systems” (11). Martin-Breen and Anderies (7) identify the key difference between “systems” and “complex adaptive systems” resilience as adaptive capacity, which like Walker and Salt (xiii), they define as the capacity to maintain function, even if system structures change or fail. The “engineering” concept of resilience focuses on the (elastic) properties of materials and uses language associated with elastic springs. This “spring” metaphor emphasises the property of individual components. In contrast, ecological concepts of resilience examine interactions between elements, and the state of the system in a multi-dimensional phase space. This systems approach shows that the complex behaviour of a system depends at least as much on the relationships between elements. These relationships can lead to “emergent” properties which cannot be reduced to the properties of the parts of the system. To explain these relationships and connections, ecologists and climate scientists use language and images associated with landscapes such as 2-D cross-sections and 3-D topology (Holling, “Resilience & Stability” 20; Pendall, Foster, and Cowell 74). Figure 3 is based on an image used by Walker, Holling, Carpenter and Kinzig (fig. 1b) to represent possible states of ecological systems. The “basins” in the image rely on our understanding of gravitational forces operating in a 3-D space to model “equilibrium” states in which the system, like the “ball” in the “basin”, will tend to settle. Figure 3: (based on Langston; in Walker et al. fig. 1b) – Tipping Point Bifurcation Wasdell (“Feedback” fig. 4) adapted this image to represent possible climate states and explain the concept of “tipping points” in complex systems. I have added the red balls (a, b, and c to replace the one black ball (b) in the original which represented the state of the system), the red lines which indicate the path of the ball/system, and the black x-y axis, in order to discuss the image. Wasdell (“Feedback Dynamics” slide 22) takes the left basin to represents “the variable, near-equilibrium, but contained dynamics of the [current] glacial/interglacial period”. As a result of rising GHG levels, the climate system absorbs more energy (mostly as heat). This energy can force the system into a different, hotter, state, less amenable to life as we know it. This is shown in Figure 3 by the system (represented as the red ball a) rising up the left basin (point b). From the perspective of the gravitational representation in Figure 3, the extra energy in the basin operates like the rotation in a Gravitron amusement ride, where centrifugal force pushes riders up the sides of the ride. If there is enough energy added to the climate system it could rise up and jump over the ridge/tipping point separating the current climate state into the “hot earth” basin shown on the right. Once the system falls into the right basin, it may be stuck near point c, and due to reinforcing feedbacks have difficulty escaping this new “equilibrium” state. Figure 4 represents a 2-D cross-section of the 3-D landscape shown in Figure 3. This cross-section shows how rising temperature and greenhouse gas (GHG) concentrations in a multi-equilibrium climate topology can lead to the climate crossing a tipping point and shifting from state a to state c. Figure 4: Topographic cross-section of possible climate states (derived from Wasdell, “Feedback” 26 CC). As Holling (“Resilience & Stability”) warns, a less “desirable” state, such as population collapse or extinction, may be more “resilient”, in the engineering sense, than a more desirable state. Wasdell (“Feedback Dynamics” slide 22) warns that the climate forcing as a result of human induced GHG emissions is in fact pushing the system “far away from equilibrium, passed the tipping point, and into the hot-earth scenario”. In previous episodes of extreme radiative forcing in the past, this “disturbance has then been amplified by powerful feedback dynamics not active in the near-equilibrium state [… and] have typically resulted in the loss of about 90% of life on earth.” An essential element of system dynamics is the existence of (delayed) reinforcing and balancing causal feedback loops, such as the ones illustrated in Figure 5. Figure 5: Pre/Predator model (Bellinger CC-BY-SA) In the case of Figure 5, the feedback loops illustrate the relationship between rabbit population increasing, then foxes feeding on the rabbits, keeping the rabbit population within the carrying capacity of the ecosystem. Fox predation prevents rabbit over-population and consequent starvation of rabbits. The reciprocal interaction of the elements of a system leads to unpredictable nonlinearity in “even seemingly simple systems” (“System Dynamics”). The climate system is subject to both positive and negative feedback loops. If the area of ice cover increases, more heat is reflected back into space, creating a positive feedback loop, reinforcing cooling. Whereas, as the arctic ice melts, as it is doing at present (Barber), heat previously reflected back into space is absorbed by now exposed water, increasing the rate of warming. Where negative feedback (system damping) dominates, the cup-shaped equilibrium is stable and system behaviour returns to base when subject to disturbance. [...]The impact of extreme events, however, indicates limits to the stable equilibrium. At one point cooling feedback loops overwhelmed the homeostasis, precipitating the "snowball earth" effect. […] Massive release of CO2 as a result of major volcanic activity […] set off positive feedback loops, precipitating runaway global warming and eliminating most life forms at the end of the Permian period. (Wasdell, “Topological”) Martin-Breen and Anderies (53–54), following Walker and Salt, identify four key factors for systems (ecological) resilience in nonlinear, non-deterministic (complex adaptive) systems: regulatory (balancing) feedback mechanisms, where increase in one element is kept in check by another element; modularity, where failure in one part of the system will not cascade into total systems failure; functional redundancy, where more than one element performs every essential function; and, self-organising capacity, rather than central control ensures the system continues without the need for “leadership”. Transition Towns as a Resilience Movement The Transition Town (TT) movement draws on systems modelling of both climate change and of Limits to Growth (Meadows et al.). TT takes seriously Limits to Growth modelling that showed that without constraints in population and consumption the world faces systems collapse by the middle of this century. It recommends community action to build as much capacity as possible to “maintain existence of function”—Holling's (“Engineering vs. Ecological” 33) definition of ecological resilience—in the face of failing economic, political and environmental systems. The Transition Network provides a template for communities to follow to “rebuild resilience and reduce CO2 emissions”. Rob Hopkins, the movements founder, explicitly identifies ecological resilience as its central concept (Transition Handbook 6). The idea for the movement grew out of a project by (2nd year students) completed for Hopkins at the Kinsale Further Education College. According to Hopkins (“Kinsale”), this project was inspired by Holmgren’s Permaculture principles and Heinberg's book on adapting to life after peak oil. Permaculture (permanent agriculture) is a design system for creating agricultural systems modelled on the diversity, stability, and resilience of natural ecosystems (Mollison ix; Holmgren xix). Permaculture draws its scientific foundations from systems ecology (Holmgren xxv). Following CAS theory, Mollison (33) defines stability as “self-regulation”, rather than “climax” or a single equilibrium state, and recommends “diversity of beneficial functional connections” (32) rather than diversity of isolated elements. Permaculture understands resilience in the ecological, rather than the engineering sense. The Transition Handbook (17) “explores the issues of peak oil and climate change, and how when looked at together, we need to be focusing on the rebuilding of resilience as well as cutting carbon emissions. It argues that the focus of our lives will become increasingly local and small scale as we come to terms with the real implications of the energy crisis we are heading into.” The Transition Towns movement incorporate each of the four systems resilience factors, listed at the end of the previous section, into its template for building resilient communities (Hopkins, Transition Handbook 55–6). Many of its recommendations build “modularity” and “self-organising”, such as encouraging communities to build “local food systems, [and] local investment models”. Hopkins argues that in a “more localised system” feedback loops are tighter, and the “results of our actions are more obvious”. TT training exercises include awareness raising for sensitivity to networks of (actual or potential) ecological, social and economic relationships (Hopkins, Transition Handbook 60–1). TT promotes diversity of local production and economic activities in order to increase “diversity of functions” and “diversity of responses to challenges.” Heinberg (8) wrote the forward to the 2008 edition of the Transition Handbook, after speaking at a TotnesTransition Town meeting. Heinberg is now a senior fellow at the Post Carbon Institute (PCI), which was established in 2003 to “provide […] the resources needed to understand and respond to the interrelated economic, energy, environmental, and equity crises that define the 21st century [… in] a world of resilient communities and re-localized economies that thrive within ecological bounds” (PCI, “About”), of the sort envisioned by the Limits to Growth model discussed in the previous section. Given the overlapping goals of PCI and Transition Towns, it is not surprising that Rob Hopkins is now a Fellow of PCI and regular contributor to Resilience, and there are close ties between the two organisations. Resilience, which until 2012 was published as the Energy Bulletin, is run by the Post Carbon Institute (PCI). Like Transition Towns, Resilience aims to build “community resilience in a world of multiple emerging challenges: the decline of cheap energy, the depletion of critical resources like water, complex environmental crises like climate change and biodiversity loss, and the social and economic issues which are linked to these. […] It has [its] roots in systems theory” (PCI, “About Resilience”). Resilience.org says it follows the interpretation of Resilience Alliance (RA) Program Director Brian Walker and science writer David Salt's (xiii) ecological definition of resilience as “the capacity of a system to absorb disturbance and still retain its basic function and structure.“ Conclusion This paper has analysed the ontological metaphors structuring competing conceptions of resilience. The engineering resilience metaphor dominates in psychological resilience research, but is not adequate for understanding resilience in complex adaptive systems. Ecological resilience, on the other hand, dominates in environmental and climate change research, and is the model of resilience that has been incorporated into the global permaculture and Transition Towns movements. References 2nd year students. Kinsale 2021: An Energy Descent Action Plan. Kinsale, Cork, Ireland: Kinsale Further Education College, 2005. 16 Aug. 2013 ‹http://transitionculture.org/wp-content/uploads/KinsaleEnergyDescentActionPlan.pdf>. Barber, Elizabeth. “Arctic Ice Continues to Thin, and Thin, European Satellite Reveals.” Christian Science Monitor 11 Sep. 2013. 25 Sep. 2013 ‹http://www.csmonitor.com/Environment/2013/0911/Arctic-ice-continues-to-thin-and-thin-European-satellite-reveals>. Bellinger, Gene. “Prey/Predator Model.” SystemsWiki 23 Nov. 2009. 16 Aug. 2013 ‹http://systemswiki.org/index.php?title=Prey/Predator_Model>. Blacklemon67. "Pogo Animation." Wikipedia 2007. 24 Sep. 2013 ‹http://en.wikipedia.org/wiki/File:Pogoanim.gif>. Computers & Engineering. Bridge Trucks Animated Stress Plot 1. 2003. GIF file. SAP2000 Bridge Design. ‹http://www.comp-engineering.com/announce/bridge/demo/truck_1.gif>. DINZ. “Resilience Engineering: 'Our Brittle Society' - The Sustainability Society - May 18th 2012.” The Designers Institute. 2013. 11 Aug. 2013 ‹http://www.dinz.org.nz/Events/2012/May/47965>. Gärdenfors, Peter. “Cognitive Semantics and Image Schemas with Embodied Forces.” Embodiment in Cognition and Culture. Ed. John Michael Krois et al. John Benjamins Publishing, 2007. 57–76. 8 Nov. 2012 ‹http://oddelki.ff.uni-mb.si/filozofija/files/Festschrift/Dunjas_festschrift/gardenfors.pdf>. Garmezy, N, and S Streitman. “Children at Risk: The Search for the Antecedents of Schizophrenia. Part I. Conceptual Models and Research Methods.” Schizophrenia Bulletin 8 (1974): 14–90. NCBI PubMed 14 Aug. 2013 ‹http://schizophreniabulletin.oxfordjournals.org/content/1/8/14.full.pdf>. Gibbs, Keith, and John Bourne. “The Helical Spring.” Schoolphysics 2013. 15 Aug. 2013 ‹http://www.schoolphysics.co.uk/animations/Helical_spring_shm/index.html>. Gordon, James Edward. Structures: Or, Why Things Don’t Fall Down. London: Plenum Press, 1978. Harrison, Karey. “Image Schemas and Political Ontology.” Communication, Cognition and Media: Political and Economic Discourse. Ed. Augusto Soares da Silva et al. Portugal: Aletheia, forthcoming. ———. “Ontological Commitments of Ethics and Economics.” Economic Thought 2.1 (2013): 1–19. 23 Apr. 2013 ‹http://et.worldeconomicsassociation.org/article/view/64>. Heinberg, Richard. Powerdown: Options and Actions for a Post-carbon World. New Society Publishers, 2004. Holling, Crawford Stanley. “Engineering Resilience versus Ecological Resilience.” Engineering within Ecological Constraints. Ed. Peter Schulze. Washington, DC: National Academy Press, 1996. 31–44. 11 Aug. 2013 ‹http://www.nap.edu/openbook.php?record_id=4919&page=31>. ———. “Resilience and Stability of Ecological Systems.” Annual Review of Ecology and Systematics 4.1 (1973): 1–23. 11 Aug. 2013 ‹http://webarchive.iiasa.ac.at/Admin/PUB/Documents/RP-73-003.pdf>. Holmgren, David. Permaculture: Principles & Pathways beyond Sustainability. Holmgren Design Services, 2002. Hopkins, Rob. “Kinsale Energy Descent Action Plan (2005).” Transition Culture: an Evolving Exploration into the Head, Heart and Hands of Energy Descent. n.d. 16 Aug. 2013 ‹http://transitionculture.org/essential-info/pdf-downloads/kinsale-energy-descent-action-plan-2005/>. ———. The Transition Handbook: From Oil Dependency to Local Resilience. Green Books, 2008. Print. ———. The Transition Handbook: From Oil Dependency to Local Resilience. Free edit version. ‹http://www.appropedia.org/Category:The_Transition_Handbook: Appropedia.org> 2010. 16 Aug. 2010 ‹http://www.cs.toronto.edu/~sme/CSC2600/transition-handbook.pdf>. Kuhn, Thomas. The Structure of Scientific Revolutions. 2nd ed. University of Chicago Press, 1962. Lakoff, George, and Mark Johnson. Metaphors We Live By. University of Chicago Press, 1980. Langacker, Ronald W. Foundations of Cognitive Grammar: Theoretical Prerequisites. Vol. 1. Stanford University Press, 1987. Langston, Art. “Tipping Point” or Bifurcation Between Two Attractor Basins. 2004. 25 Sep. 2013. ‹http://www.ecologyandsociety.org/vol9/iss2/art5/figure1.html>. Martin-Breen, Patrick, and J. Marty Anderies. Resilience: A Literature Review. Rockefeller Foundation, 2011. 8 Aug. 2013 ‹http://www.rockefellerfoundation.org/blog/resilience-literature-review>. Masterman, Margaret. “The Nature of a Paradigm.” Criticism and the Growth of Knowledge. Eds. Imre Lakatos & Alan Musgrave. Cambridge University Press, 1970. 59–89. Matthews, Theresa. “The Physics of Bridges.” Yale-New Haven Teachers Institute. 2013. 14 Aug. 2013 ‹http://www.yale.edu/ynhti/curriculum/units/2001/5/01.05.08.x.html>. Meadows, Donella H. et al. The Limits to Growth: A Report for the Club of Rome’s Project on the Predicament of Mankind. Universe Books, 1972. Mirowski, Philip. “From Mandelbrot to Chaos in Economic Theory.” Southern Economic Journal 57.2 (1990): 289–307. Mollison, Bill. Permaculture: A Designers’ Manual. Tagari Publications, 1988. PCI. “About.” Post Carbon Institute. 16 July 2012. 16 Aug. 2013 ‹http://www.postcarbon.org/about/>. ———. “About Resilience.org.” Resilience 16 July 2012. 16 Aug. 2013 ‹http://www.resilience.org/about>. Pendall, Rolf, Kathryn A. Foster, and Margaret Cowell. “Resilience and Regions: Building Understanding of the Metaphor.” Cambridge Journal of Regions, Economy and Society 3.1 (2010): 71–84. 4 Aug. 2013 ‹http://cjres.oxfordjournals.org/content/3/1/71>. RA. “About RA.” Resilience Alliance 2013. 16 Aug. 2013 ‹http://www.resalliance.org/index.php/about_ra>. Smith, Eric, and Duncan K. Foley. “Classical Thermodynamics and Economic General Equilibrium Theory.” Journal of Economic Dynamics and Control 32.1 (2008): 7–65. Transition Network. “About Transition Network.” Transition Network. 2012. 16 Aug. 2013 ‹http://www.transitionnetwork.org/about>. Walker, B. H., and David Salt. Resilience Thinking: Sustaining Ecosystems and People in a Changing World. Island Press, 2006. Walker, Brian et al. “Resilience, Adaptability and Transformability in Social–Ecological Systems.” Ecology and Society 9.2 (2004): 5. Wasdell, David. “A Topological Approach.” The Feedback Crisis in Climate Change: The Meridian Report. n.d. 16 Aug. 2013 ‹http://www.meridian.org.uk/Resources/Global%20Dynamics/Feedback%20Crisis/frameset1.htm?p=3>. ———. “Beyond the Tipping Point: Positive Feedback and the Acceleration of Climate Change.” The Foundation for the Future, Humanity 3000 Workshop. Seattle, 2006. ‹http://www.meridian.org.uk/_PDFs/BeyondTippingPoint.pdf>. ———. “Feedback Dynamics and the Acceleration of Climate Change.” Winterthur, 2008. 16 Aug. 2013 ‹http://www.crisis-forum.org.uk/events/Workshop1/Workshop1_presentations/wasdellpictures/wasdell_clubofrome.php>. Werner, Emmy E., Jessie M. Bierman, and Fern E. French. The Children of Kauai: A Longitudinal Study from the Prenatal Period to Age Ten. University of Hawaii Press, 1971.WGBH. “Bridge Basics.” Building Big. 2001. 14 Aug. 2013 ‹http://www.pbs.org/wgbh/buildingbig/bridge/basics.html>. Wikipedia contributors. “Gravitron.” Wikipedia, the Free Encyclopedia 20 Sep. 2013. 25 Sep. 2013 ‹http://en.wikipedia.org/wiki/Gravitron>. ———. “Hooke’s Law.” Wikipedia, the Free Encyclopedia 8 Aug. 2013. 15 Aug. 2013 ‹http://en.wikipedia.org/wiki/Hooke%27s_law>. ———. “Spring (device).” Wikipedia, the Free Encyclopedia 9 Aug. 2013. 24 Sep. 2013 ‹http://en.wikipedia.org/wiki/Spring_(device)>. ———. “System Dynamics.” Wikipedia, the Free Encyclopedia 9 Aug. 2013. 13 Aug. 2013 ‹http://en.wikipedia.org/wiki/System_dynamics>.
APA, Harvard, Vancouver, ISO, and other styles
17

Kim, Rowan. "Mainstream Media’s Obsession with Africa." Voices in Bioethics 7 (April 14, 2021). http://dx.doi.org/10.52214/vib.v7i.8124.

Full text
Abstract:
Photo by Finding Dan | Dan Grinwis on Unsplash We who grew up texting, instant messaging, and emailing are blessed with native fluency in internet slang that varies according to country and language. Growing up in Sub-Saharan Africa, my schoolmates and I particularly loved to say TIA or, “This Is Africa.”[1] Largely popularized through the 2006 film, “Blood Diamond”,[2] TIA was the answer to all of the idiosyncrasies that accompanied living in the middle of the second-largest continent. Pulled over by local traffic police who demand a “cold drink”? TIA. Helped push the school bus out of a massive pothole during monsoon season? TIA. Reached for your Nokia brick only to pull a similarly sized cockroach from your purse? TIA. Largely isolated from the rest of the world, disease hysteria triggered by bird flu, SARS, and MERS passed by Sub-Saharan Africa as a far- off echo – my community was preoccupied with more imminent threats like malaria and cholera. The 2013 Ebola epidemic was the first time I was exposed to the narrow focus and broad indifference with which the wider world regards Africa. Mass hysteria over an “African disease” that threatened US shores exhibited narrow focus[3] while broad indifference manifested as radio silence following the resolution of cases in the US and Europe. The outbreak lasted until 2016 but coverage waned after 2015, when the only Ebola patients outside of Africa were expats shipped home for recovery.[4] As a freshman in college, my new British friends asked whether my family was at risk (they were not) and whether it was safe for me to go home for the holidays (it was). The 2013 outbreak primarily affected West Africa, on the opposite side of the continent. But to my college friends, Africa was a disease-ridden monolith. TIA, that is Africa. To the indifferent journalist, Africa is a convenient narrative device. By refusing to think of parts of Africa as anything other than the whole, we reduce a continent of 54 nations to a single entity – smaller and more manageable. The same occurred at the height of COVID-19 anxieties. As the healthcare systems of “more developed” countries threatened imminent collapse, a cry rattled across the globe: what will the Africans do?[5] Military-enforced lockdowns?[6] Will we have to take care of their citizens again?[7] While catching up with some friends in July 2020, I resisted an eyeroll as an acquaintance, grinning smugly, announced a new Ebola outbreak plaguing Congo.[8] (He probably meant DRC but he did not specify, and I am not sure he knew the difference.) A quick Google search confirmed the news, reported with glee in all major news media.[9] The Zoom call erupted in a flurry of sighs as my friends contemplated the new threat to US soil. Ever the party pooper, I emphasized that the outbreak was nothing new. The Ebola virus takes its name from its eponymous river in the DRC and the Congolese government had only just announced the end to a two-year struggle with Ebola in April.[10] Soon afterwards, the world lost interest; Al-Jazeera posted its last Ebola article on July 25.[11] Concurrently, coverage on ‘Africa’s COVID-19 crisis’ dwindled, eclipsed by worldwide #BLM protests, unrest in Belarus, and the US elections. As the attention on other world events settled, the “developed” world checked in with “poor, underdeveloped” Africa.[12] Despite concerns about cramped South African townships and the veracity of disease reports in Nigeria,[13] the number of COVID-19 cases and death rates in the continent have stayed low.[14] Citing a young population, existing contact-tracing infrastructure, and cross-immunity from other coronaviruses, several published articles analyze Africa’s mortality statistics.[15] Some, as pointed out by Ghanaian journalist, Karen Attiah, strive to paint the successes of African COVID-19 responses with stereotypical images of poverty and instability. After all, TIA. But while the world was not looking, African healthcare systems rallied. Wild poliovirus was completely eradicated from the continent in August.[16] Uganda began developing its own COVID-19 testing kits in May.[17] COVID-19 cases were limited to ten of Africa’s 54 countries while the DRC’s leading Ebola expert[18] reported that the new outbreak was under control.[19]Though there are still economic concerns due to reduced import-export activity between countries, Africa stands strong as second waves in Europe threaten to overrun hospitals.[20] A year from the beginning of the COVID-19 pandemic, the WHO shared concerns of a lack of justice and equality in global vaccine distribution.[21] Higher income countries have had enough stock to vaccinate one fourth of their population, on average, while low income countries are limited to around 1 in 500.[22] However, a headline in CBS News implies that the low vaccination rate in South Africa is due to a domestic class struggle between the rich and poor citizens,[23] rather than an issue of vaccine nationalism. There are some reporters in Western news media, like Peter Mwai who reports for the BBC, who portray African healthcare systems in a balanced way. Seeking out unbiased writers’ articles is the best way to ensure exposure to balanced news. However, this is an exercise that many readers overlook because they depend on headlines for information. The bias is systematic, and the reliability of a few reporters is outweighed by countless examples of careless copy editing. As evidenced by the CBS News clip, quick turnaround time for publishing live television broadcast clips online leads to sloppy research, injecting prejudices in news media. Perhaps it is too early to celebrate. But as Western media spotlights claims that Africa was spared due to herd immunity from previous coronaviruses blazing through poverty-stricken neighborhoods, it does not seem so bad to rebuff the stereotype.[24] The US currently leads in total COVID-19 cases, followed by India, Brazil, and France. South Africa does not even break the top ten. Morocco, next in line, resides comfortably at 32.[25] For the moment, we can be proud. Decades of experience building infrastructure around highly contagious diseases paid off. Many public health officials in African governments acknowledged and addressed COVID-19’s potential early. Aggressive lockdowns were effective in reducing community transmission. This is Africa. [1] Abdullah, Kia. “‘This Is Africa’: Useful Mantra or Ugly Prejudice?” Atlas &amp; Boots. Atlas &amp; Boots, December 24, 2019. https://www.atlasandboots.com/tia-this-is-africa/. [2] Blood Diamond. Blood Diamond Archer Meets Maggie (TIA) This Is Africa. United States: Warner Bros., 2006. https://www.youtube.com/watch?v=3frHm9hw5bI. [3] Lupkin, Sydney. “Ebola in America: Timeline of the Deadly Virus.” ABC News. ABC News Network, November 17, 2014. https://abcnews.go.com/Health/ebola-america-timeline/story?id=26159719. [4] BBC. “Ebola: Seventh British Health Worker Sent Home.” BBC News. BBC, March 16, 2015. https://www.bbc.com/news/health-31908301. [5] Nyenswah, Tolbert. “Africa Has a COVID-19 Time Bomb to Defuse.” World Economic Forum. World Economic Forum, April 6, 2020. https://www.weforum.org/agenda/2020/04/africa-covid-19-time-bomb-defuse/. [6] Noko, Karsten. “The Problem with Army Enforced Lockdowns in the Time of COVID-19.” Opinions | Al Jazeera. Al Jazeera, April 2, 2020. https://www.aljazeera.com/opinions/2020/4/2/the-problem-with-army-enforced-lockdowns-in-the-time-of-covid-19/. [7] Picheta, Rob. “Coronavirus Pandemic Will Cause Global Famines of 'Biblical Proportions,' UN Warns.” CNN. Cable News Network, April 22, 2020. https://www.cnn.com/2020/04/22/africa/coronavirus-famine-un-warning-intl/index.html. [8] WHO. “Ebola Virus Disease – Democratic Republic of the Congo.” World Health Organization. World Health Organization, July 9, 2020. https://www.who.int/csr/don/26-June-2020-ebola-drc/en/. [9] Fisher, Nicole. “New Ebola Outbreak In Congo Creates Unparalleled Challenges During A Pandemic.” Forbes. Forbes Magazine, August 10, 2020. https://www.forbes.com/sites/nicolefisher/2020/08/10/new-ebola-outbreak-in-congo-creates-unparalleled-challenges-during-a-pandemic/?sh=4f4a88015877.; BBC World Service. “Ebola Virus.” BBC News. BBC, July 17, 2020. https://www.bbc.com/news/topics/cjnwl8q4qj1t/ebola-virus.; Al Jazeera. “'Great Concern' as New Ebola Outbreak Grows in Western DR Congo.” Democratic Republic of the Congo | Al Jazeera. Al Jazeera, July 14, 2020. https://www.aljazeera.com/news/2020/7/14/great-concern-as-new-ebola-outbreak-grows-in-western-dr-congo. [10] Yeung, Peter. “'Enormous Relief' as Ebola Outbreak in DRC to Be Declared Over.” Democratic Republic of the Congo | Al Jazeera. Al Jazeera, April 10, 2020. https://www.aljazeera.com/news/2020/4/10/enormous-relief-as-ebola-outbreak-in-drc-to-be-declared-over. [11] Al Jazeera. “Western DRC Ebola Cases up to 60 as WHO Warns of Funeral Risks.” Democratic Republic of the Congo | Al Jazeera. Al Jazeera, July 20, 2020. https://www.aljazeera.com/news/2020/7/20/western-drc-ebola-cases-up-to-60-as-who-warns-of-funeral-risks. [12] Mobarak, Ahmed Mushfiq, and Rifaiyat Mahbub. “Opinion: What the US Can Learn from How African Countries Handled Covid.” CNN. Cable News Network, November 3, 2020. https://www.cnn.com/2020/11/03/africa/africa-coronavirus-lessons-opinion-intl/index.html.; Makoni, Munyaradzi. “The World Could Learn a Lot from How Africa Is Handling COVID-19.” WIRED UK. WIRED UK, November 2, 2020. https://www.wired.co.uk/article/COVID-19-africa. [13] McKenzie, David. “Africa's Battle against Covid-19 Will Be Won or Lost Here.” CNN. Cable News Network, July 6, 2020. https://www.cnn.com/2020/07/06/africa/western-cape-south-africa-coronavirus-epicenter-intl/index.html.; Peralta, Eyder. “Why Forecasters Can't Make Up Their Mind About Africa And The Coronavirus.” NPR. NPR, June 10, 2020. https://www.npr.org/sections/goatsandsoda/2020/06/10/872789379/why-forecasters-cant-make-up-their-mind-about-africa-and-the-coronavirus. [14] Mwai, Peter. “Coronavirus: What's Happening to the Numbers in Africa?” BBC News. BBC, November 5, 2020. https://www.bbc.com/news/world-africa-53181555. [15] Attiah, Karen. “Opinion | Africa Has Defied the Covid-19 Nightmare Scenarios. We Shouldn't Be Surprised.” The Washington Post. WP Company, September 22, 2020. https://www.washingtonpost.com/opinions/2020/09/22/africa-has-defied-covid-19-nightmare-scenarios-we-shouldnt-be-surprised/.; Lock, Helen. “The UK Has Seen More Deaths From COVID-19 Than the Whole of Africa. Here Are 6 Reasons Why.” Global Citizen. Global Citizen, November 4, 2020. https://www.globalcitizen.org/en/content/uk-more-deaths-covid-19-africa-reasons-why/.; Deutsche Welle. “COVID-19 in Africa: Milder-than-Expected Pandemic Has Experts Puzzled: DW: 14.09.2020.” DW.COM. Deutsche Welle, September 14, 2020. https://www.dw.com/en/covid-19-in-africa-milder-than-expected-pandemic-has-experts-puzzled/a-54918467.; Smith, Chris. “Scientists Can't Explain Puzzling Lack of Coronavirus Outbreaks in Africa.” New York Post. New York Post, September 7, 2020. https://nypost.com/2020/09/04/scientists-cant-explain-puzzling-lack-of-coronavirus-outbreaks-in-africa/?link=TD_mansionglobal_new_mansion_global.11147f181987fd93. [16] Scherbel-Ball, Naomi. “Africa Declared Free of Wild Polio in 'Milestone'.” BBC News. BBC, August 25, 2020. https://www.bbc.com/news/world-africa-53887947. [17] Achan, Jacky. “Dr. Wayengera: The Man behind Uganda's COVID-19 Testing Kits.” New Vision | Uganda News. New Vision, May 30, 2020. https://www.newvision.co.ug/news/1518668/dr-misaki-wayengera-uganda-covid-19-test-kits. [18] Mukwege, Denis. “Jean-Jacques Muyembe Tamfum Is on the 2020 TIME 100 List.” Time. Time, September 23, 2020. https://time.com/collection/100-most-influential-people-2020/5888331/jean-jacques-muyembe-tamfum/. [19] Mwai. “Coronavirus: What's Happening to the Numbers in Africa?” (2020); AFP. “DR Congo's Latest Ebola Outbreak 'under Control.” CGTN Africa. CGTN, October 18, 2020. https://africa.cgtn.com/2020/10/18/dr-congos-latest-ebola-outbreak-under-control/. [20] Dillon, Conor, and Gabriel Borrud. “Belgium's COVID-19 Health Care Collapse: 'It Will Happen in 10 Days': DW: 30.10.2020.” DW.COM. Deutsche Welle, October 30, 2020. https://www.dw.com/en/belgiums-covid-19-health-care-collapse-it-will-happen-in-10-days/a-55451750. [21] Mwai, Peter. “Covid-19 Africa: What Is Happening with Vaccines?” BBC News. BBC, April 8, 2021. https://www.bbc.com/news/56100076. [22] Miao, Hannah. “WHO Says More than 87% of the World's Covid Vaccine Supply Has Gone to Higher-Income Countries.” CNBC. CNBC, April 10, 2021. https://www.cnbc.com/2021/04/09/who-says-poor-countries-have-received-just-0point2percent-of-worlds-vaccine-supply.html. [23] Patta, Deborah. “Protests over ‘Shocking Imbalance’ of COVID Vaccine Distribution in South Africa.” CBS News. CBS Interactive, April 11, 2021. https://www.cbsnews.com/video/protests-over-shocking-imbalance-of-covid-vaccine-distribution-in-south-africa/#x. [24] Harding, Andrew. “Coronavirus in South Africa: Scientists Explore Surprise Theory for Low Death Rate.” BBC News. BBC, September 2, 2020. https://www.bbc.com/news/world-africa-53998374. [25] Worldometers.info. “Coronavirus Cases.” Worldometer. Worldometer, November 9, 2020. https://www.worldometers.info/coronavirus/.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography