Siga este link para ver outros tipos de publicações sobre o tema: Roanoke (Va.). Public Library.

Artigos de revistas sobre o tema "Roanoke (Va.). Public Library"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Veja os 17 melhores artigos de revistas para estudos sobre o assunto "Roanoke (Va.). Public Library".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.

1

Sikes, Scott. "Rural Public Library Outreach Services and Elder Users: A Case Study of the Washington County (VA) Public Library". Public Library Quarterly 39, n.º 4 (27 de agosto de 2019): 363–88. http://dx.doi.org/10.1080/01616846.2019.1659070.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Steele, Jennifer Elaine. "Cases of Censorship in Public Libraries: Loudoun County, VA". Public Library Quarterly 39, n.º 5 (27 de agosto de 2019): 434–56. http://dx.doi.org/10.1080/01616846.2019.1660755.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Ahn, Yong Han, Yuhong Wang, Kang Hee Lee e Myung Hwa Jeon. "THE GREENING OF AFFORDABLE HOUSING THROUGH PUBLIC AND PRIVATE PARTNERSHIPS: DEVELOPMENT OF A MODEL FOR GREEN AFFORDABLE HOUSING". Journal of Green Building 9, n.º 1 (abril de 2014): 93–112. http://dx.doi.org/10.3992/1943-4618-9.1.93.

Texto completo da fonte
Resumo:
The trend towards affordable, green housing highlights the need for a Green Affordable Housing (GAH) model that produces durable dwellings that are not significantly more expensive to build, cheaper to operate, healthier for their occupants, and more environmentally sound. The model should also reduce the risk of poverty for those with low and moderate incomes, be close to public transportation, and support a neighborhood that is healthy, walkable and connected to the broader community and natural environment. This case study utilized detailed interviews with occupants, town officials, a developer, and a design builder to explore how green building strategies could be applied in real-world communities with the help of a Community Development Block Grant (CDBG) from the U.S. Department of Housing and Urban Development (HUD) and contributions from other funding bodies. Focusing on the Roanoke and Lee Street housing project in Blacksburg, Virginia (VA), this study demonstrated how green building strategies can be integrated into affordable housing with help from public programs and incentives to provide houses that are more durable, no more expensive to build, cheaper to operate, healthier, more environmentally sound and less risky for their occupants. The new framework includes ways to deal with neighborhood issues such as the deterioration of housing stock and infrastructure to support the creation of a vital and healthy neighborhood with improved public services and community spirit, as well as providing an integrated design process framework that enables stakeholders to work together to achieve the goal of building green and affordable housing.
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Suo, Lingge, Xianghan Ke, Di Zhang, Xuejiao Qin, Xuhao Chen, Ying Hong, Wanwei Dai, Defu Wu, Chun Zhang e Dongsong Zhang. "Use of Mobile Apps for Visual Acuity Assessment: Systematic Review and Meta-analysis". JMIR mHealth and uHealth 10, n.º 2 (14 de fevereiro de 2022): e26275. http://dx.doi.org/10.2196/26275.

Texto completo da fonte
Resumo:
Background Vision impairments (VIs) and blindness are major global public health issues. A visual acuity (VA) test is one of the most crucial standard psychophysical tests of visual function and has been widely used in a broad range of health care domains, especially in many clinical settings. In recent years, there has been increasing research on mobile app–based VA assessment designed to allow people to test their VA at any time and any location. Objective The goal of the review was to assess the accuracy and reliability of using mobile VA measurement apps. Methods We searched PubMed, Embase, Cochrane Library, and Google Scholar for relevant articles on mobile apps for VA assessment published between January 1, 2008, and July 1, 2020. Two researchers independently inspected and selected relevant studies. Eventually, we included 22 studies that assessed tablet or smartphone apps for VA measurement. We then analyzed sensitivity, specificity, and accuracy in the 6 papers we found through a meta-analysis. Results Most of the 22 selected studies can be considered of high quality based on the Quality Assessment of Diagnostic Accuracy Studies–2. In a meta-analysis of 6 studies involving 24,284 participants, we categorized the studies based on the age groups of the study participants (ie, aged 3-5 years, aged 6-22 years, and aged 55 years and older), examiner (ie, professional and nonprofessional examiners), and the type of mobile devices (ie, smartphone, iPad). In the group aged 3 to 5 years, the pooled sensitivity for VA app tests versus clinical VA tests was 0.87 (95% CI 0.79-0.93; P=.39), and the pooled specificity was 0.78 (95% CI 0.70-0.85; P=.37). In the group aged 6 to 22 years, the pooled sensitivity for VA app tests versus clinical VA tests was 0.86 (95% CI 0.84-0.87; P<.001), and the pooled specificity for VA app tests versus clinical VA tests was 0.91 (95% CI 0.90-0.91; P=.27). In the group aged 55 years and older, the pooled sensitivity for VA app tests versus clinical VA tests was 0.85 (95% CI 0.55-0.98), and the pooled specificity for VA app tests versus clinical VA tests was 0.98 (95% CI 0.95-0.99). We found that the nonprofessional examiner group (AUC 0.93) had higher accuracy than the professional examiner group (AUC 0.87). In the iPad-based group, the pooled sensitivity for VA app tests versus clinical VA tests was 0.86, and the pooled specificity was 0.79. In the smartphone-based group, the pooled sensitivity for VA app tests versus clinical VA tests was 0.86 (P<.001), and the pooled specificity for VA app tests versus clinical VA tests was 0.91 (P<.001). Conclusions In this study, we conducted a comprehensive review of the research on existing mobile apps for VA tests to investigate their diagnostic value and limitations. Evidence gained from this study suggests that mobile app–based VA tests can be useful for on-demand VI detection.
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Vance, Jason M. "Mining reference chat transcripts to analyze noise complaints". Reference Services Review 46, n.º 4 (12 de novembro de 2018): 578–86. http://dx.doi.org/10.1108/rsr-11-2017-0042.

Texto completo da fonte
Resumo:
Purpose This case study provides a new methodology for examining patron-initiated noise complaints in academic libraries by mining virtual reference chat transcript logs. The purpose of this study is to illustrate how noise complaints can be identified, analyzed and mapped to create a visual representation of the library’s soundscape. Design/methodology/approach This study reviewed 4,494 reference chat logs taken over four semesters at a large public university between August 2015 and May 2017. From these transcripts, the author identified 330 unique noise complaints and analyzed them by content, time of day, day of week, week of semester and floor of library. Complaints were also plotted on a library map to determine noise complaint hot spots. Findings Analysis of the noise complaints showed that 82 per cent of the reported incidents originated in designated quiet study zones and 55 per cent of the complaints occurred in the evenings when the library was more lightly staffed. Mapping the noise complaints revealed that most infractions were reported in areas where public computing areas and group study rooms were situated directly adjacent to designated quiet study areas. Originality/value Although there are numerous studies on noise in libraries and many published analyses of reference chat transcripts, this paper is the first to analyze chat transcripts for the purpose of studying noise complaints in the library. This paper is an expansion of a preliminary study presented at the 2016 Library Assessment Conference in Arlington, VA.
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Kabongo, Jonathan, Craig Arthur e Freddy Paige. "Dusty & Digital Media Literacy Workshops". International Journal of Information, Diversity, & Inclusion (IJIDI) 6, n.º 1/2 (6 de maio de 2022): 64–78. http://dx.doi.org/10.33137/ijidi.v6i1.37118.

Texto completo da fonte
Resumo:
Digging in the Crates: Hip Hop Studies at Virginia Tech, or VTDITC, is a pedagogical model that exists to foster a sense of community among artists, fans, and scholars. Based in our campus’ main library, we hope to model that students’ and community members’ personal interests are worthy of academic study and further establish Hip Hop Studies’ presence at Virginia Tech, the academy, and in the larger community. To that end, the VTDITC community has designed, taught, and assessed more than 150 community-based media literacy workshops over the past half decade. We have demonstrated, explained, and created opportunities for a wide variety of learners to experience the science, technology, engineering, art, and mathematics inherent to the hip hop culture. We have learned alongside a diversity of audiences—from elementary school children to adults. To name just a few of our partner organizations, we have worked with the 4H Virginia Congress, the Boys & Girls Clubs of Southwest Virginia, Higher Achievement, Inc., a variety of public libraries including our regular collaborator Roanoke Public Libraries, the Science Museum of Western Virginia, Virginia’s Summer Residential Governor's School for Humanities, and the West End Center for Youth. In our contribution to The Global Drumbeat: Permeations of Hip Hop across Diverse Information Worlds, we will outline and explain an example lesson plan from one of our workshops. We will provide our learning outcomes as well as our assessment plan. Additionally, we will detail the theoretical underpinnings and guiding principles that inform our pedagogical decision making. Our workshops take a hands-on, practitioner-minded, and co-creation approach to teaching media literacy. Inasmuch, this contribution will also provide a recommended list of music creation equipment and other appropriate classroom technology that will accommodate a variety of budgets. Furthermore, we will include several promising practices and recommendations gained from more than 50 years of collective experience creating hip hop music and 10 years of collective experience teaching the hip hop arts. Our hope is that this contribution will inspire other library workers and educators to remix our workshops to suit the needs of their communities.
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Vachani, C., M. K. Hampshire, R. W. Whittington, A. Vachani e J. M. Metz. "Changes in Internet utilization by cancer patients in the Veteran’s Administration (VA) hospital setting". Journal of Clinical Oncology 24, n.º 18_suppl (20 de junho de 2006): 16042. http://dx.doi.org/10.1200/jco.2006.24.18_suppl.16042.

Texto completo da fonte
Resumo:
16042 Background: A previous study (2002) showed only 5% of VA cancer patients access the Internet to investigate information related to their cancer or cancer treatment. Since this study was published, access to the Internet and computers has changed over the interval. This study was designed to evaluate Internet usage patterns and factors that may promote Internet usage among cancer patients at a Veteran’s Administration (VA) hospital. Methods: From 09/2005 to 12/2005 a 15-item questionnaire was administered to 44 radiation oncology patients presenting for consultation and/or daily radiation treatments. The questionnaire evaluated basic demographics, Internet access and utilization, and interest in educational programs to promote utilization. Results were compared to a questionnaire study of 201 patients performed at the same institution in 2002. Results: The population is predominantly male (98%), with a racial distribution of 39% African American and 61% Caucasians. Two-thirds of the population are between the ages of 50 and 70. The most common primary tumor sites were prostate (65%), lung (11%), and head and neck (7%). Overall, 28% reported using the Internet to find information about their cancer, compared to only 5% in 2002 (p < .0001). An additional 42% reported a friend or family member searched the Internet on behalf of the patient. Seventy-four percent of subjects knew where to gain access to the Internet, which included public library (36%), personal computer (34%), friend/family’s home (13%). Of the 44 patients 18 (42%) were interested in free classes to learn how to access information on the Internet. African-American patients were somewhat more interested in taking educational classes on Internet utilization (OR 2.6, 95% CI 0.6–11.1). Conclusions: Internet use among VA cancer patients has increased over the last 3 years. A majority of VA patients know where to access Internet resources. Many patients are interested in educational programs to teach them how to utilize cancer based Internet resources. Future studies will assess the impact of this educational intervention in the VA population. No significant financial relationships to disclose.
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Mabe, Michael R. "Libraries to the Rescue". International Journal of Risk and Contingency Management 5, n.º 1 (janeiro de 2016): 62–81. http://dx.doi.org/10.4018/ijrcm.2016010105.

Texto completo da fonte
Resumo:
Emergency management professionals over the years have realized that preplanning and coordination is essential when mounting an effective reaction to a natural disaster. During Hurricane Katrina, professionals learned that preplanning and preparation must include a plan for responding to the unexpected. Chesterfield County, VA learned this lesson in 2011 during Hurricane Irene when unexpected events required adjusting the plan. The amount of damage caused by Irene was minimal compared to Katrina but the impact of responding to unexpected needs was just as compelling. During Irene and other natural disasters that followed the Chesterfield County Public (CCPL) became a key component in meeting unexpected needs mass care and communications. CCPL can now serve as an information hub, double as a daytime relief shelter and participate in mass feeding if necessary during emergency situations. Selected library branches are also be used as overnight relief shelters when the activation of a standard sized shelter facility is not warranted.
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Fodor, Caroline, e Gaston Bernier. "Bibliothèques publiques : nouveaux édifices, nouveaux rôles". Documentation et bibliothèques 47, n.º 3 (5 de agosto de 2015): 95–99. http://dx.doi.org/10.7202/1032578ar.

Texto completo da fonte
Resumo:
On a assisté au cours de la dernière décennie à une vague de constructions de bibliothèques parmi lesquelles la Bibliothèque nationale de France, la British Library et la San Francisco Public Library ont particulièrement retenu l’attention en raison de leur taille et de leurs ambitions. La bibliothèque d’Alexandrie renaît sous une forme moderne et, tout près, Vancouver a récemment inauguré un nouvel édifice. Winnipeg et Montréal feront de même bientôt. La construction et le fonctionnement de projets d’une telle ampleur nécessitent des efforts et des investissements tels qu’on peut se poser de sérieuses questions quant à la viabilité de la réalisation de ces mégaprojets. Le texte qui suit va tenter d’apporter des éléments de réponse à la question qui semble revenir le plus fréquemment : « En a-t-on réellement besoin ? ». Le problème de l’importance ou de l’utilité de grands ouvrages pour loger les bibliothèques publiques comporte trois volets. D’entrée de jeu, on peut se demander s’il est justifié, à l’ère du numérique et au moment où l’on a accès de chez soi à un volume toujours croissant d’information, de construire de nouveaux édifices. Les bibliothèques ont-elles fait leur temps et ne devraient-elles pas être considérées comme des musées pour les lecteurs intéressés aux vieilles et poussiéreuses curiosités littéraires ? Deuxièmement, quels avantages y a-t-il à construire du neuf ? Ne serait-il pas plus pratique d’utiliser les établissements déjà existants ? Enfin, en quoi l’architecture de la bibliothèque est-elle si importante ? A-t-on besoin d’autre chose que d’un bâtiment pour abriter les collections et les services idoines ? Dans le cas des projets identifiés plus haut, on a fait de grands efforts de publicité sur le concept et l’allure des nouveaux édifices grâce à des concours d’architecture et à la présentation électronique des maquettes et de l’aménagement. Ne serait-ce pas faire preuve de trop de munificence, à une époque de restrictions budgétaires, que d’allouer tant de ressources à des visées aussi secondaires que celles d’attirer les regards ?
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Saeed, D., G. Carter e C. Parsons. "A systematic review of interventions to improve medicines optimisation in frail older patients in secondary and acute care settings". International Journal of Pharmacy Practice 29, Supplement_1 (26 de março de 2021): i22—i23. http://dx.doi.org/10.1093/ijpp/riab015.026.

Texto completo da fonte
Resumo:
Abstract Introduction Frailty is a geriatric syndrome in which physiological systems have decreased reserve and resistance against stressors. Frailty is associated with polypharmacy, inappropriate prescribing and unfavourable clinical outcomes [1,2]. Aim To identify and evaluate studies of interventions designed to optimise the medications of frail older patients, aged 65 years or over, in secondary or acute care settings. Methods The protocol was registered and published on PROSPERO (CRD42019156623). A literature review was conducted across the following databases and trial registries: Medline, Scopus, Embase, Web of Science, Cochrane Library, Cochrane Central Register of Controlled Trials, International Pharmaceutical Abstracts, Cumulative Index to Nursing and Allied Health Literature Plus (CINAHL Plus), ClinicalTrials.gov, International Clinical Trials Registry Platform and Research Registry. All types of randomised controlled trials (RCTs) and non-randomised studies (NRSs) of interventions relating to any aspect of ‘medicines optimisation’, ‘medicines management’ or ‘pharmaceutical care’ to frail older inpatients (aged ≥ 65 years) were included. Eligible studies published in English were identified from the date of inception to October 2020. Screening and selection of titles, abstracts and full texts were followed by data extraction. Risk of bias was assessed using the Cochrane Collaboration ROB 2.0 tool for RCTs and risk of bias in non-randomized studies-of Interventions (ROBINS-I) tool for NRSs. Results 36 articles were identified and of these, three were eligible for inclusion (Figure 1). All included studies were RCTs. Although all included studies examined the effect of different types of interventions on different outcomes, they all concluded that medication optimisation interventions reduced suboptimal prescribing (measured as polypharmacy, inappropriate prescribing, and underuse) among frail older inpatients. The included studies used different tools to assess prescribing appropriateness; one used the STOPP criteria, one used STOPPFrail criteria and one employed inpatient/ outpatient geriatric evaluation and management according to published guidelines and Veterans Affairs (VA) hospital standards. Two of the included studies was assessed as having ‘some concerns’ of bias, and one was judged to be at ‘high risk’ of bias. Due to the heterogeneity of the included studies, a meta-analysis was not possible. Conclusion This systematic review demonstrates that medication optimisation interventions may improve medication appropriateness in frail older inpatients. Limitations include the small number of included studies and the exclusion of non-English language articles. However, this review highlights the paucity of evidence that examines impact of medication optimisation on quality of prescribing and clinical outcomes for frail older inpatients including hospitalisation, falls, quality of life and mortality. High-quality studies are needed to address this gap and to outline the framework of medication optimisation for this vulnerable cohort group. References 1. Clegg A, Young J, Life S, Rikket MO, Rockwood K. Frailty in Older People. Lancet. 2013;381(9868):752–62. 2. Fried, L. P. Tangen, C. M.Walston, J.Newman, A. B.Hirsch, C.Gottdiener et al. Frailty in older adults: evidence for a phenotype. J Gerontol A Biol Sci Med Sci. 2011; 56(3), 146–M15
Estilos ABNT, Harvard, Vancouver, APA, etc.
11

Ogburn, Joyce, e Barbara C. Dean. "Library Profile/Fairfax Cty. (VA) Public Library". Against the Grain 4, n.º 1 (1 de fevereiro de 1992). http://dx.doi.org/10.7771/2380-176x.1149.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
12

Dean, Barbara C. "Library Profile: Arlington County Department of Public Libraries, Arlington, VA". Against the Grain 10, n.º 2 (1 de abril de 1998). http://dx.doi.org/10.7771/2380-176x.2849.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
13

Hands, Africa, e Rose Candela. "Public Library Support of College Literacy in Appalachia". Proceedings of the ALISE Annual Conference, 20 de outubro de 2022. http://dx.doi.org/10.21900/j.alise.2022.1023.

Texto completo da fonte
Resumo:
This poster presents initial findings from phase 1 of an IMLS-funded project. The research question guiding this project is: What affordances relevant to college literacy are available at public libraries for adult prospective students in Central Appalachia? This content analysis examined public library websites across 4 states (KY, TN, VA, WV) comprising the central region of Appalachia. This region has lower educational attainment and income rates and higher unemployment compared to other regions of Appalachia. Prospective students in Appalachia face barriers to advancing their education: academic under-preparedness, lack of information about college and financial aid, and few family members who attended college and can serve as advisors. Challenges have been identified related to adult students’ information experiences including, time constraints, discomfort asking for help, and unfamiliarity with technology to access information and resources. This is an information area in which public libraries must actively engage.
Estilos ABNT, Harvard, Vancouver, APA, etc.
14

Mahesh, Buddhika P. K., John D. Hart, Ajay Acharya, Hafizur Rahman Chowdhury, Rohina Joshi, Tim Adair e Riley H. Hazard. "Validation studies of verbal autopsy methods: a systematic review". BMC Public Health 22, n.º 1 (29 de novembro de 2022). http://dx.doi.org/10.1186/s12889-022-14628-1.

Texto completo da fonte
Resumo:
Abstract Background Verbal autopsy (VA) has emerged as an increasingly popular technique to assign cause of death in parts of the world where the majority of deaths occur without proper medical certification. The purpose of this study was to examine the key characteristics of studies that have attempted to validate VA cause of death against an established cause of death. Methods A systematic review was conducted by searching the MEDLINE, EMBASE, Cochrane-library, and Scopus electronic databases. Included studies contained 1) a VA component, 2) a validation component, and 3) original analysis or re-analysis. Characteristics of VA studies were extracted. A total of 527 studies were assessed, and 481 studies screened to give 66 studies selected for data extraction. Results Sixty-six studies were included from multiple countries. Ten studies used an existing database. Sixteen studies used the World Health Organization VA questionnaire and 5 studies used the Population Health Metrics Research Consortium VA questionnaire. Physician certification was used in 36 studies and computer coded methods were used in 14 studies. Thirty-seven studies used high level comparator data with detailed laboratory investigations. Conclusion Most studies found VA to be an effective cause of death assignment method and compared VA cause of death to a high-quality established cause of death. Nonetheless, there were inconsistencies in the methodologies of the validation studies, and many used poor quality comparison cause of death data. Future VA validation studies should adhere to consistent methodological criteria so that policymakers can easily interpret the findings to select the most appropriate VA method. Prospero Registration CRD42020186886.
Estilos ABNT, Harvard, Vancouver, APA, etc.
15

Hall, Jessica. "Journey with Veterans". Information Technology and Libraries 39, n.º 4 (21 de dezembro de 2020). http://dx.doi.org/10.6017/ital.v39i4.12857.

Texto completo da fonte
Resumo:
The Fresno County Public Library in Fresno, California partnered with the Community Living Center at the VA Medical Center and the Veterans Home of California – Fresno to bring a virtual reality program to residents. The program utilized Google Expeditions to provide a fun, educational virtual reality experience for veterans. This column will discuss how the program was developed, the implementation of the program, the software and hardware used, and the outcomes.
Estilos ABNT, Harvard, Vancouver, APA, etc.
16

"L'évaluation des apports positifs du recours au e-learning pendant la pandémie sur la pédagogie de FLE". Contemporaneity of Language and Literature in the Robotized Millennium 4, n.º 2 (1 de novembro de 2022): 28–29. http://dx.doi.org/10.46632/cllrm/4/2/9.

Texto completo da fonte
Resumo:
Dès le début de 2020, nous avons dû faire face à un défi dont nous n'avons eu aucune idée jusqu'à ce moment -là. L'émergence de l'épidémie a perturbé la vie normale des gens dans le monde entier. Les commerces, le tourisme, l'éducation, la pratique des métiers divers… tout a dû subir un changement dans un délai presque immédiat. Quels sont les changements que l'on a témoigné dans le domaine de l'enseignement du français? Comment s'est-on préparé pour cela? Est-ce que l'avancement rapide de la TICE en FLE, qui a commencé à partir des années 2000, nous a aidé à mieux nous tirer de la situation? Dans l'époque Post Covid, c'est utile de penser sérieusement à toutes ces questions pour apprécier les apports positifs de la durée pendant laquelle on a tourné vers l'enseignement en distanciel. Cela nous aidera à intégrer ces aspects utiles dans notre enseignement même quand on retourne à "la nouvelle normalité" Post Covid qui va nous diriger vers une restructuration de la pédagogie en FLE.
Estilos ABNT, Harvard, Vancouver, APA, etc.
17

Ibrahim, Yasmin. "Commodifying Terrorism". M/C Journal 10, n.º 3 (1 de junho de 2007). http://dx.doi.org/10.5204/mcj.2665.

Texto completo da fonte
Resumo:
Introduction Figure 1 The counter-Terrorism advertising campaign of London’s Metropolitan Police commodifies some everyday items such as mobile phones, computers, passports and credit cards as having the potential to sustain terrorist activities. The process of ascribing cultural values and symbolic meanings to some everyday technical gadgets objectifies and situates Terrorism into the everyday life. The police, in urging people to look out for ‘the unusual’ in their normal day-to-day lives, juxtapose the everyday with the unusual, where day-to-day consumption, routines and flows of human activity can seemingly house insidious and atavistic elements. This again is reiterated in the Met police press release: Terrorists live within our communities making their plans whilst doing everything they can to blend in, and trying not to raise suspicions about their activities. (MPA Website) The commodification of Terrorism through uncommon and everyday objects situates Terrorism as a phenomenon which occupies a liminal space within the everyday. It resides, breathes and co-exists within the taken-for-granted routines and objects of ‘the everyday’ where it has the potential to explode and disrupt without warning. Since 9/11 and the 7/7 bombings Terrorism has been narrated through the disruption of mobility, whether in mid-air or in the deep recesses of the Underground. The resonant thread of disruption to human mobility evokes a powerful meta-narrative where acts of Terrorism can halt human agency amidst the backdrop of the metropolis, which is often a metaphor for speed and accelerated activities. If globalisation and the interconnected nature of the world are understood through discourses of risk, Terrorism bears the same footprint in urban spaces of modernity, narrating the vulnerability of the human condition in an inter-linked world where ideological struggles and resistance are manifested through inexplicable violence and destruction of lives, where the everyday is suspended to embrace the unexpected. As a consequence ambient fear “saturates the social spaces of everyday life” (Hubbard 2). The commodification of Terrorism through everyday items of consumption inevitably creates an intertextuality with real and media events, which constantly corrode the security of the metropolis. Paddy Scannell alludes to a doubling of place in our mediated world where “public events now occur simultaneously in two different places; the place of the event itself and that in which it is watched and heard. The media then vacillates between the two sites and creates experiences of simultaneity, liveness and immediacy” (qtd. in Moores 22). The doubling of place through media constructs a pervasive environment of risk and fear. Mark Danner (qtd. in Bauman 106) points out that the most powerful weapon of the 9/11 terrorists was that innocuous and “most American of technological creations: the television set” which provided a global platform to constantly replay and remember the dreadful scenes of the day, enabling the terrorist to appear invincible and to narrate fear as ubiquitous and omnipresent. Philip Abrams argues that ‘big events’ (such as 9/11 and 7/7) do make a difference in the social world for such events function as a transformative device between the past and future, forcing society to alter or transform its perspectives. David Altheide points out that since September 11 and the ensuing war on terror, a new discourse of Terrorism has emerged as a way of expressing how the world has changed and defining a state of constant alert through a media logic and format that shapes the nature of discourse itself. Consequently, the intensity and centralisation of surveillance in Western countries increased dramatically, placing the emphasis on expanding the forms of the already existing range of surveillance processes and practices that circumscribe and help shape our social existence (Lyon, Terrorism 2). Normalisation of Surveillance The role of technologies, particularly information and communication technologies (ICTs), and other infrastructures to unevenly distribute access to the goods and services necessary for modern life, while facilitating data collection on and control of the public, are significant characteristics of modernity (Reiman; Graham and Marvin; Monahan). The embedding of technological surveillance into spaces and infrastructures not only augment social control but also redefine data as a form of capital which can be shared between public and private sectors (Gandy, Data Mining; O’Harrow; Monahan). The scale, complexity and limitations of omnipresent and omnipotent surveillance, nevertheless, offer room for both subversion as well as new forms of domination and oppression (Marx). In surveillance studies, Foucault’s analysis is often heavily employed to explain lines of continuity and change between earlier forms of surveillance and data assemblage and contemporary forms in the shape of closed-circuit television (CCTV) and other surveillance modes (Dee). It establishes the need to discern patterns of power and normalisation and the subliminal or obvious cultural codes and categories that emerge through these arrangements (Fopp; Lyon, Electronic; Norris and Armstrong). In their study of CCTV surveillance, Norris and Armstrong (cf. in Dee) point out that when added to the daily minutiae of surveillance, CCTV cameras in public spaces, along with other camera surveillance in work places, capture human beings on a database constantly. The normalisation of surveillance, particularly with reference to CCTV, the popularisation of surveillance through television formats such as ‘Big Brother’ (Dee), and the expansion of online platforms to publish private images, has created a contradictory, complex and contested nature of spatial and power relationships in society. The UK, for example, has the most developed system of both urban and public space cameras in the world and this growth of camera surveillance and, as Lyon (Surveillance) points out, this has been achieved with very little, if any, public debate as to their benefits or otherwise. There may now be as many as 4.2 million CCTV cameras in Britain (cf. Lyon, Surveillance). That is one for every fourteen people and a person can be captured on over 300 cameras every day. An estimated £500m of public money has been invested in CCTV infrastructure over the last decade but, according to a Home Office study, CCTV schemes that have been assessed had little overall effect on crime levels (Wood and Ball). In spatial terms, these statistics reiterate Foucault’s emphasis on the power economy of the unseen gaze. Michel Foucault in analysing the links between power, information and surveillance inspired by Bentham’s idea of the Panopticon, indicated that it is possible to sanction or reward an individual through the act of surveillance without their knowledge (155). It is this unseen and unknown gaze of surveillance that is fundamental to the exercise of power. The design and arrangement of buildings can be engineered so that the “surveillance is permanent in its effects, even if it is discontinuous in its action” (Foucault 201). Lyon (Terrorism), in tracing the trajectory of surveillance studies, points out that much of surveillance literature has focused on understanding it as a centralised bureaucratic relationship between the powerful and the governed. Invisible forms of surveillance have also been viewed as a class weapon in some societies. With the advancements in and proliferation of surveillance technologies as well as convergence with other technologies, Lyon argues that it is no longer feasible to view surveillance as a linear or centralised process. In our contemporary globalised world, there is a need to reconcile the dialectical strands that mediate surveillance as a process. In acknowledging this, Giles Deleuze and Felix Guattari have constructed surveillance as a rhizome that defies linearity to appropriate a more convoluted and malleable form where the coding of bodies and data can be enmeshed to produce intricate power relationships and hierarchies within societies. Latour draws on the notion of assemblage by propounding that data is amalgamated from scattered centres of calculation where these can range from state and commercial institutions to scientific laboratories which scrutinise data to conceive governance and control strategies. Both the Latourian and Deleuzian ideas of surveillance highlight the disparate arrays of people, technologies and organisations that become connected to make “surveillance assemblages” in contrast to the static, unidirectional Panopticon metaphor (Ball, “Organization” 93). In a similar vein, Gandy (Panoptic) infers that it is misleading to assume that surveillance in practice is as complete and totalising as the Panoptic ideal type would have us believe. Co-optation of Millions The Metropolitan Police’s counter-Terrorism strategy seeks to co-opt millions where the corporeal body can complement the landscape of technological surveillance that already co-exists within modernity. In its press release, the role of civilian bodies in ensuring security of the city is stressed; Keeping Londoners safe from Terrorism is not a job solely for governments, security services or police. If we are to make London the safest major city in the world, we must mobilise against Terrorism not only the resources of the state, but also the active support of the millions of people who live and work in the capita. (MPA Website). Surveillance is increasingly simulated through the millions of corporeal entities where seeing in advance is the goal even before technology records and codes these images (William). Bodies understand and code risk and images through the cultural narratives which circulate in society. Compared to CCTV technology images, which require cultural and political interpretations and interventions, bodies as surveillance organisms implicitly code other bodies and activities. The travel bag in the Metropolitan Police poster reinforces the images of the 7/7 bombers and the renewed attempts to bomb the London Underground on the 21st of July. It reiterates the CCTV footage revealing images of the bombers wearing rucksacks. The image of the rucksack both embodies the everyday as well as the potential for evil in everyday objects. It also inevitably reproduces the cultural biases and prejudices where the rucksack is subliminally associated with a specific type of body. The rucksack in these terms is a laden image which symbolically captures the context and culture of risk discourses in society. The co-optation of the population as a surveillance entity also recasts new forms of social responsibility within the democratic polity, where privacy is increasingly mediated by the greater need to monitor, trace and record the activities of one another. Nikolas Rose, in discussing the increasing ‘responsibilisation’ of individuals in modern societies, describes the process in which the individual accepts responsibility for personal actions across a wide range of fields of social and economic activity as in the choice of diet, savings and pension arrangements, health care decisions and choices, home security measures and personal investment choices (qtd. in Dee). While surveillance in individualistic terms is often viewed as a threat to privacy, Rose argues that the state of ‘advanced liberalism’ within modernity and post-modernity requires considerable degrees of self-governance, regulation and surveillance whereby the individual is constructed both as a ‘new citizen’ and a key site of self management. By co-opting and recasting the role of the citizen in the age of Terrorism, the citizen to a degree accepts responsibility for both surveillance and security. In our sociological imagination the body is constructed both as lived as well as a social object. Erving Goffman uses the word ‘umwelt’ to stress that human embodiment is central to the constitution of the social world. Goffman defines ‘umwelt’ as “the region around an individual from which signs of alarm can come” and employs it to capture how people as social actors perceive and manage their settings when interacting in public places (252). Goffman’s ‘umwelt’ can be traced to Immanuel Kant’s idea that it is the a priori categories of space and time that make it possible for a subject to perceive a world (Umiker-Sebeok; qtd. in Ball, “Organization”). Anthony Giddens adapted the term Umwelt to refer to “a phenomenal world with which the individual is routinely ‘in touch’ in respect of potential dangers and alarms which then formed a core of (accomplished) normalcy with which individuals and groups surround themselves” (244). Benjamin Smith, in considering the body as an integral component of the link between our consciousness and our material world, observes that the body is continuously inscribed by culture. These inscriptions, he argues, encompass a wide range of cultural practices and will imply knowledge of a variety of social constructs. The inscribing of the body will produce cultural meanings as well as create forms of subjectivity while locating and situating the body within a cultural matrix (Smith). Drawing on Derrida’s work, Pugliese employs the term ‘Somatechnics’ to conceptualise the body as a culturally intelligible construct and to address the techniques in and through which the body is formed and transformed (qtd. in Osuri). These techniques can encompass signification systems such as race and gender and equally technologies which mediate our sense of reality. These technologies of thinking, seeing, hearing, signifying, visualising and positioning produce the very conditions for the cultural intelligibility of the body (Osuri). The body is then continuously inscribed and interpreted through mediated signifying systems. Similarly, Hayles, while not intending to impose a Cartesian dichotomy between the physical body and its cognitive presence, contends that the use and interactions with technology incorporate the body as a material entity but it also equally inscribes it by marking, recording and tracing its actions in various terrains. According to Gayatri Spivak (qtd. in Ball, “Organization”) new habits and experiences are embedded into the corporeal entity which then mediates its reactions and responses to the social world. This means one’s body is not completely one’s own and the presence of ideological forces or influences then inscribe the body with meanings, codes and cultural values. In our modern condition, the body and data are intimately and intricately bound. Outside the home, it is difficult for the body to avoid entering into relationships that produce electronic personal data (Stalder). According to Felix Stalder our physical bodies are shadowed by a ‘data body’ which follows the physical body of the consuming citizen and sometimes precedes it by constructing the individual through data (12). Before we arrive somewhere, we have already been measured and classified. Thus, upon arrival, the citizen will be treated according to the criteria ‘connected with the profile that represents us’ (Gandy, Panoptic; William). Following September 11, Lyon (Terrorism) reveals that surveillance data from a myriad of sources, such as supermarkets, motels, traffic control points, credit card transactions records and so on, was used to trace the activities of terrorists in the days and hours before their attacks, confirming that the body leaves data traces and trails. Surveillance works by abstracting bodies from places and splitting them into flows to be reassembled as virtual data-doubles, and in the process can replicate hierarchies and centralise power (Lyon, Terrorism). Mike Dee points out that the nature of surveillance taking place in modern societies is complex and far-reaching and in many ways insidious as surveillance needs to be situated within the broadest context of everyday human acts whether it is shopping with loyalty cards or paying utility bills. Physical vulnerability of the body becomes more complex in the time-space distanciated surveillance systems to which the body has become increasingly exposed. As such, each transaction – whether it be a phone call, credit card transaction, or Internet search – leaves a ‘data trail’ linkable to an individual person or place. Haggerty and Ericson, drawing from Deleuze and Guattari’s concept of the assemblage, describe the convergence and spread of data-gathering systems between different social domains and multiple levels (qtd. in Hier). They argue that the target of the generic ‘surveillance assemblage’ is the human body, which is broken into a series of data flows on which surveillance process is based. The thrust of the focus is the data individuals can yield and the categories to which they can contribute. These are then reapplied to the body. In this sense, surveillance is rhizomatic for it is diverse and connected to an underlying, invisible infrastructure which concerns interconnected technologies in multiple contexts (Ball, “Elements”). The co-opted body in the schema of counter-Terrorism enters a power arrangement where it constitutes both the unseen gaze as well as the data that will be implicated and captured in this arrangement. It is capable of producing surveillance data for those in power while creating new data through its transactions and movements in its everyday life. The body is unequivocally constructed through this data and is also entrapped by it in terms of representation and categorisation. The corporeal body is therefore part of the machinery of surveillance while being vulnerable to its discriminatory powers of categorisation and victimisation. As Hannah Arendt (qtd. in Bauman 91) had warned, “we terrestrial creatures bidding for cosmic significance will shortly be unable to comprehend and articulate the things we are capable of doing” Arendt’s caution conveys the complexity, vulnerability as well as the complicity of the human condition in the surveillance society. Equally it exemplifies how the corporeal body can be co-opted as a surveillance entity sustaining a new ‘banality’ (Arendt) in the machinery of surveillance. Social Consequences of Surveillance Lyon (Terrorism) observed that the events of 9/11 and 7/7 in the UK have inevitably become a prism through which aspects of social structure and processes may be viewed. This prism helps to illuminate the already existing vast range of surveillance practices and processes that touch everyday life in so-called information societies. As Lyon (Terrorism) points out surveillance is always ambiguous and can encompass genuine benefits and plausible rationales as well as palpable disadvantages. There are elements of representation to consider in terms of how surveillance technologies can re-present data that are collected at source or gathered from another technological medium, and these representations bring different meanings and enable different interpretations of life and surveillance (Ball, “Elements”). As such surveillance needs to be viewed in a number of ways: practice, knowledge and protection from threat. As data can be manipulated and interpreted according to cultural values and norms it reflects the inevitability of power relations to forge its identity in a surveillance society. In this sense, Ball (“Elements”) concludes surveillance practices capture and create different versions of life as lived by surveilled subjects. She refers to actors within the surveilled domain as ‘intermediaries’, where meaning is inscribed, where technologies re-present information, where power/resistance operates, and where networks are bound together to sometimes distort as well as reiterate patterns of hegemony (“Elements” 93). While surveillance is often connected with technology, it does not however determine nor decide how we code or employ our data. New technologies rarely enter passive environments of total inequality for they become enmeshed in complex pre-existing power and value systems (Marx). With surveillance there is an emphasis on the classificatory powers in our contemporary world “as persons and groups are often risk-profiled in the commercial sphere which rates their social contributions and sorts them into systems” (Lyon, Terrorism 2). Lyon (Terrorism) contends that the surveillance society is one that is organised and structured using surveillance-based techniques recorded by technologies, on behalf of the organisations and governments that structure our society. This information is then sorted, sifted and categorised and used as a basis for decisions which affect our life chances (Wood and Ball). The emergence of pervasive, automated and discriminatory mechanisms for risk profiling and social categorising constitute a significant mechanism for reproducing and reinforcing social, economic and cultural divisions in information societies. Such automated categorisation, Lyon (Terrorism) warns, has consequences for everyone especially in face of the new anti-terror measures enacted after September 11. In tandem with this, Bauman points out that a few suicidal murderers on the loose will be quite enough to recycle thousands of innocents into the “usual suspects”. In no time, a few iniquitous individual choices will be reprocessed into the attributes of a “category”; a category easily recognisable by, for instance, a suspiciously dark skin or a suspiciously bulky rucksack* *the kind of object which CCTV cameras are designed to note and passers-by are told to be vigilant about. And passers-by are keen to oblige. Since the terrorist atrocities on the London Underground, the volume of incidents classified as “racist attacks” rose sharply around the country. (122; emphasis added) Bauman, drawing on Lyon, asserts that the understandable desire for security combined with the pressure to adopt different kind of systems “will create a culture of control that will colonise more areas of life with or without the consent of the citizen” (123). This means that the inhabitants of the urban space whether a citizen, worker or consumer who has no terrorist ambitions whatsoever will discover that their opportunities are more circumscribed by the subject positions or categories which are imposed on them. Bauman cautions that for some these categories may be extremely prejudicial, restricting them from consumer choices because of credit ratings, or more insidiously, relegating them to second-class status because of their colour or ethnic background (124). Joseph Pugliese, in linking visual regimes of racial profiling and the shooting of Jean Charles de Menezes in the aftermath of 7/7 bombings in London, suggests that the discursive relations of power and visuality are inextricably bound. Pugliese argues that racial profiling creates a regime of visuality which fundamentally inscribes our physiology of perceptions with stereotypical images. He applies this analogy to Menzes running down the platform in which the retina transforms him into the “hallucinogenic figure of an Asian Terrorist” (Pugliese 8). With globalisation and the proliferation of ICTs, borders and boundaries are no longer sacrosanct and as such risks are managed by enacting ‘smart borders’ through new technologies, with huge databases behind the scenes processing information about individuals and their journeys through the profiling of body parts with, for example, iris scans (Wood and Ball 31). Such body profiling technologies are used to create watch lists of dangerous passengers or identity groups who might be of greater ‘risk’. The body in a surveillance society can be dissected into parts and profiled and coded through technology. These disparate codings of body parts can be assembled (or selectively omitted) to construct and represent whole bodies in our information society to ascertain risk. The selection and circulation of knowledge will also determine who gets slotted into the various categories that a surveillance society creates. Conclusion When the corporeal body is subsumed into a web of surveillance it often raises questions about the deterministic nature of technology. The question is a long-standing one in our modern consciousness. We are apprehensive about according technology too much power and yet it is implicated in the contemporary power relationships where it is suspended amidst human motive, agency and anxiety. The emergence of surveillance societies, the co-optation of bodies in surveillance schemas, as well as the construction of the body through data in everyday transactions, conveys both the vulnerabilities of the human condition as well as its complicity in maintaining the power arrangements in society. Bauman, in citing Jacques Ellul and Hannah Arendt, points out that we suffer a ‘moral lag’ in so far as technology and society are concerned, for often we ruminate on the consequences of our actions and motives only as afterthoughts without realising at this point of existence that the “actions we take are most commonly prompted by the resources (including technology) at our disposal” (91). References Abrams, Philip. Historical Sociology. Shepton Mallet, UK: Open Books, 1982. Altheide, David. “Consuming Terrorism.” Symbolic Interaction 27.3 (2004): 289-308. Arendt, Hannah. Eichmann in Jerusalem: A Report on the Banality of Evil. London: Faber & Faber, 1963. Bauman, Zygmunt. Liquid Fear. Cambridge, UK: Polity, 2006. Ball, Kristie. “Elements of Surveillance: A New Framework and Future Research Direction.” Information, Communication and Society 5.4 (2002): 573-90 ———. “Organization, Surveillance and the Body: Towards a Politics of Resistance.” Organization 12 (2005): 89-108. Dee, Mike. “The New Citizenship of the Risk and Surveillance Society – From a Citizenship of Hope to a Citizenship of Fear?” Paper Presented to the Social Change in the 21st Century Conference, Queensland University of Technology, Queensland, Australia, 22 Nov. 2002. 14 April 2007 http://eprints.qut.edu.au/archive/00005508/02/5508.pdf>. Deleuze, Gilles, and Felix Guattari. A Thousand Plateaus. Minneapolis: U of Minnesota P, 1987. Fopp, Rodney. “Increasing the Potential for Gaze, Surveillance and Normalization: The Transformation of an Australian Policy for People and Homeless.” Surveillance and Society 1.1 (2002): 48-65. Foucault, Michel. Discipline and Punish: The Birth of the Prison. London: Allen Lane, 1977. Giddens, Anthony. Modernity and Self-Identity. Self and Society in the Late Modern Age. Stanford: Stanford UP, 1991. Gandy, Oscar. The Panoptic Sort: A Political Economy of Personal Information. Boulder, CO: Westview, 1997. ———. “Data Mining and Surveillance in the Post 9/11 Environment.” The Intensification of Surveillance: Crime, Terrorism and War in the Information Age. Eds. Kristie Ball and Frank Webster. Sterling, VA: Pluto Press, 2003. Goffman, Erving. Relations in Public. Harmondsworth: Penguin, 1971. Graham, Stephen, and Simon Marvin. Splintering Urbanism: Networked Infrastructures, Technological Mobilities and the Urban Condition. New York: Routledge, 2001. Hier, Sean. “Probing Surveillance Assemblage: On the Dialectics of Surveillance Practices as Process of Social Control.” Surveillance and Society 1.3 (2003): 399-411. Hayles, Katherine. How We Became Posthuman: Virtual Bodies in Cybernetics, Literature and Informatics. Chicago: U of Chicago P, 1999. Hubbard, Phil. “Fear and Loathing at the Multiplex: Everyday Anxiety in the Post-Industrial City.” Capital & Class 80 (2003). Latour, Bruno. Science in Action. Cambridge, Mass: Harvard UP, 1987 Lyon, David. The Electronic Eye – The Rise of Surveillance Society. Oxford: Polity Press, 1994. ———. “Terrorism and Surveillance: Security, Freedom and Justice after September 11 2001.” Privacy Lecture Series, Queens University, 12 Nov 2001. 16 April 2007 http://privacy.openflows.org/lyon_paper.html>. ———. “Surveillance Studies: Understanding Visibility, Mobility and the Phonetic Fix.” Surveillance and Society 1.1 (2002): 1-7. Metropolitan Police Authority (MPA). “Counter Terrorism: The London Debate.” Press Release. 21 June 2006. 18 April 2007 http://www.mpa.gov.uk.access/issues/comeng/Terrorism.htm>. Pugliese, Joseph. “Asymmetries of Terror: Visual Regimes of Racial Profiling and the Shooting of Jean Charles de Menezes in the Context of the War in Iraq.” Borderlands 5.1 (2006). 30 May 2007 http://www.borderlandsejournal.adelaide.edu.au/vol15no1_2006/ pugliese.htm>. Marx, Gary. “A Tack in the Shoe: Neutralizing and Resisting the New Surveillance.” Journal of Social Issues 59.2 (2003). 18 April 2007 http://web.mit.edu/gtmarx/www/tack.html>. Moores, Shaun. “Doubling of Place.” Mediaspace: Place Scale and Culture in a Media Age. Eds. Nick Couldry and Anna McCarthy. Routledge, London, 2004. Monahan, Teri, ed. Surveillance and Security: Technological Politics and Power in Everyday Life. Routledge: London, 2006. Norris, Clive, and Gary Armstrong. The Maximum Surveillance Society: The Rise of CCTV. Oxford: Berg, 1999. O’Harrow, Robert. No Place to Hide. New York: Free Press, 2005. Osuri, Goldie. “Media Necropower: Australian Media Reception and the Somatechnics of Mamdouh Habib.” Borderlands 5.1 (2006). 30 May 2007 http://www.borderlandsejournal.adelaide.edu.au/vol5no1_2006 osuri_necropower.htm>. Rose, Nikolas. “Government and Control.” British Journal of Criminology 40 (2000): 321–399. Scannell, Paddy. Radio, Television and Modern Life. Oxford: Blackwell, 1996. Smith, Benjamin. “In What Ways, and for What Reasons, Do We Inscribe Our Bodies?” 15 Nov. 1998. 30 May 2007 http:www.bmezine.com/ritual/981115/Whatways.html>. Stalder, Felix. “Privacy Is Not the Antidote to Surveillance.” Surveillance and Society 1.1 (2002): 120-124. Umiker-Sebeok, Jean. “Power and the Construction of Gendered Spaces.” Indiana University-Bloomington. 14 April 2007 http://www.slis.indiana.edu/faculty/umikerse/papers/power.html>. William, Bogard. The Simulation of Surveillance: Hypercontrol in Telematic Societies. Cambridge: Cambridge UP, 1996. Wood, Kristie, and David M. Ball, eds. “A Report on the Surveillance Society.” Surveillance Studies Network, UK, Sep. 2006. 14 April 2007 http://www.ico.gov.uk/upload/documents/library/data_protection/ practical_application/surveillance_society_full_report_2006.pdf>. Citation reference for this article MLA Style Ibrahim, Yasmin. "Commodifying Terrorism: Body, Surveillance and the Everyday." M/C Journal 10.3 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0706/05-ibrahim.php>. APA Style Ibrahim, Y. (Jun. 2007) "Commodifying Terrorism: Body, Surveillance and the Everyday," M/C Journal, 10(3). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0706/05-ibrahim.php>.
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!

Vá para a bibliografia