To see the other types of publications on this topic, follow the link: ILLEGITIMATE SERVER.

Journal articles on the topic 'ILLEGITIMATE SERVER'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'ILLEGITIMATE SERVER.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Jan, Saeed Ullah, and Fawad Qayum. "A Robust Authentication Scheme for Client-Server Architecture With Provable Security Analysis." Network and Communication Technologies 3, no. 1 (April 26, 2018): 6. http://dx.doi.org/10.5539/nct.v3n1p6.

Full text
Abstract:
Client-server computing is the analytical development of compatible programming with significant supposition and the detachment of a massive program into its fundamental parts ("modules"), which can create the chance for extra enhancement, inconsiderable improvement, and prominent maintainability. In client-server computing, total extensive modules don't need to be accomplished within the similar memory space totally but can execute independently on a suitable hardware and software platform according to their behavior. The user authentication is the dominant constraint for client-server computing that limits the illegitimate right of entry into the main workstation. This research is mainly focused on the design of a robust authentication scheme for client-server architecture computing. It carries some additional features like security, virtualization, user's programs security, individuality supervision, integrity, control access to server and authentication. The proposed background also delivers the characteristic supervision, mutual authentication, and establishment of secure session key among users and the remote server.
APA, Harvard, Vancouver, ISO, and other styles
2

Razaque, Abdul, and Khaled Elleithy. "Controlling Attacks of Rogue Dynamic Host Configuration Protocol (DHCP) to Improve Pedagogical Activities in Mobile Collaborative Learning (MCL) Environment." Journal of Communications and Computer Engineering 3, no. 1 (October 13, 2012): 15. http://dx.doi.org/10.20454/jcce.2013.426.

Full text
Abstract:
Mobile collaborative learning (MCL) is extremely recognized as focusing archetype in educational institutions. It demonstrates cerebral synergy of assorted collective minds. It handles several problems in order to motivate social activity for mutual communication. To advance and promote baseline for MCL; several supporting frameworks, architectures including number of different mobile applications have been introduced. But, no one has mainly focused to augment the security of those architectures. The paper handles issues of rogue DHCP server that highly affects network resources during MCL. The rogue DHCP is illegal server that issues the fake IP address to users for sniffing the legal traffic. This contribution specially targets the malicuius attacks that weaken the security of mobile supported collaborative framework (MSCF). The paper introduces multi-frame signature-cum anomaly-based intrusion detection system (MSAIDS) that blocks an unlawful behavior of rogue DHCP server. This novel security method emphasize confidence of users and secures also network from illegitimate interference of rogue DHCP server. Finally, paper confirms scheme through simulations. The simulations comrises of testbed, ns2 and discrete simulation.
APA, Harvard, Vancouver, ISO, and other styles
3

Brindha, K., and N. Jeyanthi. "Secured Document Sharing Using Visual Cryptography in Cloud Data Storage." Cybernetics and Information Technologies 15, no. 4 (November 1, 2015): 111–23. http://dx.doi.org/10.1515/cait-2015-0058.

Full text
Abstract:
Abstract Security has emerged as the most concerned aspect of cloud computing environment and a prime challenge for the cloud users. The stored data can be retrieved by the user whenever and wherever required. But there is no guarantee that the data stored in the cloud server has not been accessed by any unauthorized user. The current cloud framework does not allow encrypted data to be stored due to the space and storage cost. Storing secret data in an unencrypted form is vulnerable to external attacks by both illegitimate customers and a Cloud Service Provider (CSP). Traditional encryption techniques require more computation and storage space. Hence, protecting cloud data with minimal computations is the prime task. Secured Document Sharing Using Visual Cryptography (SDSUVC) technique proposes an efficient storage scheme in a cloud for storing and retrieving a document file without any mathematical computations and also ensures data confidentiality and integrity.
APA, Harvard, Vancouver, ISO, and other styles
4

Chao, Han-Chieh, Hsin-Te Wu, and Fan-Hsun Tseng. "AIS Meets IoT: A Network Security Mechanism of Sustainable Marine Resource Based on Edge Computing." Sustainability 13, no. 6 (March 10, 2021): 3048. http://dx.doi.org/10.3390/su13063048.

Full text
Abstract:
The sustainable utilization of marine resources is a vital issue to enrich marine life and to prevent species extinction caused by overfishing. Nowadays, it is common that commercial and smaller vessels are equipped with an Automatic Identification System (AIS) and GPS for better vessel tracking to avoid vessel collision as well as mayday calls. Additionally, governments can monitor vessels’ sea activities through AIS messages, stopping them from overfishing or tracking if any vessel has caused marine pollution. However, because AIS devices cannot guarantee data security, they are susceptible to malicious attacks such as message modification or an illegitimate identity faking a distress signal that causes other vessels to change their course. Given the above, a comprehensive network security system of a sustainable marine environment should be proposed to ensure secure communication. In this paper, a stationary IoT-enabled (Internet of Things) vessel tracking system of a sustainable marine environment is proposed. The system combines network security, edge computing, and tracking management. It offers the following functions: (1) The IoT-based vessel tracking system tracks each aquafarmer’s farming zone and issues periodic warning to prevent vessel collision for pursuing a sustainable marine environment; (2) the system can serve as a relay station that evaluates whether a vessel’s AIS data is correct; (3) the system detects abnormal behavior and any irregular information to law enforcement; (4) the system’s network security mechanism adopts a group key approach to ensure secure communication between vessels; and (5) the proposed edge computing mechanism enables the tracking system to perform message authentication and analysis, and to reduce computational burden for the remote or cloud server. Experiment results indicate that our proposed system is feasible, secure, and sustainable for the marine environment, and the tendered network security mechanism can reduce the computational burden while still ensuring security.
APA, Harvard, Vancouver, ISO, and other styles
5

Haruna, Saibu Aliyu, Raphael Olufemi Akinyede, and Boyinbode Olutayo Kehinde. "NEURO-FUZZY DATA MINING SYSTEM FOR IDENTIFYING E-COMMERCE RELATED THREATS." MALAYSIAN JOURNAL OF COMPUTING 5, no. 2 (September 9, 2020): 537. http://dx.doi.org/10.24191/mjoc.v5i2.8642.

Full text
Abstract:
E-commerce is driven via Information Technology (IT) especially the web it mostly relies upon on innovative technologies that are facilitated by Electronic Data Interchange (EDI) and Electronic Payment over the web. Several researches have shown that e-commerce platforms are compromised by means of phishing and fraud attacks. This has necessitated trying to find innovative methodologies for defending e-commerce systems and users from the said threats. This research integrates Case Based Reasoning (CBR) and Adaptive Neuro-Fuzzy Inference System (ANFIS) to spot and categorise e-commerce websites transactions as legitimate or illegitimate by analyzing and evaluating some attributes. this may provide an invulnerable platforms for e-commerce users. The system, which was implemented on MATLAB, are often deployed on e-commerce systems and servers to watch e-commerce requests with the aim of identifying legitimate and illegitimate websites and transactions. The results of the implementation indicates that the machine is promising.
APA, Harvard, Vancouver, ISO, and other styles
6

Periyasamy, A. R. Pon. "Security Issues of Firewall." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (July 30, 2017): 455. http://dx.doi.org/10.23956/ijarcsse/v7i4/0208.

Full text
Abstract:
The need of Network Security is accelerating at the same pace as that of increased Internet usage. Network Security prevents from illegitimate admittance, hacking andauthentic data transportation. Network Security consist of provisions and policies adopted by a network administrator to preclude and monitor unauthorized access, alterations, perversion, declination of a computer network and network-accessible resources. Network Security is achieved by Firewall. Firewall is a hardware or software device which is designed to permit or refuse network transmissions based upon certain protocols. Firewall is a locus at the endpoints of the system which strains out all illegitimate traffic and users. But conventional or traditional firewalls rely stricly on the restricted topology and restrained entry points to function; which results in difficulty in filtering certain protocols, end-to-end encryption problem etc. Hence, it resulted in the evolution of Distributed Firewall which strengthens the network security policies without delimitating its topology from inside or outside. Distributed Firewall is a host-resident security software application that protects the enterprise network’s servers and end-user machines against unwanted intrusion. This paper is a literature review paper focusing on traditional firewalls, it evolution, security issues various policies and the concept of distributed firewall.
APA, Harvard, Vancouver, ISO, and other styles
7

Razaque, Abdul, Nazerke Shaldanbayeva, Bandar Alotaibi, Munif Alotaibi, Akhmetov Murat, and Aziz Alotaibi. "Big Data Handling Approach for Unauthorized Cloud Computing Access." Electronics 11, no. 1 (January 3, 2022): 137. http://dx.doi.org/10.3390/electronics11010137.

Full text
Abstract:
Nowadays, cloud computing is one of the important and rapidly growing services; its capabilities and applications have been extended to various areas of life. Cloud computing systems face many security issues, such as scalability, integrity, confidentiality, unauthorized access, etc. An illegitimate intruder may gain access to a sensitive cloud computing system and use the data for inappropriate purposes, which may lead to losses in business or system damage. This paper proposes a hybrid unauthorized data handling (HUDH) scheme for big data in cloud computing. The HUDH scheme aims to restrict illegitimate users from accessing the cloud and to provide data security provisions. The proposed HUDH consists of three steps: data encryption, data access, and intrusion detection. The HUDH scheme involves three algorithms: advanced encryption standards (AES) for encryption, attribute-based access control (ABAC) for data access control, and hybrid intrusion detection (HID) for unauthorized access detection. The proposed scheme is implemented using the Python and Java languages. The testing results demonstrated that the HUDH scheme can delegate computation overhead to powerful cloud servers. User confidentiality, access privilege, and user secret key accountability can be attained with more than 97% accuracy.
APA, Harvard, Vancouver, ISO, and other styles
8

Purwoleksono, Didik Endro. "THE APPLICABILITY OF ARTICLE 4 OF ANTI-CORRUPTION LAW AND THE THEORY OF TORT." Yuridika 34, no. 1 (January 1, 2019): 21. http://dx.doi.org/10.20473/ydk.v34i1.7552.

Full text
Abstract:
Article 4 of the Indonesian Corruption Law stipulates that the return of state financial losses does not eliminate the criminalization of the perpetrators of criminal acts as referred to in Article 2 and Article 3. What about the suspects or defendants who return the results of corruption related to the theory illegitimacy? There are two theories about the illegitimacy which are; the theory of illegitimacy against the formal law and the theory of illegitimacy against the material law. The theory of illegitimacy against the formal law, providing an understanding that an action, act, or activity is said to be against the law when against the rules set in the law. While through the Decision of the Supreme Court, Indonesia adheres to this theory. According to this theory, an action, act, or activity is said to be against the law when it is against the rules established in the law and according to the conditions is a disgraceful act or illegal. The decision of the Supreme Court provides the criteria for the loss of unlawful nature because of the factors of the state not being harmed, the society served and the defendant not making a profit. With the enactment of this theory, the existence of Article 4 of the Indonesian Corruption Law, becomes invalid with the condition that the results of corruption and its benefits have been returned by the perpetrators of corruption.
APA, Harvard, Vancouver, ISO, and other styles
9

Lewin, Linda. "Natural and Spurious Children in Brazilian Inheritance Law From Colony to Empire: A Methodological Essay." Americas 48, no. 3 (January 1992): 351–96. http://dx.doi.org/10.2307/1007241.

Full text
Abstract:
This discussion takes its historical cue from a piece of recent urban folk wisdom in Brazil, one claiming that children born outside wedlock historically have enjoyed equal inheritance rights with their legitimate half-siblings. This notion attained wide circulation in the final years of the great debate over divorce that ended in 1976. As the defenders of the status quo, opponents of divorce usually failed to point out that Brazilian succession law had historically distinguished not just between individuals of legitimate and illegitimate birth but also among those of illegitimate birth. Of course, most Brazilians, like most North Americans, remained unaware of the vast differences prevailing between their two legal systems of inheritance. They usually assumed that the legal precept contained in the Statute of Merton (1235) still served as a rule of thumb for the Anglo-American experience: “Once a bastard, always a bastard.” On the other hand, what appealed to Brazilians' sense of fairness was the flexibility their national system of succession offered. The notion that inheritance rights should be restricted to those of legitimate birth was one they proudly rejected. In leaving the door open to the possibility that civil law could equip those born to unmarried parents with the potential for equal inheritance rights with legitimate heirs, Brazil's system of succession provided that so-called bastardy could be converted into legitimacy.
APA, Harvard, Vancouver, ISO, and other styles
10

Boulton, S. J., and S. P. Jackson. "Saccharomyces cerevisiae Ku70 potentiates illegitimate DNA double-strand break repair and serves as a barrier to error-prone DNA repair pathways." EMBO Journal 15, no. 18 (September 1996): 5093–103. http://dx.doi.org/10.1002/j.1460-2075.1996.tb00890.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Kerr-Peterson, Miles. "Sir William Keith of Delny: courtier, ambassador and agent of noble power." Innes Review 67, no. 2 (November 2016): 138–58. http://dx.doi.org/10.3366/inr.2016.0124.

Full text
Abstract:
Sir William Keith of Delny was the illegitimate son of a Buchan laird, who rose through the young King James VI's chamber to become Master of the Wardrobe. He also served as ambassador for James to various countries, most remarkably in the failed mission to save Mary Queen of Scots from English execution. This article explores the nature of James's reliance on lesser men as courtiers, in his trust in individuals to deliver his sentiments and how his favour could be won, lost and regained. It also explores the same dynamics in the relationship between William and his kinsman superior, George Keith, fourth earl Marischal. William is shown to be one of Jacobean Scotland's great intermediaries, between earl and king, king and courtiers, king and foreign governments.
APA, Harvard, Vancouver, ISO, and other styles
12

Sung, Minkyu. "Surveillance and Anti-Communist Authoritarianism in South Korea." Surveillance & Society 15, no. 3/4 (August 9, 2017): 486–90. http://dx.doi.org/10.24908/ss.v15i3/4.6592.

Full text
Abstract:
In this essay, I argue that anti-communist authoritarianism has still survived into the 21st century South Korean public sphere, having been intensified in the idea of jongbuk. Jongbuk combines jong (to follow) and buk (North Korea) ideologically labeling people who are presumed to blindly follow, or be willfully serve North Korea’s totalitarian regime. People who are labeled jongbuk, pro-North Korea followers, are not only stigmatized and marginalized socially, but they are also subject to legal sanctions in their civic participation under the National Security Law. Especially under Park Geun-hye, daughter of military dictator and former President Park Chung-hee (1961-1979), I present how jongbuk has served as continued politicized commitments to national security and public safety used to justify the illegitimate and indiscriminate online surveillance and censorship of civilians and artists, as well as Park’s political opponents, to safeguard her regime.
APA, Harvard, Vancouver, ISO, and other styles
13

Hermann, Adrian. "A Call for a Permissible Plurality Within Theory-Building in a Time of Excess." Method & Theory in the Study of Religion 30, no. 4-5 (October 10, 2018): 487–97. http://dx.doi.org/10.1163/15700682-12341442.

Full text
Abstract:
Abstract Theory in a Time of Excess (Equinox 2017) serves as a useful starting point to argue for a plural understanding of theory in the study of religion. While the existing conversation often implies that there is only one acceptable way of theorizing, it seems useful to distinguish between (at least) three understandings of theory—and a fourth potentially “illegitimate” one. These four forms (discourse theories, creative theories, scientific theories, and essentialist theories) are all present in the volume. Different theoretical approaches can learn from each other and expose their respective blind spots, which is the main reason to further a meta-theoretical debate about a permissible plurality within theory-building. Rather than a call to “just get along” under one big tent, this critical attitude implies that we should strive to better profile all four of these forms of theorizing in order to discuss their potential place in our discipline.
APA, Harvard, Vancouver, ISO, and other styles
14

Arcadi, James M. "Analytic Theology as Declarative Theology." TheoLogica: An International Journal for Philosophy of Religion and Philosophical Theology 1, no. 1 (July 19, 2017): 37–52. http://dx.doi.org/10.14428/thl.v1i1.73.

Full text
Abstract:
Analytic theology seeks to utilize conceptual tools and resources from contemporary analytic philosophy for ends that are properly theological. As a theological methodology relatively new movement in the academic world, this novelty might render it illegitimate. However, I argue that there is much in the recent analytic theological literature that can find a methodological antecedent championed in the fourteenth century known as declarative theology. In distinction from deductive theology—which seeks to extend the conclusions of theology beyond the articles of faith—declarative theology strives to make arguments for the articles of faith. It does it not to provoke epistemic assent to the truth of the articles, but serves as a means of faith seeking understanding. In this paper, examples are drawn from recent analytic discussions to illustrate the manner that analytic theology has been, is, and can be an instance of declarative theology, and thus a legitimate theological enterprise for today.
APA, Harvard, Vancouver, ISO, and other styles
15

Hardecker, David J. K., Marco F. H. Schmidt, and Daniel B. M. Haun. "Developing a Coding System for Sulking Behavior in Young Children." SAGE Open 11, no. 3 (July 2021): 215824402110092. http://dx.doi.org/10.1177/21582440211009223.

Full text
Abstract:
Children’s sulking behavior is a salient yet understudied emotional phenomenon. It has been hypothesized to result from hurt feelings, humiliation, and anger, and might thus function as a nonverbal measure in the behavioral studies of these emotions. We conducted three studies that served to develop a comprehensive coding system for children’s sulking behavior. The first study explored sulking features in an online survey that used parental and teacher reports. In an event-based parental diary study, we reevaluated the importance of each feature based on its frequency across episodes of sulking behavior and analyzed the time course of sulking episodes. Finally, we analyzed YouTube videos and demonstrated that the coding system could be reliably applied. We also determined a minimal number of necessary features as a classification threshold. The resulting coding system includes the following features: becoming silent, distancing, turning away, gaze avoidance, crossing arms, lowering head, pouting lips, lowered eyebrows, and, probably, utterances of illegitimate devaluation, and relational distancing. Thus, all varieties of sulking seem to have withdrawal from an ongoing interaction in common.
APA, Harvard, Vancouver, ISO, and other styles
16

Goltermann, Svenja. "Medizin, Recht und das Wissen vom «zivilisierten» Krieg im langen 19. Jahrhundert." Gesnerus 72, no. 2 (November 11, 2015): 215–30. http://dx.doi.org/10.1163/22977953-07202002.

Full text
Abstract:
The aim to ‘civilize’ warfare accompanied Medicine and International Law ever since the mid-19th century. However, the entanglement of Medicine and Law, crucial for such an endeavour, has not been taken into consideration so far; likewise, the huge importance of medical knowledge for the perception of wars and their ramifications did not garner much attention in historical research. Hence, by focusing on the ‘long’ 19th century, this paper shows, firstly, that the production of surgical knowledge during warfare aimed at measuring the effects of combat on human bodies in order to develop prognostic medical knowledge for future wars, as well as maintaining the combat strength of soldiers. Moreover, this knowledge production during warfare strived for the enhancement of medical competence in the diagnosis and treatment of wounds in general. Secondly, I show that this medical knowledge was not only relevant for warfare, but also crucial for the design of International Law: it served to nourish the debates among the so called ‘civilized’ nations about legitimate and illegitimate weaponry and warfare.
APA, Harvard, Vancouver, ISO, and other styles
17

Cheung, Andrew K. "Palindrome Regeneration by Template Strand-Switching Mechanism at the Origin of DNA Replication of Porcine Circovirus via the Rolling-Circle Melting-Pot Replication Model." Journal of Virology 78, no. 17 (September 1, 2004): 9016–29. http://dx.doi.org/10.1128/jvi.78.17.9016-9029.2004.

Full text
Abstract:
ABSTRACT Palindromic sequences (inverted repeats) flanking the origin of DNA replication with the potential of forming single-stranded stem-loop cruciform structures have been reported to be essential for replication of the circular genomes of many prokaryotic and eukaryotic systems. In this study, mutant genomes of porcine circovirus with deletions in the origin-flanking palindrome and incapable of forming any cruciform structures invariably yielded progeny viruses containing longer and more stable palindromes. These results suggest that origin-flanking palindromes are essential for termination but not for initiation of DNA replication. Detection of template strand switching in the middle of an inverted repeat strand among the progeny viruses demonstrated that both the minus genome and a corresponding palindromic strand served as templates simultaneously during DNA biosynthesis and supports the recently proposed rolling-circle “melting-pot” replication model. The genome configuration presented by this model, a four-stranded tertiary structure, provides insights into the mechanisms of DNA replication, inverted repeat correction (or conversion), and illegitimate recombination of any circular DNA molecule with an origin-flanking palindrome.
APA, Harvard, Vancouver, ISO, and other styles
18

Lehnert, Sigrun. "Musik als Mittel der ›Propaganda‹ in der Filmberichterstattung 1950–1965 (West-Ost)." Kieler Beiträge zur Filmmusikforschung 17 (September 4, 2023): 31–60. http://dx.doi.org/10.59056/kbzf.2023.17.p31-60.

Full text
Abstract:
Although the newsreel was only shown as a part of the interludes in the cinemas and thus represented a marginal part of the cinema evening, the producers and state institutions were convinced of its effect. Under the National Socialists, the newsreel served purely as a propaganda tool and the background music was designed to achieve this effect. But agitation was not the concern of the post-war newsreel – also in consideration of the generation of the audience that still hear the intrusive dramatising sounds of the Nazi newsreel ›in their ears‹. In the post-war period, the message had to be conveyed more subtly. Music in perfect harmony with montage and commentary lent itself to underlining political convictions or criticism and conveying ironic allusions. Unmelodic phrases and ›off-key‹ tones were enough, for example, to suggest that an action was illegitimate. Music was not only used to accompany images, but also to document, for example, performances by international jazz greats in the socialist state of the GDR. With music, the Iron Curtain seemed to become ›permeable‹.
APA, Harvard, Vancouver, ISO, and other styles
19

Price, Richard. "A genealogy of the chemical weapons taboo." International Organization 49, no. 1 (1995): 73–103. http://dx.doi.org/10.1017/s0020818300001582.

Full text
Abstract:
How is it, that among the countless technological innovations in weaponry, chemical weapons stand out as weapons that carry the stigma of moral illegitimacy. To provide an adequate account of the prohibitionary norm against chemical weapons use, one must understand the meanings that have served to constitute and delegitimize this category of weapons. Such an account is provided by genealogy, a method that examines the interpretive practices around which moral orders are constructed and behaviors are defined as normal or unacceptable. The genealogical method yields insights that illuminate neglected dimensions of the chemical weapons taboo: namely, the roles that contingency, domination, and resistance have played in the operation of this norm as a symbol of “uncivilized” conduct in international relations.
APA, Harvard, Vancouver, ISO, and other styles
20

Salinda, Ma Theresa, Jocelyn Baluyot Hipona, Marivic Ilarde, and Alicia Tuazon. "A Concept Analysis on Culturally Congruent Care." Journal Of Nursing Practice 4, no. 2 (April 1, 2021): 167–76. http://dx.doi.org/10.30994/jnp.v4i2.132.

Full text
Abstract:
Background: Culturally Congruent is providing quality care that promote cultural competency. This include extreme humility and extreme openness and acceptance of different culture in beliefs, values, and discipline.Purpose: This study aims to provide quality patient care despite the challenges in the healthcare plans like misinformation, mistrust and misinterpretation. The nurse should provide quality health care that suit to patient culture.Methods: The method use is a case analysis. The eight steps of this method are: 1) Selecting a concept; 2) Determining the aims or purposes of analysis; 3) Identifying all uses of the concept; 4) Determining the defining attributes of the concept; 5) Constructing a model case; 6) Constructing borderline, contrary, invented, and illegitimate cases; 7) Identifying antecedents and consequences; and 8) Defining empirical references.Results: The theory of culture care emphasizes in the uniqueness of nursing as a means to know and help the culture in the field of clinical practice. Culturally based care factors are recognized as major influence upon human expressions related to health and illness. The theory also serves as guide to nurses’ thinking, practice and in research development.Conclusion: Integrating cultural competence models will promote effectiveness in nursing practice.
APA, Harvard, Vancouver, ISO, and other styles
21

Panitch, Vida. "Surrogate Tourism and Reproductive Rights." Hypatia 28, no. 2 (2013): 274–89. http://dx.doi.org/10.1111/hypa.12005.

Full text
Abstract:
Commercial surrogacy arrangements now cross borders; this paper aims to reevaluate the traditional moral concerns regarding the practice against the added ethical dimension of global injustice. I begin by considering the claim that global surrogacy serves to satisfy the positive reproductive rights of infertile first‐world women. I then go on to consider three powerful challenges to this claim. The first holds that commercial surrogacy involves the commodification of a good that should not be valued in market terms, the second that it involves the exploitation of the labor of disadvantaged women, and the third that it depends on the illegitimate privileging of positive rights over negative rights. I reject the first of these challenges and argue that global surrogacy arrangements are indeed exploitative on the dual basis of what I call intracontractual injustice and intercontractual coercion. The latter, I contend, depends on a preexisting negative rights violation, which cannot be permitted for the sake of satisfying another's positive reproductive entitlement. I conclude not in favor of a global ban but with suggestions on how developing nations that permit commercial surrogacy might better protect the negative reproductive rights of their female citizens, thereby making them less vulnerable to exploitation.
APA, Harvard, Vancouver, ISO, and other styles
22

Isles, Mike. "What's in a Word? Falsified/Counterfeit/Fake Medicines - The Definitions Debate." Medicine Access @ Point of Care 1 (January 2017): maapoc.0000008. http://dx.doi.org/10.5301/maapoc.0000008.

Full text
Abstract:
There is a rising tide of criminal activity to manufacture and distribute falsified, counterfeit, or fake medicines. The exact size of this problem is unknown but estimates vary from US$75 billion to US$200 billion per year, and evidence clearly demonstrates it is on the increase. Depending on the world region, infiltration into the legitimate supply chain versus the illegitimate (e.g., the internet) varies greatly. However, what is certain is that the direction of travel by regulatory agents is to develop supply chains that allow access to medicines via the World Wide Web. Within this context, there has been a long-running debate about how to correctly describe the various forms of medicines that are fraudulently or otherwise manufactured and distributed. This article attempts to describe the evolution of the definitions and recommends that a consensus be formed to describe such medicines that reach the public: • Falsified medicine: This being the term used and defined in the Falsified Medicines Directive and which is primarily concerned with public health. • Counterfeit medicine: This is closely associated and legally defined within intellectual property legislation and concentrates on trademark protection. • Fake medicine: This is the term that best serves to communicate with the public to raise awareness about the phenomenon.
APA, Harvard, Vancouver, ISO, and other styles
23

Foty, Cherine. "The Dangers of the Dissemination of Misinformation in Implementing the Responsibility to Protect." Journal of International Humanitarian Legal Studies 6, no. 1 (May 4, 2015): 87–117. http://dx.doi.org/10.1163/18781527-00601006.

Full text
Abstract:
The creation of the responsibility to protect doctrine reformulated the historical notion of humanitarian intervention. The new doctrine was centered around the principle of nonintervention, a basic precept of the u.n. Charter system, with its initial report explicitly excluding regime change disguised as humanitarian intervention as external to the scope of the doctrine. Military intervention was only to be the means of last resort after the exhaustion of several preliminary mechanisms. In its implementation, the broad mandate of the responsibility to protect has been harshly criticized because it opens the possibility for powerful States, often seeking regime change, to interfere in the domestic affairs of weaker States. This article will first discuss (i) the chronology and evolution of the doctrine, (ii) situating it in the context of the u.n. Charter prohibition on the use of force and articulating its nonbinding nature. It will then examine (iii) the cases of Libya and Syria, focusing on the initial decision to intervene and how the dissemination of misinformation has served to promote military interventions where they would otherwise be considered illegitimate. The article will conclude with a brief discussion of (iv) how the international community can move beyond misapplication and seek to limit its abuse.
APA, Harvard, Vancouver, ISO, and other styles
24

Moric, Anja. "Peter Klepec: from a (Local) Hero to a (National) Allegory of Weakness." Ars & Humanitas 9, no. 1 (April 30, 2015): 204–26. http://dx.doi.org/10.4312/ars.9.1.204-226.

Full text
Abstract:
The narrative hero Peter Klepec is known (and laid claim to) by the inhabitants of the Čabranka-Osilnica valley, the border area on the Croatian and Slovenian side of the border. There circulate a number of quite similar stories about him, in which a frail illegitimate child Peter becomes a strong man, whose supernatural powers help the needy and drive the enemies from these regions. This paper shows the changing role and diversity of interpretations of myth in time and space using the example of folk and literary hero Peter Klepec. It focuses on the historical changes in the perception of Peter Klepec: namely, on his (local) function at the time of the Hapsburg imperial policy, the process of his nationalisation and dilemmas that arose following the division of the Čabranka-Osilnica area, i.e., the originating area of the creation of the legend of the two countries (Croatia and Slovenia). It shows that Klepec was due to different historical circumstances and (interpretive) discourse used for different purposes. First, he served as a symbol of strength and survival in the Čabranka-Osilnica valley, and then as the Hapsburg myth that justified the existence of the monarchy facing the hostile Ottomans, and lastly as an allegory of a servile Slovene, who is always just a faithful bondsman to other masters (first under the Austro-Hungarians and then the European Union).
APA, Harvard, Vancouver, ISO, and other styles
25

O'Toole, Tess. "Adoption and the "Improvement of the Estate" in Trollope and Craik." Nineteenth-Century Literature 52, no. 1 (June 1, 1997): 58–79. http://dx.doi.org/10.2307/2934029.

Full text
Abstract:
Though the marriage plot is the most familiar vehicle in the Victorian novel for reconfiguring the family, the adoption plot is a prominent alternative version. This essay explores the intersection of comic adoption plots with the motif that Alistair Duck-worth has dubbed the "improvement of the estate." In the Victorian novel the variety of arrangements according to which children are transferred to households other than the one to which they are born reflects the fact that institutionalized adoption did not exist in Victorian England. An investment in traditonal patterns of property succession was one of the factors that delayed its advent. In the adoption plots of Dinah Craik's King Arthur: Not a Love Story and Trollope's Doctor Thorne, however, this concern is countered by a representation of adoption as the key to safeguarding or revitalizing the estate. Craik's novel makes a case for institutionalizing adoption by showing that it is the hero's adoption into a middle-class family that equips him to be the worthy steward of an ancestral estate. In Trollope's novel the salvation of the Greshamsbury estate hinges on the rescue of the illegitimate child, Mary, by the uncle who adopts her. Doctor Thorne suggests that adoption is the key to a social mobility that serves not just the individual but society at large.
APA, Harvard, Vancouver, ISO, and other styles
26

Moric, Anja. "Peter Klepec: from a (Local) Hero to a (National) Allegory of Weakness." Ars & Humanitas 9, no. 1 (April 30, 2015): 204–26. http://dx.doi.org/10.4312/ah.9.1.204-226.

Full text
Abstract:
The narrative hero Peter Klepec is known (and laid claim to) by the inhabitants of the Čabranka-Osilnica valley, the border area on the Croatian and Slovenian side of the border. There circulate a number of quite similar stories about him, in which a frail illegitimate child Peter becomes a strong man, whose supernatural powers help the needy and drive the enemies from these regions. This paper shows the changing role and diversity of interpretations of myth in time and space using the example of folk and literary hero Peter Klepec. It focuses on the historical changes in the perception of Peter Klepec: namely, on his (local) function at the time of the Hapsburg imperial policy, the process of his nationalisation and dilemmas that arose following the division of the Čabranka-Osilnica area, i.e., the originating area of the creation of the legend of the two countries (Croatia and Slovenia). It shows that Klepec was due to different historical circumstances and (interpretive) discourse used for different purposes. First, he served as a symbol of strength and survival in the Čabranka-Osilnica valley, and then as the Hapsburg myth that justified the existence of the monarchy facing the hostile Ottomans, and lastly as an allegory of a servile Slovene, who is always just a faithful bondsman to other masters (first under the Austro-Hungarians and then the European Union).
APA, Harvard, Vancouver, ISO, and other styles
27

GÜMPLOVÁ, PETRA. "Popular sovereignty over natural resources: A critical reappraisal of Leif Wenar’sBlood Oilfrom the perspective of international law and justice." Global Constitutionalism 7, no. 2 (June 11, 2018): 173–203. http://dx.doi.org/10.1017/s2045381718000114.

Full text
Abstract:
Abstract:The article discusses the concept of popular sovereignty over natural resources and its possible applicability to a broader account of natural resource justice based on a moral interpretation of international law. Leif Wenar’s recent proposal to entrench popular resource sovereignty as a counterclaim to illegitimate uses of natural resources by corrupt and authoritarian regimes serves as the starting point for the discussion of the possible meaning of popular resource sovereignty and its role in an account of natural resource justice. Three key aspects of Wenar’s conception are in focus: 1) the framing of popular resource sovereignty within the current system of sovereign territoriality, 2) the notion of collective ownership of natural resources as the content of popular resource sovereignty, and 3) civil and political rights as the key set of norms determining the conditions of legitimate exercise of resource sovereignty. The article argues that collective sovereignty claims over natural resources can neither be framed exclusively through boundaries of current sovereign states, nor understood in terms of full and unlimited property rights. Concerning civil and political rights, I argue we need to move past the liberal conception of legitimacy toward a more comprehensive human rights-based conception of justice serving as a standard for assessment of legitimacy of both sovereign and non-sovereign entities which have rights over natural resources.
APA, Harvard, Vancouver, ISO, and other styles
28

Nichols, Lizzy. "Becoming Indigenous Again." Environmental Humanities 14, no. 2 (July 1, 2022): 303–20. http://dx.doi.org/10.1215/22011919-9712390.

Full text
Abstract:
Abstract The figure of the “native informant,” as outlined by Spivak, confers a legitimacy of “inside” information for the colonial subject that, ultimately, is generalized to the point of confirming the colonist’s view of the world, challenging nothing and, instead, providing authenticity to existing beliefs. Since Indigenous groups are often associated with primordial nature in the hemispherically American context, there is a long tradition of settler colonial societies appropriating the figure of the Native to claim authentic land rights or establish an identity distinct from Europe. This article argues that, in its modern iteration, appropriation of the native informant within the natural context serves anxieties concerning potentially illegitimate land stewardship for settler colonial societies. Focusing on the native informant figure in Richard Powers’s Pulitzer Prize–winning novel The Overstory, the article explicates how, in the age of climate change, patterns around settler land theft are repeated and repurposed for the settler episteme in which, instead of reconsidering who has the rights to land stewardship, the settler seeks to transfer Indigenous knowledge to themselves, authenticating the settler society’s continued right to the colonized land. While Powers makes significant contributions to reconsidering the European model of an anthropocentric relation to nature, the article argues that The Overstory does this through repeating such settler colonial traditions as associating Indigenous peoples solely with the past and depicting the American landscape in a way that relies on the legal mythology of terra nullius.
APA, Harvard, Vancouver, ISO, and other styles
29

Duncan, Beatrice Akua. "Cocoa, Marriage, Labour and Land in Ghana: Some Matrilineal and Patrilineal Perspectives." Africa 80, no. 2 (May 2010): 301–21. http://dx.doi.org/10.3366/afr.2010.0206.

Full text
Abstract:
There is evidence to show that the institution of marriage, particularly customary law marriage, has served as an important framework for the extraction of conjugal labour as a factor in cocoa production since its introduction in the Gold Coast in 1879. This was necessitated by the abolition in 1874 of slavery and pawning, and the consequent need to replace an illegitimate and coercive system with a legitimate one. By virtue of a pre-existing customary obligation placed on women to assist their husbands in their economic pursuits, the marriage institution provided a basis for this transition. It has been argued, however, that some forms of economic relationship in Ghana revolve around expectations of reciprocity, and that human beings are not altogether altruistic in their dispensation of labour. Hence, women who provide labour support to their husbands expect to be rewarded with land or cocoa farms. In this article, I argue that the pivotal role of cocoa in the rural economy intensified the use of conjugal labour and the consequent expectation of land by wives from their husbands, resulting in a situation in which cocoa, marriage, labour and land rights eventually evolved as ‘institutional quadruplets’. Through case studies extracted from field work conducted in six communities in the Brong Ahafo, Western and Volta Regions of Ghana I demonstrate the continued interplay between these forces in modern times, and outline some policy-centred concerns for the future direction of the cocoa industry.
APA, Harvard, Vancouver, ISO, and other styles
30

Dreyer, Frederick. "A “Religious Society under Heaven”: John Wesley and the Identity of Methodism." Journal of British Studies 25, no. 1 (January 1986): 62–83. http://dx.doi.org/10.1086/385854.

Full text
Abstract:
Methodism figures as a kind of puzzle in the history of eighteenth-century England. Even writers who are not unsympathetic to John Wesley sometimes find his thought incoherent and confused. “The truth should be faced,” writes Frank Baker, “that Wesley (like most of us) was a bundle of contradictions.” Albert Outler celebrates Wesley's merits not as a thinker but as a popularizer of other men's doctrines. His Wesley was “by talent and intent, afolk-theologian: an eclectic who had mastered the secret of plastic synthesis, simple profundity, the common touch.” One man's eclecticism, however, is another man's humbug. The very qualities that Outler admires are those that E. P. Thompson condemns inThe Making of the English Working Class. Here Methodist theology is dismissed as “opportunist, anti-intellectual, and otiose.” Wesley “appears to have dispensed with the best and selected unhesitatingly the worst elements of Puritanism.” In doctrinal terms Methodism was not a plastic synthesis but “a mule.” What offends Thompson is not so much Wesley's incoherence as the social ambivalence of the movement that he had created. In class terms Methodism was, Thompson says, “hermaphroditic.” It attracted both masters and men. It catered to hostile social interests. It served a “dual role, as the religion of both the exploiters and the exploited.” The belief that Methodism is socially incomprehensible and perhaps in some sense socially illegitimate is not original with Thompson. Early statements of this assumption can be found in Richard Niebuhr'sThe Social Sources of Denominationalismand in John and Barbara Hammond's The Town Labourer.
APA, Harvard, Vancouver, ISO, and other styles
31

Swimelar, Safia. "Deploying images of enemy bodies: US image warfare and strategic narratives." Media, War & Conflict 11, no. 2 (May 1, 2017): 179–203. http://dx.doi.org/10.1177/1750635217700850.

Full text
Abstract:
This article investigates the practice of post 9/11 US image warfare through an analysis of three sets of enemy capture and killing: Uday and Qusay Hussein, Saddam Hussein, and Osama bin Laden. Specifically, the article examines these images in terms of their potential to support, complicate, and/or undermine the strategic narratives of the Bush and Obama administrations as they relate to the Iraq War and the killing of Osama bin Laden, respectively. Today’s new media ecology complicates the relationship between images and strategic narratives. The analysis finds that the capture and death images of the Hussein family primarily served to reinforce the Bush administration strategic system narratives of American dominance and hegemony, the illegitimacy and oppression of the Hussein regime, and of ‘justice’; however, the images can also be interpreted as complicating and potentially undermining these same narratives. The absence of Osama bin Laden death images supported the Obama administration’s counter strategic narratives that focused more on an American identity of restraint and rule of law. The ‘situation room’ photo that became the representative image of the Bin Laden killing also reinforced given strategic narratives by providing a more innocuous and legitimate way, albeit still violent, to communicate a story of American military power and justice.
APA, Harvard, Vancouver, ISO, and other styles
32

Squires, L. Ashley. "Humble Humbugs and Good Frauds: Harold Frederic, Christian Science, and the Anglo-American Professions." Nineteenth-Century Literature 73, no. 3 (December 1, 2018): 353–78. http://dx.doi.org/10.1525/ncl.2018.73.3.353.

Full text
Abstract:
L. Ashley Squires, “Humble Humbugs and Good Frauds: Harold Frederic, Christian Science, and the Anglo-American Professions” (pp. 353–378) In October 1898, American novelist Harold Frederic died of complications following a stroke while in the care of a Christian Scientist named Athalie Goodman Mills, summoned to his bedside by the author’s mistress, Kate Lyon. His death was later the subject of a coroner’s inquest and unsuccessful manslaughter charge, making the author’s death central to an already raging debate about the efforts of an ascendant medical profession to criminalize the activities of healers they saw as illegitimate. This essay reads the public controversy as represented in newspapers and medical journals alongside Frederic’s The Damnation of Theron Ware (1896), arguing that both texts demonstrate a widening epistemic gap between an ascendant class of experts and the broader public they served. In each, the concept of placebo emerges as a useful organizing metaphor for this tension. In the wake of cases like Frederic’s, many physicians began advocating for a broader use of “suggestive therapeutics” in response to the challenge that Christian Science presented, raising discomfiting epistemic and ethical questions because its use presumes a dissonance between what the doctor knows and what the patient believes. The ministers in The Damnation of Theron Ware likewise confront the problem of administering a kind of theological placebo, a primitive faith demanded by their congregants that the ministers themselves have come to doubt. Placebo therefore describes a way in which experts could assert their relevance and social necessity in the face of populist energies, exemplified in Christian Science, that challenged their rise to dominance.
APA, Harvard, Vancouver, ISO, and other styles
33

Sperling, Stefan. "The Politics of Transparency and Surveillance in Post-Reunification Germany." Surveillance & Society 8, no. 4 (March 24, 2011): 396–412. http://dx.doi.org/10.24908/ss.v8i4.4178.

Full text
Abstract:
After the fall of the Berlin Wall in 1989, reunified Germany intensified its policy of political transparency in an attempt to alleviate European concerns over a new German superpower. As transparency became a means to political legitimacy, the term and the practice acquired a distinctive ethical dimension. Germany’s on-going effort to come to terms with its national socialist past came to encompass the years of state socialism as well. As Germany’s new-found moral legitimacy came to rest on portraying East Germany as an immoral state, the former socialist state became an object that needed to be made fully transparent. The East German secret police (Stasi) and its vast surveillance apparatus became a natural target of transparency, as it inverted the logic of transparency by which the West German state claimed to function. As one form of transparency became key to legitimacy in Germany, its inversion – surveillance – became a marker of illegitimacy. In that sense, surveillance came to justify the unequal treatment of East Germans, of their political system, and of their public life. The conflict between divergent understandings of transparency became especially clear in a debate between two political figures, one from the former East and one from the former West. The case of German reunification serves to highlight the contingency of the meaning of the concepts of transparency, surveillance, and privacy.
APA, Harvard, Vancouver, ISO, and other styles
34

Šribar, Renata. "Intervention in Science Degradation: Understanding the Work of Stigma." Monitor ISH 19, no. 1 (October 9, 2017): 125–45. http://dx.doi.org/10.33700/1580-7118.19.1.125-145(2017).

Full text
Abstract:
The research paper begins by explaining the disciplinary surplus of a transformative approach to research, which aims at a minimalist intervention in the power relations of science. Methodologically, the paper combines self-positioning, auto-ethnographic notes, a critical analysis of power relations, semiotics, and critical discourse analysis. The main subject of its research, stigma and stigmatisation, is defined through the triad ‘freedom of expression – discrimination – protection against incitement to hatred’. The incitement to hatred, synonymous with hate speech, may be traced in stigmatisation, which serves as a tool of discrimination and exclusion. The starting-point of an argument urging the need for individual and collective responsibility for the lack of social bond (the lack which partly results from stigma as an element of hate speech) is a grasp of the role of political bipolarity. Another conceptualisation, important for the elaboration of this theme, is derived from classic liberal defence of freedom of expression, and thus of the human rights of women (John S. Mill and Harriet Taylor Mill). This defence is pitted against the ‘normal’, ‘mundane’. In Goffman’s reading of stigma, too, the ‘normal’ in socio-cultural life is perceived as destructive of human equality. In the field of modern scientific research, the opposite of the ‘normal’ is the stigma of conflict, that is, maladjustment. In some cases it is even actual or alleged political orientation that becomes a stigma, which points to the political marking of scientific hierarchies and to the formation of a sector margin. The paper concludes with a strategic option at the level of subjectivity: subjectivity may be processed by our adopting the stigma and by expressing the will to deconstruct the silence which permits an illegitimate exercise of power. In order to transform the mechanisms of scientific authorities, it is necessary to establish a functional instance for the enforcement of ethical science and research integrity.
APA, Harvard, Vancouver, ISO, and other styles
35

Anderson, Neil O., and Peter D. Ascher. "Male and Female Fertility of Loosestrife (Lythrum) Cultivars." Journal of the American Society for Horticultural Science 118, no. 6 (November 1993): 851–58. http://dx.doi.org/10.21273/jashs.118.6.851.

Full text
Abstract:
Male and female fertility, seed germination, and progeny fertility were used to determine cultivar fertility in species of Lythrum. One short-, 11 mid-, and six long-styled cultivars were included in this study. Duplicates of several cultivars from different nurseries and three unknown cultivars from Minnesota gardens were also collected. Plants from 17 Minnesota and one Wisconsin population of L. salicaria served as fertile male and/or female testers. Pollen stainability (usually 100%) showed low levels of male gamete abortion. Pollen size within and among anther type varied widely; possible 2n gametes were present in primarily the short- and mid-anther morphs. Seed production per capsule from legitimate cross-pollinations, using cultivars as male parents with Minnesota or Wisconsin female testers, averaged 48 ± 36 across style morphs. Cultivars differed as males, as did anther morphs. With female fertility tests, seed set per capsule ranged from zero to 152 and averaged 54 ± 40 in legitimate pollinations (i.e., pollinations between stamen and styles of the same length). Seed set for other crosses showed similar trends. Only `Morden Gleam' produced no seed with all legitimate pollinations, although illegitimate selfs or interspecific crosses produced seed. Seed from legitimate crosses of L. salicaria × cultivars had 30% to 100% germination. Common male and female parents within each legitimate crossing group were not significantly different. This study showed that the cultivars are highly fertile when used as male or female parents with wild purple loosestrife, native species (L. alatum Pursh.), or other cultivars. Thus, cultivars grown in gardens could serve as pollen or seed sources for the continued spread of purple loosestrife. The implications of cultivar fertility, especially interspecific F1 hybrids, is discussed in relation to the spread of noxious weeds in wetlands.
APA, Harvard, Vancouver, ISO, and other styles
36

Korobeynikov, Dmitry. "On the Byzantine-Mongol Marriages." ISTORIYA 13, no. 11 (121) (2022): 0. http://dx.doi.org/10.18254/s207987840023180-7.

Full text
Abstract:
The article focuses on the rapprochement between Byzantium and the Mongols from the 1250s which resulted in marriage alliances between Mongol Khans and Byzantine despoinas (princesses). The key issue is a clash of two different approaches. The Byzantine one was focused on the exclusive status of Byzantium as Christian Roman Empire, whose status was unrivalled and whose sovereigns seldom allowed marriages of Byzantine ladies to the foreign rulers, especially if the latter were heathen or Muslim. The Mongol view considered the Mongol state as the only one destined to dominate over other states. Here, the marriages between Mongol rulers and foreign brides have been suggested as one of vital elements of such domination. The compromise between two views seemed to have been made by the Byzantines: while the Byzantine church law refused to recognize interconfessional marriages, the Byzantines began to see these marriages as a Christian mission of sorts as the Greek brides and wives could have served as agents for spreading Greek Orthodox Christianity. Given the fact that some Khans had already converted to Islam prior to the marriage, these were also the first marriages between the Byzantine Imperial dynasty of the Palaiologoi and the Muslim rulers. It seems that special tolerance of the Mongols towards Christianity (even if they were Muslims) played a key role in the change of the principles of the Byzantine marriage policy: it henceforth became possible for the Emperor’s illegitimate daughter to marry a Muslim ruler. This policy affected the marriages of the later period of the fourteenth and fifteenth century between the imperial dynasties of the Palaiologoi and Grand Komnenoi, on the one hand, and the neighboring Turkish rulers, including the Ottomans, on the other.
APA, Harvard, Vancouver, ISO, and other styles
37

Aldoughli, Rahaf. "Romancing the Nation." Middle East Journal of Culture and Communication 15, no. 4 (November 8, 2022): 427–39. http://dx.doi.org/10.1163/18739865-01504007.

Full text
Abstract:
Abstract Spanning the era of the two Assads (father and son) up to 2007 (the referendum year confirming Bashar al-Assad’s continuation as president) and songs produced during the war, this study will explore the role of ‘love’ (hub) and its relation to ‘blood’ (dam) in the continuity and persistence of heroism in the national narrative. As a form of politics, love and blood have served the Baathist state in obtaining and using power and domination. This article investigates the various ways love as a political tool has been instrumentalized to legitimize the regime and construct national ties and unity. As such, this study interrogates the connection between the sacralization of the nation and the construction of love as a political and cultural tool to subject loyalty and subordination in political culture. Understanding discursive appropriations of love in this way offers a fresh perspective into the meaning—and most importantly, the politics—of love in modern Syria and its relation to Baathism, the Syrian uprising, and popular culture. In this context, the use of the term ‘love’ (hub) by the opposition has become a confirmatory tool of the regime’s illegitimacy. While ‘love’ as a political tool has been instrumentalized by the Syrian Baath regime to consolidate authority, the citizenry now faces many challenges. One of these is not only reversing this imposed ‘love’ with hate or anger towards the regime, but more importantly, rationalizing nationhood and national membership by focusing on establishing civic engagement and representation.
APA, Harvard, Vancouver, ISO, and other styles
38

Inyang, William Smart, Efiong Eme Joel, Ije Ubana Ubi, Eyo Itam Eyo, Oboh John Ogenyi, and Inyang Ochi Inyang. "Corporate Social Responsibility and Value of Industrial Goods Manufacturing Firms in Nigeria." International Journal of Professional Business Review 8, no. 5 (May 17, 2023): e01870. http://dx.doi.org/10.26668/businessreview/2023.v8i5.1870.

Full text
Abstract:
Purpose: The aim of this study is to determine how corporate social responsibility (CSR) practices can influence the corporate performances of listed firms in the industrial goods producing sector of Nigeria and other developing countries. Theoretical Framework: The enhancement of corporate value by CSR practices has become an interesting area of study for corporate managers and policy makers globally. The Stakeholder and Business Ethics theories have been used for this study. However, we anchor this research on the stakeholder theory which Edward Freeman propounded in 1984 and use it to evaluate the influence of CSR on corporate value. Design/methodology/approach: The study uses the causal comparative research design and we purposively select a sample of four industrial goods firms from Nigeria’s listed manufacturing enterprises as at 31st December, 2021 based on their social responsibility relationships with the society, employees and creditors. We collect 19 years secondary data from the website of the Nigerian Exchange Group and yearly financial reports of the industrial goods producing enterprises. These data have been analysed using the ordinary least squares panel data regression, fixed and random effects models, stationarity test, cross-section dependence test the Hausman test. Findings: The results show that corporate giving, employee welfare package and creditor days have significant positive effects on return on assets (a proxy of corporate performance) suggesting that the threat to profit-maximization is not caused by CSR but by illegitimate use of CSR by rent-seeking corporate managers. Research, Practical & Social implications: The study helps in filling the gap in literature and serves as basis for the economic and social development of Nigeria, developed and other developing countries through a more legitimate CSR investments in corporate giving, employee welfare package and creditor settlement days. Originality/value: The value of the study is that evidence of CSR success in the industrial goods manufacturing sector has for the first time been established using a time scope of 19 years and a firm-year-observations of 228. This study supports the claim that CSR is not a threat to profit maximization since it has a strong relationship with corporate value.
APA, Harvard, Vancouver, ISO, and other styles
39

Okpanyi, Vera, Christoph Bartenhagen, Michael Gombert, Sebastian Ginzel, Pina Fanny Ida Krell, Peter Husemann, Cai Chen, et al. "Novel Genomic Structural Variations in Relapsed Childhood ETV6/RUNX1 (TEL/AML1) Acute Lymphoblastic Leukemias Identified by Next Generation Sequencing." Blood 120, no. 21 (November 16, 2012): 518. http://dx.doi.org/10.1182/blood.v120.21.518.518.

Full text
Abstract:
Abstract Abstract 518 Introduction The chimeric fusion gene ETV6/RUNX1 generated by the interchromosomal translocation t(12;21) presents the most frequent chromosomal aberration in childhood acute lymphoblastic leukemia (ALL), occurring in approximately 25% of all patients. This ALL subtype is associated with an overall favorable prognosis, nevertheless 10–20% of children will suffer from relapse. ETV6/RUNX1-positive preleukemic clones arise already in utero, but require additional cooperating oncogenic lesions for the development of overt leukemia. The nature of the assisting genetic alterations and the mechanisms driving the development of leukemia and recurrent disease are still not well understood. Methods We applied state-of-the-art whole genome and whole exome next-generation-sequencing to comprehensively analyze the assisting oncogenic alterations in pediatric patients with initial and/or recurrent ETV6/RUNX1+ ALL (primary disease n=11, recurrent disease n=7). Matched sample sets taken at initial diagnosis, remission and relapse were compared. Mate pair and/or paired end sequencing was carried out for whole genome analysis with inserts spanning 2 kb or 500 kb, respectively. Constructed libraries were sequenced from both ends with 36- or 50-bp reads on a Genome Analyzer IIx or a HiSeq 2000 (Illumina/Solexa), respectively. Reads were aligned against the human reference genome (GRCh37) using BWA. Duplicate reads were removed. Unique reads with high mapping quality (q>35) served as input for GASV which detected translocations and inversions based on the mapping coordinates, insert sizes and read orientation. Variations covered by at least three reads in the tumor sample and not detected in the remission sample or the Database of Genomic Variants were reported. For detection of copy number variations, the program FREEC carried out coverage normalization, computation of copy number ratios between paired leukemia and remission samples (with up to 10 kb resolution) and subsequent segmentation. A subset of six selected patients was further investigated by targeted enrichment of whole exomic regions employing SeqCap EZ libraries (Roche) and 100 bp single read next-generation-sequencing on a HighSeq 2000. Mutations were called using GATK and further processed by an in-house bioinformatic pipeline. Putative somatically acquired mutations were validated by PCR, Sanger sequencing and FISH analysis. Results Genomes were sequenced to at least 13× physical coverage (mate pair) and 6.7× sequence coverage (paired-end). Exome sequencing achieved a minimum of 25× sequence coverage. In silico we detected 155 tumor-specific intragenic translocations. On average each tumor harbored 9 acquired translocations. With the exception of one case (13 translocations at diagnosis, 9 at relapse), the number of translocations was higher in relapse than in the matched diagnosis sample (additional 3 translocations on average). Ongoing validation studies confirmed the defining ETV6/RUNX1 translocation t(12;21) and identified 13 novel translocations. The genes affected are involved in essential signaling pathways, such as cytokine signaling (LIFR), calcium signaling (RCAN2), insulin and anti-apoptotic signaling (PHIP). Interestingly, also a factor essential for pre-mRNA splicing (IBP160) and genes encoding regulatory RNAs (miRNAs, lincRNAs and RNAs involved in splicing) were rearranged. A validated intragenic deletion of 836 bp leading to a frameshift and premature stop affected a calcium ion sensor of the ferlin protein family. Recurrent deletions in 9 of 11 cases (82%) ranging from 5 to 200 kb were detected in the immunoglobulin lambda variable gene cluster (IGLV) on chromosome 22q11. Some of the deletions were extending into the pre-B lymphocyte 1 gene (VPREB1) locus. In silico the probabilty of illegitimate RAG-mediated recombination at the breakpoint sites was determined by evaluation of RIC scores. RIC scores indicated that aberrant V(D)J rearrangements involving cryptic recombination sequence signals had caused the deletions on chromosome 22q11. Conclusion We present somatic mutations that are promising novel candicate genes (e.g. LIFR, RCAN2, PHIP, IBP160) for cooperating secondary mutations in ETV6/RUNX1+ ALL and discuss their impact on the molecular pathology of primary and recurrent disease. Disclosures: No relevant conflicts of interest to declare.
APA, Harvard, Vancouver, ISO, and other styles
40

"A Novel M-Commerce Data Security Mechanism using Elliptic Curve Cryptography." VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE 8, no. 10 (August 10, 2019): 847–51. http://dx.doi.org/10.35940/ijitee.j9039.0881019.

Full text
Abstract:
Cryptography is a mathematical science which permits only the authorized users to access the data. Today, it is necessary for our routine life to safeguard online data like credit card numbers, bank transactions, etc. Many cryptographic algorithm-based data security mechanisms have been introduced by various researchers for protecting the online / M-Commerce data. Even though, no data security algorithms achieved the required security level with less time. For overcoming these issues, we propose a new data security algorithm called Elliptic-Curve Cryptography and Diffie-Hellman based data security algorithm for securing the M-Commerce data. Here, the key size of the Elliptic Curve Cryptography is less than RSA that will be helpful to improve the efficiency and reduce the storage space. This algorithm is able to establish a secure session key through a server over an insecure channel and also handle various illegitimate users. In addition, this new algorithm is more secure, efficient and suitable for mobile commerce environments than existing data security algorithms. For evaluating the data security mechanism, many experiments conducted with M-Commerce data that are collected from the Internet which are freely available and also proved the efficiency of the data security algorithm.
APA, Harvard, Vancouver, ISO, and other styles
41

jain, Megha, Suresh Kaswan, and Dhiraj Pandey. "A Blockchain based Fund Management Scheme for Financial Transactions in NGOs." Recent Patents on Engineering 15 (June 15, 2021). http://dx.doi.org/10.2174/1872212115666210615155447.

Full text
Abstract:
: In the world of the latest technologies, the blockchain is one of the popular techniques for stopping fraudulent activities. Non-Government Organization (NGO) is increasingly being used to support all the needy people across the globe to shape the world’s responsibility towards society for sustainable development. The existing method of donating money and its monitoring is faced with a major corruption problem in several world-renowned NGOs. A blockchain can transform the way the current business of money transaction is being done in NGOs. The blockchain-based application works on the concept of a decentralized system. This article presents a blockchain-based transaction system to prevent corruption and money laundering in NGOs and government fundraising organizations. A Smart contract has been designed to stop any illegitimate block changes during a financial transaction. Since every node has a copy of the ledger, so it is very difficult to perform malicious activity. Furthermore, the donator can watch how the money flows in the different transactions, and everyone can browse the account history. An evaluative judgment, compared with various consensus algorithms, has also been presented along with their complex nature. The decentralized approach has eliminated the chance of a single point of failure, which in turn makes the system robust. The developed framework for the financial transaction using blockchain has been tested using the Rinkeby Test Network. The generators and campaign contracts have been developed and deployed in the Rinkeby testing network. The results indicate the computing to be much more secure and free from the scam in comparison to the traditional client-server financial transaction system. Finally, the proposed approach suggests scenarios such as in NGOs where the introduced security approach should prove to be adequate.
APA, Harvard, Vancouver, ISO, and other styles
42

Dean, Jon. "Informal Volunteering, Inequality, and Illegitimacy." Nonprofit and Voluntary Sector Quarterly, July 27, 2021, 089976402110345. http://dx.doi.org/10.1177/08997640211034580.

Full text
Abstract:
This article argues that informal volunteering (the unstructured giving of one’s time to help friends, neighbors, or community) has been ignored or understudied within research and policy. With data frequently showing higher rates of informal volunteering among women, people of color, working-class communities, and other often discriminated against groups and qualitative research demonstrating the value of informal volunteering within poorer communities, such positioning serves to reproduce dominant narratives around volunteering, reinforcing social inequalities. Using Bourdieusian critical theory from largely U.K.-based working-class feminist scholars, this article contributes to the nonprofit literature by showing how such a formulation adds to the legitimacy of middle-class cultures and delegitimizes working-class ones, especially at the current neoliberal conjuncture where volunteering experiences are encouraged to be used as a tool of distinction and employability. However, the article cautions against conceptualizing informal volunteering within existing formal volunteering frameworks, as doing so may further hollow out community life.
APA, Harvard, Vancouver, ISO, and other styles
43

Van Aarde, Andries. "Jesus' father: The quest for the historical Joseph." HTS Teologiese Studies / Theological Studies 54, no. 1/2 (January 11, 1998). http://dx.doi.org/10.4102/hts.v54i1/2.1410.

Full text
Abstract:
This article aims at demonstrating the historical probability that Joseph, the father of Jesus, should be regarded as a legendary figure. It seems that the Joseph figure is modeled after the patriarch in the First Testament. Here Joseph was exalted despite of slander. He married an 'impure' virgin. He became the adversary of Judah. His sons, bornin Egypt, were seen as the forefathers of the illegitimate Samaritans. He was regarded as an ethical paradigm. He served as the ideal type for God's beloved child. The search for the historical Joseph leads to the conclusion that Jesus grew up fatherless. This conclusion has enormous consequences for the quest for the historical Jesus.
APA, Harvard, Vancouver, ISO, and other styles
44

Lavers, Katie. "Cirque du Soleil and Its Roots in Illegitimate Circus." M/C Journal 17, no. 5 (October 25, 2014). http://dx.doi.org/10.5204/mcj.882.

Full text
Abstract:
IntroductionCirque du Soleil, the largest live entertainment company in the world, has eight standing shows in Las Vegas alone, KÀ, Love, Mystère, Zumanity, Believe, Michael Jackson ONE, Zarkana and O. Close to 150 million spectators have seen Cirque du Soleil shows since the company’s beginnings in 1984 and it is estimated that over 15 million spectators will see a Cirque du Soleil show in 2014 (Cirque du Soleil). The Cirque du Soleil concept of circus as a form of theatre, with simple, often archetypal, narrative arcs conveyed without words, virtuoso physicality with the circus artists presented as characters in a fictional world, cutting-edge lighting and visuals, extraordinary innovative staging, and the uptake of new technology for special effects can all be linked back to an early form of circus which is sometimes termed illegitimate circus. In the late 18th century and early 19th century, in the age of Romanticism, only two theatres in London, Covent Garden and Drury Lane, plus the summer theatre in the Haymarket, had royal patents allowing them to produce plays or text-based productions, and these were considered legitimate theatres. (These theatres retained this monopoly until the Theatre Regulation Act of 1843; Saxon 301.) Other circuses and theatres such as Astley’s Amphitheatre, which were precluded from performing text-based works by the terms of their licenses, have been termed illegitimate (Moody 1). Perversely, the effect of licensing venues in this way, instead of having the desired effect of enshrining some particular forms of expression and “casting all others beyond the cultural pale,” served instead to help to cultivate a different kind of theatrical landscape, “a theatrical terrain with a new, rich and varied dramatic ecology” (Reed 255). A fundamental change to the theatrical culture of London took place, and pivotal to “that transformation was the emergence of an illegitimate theatrical culture” (Moody 1) with circus at its heart. An innovative and different form of performance, a theatre of the body, featuring spectacle and athleticism emerged, with “a sensuous, spectacular aesthetic largely wordless except for the lyrics of songs” (Bratton 117).This writing sets out to explore some of the strong parallels between the aesthetic that emerged in this early illegitimate circus and the aesthetic of the Montreal-based, multi-billion dollar entertainment empire of Cirque du Soleil. Although it is not fighting against legal restrictions and can in no way be considered illegitimate, the circus of Cirque du Soleil can be seen to be the descendant of the early circus entrepreneurs and their illegitimate aesthetic which arose out of the desire to find ways to continue to attract audiences to their shows in spite of the restrictions of the licenses granted to them. BackgroundCircus has served as an inspiration for many innovatory theatre productions including Peter Brook’s Midsummer Night’s Dream (1970) and Tom Stoppard’s Jumpers (1972) as well as the earlier experiments of Meyerhold, Eisenstein, Mayakovsky and other Soviet directors of the 1920’s (Saxon 299). A. H. Saxon points out, however, that the relationship between circus and theatre is a long-standing one that begins in the late 18th century and the early 19th century, when circus itself was theatre (Saxon 299).Modern circus was founded in London in 1768 by an ex-cavalryman and his wife, Philip and Patty Astley, and consisted of spectacular stunt horse riding taking place in a ring, with acts from traditional fairs such as juggling, acrobatics, clowning and wire-walking inserted to cover the changeovers between riding acts. From the very first shows entry was by paid ticket only and the early history of circus was driven by innovative, risk-taking entrepreneurs such as Philip Astley, who indeed built so many new amphitheatres for his productions that he became known as Amphi-Philip (Jando). After years of legal tussles with the authorities concerning the legal status of this new entertainment, a limited license was finally granted in 1783 for Astley’s Amphitheatre. This license precluded the performing of plays, anything text-based, or anything which had a script that resembled a play. Instead the annual license granted allowed only for “public dancing and music” and “other public entertainments of like kind” (St. Leon 9).Corporeal Dramaturgy and TextIn the face of the ban on scripted text, illegitimate circus turned to the human body and privileged it as a means of dramatic expression. A resultant dramaturgy focusing on the expressive capabilities of the performers’ bodies emerged. “The primacy of rhetoric and the spoken word in legitimate drama gave way […] to a corporeal dramaturgy which privileged the galvanic, affective capacity of the human body as a vehicle of dramatic expression” (Moody 83). Moody proposes that the “iconography of illegitimacy participated in a broader cultural and scientific transformation in which the human body began to be understood as an eloquent compendium of visible signs” (83). Even though the company has the use of text and dramatic dialogue freely available to it, Cirque du Soleil, shares this investment in the bodies of the performers and their “galvanic, affective capacity” (83) to communicate with the audience directly without the use of a scripted text, and this remains a constant between the two forms of circus. Robert Lepage, the director of two Cirque du Soleil shows, KÀ (2004) and more recently Totem (2010), speaking about KÀ in 2004, said, “We wanted it to be an epic story told not with the use of words, but with the universal language of body movement” (Lepage cited in Fink).In accordance with David Graver’s system of classifying performers’ bodies, Cirque du Soleil’s productions most usually present performers’ ‘character bodies’ in which the performers are understood by spectators to be playing fictional roles or characters (Hurley n/p) and this was also the case with illegitimate circus which right from its very beginnings presented its performers within narratives in which the performers are understood to be playing characters. In Cirque du Soleil’s shows, as with illegitimate circus, this presentation of the performers’ character bodies is interspersed with acts “that emphasize the extraordinary training and physical skill of the performers, that is which draw attention to the ‘performer body’ but always within the context of an overall narrative” (Fricker n.p.).Insertion of Vital TextAfter audience feedback, text was eventually added into KÀ (2004) in the form of a pre-recorded prologue inserted to enable people to follow the narrative arc, and in the show Wintuk (2007) there are tales that are sung by Jim Comcoran (Leroux 126). Interestingly early illegitimate circus creators, in their efforts to circumvent the ban on using dramatic dialogue, often inserted text into their performances in similar ways to the methods Cirque du Soleil chose for KÀ and Wintuk. Illegitimate circus included dramatic recitatives accompanied by music to facilitate the following of the storyline (Moody 28) in the same way that Cirque du Soleil inserted a pre-recorded prologue to KÀ to enable audience members to understand the narrative. Performers in illegitimate circus often conveyed essential information to the audience as lyrics of songs (Bratton 117) in the same way that Jim Comcoran does in Wintuk. Dramaturgical StructuresAstley from his very first circus show in 1768 began to set his equestrian stunts within a narrative. Billy Button’s Ride to Brentford (1768), showed a tailor, a novice rider, mounting backwards, losing his belongings and being thrown off the horse when it bucks. The act ends with the tailor being chased around the ring by his horse (Schlicke 161). Early circus innovators, searching for dramaturgy for their shows drew on contemporary warfare, creating vivid physical enactments of contemporary battles. They also created a new dramatic form known as Hippodramas (literally ‘horse dramas’ from hippos the Attic Greek for Horse), a hybridization of melodrama and circus featuring the trick riding skills of the early circus pioneers. The narrative arcs chosen were often archetypal or sourced from well-known contemporary books or poems. As Moody writes, at the heart of many of these shows “lay an archetypal narrative of the villainous usurper finally defeated” (Moody 30).One of the first hippodramas, The Blood Red Knight, opened at Astley’s Amphitheatre in 1810.Presented in dumbshow, and interspersed with grand chivalric processions, the show featured Alphonso’s rescue of his wife Isabella from her imprisonment and forced marriage to the evil knight Sir Rowland and concluded with the spectacular, fiery destruction of the castle and Sir Rowland’s death. (Moody 69)Another later hippodrama, The Spectre Monarch and his Phantom Steed, or the Genii Horseman of the Air (1830) was set in China where the rightful prince was ousted by a Tartar usurper who entered into a pact with the Spectre Monarch and received,a magic ring, by aid of which his unlawful desires were instantly gratified. Virtue, predictably won out in the end, and the discomforted villain, in a final settling of accounts with his dread master was borne off through the air in a car of fire pursued by Daemon Horsemen above THE GREAT WALL OF CHINA. (Saxon 303)Karen Fricker writes of early Cirque du Soleil shows that “while plot is doubtless too strong a word, each of Cirque’s recent shows has a distinct concept or theme, that is urbanity for Saltimbanco; nomadism in Varekai (2002) and humanity’s clownish spirit for Corteo (2005), and tend to follow the same very basic storyline, which is not narrated in words but suggested by the staging that connects the individual acts” (Fricker n/p). Leroux describes the early Cirque du Soleil shows as following a “proverbial and well-worn ‘collective transformation trope’” (Leroux 122) whilst Peta Tait points out that the narrative arc of Cirque du Soleil “ might be summarized as an innocent protagonist, often female, helped by an older identity, seemingly male, to face a challenging journey or search for identity; more generally, old versus young” (Tait 128). However Leroux discerns an increasing interest in narrative devices such as action and plot in Cirque du Soleil’s Las Vegas productions (Leroux 122). Fricker points out that “with KÀ, what Cirque sought – and indeed found in Lepage’s staging – was to push this storytelling tendency further into full-fledged plot and character” (Fricker n/p). Telling a story without words, apart from the inserted prologue, means that the narrative arc of Kà is, however, very simple. A young prince and princess, twins in a mythical Far Eastern kingdom, are separated when a ceremonial occasion is interrupted by an attack by a tribe of enemy warriors. A variety of adventures follow, most involving perilous escapes from bad guys with flaming arrows and fierce-looking body tattoos. After many trials, a happy reunion arrives. (Isherwood)This increasing emphasis on developing a plot and a narrative arc positions Cirque as moving closer in dramaturgical aesthetic to illegitimate circus.Visual TechnologiesTo increase the visual excitement of its shows and compensate for the absence of spoken dialogue, illegitimate circus in the late 18th and early 19th century drew on contemporaneous and emerging visual technologies. Some of the new visual technologies that Astley’s used have been termed pre-cinematic, including the panorama (or diorama as it is sometimes called) and “the phantasmagoria and other visual machines… [which] expanded the means through which an audience could be addressed” (O’Quinn, Governance 312). The panorama or diorama ran in the same way that a film runs in an analogue camera, rolling between vertical rollers on either side of the stage. In Astley’s production The Siege and Storming of Seringapatam (1800) he used another effect almost equivalent to a modern day camera zoom-in by showing scenic back drops which, as they moved through time, progressively moved geographically closer to the battle. This meant that “the increasing enlargement of scale-each successive scene has a smaller geographic space-has a telescopic event. Although the size of the performance space remains constant, the spatial parameters of the spectacle become increasingly magnified” (O’Quinn, Governance 345). In KÀ, Robert Lepage experiments with “cinematographic stage storytelling on a very grand scale” (Fricker n.p.). A KÀ press release (2005) from Cirque du Soleil describes the show “as a cinematic journey of aerial adventure” (Cirque du Soleil). Cirque du Soleil worked with ground-breaking visual technologies in KÀ, developing an interactive projected set. This involves the performers controlling what happens to the projected environment in real time, with the projected scenery responding to their movements. The performers’ movements are tracked by an infra-red sensitive camera above the stage, and by computer software written by Interactive Production Designer Olger Förterer. “In essence, what we have is an intelligent set,” says Förterer. “And everything the audience sees is created by the computer” (Cirque du Soleil).Contemporary Technology Cutting edge technologies, many of which came directly from contemporaneous warfare, were introduced into the illegitimate circus performance space by Astley and his competitors. These included explosions using redfire, a new military explosive that combined “strontia, shellac and chlorate of potash, [which] produced […] spectacular flame effects” (Moody 28). Redfire was used for ‘blow-ups,’ the spectacular explosions often occurring at the end of the performance when the villain’s castle or hideout was destroyed. Cirque du Soleil is also drawing on contemporary military technology for performance projects. Sparked: A Live interaction between Humans and Quadcopters (2014) is a recent short film released by Cirque du Soleil, which features the theatrical use of drones. The new collaboration between Cirque du Soleil, ETH Zurich and Verity Studios uses 10 quadcopters disguised as animated lampshades which take to the air, “carrying out the kinds of complex synchronized dance manoeuvres we usually see from the circus' famed acrobats” (Huffington Post). This shows, as with early illegitimate circus, the quick theatrical uptake of contemporary technology originally developed for use in warfare.Innovative StagingArrighi writes that the performance space that Astley developed was a “completely new theatrical configuration that had not been seen in Western culture before… [and] included a circular ring (primarily for equestrian performance) and a raised theatre stage (for pantomime and burletta)” (177) joined together by ramps that were large enough and strong enough to allow horses to be ridden over them during performances. The stage at Astley’s Amphitheatre was said to be the largest in Europe measuring over 130 feet across. A proscenium arch was installed in 1818 which could be adjusted in full view of the audience with the stage opening changing anywhere in size from forty to sixty feet (Saxon 300). The staging evolved so that it had the capacity to be multi-level, involving “immense [moveable] platforms or floors, rising above each other, and extending the whole width of the stage” (Meisel 214). The ability to transform the stage by the use of draped and masked platforms which could be moved mechanically, proved central to the creation of the “new hybrid genre of swashbuckling melodramas on horseback, or ‘hippodramas’” (Kwint, Leisure 46). Foot soldiers and mounted cavalry would fight their way across the elaborate sets and the production would culminate with a big finale that usually featured a burning castle (Kwint, Legitimization 95). Cirque du Soleil’s investment in high-tech staging can be clearly seen in KÀ. Mark Swed writes that KÀ is, “the most lavish production in the history of Western theatre. It is surely the most technologically advanced” (Swed). With a production budget of $165 million (Swed), theatre designer Michael Fisher has replaced the conventional stage floor with two huge moveable performance platforms and five smaller platforms that appear to float above a gigantic pit descending 51 feet below floor level. One of the larger platforms is a tatami floor that moves backwards and forwards, the other platform is described by the New York Times as being the most thrilling performer in the show.The most consistently thrilling performer, perhaps appropriately, isn't even human: It's the giant slab of machinery that serves as one of the two stages designed by Mark Fisher. Here Mr. Lepage's ability to use a single emblem or image for a variety of dramatic purposes is magnified to epic proportions. Rising and falling with amazing speed and ease, spinning and tilting to a full vertical position, this huge, hydraulically powered game board is a sandy beach in one segment, a sheer cliff wall in another and a battleground, viewed from above, for the evening's exuberantly cinematic climax. (Isherwood)In the climax a vertical battle is fought by aerialists fighting up and down the surface of the sand stone cliff with defeated fighters portrayed as tumbling down the surface of the cliff into the depths of the pit below. Cirque du Soleil’s production entitled O, which phonetically is the French word eau meaning water, is a collaboration with director Franco Dragone that has been running at Las Vegas’ Bellagio Hotel since 1998. O has grossed over a billion dollars since it opened in 1998 (Sylt and Reid). It is an aquatic circus or an aquadrama. In 1804, Charles Dibdin, one of Astley’s rivals, taking advantage of the nearby New River, “added to the accoutrements of the Sadler’s Wells Theatre a tank three feet deep, ninety feet long and as wide as twenty-four feet which could be filled with water from the New River” (Hays and Nickolopoulou 171) Sadler’s Wells presented aquadramas depicting many reconstructions of famous naval battles. One of the first of these was The Siege of Gibraltar (1804) that used “117 ships designed by the Woolwich Dockyard shipwrights and capable of firing their guns” (Hays and Nickolopoulou 5). To represent the drowning Spanish sailors saved by the British, “Dibdin used children, ‘who were seen swimming and affecting to struggle with the waves’”(5).O (1998) is the first Cirque production to be performed in a proscenium arch theatre, with the pool installed behind the proscenium arch. “To light the water in the pool, a majority of the front lighting comes from a subterranean light tunnel (at the same level as the pool) which has eleven 4" thick Plexiglas windows that open along the downstage perimeter of the pool” (Lampert-Greaux). Accompanied by a live orchestra, performers dive into the 53 x 90 foot pool from on high, they swim underwater lit by lights installed in the subterranean light tunnel and they also perform on perforated platforms that rise up out of the water and turn the pool into a solid stage floor. In many respects, Cirque du Soleil can be seen to be the inheritors of the spectacular illegitimate circus of the 18th and 19th Century. The inheritance can be seen in Cirque du Soleil’s entrepreneurial daring, the corporeal dramaturgy privileging the affective power of the body over the use of words, in the performers presented primarily as character bodies, and in the delivering of essential text either as a prologue or as lyrics to songs. It can also be seen in Cirque du Soleil’s innovative staging design, the uptake of military based technology and the experimentation with cutting edge visual effects. Although re-invigorating the tradition and creating spectacular shows that in many respects are entirely of the moment, Cirque du Soleil’s aesthetic roots can be clearly seen to draw deeply on the inheritance of illegitimate circus.ReferencesBratton, Jacky. “Romantic Melodrama.” The Cambridge Companion to British Theatre 1730-1830. Eds. Jane Moody and Daniel O'Quinn. Cambridge: Cambridge University, 2007. 115-27. Bratton, Jacky. “What Is a Play? Drama and the Victorian Circus in the Performing Century.” Nineteenth-Century Theatre’s History. Eds. Tracey C. Davis and Peter Holland. Hampshire, UK: Palgrave Macmillan, 2007. 250-62.Cavendish, Richard. “Death of Madame Tussaud.” History Today 50.4 (2000). 15 Aug. 2014 ‹http://www.historytoday.com/richard-cavendish/death-madame-tussaud›.Cirque du Soleil. 2014. 10 Sep. 2014 ‹http://www.cirquedusoleil.com/en/home/about-us/at-a-glance.aspx›.Davis, Janet M. The Circus Age: Culture and Society under the American Big Top. Chapel Hill and London: University of North Carolina Press, 2002. Hays, Michael, and Anastasia Nikolopoulou. Melodrama: The Cultural Emergence of a Genre. New York: Palgrave Macmillan, 1999.House of Dancing Water. 2014. 17 Aug. 2014 ‹http://thehouseofdancingwater.com/en/›.Isherwood, Charles. “Fire, Acrobatics and Most of All Hydraulics.” New York Times 5 Feb. 2005. 12 Sep. 2014 ‹http://www.nytimes.com/2005/02/05/theater/reviews/05cirq.html?_r=0›.Fink, Jerry. “Cirque du Soleil Spares No Cost with Kà.” Las Vegas Sun 2004. 17 Sep. 2014 ‹http://www.lasvegassun.com/news/2004/sep/16/cirque-du-soleil-spares-no-cost-with-ka/›.Fricker, Karen. “Le Goût du Risque: Kà de Robert Lepage et du Cirque du Soleil.” (“Risky Business: Robert Lepage and the Cirque du Soleil’s Kà.”) L’Annuaire théâtral 45 (2010) 45-68. Trans. Isabelle Savoie. (Original English Version not paginated.)Hurley, Erin. "Les Corps Multiples du Cirque du Soleil." Globe: Revue Internationale d’Études Quebecoise. Les Arts de la Scene au Quebec, 11.2 (2008). (Original English n.p.)Jacob, Pascal. The Circus Artist Today: Analysis of the Key Competences. Brussels: FEDEC: European Federation of Professional Circus Schools, 2008. 5 June 2010 ‹http://sideshow-circusmagazine.com/research/downloads/circus-artist-today-analysis-key-competencies›.Jando, Dominique. “Philip Astley, Circus Owner, Equestrian.” Circopedia. 15 Sep. 2014 ‹http://www.circopedia.org/Philip_Astley›.Kwint, Marius. “The Legitimization of Circus in Late Georgian England.” Past and Present 174 (2002): 72-115.---. “The Circus and Nature in Late Georgian England.” Histories of Leisure. Ed. Rudy Koshar. Oxford: Berg Publishers, 2002. 45-60. ---. “The Theatre of War.” History Today 53.6 (2003). 28 Mar. 2012 ‹http://www.historytoday.com/marius-kwint/theatre-war›.Lampert-Greaux, Ellen. “The Wizardry of O: Cirque du Soleil Takes the Plunge into an Underwater World.” livedesignonline 1999. 17 Aug. 2014 ‹http://livedesignonline.com/mag/wizardry-o-cirque-du-soleil-takes-plunge-underwater-world›.Lavers, Katie. “Sighting Circus: Perceptions of Circus Phenomena Investigated through Diverse Bodies.” Doctoral Thesis. Perth, WA: Edith Cowan University, 2014. Leroux, Patrick Louis. “The Cirque du Soleil in Las Vegas: An American Striptease.” Revista Mexicana de Estudio Canadiens (Nueva Época) 16 (2008): 121-126.Mazza, Ed. “Cirque du Soleil’s Drone Video ‘Sparked’ is Pure Magic.” Huffington Post 22 Sep. 2014. 23 Sep. 2014 ‹http://www.huffingtonpost.com/2014/09/22/cirque-du-soleil-sparked-drone-video_n_5865668.html›.Meisel, Martin. Realizations: Narrative, Pictorial and Theatrical Arts in Nineteenth-Century England. Princeton, New Jersey: Princeton University Press, 1983.Moody, Jane. Illegitimate Theatre in London, 1770-1840. Cambridge: Cambridge University Press, 2000. O'Quinn, Daniel. Staging Governance: Teatrical Imperialism in London 1770-1800. Baltimore, Maryland, USA: Johns Hopkins University Press, 2005. O'Quinn, Daniel. “Theatre and Empire.” The Cambridge Companion to British Theatre 1730-1830. Eds. Jane Moody and Daniel O'Quinn. Cambridge: Cambridge University Press, 2007. 233-46. Reed, Peter P. “Interrogating Legitimacy in Britain and America.” The Oxford Handbook of Georgian Theatre. Eds. Julia Swindells and Francis David. Oxford: Oxford University Press, 2014. 247-264.Saxon, A.H. “The Circus as Theatre: Astley’s and Its Actors in the Age of Romanticism.” Educational Theatre Journal 27.3 (1975): 299-312.Schlicke, P. Dickens and Popular Entertainment. London: Unwin Hyman, 1985.St. Leon, Mark. Circus: The Australian Story. Melbourne: Melbourne Books, 2011. Stoddart, Helen. Rings of Desire: Circus History and Representation. Manchester: Manchester University Press, 2000. Swed, Mark. “Epic, Extravagant: In Ka the Acrobatics and Dazzling Special Effects Are Stunning and Enchanting.” Los Angeles Times 5 Feb. 2005. 22 Aug. 2014 ‹http://articles.latimes.com/2005/feb/05/entertainment/et-ka5›.Sylt, Cristian, and Caroline Reid. “Cirque du Soleil Swings to $1bn Revenue as It Mulls Shows at O2.” The Independent Oct. 2011. 14 Sep. 2014 ‹http://www.independent.co.uk/news/business/news/cirque-du-soleil-swings-to-1bn-revenue-as-it-mulls-shows-at-o2-2191850.html›.Tait, Peta. Circus Bodies: Cultural Identity in Aerial Performance. London: Routledge, 2005.Terdiman, Daniel. “Flying Lampshades: Cirque du Soleil Plays with Drones.” CNet 2014. 22 Sept 2014 ‹http://www.cnet.com/news/flying-lampshades-the-cirque-du-soleil-plays-with-drones/›.Venables, Michael. “The Technology Behind the Las Vegas Magic of Cirque du Soleil.” Forbes Magazine 30 Aug. 2013. 16 Aug. 2014 ‹http://www.forbes.com/sites/michaelvenables/2013/08/30/technology-behind-the-magical-universe-of-cirque-du-soleil-part-one/›.
APA, Harvard, Vancouver, ISO, and other styles
45

"Secure and Error-Free Data Storage on Cloud via Deniable CP-ABE Scheme." VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE 8, no. 10 (August 10, 2019): 2880–83. http://dx.doi.org/10.35940/ijitee.j9614.0881019.

Full text
Abstract:
Cloud storage services are quickly increasing and more prevalent. CSP-cloud storage providers offer storage as a service to all the users. It is a paid facility that allows association to outsource their confidential data to be stored on remote servers. But, identity privacy and preserving data from an untrusted cloud is a difficult concern, because of the successive change of the members. CSP has to be secured from an illegitimate person who performs data corruption over cloud servers. Thus, there is a need to safeguard information from the individuals who don’t have access by establishing numerous cloud storage encryption plans. Every such plan implemented expects that distributed storage suppliers are protected and can't be hacked; however, practically speaking, a few powers will compel distributed storage suppliers to render client details and secret information on the cloud, in this manner inside and out bypassing stockpiling encryption plans. In this paper, a new scheme is introduced to protect user privacy by a deniable CP_ABE(Cloud Provider_ Attribute Based Encryption) scheme which implements a cloud storage encryption plan. Since coercers cannot specify whether privileged insights are valid or not, the CSP ensures privacy of the user
APA, Harvard, Vancouver, ISO, and other styles
46

Haderer, Margaret. "Does emancipation devour its children? Beyond a stalled dialectic of emancipation." European Journal of Social Theory, July 7, 2021, 136843102110283. http://dx.doi.org/10.1177/13684310211028382.

Full text
Abstract:
Emancipation serves not only as a midwife for progressive agendas such as greater equality and sustainability but also as their gravedigger. This diagnosis underpins Ingolfur Blühdorn’s ‘dialectic of emancipation’, which depicts a dilemma but offers no perspective on how to deal with it. By drawing on Foucault, this article suggests conceiving of emancipation as a task moderns are confronted with even if a given emancipatory project has come to devour its children. Claiming autonomy from given social constellations is key to this task; key also is judging between legitimate and illegitimate claims to autonomy. In late modernity, the criteria for such judgement are no longer universally given. Instead of regarding the latter as entry into mere subjectivism (Blühdorn), this article presents judgement as a key political, ‘world building’-activity (Arendt), a critical social theory may join in, by not only observing the world but by also taking sides in it.
APA, Harvard, Vancouver, ISO, and other styles
47

SILVA, BRUNO CASTANHO, and SVEN-OLIVER PROKSCH. "Fake It ‘Til You Make It: A Natural Experiment to Identify European Politicians’ Benefit from Twitter Bots." American Political Science Review, September 11, 2020, 1–7. http://dx.doi.org/10.1017/s0003055420000817.

Full text
Abstract:
Social media giants stand accused of facilitating illegitimate interference with democratic political processes around the world. Part of this problem are malicious bots: automated fake accounts passing as humans. However, we lack a systematic understanding of which politicians benefit most from them. We tackle this question by leveraging a Twitter purge of malicious bots in July 2018 and a new dataset on Twitter activity by all members of national parliaments (MPs) in the EU in 2018. Since users had no influence on how and when Twitter purged millions of bots, it serves as an exogenous intervention to investigate whether some parties or politicians lost more followers. We find drops in follower counts concentrated among radical right politicians, in particular those with strong anti-EU discourse. This is the first set of empirical, causally identified evidence supporting the idea that the radical right benefits more from malicious bots than other party families.
APA, Harvard, Vancouver, ISO, and other styles
48

Corcione, Elena. "Is There a Role for Domestic Law in the Interpretation of the European Convention on Human Rights?" Italian Review of International and Comparative Law, August 8, 2023, 1–24. http://dx.doi.org/10.1163/27725650-03020001.

Full text
Abstract:
Abstract In the context of the European Convention on Human Rights, the doctrine of autonomous concepts seems to perfectly embody the dogma of the limited relevance of domestic law before international courts, since it postulates that classifications and qualifications in national laws have a relative value and may only constitute a starting point for the Court’s interpretation. Traditionally, domestic law is merely considered as part of the State conduct subject to the Court’s judicial review vis-à-vis conventional obligations. However, the purported independence of autonomous concepts from domestic law is far from absolute in practice, since the process of interpretation of autonomous concepts may contemplate consensus arguments, possibly leading to support or disincentivize autonomous interpretation. The article explores the weaknesses and strengths of this possible approach, which ultimately serves the purpose of avoiding the adoption of autonomous concepts completely detached from national legal systems and preventing criticism of illegitimate judicial law-making.
APA, Harvard, Vancouver, ISO, and other styles
49

Starrs, Bruno. "Hyperlinking History and Illegitimate Imagination: The Historiographic Metafictional E-novel." M/C Journal 17, no. 5 (October 25, 2014). http://dx.doi.org/10.5204/mcj.866.

Full text
Abstract:
‘Historiographic Metafiction’ (HM) is a literary term first coined by creative writing academic Linda Hutcheon in 1988, and which refers to the postmodern practice of a fiction author inserting imagined--or illegitimate--characters into narratives that are intended to be received as authentic and historically accurate, that is, ostensibly legitimate. Such adventurous and bold authorial strategies frequently result in “novels which are both intensely self-reflexive and yet paradoxically also lay claim to historical events and personages” (Hutcheon, A Poetics 5). They can be so entertaining and engaging that the overtly intertextual, explicitly inventive work of biographical HM can even change the “hegemonic discourse of history” (Nunning 353) for, as Philippa Gregory, the author of HM novel The Other Boleyn Girl (2001), has said regarding this genre of creative writing: “Fiction is about imagined feelings and thoughts. History depends on the outer life. The novel is always about the inner life. Fiction can sometimes do more than history. It can fill the gaps” (University of Sussex). In a way, this article will be filling one of the gaps regarding HM.Forrest Gump (Robert Zemeckis, 1994) is possibly the best known cinematic example of HM, and this film version of the 1986 novel by Winston Groom particularly excels in seamlessly inserting images of a fictional character into verified history, as represented by well-known television newsreel footage. In Zemeckis’s adaptation, gaps were created in the celluloid artefact and filled digitally with images of the actor, Tom Hanks, playing the eponymous role. Words are often deemed less trustworthy than images, however, and fiction is considered particularly unreliable--although there are some exceptions conceded. In addition to Gregory’s novel; Midnight’s Children (1980) by Salman Rushdie; The Name of the Rose (1983) by Umberto Eco; and The Flashman Papers (1969-2005) by George MacDonald Fraser, are three well-known, loved and lauded examples of literary HM, which even if they fail to convince the reader of their bona fides, nevertheless win a place in many hearts. But despite the genre’s popularity, there is nevertheless a conceptual gap in the literary theory of Hutcheon given her (perfectly understandable) inability in 1988 to predict the future of e-publishing. This article will attempt to address that shortcoming by exploring the potential for authors of HM e-novels to use hyperlinks which immediately direct the reader to fact providing webpages such as those available at the website Wikipedia, like a much speedier (and more independent) version of the footnotes in Fraser’s Flashman novels.Of course, as Roland Barthes declared in 1977, “the text is a tissue of quotations drawn from innumerable centres of culture” (146) and, as per any academic work that attempts to contribute to knowledge, a text’s sources--its “quotations”--must be properly identified and acknowledged via checkable references if credibility is to be securely established. Hence, in explaining the way claims to fact in the HM novel can be confirmed by independently published experts on the Internet, this article will also address the problem Hutcheon identifies, in that for many readers the entirety of the HM novel assumes questionable authenticity, that is, the novel’s “meta-fictional self-reflexivity (and intertextuality) renders their claims to historical veracity somewhat problematic, to say the least” ("Historiographic Metafiction: Parody", 3). This article (and the PhD in creative writing I am presently working on at Murdoch University in Perth, Western Australia) will possibly develop the concept of HM to a new level: one at which the Internet-connected reader of the hyperlinked e-novel is made fully (and even instantly) aware of those literary elements of the narrative that are legitimate and factual as distinct from those that are fictional, that is, illegitimate. Furthermore, utilising examples from my own (yet-to-be published) hyperlinked HM e-novel, this article demonstrates that such hyperlinking can add an ironic sub-text to a fictional character’s thoughts and utterances, through highlighting the reality concerning their mistaken or naïve beliefs, thus creating HM narratives that serve an entertainingly complex yet nevertheless truly educational purpose.As a relatively new and under-researched genre of historical writing, HM differs dramatically from the better known style of standard historical or biographical narrative, which typically tends to emphasise mimesis, the cataloguing of major “players” in historical events and encyclopaedic accuracy of dates, deaths and places. Instead, HM involves the re-contextualisation of real-life figures from the past, incorporating the lives of entirely (or, as in the case of Gregory’s Mary Boleyn, at least partly) fictitious characters into their generally accepted famous and factual activities, and/or the invention of scenarios that gel realistically--but entertainingly--within a landscape of well-known and well-documented events. As Hutcheon herself states: “The formal linking of history and fiction through the common denominators of intertextuality and narrativity is usually offered not as a reduction, as a shrinking of the scope and value of fiction, but rather as an expansion of these” ("Intertextuality", 11). Similarly, Gregory emphasises the need for authors of HM to extend themselves beyond the encyclopaedic archive: “Archives are not history. The trouble with archives is that the material is often random and atypical. To have history, you have to have a narrative” (University of Sussex). Functionally then, HM is an intertextual narrative genre which serves to communicate to a contemporary audience an expanded story or stories of the past which present an ultimately more self-reflective, personal and unpredictable authorship: it is a distinctly auteurial mode of biographical history writing for it places the postmodern author’s imaginative “signature” front and foremost.Hutcheon later clarified that the quest for historical truth in fiction cannot possibly hold up to the persuasive powers of a master novelist, as per the following rationale: “Fact is discourse-defined: an event is not” ("Historiographic Metafiction", 843). This means, in a rather simplistic nutshell, that the new breed of HM novel writer is not constrained by what others may call fact: s/he knows that the alleged “fact” can be renegotiated and redefined by an inventive discourse. An event, on the other hand, is responsible for too many incontrovertible consequences for it to be contested by her/his mere discourse. So-called facts are much easier for the HM writer to play with than world changing events. This notion was further popularised by Ansgar Nunning when he claimed the overtly explicit work of HM can even change the “hegemonic discourse of history” (353). HM authors can radically alter, it seems, the way the reader perceives the facts of history especially when entertaining, engaging and believable characters are deliberately devised and manipulated into the narrative by the writer. Little wonder, then, that Hutcheon bemoans the unfortunate reality that for many readers the entirety of a HM work assumes questionable “veracity” due to its author’s insertion of imaginary and therefore illegitimate personages.But there is an advantage to be found in this, the digital era, and that is the Internet’s hyperlink. In our ubiquitously networked electronic information age, novels written for publication as e-books may, I propose, include clickable links on the names of actual people and events to Wikipedia entries or the like, thus strengthening the reception of the work as being based on real history (the occasional unreliability of Wikipedia notwithstanding). If picked up for hard copy publication this function of the HM e-novel can be replicated with the inclusion of icons in the printed margins that can be scanned by smartphones or similar gadgets. This small but significant element of the production reinforces the e-novel’s potential status as a new form of HM and addresses Hutcheon’s concern that for HM novels, their imaginative but illegitimate invention of characters “renders their claims to historical veracity somewhat problematic, to say the least” ("Historiographic Metafiction: Parody", 3).Some historic scenarios are so little researched or so misunderstood and discoloured by the muddy waters of time and/or rumour that such hyperlinking will be a boon to HM writers. Where an obscure facet of Australian history is being fictionalised, for example, these edifying hyperlinks can provide additional background information, as Glenda Banks and Martin Andrew might have wished for when they wrote regarding Bank’s Victorian goldfields based HM novel A Respectable Married Woman. This 2012 printed work explores the lives of several under-researched and under-represented minorities, such as settler women and Aboriginal Australians, and the author Banks lamented the dearth of public awareness regarding these peoples. Indeed, HM seems tailor-made for exposing the subaltern lives of those repressed individuals who form the human “backdrop” to the lives of more famous personages. Banks and Andrew explain:To echo the writings of Homi K. Bhaba (1990), this sets up a creative site for interrogating the dominant, hegemonic, ‘normalised’ master narratives about the Victorian goldfields and ‘re-membering’ a marginalised group - the women of the goldfields, the indigenous [sic], the Chinese - and their culture (2013).In my own hyperlinked short story (presently under consideration for publishing elsewhere), which is actually a standalone version of the first chapter of a full-length HM e-novel about Aboriginal Australian activists Eddie Mabo and Chicka Dixon and the history of the Aboriginal Tent Embassy in Canberra, entitled The Bullroarers, I have focussed on a similarly under-represented minority, that being light-complexioned, mixed race Aboriginal Australians. My second novel to deal with Indigenous Australian issues (see Starrs, That Blackfella Bloodsucka Dance), it is my first attempt at writing HM. Hopefully avoiding overkill whilst alerting readers to those Wikipedia pages with relevance to the narrative theme of non-Indigenous attitudes towards light-complexioned Indigenous Australians, I have inserted a total of only six hyperlinks in this 2200-word piece, plus the explanatory foreword stating: “Note, except where they are well-known place names or are indicated as factual by the insertion of Internet hyperlinks verifying such, all persons, organisations, businesses and places named in this text are entirely fictitious.”The hyperlinks in my short story all take the reader not to stubs but to well-established Wikipedia pages, and provide for the uninformed audience the following near-unassailable facts (i.e. events):The TV program, A Current Affair, which the racist character of the short story taken from The Bullroarers, Mrs Poulter, relies on for her prejudicial opinions linking Aborigines with the dealing of illegal drugs, is a long-running, prime-time Channel Nine production. Of particular relevance in the Wikipedia entry is the comment: “Like its main rival broadcast on the Seven Network, Today Tonight, A Current Affair is often considered by media critics and the public at large to use sensationalist journalism” (Wikipedia, “A Current Affair”).The Aboriginal Tent Embassy, located on the lawns opposite the Old Parliament House in Canberra, was established in 1972 and ever since has been the focus of Aboriginal Australian land rights activism and political agitation. In 1995 the Australian Register of the National Estate listed it as the only Aboriginal site in Australia that is recognised nationally for representing Aboriginal and Torres Strait Islander people and their political struggles (Wikipedia, “The Aboriginal Tent Embassy”).In 1992, during an Aboriginal land rights case known as Mabo, the High Court of Australia issued a judgment constituting a direct overturning of terra nullius, which is a Latin term meaning “land belonging to no one”, and which had previously formed the legal rationale and justification for the British invasion and colonisation of Aboriginal Australia (Wikipedia, “Terra Nullius”).Aboriginal rights activist and Torres Strait Islander, Eddie Koiki Mabo (1936 to 1992), was instrumental in the High Court decision to overturn the doctrine of terra nullius in 1992. In that same year, Eddie Mabo was posthumously awarded the Australian Human Rights Medal in the Human Rights and Equal Opportunity Commission Awards (Wikipedia, “Eddie Mabo”).The full name of what Mrs Poulter blithely refers to as “the Department of Families and that” is the Australian Government’s Department of Families, Housing, Community Services and Indigenous Affairs (Wikipedia, “The Department of Families, Housing, Community Services and Indigenous Affairs”).The British colonisation of Australia was a bloody, murderous affair: “continuous Aboriginal resistance for well over a century belies the ‘myth’ of peaceful settlement in Australia. Settlers in turn often reacted to Aboriginal resistance with great violence, resulting in numerous indiscriminate massacres by whites of Aboriginal men, women and children” (Wikipedia, “History of Australia (1788 - 1850)”).Basically, what is not evidenced empirically with regard to the subject matter of my text, that is, the egregious attitudes of non-Indigenous Australians towards Indigenous Australians, can be extrapolated thanks to the hyperlinks. This resonates strongly with Linda Tuhiwai Smith’s assertion in 2012 that those under-represented by mainstream, patriarchal epistemologies need to be engaged in acts of “reclaiming, reformulating and reconstituting” (143) so as to be re-presented as authentic identities in these HM artefacts of literary research.Exerting auteurial power as an Aboriginal Australian author myself, I have sought to imprint on my writing a multi-levelled signature pertaining to my people’s under-representation: there is not just the text I have created but another level to be considered by the reader, that being my careful choice of Wikipedia pages to hyperlink certain aspects of the creative writing to. These electronic footnotes serve as politically charged acts of “reclaiming, reformulating and reconstituting” Aboriginal Australian history, to reuse the words of Smith, for when we Aboriginal Australian authors reiterate, when we subjugated savages wrestle the keyboard away from the colonising overseers, our readers witness the Other writing back, critically. As I have stated previously (see Starrs, "Writing"), receivers of our words see the distorted and silencing master discourse subverted and, indeed, inverted. Our audiences are subjectively repositioned to see the British Crown as the monster. The previously presumed rational, enlightened and civil coloniser is instead depicted as the author and perpetrator of a violently racist, criminal discourse, until, eventually, s/he is ultimately eroded and made into the Other: s/he is rendered the villainous, predatory savage by the auteurial signatures in revisionist histories such as The Bullroarers.Whilst the benefit in these hyperlinks as electronic educational footnotes in my short story is fairly obvious, what may not be so obvious is the ironic commentary they can make, when read in conjunction with the rest of The Bullroarers. Although one must reluctantly agree with Wayne C. Booth’s comment in his classic 1974 study A Rhetoric of Irony that, in some regards, “the very spirit and value [of irony] are violated by the effort to be clear about it” (ix), I will nevertheless strive for clarity and understanding by utilizing Booth’s definition of irony “as something that under-mines clarities, opens up vistas of chaos, and either liberates by destroying all dogmas or destroys by revealing the inescapable canker of negation at the heart of every affirmation” (ix). The reader of The Bullroarers is not expecting the main character, Mrs Poulter, to be the subject of erosive criticism that destroys her “dogmas” about Aboriginal Australians--certainly not so early in the narrative when it is unclear if she is or is not the protagonist of the story--and yet that’s exactly what the hyperlinks do. They expose her as hopelessly unreliable, laughably misinformed and yes, unforgivably stupid. They reveal the illegitimacy of her beliefs. Perhaps the most personally excoriating of these revelations is provided by the link to the Wikipedia entry on the Australian Government’s Department of Families, Housing, Community Services and Indigenous Affairs, which is where her own daughter, Roxy, works, but which Mrs Poulter knows, gormlessly, as “the Department of Families and that”. The ignorant woman spouts racist diatribes against Aboriginal Australians without even realising how inextricably linked she and her family, who live at the deliberately named Boomerang Crescent, really are. Therein lies the irony I am trying to create with my use of hyperlinks: an independent, expert adjudication reveals my character, Mrs Poulter, and her opinions, are hiding an “inescapable canker of negation at the heart of every affirmation” (Booth ix), despite the air of easy confidence she projects.Is the novel-reading public ready for these HM hyperlinked e-novels and their potentially ironic sub-texts? Indeed, the question must be asked: can the e-book ever compete with the tactile sensations a finely crafted, perfectly bound hardcover publication provides? Perhaps, if the economics of book buying comes into consideration. E-novels are cheap to publish and cheap to purchase, hence they are becoming hugely popular with the book buying public. Writes Mark Coker, the founder of Smashwords, a successful online publisher and distributor of e-books: “We incorporated in 2007, and we officially launched the business in May 2008. In our first year, we published 140 books from 90 authors. Our catalog reached 6,000 books in 2009, 28,800 in 2010, 92,000 in 2011, 191,000 in 2012 and as of this writing (November 2013) stands at over 250,000 titles” (Coker 2013). Coker divulged more about his company’s success in an interview with Forbes online magazine: “‘It costs essentially the same to pump 10,000 new books a month through our network as it will cost to do 100,000 a month,’ he reasons. Smashwords book retails, on average, for just above $3; 15,000 titles are free” (Colao 2012).In such a burgeoning environment of technological progress in publishing I am tempted to say that yes, the time of the hyperlinked e-novel has come, and to even predict that HM will be a big part of this new wave of postmodern literature. The hyperlinked HM e-novel’s strategy invites the reader to reflect on the legitimacy and illegitimacy of different forms of narrative, possibly concluding, thanks to ironic electronic footnoting, that not all the novel’s characters and their commentary are to be trusted. Perhaps my HM e-novel will, with its untrustworthy Mrs Poulter and its little-known history of the Aboriginal Tent Embassy addressed by gap-filling hyperlinks, establish a legitimising narrative for a people who have traditionally in white Australian society been deemed the Other and illegitimate. Perhaps The Bullroarers will someday alter attitudes of non-Indigenous Australians to the history and political activities of this country’s first peoples, to the point even, that as Nunning warns, we witness a change in the “hegemonic discourse of history” (353). If that happens we must be thankful for our Internet-enabled information age and its concomitant possibilities for hyperlinked e-publications, for technology may be separated from the world of art, but it can nevertheless be effectively used to recreate, enhance and access that world, to the extent texts previously considered illegitimate achieve authenticity and veracity.ReferencesBanks, Glenda. A Respectable Married Woman. Melbourne: Lacuna, 2012.Banks, Glenda, and Martin Andrew. “Populating a Historical Novel: A Case Study of a Practice-led Research Approach to Historiographic Metafiction.” Bukker Tillibul 7 (2013). 19 Sep. 2014 ‹http://bukkertillibul.net/Text.html?VOL=7&INDEX=2›.Barthes, Roland. Image, Music, Text. Trans. Stephen Heath. London: Fontana Press, 1977.Booth, Wayne C. A Rhetoric of Irony. Chicago: U of Chicago P, 1974.Colao, J.J. “Apple’s Biggest (Unknown) Supplier of E-books.” Forbes 7 June 2012. 19 Sep. 2014 ‹http://www.forbes.com/sites/jjcolao/2012/06/07/apples-biggest-unknown-supplier-of-e-books/›.Coker, Mark. “Q & A with Smashwords Founder, Mark Coker.” About Smashwords 2013. 19 Sep. 2014 ‹https://www.smashwords.com/about›.Eco, Umberto. The Name of the Rose. Trans. William Weaver, San Diego: Harcourt, 1983.Forrest Gump. Dir. Robert Zemeckis. Paramount Pictures, 1994.Fraser, George MacDonald. The Flashman Papers. Various publishers, 1969-2005.Groom, Winston. Forrest Gump. NY: Doubleday, 1986.Gregory, Philippa. The Other Boleyn Girl. UK: Scribner, 2001.Hutcheon, Linda. A Poetics of Postmodernism: History, Theory, Fiction, 2nd ed. Abingdon, UK: Taylor and Francis, 1988.---. “Intertextuality, Parody, and the Discourses of History: A Poetics of Postmodernism History, Theory, Fiction.” 1988. 19 Sep. 2014 ‹http://ieas.unideb.hu/admin/file_3553.pdf›.---. “Historiographic Metafiction: Parody and the Intertextuality of History.” Eds. P. O’Donnell and R.C. Davis, Intertextuality and Contemporary American Fiction. Baltimore, Maryland: John Hopkins UP, 1989. 3-32.---. “Historiographic Metafiction.” Ed. Michael McKeon, Theory of the Novel: A Historical Approach Baltimore, Maryland: Johns Hopkins UP, 2000. 830-50.Nunning, Ansgar. “Where Historiographic Metafiction and Narratology Meet.” Style 38.3 (2004): 352-75.Rushdie, Salman. Midnight’s Children. London: Jonathan Cape, 1980.Starrs, D. Bruno. That Blackfella Bloodsucka Dance! Saarbrücken, Germany: Just Fiction Edition (paperback), 2011; Starrs via Smashwords (e-book), 2012.---. “Writing Indigenous Vampires: Aboriginal Gothic or Aboriginal Fantastic?” M/C Journal 17.4 (2014). 19 Sep. 2014 ‹http://journal.media-culture.org.au/index.php/mcjournal/article/viewArticle/834›.Tuhiwai Smith, Linda. Decolonizing Methodologies. London & New York: Zed Books, 2012.University of Sussex. “Philippa Gregory Fills the Historical Gaps.” University of Sussex Alumni Magazine 51 (2012). 19 Sep. 2014 ‹http://www.scribd.com/doc/136033913/University-of-Sussex-Alumni-Magazine-Falmer-issue-51›.Wikipedia. “A Current Affair.” 2014. 19 Sep. 2014 ‹http://en.wikipedia.org/wiki/A_Current_Affair›.---. “Aboriginal Tent Embassy.” 2014. 19 Sep. 2014 ‹http://en.wikipedia.org/wiki/Aboriginal_Tent_Embassy›.---. “Department of Families, Housing, Community Services and Indigenous Affairs.” 2014. 19 Sep. 2014 ‹http://en.wikipedia.org/wiki/Department_of_Families,_Housing,_Community_Services_and_Indigenous_Affairs›.---. “Eddie Mabo.” 2014. 19 Sep. 2014 ‹http://en.wikipedia.org/wiki/Eddie_Mabo›.---. “History of Australia (1788 – 1850).” 2014. 19 Sep. 2014 ‹http://en.wikipedia.org/wiki/History_of_Australia_(1788%E2%80%931850)#Aboriginal_resistance›.---. “Terra Nullius.” 2014. 19 Sep. 2014 ‹http://en.wikipedia.org/wiki/Terra_nullius›.
APA, Harvard, Vancouver, ISO, and other styles
50

Bond, Sue. "Heavy Baggage: Illegitimacy and the Adoptee." M/C Journal 17, no. 5 (October 25, 2014). http://dx.doi.org/10.5204/mcj.876.

Full text
Abstract:
Teichman notes in her study of illegitimacy that “the point of the legitimate/illegitimate distinction is not to cause suffering; rather, it has to do with certain widespread human aims connected with the regulation of sexual activities and of population” (4). She also writes that, until relatively recently, “the shame of being an unmarried mother was the worst possible shame a woman could suffer” (119). Hence the secrecy, silences, and lies that used to be so common around the issue of an illegitimate birth and adoption.I was adopted at birth in the mid-1960s in New Zealand because my mother was a long way from family in England and had no support. She and my father had fallen in love, and planned to marry, but it all fell apart, and my mother was left with decisions to make. It was indeed a difficult time for unwed mothers, and that issue of shame and respectability was in force. The couple who adopted me were in their late forties and had been married for twenty-five years. My adoptive father had served in World War Two in the Royal Air Force before being invalided out for health problems associated with physical and psychological injuries. He was working in the same organisation as my mother and approached her when he learned of her situation. My adoptive mother loved England as her Home all of her life, despite living in Australia permanently from 1974 until her death in 2001. I did not know of my adoption until 1988, when I was twenty-three years old. The reasons for this were at least partly to do with my adoptive parents’ fear that I would leave them to search for my birth parents. My feelings about this long-held secret are complex and mixed. My adoptive mother never once mentioned my adoption, not on the day I was told by my adoptive father, nor at any point afterwards. My adoptive father only mentioned it again in the last two years of his life, after a long estrangement from me, and it made him weep. Even in the nursing home he did not want me to tell anyone that I had been adopted. It was impossible for me to obey this request, for my sense of self and my own identity, and for the recognition of the years of pain that I had endured as his daughter. He wanted to keep so much a secret; I could not, and would not, hold anything back anymore.And so I found myself telling anyone who would listen that I was adopted, and had only found out as an adult. This did not transmogrify into actively seeking out my birth parents, at least not immediately. It took some years before I obtained my original birth certificate, and then a long while again before I searched for, and found, my birth mother. It was not until my adoptive mother died that I launched into the search, probably because I did not want to cause her pain, though I did not consciously think of it that way. I did not tell my adoptive father of the search or the discovery. This was not an easy decision, as my birth mother would have liked to see him again and thank him, but I knew that his feelings were quite different and I did not want to risk further hurt to either my birth mother or my adoptive father. My own pain endures.I also found myself writing about my family. Other late discovery adoptees, as we are known, have written of their experiences, but not many. Maureen Watson records her shock at being told by her estranged husband when she was 40 years old; Judith Lucy, the comedian, was told in her mid-twenties by her sister-in-law after a tumultuous Christmas day; the Canadian author Wayson Choy was in his late fifties when he received a mysterious phone call from a woman about seeing his “other” mother on the street.I started with fiction, making up fairy tales or science fiction scenarios, or one act plays, or poetry, or short stories. I filled notebooks with these words of confusion and anger and wonder. Eventually, I realised I needed to write about my adoptive life in fuller form, and in life story mode. The secrecy and silences that had dominated my family life needed to be written out on the page and given voice and legitimacy by me. For years I had thought my father’s mental disturbance and destructive behaviour was my fault, as he often told me it was, and I was an only child isolated from other family and other people generally. My adoptive mother seemed to take the role of the shadow in the background, only occasionally stepping forward to curb my father’s disturbing and paranoid reactions to life.The distinction between legitimacy and illegitimacy may not have been created and enforced to cause suffering, but that, of course, is what it did for many caught in its circle of grief and exclusion. For me, I did not feel the direct effect of being illegitimate at birth, because I did not “know”. (What gathered in my unconscious over the years was another thing altogether.) This was different for my birth mother, who suffered greatly during the time she was pregnant, hoping something would happen that would enable her to keep me, but finally having to give me up. She does not speak of shame, only heartache. My adoptive father, however, felt the shame of having to adopt a child; I know this because he told me in his own words at the end of his life. Although I did not know of my adoption until I was an adult, I picked up his fear of my inadequacy for many years beforehand. I realise now that he feared that I was “soiled” or “tainted”, that the behaviour of my mother would be revisited in me, and that I needed to be monitored. He read my letters, opened my diaries, controlled my phone calls, and told me he had spies watching me when I was out of his range. I read in Teichman’s work that the word “bastard”, the colloquial term for an illegitimate child or person, comes from the Old French ba(s)t meaning baggage or luggage or pack-saddle, something that could be slept on by the traveller (1). Being illegitimate could feel like carrying heavy baggage, but someone else’s, not yours. And being adopted was supposed to render you legitimate by giving you the name of a father. For me, it added even more heavy baggage. Writing is one way of casting it off, refusing it, chipping it away, reducing its power. The secrecy of my adoption can be broken open. I can shout out the silence of all those years.The first chapter of the memoir, “A Shark in the Garden”, has the title “Revelation”, and concerns the day I learned of my adoptive status. RevelationI sat on my bed, formed fists in my lap, got up again. In the mirror there was my reflection, but all I saw was fear. I sat down, thought of what I was going to say, stood again. If I didn’t force myself out through my bedroom door, all would be lost. I had rung the student quarters at the hospital, there was a room ready. I had spoken to Dr P. It was time for me to go. The words were formed in my mouth, I had only to speak them. Three days before, I had come home to find my father in a state of heightened anxiety, asking me where the hell I had been. He’d rung my friend C because I had told him, falsely, that I would be going over to her place for a fitting of the bridesmaid dresses. I lied to him because the other bridesmaid was someone he disliked intensely, and did not approve of me seeing her. I had to tell him the true identity of the other bridesmaid, which of course meant that I’d lied twice, that I’d lied for a prolonged period of time. My father accused me of abusing my mother’s good nature because she was helping me make my bridesmaid’s dress. I was not a good seamstress, whereas my mother made most of her clothes, and ours, so in reality she was the one making the dress. When you’ve lied to your parents it is difficult to maintain the high ground, or any ground at all. But I did try to tell him that if he didn’t dislike so many of my friends, I wouldn’t have to lie to him in order to shield them and have a life outside home. If I knew that he wasn’t going to blaspheme the other bridesmaid every time I said her name, then I could have been upfront. What resulted was a dark silence. I was completing a supplementary exam in obstetrics and gynaecology. Once passed, I would graduate with a Bachelor of Medicine, Bachelor of Surgery degree, and be able to work as an intern in a hospital. I hated obstetrics and gynaecology. It was about bodies like my own and their special functions, and seemed like an invasion of privacy. Women were set apart as specimens, as flawed creatures, as beings whose wombs were always going wrong, a difficult separate species. Men were the predominant teachers of wisdom about these bodies, and I found this repugnant. One obstetrician in a regional hospital asked my friend and me once if we had regular Pap smears, and if our menstrual blood contained clots. We answered him, but it was none of his business, and I wished I hadn’t. I can see him now, the small eyes, the bitchiness about other doctors, the smarminess. But somehow I had to get through it. I had to get up each morning and go into the hospital and do the ward rounds and see patients. I had to study the books. I had to pass that exam. It had become something other than just an exam to me. It was an enemy against which I must fight.My friend C was getting married on the 19th of December, and somehow I had to negotiate my father as well. He sometimes threatened to confiscate the keys to the car, so that I couldn’t use it. But he couldn’t do that now, because I had to get to the hospital, and it was too far away by public transport. Every morning I woke up and wondered what mood my father would be in, and whether it would have something to do with me. Was I the good daughter today, or the bad one? This happened every day. It was worse because of the fight over the wedding. It was a relief to close my bedroom door at night and be alone, away from him. But my mother too. I felt as if I was betraying her, by not being cooperative with my father. It would have been easier to have done everything he said, and keep the household peaceful. But the cost of doing that would have been much higher: I would have given my life over to him, and disappeared as a person.I could wake up and forget for a few seconds where I was and what had happened the day before. But then I remembered and the fear exploded in my stomach. I lived in dread of what my father would say, and in dread of his silence.That morning I woke up and instantly thought of what I had to do. After the last fight, I realised I did not want to live with such pain and fear anymore. I did not want to cause it, or to live with it, or to kill myself, or to subsume my spirit in the pathology of my father’s thinking. I wanted to live.Now I knew I had to walk into the living room and speak those words to my parents.My mother was sitting in her spot, at one end of the speckled and striped grey and brown sofa, doing a crossword. My father was in his armchair, head on his hand. I walked around the end of the sofa and stood by ‘my’ armchair next to my mother.“Mum and Dad, I need to talk with you about something.”I sat down as I said this, and looked at each of them in turn. Their faces were mildly expectant, my father’s with a dark edge.“I know we haven’t been getting on very well lately, and I think it might be best if I leave home and go to live in the students’ quarters at the hospital. I’m twenty-three now. I think it might be good for us to spend some time apart.” This sounded too brusque, but I’d said it. It was out in the atmosphere, and I could only wait. And whatever they said, I was going. I was leaving. My father kept looking at me for a moment, then straightened in his chair, and cleared his throat.“You sound as if you’ve worked this all out. Well, I have something to say. I suppose you know you were adopted.”There was an enormous movement in my head. Adopted. I suppose you know you were adopted. Age of my parents at my birth: 47 and 48. How long have you and Dad been married, Mum? Oooh, that’s a tricky one. School principal’s wife, eyes flicking from me to Mum and back again, You don’t look much like each other, do you? People referring to me as my Mum’s friend, not her daughter. I must have got that trait from you Oh no I know where you got that from. My father not wanting me to marry or have children. Not wanting me to go back to England. Moving from place to place. No contact with relatives. This all came to me in a flash of memory, a psychological click and shift that I was certain was audible outside my mind. I did not move, and I did not speak. My father continued. He was talking about my biological mother. The woman who, until a few seconds before, I had not known existed.“We were walking on the beach one day with you, and she came towards us. She didn’t look one way or another, just kept her eyes straight ahead. Didn’t acknowledge us, or you. She said not to tell you about your adoption unless you fell in with a bad lot.”I cannot remember what else my father said. At one point my mother said to me, “You aren’t going to leave before Christmas are you?”All of her hopes and desires were in that question. I was not a good daughter, and yet I knew that I was breaking her heart by leaving. And before Christmas too. Even a bad daughter is better than no daughter at all. And there nearly was no daughter at all. I suppose you know you were adopted.But did my mother understand nothing of the turmoil that lived within me? Did it really not matter to her that I was leaving, as long as I didn’t do it before Christmas? Did she understand why I was leaving, did she even want to know? Did she understand more than I knew? I did not ask any of these questions. Instead, at some point I got out of the chair and walked into my bedroom and pulled out the suitcase I had already packed the night before. I threw other things into other bags. I called for a taxi, in a voice supernaturally calm. When the taxi came, I humped the suitcase down the stairs and out of the garage and into the boot, then went back upstairs and got the other bags and humped them down as well. And while I did this, I was shouting at my father and he was shouting at me. I seem to remember seeing him out of the corner of my eye, following me down the stairs, then back up again. Following me to my bedroom door, then down the stairs to the taxi. But I don’t think he went out that far. I don’t remember what my mother was doing.The only words I remember my father saying at the end are, “You’ll end up in the gutter.”The only words I remember saying are, “At least I’ll get out of this poisonous household.”And then the taxi was at the hospital, and I was in a room, high up in a nondescript, grey and brown building. I unpacked some of my stuff, put my clothes in the narrow wardrobe, my shoes in a line on the floor, my books on the desk. I imagine I took out my toothbrush and lotions and hairbrush and put them on the bedside table. I have no idea what the weather was like, except that it wasn’t raining. The faces of the taxi driver, of the woman in reception at the students’ quarters, of anyone else I saw that day, are a blur. The room is not difficult to remember as it was a rectangular shape with a window at one end. I stood at that window and looked out onto other hospital buildings, and the figures of people walking below. That night I lay in the bed and let the waves of relief ripple over me. My parents were not there, sitting in the next room, speaking in low voices about how bad I was. I was not going to wake up and brace myself for my father’s opprobrium, or feel guilty for letting my mother down. Not right then, and not the next morning. The guilt and the self-loathing were, at that moment, banished, frozen, held-in-time. The knowledge of my adoption was also held-in-time: I couldn’t deal with it in any real way, and would not for a long time. I pushed it to the back of my mind, put it away in a compartment. I was suddenly free, and floating in the novelty of it.ReferencesChoy, Wayson. Paper Shadows: A Chinatown Childhood. Ringwood: Penguin, 2000.Lucy, Judith. The Lucy Family Alphabet. Camberwell: Penguin, 2008.Teichman, Jenny. Illegitimacy: An Examination of Bastardy. New York: Cornell University Press, 1982. Watson, Maureen. Surviving Secrets. Short-Stop Press, 2010.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography