Journal articles: 'John A. Roebling's Sons Company' – Grafiati (2024)

  • Bibliography
  • Subscribe
  • News
  • Referencing guides Blog Automated transliteration Relevant bibliographies by topics

Log in

Українська Français Italiano Español Polski Português Deutsch

We are proudly a Ukrainian website. Our country was attacked by Russian Armed Forces on Feb. 24, 2022.
You can support the Ukrainian Army by following the link: https://u24.gov.ua/. Even the smallest donation is hugely appreciated!

Relevant bibliographies by topics / John A. Roebling's Sons Company / Journal articles

To see the other types of publications on this topic, follow the link: John A. Roebling's Sons Company.

Author: Grafiati

Published: 4 June 2021

Last updated: 26 February 2023

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Consult the top 44 journal articles for your research on the topic 'John A. Roebling's Sons Company.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Sinkins, John. "Wildy & Sons Ltd: the Benchmark for Law Bookselling and Publishing since 1830." Legal Information Management 19, no.3 (September 2019): 176–83. http://dx.doi.org/10.1017/s1472669619000422.

Full text

Abstract:

AbstractIn this article, John Sinkins, Chairman of Wildy & Sons Ltd, outlines a brief history of the company and how his family have been involved since 1895. It describes how the company has evolved, particularly since the turn of the millennium. He describes his personal journey and that of the company since he joined in 1968, more than 50 years ago.

APA, Harvard, Vancouver, ISO, and other styles

2

Kiguradze,I., and Z.Sokhadze. "On Singular Functional Differential Inequalities." gmj 4, no.3 (June 1997): 259–78. http://dx.doi.org/10.1515/gmj.1997.259.

Full text

Abstract:

Abstract Classical theorems on differential inequalities [Coddington and Levinson, Theory of ordinary differential equations, Mc Graw-Hill Book Company, Inc., 1995, Hartman, Ordinary differential equations, John Wiley & Sons, 1964, Walter, Differential and integral inequalities, Springer-Verlag, 1970] are generalized for initial value problems of the kind and where ƒ : C([a, b]; Rn ) → Lloc (]a, b]; Rn ) is a singular Volterra operator, c 0 ∈ Rn , h : [a, b] → [0, +∞[ is continuous and positive on ]a, b], ‖ · ‖ is a norm in Rn , and [u]+ and [u]– are respectively the positive and the negative part of the vector u ∈ Rn .

APA, Harvard, Vancouver, ISO, and other styles

3

Chandra, Kelvin, and Wella Wella. "Measuring Operational Management Information Technology: COBIT 5.0 and Capability Level." International Journal of New Media Technology 4, no.1 (June21, 2017): 37–41. http://dx.doi.org/10.31937/ijnmt.v4i1.536.

Full text

Abstract:

Abstrack—Every system need to be well organized so it can achieve what the company expected. So, very company need to do some measurement to create a well organize system. A type of action that can be used for creating a well organize system is quantify their IT governance PT XYZ is a company that engaged in property business. Their company want to measure their IT governance, to measured their IT governance framework COBIT 5.0 was use and as what the company request process that being measure are Manage Service Agreements, Manage Change, Manage Operations, and Manage Service Request and Incidents. Every process have their own importance and will be measured based on framework COBIT 5.0 capabilitylevel. Capability level have 5 kind of stage. PT XYZ expectation that they can achieved level 4. But, the esult that came out doesn’t match what their company has expected, the result was level 3 and on of their process stop at level 2. So, to attain the level that PT XYZ wanted they need to some improvement based on COBIT 5.0 recommendation. Index Terms—Capability Level, COBIT 5.0, Information System, IT Governance. REFERENCES [1] S. Tata, “Sistem Informasi Manajemen,” Yogyakarta, Andi, 2005. [2] R. Weber, “Information System Control and Audit,” Prentice Hall, New Jersey, 1999. [3] Kompas. http://tekno.kompas.com. 24 Agustus 2016. [4] BCA.http://www.bca.co.id/id/TentangBCA/Korporasi/Siaran-Pers/2016/02/09/04/48/Terapkan-ISO9001-2008. 25 Agustus 2016. [5] ISACA, http://www.isaca.org/. 23 August 2016. [6] Gondodiyoto et al., “Pengolahan Fungsi Audit Sistem Informasi,” Penerbit Mitra Wacana Media, Jakarta, 2007. [7] E. J. Hunton, “Core Concept of Information Technology Auditing,” New Jersey, John Willey and Sons Inc, 2004.

APA, Harvard, Vancouver, ISO, and other styles

4

Veiga,JohnF. "Managerial Courage: Revitalizing Your Company Without Sacrificing Your JobManagerial Courage: Revitalizing Your Company Without Sacrificing Your Job. By HornsteinHarvey A. New York: John Wiley & Sons, 1986. 224 pages. $18.95." Academy of Management Perspectives 1, no.1 (February 1987): 71–73. http://dx.doi.org/10.5465/ame.1987.4275912.

Full text

APA, Harvard, Vancouver, ISO, and other styles

5

Heap,R.B., and R.G.Dyer. "Sir Barry Albert Cross, C. B. E. 17 March 1925–27 April 1994." Biographical Memoirs of Fellows of the Royal Society 44 (January 1998): 95–108. http://dx.doi.org/10.1098/rsbm.1998.0007.

Full text

Abstract:

Barry Cross was born at Coulsden, Surrey, the second son of Hubert and Elsie Cross (nee Richards). Hubert Cross was a life assurance cashier with Scottish Provident in the City of London. In the First World War he served with the Honorable Artillery Company in Palestine as ‘a private and proud of it’. Untroubled by career ambitions he was content with a routine job, family life, and playing rugby at county level. His sons remembered him as kind, firm and a little distant, while their mother was more indulgent and the provider of puddings. With the possible exception of Penuel Cross, a paternal great–grandfather, who was a bass chorister and lay vicar at Winchester Cathedral for 43 years, there was little trace of a creative or scholarly impulse on either Barry's father's or mother's side. Yet Barry and his younger brother John (who became Professor of Politics at University College Cardiff) had academic ambitions and well thought–out career goals from an early age. As Barry was later to write:

APA, Harvard, Vancouver, ISO, and other styles

6

Beam,HenryH. "Transformational Learning: Renewing Your Company Through Knowledge and SkillsBy Tobin Daniel R., New York: John Wiley & Sons, Inc., 1996. 283 pages, hard cover, $29.95." Academy of Management Perspectives 10, no.3 (August 1996): 73–75. http://dx.doi.org/10.5465/ame.1996.9704111481.

Full text

APA, Harvard, Vancouver, ISO, and other styles

7

Truxillo,DonaldM. "Steven T.Hunt. Commonsense Talent Management: Using Strategic Human Resources to Improve Company Performance. San Francisco, CA: John Wiley & Sons, 2014, 464 pages, $50.00 paperback." Personnel Psychology 68, no.2 (May22, 2015): 453–55. http://dx.doi.org/10.1111/peps.12102_4.

Full text

APA, Harvard, Vancouver, ISO, and other styles

8

Manan, Rustam Hakim. "ANALISIS TERHADAP TINGKAT REVENUE PERUSAHAAN PRODUSEN TANAMAN HIAS TERHADAP PENGELUARAN BIAYA PROMOSI SEBAGAI BAGIAN DARI SISTEM PENJUALAN PRODUKNYA." PENELITIAN DAN KARYA ILMIAH 1, no.1 (May30, 2016): 57. http://dx.doi.org/10.25105/pdk.v1i1.432.

Full text

Abstract:

Enterprises producers of ornamental plants mostly in the form of UKM that has not been touched by the thought of utilizing advertising as a means of promotion merchandise. A phenomenon that perceives that the cost of advertising spending for the promotion, will bring revenue burden for entrepreneurs producers of ornamental plants. Therefore, the author tries to see how the level of income of a company producer of the promotional expenses. Data obtained books adapted by Carter Hill, William Griffiths, George Judge, in the book Undergraduate Econometrics, John Willey & Sons Inc., New York, 1988. The data are taken as many as 15 pieces with variable between the levels of income/revenue expenditure promotional costs. That is the level of income is influenced by promotional expenses. Thus the dependent variable (Y) is the income and promotion expenses (X). This paper will attempt to provide an analysis of the level of revenue company producers of ornamental plants against promotion expenses as part of the system sales of its products. The assumption is estimated that revenue will increase when enlarged promotional expenses. The purpose of the description in this paper is to discuss the hypothesis of economic phenomena, especially on the behavior and function of the company's revenue with the cost of sale (in this case the cost of advertising). The methodology used is through the approach of econometrics at the company's plant landscaping and regression analysis (linear) with SPSS method. From the discussion, we concluded among other things, income / revenue are highly dependent on spending promotional / advertising. Therefore if the company will still generate the maximum benefit it is necessary expenses advertising costs.

APA, Harvard, Vancouver, ISO, and other styles

9

Grund,NancyE. "Company of Heroes: Unleashing the Power of Self-LeadershipBy SimsHenry P.Jr. and ManzCharles C., New York: John Wiley & Sons, 1996, 262 pages, hard cover, $24.95." Academy of Management Perspectives 10, no.2 (May 1996): 77–79. http://dx.doi.org/10.5465/ame.1996.9606161548.

Full text

APA, Harvard, Vancouver, ISO, and other styles

10

Lettieri, Ron. "Book Review: Company of Heroes: Unleashing The Power of Self-Leadership Sims Jr., Henry P. and Manz, Charles C. New York: John Wiley & Sons, Inc., 1996, 262 pp. $24.95, cloth." Journal of Leadership Studies 4, no.2 (April 1997): 169–71. http://dx.doi.org/10.1177/107179199700400215.

Full text

APA, Harvard, Vancouver, ISO, and other styles

11

Sherrod,MichaelJ. "Modern Strategy for Preclinical Pharmaceutical R&D: Towards the Virtual Research Company By David Cavalla, with contributions from John Flack and Richard Jennings. John Wiley & Sons, Chichester, England. 1997. x + 218 pp. 15.5 × 23.5 cm. ISBN 0-471-97117-0. Price Unavailable: (hbk: alk. paper)." Journal of Medicinal Chemistry 41, no.2 (January 1998): 259–60. http://dx.doi.org/10.1021/jm970756h.

Full text

APA, Harvard, Vancouver, ISO, and other styles

12

Stockman,RobertA. "Protective Groups in Organic Synthesis. 3rd Edition By Theodora W. Greene (The Rowland Institute for Science) and Peter G. M. Wuts (Pharmacia and Upjohn Company). John Wiley and Sons, Inc.: New York. 1999. xxi + 747 pp. $84.95. ISBN 0-471-16019-9." Journal of the American Chemical Society 122, no.2 (January 2000): 426. http://dx.doi.org/10.1021/ja995719p.

Full text

APA, Harvard, Vancouver, ISO, and other styles

13

Silva, Joao Carlos Marques, and José Azevedo Pereira. "Taking the highway out: exiting the stock market to maximize results." CASE Journal 18, no.2 (December29, 2021): 170–219. http://dx.doi.org/10.1108/tcj-01-2021-0020.

Full text

Abstract:

Theoretical basis The essence of discounted cash flow valuation is simple; the asset is worth the expected cash flows it will generate, discounted to the reference date for the valuation exercise (normally, the day of the calculation). A survey article was written in Parker (1968), where it was stated that the earliest interest rate tables (use to discount value to the present) dated back to 1340. Works from Boulding (1935) and Keynes (1936) derived the IRR (Internal Rate of Return) for an investment. Samuelson (1937) compared the IRR and NPV (Net Present Value) approaches, arguing that rational investors should maximize NPV and not IRR. The previously mentioned works and the publication of Joel Dean’s reference book (Dean, 1951) on capital budgeting set the basis for the widespread use of the discounted cash flow approach into all business areas, aided by developments in portfolio theory. Nowadays, probably the model with more widespread use is the FCFE/FCFF (Free Cash Flow to Equity and Free Cash Flow to Firm) model. For simplification purposes, we will focus on the FCFE model, which basically is the FCF model’s version for the potential dividends. The focus is to value the business based on its dividends (potential or real), and thus care must be taken in order not to double count cash flows (this matter was treated in this case) and to assess what use is given to that excess cash flow – if it is invested wisely, what returns will come of them, how it is accounted for, etc. (Damodaran, 2006). The bridge to the FCFF model is straightforward; the FCFF includes FCFE and added cash that is owed to debtholders. References: Parker, R.H. (1968). “Discounted Cash Flow in Historical Perspective”, Journal of Accounting Research, v6, pp58-71. Boulding, K.E. (1935). “The Theory of a Single Investment”, Quarterly Journal of Economics, v49, pp479-494. Keynes, J. M. (1936). “The General Theory of Employment”, Macmillan, London. Samuelson, P. (1937). “Some Aspects of the Pure Theory of Capital”, Quarterly Journal of Economics, v51, pp. 469–496. Dean, Joel. (1951). “Capital Budgeting”, Columbia University Press, New York. Damodaran, A. (2006). “Damodaran on Valuation”, Second Edition, John Wiley and Sons, New York. Research methodology All information is taken from public sources and with consented company interviews. Case overview/synopsis Opportunities for value creation may be found in awkward and difficult circ*mstances. Good strategic thinking and ability to act swiftly are usually crucial to be able to take advantage of such tough environments. Amidst a country-wide economic crisis and general disbelief, José de Mello Group (JMG) saw one of its main assets’ (Brisa Highways) market value tumble down to unforeseen figures and was forced to act on it. Brisa’s main partners were eager in overpowering JMG’s control of the company, and outside pressure from Deutsche Bank was rising, due to the use of Brisa’s shares as collateral. JMG would have to revise its strategy and see if Brisa was worth fighting for; the market implicit assessment about the company’s prospects was very penalizing, but JMG’s predictions on Brisa’s future performance indicated that this could be an investment opportunity. Would it be wise to bet against the market? Complexity academic level This study is excellent for finance and strategy courses, at both undergraduate and graduate levels. Company valuation and corporate strategy are required.

APA, Harvard, Vancouver, ISO, and other styles

14

Little,R.Daniel. "Protective Groups in Organic Synthesis, 3rd Edition Theodora W. Green (The Rowland Institute for Science) and Peter G. M. Wuts (Pharmacia and Upjohn Company). John Wiley & Sons, Inc., New York, NY. 1999. xxi + 779 pp. 15.5 × 23 cm. $84.95. ISBN 0-471-16019-9." Journal of Natural Products 62, no.9 (September 1999): 1349. http://dx.doi.org/10.1021/np9907578.

Full text

APA, Harvard, Vancouver, ISO, and other styles

15

Co, Kimon Irvin. "correlation of human capital sustainability leadership style and resilience of the managers in airline operations group of an AIRLINE Company." Bedan Research Journal 7, no.1 (April30, 2022): 89–127. http://dx.doi.org/10.58870/berj.v7i1.34.

Full text

Abstract:

This study aimed to analyze the correlation between Human Capital Sustainability Leadership style and manager resilience through a pragmatic worldview. Using explanatory sequential mixed methods research design (QUAN→qual), respondents covered were managers from the Airline Operations Group of an AIRLINE Company with at least one year of managerial experience within the organization. In the quantitative phase, Human Capital Sustainability Leadership Scale by Di Fabio and Peiro (2018) and Domain-Specific Resilient Systems Scales (DRSSWork) by Maltby, Day, Hall, and Chivers (2019) were used for the online survey. Forty-five (45) eligible respondents have participated. Mean, standard deviation, and Spearman rank correlation coefficient were employed. To further explain the quantitative results, one-on-one qualitative interviews were done with eight (8) key informants, face-toface and online. Themes were identified. Results showed that Human Capital Sustainability Leadership style was exhibited by the Airline Operations Group managers to a very high degree while resilience was exhibited to a high degree. There was a linear, positive, and highly significant correlation between Human Capital Sustainability Leadership style and resilience. Each aspect of the Human Capital Sustainability Leadership style was positively, highly, and significantly correlated with manager resilience. Through triangulation, a model of leadership styles and manager resiliency was built. To implement the model, implications for a management development program were identified.ReferencesAcosta, H., Cruz-Ortiz, V., Salanova, M., & Llorens S. (2015). Healthy organization: Analysing its meaning based on the HERO model. Revista de Psicologia Social, 30 (2), 323-350. http://dx.doi.org/10.1080/21711976.2015.1016751.Ashegi, M. & Hashemi, E. (2019). The relationship of mindfulness with burnout & adaptive performance with the mediatory role of resilience among Iranian employees. Annals of Military and Health Sciences Research, 17 (1), 1-7. doi: 10.512/amh.87797.Aust, I., Matthews, B., & Muller-Camen, M. (2020). Common good HRM: A paradigm shift in sustainable HRM? Human Resource Management Review, 30 (3), 100705. https://doi.org/10.1016/j.hrmr.2019.100705.Barasa, E., Mbau, R., & Gilson, L. (2018). What is resilience & how it can be nurtured? A systematic review of empirical literature on organizational resilience. International Journal of Health Policy & Management, 7 (6), 491-503. https://doi.org/10.15171/ijhpm.2018.06.Bendell, J. & Little, R. (2015). Seeking sustainability leadership. Journal of Corporate Citizenship, 60, 13-26. https://doi.org/10.9744/GLEAF.4700.2015.de.00004.Bernard, H., Wutich, A., & Ryan, G. (2017). Analyzing qualitative data: Systematic approaches (2nd ed.). SAGE Publications Inc. Callegaro, M., Lozar Manfreda, K., & Vehovar, V. (2015). Web survey methodology. SAGE Publications.Caniels, M. & Hatak, I. (2019). Employee resilience: Considering both of the social side & the economic side of leader-follower exchanges in conjunction with the dark side of followers’ personality. The International Journal of Human Resource Management, 1-32. https://doi.org/10.1080/09585192.2019.1695648.Chinyerere, E. & Sandada, M. (2018). Job related outcomes in relation to servant leadership. Euro Economica, 1 (37), 138-150.Coetzer, M., Bussin, M., & Geldenhuys, M. (2017). The functions of a servant leader. Administrative Sciences, 7 (5), 1-32. https://doi.org/10.3390/admsci7010005.Cochran, W. (1977). Sampling techniques (3rd ed.). John Wiley & Sons.Creswell, J. (2015). Educational research: Planning, conducting, & evaluating quantitative & qualitative research (5th ed.). Pearson Education, Inc.Creswell, J. & Creswell, J. (2018). Research design: Qualitative, quantitative, & mixed methods approaches (5th ed.). SAGE Publications Inc.Creswell, J. & Plano Clark, V. (2018). Designing & conducting mixed methods research (3rd ed.). SAGE Publications Inc.Creswell, J. & Poth, C. (2018). Qualitative inquiry & research design: Choosing among five approaches (4th ed.). SAGE Publications Inc. Denzin, N. (1978). The research act: A theoretical introduction to sociological methods (2nd ed.). McGraw-Hill.Di Fabio, A. (2017). The psychology of sustainability & sustainable development for well-being in organizations. Frontiers in Psychology, 8, 1534, 1-7. https://doi.org/10.3389/fpsyg.2017.01534.Di Fabio, A. & Peiro, J. M. (2018). Human capital sustainability leadership to promote sustainable development and healthy organizations: A new scale. Sustainability, 10, 2413, 1-11. https://doi.org/10.3390/su10072413.Di Fabio, A. & Rosen, M. (2018). Opening the black box of psychological processes in the science of sustainable development: A new frontier. European Journal of Sustainable Development Research, 2 (4), 47, 1-5. doi: https://doi.org/10.20897/ejosdr/3933.Dooley, L., Alizadeh, A., Qiu, S., & Wu, H. (2020). Does servant leadership moderate the relationship between job stress and physical health? Sustainability, 12, 6591, 1-13. https://doi.org/10.3390/su12166591.duch*ek, S. (2020). Organizational resilience: A capability-based conceptualization. Business Research, 13, 215-246. https://doi.org/10.1007/s40685-019-0085-7.Ehnert, I. (2009). Sustainable human resource management: A conceptual & exploratory analysis from a paradox perspective. Physica-Verlag.Espiner, S., Orchiston, C., & Higham, J. (2017). Resilience & sustainability: A complementary relationship? Towards a practical conceptual model for the sustainability-resilience nexus in tourism. Journal of Sustainable Tourism, 1-16. http://dx.doi.org/10.1080/09669582.2017.1281929.Folke, C. (2016). Resilience (Republished). Ecology & Society, 21 (4), 44, 1-30. https://doi.org/10.5751/ES-09088-210444.Fraenkel, J., Wallen, N., & Hyun, H. (2012). How to design and evaluate research in education (8th ed.). McGraw-Hill.Guest, D. (2017). Human resource management and employee well-being: Towards a new analytic framework. Human Resource Management Journal, 27 (1), 22-38. https://doi.org/10.1111/1748-8583.12139.Guest, G., MacQueen, K., & Namey, E. (2012). Applied thematic analysis. SAGE Publications Inc.Hahn, T., Pinkse, J., Preuss, L., & Higge, F. (2015). Tensions in corporate sustainability: Towards an integrative framework. Journal of Business Ethics, 127, 297-316. https://doi.org/10.1007/s10551-014-2047-5.Hahs-Vaughn, D. & Lomax, R. (2020). An introduction to statistical concepts (4th ed.). Routledge.Hair, J., Jr., Page, M., & Brunsveld, N. (2020). Essentials of business research methods (4th ed.). Routledge.Heizmann, H. & Liu, H. (2018). Becoming green, becoming leaders: Identity narratives in sustainability leadership development. Management Learning, 49 (1), 40-58. https://doi.org/10.1177/1350507617725189.Hoeppe, J. (2014). Practitioner’s view on sustainability: The case of a German bank. In I. Ehnert, W. Harry, & K. Zink (Eds.), Sustainability & human resource management: Developing sustainable business organizations. CSR, Sustainability, Ethics & Governance (pp. 273-294). Springer-Verlag. https://doi.org/10.1007/978-3- 642-37524-8.Holling, C. (1973). Resilience & stability of ecological systems. Annual Review of Ecology & Systematics, 4, 1-23. https://doi.org/10.1146/annurev.es.04.110173.000245.Holling, C. (1996). Engineering resilience versus ecological resilience. In P. Schulze (Ed.), Engineering within ecological constraints (pp. 31-44). The National Academies Press. https://doi.org/10.17226/4919.Kimura, T. & Nishikawa, M. (2018). Ethical leadership & its cultural & institutional context: An empirical study in Japan. Journal of Business Ethics, 151 (3), 707-724. https://doi.org/10.1007/s10551-016-3268-6.King, E. & Badham, R. (2018). The wheel of mindfulness: A generative framework for second-generation mindful leadership. Mindfulness, 11 (1), 166-176. doi: https://doi.org/10.1007/s12571-018-0890-7.King, N., Harrocks, C., & Brooks, J. (2019). Interviews in qualitative research (2nd ed.). SAGE Publications Inc.Kira, M. & Lifvergren, S. (2014). Sowing seeds for sustainability in work systems. In I. Ehnert, W. Harry, & K. Zink (Eds.), Sustainability & human resource management: Developing sustainable business organizations. CSR, Sustainability, Ethics & Governance (pp. 57-81). Germany: Springer-Verlag. https://doi.org/10.1007/978-3-642-37524-8.Kossek, E. & Perrigino, M. (2016). Resilience: A review using grounded integrated occupational approach. The Academy of Management Annals, 10 (1), 729-797. http://dx.doi.org/10/1080/19416520.2016.1159878.Lincoln, Y. & Guba, E. (1985). Naturalistic inquiry. Sage.Linnenluecke, M. (2017). Resilience in business and management research: A review of influential publications and a research agenda. International Journal of Management Reviews, 19, 4-30. https://doi.org/10.1111/ijmr.12076.Liu, Y., Cooper, C., & Tarba, S. (2019). Resilience, wellbeing and HRM: A multidisciplinary perspective. The International Journal of Human Resource Management, 30 (8), 1227-1238. https://doi.org/10.1080/0985192.2019.1565370.Luthans, F. (2002). The need for and meaning of positive organizational behavior. Journal of Organizational Behavior, 23, 695-706. https://doi.org/10.1002/job.165.Malaya, M. (2018). Statistical pitfalls & fallacies in applied research. Management Digest, 2 (1), 1-9. San Beda University Graduate School of Business.Malik, P., & Garg, P. (2018). Psychometric testing of the resilience at work scale using Indian sample. Vikalpa: The Journal for Decision Makers, 43 (2), 77-91. https://doi.org/10.1177/0256090918773922.Maltby, J., Day, L., Flowe, H., Vostanis, P., & Chivers, S. (2019). Psychological trait resilience within ecological systems theory: The resilient systems scale. Journal of Personality Assessment, 101 (1), 44-53. https://doi.org/10.1080/00223891.2017.1344985.Maltby, J., Day, L., & Hall, S. (2015). Refining trait resilience: Identifying engineering, ecological, and adaptive facets from extant measures of resilience. PLos ONE, 10 (7), 1-27. https://doi.org/10.1371/journal.pone.0131826.Maltby, J., Day, L., Hall, S., & Chivers, S. (2019). The measurement and role of ecological resilience systems theory across domain-specific outcomes: The domain-specific resilient systems scales. Assessment, 26 (8), 1444-1461. https://doi.org/10.1177/1073191117738045.Mascarenhas, A. & Barbosa, A. (2019). Sustainable human resource management and social and environmental responsibility: An agenda for debate. Revista De Administração De Empresas, 59 (5), 353-364. http://dx.doi.org/10.1590/S0034-759020190505.Mea, W. & Sims, R. (2019). Human dignity-centered business ethics: A conceptual framework for business leaders. Journal of Business Ethics, 160, 53-69. https://doi.org/10.1007/s10551-018-3929-8.Mergenthaler, E. & Stinson, C. (1992). Psychotherapy transcription standards. Psychotherapy Research, 2 (2), 125-142. https://doi.org/10.1080/10503309212331332904.Mitsakis, F. (2019). Human resource development (HRD) resilience: A new ‘success element’ of organizational resilience? Human Resource Development International, 1-8. https://doi.org/10.1080/13678868.2019.1669385.Molino, M., Cortese, C., & Ghislieri, C. (2019). Unsustainable working conditions: The association of destructive leadership, use of technology, & workload with workaholism & exhaustion. Sustainability, 11, 446, 1-14. https://doi.org/10.3390/su11020446.Nesselroade, K., Jr. & Grimm, L. (2019). Statistical applications for the behavioral & social sciences (2nd ed.). John Wiley & Sons Inc.Nguyen, Q., Kuntz, J., Naswall, K., & Malinen, S. (2016). Employee resilience and leadership styles: The moderating role of proactive personality and optimism. New Zealand Journal of Psychology, 45 (2), 13-21.Patton, M. (2015). Qualitative research and evaluation methods: Integrating theory and practice (4th ed.). SAGE Publications Inc.Paul, H., Bamel, U., & Garg, P. (2016). Employee resilience & OCB: Mediating effects of organizational commitment. Vikalpa: The Journal for Decision Makers, 41 (4), 308-324. https://doi.org/10.1177/0256090916672765.Pereira, V., Temouri, Y., & Patel, C. (2020). Exploring the role and importance of human capital in resilient high performing organisations: Evidence from business clusters. Applied Psychology, 69 (3), 769-804. https://doi.org/10.1111/apps.12204.Pillay, D. (2020). Positive affect & mindfulness as predictors of resilience amongst women leaders in higher education institutions. SA Journal of Human Resource Management/SA Tydskrif vir Menslikehulpbronbestuur, 18 (0), a1260, 1-10. https://doi.org/10.4102/sajhrm.v18i0.1260.Rai, R. & Prakash, A. (2016). How do servant leaders ignite absorptive capacity? The role of epistemic motivation and organizational support. Journal of Work & Organizational Psychology, 32, 123-134. http://doi.dx.org/10.1016/j.rpto.2016.02.001.Rangachari, P. & Woods, J. (2020). Preserving organizational resilience, patient safety, staff retention during COVID-19 requires a holistic consideration of the psychological safety of healthcare workers. International Journal of Environmental Research & Public Health, 17, 4267, 1-13. https://doi.org/10.3390/ijerph17124267.Ritchie-Dunham, J. (2014). Mindful leadership. In A. Ie, C. Ngnoumen, & E. Langer (Eds.), The Wiley Blackwell handbook of mindfulness (pp. 443-457). John Wiley & Sons, Ltd.Rodriguez-Olalla, A. & Aviles-Palacios, C. (2017). Integrating sustainability in organizations: An activity-based sustainability model. Sustainability, 9, 1072, 1-17. https://doi.org/10.3390/su9061072.Ryan, G. & Bernard, H. (2003). Techniques to identify themes. Field Methods, 15 (1), 85-109. https://doi.org/10.1177/1525822X02239569.Salanova, M., Llorens, S., & Martinez, I. (2016). Contributions from positive organizational psychology to develop healthy and resilient organizations. Papeles del Psicologo, 37 (3), 177-184.Saunders, M., Lewis, P., & Thronhill, A. (2019). Research methods for business students (8th ed.). Pearson Education Limited.Schindler, P. (2019). Business research methods (13th Ed). McGraw-Hill/Irwin.Securities and Exchange Commission (November 22, 2016). Code of corporate governance for publicly-listed companies. https://www.sec.gov.ph/mc-2016/mc-no-19-s-2016/.Spradley, J. (1979). The ethnographic interview. Holt, Rinehart, & Winston, Inc.Suriyankietkaew, S. & Petison, S. (2019). A retrospective & foresight: Bibliometric review of international research on strategic management for sustainability, 1991 – 2019. Sustainability, 12, 91, 1-27. https://doi.org/10.3390/su12010091.Tang, G., Kwan, H., Zhang, D., & Zhu, Z. (2016). Work-family effects of servant leadership: The roles of emotional exhaustion and personal learning. Journal of Business Ethics, 137, 285-297. https://doi.org/10.1007/s10551-015-2559-7.Tejada, J. & Punzalan, J. (2012). On the misuse of Slovin’s formula. The Philippine Statistician, 61 (1), 129-136.Tokarz, A. & Malinowska, D. (2019). From psychological theoretical assumptions to new research perspectives in sustainability & sustainable development: Motivation in the workplace. Sustainability, 11, 2222, 1-16. https://doi.org/10.3390/su11082222.Vreeling, K., Kersemaekers, W., Cillessen, L., van Dierendonck, D., & Speckens, A. (2019). How medical specialists experience the effects of a mindful leadership course on their leadership capabilities: A qualitative interview study in Netherlands. BMJ Open, 9 (12), 1-11. https://doi.org/10.1136/bmjopen-2019-031643.Winwood, P. C., Colon, R., & McEwen, K. (2013). A practical measure of workplace resilience: Developing the resilience at work scale. Journal of Occupational and Environmental Medicine, 55 (10), 1205-1212. doi: 10.1097/JOM.0b013e3182a2a60a.Xu, L. & Kajikawa, Y. (2018). An integrated framework for resilience research: A systematic review based on citation network analysis. Sustainability Science, 13, 235-254 https://doi.org/10.1007/s11625-017-0487-4.Xu, L., Marinova, D., & Guo, X. (2015). Resilience thinking: A renewed system approach for sustainability science. Sustainability Science, 10, 123-138. https://doi.org/10.1007/s11625-014-0274-4.Yin, R. (2016). Qualitative research from start to finish (2nd ed.). The Guilford Press.Yousaf, K., Abid, G., Butt, T., Ilyas, S., & Ahmed, S. (2019). Impact of ethical leadership & thriving at work on psychological wellbeing of employees: Mediating role of voice behaviour. Business, Management and Education, 17 (2), 194-217. https://doi.org/10.3846/bme.2019.11176.Zhu, W., Zheng, X., He, H., Wang, G., & Zhang, X. (2019). Ethical leadership with both “moral person” & “moral manager” aspects: Scale development & cross-cultural validation. Journal of Business Ethics, 158 (2), 547-565. doi: https://doi.org/10.1007/s10551-017-3740-y.

APA, Harvard, Vancouver, ISO, and other styles

16

Felicia and Rizka Indri Arfianti. "PENGARUH LEVEL DIVERSIFIKASI, JUMLAH SEGMEN, DAN JENIS SEKTOR INDUSTRI TERHADAP KINERJA PERUSAHAAN PADA PERUSAHAAN MANUFAKTUR YANG TERDAFTAR DI BURSA EFEK INDONESIA TAHUN 2016 – 2018." Jurnal Akuntansi 9, no.2 (August15, 2020): 73–92. http://dx.doi.org/10.46806/ja.v9i2.762.

Full text

Abstract:

The high competition in the business world with many competitors has forced the company to develop its business, one of them by diversification. This study aims to investigate the influence of diversification level, segment numbers, and industrial sector types on firm performance measured by the excess value. The theory underlying this research is agency theory, which describes the relationship between the company owner with the company management, The number of samples of this study are 333 companies from miscellaneous industry sector, and consumer goods sector, and basic industry and chemicals sector listed on the Indonesia Stock Exchange throughout 2017 – 2018. The results showed that data can be pooled for 3 years, all classic assumption tests are fulfilled, and partial regression coefficient test found that variable diversification level and variable number of segments > 0.05, then Ho1 and Ho2 rejected, while type of miscellaneous industry sector and Type of consumer goods sector <0.05, then Ho3 and Ho4 received. The conclusion showed that variable diversification level and variable number of segments has not sufficient evidence of negative effect on excess value, while type of miscellaneous industry sector and Type of consumer goods sector sufficient evidence of negative effect on excess value. Keywords: Firm Performance, Diversification Level, Number of Segments, and Industrial Sector. References: Amyulianthy, R., & Nuraini, Sari. (2013), “Pengaruh Diversifikasi Terhadap Kinerja Perusahaan”, Binus Business Review, Vol.4, no.1, pp.215–230. Berger, P. G., & Eli, O. (1995), “Diversification’s Effect on Firm Value”, Journal of Financial Economics, Vol.37, pp.39–65. Bowerman, B. L., O’Connell, R. T., & Murphree, E. S. (1979), Business Statistics in Practice, Edisi 7, New York: McGraw-Hill/Irwin. Chandra, D., & Triyani, Y. (2015), “Pengaruh Level Diversifikasi, Leverage, Return On Asset, Umur Perusahaan, Dan Sektor Industri Terhadap Nilai Perusahaan Yang Terdaftar Di BEI Periode 2009-2011”, Jurnal Akuntansi Manajemen, Vol.4, no.2, pp.66–84. Cooper, D. R., & Schindler, P. S. (2013), Business Research Methods, Edisi 12, New York: McGraw-Hill. 'Diversifikasi Usaha, Unilever Masuk Bisnis Saus Sambal' (2018), CNBC Indonesia, 28 September, diakses 9 Oktober 2019, https://www.cnbcindonesia.com/market/20180928100757-17-35152/diversifikasi-usaha-unilever-masuk-bisnis-saus-sambal Ghozali, I. (2013), Aplikasi Analisis Multivariette Dengan Program IBM SPSS 23, Edisi 8, Semarang: Badan Penerbit Universitas Diponegoro. Gujarati, D., & Dawn, P. (2009), Basic Econometrics, Edisi 4, New York: McGraw-Hill. Harto, P. (2005), “Kebijakan Diversifikasi Perusahaan Dan Pengaruhnya Terhadap Kinerja: Studi Empiris Pada Perusahaan Publik Di Indonesia”, SNA VIII Solo, pp.297-307. Ikatan Akuntan Indonesia (2014), Standar Akuntansi Keuangan, Jakarta: Salemba Empat. Jensen, M. C., & William, H. M. (1976), "Theory of The Firm: Managerial Behavior, Agency Cost and Ownership Structure", Journal of Financial Economic, Vol.3, No.4, pp.1-75. Kamus Besar Bahasa Indonesia. 2014. “Kamus Besar Bahasa Indonesia Online”, diakses 5 Oktober 2019 http://www.kbbi.web.id. Kieso, D. E., Weygandt, J. J., & Warfield, T. D. (2016), Intermediate Accounting, Edisi 16, John Wiley and Sons, Inc. Lucyanda, J., & Wardhani, R. H. K. (2017), “Pengaruh Diversifikasi Dan Karakteristik Perusahaan Terhadap Kinerja Perusahaan”, Jurnal Riset Akuntansi dan Keuangan. Montgomery, Cynthia A. (1994), Corporate Diversification, Journal of Economic Perspectives, Vol.8, No.3, pp.163-178. Rani, P. (2015). “Peran Kepemilikan Manajerial Dalam Memoderasi Pengaruh Strategi Diversifikasi Terhadap Kinerja Perusahaan”, Jurnal Akuntansi dan Keuangan, Vol.4, no.2, pp.162–82. Salindeho, A. O., Ivonne, S. S., & Joubert, B. M. (2018), “Pengaruh Diversifikasi Usaha Terhadap Kinerja Keuangan Dan Return Saham Study Kasus Pada Perusahaan Manufaktur Automotive and Effect of Business Diversification of Financial Performance and Return Stock Case Stock in Automotive and Component Manufacturing”, Jurnal Riset Akuntansi dan Keuangan, Vol.6, no.3, pp.1078–87. Sari, I. A., Wiratno, A., & Suyono, E. (2014), “Pengaruh Strategi Diversifikasi Dan Karakteristik Perusahaan Terhadap Kinerja Perusahaan”, JAFFA (Journal of Auditing, Finance, and Forensic Accounting), Vol.02, no.1, pp.13–22. Scott, W. R. (2015), Financial Accounting Theory, Edisi 7, Toronto: Pearson Canada Inc. Setionoputri, A., Meiden, C., & Siagian, D. (2007), “Pengaruh Diversifikasi Korporat Terhadap Excess Value Perusahaan Manufaktur, Perdagangan Grosir Dan Eceran, Serta Properti Dan Real Estate Yang Terdaftar Di BEI Tahun 2005-2007” Bidang Akuntansi Private: Akuntansi Keuangan dan Pasar Modal, pp.1–25. Satoto, S. S. (2009), “Strategi Diversifikasi Terhadap Kinerja Perusahaan”, Jurnal Keuangan dan Perbankan, Vol.13, no.2, pp.280–287. Spence, M. (2002), “Signaling in Retrospect and the Informational Structure of Markets”, American Economic Review, Vol.92, no.3, pp.434–459. Thompson, A. J. G., & Peteraf, M. (2012), Crafting and Executing Strategy: Concept and Cases, Edisi 18, New York: McGraw Hill. Virginia, Y. M., & Ratnasih, C. (2017), “Pengaruh Lingkungan Kerja Dan Stres Kerja Terhadap Produktivitas Kerja Dan Berimplikasi Pada Kinerja Karyawan”, Journal of Chemical Information and Modeling, Vol.53, no.9, pp.1689–99. Wolk, H. I., Dodd, J. L., & Tearney, M. G. (2003), Accounting Theory: Conceptual Issues in a Political and Economic Environment, Edisi 6, Mason: South-Western College Pub.

APA, Harvard, Vancouver, ISO, and other styles

17

Malik, Abdul. "Book Review of Multidimensional Liquid Chromatography: Theory and Applications in Industrial Chemistry and the Life Sciences Multidimensional Liquid Chromatography: Theory and Applications in Industrial Chemistry and the Life Sciences . Edited by Steven A. Cohen (Waters Corporation, Milford, MA) and Mark R. Schure (Rohm and Haas Company, Springhouse, PA). John Wiley & Sons: Hoboken, NJ. 2008. xx + 456 pp. $125.00. ISBN 978-0-471-73847-3 ." Journal of the American Chemical Society 130, no.45 (November12, 2008): 15217–18. http://dx.doi.org/10.1021/ja808005t.

Full text

APA, Harvard, Vancouver, ISO, and other styles

18

Olivo, Adrian, and Juan Toledo. "Electromagnetic model for the study of transitory phenomena associated with atmospheric discharges on transmission lines." ATH 2, no.5 (September18, 2021): 5–28. http://dx.doi.org/10.47460/athenea.v2i5.22.

Full text

Abstract:

The analysis of a research work developed in the company C.V.G CARBONORCA of Venezuela is presented, which has two gas purification plants for the cooking area, designed to purify the gas that comes from the cooking ovens. Each plant is made up of solenoid valves, pneumatic valves, transmitters, process mimic panel and a supervisory system. All these elements are governed by a SIEMENS S5-115U PLC which is in a state of obsolescence, which is why the replacement of these automata by ALLEN BRADLEY ContolLogix automata was designed, in order to guarantee continuity in operations in plant. The research was done with a descriptive design of the field experimental type. A code for each gas treatment plant was obtained in RSLOGIX 5000 v17.00.00 and the update of the database of the supervisory system. The operation of the program was also verified through a simulation of the plant in a supervisory system, the deployment of which was designed for this purpose. Keywords: Automation, Modernization, ControlLogix, Supervisory System, Mimic Panel References [1]M. Uman, D. Mclain and P. Krider. “The Electromagnetic Radiation from a finite antenna” AJP, vol. 43, 1975. 1975. [2]A. Agrawal, H. Price and S. Gurbaxani. “Transient response of multiconductor transmission lines excited by a no uniform electromagnetic field”. IEEE Transactions on electromagnetic compatibility, (2), 119-129. 1980. [3]C. Nucci, F. Rachidi, M. Ianoz and C. Mazzetti. “Comparison of two coupling models for lightning-induced overvoltage calculations”. IEEE Transactions on power delivery, 10(1), 330-339. 1995. [4]R. Thottappillil and M. Uman. “Comparison of lightning return‐stroke models”. Journal of Geophysical Research: Atmospheres, 98(D12), 22903-22914. 1993. [5]K. Yee. “Numerical solution of initial boundary value problems involving Maxwell’s equations in isotropic media”, IEEE Transactions on Antennas and Propagation, vol. AP-14, no. 3, pp. 302–307, May 1966. 1966. [6]A. Taflove and S. Hagness. “Computational Electrodynamics: The Finite-Difference Time-Domain Method”. Boston-London: 2005. [7]A. Elsherbeni and V. Demir. “The finite-difference time-domain method for electromagnetics with MATLAB simulations”. The Institution of Engineering and Technology. 2016. [8]V. Silva. “Aplicação do método FDTD para avaliação da resposta de linhas de transmissão e aterramentos elétricos frente a descargas atmosféricas”. Dissertação de Mestrado, Universidade federal de minas gerais. Belo Horizonte, Brasil. 2017. [9]T. Noda and S. Yokoyama. “Thin wire representation in finite difference time domain surge simulation”. IEEE Transactions on Power Delivery, 17(3), 840-847. 2002. [10]R. Chamié-Filho. Análise de tensões induzidas em linhas de distribuição de baixa tensão frente a uma descarga atmosférica. 2009. [11]R. Jiménez. “Lightning Induced Voltages on Overhead Lines above Non-Uniform and Non-hom*ogeneous Ground” Doctoral dissertation, Universidad Nacional de Colombia-Sede Medellín. 2014. [12]S. Visacro and A. Soares. “HEM: A model for simulation of lightning-related engineering problems”. IEEE Transactions on power delivery, 20(2), 1206-1208. 2005. [13]J. Herrera. “Nuevas aproximaciones en el cálculo de tensiones inducidas por descargas eléctricas atmosféricas”. Programa de Doctorado en Ingeniería Eléctrica, Facultad de Ingeniería, Departamento de Ingeniería Eléctrica y Electrónica, Universidad Nacional de Colombia, Bogotá, 128 . 2006. [14]C. McAfee. “Lightning return stroke electromagnetics-time domain evaluation and application” Doctoral dissertation. 2016. [15] S. Gedney. “Introduction to the finite-difference time-domain (FDTD) method for electromagnetics”. Synthesis Lectures on Computational Electromagnetics, 6(1), 1-250. 2011. [16]Y. Taniguchi, Y. Baba, N. Nagaoka and A. Ametani. “An improved thin wire representation for FDTD computations”. IEEE Transactions on Antennas and Propagation, 56(10), 3248-3252. 2008. [17]E. Soto. “Cálculo de campo electromagnético producido por rayo para terreno no plano y su efecto en las tensiones inducidas en líneas de distribución”. Tesis de Maestría, Universidad Nacional de Colombia. Manizales, Colombia. 2010. [18]D. Sullivan. “Electromagnetic simulation using the FDTD method”. John Wiley & Sons. 2013.

APA, Harvard, Vancouver, ISO, and other styles

19

Nuhin, Muhammad Al Fansa, and Noven Suprayogi. "Pengaruh Kinerja Manajemen, Efisiensi, Kinerja Underwriting dan Likuiditas terhadap Profitabilitas Perusahaan Asuransi Syariah di Indonesia Periode 2015-2019." Jurnal Ekonomi Syariah Teori dan Terapan 9, no.5 (September30, 2022): 628–42. http://dx.doi.org/10.20473/vol9iss20225pp628-642.

Full text

Abstract:

ABSTRAK Penelitian ini bertujuan untuk mengetahui pengaruh kinerja manajemen, efisiensi, kinerja underwriting dan likuiditas terhadap profitabilitas perusahaan asuransi syariah di Indonesia periode 2015-2019 secara parsial dan simultan. Penelitian ini menggunakan metode kuantitatif dengan teknik analisis regresi data panel dan mengambil 24 sampel perusahaan asuransi jiwa maupun umum syariah di Indonesia, sumber data diambil dari laporan keuangan masing-masing perusahaan asuransi syariah dan laporan statistik keuangan OJK. secara parsial kinerja manajemen dan kinerja underwriting berpengaruh positif signifikan terhadap profitabilitas, efisiensi dan likuiditas berpengaruh negatif signifikan terhadap profitabilitas. secara simultan variabel kinerja manajemen, efisiensi, kinerja underwriting dan likuiditas yang diukur melalui rasio perubahan surplus, rasio underwriting, rasio biaya manajemen dan rasio likuiditas berpengaruh signifikan terhadap profitabilitas yang diukur dengan ROE pada perusahaan asuransi syariah di Indonesia periode 2015-2019. Perusahaan asuransi syariah diharapkan dapat mengoptimalkan struktur modal perusahaannya, lalu menjaga kondisi keuangan perusahaan dengan baik terutama dari sisi kewajiban dan biaya operasional perusahaan asuransi syariah. Perusahaan juga diharapkan mampu mengelola dana pesertanya dengan baik agar tidak mengalami defisit underwriting. Kata kunci: Kinerja Manajemen, Efisiensi, Kinerja Underwriting, Likuiditas, Profitabilitas. ABSTRACT This study aims to determine the effect of management performance, efficiency, underwriting performance and liquidity on the profitability of Islamic insurance companies in Indonesia for the 2015-2019 period partially and simultaneously. This study uses a quantitative method with panel data regression analysis techniques and takes 24 samples of sharia life and general insurance companies in Indonesia, the data sources are taken from the financial statements of each sharia insurance company and OJK financial statistics reports. partially management performance and underwriting performance have a significant positive effect on profitability, efficiency and liquidity have a significant negative effect on profitability. Simultaneously, the variables of management performance, efficiency, underwriting performance and liquidity as measured by the ratio of changes in surplus, underwriting ratio, management expense ratio and liquidity ratio have a significant effect on profitability as measured by ROE in Islamic insurance companies in Indonesia for the 2015-2019 period. Islamic insurance companies are expected to optimize the company's capital structure, then maintain the company's financial condition well, especially in terms of obligations and operational costs of sharia insurance companies. The company is also expected to be able to manage the funds of its participants well so as not to experience an underwriting deficit. Keywords: Management Performance, Efficiency, Underwriting Performance, Liquidity, Profitability. DAFTAR PUSTAKA Akotey G., J. O., & Manso, S. L. (2013). The financial performance of life insurance companies in Ghana. Journal of Risk Finance, 14(3), 286-302. https://doi.org/10.1108/JRF-11-2012-0081 Anshori, M., & Iswati, S. (2009). Metodologi penelitian kuantitatif. Surabaya: Universitas Airlangga. Azhari, R. A. (2021). Studi analisis meta pada determinan profitabilitas perusahaan asuransi syariah di Indonesia. Skripsi tidak dipublikasikan. Surabaya: Universitas Airlangga. Bakri, W. (2015). Prinsip-prinsip dasar asuransi syariah. Ijtihad: Jurnal Hukum dan Ekonomi Islam, 9(2), 195-214. http://dx.doi.org/10.21111/ijtihad.v9i2.2521 Baltagi, B. H. (2005). Econometric analysis of panel data. West Sussex: John Willey and Sons Ltd. Darmawi. (2006). Manajemen asuransi. Jakarta: Bumi Aksara. DSN MUI. (2001). Fatwa DSN MUI Nomor 21/DSN-MUI/X/2001 tentang pedoman umum asuransi syariah. Jakarta: DSN MUI. Fadrul., & Simorangkir, M. A. (2019). Pengaruh early warning system dan risk-based capital terhadap kinerja keuangan perusahaan asuransi. Bilancia: Jurnal Ilmiah Akuntansi, 3(3), 348-359. Harahap, S. S. (2001). Teori akuntansi. Jakarta: PT. Raja Grafindo Persada . Juwita, T. (2017). Analisis pengaruh premi klaim investasi dan surplus underwriting terhadap pertumbuhan laba pada industri asuransi syariah tahun 2012-2016. Skripsi tidak dipublikasikan. Salatiga: Institut Agama Islam Negeri (IAIN) Salatiga. Kaya, E. O. (2015). The effects of firm-specific factors on the profitability of non-life insurance companies in Turkey. Int. J. Financial Stud, 3(4), 510-529. https://doi.org/10.3390/ijfs3040510 Kumar, K. A. (2015). International Financial Reporting Standards (IFRS) Adoption on Financial Decisions. J Account Mark, 4(3), 1-6. https://doi.org/10.4172/2168-9601.1000141 Kuncoro, M. (2011). Metode kuantitatif. Yogyakarta: Sekolah Tinggi Ilmu Manajemen YKPN. Makhrus, A. (2017). Manajemen asuransi syariah. Yogyakarta: Litera. Mardhiyyah, A. Z. (2019). Analisis pengaruh pertumbuhan premi, hasil investasi, risiko likuiditas, tingkat kesehatan (solvabilitas) dengan nilai risk based capital dan tingkat efesiensi terhadap kinerja keuangan pada perusahaan asuransi syariah di Indonesia. Skripsi tidak dipublikasikan. Jakarta: Universitas Islam Negeri Syarif Hidayatullah Jakarta. Ngunguni, N. J., Misango, S. M., & Onsiro, M. (2020). Examining the effects of financial factors on profitability of general insurance companies in Kenya. International Journal of Finance of Accounting, 5(1), 1-18. http://dx.doi.org/10.47604/ijfa.1066 Ningrum, S. D. (2014). Analisis faktor-faktor yang mempengaruhi return on equity pada perusahaan asuransi umum. Skripsi tidak dipublikasikan. Semarang: Universitas Diponegoro. OJK. (2015). Laporan statistik perasuransian Indonesia. Jakarta: Otoritas Jasa Keuangan. OJK. (2016). Laporan statistik perasuransian Indonesia. Jakarta: Otoritas Jasa Keuangan. OJK. (2017). Laporan statistik perasuransian Indonesia. Jakarta: Otoritas Jasa Keuangan. OJK. (2018). Laporan statistik perasuransian Indonesia. Jakarta: Otoritas Jasa Keuangan. OJK. (2019). Laporan statistik perasuransian Indonesia. Jakarta: Otoritas Jasa Keuangan. OJK. (2019). Laporan perkembangan keuangan syariah di Indonesia. Jakarta: Otoritas Jasa Keuangan. Puspitasari, N. (2012). Model proporsi tabarru dan ujrah pada bisnis asuransi umum syariah di indonesia. Jurnal Akuntansi dan Keuangan Indonesia, 9(1), 43-55. http://dx.doi.org/10.21002/jaki.2012.03 Ramadhan, Y. (2019). Pengaruh ujrah diterima, beban klaim dan total investasi terhadap laba asuransi jiwa syariah di Indonesia periode 2008-2017. Skripsi tidak dipublikasikan. Surabaya: Universitas Airlangga. Safitri, K. E., & Suprayogi, N. (2017). Analisis kesehatan keuangan dana tabarru yang mempengaruhi profitabilitas pada asuransi syariah di Indonesia. Jurnal Ekonomi Syariah Teori dan Terapan, 4(1), 73-88. https://doi.org/10.20473/vol4iss20171pp73-88 Salsabila, F. H. (2020). Pengaruh rasio-rasio early warning system terhadap profitabilitas perusahaan asuransi jiwa syariah periode 2014-2018. Skripsi tidak dipublikasikan. Surabaya: Universitas Airlangga. Satria, S. (1994). Pengukuran kinerja keuangan perusahaan asuransi kerugian di Indonesia dengan analisis rasio keuangan early warning system. Jakarta : Lembaga penerbit FE-UI. Silalahi, D., Sitepu, R., & Tarigan, G. (2014). Analisis ketahanan pangan dengan model regresi data panel. Saintia Matematika, 2(3), 237-251. Utami, I. G. A. M. P., & Werastuti, D. N. S. (2020). Pengaruh mekanisme corporate governance, early warning system, risk based capital dan hasil investasi terhadap kinerja keuangan. Jurnal Ilmiah Mahasiswa Akuntansi Undiksha, 11(2). 54-64. https://doi.org/10.23887/jimat.v11i2.25922 Wibisono. (2005). Metode statistika. Yogyakarta: Gajah Mada University Press. Widarjono, A. (2013). Ekonometrika: Pengantar dan aplikasinya. Jakarta: Eknosia. Widyarochma, F. (2018). Pengaruh likuiditas pertumbuhan premi dan hasil investasi terhadap profitabilitas perusahaan asuransi syariah di Indonesia Periode 2012-2016. Skripsi tidak dipublikasikan. Surabaya: Universitas Airlangga. Yuliana, Y. (2008). Kinerja keuangan PT. Panin Insurance Tbk. dengan metode MDA. Ilmiah Manajemen Bisnis, 8(1), 75-88. Yuniarti, T. (2020). Pengaruh underwriting dan dana tabarru terhadap laba perusahaan asuransi syariah di Indonesia. Skripsi tidak dipublikasikan. Lampung: Universitas Islam Negeri Raden Intan Lampung.

APA, Harvard, Vancouver, ISO, and other styles

20

Nuryani, Nunung. "PENGARUH BIAYA AUDIT TERHADAP KUALITAS AUDIT DAN DETERMINAN BIAYA AUDIT." Jurnal Akuntansi 9, no.2 (August15, 2020): 32–47. http://dx.doi.org/10.46806/ja.v9i2.760.

Full text

Abstract:

Financial information is one of the important information in decision making. However, many cases of fraud committed by management so that the information in the financial statements cannot be relied upon in decision making. Therefore, the auditor's job is to ensure that the company's financial statements are represented correctly (faithful representation) so that financial statement information becomes more quality and useful in making decisions. So this study aims to examine the effect of audit fee on audit quality. In addition, this study also examines important determinants of audit costs, namely company size, profitability, audit risk, complexity, and firm size. By using the purposive sampling method, samples of the financial and manufacturing industry in 2010-2017 used are 39 firms per year. This sample is used to examine the effect of audit fee on audit quality and the determinant of audit fee using simple linear regression analysis and multiple linear regression analysis. The result of this research shows that audit fees have a significant positive effect on audit quality. In addition, this study shows that firm size, complexity, and firm size are important determinants that determine audit fee. However, profitability and audit risk have not been proven to explain audit fees. Keywords: Audit Quality, Audit Fee, Firm Size, Profitability, Audit Risk, Complexity, Auditor Size Referencens: Al-Harshani, Meshari O. (2008), The pricing of audit services: Evidence from Kuwait. Managerial Auditing Journal, 23(7), 685–696. Al-Thuneibat, Ali. Abedalqader, Ream Tawfiq Ibrahim Al Issa, & Rana Ahmad Ata Baker, (2011), Do audit tenure and firm size contribute to audit quality? Empirical evidence from Jordan. Managerial Auditing Journal, 26(4), 317–334. Arens, Alvin A., Randal J. Elder,. Mark S. Beasley (2014), Auditing and Assurance Services: An Integrated Approach. United States: Pearson Education, Inc. Association of Certified Fraud Examiners (2018), Report to the Nations: 2018 Global Study on Occupational Fraud and Abuse, United States: ACFE. Bhandari, L. C. (1988), Debt/Equity Ratio and Expected Common Stock Returns : Empirical Evidence. The Journal of Finance, 43(2), 507–528. Bowerman, Bruce L., Richard T. O'Connell, Emily S. Murphree (2017), Business Statistics in Practice, Eighth Edition, New York: McGraw Hill Education. Brealey, Richard A., Myers, Stewart C. (2000), Principles of Corporate Finance, Boston: McGraw Hill Companies, Inc. Carey, P. J. (2008), The Benefits of Services Provided by External Accountants to Small and Medium Sized Enterprises. Carey, P., & Simnett, R. (2006), Audit partner tenure and audit quality. Accounting Review, 81(3), 653–676. Castro, Walther Bottaro de Lima, Ivam Ricardo Peleias, & Glauco Peres da Silva (2015), Determinants of Audit Fees: A Study in the Companies Listed on the BM&FBOVESPA, Brasil. Revista Contabilidade & Finanças, 26(69), 261–273. Chen, C. (2008), Audit Partner Tenure , Audit Firm Tenure , and Discretionary Accruals : Does Long Auditor Tenure Impair Earnings Quality ?, 25(2), 415–445. Cooper, D. R., & Schindler, P. S. (2014), Business Research Methods (Twelfth Edition). New York: McGraw-Hill/Irwin. DeAngelo, L. E. (1981), Auditor size and audit quality. Journal of Accounting and Economics, 3(3), 183–199. Dechow, Patricia. M., Richard. G. Sloan, & Amy P. Sweeney (1995), Detecting Earnings Management. The Accounting Review. DeFond, M., & Zhang, J. (2014), A review of archival auditing research. Journal of Accounting and Economics, 58(2–3), 275–326. Deis, Donald R., & Gary Giroux (1996), The effect of auditor changes on audit fees, audit hours, and audit quality. Journal of Accounting and Public Policy, 15(1), 55–76. Eilifsen, Aasmund, Jr William F Messier, Steven M Glover, Douglas F Prawitt (2014), Auditing & Assurance Services, Third Edition, London: McGraw-Hill. Ettredge, Michael., Elizabeth Emeigh Fuerherm, & Chan Li (2014), Fee pressure and audit quality. Accounting, Organizations and Society, 39(4), 247–263. Ferri, Michael G., & Wesley H. Jones (1979), Determinants of financial structure: a new methodological approach. The Journal of Finance, 34(3), 631–643. Francis, Jere. R. (2011), A Framework For Understanding And Researching Audit Quality. Auditing, 30(2), 125–152. Ghozali, H. Imam (2016), Aplikasi Analisis Multivariete dengan Program IBM SPSS 23, Edisi ke-8, Semarang: Badan Penerbit Universitas Diponegoro. Gitman, Lawrence J., Chad J. Zutter (2012), Principles Of Managerial Finance (Thirteenth). United States: Lawrence J. Gitman. Hoitash, Rani., Ariel Markelevich, & Charles A. Barragato (2007), Auditor fees and audit quality. Managerial Auditing Journal, 22(8), 761–786. Horngren, Charles T., L. Sundem, John A. Elliott (1999), Introduction to Financial Accounting, Seventh Edition, New Jersey: Prentice-Hall,Inc. Ikatan Akuntansi Indonesia (2017), Standar Akuntansi Keuangan (SAK), Jakarta: IAI International Accounting Standard Board (2018), The Conceptual Framework for Financial Reporting 2018. London : IASB. Jan, Chyan Long (2018), An effective financial statements fraud detection model for the sustainable development of financial markets: Evidence from Taiwan. Sustainability (Switzerland), 10(2). Jensen, Michael C., & William H. Meckling (1976), Theory Of The Firm : Managerial Behavior , Agency Costs And Ownership Structure, 3, 305–360. Joshi, P. L., & Hasan AL-bastaki (2000), Determinants of Audit Fees : Evidence from the Companies Listed in Bahrain, 138(November 1999), 129–138. Jubb. (1996), Audit fee determinants: The plural nature of risk. Managerial Auditing Journal, 11(3), 25–40. Kieso, Donald E., Jerry J. Weygandt, & Paul D. Kimmel (2013), Financial Accounting IFRS Edition. United States: John Wiley & Sons, Inc. Kieso, Donald E, Jerry J Weygandt, Terry D Warfield (2018), Intermediate Accounting: IFRS Edition Third Edition, United States: John Willey & Sons, Inc. Kikhia, Hassan Yahia (2014), Determinants of Audit Fees: Evidence from Jordan. Accounting and Finance Research, 4(1), 42–53. Knechel, Robert W., & Ann Vanstraelen (2007), The Relationship between Auditor Tenure and Audit Quality Implied by Going Concern Opinions. AUDITING: A Journal of Practice & Theory, 26(May), 113–131. Knechel, W. Robert, Gopal V. Krishnan, Mikhail Pevzner, Lori B Shefchik, & Uma K. Velury (2013), Audit quality: Insights from the academic literature. Auditing, 32(SUPPL.1), 385–421. Konrath, Larry F. (2002), Auditing A Risk Analysis Approach, Fifth Edition, South Western. Kusharyanti (2013), Analysis of the Factors Determining the Audit Fee. Journal of Economics, Business, and Accountancy | Ventura, 16(1), 147–160. Lennox, C. (1999), Are large auditors more accurate than small auditors? Accounting and Business Research, 29(3), 217–227. Lennox, C. S. (1999) Audit quality and auditor size: An evaluation of reputation and deep pockets hypotheses. Journal of Business Finance and Accounting, 26(7–8), 789–805. Liu, Siheng. (2017), An Empirical Study: Auditors’ Characteristics and Audit Fee. Open Journal of Accounting, 06(02), 52–70. Lobo, Gerald, & Yuping Zhao (2013), Relation between Audit Effort and Financial Report Misstatements: Evidence from Quarterly and Annual Restatements. Journal of International Accounting Research, 90(4), 1395–1435. Manry, David L, Theodore J. Mock, & Jerry L. Turner (2008), Does increased audit partner tenure reduce audit quality? Journal of Accounting, Auditing and Finance, 23(4), 553–572. Mohammed, Nishtiman Hashim, & Abdullah Saeed Barwari (2018), Determinants of Audit Fees : Evidence from UK Alternative Investment Market. Academic Journal of Nawroz University, 7(3), 34–47. Musah, A. (2017), Determinants of Audit fees in a Developing Economy: Evidence from Ghana. International Journal of Academic Research in Business and Social Sciences, 7(11). Newton, Nathan J., Dechun Wang, & Michael S. Wilkins (2013), Does a lack of choice lead to lower quality? evidence from auditor competition and client restatements. Auditing, 32(3), 31–67. Nikkinen, J., & Petri Sahlström (2004), Does Agency Theory Provide a General Framework for Audit Pricing ? International Journal of Auditing, 8, 253–262. Ohidoa, T., & Okun, O. O. (2018), Firms Attributes and Audit Fees in Nigeria Quoted Firms. International Journal of Academic Research in Business and Social Sciences, 8(3), 685–699. Pham, Ngoc Kim, Hung Nguyen Duong, Tin Pham Quang, & Nga Ho Thi Thuy (2017), Audit Firm Size, Audit Fee, Audit Reputation and Audit Quality: The Case of Listed Companies in Vietnam. Asian Journal of Finance & Accounting, 9(1), 429. Rahman, Dr Onaolapo Adekunle Abdul, Ajulo Olajide Benjamin, Onifade Hakeem Olayinka (2017), Effect of Audit Fees on Audit Quality: Evidence from Cement Manufacturing Companies in Nigeria. Effect of Audit Fees on Audit Quality: Evidence from Cement Manufacturing Companies in Nigeria., 5(1), 6–17. Rahmina, Listya Yuniastuti, & Sukrisno Agoes (2015), Influence of Auditor Independence, Audit Tenure, and Audit Fee on Audit Quality of Members of Capital Market Accountant Forum in Indonesia. Procedia - Social and Behavioral Sciences, 164(August), 324–331. Republik Indonesia (2008), Undang-Undang Republik Indonesia Nomor 20 tahun 2008 Tentang Usaha Mikro, Kecil, Dan Menengah. Sandra, & Patrick. (1996), The Deteminants of Audit Fees in HongKong: An Empirical Study. Asian Review of Accounting, 4(2), 32–50. Scott, William R (2015), Financial Accounting Theory, Seventh Edition, United States: Pearson Canada Inc. Shibano, T. (1990), Assessing Audit Risk from Errors and Irregularities. Journal of Accounting Research, 28(1990), 110. Sivathaasan, N., R. Tharanika, M. Sinthuja, V. Hanitha (2013), Factors determining Profitability: A Study of Selected Manufacturing Companies listed on Colombo Stock Exchange in Sri Lanka. European Journal of Business and Management, 5(27), 99-107–107. Subramanyam, K. R. (2014), Financial Statement Analysis, Eleventh Edition, New York: McGraw-Hill Education. Sun, Jerry, & Guoping Liu (2011), Client-specific litigation risk and audit quality differentiation. Managerial Auditing Journal, 26(4), 300–316. Tritschler, Jonas (2013), Audit Quality: Association Between Published Reporting Errors and Audit Firm Characteristics. Vu, Dinh Ha Thu Vu (2012), Determinants of audit fees for Swedish listed non-financial firms in NASDAQ OMX Stockholm. Whittington, Ray & Kurt Pany (2004), Principles of Auditing and Other Assurance Services, New York: McGraw-Hill/Irwin. Williams, David D. (1988), The Potential Determinants of Auditor Change. Journal of Business Finance & Accounting, 15(2), 243–261. Wooten, T. C. (2003), Research About Audit Quality. Wu, Shu-Hsing, Tsung-Che Wu, & Kun-Lin Yang (2017), Fair Value Information, Audit fees and Audit Committee in Taiwan. International Journal of Financial Research, 8(2), 124. Xu, Jiabing (2017), Analysis on the Relationship between Audit Fee Management and Audit Quality in China, 53(ICEM 2017), 530–533.

APA, Harvard, Vancouver, ISO, and other styles

21

Кючуков, Хрісто. "“Parno Sar Papin – White as a Swan”, Or How Metaphors Help Roma Children to Acquire Grammatical Categories in Romani." East European Journal of Psycholinguistics 4, no.1 (June27, 2017): 100–113. http://dx.doi.org/10.29038/eejpl.2017.4.1.kyu.

Full text

Abstract:

The paper presents the process of language socialization and acquisition of grammatical categories through the Roma oral culture in which metaphors are extensively used. Roma children who grow up in extended Roma families and community learn the language through communication with speakers of different registers. Research with 22 Roma children between three and six years of age from Croatia was carried in order to find out what grammatical categories are learned in this period of the life of children. The children were tested with a specially designed language assessment test in Romani (Kyuchukov & de Villiers, 2014b). The results show that Roma boys perform the test much better than Roma girls. Boys learn Romani from folkloristic genres which are rich in metaphors and this helps them to acquire complex grammatical categories. References Beller, S. (2008). Fostering Language Acquisition in Daycare Settings. The Hague:Bernard van Leer Foundation. Black, B. & Logan, A. (1995). Links between communication patterns in mother-child,father-child, and child-peer interactions and children’s social status. Child Development,66, 255–271. Bloom, L. et al. (1996). Early conversations and word learning: contributions form childand adult. Child Development, 67, 3154–3175. Blount, B. (1995). Parental speech and language acquisition: and anthropologicalperspective. In: Language, Culture, and Society. A book of Readings. Second edition, (pp.551–566). B. Blount (ed.). Prospect Heights, IL: Waveland Press. Bokus, B. & Garstka, T. (2009). Toward a shared metaphoric meaning in children’sdiscourse. The role of argumentation. Polish Psychological Bulletin, 40(4), 193–203. Bowdle, B. (1998) Alignment and Abstraction in Metaphor. In: Advances in AnalogyResearch: Integration of Theory and Data form the Cognitive, Computational and NeutralSciences, (pp. 300–307). K. Holiyok, D. Gentner & K. Kokinov (Eds.). Sofia: NewBulgarian University. Crystal, D. (1992). An Encyclopedic Dictionary of Language and Languages. London:Penguin Dryll, E. (2009). Changes in metaphor comprehension in children. Polish PsychologicalBulletin, 40(4), 204 – 212. Elbers, E., Maier, R., Hoekstra, T., Hoogsteder, M. (1992) Internalization and adult-childinteraction. Learning and Instruction, 2, 101–118. Ervin, S. & Miller, W. (1972). Language Development. In: Readings in the Sociology ofLanguage, (pp. 68–98). J. Fishman (ed.). The Hague: Mouton. Gleason, J. Berko (1992). Language Acquisition and Socialization. University Lecture.Boston: Boston University Press. Granquist, K. (2012). Metaphors of Finish Roma in Finish and Romani. In: EndangeredMetaphors, (pp. 293–313). A. Idstrom, T. Falzett, E. Piirainen (eds.). Amsterdam: JohnBenjamins Publishing Company. Haslett, B. (1989). Communication and language acquisition within a cultural context. In:Language, Communication and Culture. Current Directions, (pp. 19–34). S. TingToomey & F. Korzenny (eds.). Newbury Park, CA: SAGE Publications. Hoff, E. (2003). Language development in childhood. In: Handbook of Psychology. Vol.6. Developmental Psychology, (pp. 171– 193). R. Lerner, M.A. Easterbrooks, J. Mistry(eds.). Hoboken, NJ: John Wiley &Sons. Kubanik, P. (2016). Using Romani in language socialization in a Czech family. In: Roma:Past, Present, Future, (pp. 238–249). H. Kyuchukov, E. Marushiakova & V. Popov (eds).Munich: Lincom, Kyuchukov, H. (2014a). Acquisition of Romani in a bilingual context. Psychology ofLanguage and Communication, 18, 211–225. Kyuchukov, H. (2014b). Romani language assessment of Roma children. Journal ofLanguage and Cultural Education, 2, 52–64. Kyuchukov, H. (2010). Romani language competence. In: Situation of Roma Minority inCzech, Hungary, Poland and Slovakia, (pp. 427–465). J. Balvin and L. Kwadrants (eds.).Wroclaw: Prom. Kyuchukov, H. & de Villiers, J. (2014a). Roma children’s knowledge on Romani.Journal of Psycholinguistics, 19, 58–65. Kyuchukov, H. & de Villiers, J. (2014b) Addressing the rights of Roma children for alanguage assessment in their native language of Romani. Poster presented at the35th Annual Symposium on Research in Child Language Disorders. Madison,Wisconsin June 12–14. Kyuchukov, H., Kaleja, M. &Samko, M. (2016). Roma parents as educators of theirchildren. Intercultural Education, 26, 444–448. Lakoff, G. & Johnson, M. (1980). Metaphors We Live By. Chicago: The University ofChicago Press. Macwhinney, B. (2001) First language acquisition. In: The Handbook of Linguistics, (pp.466–489). M. Aronoff & J. Rees-Miller (eds.). Oxford: Blackwell Publisher. Ochs, E. & Schieffelin, B. (1983). Acquiring Conversational Competence. London:Routledge & Kegan Paul. Ochs, E. & Schieffelin, B. (1995). Language acquisition and Socialization: Threedevelopmental stories and their implications. In: Language, Culture, and Society. A bookof Readings. Second edition, (pp. 470–512). B. Blount (ed.). Prospect Heights, IL:Waveland Press. Ozcaliskan, S. (2014). Development of metaphor. In: Encyclopedia of languagedevelopment, (pp. 374–375). P. Brookse, V. Kempe, & G.J. Golson (eds.). NY: SagePublishers. Penalosa, F. (1981). Introduction to the sociology of language. Rowley, MA: NewburyHouse Publishers. Rácová, A. & Samko, M. (2015). Structural Patterns and Functions of ReduplicativeConstructions in Slovak Romani. Asian and African Studies, 24, 165–189. Reger, Z. & Gleason, J. Berko (1991). Romani child-directed speech and children’slanguage among Gypsies in Hungary. Language in Society, 20(4), 601–617. Reger, Z. (1999). Teasing in the linguistic socialization of Gypsy children in Hungary.Acta Linguistica Hungarica, 46(3–4), 289–315. Rondal, J. (1985). Adult-Child Interaction and the Process of Language Acquisition. NewYork: Praeger Publishers. Samko, M. & Kapalková, S. (2014). Analýza naratívnej schopnosti rómskeho dieťaťa vrómčine a slovenčine. Psychológia a Patopsychológia Dieťaťa, 48, 372–384. Winner, E. (1988). The Point of Words. Children’s Understanding of Metaphor andIrony. Cambridge, MA: Harvard University Press.

APA, Harvard, Vancouver, ISO, and other styles

22

Andersson-Skog, Lena, Richard Gorski, David Richardson, John Armstrong, Adrian Jarvis, Stefan Zeilinger, Stuart Thompstone, Adrian Jarvis, Michael Freeman, and Richard Storey. "Book Reviews: The Economics of Transport: The Swedish Case, 1780–1980, a Galloway Venture: The Kirkcudbright Shipping Company, 1811–17, Port Cities and Intruders: The Swahili Coast, India, and Portugal in the Early Modern World, around the Coast and across the Seas: The Story of James Fisher and Sons, the Engineering and History of Rocket: A Survey Report, the Most Valuable Asset of the Reich: A History of the German National Railway I, 1920–32, et al., Russian Rail Transport, 1836–1917, Trans. John C. Decker from the Russian Original, Istoriya zheleznodorozhnogo transporta Rossii, Gentlemen Engineers: The Working Lives of Frank and Walter Shanly, Pathologies of Travel, Earth and Tree Moving in War and Peace: 60 Golden Years." Journal of Transport History 22, no.1 (March 2001): 74–84. http://dx.doi.org/10.7227/tjth.22.1.6.

Full text

APA, Harvard, Vancouver, ISO, and other styles

23

Gordon, Jocelynne, Eleonora Gullone, Emma Little, Jan Matthews, Jane McGillivray, Lynette Evans, and Amanda Richdale. "Anxiety Disorders in Children and Adolescents: Research, Assessment and InterventionWendy Silverman and Philip Treffers (Eds.) (2001). Cambridge: Cambridge University Press, 402 pp. $125 (paperback) - The Effects of Parental Dysfunction on Children (2002)Robert J. McMahon & Ray DeV. Peters (Editors) (2002) New York: Kluwer Academic/Plenum Publishers, 244 pp. $US65.00. Hardcover, ISBN 0-306-47252-X - Conduct Disorders in Childhood and AdolescenceJ. Hill and B. Maughan (Editors) (2001). New York: Cambridge University Press. 581 pp. $125.00 (paperback) - Raising Real People: Creating a Resilient Family (2nd ed.)Andrew Fuller (2002). Melbourne: ACER Press. 207 pp. $26.95 (paperback) - Clinical Behavior Therapy: Adults and ChildrenMichel Hersen (Editor) (2002). New York: John Wiley and Sons. 513 pp. $135.95 (hardback) - Comparative Treatments for Relationship DysfunctionF.M. Dattilio and L.J. Bevilacqua (Eds.) (2000). New York: Springer Publishing Company. 414 pp. $117.90 (hardcover) - A Clinical Guide to Sleep Disorders in Children and AdolescentsGregory Stores (1999). Cambridge: Cambridge University Press. $99.00 (paperback)." Behaviour Change 19, no.3 (September1, 2002): 172–79. http://dx.doi.org/10.1375/bech.19.3.172.

Full text

APA, Harvard, Vancouver, ISO, and other styles

24

O’Neill, Daniel, and Anna Greenwood. "“Bringing you the Best”: John Player & Sons, Cricket, and the Politics of Tobacco Sport Sponsorship in Britain, 1969–1986." European Journal for the History of Medicine and Health, August11, 2022, 1–33. http://dx.doi.org/10.1163/26667711-bja10022.

Full text

Abstract:

Abstract This article explores some of the marketing strategies associated with the British tobacco industry’s sponsorship of sport during the 1960s and 1970s. It focuses on the British cigarette and tobacco manufacturer John Player & Sons and the firm’s pioneering initiative to sponsor one-day cricket, which began with the John Player League in 1969. The league was enormously popular and gained significant broadcast coverage, becoming an invaluable means of increasing public exposure for the company, in the context of the ban of cigarette advertising from British television. At a time when the link between smoking and disease was making headlines, John Player & Sons nimbly deflected attention away from the health issue, and instead consciously repositioned the tobacco company as a generous benefactor of the nation’s sport and leisure. Less conspicuously, but even more powerfully, spokespeople for the tobacco industry actively mobilised influential opinion behind the scenes in political circles. We show particularly how Denis Howell, Minister for Sport from 1964 to 1969 and from 1974 to 1979, became a valuable ally, acting as a bulwark against more restrictive government interventions into the sponsorship of sports by the tobacco industry. This alliance exposes changing industry–government relations and presents new historical context to better understand the way British tobacco manufacturers proactively sought to elide restrictions on their advertising activities from the 1980s onwards.

APA, Harvard, Vancouver, ISO, and other styles

25

Sadi, Sumardi. "Rancang Bangun Sistem Pengendalian Kecepatan Motor DC Dengan Perantara Gelombang FM." Jurnal Teknik 2, no.1 (September1, 2019). http://dx.doi.org/10.31000/jt.v2i1.1584.

Full text

Abstract:

1. A.E, Fitzgerald, SC.D. Basic Electrical Engineering. Erlangga, Jakarta: 19842. Coughlin, Robert F. Dan Frederik F. Driscoll. Penguat Operasi dan Rangkaian Terpadu.3. Gray, Paul E. Dan Campbell L. Searle. Electronic Principles Physics, Models, and Circuits. John Wiley & Sons, Inc:New York : 19694. Jackson, KG. Kamus Teknik Listrik. Elex Media Komputindo. Jakarta5. Jones, Thomas H. Electronics Components Handbook. Reston Publishing Company, Inc. Virginia:19796. Malvino, Albert Paul. Prinsip-prinsip Elektronik. Erlangga, Jakarta:1995.7. Mehta, V.K. Principles of Electronics. S. Chan & Company Ltd. New Delhi:1997.8. Motorola CMOS Application-Spesific Digital-Analog Integrated Circuit.9. Poerwadarminta, WJS. Kamus Besar Bahasa Indonesia. PN Balai Pustaka. Jakarta : 1976.10. Rizkiawan, Rizal. Tutorial Perancangan Hardware I, Elex Media Komputindo, Jakarta:11. Wasito. Kamus Ensiklopedia Elektronika Inggris-Indonesia. Karya Utama. Jakarta :12. Theraja, BL. Electrical Principles. New Delhi :

APA, Harvard, Vancouver, ISO, and other styles

26

"Frederick William Shotton, 8 October 1906 - 21 July 1990." Biographical Memoirs of Fellows of the Royal Society 39 (February 1994): 417–32. http://dx.doi.org/10.1098/rsbm.1994.0023.

Full text

Abstract:

Frederick William Shotton was born on 8 October 1906 at Exhall, Coventry, the son of Fredrick John Shotton and Ada Shotton, well known figures on both the industrial and political scene in Coventry. In 1905 his father had founded the Albion Drop Forging Company at Holbrooks, north Coventry, a company that had a remarkable record for making car components and for the manufacture of munitions during two World Wars, a record of which Fred Shotton was justly proud. The family were staunch Liberals, and his father, though in his early days a socialist, was President of the Coventry Liberal Society, for four years a member of the Coventry City Council and for many years a Justice of the Peace in the city. In 1930 Fred married Alice Louise Linnett at St Paul’s Church, Foleshill, Coventry with whom he shared a common interest in natural history. Alice was the only daughter of John and Alice Linnett who kept a drapers shop in Smithford Street, Coventry. Later John Linnett opened a ribbon making factory on Foleshill Road, Coventry with which Alice Shotton retained an interest well into the post-war years. They had two daughters, Anne Elizabeth and Margaret Alice, who are both married with sons and daughters of their own. Alice Shotton died in 1979. Fred Shotton remarried in 1983 to Lucille Bailey of Portland, Oregon, who provided him with tender loving care during the last years of his life when gradually failing health kept him from his field work and to a greater and greater extent confined him to home. He died on 21 July 1990. Lucille survives him and still lives in their house in Dorridge near Solihull.

APA, Harvard, Vancouver, ISO, and other styles

27

"Listing of Name Reactions for Carbocyclic Ring Formations. Name Reactions for Carbocyclic Ring Formations . Edited by Jie Jack Li (Bristol-Myers Squibb Company). John Wiley & Sons, Inc. : Hoboken, NJ . 2010 . xvi + 756 pp. $149.95. ISBN 978-0-470-08506-6 ." Journal of the American Chemical Society 133, no.8 (March2, 2011): 2792. http://dx.doi.org/10.1021/ja200510u.

Full text

APA, Harvard, Vancouver, ISO, and other styles

28

Zurina, Sandra. "THE USE OF SMALL GROUP DISCUSSION AS LEARNING INTERACTION TO ACTIVATE THE SECOND YEAR STUDENTS TO SPEAK ENGLISH AT MACHINE DEPARTMENT OF SMK NEGERI 2 PAYAKUMBUH." English Language Education and Current Trends (ELECT), October17, 2022, 96–109. http://dx.doi.org/10.37301/elect.v1i2.54.

Full text

Abstract:

This research was aimed to find out wether or not the useof small group discussion could activate the second year students of Machine Department of SMK Negeri 2 Payakumbuh to speak English. This research employed a pre experimental method, and it used one group pre test and post test design. Treatment (X) was given between pre-test (T1) and post-test (T2). The population of this study was the second year students of Machine Department of SMK Negeri 2 Payakumbuh, and the number of sample was 30 students. The instruments used in this study were observation checklist and speaking test. The finding of this study showed the use of small goup discussion could activate the students to speak English. It was indicated by the improvement of activities done by students from meeting to meeting as much as 93.19%. It was also indicated with the fact that the t-test value (10.740) was higher than the t-table value at significant level of 0.05 and degree of freedom n-1 (1.711). In other words, the use of small group discussion technique was able to give greater contributionin teaching and learning speaking. REFERENCES Aleen, D. E. (2001) Mimimizing the Perils of Small Group Discussion. Center for Teaching Excelent. Online (http://www.vcu.edu/cte/resources/nfrg/14_04minizing_peril_of.htm) Brown, Douglas (1994) Teaching by Principles: An Interactive Approach to Language Pedagogy. London: Prentice Hall International Ltd. Byrne, Donn (1995) Teaching Oral English. Harlow: Longman Group UK Limited. Canal in Richards and Schmidt (2002 Chastain, Kenneth (1976 ) Developing Second Language Skills. Third Edition. New York: McNally College Publishing. Clark, Herbert H. and Eve V. Clark (1977) Psychology and Language: An Introduction to Psycholingustics. San Diego: Kascourt Brace Jovanich. De Boer, John (1987) Basic Language: Message and Meaning. New York: Haper Row Publisher. Drekurs, Rudolf and B. Gunawan (1982) Maintaning Sanity in the Classroom: Management Technique. New York: Haper Collins Publishing. Frederick, E. (1993) A Plan for Small Group Discussion. Online (http://extension.missouri.edu/explore/common/dm0460.htm) Glistrap, Robert L. and Willian R. Martin (1975) Current Strategies for Teachers: A Resoruce for Personalizing Instruction. Santa Monica, California: Goodyear Publishing Company, Inc. Harmer, Jeremy (1998) How to Teach English. New York: Longman. Hatch, Evelyn and Anne Lazaraton (1991) The Research Manual. New York: Newbury House Publisher. Jabu, Baso (2000) Upaya Peningkatan Kemampuan Menyimak Siswa Kelas 1 SMU N2 Makassar melalui Teknik LWS (Listening-Writing-Speaking). Makassar: FBS Universitas Negeri Makassar. McKeachie, W. J.(1999) Teaching Tips: Strategies, Research, and Theory for College and University Teachers. Boston, Massachusetts: Houghton Mifflin Company. Mikundan (2008) Active Speaking. Online (http://www.mikundan.com/portofolio/winstaru/wvcontents/jobaids/aecr/speak.html Muttakin, M. (1992) Activating the Students to Speak English through Pair Tasks in SMU 3 Ujung Pandang. Unpublished Thesis. Ujung Pandang: FPBS IKIP Ujung Pandang. Noni, Nurdin (2003) A Hybrid of Face to Face Teaching and Computer Assisted language Learning in ELT Based on Individual References. Unpublished Dissertation. Makassar: Pastgraduate Program of Hasanuddin University. Nunan, David (1993) Designing Tasks for Communication Classroom. New York: Cambridge University Press. O’driscoll, Nina and Adrian Pilbeam (1987). Meetings and Discussions. London: Longman Group UK Ltd. Rivers, M. W. (1981) Teaching Foreign Langauge Skills. Chicago: University of Michigan Press. Rosma.(2002) Improving Students’ Communicaive Competence through Group Discussion in the Second Year Students of SMUN 2 Maros. Unpublished Thesis. Makassar: FBS Universitas Negeri Makassar. Steven, Runnebohn, M. Jospeh Mazza, and B. Dan Curtis (1979) Communication for Problem Solving. New York: Wiley and Sons, Inc. Publisher. Ur, Penny (1996) A Course in Language Teaching Practice and Theory. Sydney: The Press Syndicate of the University of Cambridge.

APA, Harvard, Vancouver, ISO, and other styles

29

"Handbook of Transition Metal Polymerization Catalysts Handbook of Transition Metal Polymerization Catalysts . Edited by Ray Hoff (Chemplex Company (retired) and Roosevelt University, Schaumberg, IL) and Robert T. Mathers (Pennsylvania State University, New Kensington, PA). John Wiley & Sons, Inc.: Hoboken, NJ. 2010. xxii + 575 pp. $149.95. ISBN 978-0-470-13798-7 ." Journal of the American Chemical Society 132, no.17 (May5, 2010): 6274. http://dx.doi.org/10.1021/ja102842d.

Full text

APA, Harvard, Vancouver, ISO, and other styles

30

B2042171014, LILIS TEODOSI. "PENGARUH KEADILAN ORGANISASI DAN KEPEMIMPINANTERHADAP KEPUASAN KERJA DAN PERILAKU KERJA KONTRAPRODUKTIF PEGAWAI NEGERI SIPIL PADA SEKRETARIAT DAERAH KABUPATEN MELAWI." Equator Journal of Management and Entrepreneurship (EJME) 7, no.4 (August2, 2019). http://dx.doi.org/10.26418/ejme.v7i4.34537.

Full text

Abstract:

Untuk mewujudkan visi yang ingin dicapai oleh Sekretariat Daerah Kabupaten Melawi dibutuhkan upaya penanganan dan pencegahan terhadap perilaku kerja kontaproduktif yang dapat merugikan organisasi dan stakeholderlainnya terhadap seluruh Pegawai Negeri Sipil yang ada di lingkungan Sekretariat Daerah Kabupaten Melawi.Tujuan penelitian adalah untuk menguji dan menganalisa pengaruh keadilan organisasi dan kepemimpinan terhadap kepuasan kerja dan perilaku kerja kontraproduktif Pegawai Negeri Sipil pada Sekretariat Daerah Kabupaten Melawi. Bentuk penelitian ini adalah deskriptif dengan pendekatan kausal komparatif. Pengumpulan data menggunakan data primer berupa kuisioner dan data sekunder berupa data yang bersumber dari Sekretariat Daerah Kabupaten Melawi. Pengambilan sampel penelitian dilakukan dengan menggunakan sampling sensus. Sampel dalam penelitian ini berjumlah 95 orang yang merupakan Pegawai Negeri Sipil di Sekretariat Daerah Kabupaten Melawi. Hasil dari penelitian ini adalah yang pertama keadilan organisasidan kepemimpinan berpengaruh positif dan signifikan terhadap variabel kepuasa kerja dan yang kedua keadilan organisasi, kepemimpinan, dan kepuasa kerja berpengaruh negatif dan signifikan terhadap perilaku kerja kontraproduktif. Kata Kunci : Keadilan Organisasi, Kepemimpinan, Kepuasan Kerja, Perilaku Kerja KontraproduktifDAFTAR PUSTAKA Arfah.(2015). Pengaruh Kepuasan Kerja Terhadap Perilaku Menyimpang Dan Organizational Citizenshipbehavior (Studi Pada Baitul Maal Wat Tamwi (Bmt) Di Provinsi Jawa Timur). Jurnal Aplikasi Administrasi Vol.18 Mei 2015. Chernyak-Hai, Lily & Aharon Tziner. (2014). Relationships Between Counterproductive Work Behavior, Perceived Justice And Climate, Occupational Status, And Leader-Member Exchange. Journal of Work and Organizational Psychology 30 (2014) 1-12. Downloaded from www. Elsevier.es/rpto. Fadilah, Muhammar Arif. (2015). Psikologi Industri Perilaku Tidak Produktif. Diakses dari mynewblogaidil.blogspot.com/2015/07/psikologi-industri-perilaku-tidak.html. Ferdinand, Augusty. (2007). Metode Penelitian Manajemen Pedoman Penelitian Untuk Penulisan Skripsi, Tesis, Dan Disertasi Ilmu Manajemen. Semarang : Badan Penerbit Universitas Diponegoro. Griffin, Ricky W. (2009). Manajemen. Jakarta: Erlangga. Ivancevich, John M., Robert Konopaske, & Michael T. Matteson. (2011). Perilaku dan Manajemen Organisasi. Jakarta: Erlangga. Ivancevich, John M., Robert Konopaske, & Michael T. Matteson. (2012). Perilaku dan Manajemen Organisasi. Jakarta: Erlangga. Kaswan. (2017). Psikologi Industri & Organisasi. Jakarta : Alfabeta Kreitner, Robert & Angelo Kinicki. (2010). Organizational Behavior Ninth Edition. USA:McGraw-Hill Irwin Kuncoro, Mudrajad. (2014). Metode Riset untuk Bisnis & Ekonomi. Bagaimana Meneliti & Menulis Tesis? Edisi 3. Jakarta:Erlangga Lestari, Milna Ayu. (2016).Hubungan Budaya Organisasi Dengan Perilaku Kontraproduktif Pada Pegawai Badan Pertanahan Nasional Tingkat II Samarinda. PSIKOBORNEO, 2016, 4 (2) : 286 - 291 ISSN 2477-2674, ejournal.psikologi.fisip-unmul.ac.id © Copyright 2016.Luthans, Fred. (2006). Perilaku Organisasi Edisi Sepuluh. Yogyakarta : PT Andi Mangkunegara, Anwar Prabu. (2009). Manajemen Sumber Daya Manusia Perusahaan. Bandung : PT. Remaja Rosdakarya. Naway, Fory Armin. (2014). Pengaruh Pengembangan Karir, Persepsi Tentang Keadilan Organisasi, Dan Kepuasan Kerja Terhadap Organizational Citizenship Behavior. Jurnal Manajemen/Volume XVIII, No. 03, Oktober 2014: 407-425. Nelson, Debra L. & James Campbell Quick. (1997). Organizational Behavior Foundations, Realities, and Challenges Second Edition. St. Paul, MN : West Publishing Company. Nurfianti, Agustin & Seger Handoyo. (2013). Hubungan Antara Keadilan Distributif dan Perilaku Kerja Kontraproduktif dengan Mengontrol Leader Member Exchange (LMX). Jurnal Psikologi Industri dan Organisasi Vol. 02, No. 03, Desember 2013.Puni,Albert, Collins B. Agyemang & Dr. Emmanuel Selase Asamoah. (2016).Leadership Styles, Employee Turnover Intentions and Counterproductive Work Behaviours. International Journal Of Innovative Research & Development January, 2016 Vol 5 Issue 1. Putra, I Gede Edi Sastrawan Mahadi & Ayu Desi Indrawati. (2018). Pengaruh Keadilan Organisasi Terhadap Kepuasan Kerja Dan Komitmen Organisasional Di Hotel Rama Phala Ubud. E-Jurnal Manajemen Unud, Vol. 7, No. 4, 2018: 2010-2040 ISSN : 2302-8912 DOI: https://doi.org/10.24843/EJMUNUD.2018.v7.i04.p11. Robbins, Stephen P. & Mary Coulter. (2005). Manajemen. Jakarta : PT. Indeks. Robbins, Stephen P. & Timothy A. Judge. (2018). Perilaku Organisasi/Organizational Behavior Edisi 16. Jakarta : Salemba Empat. Schermerhorn, John R. JR. (2002:391). Management Seventh Edition. USA:John Wiley & Sons, Inc.Shkoler, Or & Aharon Tziner. (2017).The Mediating And Moderating Role of Burnout and Emotional Intelligence in the Relationship Between Organizational Justice and Work Wisbehavior. Journal of Work and Organizational Psychology 33 (2017) 157–164www.elsevier.es/rpto.Sinambela, Lijan Poltak. (2018). Manajemen Sumber Daya Manusia. Jakarta : PT. Bumi Aksara. Suprapta, Made, Desak Ketut Sintaasih & I Gede Riana. (2015). Pengaruh Kepemimpinan Terhadap Kepuasan Kerja Dan Kinerja Karyawan (Studi Pada Wake Bali Art Market Kuta-Bali). E-Jurnal Ekonomi dan Bisnis Universitas Udayana 4.06 (2015) : 430-442 ISSN : 2337-3067. Sutrisno, H. Edy. (2017). Manajemen Sumber Daya Manusia. Jakarta : Kencana. Wibowo. (2017). Manajemen Kinerja Edisi Kelima. Depok : Rajawali Pers. Widiani, Ni Komang Ayu & Agoes Ganesha Rahyuda. (2017). Pengaruh Kompensasi Terhadap Kepuasan Kerja Dan Counterproductive Work Behaviour: Studi Pada Organisasi Publik Di Bali. Forum Manajemen Indonesia (FMI 9), November 2017 ISBN: 978-602-8557-31-3. Wiratama, Dewa Gede & I Wayan Suana. (2015). Pengaruh Keadilan Organisasi Terhadap Kepuasan Kerja Dan Turnover Intention Pada Karyawan The Jayakarta Bali. E-Jurnal Manajemen Unud, Vol. 4 , No.11, 2015: 3675 - 3702 ISSN : 2302-8912. Wiratama, William Jefferson, I Gede Riana, & Agoes Ganesha Rahyuda. (2017).Keadilan Organisasional Sebagai Pemediasi Pengaruh Kepemimpinan Etis Terhadap Counterproductive Work Behaviour Pada Hotel Discovery Kartika Plaza Kuta. E-Jurnal Ekonomi dan Bisnis Universitas Udayana 6.5 (2017): 2133-2160 ISSN : 2337-3067. Wiwiek & Oliandes Sondakh. (2015). Pengaruh Keadilan Organisasional Pada Motivasi Karyawan Dan Komitmen Organisasional. Jurnal Siasat Bisnis Vol. 19 No. 1, Januari 2015 69-77. Wiyono, Gendro. (2011). Merancang Penelitian Bisnis Dengan Alat Analisis SPSS 17.0 & SmartPLS 2.0. Yogyakarta: Unit Penerbit dan Percetakan STIM YKPN Yogyakarta.

APA, Harvard, Vancouver, ISO, and other styles

31

Wash, John. "Responsible Investment Issues in Special Economic Zone Investment in Mainland Southeast Asia." VNU Journal of Science: Economics and Business 35, no.2 (June25, 2019). http://dx.doi.org/10.25073/2588-1108/vnueab.4226.

Full text

Abstract:

This paper seeks to explore environmental, social and governance issues arising from investment in special economic zones (SEZs) in the mainland Southeast Asian region through a mixture of thick analytical description and multiple case study approach. All the states studied here have embraced the SEZ approach as it offers rapid economic development without any implications for the political settlement, which is considered beneficial by current administrations. Particular emphasis is placed on environmental, social and governance issues in the region covered and some complex issues that have emerged. It is shown that the situation is complex and continually evolving and that there are limited constraints on the actions of corporations. Consequently, there is an opportunity for investors to set precedents and protocols on a progressive basis. Keywords Economic development; environmental, social and governance issues; mainland Southeast Asia; special economic zones References [1] Anderson, Benedict, “Murder and Progress in Modern Siam,” New Left Review. 181 (1990) 33-48.[2] Ando, “About Ando”. www.ando-kyo.co.jp/english/about/history.html/, 2016.[3] Apisitniran, Lamonphet, “Latest SEZ Land Proposal Fizzles out,” Bangkok Post, Business B2, June 19th, 2015.[4] Aung, Noe Noe, “Workers Strike over Wage Demands”, Myanmar Times. http:// www.mmtimes.com/national-news/yangon/7150-thousands-of-workers-protest-in-hlaing-tharyar.html/, November 12th, 2017. [5] Baissac, Claude, “Brief History of SEZs and Overview of Policy Debates,” in Thomas Farole, ed., Special Economic Zones in Africa: Company Performance and Learning from Global Experience (Washington, DC: World Bank. http://openknowledge.worldbank.org/bitstream/handle/10986/2341/638440PUB0Exto00Box0361527B0PUBLIC0.pdf/, 2011. [6] Beerlao, “Lao Brewery” (n.d.). http://www.beerlao.la/products/.[7] Champasak Province, “Investment Opportunities in Laos: Champasak Province”. http://www.poweringprogress.org/new/images/PDF/Champassak_10/Champassak_10.pdf/, 2009.[8] Chang, Ha-Joon, Ilene Grabel, Reclaiming Development: An Alternative Economic Policy Manual, London: Zedbooks, 2014.[9] Chintraruck, Alin and John Walsh, “Bangkok and the Floods of 2011: Urban Governance and the Struggle for Democratisation,” in Miller, M. and M. Douglass (eds.), Disaster Governance in Urbanising Asia, Singapore: Springer, 2016, pp.195-209.[10] David, Sen, “Garment Factory Employees Protest Short-Term Contracts,” Phnom Penh Post. http:// www.phnompenhpost.com/national/garment-factory-employees-protest-short-term-contracts/, 2016.[11] Embassy of Japan in the Lao PDR, “Remarks by H.E. Hiroyuki Kishino, Ambassador of Japan to the Lao PDR, at the Inauguration Ceremony of the New Ando Factory in Pakse. http://www.la.emb-japan.go.jp/content_japan_laos_relations/ambassador_speech/Ando.html/, 2013 (Champasak Province on 03 December, 2013”). [12] M. Eisenbruch, “Mass Fainting in Garment Factories in Cambodia”, Transcultural Psychiatry. 54 (2017) 155-78.[13] Gopalakrishnan, Raju, “China-Vietnam Dispute: “More than 20 Killed” in Anti-China Riots,” Independent. http:// www.independent.co.uk/news/world/asia/china-vietnam-dispute-more-than-20-killed-in-anti-china-riots-9375887.html/, 2014 (May 15th, 2014). [14] Guardian Staff, Agencies, “Aung San Suu Kyi Denies Ethnic Cleansing of Rohingya Muslims in Myanmar,” The Guardian. http:// www.theguardia.com/world/2017/apr/05/myanmar-aung-san-suu-kyi-ethnic-cleansing/, 2017 (April 5th, 2017). [15] Hance, Jeremy, “High-End Laos Resort Serves up Illegal Wildlife for Chinese Tourists”, The Guardian.http://www.theguardian.com/environment/radical-conservation/2015/mar/19/high-end-laos-resort-serves-up-illegal-wildlife-for-chinese-tourists/, 2015 (March 19th, 2015). [16] HKTDC, “Myanmar Rising: Industrial and Special Economic Zones”. http://economists-pick-research.hktdc.com/business-news/article/Research-Articles/Myanmar-Rising-Industrial-and-Special-Economic-Zones/rp/en/1/1X000000/1X0A72FF.htm/, 2016. [17] Inclusive Development International, “Cambodia: Boeung Kak Lake Evictions” (n.d.). http:// www.inclusivedevelopment.net/campaign/cambodia-boeung-kak-lake-evictions/. [18] International Rivers, “The World Bank and Dams”. http://www.internationalrivers.org/sites/default/files/attached-files/world-bank-and-dams-fact-sheet.pdf/, 2015 (April, 2015). [19] Jacobsen, Trudy, Lost Goddesses: The Denial of Female Power in Cambodian History (Copenhagen: NIAS Press, 2008).[20] Kongkirati, Prajak, “Murder without Progress in Siam: From Hired Gunmen to Men in Uniform,” Kyoto University Center for Southeast Asia Studies. http://kyotoreview.org/issue-21/murder-without-progress-siam/, 2017. [21] Ku, Samuel, “China’s Expanding Influence in Laos,” East Asia Forum. http:// www.eastasiforum.org/2016/02/26/chinas-expanding-influence-in-laos/, 2016 (February 26th, 2016).[22] Kurlantzick, Joshua, “Cambodia Draws Closer to Outright Authoritarianism,” Council on Foreign Relations. http://www.cfr.org/blog/cambodia-draws-closer-outright-authoritarianism/, 2017 (October 10th, 2017). [23] Kyozuki, Tamaki, “Laos OKs Economic Zone for Smaller Japanese Companies,” Nikkei Asian Review. http://asia.nikkei.com/Politics-Economy/Economy/Laos-OKs-economic-zone-for-smaller-Japanese-companies/, 2015 (September 18th, 2015).[24] Larsson, Naomi, “Human Rights in Thailand: Andy Hall’s Legal Battle to Defend Migrant Workers,” The Guardian. http:// www.theguardian.com/global-development-professionals-network/2016/jan/22/human-rights-thailand-andy-hall-legal-battle-migrant-workers/, 2016 (January 22nd, 2016). [25] Le Coz, Clothilde, “Blood Sugar”. http://www.ruom.net/portfolio-item/blood-sugar/, 2013. [26] LNC, “Nishimatsu Capitalized on Pakse-Japan SME SEZ Development”. http://laonishimatsu.com/?lang=en&module=news&idz=7/, 2016.[27] T.G. McGee, The Southeast Asian City: a Social Geography of the Primate Cities of Southeast Asia (London: G. Bell and Sons, 1967), 1967.[28] McGrath, Cam, “Sihanoukville Zone Prospers on China Links,” The Phnom Penh Post. https:// www.phnompenhpost.com/business/sihanoukville-zone-prospers-china-links/, 2017 (June 12th, 2017). [29] Mills, Mary Beth, “From Nimble Fingers to Raised Fists: Women and Labor Activism in Globalizing Thailand,” Signs: Journal of Women in Culture and Society. 31 (2005) 117-44.[30] Minami, Ryoshin and Xinxin Ma, “The Lewis Turning Point of Chinese Economy: Comparison with Japanese Economy,” China Economic Journal. 3 (2010) 163-79.[31] Mingaladon Industrial Park, “Internal Infrastructure”. https://www.mingaladon.com/infrastructure-services.htm/, 2017a. [32] Mingaladon Industrial Park (2017b), “Investment Incentives,” http:// www.mingaladon.com/investment-incentives.htm.[33] Myanmar Industries, “Main Activities”. https:// myanmarindustries.org/index.php/main-activities-2/, 2017b. [34] Myanmar Industries, “Background”. https://myanmarindustries.org/index.php/background-2/, 2017a. [35] Nikon, “Establishment of a New Factory in Laos”. https://www.nikon.com/news/2013/0321_01.htm/,2013. [36] Nolintha, Vanthana, “Cities, SEZs and Connectivity in Major Provinces of Laos,” in Masami Ishida, ed., Intra- and Inter-City Connectivity in the Mekong Region, BRC Research Report No.6 (Bangkok: IDE-JETRO Bangkok Research Centre, 2011). http://www.ide.go.jp/library/English/Publish/Download/Brc/pdf/06_chapter4.pdf/, 2011.[37] Paing, Yan, “Chinese Developer to Invest US$390m in Mandalay Project,” Eleven Myanmar (13th, October, 2017), http://www.elevenmyanmar.com/local/11966/, 2017 (13th, October, 2017). [38] Phnom Penh SEZ, ‘Facilities and Services,’ Phnom Penh SEZ, available at: www.ppsez.com/en/the-zone/phnom-penh-sez/facilities/, 2017. [39] Pinyochatchinda, Supap*rn and John Walsh, “Pollution Management and Industrial Estates: Perceptions of Residents in the Vicinity of Map Ta Phut Industrial Estate,” Information Management and Business Review. 6 (2014) 42-8.http://bua.rmutr.ac.th/wpcontent/uploads/2016/09/WY-13-56.pdf. [40] Poupon, Roland, The Thai Food Complex: From the Rice Fields to Industrial and Organic Foods (Bangkok: White Lotus Press, 2013), 2013.[41] QTSP, “Who We Are”, available at: https://web.archive.org/web/20110501200030/http://www.quangtrungsoft.com.vn:80/index.php/en/about-qtsc/who-we-are?start=3/, 2011. [42] Rentsbuy, “Govt Approves New SEZ in Champasak”. https:// www.rentsbuy.com/project/economic-zone/pakxe-japan-sme-specific-economic-zone.html/, 2015 (August 10th, 2015).[43] Reporters without Borders, “2017 World Press Freedom Index”. https://rsf.org/en/ranking/, 2017.[44] Scott, C. James, Weapons of the Weak: Everyday Forms of Peasant Resistance, New Haven, CT: Yale University Press, 1985. [45] Sihanoukville SEZ, “Social Responsibility”. https:// ssez.com/en/social.asp#/, 2017. [46] Siu, Kaxton, “The Vietnam Strike Wave,” Asia Monitor Resource Centre. www.amrc.org.hk/content/vietnam-strike-wave/, 2011 (June 27th, 2011). [47] Stuart-Fox, Martin, “Historical and Cultural Constraints on Development in the Mekong Region,” paper prepared for the seminar “Accelerating Development in the Mekong Region: The Role of Economic Integration,” Siem Reap, Cambodia. http://www.imf.org/external/np/seminars/eng/2006/mekong/fox.pdf/, 2006 (June 26th-27th, 2006). [48] The Nation, “Laos-Japan Economic Zone to Benefit Local Community”. http://www.nationmultimedia.com/business/Laos-Japan-economic-zone-to-benefit-local-communit-30276007.html/, 2016 (January 2nd, 2016).[49] The Nation, “Foreigners to Be Allowed to Set up Universities in Special Economic Zones,” The Nation. http://www.nationmultimedia.com/news/breakingnews/30315506/, 2017 (May 17th, 2017). [50] Thongnoi, Jitsinee, “Open for Business, If Anyone Wants to Come,” Bangkok Post, April 5th, 2015, pp. 6-9.[51] Thul, Prak Chan, “Cambodian Forces Open Fire as Factory Strikes Turn Violent,” Reuters. http://www.reuters.com/article/us-cambodia-protest/cambodian-forces-open-fire-as-factory-strikes-turn-violent-idUSBREA0203H20140103/, 2014 (January 3rd, 2014).[52] Transparency International, “Country Analysis”. https://www.transparency.org/country/, 2016.[53] Trinh, Vo Thi Trung, Narumon Sriratanaviriyakul, Matthews Nkhoma and Hiep Pham, “Quang Trung Software City - The Largest Vietnamese Software Park,” Journal of Information Technology Education: Discussion Cases, Vol.2, Case No.6 (2013), http://www.jite.org/documents/DCVol02/v02-06-QuangTrung.pdf/, 2013. [54] UNCTAD, Investment and Enterprise Responsibility Review: Analysis of Investor and Enterprise Policies on Corporate Social Responsibility (New York, NY and Geneva: UNCTAD.http://unctad.org/en/Docs/diaeed20101_en.pdf/, 2011. [55] Vietnam Briefing, “IT Parks in Vietnam: Present and Future”. http://www.vietname-briefing.com/news/it-parks-in-vietnam-present-and-future7461.html/, 2017. [56] Vietnam.net, “More Software Parks to Go up”. https:// english.vietnamnet.vn/fms/science-it/116286/more-software-parks-to-go-up.html/, 2014 (November 13th, 2014a).[57] Vietnam Net, “China Attempts to Control Vietnam’s Mineral Industries”. https:// english.vietnamenet.vn/fms/business/94502/china-attempts-tocontrol-vietnam-s-mineral-industries.html/, 2014b (January 25th, 2014b). [58] Walsh, John, “Tesco Lotus Thailand: Managing Stakeholders in a Hostile Environment,” in B.S. Sahay, Tojo Thatchenkery and G.D. Sardana, Handbook on Management Cases (New Delhi: Allied Publishers Pvt. Ltd., 2008, pp. 447-51.[59] Walsh, John, “The Development of Dawei Special Economic Zone,” The Myanmar Journal. 2 (2015) 9-26, [60] Walsh, John and Nittana Southiseng, “Vientiane - A Failure to Exert Power?” City: Analysis of Urban Trends, Culture, Theory, Policy, Action. 13 (2009) 95-102.[61] Wancharoen, Supoj and Sirinya Wattanasukchai, “Urban Projects Gain Favour, Stoke Fury,” Bangkok Post (December 30th 2015), 2015. [62] Whitehead, Judith, “Intersectionality and Primary Accumulation: Caste and Gender in India under the Sign of Monopoly-finance Capital,” Monthly Review. 68 (2016) 37-52.[63] World Bank, “International Scorecard”. https://lpi.worldbank.org/international/scorecard/ 2016.[64] World Economic Forum (2016), Global Competitiveness Report, 2016, available at: reports.weforum.org/global-competititveness-report-2015-2016.[65] WTO, “Members and Observers”. https://www.wto.org/english/thewto_e/whatitis_e/tif_e/org6_3.htm/, 2016.

APA, Harvard, Vancouver, ISO, and other styles

32

Van Es, Karin, Daniela Van Geenen, and Thomas Boeschoten. "Re-imagining Television Audience Research: Tracing Viewing Patterns on Twitter." M/C Journal 18, no.6 (March7, 2016). http://dx.doi.org/10.5204/mcj.1032.

Full text

Abstract:

IntroductionIn his seminal article, “Communications: Blindspot of Western Marxism” (1977), Dallas Smythe suggested that audiences are the commodity form of advertiser-supported communications, as their time is sold to advertisers. Audience measurement firms establish the audience size for a programme by calculating how many people are “tuned in” to a particular offering, and then provide their estimates to advertisers and break down their figures on the basis of demographic characteristics (these characteristics include age, gender, and income level). These ratings have long been the currency of the television industry. Essentially, Smythe points out that advertisers purchase, “the services of audiences with predictable specifications who will pay attention in predictable numbers and at particular times to particular means of communication” (4). Ien Ang has proposed that audience measurement produces an “objectified category of others” that can be governed and abstracted from the “messiness of everyday life” (8, 132). Indeed, Ang sees ratings to be a means of controlling the audience by creating a truth about them that suits the industry’s needs for an exchangeable commodity.In the United States, Nielsen ratings dictate the terms for the buying and selling of television advertising. Over the years, Nielsen has adjusted the measurement methodology to satisfy the demands of various stakeholders: audience measurement companies, advertisers, programme producers, and network executives, among others. Recently, however, social media (particularly Twitter) has threatened Nielsen’s preeminence. Writing in Wired magazine in 2013, Tom Vanderbilt went so far as to declare that the Nielsen Family—the “25,000 households whose TV habits collectively provide a statistical snapshot of a nation’s viewing behavior” (n.p.)—was now dead. He proposed that a show’s “tweetability” had become more important than its Nielsen rating.Nielsen, for its part, has tried to keep up with the changing television landscape and the demands of the television industry. In 2012 they partnered with McKinsey & Company to create the social media consulting company NM Incite, and acquired social TV startup SocialGuide. The following year the company introduced Nielsen Twitter TV Ratings (NTTR) as a supplement to its traditional ratings offering. This step is in line with the shifting industry interest from measuring audience exposure to programming to measuring audience engagement with programming (Jenkins; and Napoli).With NTTR, Nielsen has made, we suggest here, a fairly unimaginative and restricted addition to existing metrics in that it limits its measurements to tweet volume and tweet impressions. In this paper we explore other ways Twitter might be used to create insights that would be useful for audience research. Richard Rogers has raised the question of whether and when standard methods should be applied to the study of a new medium (162). We respond by proposing that, in the case of NTTR, traditional methods should not be applied to Twitter.We begin by briefly discussing the emergence of social media metrics and some of the problems involved in employing these metrics in current audience research. We then investigate how Twitter invites new forms of inquiry, drawing a picture of relationships among television programmes based on viewer tweets. In this re-imagining of audience research, following the Digital Methods tradition, we treat Twitter as a “postdemographic machine” (Rogers) that profiles user tastes, interests, favourite things, and so forth (rather than demographics such as age, income, educational level, and ethnicity).Nielsen and the Introduction of NTTRNielsen collects data about television viewing through diaries kept by members of a relatively small audience sample and meters that are connected to television sets. They provide ratings for programmes according to a system where one Nielsen rating point equals one per cent of all US households with television sets tuned into that programme. Two trends now strain this traditional form of the “exposure metrics” used in the buying and selling of primetime advertising: audience fragmentation and audience autonomy (Napoli). These terms refer, respectively, to the explosion of channels and platforms, first via cable television and later the Internet, on which viewers can watch television programming, and to viewers’ increased control over what television programmes they watch and when they watch them, thanks to technologies such as remote control, DVR, and now the Internet. These trends have eroded audience size for broadcast television and have made traditional metrics, which measure a sample of the audience, increasingly less representative of the viewing population as a whole. Responding to the changing television landscape, Nielsen introduced its “C3 rating” in 2009. This rating measures commercials watched both during first-run broadcasts and on DVR playback within three days (Nielsen Company, “C3 TV Ratings”). In this new landscape, producers and advertisers have begun to think that a small, yet engaged, group of viewers might be more valuable than a larger, more superficial audience (Jenkins 63). They have become increasingly interested in viewers’ engagement with particular programmes. Since around 2009, social TV as a television strategy—to stimulate people to watch television at its scheduled broadcast time and to deepen their engagement with programmes using the real-time features of social media—has gained prominence (van Es). Social TV efforts protect the existing business model for television.The Internet, and its communication structures, are becoming a valuable companion to television, not only because social media reinvigorates first-run viewing, but also because it provides data about viewing activity (Lee and Andrejevic). Social TV’s popularity made the introduction of NTTR unsurprising. Moreover, the particular partnership with Twitter, as opposed to other social platforms, makes sense, because Twitter is—at least for now—the biggest player in the social TV space. Its current ascendency may be due to the particular public openness of the platform, which unlike Facebook allows even non-account holders access to Twitter streams, and its users’ propensity to share their responses to TV on Twitter in real time (Proulx and Shepatin 13).NTTR measures the total number of tweets that refer to a specific television episode, the number of times these tweets were viewed (“impressions”), “unique authors” (accounts that tweeted at least once about a specific episode), and “unique audience” (the number of individual accounts that received at least one “impression” of the tweets about a specific episode [Nielsen Company, “Weekly Top Ten”]). Since May 2014, Nielsen also includes a demographic breakdown in NTTR, specifying the age and gender of those who tweet and view tweets (related to programming from 250 US TV networks). Through a partnership with GfK, a leading market research institute in Europe, Nielsen has since introduced Twitter TV ratings in Germany, Austria, and The Netherlands.In the United States, other companies besides Nielsen generate social TV analytics. Philip Napoli has compared the leading three social TV analytics providers: BlueFin Labs, Trenddr.tv, and General Sentiment. Twitter has recently acquired the first two of these firms as part of its efforts to solidify its position in the social TV landscape. These social TV analytics providers, Napoli claims, and we would add NTTR to the list, are methodologically distinct from traditional ratings in three ways. First, they track everyone who is tweeting about a programme rather than using a “representative” sample. Second, people do not receive incentives to participate in the research, or even get to opt in or out of it. Third, social analytics can focus on not only the “volume” but also the “valence” of an online conversation: it can assign, for instance, a quantitative score between 1 and 10 to reflect either positive or negative contributions on social media (Napoli 11).Among the reviewed providers, Napoli found two main methodological disparities: the platforms they draw data from and the time windows used (10-15). He contends that by measuring different factors they offer different interpretations of “engagement” and give conflicting representations of the audience as a commodity. Social media metrics are not going to work as long as there is disagreement over how to measure and value television’s viewers.Social media metrics have been met with considerable criticism. Like traditional metrics, they track a particular demographic rather than a random sample of people, and so are not broadly representative. Nancy Baym points out how social media metrics in audience research are affected by factors such as “skew,” a by-product of the fact that platforms actively shape the communication that takes place on them. Trending topics on Twitter may, for instance, boost the number of tweets about a programme. She also identifies the problem of deception: bots can tweet about topics and accounts can purchase certain forms of engagement (Baym n.p.).Most important here, perhaps, is what Baym calls “ambiguous meaning”: actions on social media are “uncoupled from contexts of action and application” (Dean in Baym n.p.). In the case of Twitter, for instance, it is not readily evident why people tweet, or why they retweet or favourite certain tweets; one can learn why people do so only through methods such as interviews.The discussion of these limitations highlights the need for a certain sensibility when encountering social media metrics. The limitations themselves, however, do not mean that Twitter is ineffectual for audience research. Tweets can help generate insights and raise new questions about television viewing. Between Counting Viewers and Counting TweetsTo explore the relationship between traditional ratings and NTTR, we collected tweets about television programmes in The Netherlands during the first four weeks of September 2014. This project was conducted, on behalf of BuzzCapture, by a group of research assistants of the Utrecht Data School (Leila Essanoussi, Friso Leder, David de Wied, and Koen Mooij) under our instruction. Specifically, we extracted tweets from 1 September up to, and including, 29 September 2014. We included one extra day since programmes aired on Sunday 28 might still have been discussed around midnight. Initially, we collected tweets on the basis of the official and popular hashtags relating to the 30 most-watched television programmes (rated by the national association for audience research, Stichting KijkOnderzoek, SKO); we then added two programmes not included in this list that were frequently mentioned on Twitter. We collected tweets referring to these 32 programmes as well as profile information of the related Twitter accounts. After removing marketing and spam accounts, we had a sample of 135,882 tweets posted by 39,792 unique tweeters.Figure 1: Number of Viewers versus Average Number of TweetsWe then compared the number of viewers to the average number of tweets referring to the 32 television programmes in a scatterplot (see Figure 1). We took the average number of tweets as our reference point to correct for the fact that the frequency of broadcasting differed among the programmes. Figure 1 shows that some programmes attract a large audience but generate few tweets, and vice versa. For example, Het Journaal, with three million viewers, generates an average of 160 tweets per broadcast, while Pauw, with fewer than 750,000 viewers, generates on average nearly 1,000 tweets.This sort of disparity suggests that what is “successful” in terms of the number of tweets may not be “successful” in terms of the number of viewers. There are several possible explanations for the variation in Twitter activity: a political talk show like Pauw consists of highly controversial content, making it more likely to “spark” tweets and retweets, while the eight o’clock news airs less polarising points of view. Moreover, reality shows like The Voice of Holland not only stir up conflict and invite enthusiastic judgements (Bratich) but also actively encourage their audience to interact through social media.Our sample, moreover, suggests that viewing television and tweeting about programming constitute two distinct phenomena. However, there remains a lot of speculation about what can be inferred from a tweet and tweet impressions, and thus what price tag to attach to these sorts of activities. Twitter numbers are now used either as a point of differentiation from traditional methods (such as, to sell programmes by claiming that they are successful, despite their low ratings), or when a programme’s audience is too small to be registered by traditional methods (Napoli). In what follows, we explore how tweets can be used to study viewing patterns, and briefly consider the advantages of doing so.Looking at Affiliations among TV Programmes through Tweets In his book Digital Methods (2013), Richard Rogers points out how social networking sites allow for new methods to study social networks. Information supplied to social media platforms can be used to explore “post-demographics,” meaning that they can be used to profile users’ tastes, interests, and favourite items, and the co-occurrences of the expressions of these preferences (154). Although this approach is common on various platforms (for example, in Amazon recommendations) and in online marketing practices (as in those that establish affiliations among the brands people tweet about), it has not commonly been used to research audiences. Looking at affiliations can, we suggest here, help create new knowledge about audiences.Figure 2: The Overlap in Tweeters among 32 Programmes in the NetherlandsUsing the same dataset of tweets used for the scatterplot, we tracked the viewing patterns of tweeters, analysing the sequence in which they used programme hashtags. We found that 8,958 people tweeted about more than one programme. The data revealed very interesting results when we calculated the relative overlap among programmes, charting the number of interrelating tweeters with respect to the absolute number of tweeters who referred to the two respective programmes. We imported the 32 nodes (the programmes) and the relative relations to Gephi in order to generate an association network, using the force-directed layout algorithm ForceAtlas2. The resulting network helps illuminate which programmes attract the same tweeters (see Figure 2). Our decision to rectify for the bias of highly social programmes has serious consequences and its validity is open to discussion. We did so to help expose taste relations (rather than reflect popularity).The association network demonstrates that TV shows of the same genre attract similar Twitter audiences: Dubbeltje op Zijn Kant and Uitstel van Executie are both reality shows about personal financial struggles, Studio Sport and Studio Voetbal are sport programmes, Hart van Nederland and RTL Boulevard are tabloid news shows, and Spoorloos and Familiedinner are programmes that centre on family issues. Aside from the strong overlap between programmes of the same genre, the visualisation also shows a concentration of programmes from public broadcasters—on the left-hand side of the figure—and those on commercial television—seen on the right. These connections suggest that people that watch commercial television tend to focus their viewing to commercial television (and the same is true for public television). The Voice of Holland, which seems to have a weak overlap in tweeters with multiple programmes, presents an intriguing case. This observation invites further consideration of its audience composition (which traditional ratings might help with).These are just some quick reflections made possible by using different methods to study Twitter. Although the input from an association network does not provide neat numbers that can serve as a “commodity,” it could help inform the programme schedules of television networks (they could adjust air times to better fit audience preferences, for example, by scheduling two TV shows with similar Twitter audiences in back-to-back time slots). Such insights could assist advertisers better understand consumer behaviour and viewing habits and thus maximise the effectiveness of their commercials. Television producers could also explore on-air and online collaborations between programmes. ConclusionIn this paper we have discussed the limitations of both traditional metrics and newer social media metrics. We explored how tweets can be used to generate insights into viewing patterns, briefly considering how such findings could benefit various parties. We have shown that the counting of tweets addresses the tweetability of a show but seems unrelated to the show’s number of viewers. We speculate, also, that programmes that spark polarised debate or motivate users to engage through social media are receiving many more mentions on Twitter than other sorts of programming. There is much space for TV programmers to build new relationships with their viewers.We have offered some criticism on the decision of NTTR to apply old methods to a new medium, and proposed that audience research on social media should—as the digital methods dictum goes—“follow the medium.” That is, such research should make use of the features of the medium (links, tags, timestamps, and the like) that invite new forms of inquiry. Finally, we have shown that a digital methods approach, although it will not necessarily provide conclusive answers, raises relevant questions that can elicit additional research.ReferencesAng, Ien. Desperately Seeking the Audience. London: Routledge, 1991.Baym, Nancy. “Data Not Seen: The Uses and Shortcomings of Social Media Metrics.” First Monday 18.10 (2013). 23 Sep. 2015 ‹http://firstmonday.org/ojs/index.php/fm/article/view/4873/3752›.Bratich, Jack. “Affective Convergence in Reality Television: A Case Study in Divergence.” Flow TV: Television in the Age of Media Convergence. Ed. M. Kackman, M. Binfield, M. Payne, A. Perlman, and B. Sebok. New York: Routledge, 2011. 55–74.Jenkins, Henry. Convergence Culture. New York: New York UP, 2006.Lee, Hye Jin, and Mark Andrejevic. “Second-Screen Theory: From the Democratic Surround to the Digital Enclosure.” Connected Viewing: Selling, Streaming, & Sharing Media in the Digital Era. Eds. Jennifer Holt and Kevin Sanson. New York: Routledge, 2014. 40–61.Napoli, Philip M. “The Institutionally Effective Audience in Flux: Social Media and the Reassessment of the Audience Commodity.” SSRN Electronic Journal (2013). 23 Sep. 2015 ‹http://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID2260925_code548166.pdf?abstractid=2260925&mirid=3›.Proulx, Mike, and Stacey Shepatin. Social TV: How Marketers Can Reach and Engage Audiences by Connecting Television to the Web, Social Media, and Mobile. Hoboken, NJ: John Wiley & Sons, 2012. Rogers, Richard. Digital Methods. Cambridge, MA: MIT Press, 2013. SKO. “Kijkcijfers.” Home—Kijkonderzoek. n.d. 23 Sep. 2015 ‹https://kijkonderzoek.nl/kijkcijfers›.Smythe, Dallas W. “Communications: Blind Spot of Western Marxism.” Canadian Journal of Political and Social Theory 1.3 (1977): 1–27.The Nielsen Company. “C3 TV Ratings Show Impact of DVR Ad Viewing.” What People Watch, Listen to and Buy. Oct. 2009. 23 Sep. 2015 ‹http://www.nielsen.com/us/en/insights/news/2009/c3-tv-ratings-show-impact-of-dvr-ad-viewing.html›.———. "Weekly Top Ten." Nielsen Social. n.d. 23 Sep. 2015 ‹http://www.nielsensocial.com/nielsentwittertvratings/weekly/›.Vanderbilt, Tom. "The New Rules of the Hyper-Social, Data-Driven, Actor-Friendly, Super-Seductive Platinum Age of Television." Wired, Mar. 2013. 23 Sep. 2015 ‹http://www.wired.com/2013/03/nielsen-family-is-dead/›.Van Es, Karin. “The Perks and Perils of Social TV: On the Participation Dilemma in NBC’s The Voice.” Television & New Media (forthcoming).

APA, Harvard, Vancouver, ISO, and other styles

33

Hoang Thuy Bich Tram, Nguyen, and Tran Thi Thuy Linh. "Institutional Quality Matter and Vietnamese Corporate Debt Maturity." VNU Journal of Science: Economics and Business 33, no.5E (December25, 2017). http://dx.doi.org/10.25073/2588-1108/vnueab.4099.

Full text

Abstract:

This article studies whether firm-level and country-level factors affect to the corporation's debt maturity in case of Vietnam or not. The paper adopts the balance panel data of 267 listed companies on two trading board HOSE and HNX in the period from 2008 to 2015, estimated by FEM, REM, 2SLS and GMM method. To intrinsic factors, research results show that financial leverage and default risk control have high positive statistical significance with the debt maturity, but tangible assets are lower than those factors. In addition, growth opportunities and company quality have negative impacts to the debt maturity. To external factors, the results point out that economic growth, stock market development and governmental regulation's efficiency demonstrate the positive relationship to the debt maturity with fairly low correlation levels. In spite of that, inflation rate, financial development, the rule of law, corruption control and the rights of creditor factors have negative correlations to the debt maturity. Keywords Debt maturity, long-term debt ratio, GMM system, firm-level factors, country-level factors References [1] Barclay, M., Smith, C., Jr., “The maturity structure of corporate debt”, Journal of Finance, 50 (1995), 609-631. [2] Kirch, G., Terra, P.R.S., “Determinants of corporate debt maturity in SouthAmerica: Do institutional quality and financial development matter?”, Journal ofCorporate Finance, 18 (2012) 4, 980-993.[3] Cai, K., Fairchild, R., Guney, Y., “Debt maturity structure of Chinese companies”, Pacific Basin Finance Journal, 16 (2008), 268-297.[4] Deesomsak, R., Paudyal, K. & Pescetto, G., “Debt Maturity Structure and the 1997 Asian Financial Crisis”, Journal of Multinational Financial Management ,19(2009) 1, 26-42. [5] Goyal, V.K., Wang, W., “Debt maturity and asymmetric information: Evidence from default risk changes”, Journal of Financial and Quantitative Analysis, 48 (2013), 789-817.[6] Tesfaye T. Lemma, Minga Negash, “Debt Maturity Choice of a Firm: Evidence from African Countries”, Journal of Business and Policy Research, 7 (2012) 2, 60-92[7] Sérgio Costaa, Luis M. S. Laureanoa, Raul M. S. Laureanoa, “The debt maturity of Portuguese SMEs: The aftermath of the 2008 financial crisis”, Social and Behavioral Sciences, 150 (2014 ), 172-181.[8] Myers, S. C., “The Capital Structure Puzzle”, Journal of Finance, 39 (1984), 575-592.[9] Lucas, D., and R. L. McDonald, R. L., “Equity Issues and Stock Price Dynamics”, Journal of Finance, 45 (1990),1019-1043.[10] Flannery, M. J., “Asymmetric Information and Risky Debt Maturity Choice”, Journal of Finance, 41 (1986), 19-37.[11] Douglas W. Diamond, “Monitoring and Reputation: The Choice between Bank Loans and Directly Placed Debt”, The Journal of Political Economy, 99 (1991) 4, 689-721.[12] Morris, “On corporate debt maturity strategies”, Journal of Finance, 31 (1976) 1, 29-37.[13] Myers, S. C.,“Determinants of Corporate Borrowings”, The Journal of Finance, 5 (1977), 147-175.[14] Amir Barnea, Robert A. Haugen, Lemma W. Senbet, “A rationale for debt maturity structure and call provisions in the agency theoretic framework”, The Journal of Finance, 35 (1980) 5, 1223-1234.[15] Jensen M. and W. Meckling, “Theory of the Firm: Managerial Behavior, Agency Costs, and Capital Structure”, Journal of Financial Economics, 3 (1976), 305-360.[16] Douglass C. North, “Institutions”, Journal of Economic Perspectives, 5 (1990) 1, 97-112.[17] Meyer, K. E., “Institutions, transaction costs and entry mode choice in Eastern Europe”, Journal of International Business Studies, 32 (2001), 357-67.[18] Barclay, M.J., Marx, L.M., Smith, C.W., “The joint determination of leverage and maturity”, Journal of Corporate Finance, 9 (2003), 149-167.[19] Johnson, S.A., “Debt maturity and the effects of growth opportunities and liquidity risk on leverage”, Review of Financial Studies, 16 (2003), 209-236.[20] Antoniou, A., Guney, Y., Paudyal, K., “The determinants of debt maturity structure: Evidence from France, Germany and the UK”, European Financial Management, 12 (2006) 2, 161-194.[21] Lopez-Gracia, J., Mestre-Barbera, R., “Tax effect on Spanish SME optimum debt maturity structure”, Journal of Business Research, 64 (2011), 649-65.[22] Custódio, C., Ferreira, A., Laureano, L., “Why are US firms using more short-term debt?”, Journal of Financial Economics, 108 (2013) 1, 182-212.[23] El Ghoul, S., Guedhami, O., Pittman, J., Rizeanu, S., “Cross-country evidence on the importance of auditor choice to corporate debt maturity”, Contemporary Accounting Research (2014).[24] Belkhir, M., Ben-Nasr, H., Boubaker, S., “Labor protection and corporate debt maturity: International evidence”, UAE University working paper (2014).[25] Stephan, A., Talavera,O., Tsapin, A., “Corporate debt maturity choice in emerging financial markets”, Quarterly Review of Economics and Finance, 51 (2011), 141-151.[26] Bae, K. H., Goyal, V. K., “Creditor rights, enforcement, and bank loans”, The Journal of Finance, 64 (2009) 2, 823-860.[27] Gonzalez-Mendez, V.M., “Determinants of debt maturity structure across firm size”, Spanish Journal of Finance and Accounting, 17 (2013), 187-209.[28] Mark Hoven Stohs, David C. Mauer, “The Determinants of Corporate Debt Maturity Structure”, Journal of Business, 69 (1996) 3.[29] Scherr, F. C. and Hulburt, H. M., “The Debt Maturity Structure of Small Firms”, Financial Management, 1 (2001), 85-111.[30] Magri, S., “Debt maturity of Italian firms”, Journal of Money, Credit and Banking, 42 2010, 443-463.[31] Oman, C., Köksal, B., “Debt maturity across firm types: Evidence from a major developing economy”, Emerging Markets Review, 30 (2017), 169-199.[32] Awartani, B., Belkhir, M., Boubaker, S., Maghyereh, A., “Corporate debt maturity in the MENA region: Does institutional quality matter?”, International Review of Financial Analysis, 46 (2016), 309-325.[33] Antonios Antoniou, Yilmaz Guney, Krishna Paudyal, The Determinants of Debt Maturity Structure: Evidence from France, Germany and the UK, European Financial Management, 12 (2006) 2, 161-194.[34] Antoniou, A., Guney, Y., Paudyal, K., “The determinants of capital structure: Capital market-oriented versus bank-oriented institutions”, Journal of Financial and Quantitative Analysis, 43 (2008) 1, 59-92.[35] Fan, J. P., Titman, S., Twite, G., “An international comparison of capital structure and debt maturity choices”, Journal of Financial and Quantitative Analysis, 47 (2012) 1, 23.[36] Garcia-Teruel P, Martinez-Solano P., “Short-term debt in Spanish SMEs”, Int Small Bussiness Journal, 25 (2007), 579-602.[37] Giannetti, M., “Do better institutions mitigate agency problems? Evidence fromcorporate finance choices”, Journal of Financial and Quantitative Analysis, 38 (2003) 1, 185-212.[38] Diamond, W., “Presidential address, committing to commit: Short-term debtwhen enforcement is costly”, The Journal of Finance, 59 (2004) 4, 1447-1479.[39] Qian, J., Strahan, E., “How laws and institutions shape financial contracts: The case of bank loans”, The Journal of Finance, 62 (2007) 6, 2803-2834.[40] Aris, “Legal systems, capital structure, and debt maturity in developing countries”, Corp. Gov., 24 (2016), 130-144.[41] Cuneyt Orman, Bülent Köksal, “Debt Maturity across Firm Types: Evidence from a Major Developing Economy”, Emerging Markets Review, 30 (2016). [42] Zheng, X., El Ghoul, S., Guedhami, O., Kwok, C., “National culture and corporate debt maturity”, Journal of Banking & Finance, 36 (2012) 2, 468-488.[43] Jun Qian, Philip E. Strahan, “How Laws and Institutions Shape Financial Contracts: The Case of Bank Loans”, The Journal of Finance, 62 (2007) 6, 2803-2834.[44] Vig, V., “Access to collateral and corporate debt structure: Evidence from a natural experiment”, The Journal of Finance, 68 (2013) 3, 881-928.[45] Cho, S., El Ghoul, S., Guedhami, O., Suh, J., “Creditor rights and capital structure: Evidence from international data”, Journal of Corporate Finance, 25 (2014), 40-60.[46] Mark Hoven Stohs, David C Mauer, “The Determinants of Corporate Debt Maturity Structure”, The Journal of Business, 69 (1996) 3, 279-312. [47] Kane, A., A. J. Marcus, R. L. McDonald, “Debt Policy and the Rate of Return Premium to Leverage”, The Journal of Financial and Quantitative Analysis, 20 (1985) 4, 479-499.[48] E. I. Altman, “Corporate financial distress: A complete guide to predicting, avoiding, and dealing with bankruptcy”, New York: John Wiley & Sons, 1983. [49] Mackie-Mason, Jeffrey K., “Do Taxes Affect Corporate Financing Decisions?”, Journal of Finance, 45 (1990) 5, 1471-1493.[50] Djankov, S., C. McLiesh, and A. Shleifer, “Private credit in 129 countries”, Journal of Financial Economics, 84 (2007), 299-329.

APA, Harvard, Vancouver, ISO, and other styles

34

Mohseni,M.Rohangis, and Jessica Grau Chopite. "Online Incel Speech (Hate Speech/Incivility)." DOCA - Database of Variables for Content Analysis, June18, 2022. http://dx.doi.org/10.34778/5j.

Full text

Abstract:

Involuntarily celibate men (Incels) form online communities in which they “often bemoan their lack of a loving relationship with a woman while simultaneously dehumanizing women and calling for misogynistic violence” (Glace et al., 2021, p. 288). Several studies investigate this dehumanization and misogyny including (gendered) hate speech in online comments from Incels (e.g., Glace et al., 2021). However, not all online comments from Incels contain misogyny or gendered hate speech. To get a better understanding of the phenomenon of Incels, it would be better to not only focus on these problematic comments. Thus, we propose a new construct called “Online Incel speech”, which is defined as the sum of all online comments from Incels that are related to Inceldom, that is, being or becoming an Incel. In an approach to provide an extensive system of categorization, Grau Chopite (2022) synthesized codebooks from several studies on Incels (see example studies table note) and put it to an empirical test. She found that most Incel comments found online can be categorized into three subdimensions. The first two subdimensions cover framing by Incels, namely how Incels frame the subjective causes of becoming an Incel and how they frame the subjective emotional consequences of being an Incel. Both subdimensions can also be interpreted as part of a subjective theory (sensu Groeben et al., 1988) of Inceldom. In contrast to this, the third subdimension does not consist of framing, but of observable verbal behaviors, which are often linked to gendered hate speech. When trying to categorize online comments from Incels, former studies often applied the construct “Hybrid Masculinities” (e.g., Glace et al, 2021). This construct from Bridge and Pascoe (2014) suggests that “some men develop masculinities which appear to subvert, but actually reaffirm, White hegemonic masculinities” (Glace et al., 2021, p. 289). Glace et al. (2021) structure the construct into three subdimensions, namely (1) discursive distancing (claiming distance from hegemonic masculine roles without actually relinquishing masculine power), (2) strategic borrowing (appropriating the cultures of nondominant groups of men), and (3) fortifying boundaries (continually using hegemonic standards to constrain masculinity and demeaning men who fail to meet them). However, the construct only covers a part of Inceldom, which Glace et al. (2021) indirectly acknowledge by adding two inductive categories, that is, hostile sexism (shaming and degrading women) and suicidality (reporting suicidal thoughts, feelings, and intentions). Field of application/theoretical foundation: The construct “Online Incel speech” was coined by Grau Chopite (2022), and there are currently no other studies making use of it. However, there are studies (e.g., Vu & Lynn, 2020; also see the entry “Frames (Automated Content Analysis”) based on the framing theory by Entman (1991) where the subdimension “subjective causes” would correspond to Entman’s “causal interpretation frame”, while the “subjective emotional consequences” would correspond to Entman’s “problem definition frame”. The “subjective causes” also correspond to the “discursive distancing” and the “emotional consequences” to “suicidality” in the construct of Hybrid Masculinities. The third subdimension “verbal behavior” corresponds to gendered online hate speech (e.g., Döring & Mohseni, 2019), but also to “hostile sexism” and “fortifying boundaries” in the construct of Hybrid Masculinities. References/combination with other methods: The study by Grau Chopite (2022) employs a quantitative manual content analysis using a deductive approach. Studies based on the construct of Hybrid Masculinities also employ manual online content analyses or manual thematic analyses, but those are often qualitative in nature (e.g., Glace et al., 2021). Framing is also often assessed with manual content analyses (e.g., Nitsch & Lichtenstein, 2019), but newer studies try to assess it computationally (e.g., Vu & Lynn, 2020). Hate speech is often assessed with manual content analyses (e.g., Döring & Mohseni, 2019) and surveys (e.g., Oksanen et al., 2014), but some newer studies try to assess it computationally (e.g., Al-Hassan & Al-Dossari, 2019). As Online Incel Speech is related to framing and gendered hate speech, it seems plausible that manual content analyses of Online Incel Speech could be combined with computational analyses, too, to enable the investigation of large samples. However, computational analyses of subtle forms of verbal behavior can be challenging because the number of wrong categorizations increases (e.g., for sexism detection see Samory et al., 2021; for hate speech detection see Ruiter et al., 2022). Example studies: Example study Construct Dimensions Explanation Reliability Online Incel speech Grau Chopite (2022) Subjective Causes of Inceldom Race/Ethnicity having certain racial features and/or belonging to a certain ethnic κ = .55;AC1 = .80 Mental Health suffering from any mental health issue κ = .58;AC1 = .90 Employment difficulties with getting and/or maintaining employment; experiencing dissatisfaction in the workplace κ = .85;AC1 = .98 Family having family issues (e.g., an abusive family member) κ = .66;AC1 = .98 Subjective Emotional Consequences of Inceldom Hopelessness expressing hopelessness κ = .37;AC1 = .89 Sadness expressing sadness κ = .26;AC1 = .91 Suicidality expressing suicidality κ = .24;AC1 = .95 Anger expressing anger κ = .44;AC1 = .87 Hatred expressing hatred κ = .40;AC1 = .83 Verbal Behavior of Incels Using Gendered Hate Speech Against Women hostile sexism against women and misogynistic speech κ = .80;AC1 = .87 Adopting Social Justice Language claiming unfairness/ injustice of being discriminated by society or groups (e.g., other men, other races) κ = .48;AC1 = .82 Claiming Lack of Masculine Traits lacking masculine traits (e.g., muscles, a big penis) κ = .62;AC1 = .86 Shaming Other Men shaming of other men directly by calling them terms related to being “effeminate” or “unmanly” κ = .71;AC1 = .91 Claiming Lack of Female Interest being unable to attract women or being rejected by women κ = .61;AC1 = .87 Hybrid Masculinities Glace et al. (2021) Discursive Distancing Lack of Female Interest claiming a lack of ability to attract female romantic companionship and sexual interest n/a Lack of Masculine Traits claiming a lack of traditionally attractive masculine physical traits n/a Strategic Borrowing Race and Racism appropriating the culture of racial and ethnic minority men n/a Social Justice Language using the language of the marginalized to diminish one’s own position of power n/a Fortifying Boundaries Soyboys deriding non-Incel men as weak and desperate n/a Cucks deriding non-Incel men as being cheated or exploited by women n/a Hostile Sexism Women are Ugly deriding women for being unattractive n/a slu*t-Shaming deriding women for having sex n/a False Rape Claims claiming that women make false rape claims (e.g., when approached by an Incel) n/a Women’s Only Value is Sex claiming that women’s only value is their sexuality n/a Women are Subhuman dehumanizing women n/a Suicidality Due to Incel Experience attributing suicidal thoughts, feelings, and intentions to Incel status n/a The “Clown World” claiming that the world is meaningless and nonsensical n/a Note: The codebook from Grau Chopite (2022) is based on the codebook and findings of Glace et al. (2021) and other studies (Baele et al., 2019; Bou-Franch & Garcés-Conejos Blitvich, 2021; Bridges & Pascoe, 2014; Cottee, 2020; Döring & Mohseni, 2019; D’Souza et al., 2018; Marwick & Caplan, 2018; Mattheis & Waltman, 2021; Maxwell et al., 2020; Rogers et al., 2015; Rouda & Siegel, 2020; Scaptura & Boyle, 2019; Williams & Arntfield, 2020; Williams et al., 2021). Gwet’s AC1 was calculated in addition to Cohen’s Kappa because some categories were rarely coded, which biases Cohen’s Kappa. The codebook is available at http://doi.org/10.23668/psycharchives.5626 References Al-Hassan, A., & Al-Dossari, Hmood (2019). Detection of hate speech in social networks: A survey on multilingual corpus. In D. Nagamalai & D. C. Wyld (Eds.), Computer Science & Information Technology. Proceedings of the 6th International Conference on Computer Science and Information Technology (pp. 83–100). AIRCC Publishing. doi:10.5121/csit.2019.90208 Baele, S. J., Brace, L., & Coan, T. G. (2019). From “Incel” to “Saint”: Analyzing the violent worldview behind the 2018 Toronto attack. Terrorism and Political Violence, 1–25. doi:10.1080/09546553.2019.1638256 Bou-Franch, P., & Garcés-Conejos Blitvich, P. (2021). Gender ideology and social identity processes in online language aggression against women. In R. M. DeKeyser (Ed.), Benjamins Current Topics: Vol. 116. Aptitude-Treatment Interaction in Second Language Learning (Vol. 86, pp. 59–81). John Benjamins Publishing Company. doi:10.1075/bct.86.03bou Bridges, T., & Pascoe, C. J. (2014). Hybrid masculinities: New directions in the sociology of men and masculinities. Sociology Compass, 8(3), 246–258. doi:10.1111/soc4.12134 Cottee, S. (2021). Incel (e)motives: Resentment, shame and revenge. Studies in Conflict & Terrorism, 44(2), 93–114. doi:10.1080/1057610X.2020.1822589 Döring, N., & Mohseni, M. R. (2018). Male dominance and sexism on YouTube: Results of three content analyses. Feminist Media Studies, 19(4), 512–524. doi:10.1080/14680777.2018.1467945 D'Souza, T., Griffin, L., Shackelton, N., & Walt, D. (2018). Harming women with words: The failure of Australian law to prohibit gendered hate speech. University of New South Wales Law Journal, 41(3), 939–976. Entman, R. M. 1991. Framing U.S. coverage of international news: contrasts in narratives of the KAL and Iran Air incidents. Journal of Communication, 41(4), 6-7. Glace, A. M., Dover, T. L., & Zatkin, J. G. (2021). Taking the black pill: An empirical analysis of the “Incel”. Psychology of Men & Masculinities, 22(2), 288–297. doi:10.1037/men0000328 Grau Chopite, J. (2022). Framing of Inceldom on incels.is: A content analysis [Master’s thesis, TU Ilmenau]. Psycharchives. doi:10.23668/psycharchives.5626 Groeben, N., Wahl, D., Schlee, J., & Scheele, B. (Eds.). (1988). Das Forschungsprogramm Subjektive Theorien: eine Einführung in die Psychologie des reflexiven Subjekts. Francke. Retrieved from https://nbn-resolving.org/urn:nbn:de:0168-ssoar-27658 Marwick, A. E., & Caplan, R. (2018). Drinking male tears: language, the manosphere, and networked harassment. Feminist Media Studies, 18(4), 543–559. doi:10.1080/14680777.2018.1450568 Mattheis, A. A., & Waltman, M. S. (2021). Gendered hate online. In K. Ross & I. Bachmann (Eds.), The Wiley Blackwell-ICA international encyclopedias of communication. The international encyclopedia of gender, media, and communication (pp. 1–5). John Wiley & Sons Inc. doi:10.1002/9781119429128.iegmc019 Maxwell, D., Robinson, S. R., Williams, J. R., & Keaton, C. (2020). “A short story of a lonely guy”: A qualitative thematic analysis of involuntary celibacy using Reddit. Sexuality & Culture, 24(6), 1852–1874. doi:10.1007/s12119-020-09724-6 Nitsch, C. & Lichtenstein, D. (2019). Satirizing international crises. The depiction of the Ukraine, Greek debt and migration crises in political satire. Studies in Communication Science (SComS), 19(1), 85-103. doi:10.24434/j.scoms.2019.01.007 Oksanen, A., Hawdon, J., Holkeri, E., Näsi, M., & Räsänen, P. (2014). Exposure to online hate among young social media users. In N. Warehime (Ed.), Soul of Society: A focus on the lives of children & youth (p. 253-273). doi:10.1108/S1537-466120140000018021 Rogers, D. L., Cervantes, E., & Espinosa, J. C. (2015). Development and validation of the belief in female sexual deceptiveness scale. Journal of Interpersonal Violence, 30(5), 744–761. doi:10.1177/0886260514536282 Rouda, B., & Siegel, A. (2020). I’d kill for a girl like that”: The black pill and the Incel uprising. International Multidisciplinary Program in the Humanities, Tel Aviv University. Retrieved from https://www.academia.edu/43663741/_Id_kill_for_a_girl_like_that_The_Black_Pill_and_the_Incel_Uprising Ruiter, D., Reiners, L., Geet D’Sa, A., Kleinbauer, Th., Fohr, D., Illina, I., Klakow. D., Schemer, Ch., & Monnier, A. (2022). Placing m-phasis on the plurality of hate. A feature-based corpus of hate online. Preprint. Retrieved from https://doi.org/10.48550/arXiv.2204.13400 Samory, M., Sen, I., Kohne, J., Flöck, F., & Wagner, C. (2021). “Call me sexist, but...”: Revisiting sexism detection using psychological scales and adversarial samples. Proceedings of the International AAAI Conference on Web and Social Media, 15(1), 573-584. Retrieved from https://ojs.aaai.org/index.php/ICWSM/article/view/18085 Scaptura, M. N., & Boyle, K. M. (2019). Masculinity threat, “Incel” traits, and violent fantasies among heterosexual men in the United States. Feminist Criminology, 15(3), 278–298. doi:10.1177/1557085119896415 Vu, H. T., & Lynn, N. (2020). When the news takes sides: Automated framing analysis of news coverage of the Rohingya crisis by the elite press from three countries. Journalism Studies. Online first publication. doi:10.1080/1461670X.2020.1745665 Williams, D. J., & Arntfield, M. (2020). Extreme sex-negativity: An examination of helplessness, hopelessness, and misattribution of blame among “Incel” multiple homicide offenders. Journal of Positive Sexuality, 6(1), 33–42. doi:10.51681/1.613 Williams, D. J., Arntfield, M., Schaal, K., & Vincent, J. (2021). Wanting sex and willing to kill: Examining demographic and cognitive characteristics of violent "involuntary celibates". Behavioral Sciences & the Law, 39(4), 386–401. doi:10.1002/bsl.2512

APA, Harvard, Vancouver, ISO, and other styles

35

Al-Rawi, Ahmed, Carmen Celestini, Nicole Stewart, and Nathan Worku. "How Google Autocomplete Algorithms about Conspiracy Theorists Mislead the Public." M/C Journal 25, no.1 (March21, 2022). http://dx.doi.org/10.5204/mcj.2852.

Full text

Abstract:

Introduction: Google Autocomplete Algorithms Despite recent attention to the impact of social media platforms on political discourse and public opinion, most people locate their news on search engines (Robertson et al.). When a user conducts a search, millions of outputs, in the form of videos, images, articles, and Websites are sorted to present the most relevant search predictions. Google, the most dominant search engine in the world, expanded its search index in 2009 to include the autocomplete function, which provides suggestions for query inputs (Dörr and Stephan). Google’s autocomplete function also allows users to “search smarter” by reducing typing time by 25 percent (Baker and Potts 189). Google’s complex algorithm is impacted upon by factors like search history, location, and keyword searches (Karapapa and Borghi), and there are policies to ensure the autocomplete function does not contain harmful content. In 2017, Google implemented a feedback tool to allow human evaluators to assess the quality of search results; however, the algorithm still provides misleading results that frame far-right actors as neutral. In this article, we use reverse engineering to understand the nature of these algorithms in relation to the descriptive outcome, to illustrate how autocomplete subtitles label conspiracists in three countries. According to Google, these “subtitles are generated automatically”, further stating that the “systems might determine that someone could be called an actor, director, or writer. Only one of these can appear as the subtitle” and that Google “cannot accept or create custom subtitles” (Google). We focused our attention on well-known conspiracy theorists because of their influence and audience outreach. In this article we argue that these subtitles are problematic because they can mislead the public and amplify extremist views. Google’s autocomplete feature is misleading because it does not highlight what is publicly known about these actors. The labels are neutral or positive but never negative, reflecting primary jobs and/or the actor’s preferred descriptions. This is harmful to the public because Google’s search rankings can influence a user’s knowledge and information preferences through the search engine manipulation effect (Epstein and Robertson). Users’ preferences and understanding of information can be manipulated based upon their trust in Google search results, thus allowing these labels to be widely accepted instead of providing a full picture of the harm their ideologies and belief cause. Algorithms That Mainstream Conspiracies Search engines establish order and visibility to Web pages that operationalise and stabilise meaning to particular queries (Gillespie). Google’s subtitles and blackbox operate as a complex algorithm for its search index and offer a mediated visibility to aspects of social and political life (Gillespie). Algorithms are designed to perform computational tasks through an operational sequence that computer systems must follow (Broussard), but they are also “invisible infrastructures” that Internet users consciously or unconsciously follow (Gran et al. 1779). The way algorithms rank, classify, sort, predict, and process data is political because it presents the world through a predetermined lens (Bucher 3) decided by proprietary knowledge – a “secret sauce” (O’Neil 29) – that is not disclosed to the general public (Christin). Technology titans, like Google, Facebook, and Amazon (Webb), rigorously protect and defend intellectual property for these algorithms, which are worth billions of dollars (O’Neil). As a result, algorithms are commonly defined as opaque, secret “black boxes” that conceal the decisions that are already made “behind corporate walls and layers of code” (Pasquale 899). The opacity of algorithms is related to layers of intentional secrecy, technical illiteracy, the size of algorithmic systems, and the ability of machine learning algorithms to evolve and become unintelligible to humans, even to those trained in programming languages (Christin 898-899). The opaque nature of algorithms alongside the perceived neutrality of algorithmic systems is problematic. Search engines are increasingly normalised and this leads to a socialisation where suppositions are made that “these artifacts are credible and provide accurate information that is fundamentally depoliticized and neutral” (Noble 25). Google’s autocomplete and PageRank algorithms exist outside of the veil of neutrality. In 2015, Google’s photos app, which uses machine learning techniques to help users collect, search, and categorise images, labelled two black people as ‘gorillas’ (O’Neil). Safiya Noble illustrates how media and technology are rooted in systems of white supremacy, and how these long-standing social biases surface in algorithms, illustrating how racial and gendered inequities embed into algorithmic systems. Google actively fixes algorithmic biases with band-aid-like solutions, which means the errors remain inevitable constituents within the algorithms. Rising levels of automation correspond to a rising level of errors, which can lead to confusion and misdirection of the algorithms that people use to manage their lives (O’Neil). As a result, software, code, machine learning algorithms, and facial/voice recognition technologies are scrutinised for producing and reproducing prejudices (Gray) and promoting conspiracies – often described as algorithmic bias (Bucher). Algorithmic bias occurs because algorithms are trained by historical data already embedded with social biases (O’Neil), and if that is not problematic enough, algorithms like Google’s search engine also learn and replicate the behaviours of Internet users (Benjamin 93), including conspiracy theorists and their followers. Technological errors, algorithmic bias, and increasing automation are further complicated by the fact that Google’s Internet service uses “2 billion lines of code” – a magnitude that is difficult to keep track of, including for “the programmers who designed the algorithm” (Christin 899). Understanding this level of code is not critical to understanding algorithmic logics, but we must be aware of the inscriptions such algorithms afford (Krasmann). As algorithms become more ubiquitous it is urgent to “demand that systems that hold algorithms accountable become ubiquitous as well” (O’Neil 231). This is particularly important because algorithms play a critical role in “providing the conditions for participation in public life”; however, the majority of the public has a modest to nonexistent awareness of algorithms (Gran et al. 1791). Given the heavy reliance of Internet users on Google’s search engine, it is necessary for research to provide a glimpse into the black boxes that people use to extract information especially when it comes to searching for information about conspiracy theorists. Our study fills a major gap in research as it examines a sub-category of Google’s autocomplete algorithm that has not been empirically explored before. Unlike the standard autocomplete feature that is primarily programmed according to popular searches, we examine the subtitle feature that operates as a fixed label for popular conspiracists within Google’s algorithm. Our initial foray into our research revealed that this is not only an issue with conspiracists, but also occurs with terrorists, extremists, and mass murderers. Method Using a reverse engineering approach (Bucher) from September to October 2021, we explored how Google’s autocomplete feature assigns subtitles to widely known conspiracists. The conspiracists were not geographically limited, and we searched for those who reside in the United States, Canada, United Kingdom, and various countries in Europe. Reverse engineering stems from Ashby’s canonical text on cybernetics, in which he argues that black boxes are not a problem; the problem or challenge is related to the way one can discern their contents. As Google’s algorithms are not disclosed to the general public (Christin), we use this method as an extraction tool to understand the nature of how these algorithms (Eilam) apply subtitles. To systematically document the search results, we took screenshots for every conspiracist we searched in an attempt to archive the Google autocomplete algorithm. By relying on previous literature, reports, and the figures’ public statements, we identified and searched Google for 37 Western-based and influencial conspiracy theorists. We initially experimented with other problematic figures, including terrorists, extremists, and mass murderers to see whether Google applied a subtitle or not. Additionally, we examined whether subtitles were positive, neutral, or negative, and compared this valence to personality descriptions for each figure. Using the standard procedures of content analysis (Krippendorff), we focus on the manifest or explicit meaning of text to inform subtitle valence in terms of their positive, negative, or neutral connotations. These manifest features refer to the “elements that are physically present and countable” (Gray and Densten 420) or what is known as the dictionary definitions of items. Using a manual query, we searched Google for subtitles ascribed to conspiracy theorists, and found the results were consistent across different countries. Searches were conducted on Firefox and Chrome and tested on an Android phone. Regardless of language input or the country location established by a Virtual Private Network (VPN), the search terms remained stable, regardless of who conducted the search. The conspiracy theorists in our dataset cover a wide range of conspiracies, including historical figures like Nesta Webster and John Robison, who were foundational in Illuminati lore, as well as contemporary conspiracists such as Marjorie Taylor Greene and Alex Jones. Each individual’s name was searched on Google with a VPN set to three countries. Results and Discussion This study examines Google’s autocomplete feature associated with subtitles of conspiratorial actors. We first tested Google’s subtitling system with known terrorists, convicted mass shooters, and controversial cult leaders like David Koresh. Garry et al. (154) argue that “while conspiracy theories may not have mass radicalising effects, they are extremely effective at leading to increased polarization within societies”. We believe that the impact of neutral subtitling of conspiracists reflects the integral role conspiracies plays in contemporary politics and right-wing extremism. The sample includes contemporary and historical conspiracists to establish consistency in labelling. For historical figures, the labels are less consequential and simply reflect the reality that Google’s subtitles are primarily neutral. Of the 37 conspiracy theorists we searched (see Table 1 in the Appendix), seven (18.9%) do not have an associated subtitle, and the other 30 (81%) have distinctive subtitles, but none of them reflects the public knowledge of the individuals’ harmful role in disseminating conspiracy theories. In the list, 16 (43.2%) are noted for their contribution to the arts, 4 are labelled as activists, 7 are associated with their professional affiliation or original jobs, 2 to the journalism industry, one is linked to his sports career, another one as a researcher, and 7 have no subtitle. The problem here is that when white nationalists or conspiracy theorists are not acknowledged as such in their subtitles, search engine users could possibly encounter content that may sway their understanding of society, politics, and culture. For example, a conspiracist like Alex Jones is labeled as an “American Radio Host” (see Figure 1), despite losing two defamation lawsuits for declaring that the shooting at Sandy Hook Elementary School in Newtown, Connecticut, was a ‘false flag’ event. Jones’s actions on his InfoWars media platforms led to parents of shooting victims being stalked and threatened. Another conspiracy theorist, Gavin McInnes, the creator of the far-right, neo-fascist Proud Boys organisation, a known terrorist entity in Canada and hate group in the United States, is listed simply as a “Canadian writer” (see Figure 1). Fig. 1: Screenshots of Google’s subtitles for Alex Jones and Gavin McInnes. Although subtitles under an individual’s name are not audio, video, or image content, the algorithms that create these subtitles are an invisible infrastructure that could cause harm through their uninterrogated status and pervasive presence. This could then be a potential conduit to media which could cause harm and develop distrust in electoral and civic processes, or all institutions. Examples from our list include Brittany Pettibone, whose subtitle states that she is an “American writer” despite being one of the main propagators of the Pizzagate conspiracy which led to Edgar Maddison Welch (whose subtitle is “Screenwriter”) travelling from North Carolina to Washington D.C. to violently threaten and confront those who worked at Comet Ping Pong Pizzeria. The same misleading label can be found via searching for James O’Keefe of Project Veritas, who is positively labelled as “American activist”. Veritas is known for releasing audio and video recordings that contain false information designed to discredit academic, political, and service organisations. In one instance, a 2020 video released by O’Keefe accused Democrat Ilhan Omar’s campaign of illegally collecting ballots. The same dissembling of distrust applies to Mike Lindell, whose Google subtitle is “CEO of My Pillow”, as well as Sidney Powell, who is listed as an “American lawyer”; both are propagators of conspiracy theories relating to the 2020 presidential election. The subtitles attributed to conspiracists on Google do not acknowledge the widescale public awareness of the negative role these individuals play in spreading conspiracy theories or causing harm to others. Some of the selected conspiracists are well known white nationalists, including Stefan Molyneux who has been banned from social media platforms like Twitter, Twitch, Facebook, and YouTube for the promotion of scientific racism and eugenics; however, he is neutrally listed on Google as a “Canadian podcaster”. In addition, Laura Loomer, who describes herself as a “proud Islamophobe,” is listed by Google as an “Author”. These subtitles can pose a threat by normalising individuals who spread conspiracy theories, sow dissension and distrust in institutions, and cause harm to minority groups and vulnerable individuals. Once clicking on the selected person, the results, although influenced by the algorithm, did not provide information that aligned with the associated subtitle. The search results are skewed to the actual conspiratorial nature of the individuals and associated news articles. In essence, the subtitles do not reflect the subsequent search results, and provide a counter-labelling to the reality of the resulting information provided to the user. Another significant example is Jerad Miller, who is listed as “American performer”, despite the fact that he is the Las Vegas shooter who posted anti-government and white nationalist 3 Percenters memes on his social media (SunStaff), even though the majority of search results connect him to the mass shooting he orchestrated in 2014. The subtitle “performer” is certainly not the common characteristic that should be associated with Jerad Miller. Table 1 in the Appendix shows that individuals who are not within the contemporary milieux of conspiracists, but have had a significant impact, such as Nesta Webster, Robert Welch Junior, and John Robison, were listed by their original profession or sometimes without a subtitle. David Icke, infamous for his lizard people conspiracies, has a subtitle reflecting his past football career. In all cases, Google’s subtitle was never consistent with the actor’s conspiratorial behaviour. Indeed, the neutral subtitles applied to conspiracists in our research may reflect some aspect of the individuals’ previous careers but are not an accurate reflection of the individuals’ publicly known role in propagating hate, which we argue is misleading to the public. For example, David Icke may be a former footballer, but the 4.7 million search results predominantly focus on his conspiracies, his public fora, and his status of being deplatformed by mainstream social media sites. The subtitles are not only neutral, but they are not based on the actual search results, and so are misleading in what the searcher will discover; most importantly, they do not provide a warning about the misinformation contained in the autocomplete subtitle. To conclude, algorithms automate the search engines that people use in the functions of everyday life, but are also entangled in technological errors, algorithmic bias, and have the capacity to mislead the public. Through a process of reverse engineering (Ashby; Bucher), we searched 37 conspiracy theorists to decode the Google autocomplete algorithms. We identified how the subtitles attributed to conspiracy theorists are neutral, positive, but never negative, which does not accurately reflect the widely known public conspiratorial discourse these individuals propagate on the Web. This is problematic because the algorithms that determine these subtitles are invisible infrastructures acting to misinform the public and to mainstream conspiracies within larger social, cultural, and political structures. This study highlights the urgent need for Google to review the subtitles attributed to conspiracy theorists, terrorists, and mass murderers, to better inform the public about the negative nature of these actors, rather than always labelling them in neutral or positive ways. Funding Acknowledgement This project has been made possible in part by the Canadian Department of Heritage – the Digital Citizen Contribution program – under grant no. R529384. The title of the project is “Understanding hate groups’ narratives and conspiracy theories in traditional and alternative social media”. References Ashby, W. Ross. An Introduction to Cybernetics. Chapman & Hall, 1961. Baker, Paul, and Amanda Potts. "‘Why Do White People Have Thin Lips?’ Google and the Perpetuation of Stereotypes via Auto-Complete Search Forms." Critical Discourse Studies 10.2 (2013): 187-204. Benjamin, Ruha. Race after Technology: Abolitionist Tools for the New Jim Code. Polity, 2019. Bucher, Taina. If... Then: Algorithmic Power and Politics. OUP, 2018. Broussard, Meredith. Artificial Unintelligence: How Computers Misunderstand the World. MIT P, 2018. Christin, Angèle. "The Ethnographer and the Algorithm: Beyond the Black Box." Theory and Society 49.5 (2020): 897-918. D'Ignazio, Catherine, and Lauren F. Klein. Data Feminism. MIT P, 2020. Dörr, Dieter, and Juliane Stephan. "The Google Autocomplete Function and the German General Right of Personality." Perspectives on Privacy. De Gruyter, 2014. 80-95. Eilam, Eldad. Reversing: Secrets of Reverse Engineering. John Wiley & Sons, 2011. Epstein, Robert, and Ronald E. Robertson. "The Search Engine Manipulation Effect (SEME) and Its Possible Impact on the Outcomes of Elections." Proceedings of the National Academy of Sciences 112.33 (2015): E4512-E4521. Garry, Amanda, et al. "QAnon Conspiracy Theory: Examining its Evolution and Mechanisms of Radicalization." Journal for Deradicalization 26 (2021): 152-216. Gillespie, Tarleton. "Algorithmically Recognizable: Santorum’s Google Problem, and Google’s Santorum Problem." Information, Communication & Society 20.1 (2017): 63-80. Google. “Update your Google knowledge panel.” 2022. 3 Jan. 2022 <https://support.google.com/knowledgepanel/answer/7534842?hl=en#zippy=%2Csubtitle>. Gran, Anne-Britt, Peter Booth, and Taina Bucher. "To Be or Not to Be Algorithm Aware: A Question of a New Digital Divide?" Information, Communication & Society 24.12 (2021): 1779-1796. Gray, Judy H., and Iain L. Densten. "Integrating Quantitative and Qualitative Analysis Using Latent and Manifest Variables." Quality and Quantity 32.4 (1998): 419-431. Gray, Kishonna L. Intersectional Tech: Black Users in Digital Gaming. LSU P, 2020. Karapapa, Stavroula, and Maurizio Borghi. "Search Engine Liability for Autocomplete Suggestions: Personality, Privacy and the Power of the Algorithm." International Journal of Law and Information Technology 23.3 (2015): 261-289. Krasmann, Susanne. "The Logic of the Surface: On the Epistemology of Algorithms in Times of Big Data." Information, Communication & Society 23.14 (2020): 2096-2109. Krippendorff, Klaus. Content Analysis: An Introduction to Its Methodology. Sage, 2004. Noble, Safiya Umoja. Algorithms of Oppression. New York UP, 2018. O'Neil, Cathy. Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy. Crown, 2016. Pasquale, Frank. The Black Box Society. Harvard UP, 2015. Robertson, Ronald E., David Lazer, and Christo Wilson. "Auditing the Personalization and Composition of Politically-Related Search Engine Results Pages." Proceedings of the 2018 World Wide Web Conference. 2018. Staff, Sun. “A Look inside the Lives of Shooters Jerad Miller, Amanda Miller.” Las Vegas Sun 9 June 2014. <https://lasvegassun.com/news/2014/jun/09/look/>. Webb, Amy. The Big Nine: How the Tech Titans and Their Thinking Machines Could Warp Humanity. Hachette UK, 2019. Appendix Table 1: The subtitles of conspiracy theorists on Google autocomplete Conspiracy Theorist Google Autocomplete Subtitle Character Description Alex Jones American radio host InfoWars founder, American far-right radio show host and conspiracy theorist. The SPLC describes Alex Jones as "the most prolific conspiracy theorist in contemporary America." Barry Zwicker Canadian journalist Filmmaker who made a documentary that claimed fear was used to control the public after 9/11. Bart Sibrel American producer Writer, producer, and director of work to falsely claim the Apollo moon landings between 1969 and 1972 were staged by NASA. Ben Garrison American cartoonist Alt-right and QAnon political cartoonist Brittany Pettibone American writer Far-right, political vlogger on YouTube and propagator of #pizzagate. Cathy O’Brien American author Cathy O’Brien claims she was a victim of a government mind control project called Project Monarch. Dan Bongino American radio host Stakeholder in Parler, Radio Host, Ex-Spy, Conspiracist (Spygate, MAGA election fraud, etc.). David Icke Former footballer Reptilian humanoid conspiracist. David Wynn Miller (No subtitle) Conspiracist, far-right tax protester, and founder of the Sovereign Citizens Movement. Jack Posobiec American activist Alt-right, alt-lite political activist, conspiracy theorist, and Internet troll. Editor of Human Events Daily. James O’Keefe American activist Founder of Project Veritas, a far-right company that propagates disinformation and conspiracy theories. John Robison Foundational Illuminati conspiracist. Kevin Annett Canadian writer Former minister and writer, who wrote a book exposing the atrocities to Indigenous Communities, and now is a conspiracist and vlogger. Laura Loomer Author Far-right, anti-Muslim, conspiracy theorist, and Internet personality. Republican nominee in Florida's 21st congressional district in 2020. Marjorie Taylor Greene United States Representative Conspiracist, QAnon adherent, and U.S. representative for Georgia's 14th congressional district. Mark Dice American YouTuber Right-wing conservative pundit and conspiracy theorist. Mark Taylor (No subtitle) QAnon minister and self-proclaimed prophet of Donald Trump, the 45th U.S. President. Michael Chossudovsky Canadian economist Professor emeritus at the University of Ottawa, founder of the Centre for Research on Globalization, and conspiracist. Michael Cremo(Drutakarmā dāsa) American researcher Self-described Vedic creationist whose book, Forbidden Archeology, argues humans have lived on earth for millions of years. Mike Lindell CEO of My Pillow Business owner and conspiracist. Neil Patel English entrepreneur Founded The Daily Caller with Tucker Carlson. Nesta Helen Webster English author Foundational Illuminati conspiracist. Naomi Wolf American author Feminist turned conspiracist (ISIS, COVID-19, etc.). Owen Benjamin American comedian Former actor/comedian now conspiracist (Beartopia), who is banned from mainstream social media for using hate speech. Pamela Geller American activist Conspiracist, Anti-Islam, Blogger, Host. Paul Joseph Watson British YouTuber InfoWars co-host and host of the YouTube show PrisonPlanetLive. QAnon Shaman (Jake Angeli) American activist Conspiracy theorist who participated in the 2021 attack on Capitol Hil. Richard B. Spencer (No subtitle) American neo-Nazi, antisemitic conspiracy theorist, and white supremacist. Rick Wiles (No subtitle) Minister, Founded conspiracy site, TruNews. Robert W. Welch Jr. American businessman Founded the John Birch Society. Ronald Watkins (No subtitle) Founder of 8kun. Serge Monast Journalist Creator of Project Blue Beam conspiracy. Sidney Powell (No subtitle) One of former President Trump’s Lawyers, and renowned conspiracist regarding the 2020 Presidential election. Stanton T. Friedman Nuclear physicist Original civilian researcher of the 1947 Roswell UFO incident. Stefan Molyneux Canadian podcaster Irish-born, Canadian far-right white nationalist, podcaster, blogger, and banned YouTuber, who promotes conspiracy theories, scientific racism, eugenics, and racist views Tim LaHaye American author Founded the Council for National Policy, leader in the Moral Majority movement, and co-author of the Left Behind book series. Viva Frei (No subtitle) YouTuber/ Canadian Influencer, on the Far-Right and Covid conspiracy proponent. William Guy Carr Canadian author Illuminati/III World War Conspiracist Google searches conducted as of 9 October 2021.

APA, Harvard, Vancouver, ISO, and other styles

36

Brien, Donna Lee. "Forging Continuing Bonds from the Dead to the Living: Gothic Commemorative Practices along Australia’s Leichhardt Highway." M/C Journal 17, no.4 (July24, 2014). http://dx.doi.org/10.5204/mcj.858.

Full text

Abstract:

The Leichhardt Highway is a six hundred-kilometre stretch of sealed inland road that joins the Australian Queensland border town of Goondiwindi with the Capricorn Highway, just south of the Tropic of Capricorn. Named after the young Prussian naturalist Ludwig Leichhardt, part of this roadway follows the route his party took as they crossed northern Australia from Morton Bay (Brisbane) to Port Essington (near Darwin). Ignoring the usual colonial practice of honouring the powerful and aristocratic, Leichhardt named the noteworthy features along this route after his supporters and fellow expeditioners. Many of these names are still in use and a series of public monuments have also been erected in the intervening century and a half to commemorate this journey. Unlike Leichhardt, who survived his epic trip, some contemporary travellers who navigate the remote roadway named in his honour do not arrive at their final destinations. Memorials to these violently interrupted lives line the highway, many enigmatically located in places where there is no obvious explanation for the lethal violence that occurred there. This examination profiles the memorials along Leichhardt’s highway as Gothic practice, in order to illuminate some of the uncanny paradoxes around public memorials, as well as the loaded emotional terrain such commemorative practices may inhabit. All humans know that death awaits them (Morell). Yet, despite this, and the unprecedented torrent of images of death and dying saturating news, television, and social media (Duwe; Sumiala; Bisceglio), Gorer’s mid-century ideas about the denial of death and Becker’s 1973 Pulitzer prize-winning description of the purpose of human civilization as a defence against this knowledge remains current in the contemporary trope that individuals (at least in the West) deny their mortality. Contributing to this enigmatic situation is how many deny the realities of aging and bodily decay—the promise of the “life extension” industries (Hall)—and are shielded from death by hospitals, palliative care providers, and the multimillion dollar funeral industry (Kiernan). Drawing on Piatti-Farnell’s concept of popular culture artefacts as “haunted/haunting” texts, the below describes how memorials to the dead can powerfully reconnect those who experience them with death’s reality, by providing an “encrypted passageway through which the dead re-join the living in a responsive cycle of exchange and experience” (Piatti-Farnell). While certainly very different to the “sublime” iconic Gothic structure, the Gothic ruin that Summers argued could be seen as “a sacred relic, a memorial, a symbol of infinite sadness, of tenderest sensibility and regret” (407), these memorials do function in both this way as melancholy/regret-inducing relics as well as in Piatti-Farnell’s sense of bringing the dead into everyday consciousness. Such memorialising activity also evokes one of Spooner’s features of the Gothic, by acknowledging “the legacies of the past and its burdens on the present” (8).Ludwig Leichhardt and His HighwayWhen Leichhardt returned to Sydney in 1846 from his 18-month journey across northern Australia, he was greeted with surprise and then acclaim. Having mounted his expedition without any backing from influential figures in the colony, his party was presumed lost only weeks after its departure. Yet, once Leichhardt and almost all his expedition returned, he was hailed “Prince of Explorers” (Erdos). When awarding him a significant purse raised by public subscription, then Speaker of the Legislative Council voiced what he believed would be the explorer’s lasting memorial —the public memory of his achievement: “the undying glory of having your name enrolled amongst those of the great men whose genius and enterprise have impelled them to seek for fame in the prosecution of geographical science” (ctd. Leichhardt 539). Despite this acclaim, Leichhardt was a controversial figure in his day; his future prestige not enhanced by his Prussian/Germanic background or his disappearance two years later attempting to cross the continent. What troubled the colonial political class, however, was his transgressive act of naming features along his route after commoners rather than the colony’s aristocrats. Today, the Leichhardt Highway closely follows Leichhardt’s 1844-45 route for some 130 kilometres from Miles, north through Wandoan to Taroom. In the first weeks of his journey, Leichhardt named 16 features in this area: 6 of the more major of these after the men in his party—including the Aboriginal man ‘Charley’ and boy John Murphy—4 more after the tradesmen and other non-aristocratic sponsors of his venture, and the remainder either in memory of the journey’s quotidian events or natural features there found. What we now accept as traditional memorialising practice could in this case be termed as Gothic, in that it upset the rational, normal order of its day, and by honouring humble shopkeepers, blacksmiths and Indigenous individuals, revealed the “disturbance and ambivalence” (Botting 4) that underlay colonial class relations (Macintyre). On 1 December 1844, Leichhardt also memorialised his own past, referencing the Gothic in naming a watercourse The Creek of the Ruined Castles due to the “high sandstone rocks, fissured and broken like pillars and walls and the high gates of the ruined castles of Germany” (57). Leichhardt also disturbed and disfigured the nature he so admired, famously carving his initials deep into trees along his route—a number of which still exist, including the so-called Leichhardt Tree, a large coolibah in Taroom’s main street. Leichhardt also wrote his own memorial, keeping detailed records of his experiences—both good and more regretful—in the form of field books, notebooks and letters, with his major volume about this expedition published in London in 1847. Leichhardt’s journey has since been memorialised in various ways along the route. The Leichhardt Tree has been further defaced with numerous plaques nailed into its ancient bark, and the town’s federal government-funded Bicentennial project raised a formal memorial—a large sandstone slab laid with three bronze plaques—in the newly-named Ludwig Leichhardt Park. Leichhardt’s name also adorns many sites both along, and outside, the routes of his expeditions. While these fittingly include natural features such as the Leichhardt River in north-west Queensland (named in 1856 by Augustus Gregory who crossed it by searching for traces of the explorer’s ill-fated 1848 expedition), there are also many businesses across Queensland and the Northern Territory less appropriately carrying his name. More somber monuments to Leichhardt’s legacy also resulted from this journey. The first of these was the white settlement that followed his declaration that the countryside he moved through was well endowed with fertile soils. With squatters and settlers moving in and land taken up before Leichhardt had even arrived back in Sydney, the local Yeeman people were displaced, mistreated and completely eradicated within a decade (Elder). Mid-twentieth century, Patrick White’s literary reincarnation, Voss of the eponymous novel, and paintings by Sidney Nolan and Albert Tucker have enshrined in popular memory not only the difficult (and often described as Gothic) nature of the landscape through which Leichhardt travelled (Adams; Mollinson, and Bonham), but also the distinctive and contrary blend of intelligence, spiritual mysticism, recklessness, and stoicism Leichhardt brought to his task. Roadside Memorials Today, the Leichhardt Highway is also lined with a series of roadside shrines to those who have died much more recently. While, like centotaphs, tombstones, and cemeteries, these memorialise the dead, they differ in usually marking the exact location that death occurred. In 43 BC, Cicero articulated the idea of the dead living in memory, “The life of the dead consists in the recollection cherished of them by the living” (93), yet Nelson is one of very few contemporary writers to link roadside memorials to elements of Gothic sensibility. Such constructions can, however, be described as Gothic, in that they make the roadway unfamiliar by inscribing onto it the memory of corporeal trauma and, in the process, re-creating their locations as vivid sites of pain and suffering. These are also enigmatic sites. Traffic levels are generally low along the flat or gently undulating terrain and many of these memorials are located in locations where there is no obvious explanation for the violence that occurred there. They are loci of contradictions, in that they are both more private than other memorials, in being designed, and often made and erected, by family and friends of the deceased, and yet more public, visible to all who pass by (Campbell). Cemeteries are set apart from their surroundings; the roadside memorial is, in contrast, usually in open view along a thoroughfare. In further contrast to cemeteries, which contain many relatively standardised gravesites, individual roadside memorials encapsulate and express not only the vivid grief of family and friends but also—when they include vehicle wreckage or personal artefacts from the fatal incident—provide concrete evidence of the trauma that occurred. While the majority of individuals interned in cemeteries are long dead, roadside memorials mark relatively contemporary deaths, some so recent that there may still be tyre marks, debris and bloodstains marking the scene. In 2008, when I was regularly travelling this roadway, I documented, and researched, the six then extant memorial sites that marked the locations of ten fatalities from 1999 to 2006. (These were all still in place in mid-2014.) The fatal incidents are very diverse. While half involved trucks and/or road trains, at least three were single vehicle incidents, and the deceased ranged from 13 to 84 years of age. Excell argues that scholarship on roadside memorials should focus on “addressing the diversity of the material culture” (‘Contemporary Deathscapes’) and, in these terms, the Leichhardt Highway memorials vary from simple crosses to complex installations. All include crosses (mostly, but not exclusively, white), and almost all are inscribed with the name and birth/death dates of the deceased. Most include flowers or other plants (sometimes fresh but more often plastic), but sometimes also a range of relics from the crash and/or personal artefacts. These are, thus, unsettling sights, not least in the striking contrast they provide with the highway and surrounding road reserve. The specific location is a key component of their ability to re-sensitise viewers to the dangers of the route they are travelling. The first memorial travelling northwards, for instance, is situated at the very point at which the highway begins, some 18 kilometres from Goondiwindi. Two small white crosses decorated with plastic flowers are set poignantly close together. The inscriptions can also function as a means of mobilising connection with these dead strangers—a way of building Secomb’s “haunted community”, whereby community in the post-colonial age can only be built once past “murderous death” (131) is acknowledged. This memorial is inscribed with “Cec Hann 06 / A Good Bloke / A Good hoarseman [sic]” and “Pat Hann / A Good Woman” to tragically commemorate the deaths of an 84-year-old man and his 79-year-old wife from South Australia who died in the early afternoon of 5 June 2006 when their Ford Falcon, towing a caravan, pulled onto the highway and was hit by a prime mover pulling two trailers (Queensland Police, ‘Double Fatality’; Jones, and McColl). Further north along the highway are two memorials marking the most inexplicable of road deaths: the single vehicle fatality (Connolly, Cullen, and McTigue). Darren Ammenhauser, aged 29, is remembered with a single white cross with flowers and plaque attached to a post, inscribed hopefully, “Darren Ammenhauser 1971-2000 At Rest.” Further again, at Billa Billa Creek, a beautifully crafted metal cross attached to a fence is inscribed with the text, “Kenneth J. Forrester / RIP Jack / 21.10.25 – 27.4.05” marking the death of the 79-year-old driver whose vehicle veered off the highway to collide with a culvert on the creek. It was reported that the vehicle rolled over several times before coming to rest on its wheels and that Forrester was dead when the police arrived (Queensland Police, ‘Fatal Traffic Incident’). More complex memorials recollect both single and multiple deaths. One, set on both sides of the road, maps the physical trajectory of the fatal smash. This memorial comprises white crosses on both sides of road, attached to a tree on one side, and a number of ancillary sites including damaged tyres with crosses placed inside them on both sides of the road. Simple inscriptions relay the inability of such words to express real grief: “Gary (Gazza) Stevens / Sadly missed” and “Gary (Gazza) Stevens / Sadly missed / Forever in our hearts.” The oldest and most complex memorial on the route, commemorating the death of four individuals on 18 June 1999, is also situated on both sides of the road, marking the collision of two vehicles travelling in opposite directions. One memorial to a 62-year-old man comprises a cross with flowers, personal and automotive relics, and a plaque set inside a wooden fence and simply inscribed “John Henry Keenan / 23-11-1936–18-06-1999”. The second memorial contains three white crosses set side-by-side, together with flowers and relics, and reveals that members of three generations of the same family died at this location: “Raymond Campbell ‘Butch’ / 26-3-67–18-6-99” (32 years of age), “Lorraine Margaret Campbell ‘Lloydie’ / 29-11-46–18-6-99” (53 years), and “Raymond Jon Campbell RJ / 28-1-86–18-6-99” (13 years). The final memorial on this stretch of highway is dedicated to Jason John Zupp of Toowoomba who died two weeks before Christmas 2005. This consists of a white cross, decorated with flowers and inscribed: “Jason John Zupp / Loved & missed by all”—a phrase echoed in his newspaper obituary. The police media statement noted that, “at 11.24pm a prime mover carrying four empty trailers [stacked two high] has rolled on the Leichhardt Highway 17km north of Taroom” (Queensland Police, ‘Fatal Truck Accident’). The roadside memorial was placed alongside a ditch on a straight stretch of road where the body was found. The coroner’s report adds the following chilling information: “Mr Zupp was thrown out of the cabin and his body was found near the cabin. There is no evidence whatsoever that he had applied the brakes or in any way tried to prevent the crash … Jason was not wearing his seatbelt” (Cornack 5, 6). Cornack also remarked the truck was over length, the brakes had not been properly adjusted, and the trip that Zupp had undertaken could not been lawfully completed according to fatigue management regulations then in place (8). Although poignant and highly visible due to these memorials, these deaths form a small part of Australia’s road toll, and underscore our ambivalent relationship with the automobile, where road death is accepted as a necessary side-effect of the freedom of movement the technology offers (Ladd). These memorials thus animate highways as Gothic landscapes due to the “multifaceted” (Haider 56) nature of the fear, terror and horror their acknowledgement can bring. Since 1981, there have been, for instance, between some 1,600 and 3,300 road deaths each year in Australia and, while there is evidence of a long term downward trend, the number of deaths per annum has not changed markedly since 1991 (DITRDLG 1, 2), and has risen in some years since then. The U.S.A. marked its millionth road death in 1951 (Ladd) along the way to over 3,000,000 during the 20th century (Advocates). These deaths are far reaching, with U.K. research suggesting that each death there leaves an average of 6 people significantly affected, and that there are some 10 to 20 per cent of mourners who experience more complicated grief and longer term negative affects during this difficult time (‘Pathways Through Grief’). As the placing of roadside memorials has become a common occurrence the world over (Klaassens, Groote, and Vanclay; Grider; Cohen), these are now considered, in MacConville’s opinion, not only “an appropriate, but also an expected response to tragedy”. Hockey and Draper have explored the therapeutic value of the maintenance of “‘continuing bonds’ between the living and the dead” (3). This is, however, only one explanation for the reasons that individuals erect roadside memorials with research suggesting roadside memorials perform two main purposes in their linking of the past with the present—as not only sites of grieving and remembrance, but also of warning (Hartig, and Dunn; Everett; Excell, Roadside Memorials; MacConville). Clark adds that by “localis[ing] and personalis[ing] the road dead,” roadside memorials raise the profile of road trauma by connecting the emotionless statistics of road death directly to individual tragedy. They, thus, transform the highway into not only into a site of past horror, but one in which pain and terror could still happen, and happen at any moment. Despite their increasing commonality and their recognition as cultural artefacts, these memorials thus occupy “an uncomfortable place” both in terms of public policy and for some individuals (Lowe). While in some states of the U.S.A. and in Ireland the erection of such memorials is facilitated by local authorities as components of road safety campaigns, in the U.K. there appears to be “a growing official opposition to the erection of memorials” (MacConville). Criticism has focused on the dangers (of distraction and obstruction) these structures pose to passing traffic and pedestrians, while others protest their erection on aesthetic grounds and even claim memorials can lower property values (Everett). While many ascertain a sense of hope and purpose in the physical act of creating such shrines (see, for instance, Grider; Davies), they form an uncanny presence along the highway and can provide dangerous psychological territory for the viewer (Brien). Alongside the townships, tourist sites, motels, and petrol stations vying to attract customers, they stain the roadway with the unmistakable sign that a violent death has happened—bringing death, and the dead, to the fore as a component of these journeys, and destabilising prominent cultural narratives of technological progress and safety (Richter, Barach, Ben-Michael, and Berman).Conclusion This investigation has followed Goddu who proposes that a Gothic text “registers its culture’s contradictions” (3) and, in profiling these memorials as “intimately connected to the culture that produces them” (Goddu 3) has proposed memorials as Gothic artefacts that can both disturb and reveal. Roadside memorials are, indeed, so loaded with emotional content that their close contemplation can be traumatising (Brien), yet they are inescapable while navigating the roadway. Part of their power resides in their ability to re-animate those persons killed in these violent in the minds of those viewing these memorials. In this way, these individuals are reincarnated as ghostly presences along the highway, forming channels via which the traveller can not only make human contact with the dead, but also come to recognise and ponder their own sense of mortality. While roadside memorials are thus like civic war memorials in bringing untimely death to the forefront of public view, roadside memorials provide a much more raw expression of the chaotic, anarchic and traumatic moment that separates the world of the living from that of the dead. While traditional memorials—such as those dedicated by, and to, Leichhardt—moreover, pay homage to the vitality of the lives of those they commemorate, roadside memorials not only acknowledge the alarming circ*mstances of unexpected death but also stand testament to the power of the paradox of the incontrovertibility of sudden death versus our lack of ability to postpone it. In this way, further research into these and other examples of Gothic memorialising practice has much to offer various areas of cultural study in Australia.ReferencesAdams, Brian. Sidney Nolan: Such Is Life. Hawthorn, Vic.: Hutchinson, 1987. Advocates for Highway and Auto Safety. “Motor Vehicle Traffic Fatalities & Fatality Rate: 1899-2003.” 2004. Becker, Ernest. The Denial of Death. New York: Simon & Schuster, 1973. Bisceglio, Paul. “How Social Media Is Changing the Way We Approach Death.” The Atlantic 20 Aug. 2013. Botting, Fred. Gothic: The New Critical Idiom. 2nd edition. Abingdon, UK: Routledge, 2014. Brien, Donna Lee. “Looking at Death with Writers’ Eyes: Developing Protocols for Utilising Roadside Memorials in Creative Writing Classes.” Roadside Memorials. Ed. Jennifer Clark. Armidale, NSW: EMU Press, 2006. 208–216. Campbell, Elaine. “Public Sphere as Assemblage: The Cultural Politics of Roadside Memorialization.” The British Journal of Sociology 64.3 (2013): 526–547. Cicero, Marcus Tullius. The Orations of Marcus Tullius Cicero. 43 BC. Trans. C. D. Yonge. London: George Bell & Sons, 1903. Clark, Jennifer. “But Statistics Don’t Ride Skateboards, They Don’t Have Nicknames Like ‘Champ’: Personalising the Road Dead with Roadside Memorials.” 7th International Conference on the Social Context of Death, Dying and Disposal. Bath, UK: University of Bath, 2005. Cohen, Erik. “Roadside Memorials in Northeastern Thailand.” OMEGA: Journal of Death and Dying 66.4 (2012–13): 343–363. Connolly, John F., Anne Cullen, and Orfhlaith McTigue. “Single Road Traffic Deaths: Accident or Suicide?” Crisis: The Journal of Crisis Intervention and Suicide Prevention 16.2 (1995): 85–89. Cornack [Coroner]. Transcript of Proceedings. In The Matter of an Inquest into the Cause and Circ*mstances Surrounding the Death of Jason John Zupp. Towoomba, Qld.: Coroners Court. 12 Oct. 2007. Davies, Douglas. “Locating Hope: The Dynamics of Memorial Sites.” 6th International Conference on the Social Context of Death, Dying and Disposal. York, UK: University of York, 2002. Department of Infrastructure, Transport, Regional Development and Local Government [DITRDLG]. Road Deaths Australia: 2007 Statistical Summary. Canberra: Commonwealth of Australia, 2008. Duwe, Grant. “Body-count Journalism: The Presentation of Mass Murder in the News Media.” Homicide Studies 4 (2000): 364–399. Elder, Bruce. Blood on the Wattle: Massacres and Maltreatment of Aboriginal Australians since 1788. Sydney: New Holland, 1998. Erdos, Renee. “Leichhardt, Friedrich Wilhelm Ludwig (1813-1848).” Australian Dictionary of Biography Online Edition. Melbourne: Melbourne UP, 1967. Everett, Holly. Roadside Crosses in Contemporary Memorial Culture. Austin: Texas UP, 2002. Excell, Gerri. “Roadside Memorials in the UK.” Unpublished MA thesis. Reading: University of Reading, 2004. ———. “Contemporary Deathscapes: A Comparative Analysis of the Material Culture of Roadside Memorials in the US, Australia and the UK.” 7th International Conference on the Social Context of Death, Dying and Disposal. Bath, UK: University of Bath, 2005. Goddu, Teresa A. Gothic America: Narrative, History, and Nation. New York: Columbia UP, 2007. Gorer, Geoffrey. “The p*rnography of Death.” Encounter V.4 (1955): 49–52. Grider, Sylvia. “Spontaneous Shrines: A Modern Response to Tragedy and Disaster.” New Directions in Folklore (5 Oct. 2001). Haider, Amna. “War Trauma and Gothic Landscapes of Dispossession and Dislocation in Pat Barker’s Regeneration Trilogy.” Gothic Studies 14.2 (2012): 55–73. Hall, Stephen S. Merchants of Immortality: Chasing the Dream of Human Life Extension. Boston: Houghton, Mifflin, Harcourt, 2003. Hartig, Kate V., and Kevin M. Dunn. “Roadside Memorials: Interpreting New Deathscapes in Newcastle, New South Wales.” Australian Geographical Studies 36 (1998): 5–20. Hockey, Jenny, and Janet Draper. “Beyond the Womb and the Tomb: Identity, (Dis)embodiment and the Life Course.” Body & Society 11.2 (2005): 41–57. Online version: 1–25. Jones, Ian, and Kaye McColl. (2006) “Highway Tragedy.” Goondiwindi Argus 9 Jun. 2006. Kiernan, Stephen P. “The Transformation of Death in America.” Final Acts: Death, Dying, and the Choices We Make. Eds. Nan Bauer-Maglin, and Donna Perry. Rutgers University: Rutgers UP, 2010. 163–182. Klaassens, M., P.D. Groote, and F.M. Vanclay. “Expressions of Private Mourning in Public Space: The Evolving Structure of Spontaneous and Permanent Roadside Memorials in the Netherlands.” Death Studies 37.2 (2013): 145–171. Ladd, Brian. Autophobia: Love and Hate in the Automotive Age. Chicago: U of Chicago P, 2008. Leichhardt, Ludwig. Journal of an Overland Expedition of Australia from Moreton Bay to Port Essington, A Distance of Upwards of 3000 Miles during the Years 1844–1845. London, T & W Boone, 1847. Facsimile ed. Sydney: Macarthur Press, n.d. Lowe, Tim. “Roadside Memorials in South Eastern Australia.” 7th International Conference on the Social Context of Death, Dying and Disposal. Bath, UK: University of Bath, 2005. MacConville, Una. “Roadside Memorials.” Bath, UK: Centre for Death & Society, Department of Social and Policy Sciences, University of Bath, 2007. Macintyre, Stuart. “The Making of the Australian Working Class: An Historiographical Survey.” Historical Studies 18.71 (1978): 233–253. Mollinson, James, and Nicholas Bonham. Tucker. South Melbourne: Macmillan Company of Australia, and Australian National Gallery, 1982. Morell, Virginia. “Mournful Creatures.” Lapham’s Quarterly 6.4 (2013): 200–208. Nelson, Victoria. Gothicka: Vampire Heroes, Human Gods, and the New Supernatural. Harvard University: Harvard UP, 2012. “Pathways through Grief.” 1st National Conference on Bereavement in a Healthcare Setting. Dundee, 1–2 Sep. 2008. Piatti-Farnell, Lorna. “Words from the Culinary Crypt: Reading the Recipe as a Haunted/Haunting Text.” M/C Journal 16.3 (2013). Queensland Police. “Fatal Traffic Incident, Goondiwindi [Media Advisory].” 27 Apr. 2005. ———. “Fatal Truck Accident, Taroom.” Media release. 11 Dec. 2005. ———. “Double Fatality, Goondiwindi.” Media release. 5 Jun. 2006. Richter, E. D., P. Barach, E. Ben-Michael, and T. Berman. “Death and Injury from Motor Vehicle Crashes: A Public Health Failure, Not an Achievement.” Injury Prevention 7 (2001): 176–178. Secomb, Linnell. “Haunted Community.” The Politics of Community. Ed. Michael Strysick. Aurora, Co: Davies Group, 2002. 131–150. Spooner, Catherine. Contemporary Gothic. London: Reaktion, 2006.

APA, Harvard, Vancouver, ISO, and other styles

37

See, Pamela Mei-Leng. "Branding: A Prosthesis of Identity." M/C Journal 22, no.5 (October9, 2019). http://dx.doi.org/10.5204/mcj.1590.

Full text

Abstract:

This article investigates the prosthesis of identity through the process of branding. It examines cross-cultural manifestations of this phenomena from sixth millennium BCE Syria to twelfth century Japan and Britain. From the Neolithic Era, humanity has sort to extend their identities using pictorial signs that were characteristically simple. Designed to be distinctive and instantly recognisable, the totemic symbols served to signal the origin of the bearer. Subsequently, the development of branding coincided with periods of increased in mobility both in respect to geography and social strata. This includes fifth millennium Mesopotamia, nineteenth century Britain, and America during the 1920s.There are fewer articles of greater influence on contemporary culture than A Theory of Human Motivation written by Abraham Maslow in 1943. Nearly seventy-five years later, his theories about the societal need for “belongingness” and “esteem” remain a mainstay of advertising campaigns (Maslow). Although the principles are used to sell a broad range of products from shampoo to breakfast cereal they are epitomised by apparel. This is with refence to garments and accessories bearing corporation logos. Whereas other purchased items, imbued with abstract products, are intended for personal consumption the public display of these symbols may be interpreted as a form of signalling. The intention of the wearers is to literally seek the fulfilment of the aforementioned social needs. This article investigates the use of brands as prosthesis.Coats and Crests: Identity Garnered on Garments in the Middle Ages and the Muromachi PeriodA logo, at its most basic, is a pictorial sign. In his essay, The Visual Language, Ernest Gombrich described the principle as reducing images to “distinctive features” (Gombrich 46). They represent a “simplification of code,” the meaning of which we are conditioned to recognise (Gombrich 46). Logos may also be interpreted as a manifestation of totemism. According to anthropologist Claude Levi-Strauss, the principle exists in all civilisations and reflects an effort to evoke the power of nature (71-127). Totemism is also a method of population distribution (Levi-Strauss 166).This principle, in a form garnered on garments, is manifested in Mon Kiri. The practice of cutting out family crests evolved into a form of corporate branding in Japan during the Meiji Period (1868-1912) (Christensen 14). During the Muromachi period (1336-1573) the crests provided an integral means of identification on the battlefield (Christensen 13). The adorning of crests on armour was also exercised in Europe during the twelfth century, when the faces of knights were similarly obscured by helmets (Family Crests of Japan 8). Both Mon Kiri and “Coat[s] of Arms” utilised totemic symbols (Family Crests of Japan 8; Elven 14; Christensen 13). The mon for the imperial family (figs. 1 & 2) during the Muromachi Period featured chrysanthemum and paulownia flowers (Goin’ Japaneque). “Coat[s] of Arms” in Britain featured a menagerie of animals including lions (fig. 3), horses and eagles (Elven).The prothesis of identity through garnering symbols on the battlefield provided “safety” through demonstrating “belongingness”. This constituted a conflation of two separate “needs” in the “hierarchy of prepotency” propositioned by Maslow. Fig. 1. The mon symbolising the Imperial Family during the Muromachi Period featured chrysanthemum and paulownia. "Kamon (Japanese Family Crests): Ancient Key to Samurai Culture." Goin' Japaneque! 15 Nov. 2015. 27 July 2019 <http://goinjapanesque.com/05983/>.Fig. 2. An example of the crest being utilised on a garment can be found in this portrait of samurai Oda Nobunaga. "Japan's 12 Most Famous Samurai." All About Japan. 27 Aug. 2018. 27 July 2019 <https://allabout-japan.com/en/article/5818/>.Fig. 3. A detail from the “Index of Subjects of Crests.” Elven, John Peter. The Book of Family Crests: Comprising Nearly Every Family Bearing, Properly Blazoned and Explained, Accompanied by Upwards of Four Thousand Engravings. Henry Washbourne, 1847.The Pursuit of Prestige: Prosthetic Pedigree from the Late Georgian to the Victorian Eras In 1817, the seal engraver to Prince Regent, Alexander Deuchar, described the function of family crests in British Crests: Containing The Crest and Mottos of The Families of Great Britain and Ireland; Together with Those of The Principal Cities and Heraldic Terms as follows: The first approach to civilization is the distinction of ranks. So necessary is this to the welfare and existence of society, that, without it, anarchy and confusion must prevail… In an early stage, heraldic emblems were characteristic of the bearer… Certain ordinances were made, regulating the mode of bearing arms, and who were entitled to bear them. (i-v)The partitioning of social classes in Britain had deteriorated by the time this compendium was published, with displays of “conspicuous consumption” displacing “heraldic emblems” as a primary method of status signalling (Deuchar 2; Han et al. 18). A consumerism born of newfound affluence, and the desire to signify this wealth through luxury goods, was as integral to the Industrial Revolution as technological development. In Rebels against the Future, published in 1996, Kirkpatrick Sale described the phenomenon:A substantial part of the new population, though still a distinct minority, was made modestly affluent, in some places quite wealthy, by privatization of of the countryside and the industrialization of the cities, and by the sorts of commercial and other services that this called forth. The new money stimulated the consumer demand… that allowed a market economy of a scope not known before. (40)This also reflected improvements in the provision of “health, food [and] education” (Maslow; Snow 25-28). With their “physiological needs” accommodated, this ”substantial part” of the population were able to prioritised their “esteem needs” including the pursuit for prestige (Sale 40; Maslow).In Britain during the Middle Ages laws “specified in minute detail” what each class was permitted to wear (Han et al. 15). A groom, for example, was not able to wear clothing that exceeded two marks in value (Han et al. 15). In a distinct departure during the Industrial Era, it was common for the “middling and lower classes” to “ape” the “fashionable vices of their superiors” (Sale 41). Although mon-like labels that were “simplified so as to be conspicuous and instantly recognisable” emerged in Europe during the nineteenth century their application on garments remained discrete up until the early twentieth century (Christensen 13-14; Moore and Reid 24). During the 1920s, the French companies Hermes and Coco Chanel were amongst the clothing manufacturers to pioneer this principle (Chaney; Icon).During the 1860s, Lincolnshire-born Charles Frederick Worth affixed gold stamped labels to the insides of his garments (Polan et al. 9; Press). Operating from Paris, the innovation was consistent with the introduction of trademark laws in France in 1857 (Lopes et al.). He would become known as the “Father of Haute Couture”, creating dresses for royalty and celebrities including Empress Eugene from Constantinople, French actress Sarah Bernhardt and Australian Opera Singer Nellie Melba (Lopes et al.; Krick). The clothing labels proved and ineffective deterrent to counterfeit, and by the 1890s the House of Worth implemented other measures to authenticate their products (Press). The legitimisation of the origin of a product is, arguably, the primary function of branding. This principle is also applicable to subjects. The prothesis of brands, as totemic symbols, assisted consumers to relocate themselves within a new system of population distribution (Levi-Strauss 166). It was one born of commerce as opposed to heraldry.Selling of Self: Conferring Identity from the Neolithic to Modern ErasIn his 1817 compendium on family crests, Deuchar elaborated on heraldry by writing:Ignoble birth was considered as a stain almost indelible… Illustrious parentage, on the other hand, constituted the very basis of honour: it communicated peculiar rights and privileges, to which the meaner born man might not aspire. (v-vi)The Twinings Logo (fig. 4) has remained unchanged since the design was commissioned by the grandson of the company founder Richard Twining in 1787 (Twining). In addition to reflecting the heritage of the family-owned company, the brand indicated the origin of the tea. This became pertinent during the nineteenth century. Plantations began to operate from Assam to Ceylon (Jones 267-269). Amidst the rampant diversification of tea sources in the Victorian era, concerns about the “unhygienic practices” of Chinese producers were proliferated (Wengrow 11). Subsequently, the brand also offered consumers assurance in quality. Fig. 4. The Twinings Logo reproduced from "History of Twinings." Twinings. 24 July 2019 <https://www.twinings.co.uk/about-twinings/history-of-twinings>.The term ‘brand’, adapted from the Norse “brandr”, was introduced into the English language during the sixteenth century (Starcevic 179). At its most literal, it translates as to “burn down” (Starcevic 179). Using hot elements to singe markings onto animals been recorded as early as 2700 BCE in Egypt (Starcevic 182). However, archaeologists concur that the modern principle of branding predates this practice. The implementation of carved seals or stamps to make indelible impressions of handcrafted objects dates back to Prehistoric Mesopotamia (Starcevic 183; Wengrow 13). Similar traditions developed during the Bronze Age in both China and the Indus Valley (Starcevic 185). In all three civilisations branding facilitated both commerce and aspects of Totemism. In the sixth millennium BCE in “Prehistoric” Mesopotamia, referred to as the Halaf period, stone seals were carved to emulate organic form such as animal teeth (Wengrow 13-14). They were used to safeguard objects by “confer[ring] part of the bearer’s personality” (Wengrow 14). They were concurrently applied to secure the contents of vessels containing “exotic goods” used in transactions (Wengrow 15). Worn as amulets (figs. 5 & 6) the seals, and the symbols they produced, were a physical extension of their owners (Wengrow 14).Fig. 5. Recreation of stamp seal amulets from Neolithic Mesopotamia during the sixth millennium BCE. Wengrow, David. "Prehistories of Commodity Branding." Current Anthropology 49.1 (2008): 14.Fig. 6. “Lot 25Y: Rare Syrian Steatite Amulet – Fertility God 5000 BCE.” The Salesroom. 27 July 2019 <https://www.the-saleroom.com/en-gb/auction-catalogues/artemis-gallery-ancient-art/catalogue-id-srartem10006/lot-a850d229-a303-4bae-b68c-a6130005c48a>. Fig. 7. Recreation of stamp seal designs from Mesopotamia from the late fifth to fourth millennium BCE. Wengrow, David. "Prehistories of Commodity Branding." Current Anthropology 49. 1 (2008): 16.In the following millennia, the seals would increase exponentially in application and aesthetic complexity (fig. 7) to support the development of household cum cottage industries (Wengrow 15). In addition to handcrafts, sealed vessels would transport consumables such as wine, aromatic oils and animal fats (Wengrow 18). The illustrations on the seals included depictions of rituals undertaken by human figures and/or allegories using animals. It can be ascertained that the transition in the Victorian Era from heraldry to commerce, from family to corporation, had precedence. By extension, consumers were able to participate in this process of value attribution using brands as signifiers. The principle remained prevalent during the modern and post-modern eras and can be respectively interpreted using structuralist and post-structuralist theory.Totemism to Simulacrum: The Evolution of Advertising from the Modern to Post-Modern Eras In 2011, Lisa Chaney wrote of the inception of the Coco Chanel logo (fig. 8) in her biography Chanel: An Intimate Life: A crucial element in the signature design of the Chanel No.5 bottle is the small black ‘C’ within a black circle set as the seal at the neck. On the top of the lid are two more ‘C’s, intertwined back to back… from at least 1924, the No5 bottles sported the unmistakable logo… these two ‘C’s referred to Gabrielle, – in other words Coco Chanel herself, and would become the logo for the House of Chanel. Chaney continued by describing Chanel’s fascination of totemic symbols as expressed through her use of tarot cards. She also “surrounded herself with objects ripe with meaning” such as representations of wheat and lions in reference prosperity and to her zodiac symbol ‘Leo’ respectively. Fig. 8. No5 Chanel Perfume, released in 1924, featured a seal-like logo attached to the bottle neck. “No5.” Chanel. 25 July 2019 <https://www.chanel.com/us/fragrance/p/120450/n5-parfum-grand-extrait/>.Fig. 9. This illustration of the bottle by Georges Goursat was published in a women’s magazine circa 1920s. “1921 Chanel No5.” Inside Chanel. 26 July 2019 <http://inside.chanel.com/en/timeline/1921_no5>; “La 4éme Fête de l’Histoire Samedi 16 et dimache 17 juin.” Ville de Perigueux. Musée d’art et d’archéologie du Périgord. 28 Mar. 2018. 26 July 2019 <https://www.perigueux-maap.fr/category/archives/page/5/>. This product was considered the “financial basis” of the Chanel “empire” which emerged during the second and third decades of the twentieth century (Tikkanen). Chanel is credited for revolutionising Haute Couture by introducing chic modern designs that emphasised “simplicity and comfort.” This was as opposed to the corseted highly embellished fashion that characterised the Victorian Era (Tikkanen). The lavish designs released by the House of Worth were, in and of themselves, “conspicuous” displays of “consumption” (Veblen 17). In contrast, the prestige and status associated with the “poor girl” look introduced by Chanel was invested in the story of the designer (Tikkanen). A primary example is her marinière or sailor’s blouse with a Breton stripe that epitomised her ascension from café singer to couturier (Tikkanen; Burstein 8). This signifier might have gone unobserved by less discerning consumers of fashion if it were not for branding. Not unlike the Prehistoric Mesopotamians, this iteration of branding is a process which “confer[s]” the “personality” of the designer into the garment (Wengrow 13 -14). The wearer of the garment is, in turn, is imbued by extension. Advertisers in the post-structuralist era embraced Levi-Strauss’s structuralist anthropological theories (Williamson 50). This is with particular reference to “bricolage” or the “preconditioning” of totemic symbols (Williamson 173; Pool 50). Subsequently, advertising creatives cum “bricoleur” employed his principles to imbue the brands with symbolic power. This symbolic capital was, arguably, transferable to the product and, ultimately, to its consumer (Williamson 173).Post-structuralist and semiotician Jean Baudrillard “exhaustively” critiqued brands and the advertising, or simulacrum, that embellished them between the late 1960s and early 1980s (Wengrow 10-11). In Simulacra and Simulation he wrote,it is the reflection of a profound reality; it masks and denatures a profound reality; it masks the absence of a profound reality; it has no relation to any reality whatsoever: it is its own pure simulacrum. (6)The symbolic power of the Chanel brand resonates in the ‘profound reality’ of her story. It is efficiently ‘denatured’ through becoming simplified, conspicuous and instantly recognisable. It is, as a logo, physically juxtaposed as simulacra onto apparel. This simulacrum, in turn, effects the ‘profound reality’ of the consumer. In 1899, economist Thorstein Veblen wrote in The Theory of the Leisure Class:Conspicuous consumption of valuable goods it the means of reputability to the gentleman of leisure… costly entertainments, such as potlatch or the ball, are peculiarly adapted to serve this end… he consumes vicariously for his host at the same time that he is witness to the consumption… he is also made to witness his host’s facility in etiquette. (47)Therefore, according to Veblen, it was the witnessing of “wasteful” consumption that “confers status” as opposed the primary conspicuous act (Han et al. 18). Despite television being in its experimental infancy advertising was at “the height of its powers” during the 1920s (Clark et al. 18; Hill 30). Post-World War I consumers, in America, experienced an unaccustomed level of prosperity and were unsuspecting of the motives of the newly formed advertising agencies (Clark et al. 18). Subsequently, the ‘witnessing’ of consumption could be constructed across a plethora of media from the newly emerged commercial radio to billboards (Hill viii–25). The resulting ‘status’ was ‘conferred’ onto brand logos. Women’s magazines, with a legacy dating back to 1828, were a primary locus (Hill 10).Belonging in a Post-Structuralist WorldIt is significant to note that, in a post-structuralist world, consumers do not exclusively seek upward mobility in their selection of brands. The establishment of counter-culture icon Levi-Strauss and Co. was concurrent to the emergence of both The House of Worth and Coco Chanel. The Bavarian-born Levi Strauss commenced selling apparel in San Francisco in 1853 (Levi’s). Two decades later, in partnership with Nevada born tailor Jacob Davis, he patented the “riveted-for-strength” workwear using blue denim (Levi’s). Although the ontology of ‘jeans’ is contested, references to “Jene Fustyan” date back the sixteenth century (Snyder 139). It involved the combining cotton, wool and linen to create “vestments” for Geonese sailors (Snyder 138). The Two Horse Logo (fig. 10), depicting them unable to pull apart a pair of jeans to symbolise strength, has been in continuous use by Levi Strauss & Co. company since its design in 1886 (Levi’s). Fig. 10. The Two Horse Logo by Levi Strauss & Co. has been in continuous use since 1886. Staff Unzipped. "Two Horses. One Message." Heritage. Levi Strauss & Co. 1 July 2011. 25 July 2019 <https://www.levistrauss.com/2011/07/01/two-horses-many-versions-one-message/>.The “rugged wear” would become the favoured apparel amongst miners at American Gold Rush (Muthu 6). Subsequently, between the 1930s – 1960s Hollywood films cultivated jeans as a symbol of “defiance” from Stage Coach staring John Wayne in 1939 to Rebel without A Cause staring James Dean in 1955 (Muthu 6; Edgar). Consequently, during the 1960s college students protesting in America (fig. 11) against the draft chose the attire to symbolise their solidarity with the working class (Hedarty). Notwithstanding a 1990s fashion revision of denim into a diversity of garments ranging from jackets to skirts, jeans have remained a wardrobe mainstay for the past half century (Hedarty; Muthu 10). Fig. 11. Although the brand label is not visible, jeans as initially introduced to the American Goldfields in the nineteenth century by Levi Strauss & Co. were cultivated as a symbol of defiance from the 1930s – 1960s. It documents an anti-war protest that occurred at the Pentagon in 1967. Cox, Savannah. "The Anti-Vietnam War Movement." ATI. 14 Dec. 2016. 16 July 2019 <https://allthatsinteresting.com/vietnam-war-protests#7>.In 2003, the journal Science published an article “Does Rejection Hurt? An Fmri Study of Social Exclusion” (Eisenberger et al.). The cross-institutional study demonstrated that the neurological reaction to rejection is indistinguishable to physical pain. Whereas during the 1940s Maslow classified the desire for “belonging” as secondary to “physiological needs,” early twenty-first century psychologists would suggest “[social] acceptance is a mechanism for survival” (Weir 50). In Simulacra and Simulation, Jean Baudrillard wrote: Today abstraction is no longer that of the map, the double, the mirror or the concept. Simulation is no longer that of a territory, a referential being or a substance. It is the generation by models of a real without origin or reality: a hyperreal… (1)In the intervening thirty-eight years since this document was published the artifice of our interactions has increased exponentially. In order to locate ‘belongness’ in this hyperreality, the identities of the seekers require a level of encoding. Brands, as signifiers, provide a vehicle.Whereas in Prehistoric Mesopotamia carved seals, worn as amulets, were used to extend the identity of a person, in post-digital China WeChat QR codes (fig. 12), stored in mobile phones, are used to facilitate transactions from exchanging contact details to commerce. Like other totems, they provide access to information such as locations, preferences, beliefs, marital status and financial circ*mstances. These individualised brands are the most recent incarnation of a technology that has developed over the past eight thousand years. The intermediary iteration, emblems affixed to garments, has remained prevalent since the twelfth century. Their continued salience is due to their visibility and, subsequent, accessibility as signifiers. Fig. 12. It may be posited that Wechat QR codes are a form individualised branding. Like other totems, they store information pertaining to the owner’s location, beliefs, preferences, marital status and financial circ*mstances. “Join Wechat groups using QR code on 2019.” Techwebsites. 26 July 2019 <https://techwebsites.net/join-wechat-group-qr-code/>.Fig. 13. Brands function effectively as signifiers is due to the international distribution of multinational corporations. This is the shopfront of Chanel in Dubai, which offers customers apparel bearing consistent insignia as the Parisian outlet at on Rue Cambon. Customers of Chanel can signify to each other with the confidence that their products will be recognised. “Chanel.” The Dubai Mall. 26 July 2019 <https://thedubaimall.com/en/shop/chanel>.Navigating a post-structuralist world of increasing mobility necessitates a rudimental understanding of these symbols. Whereas in the nineteenth century status was conveyed through consumption and witnessing consumption, from the twentieth century onwards the garnering of brands made this transaction immediate (Veblen 47; Han et al. 18). The bricolage of the brands is constructed by bricoleurs working in any number of contemporary creative fields such as advertising, filmmaking or song writing. They provide a system by which individuals can convey and recognise identities at prima facie. They enable the prosthesis of identity.ReferencesBaudrillard, Jean. Simulacra and Simulation. Trans. Sheila Faria Glaser. United States: University of Michigan Press, 1994.Burstein, Jessica. Cold Modernism: Literature, Fashion, Art. United States: Pennsylvania State University Press, 2012.Chaney, Lisa. Chanel: An Intimate Life. United Kingdom: Penguin Books Limited, 2011.Christensen, J.A. Cut-Art: An Introduction to Chung-Hua and Kiri-E. New York: Watson-Guptill Publications, 1989. Clark, Eddie M., Timothy C. Brock, David E. Stewart, David W. Stewart. Attention, Attitude, and Affect in Response to Advertising. United Kingdom: Taylor & Francis Group, 1994.Deuchar, Alexander. British Crests: Containing the Crests and Mottos of the Families of Great Britain and Ireland Together with Those of the Principal Cities – Primary So. London: Kirkwood & Sons, 1817.Ebert, Robert. “Great Movie: Stage Coach.” Robert Ebert.com. 1 Aug. 2011. 10 Mar. 2019 <https://www.rogerebert.com/reviews/great-movie-stagecoach-1939>.Elven, John Peter. The Book of Family Crests: Comprising Nearly Every Family Bearing, Properly Blazoned and Explained, Accompanied by Upwards of Four Thousand Engravings. London: Henry Washbourne, 1847.Eisenberger, Naomi I., Matthew D. Lieberman, and Kipling D. Williams. "Does Rejection Hurt? An Fmri Study of Social Exclusion." Science 302.5643 (2003): 290-92.Family Crests of Japan. California: Stone Bridge Press, 2007.Gombrich, Ernst. "The Visual Image: Its Place in Communication." Scientific American 272 (1972): 82-96.Hedarty, Stephanie. "How Jeans Conquered the World." BBC World Service. 28 Feb. 2012. 26 July 2019 <https://www.bbc.com/news/magazine-17101768>. Han, Young Jee, Joseph C. Nunes, and Xavier Drèze. "Signaling Status with Luxury Goods: The Role of Brand Prominence." Journal of Marketing 74.4 (2010): 15-30.Hill, Daniel Delis. Advertising to the American Woman, 1900-1999. United States of Ame: Ohio State University Press, 2002."History of Twinings." Twinings. 24 July 2019 <https://www.twinings.co.uk/about-twinings/history-of-twinings>. icon-icon: Telling You More about Icons. 18 Dec. 2016. 26 July 2019 <http://www.icon-icon.com/en/hermes-logo-the-horse-drawn-carriage/>. Jones, Geoffrey. Merchants to Multinationals: British Trading Companies in the 19th and 20th Centuries. Oxford: Oxford UP, 2002.Kamon (Japanese Family Crests): Ancient Key to Samurai Culture." Goin' Japaneque! 15 Nov. 2015. 27 July 2019 <http://goinjapanesque.com/05983/>. Krick, Jessa. "Charles Frederick Worth (1825-1895) and the House of Worth." Heilburnn Timeline of Art History. The Met. Oct. 2004. 23 July 2019 <https://www.metmuseum.org/toah/hd/wrth/hd_wrth.htm>. Levi’s. "About Levis Strauss & Co." 25 July 2019 <https://www.levis.com.au/about-us.html>. Lévi-Strauss, Claude. Totemism. London: Penguin, 1969.Lopes, Teresa de Silva, and Paul Duguid. Trademarks, Brands, and Competitiveness. Abingdon: Routledge, 2010.Maslow, Abraham. "A Theory of Human Motivation." British Journal of Psychiatry 208.4 (1942): 313-13.Moore, Karl, and Susan Reid. "The Birth of Brand: 4000 Years of Branding History." Business History 4.4 (2008).Muthu, Subramanian Senthikannan. Sustainability in Denim. Cambridge Woodhead Publishing, 2017.Polan, Brenda, and Roger Tredre. The Great Fashion Designers. Oxford: Bloomsbury Publishing, 2009.Pool, Roger C. Introduction. Totemism. New ed. Harmondsworth: Penguin, 1969.Press, Claire. Wardrobe Crisis: How We Went from Sunday Best to Fast Fashion. Melbourne: Schwartz Publishing, 2016.Sale, K. Rebels against the Future: The Luddites and Their War on the Industrial Revolution: Lessons for the Computer Age. Massachusetts: Addison-Wesley, 1996.Snow, C.P. The Two Cultures and the Scientific Revolution. Cambridge: Cambridge University Press, 1959. Snyder, Rachel Louise. Fugitive Denim: A Moving Story of People and Pants in the Borderless World of Global Trade. New York: W.W. Norton, 2008.Starcevic, Sladjana. "The Origin and Historical Development of Branding and Advertising in the Old Civilizations of Africa, Asia and Europe." Marketing 46.3 (2015): 179-96.Tikkanen, Amy. "Coco Chanel." Encyclopaedia Britannica. 19 Apr. 2019. 25 July 2019 <https://www.britannica.com/biography/Coco-Chanel>.Veblen, Thorstein. The Theory of the Leisure Class: An Economic Study in the Evolution of Institutions. London: Macmillan, 1975.Weir, Kirsten. "The Pain of Social Rejection." American Psychological Association 43.4 (2012): 50.Williamson, Judith. Decoding Advertisem*nts: Ideology and Meaning in Advertising. Ideas in Progress. London: Boyars, 1978.

APA, Harvard, Vancouver, ISO, and other styles

38

Kaur, Jasleen. "Allure of the Abroad: Tiffany & Co., Its Cultural Influence, and Consumers." M/C Journal 19, no.5 (October13, 2016). http://dx.doi.org/10.5204/mcj.1153.

Full text

Abstract:

Introduction Tiffany and Co. is an American luxury jewellery and specialty retailer with its headquarters in New York City. Each piece of jewellery, symbolically packaged in a blue box and tied with a white bow, encapsulates the brand’s unique diamond pieces, symbolic origin story, branded historical contributions and representations in culture. Cultural brands are those that live and thrive in the minds of consumers (Holt). Their brand promise inspires loyalty and trust. These brands offer experiences, products, and personalities and spark emotional connotations within consumers (Arvidsson). This case study uses Tiffany & Co. as a successful example to reveal the importance of understanding consumers, the influential nature of media culture, and the efficacy of strategic branding, advertising, and marketing over time (Holt). It also reveals how Tiffany & Co. earned and maintained its place as an iconic cultural brand within consumer culture, through its strong association with New York and products from abroad. Through its trademarked logo and authentic luxury jewellery, encompassed in the globally recognised “Tiffany Blue” boxes, Tiffany & Co.’s cultural significance stems from its embodiment of the expected makings of a brand (Chernatony et al.). However, what propels this brand into what Douglas Holt terms “iconic territory” is that in its one hundred and seventy-nine years of existence, Tiffany’s has lived exclusively in the minds of its consumers.Tiffany & Co.’s intuitive prowess in reaching its target audience is what allows it to dominate the luxury jewellery market (Halasz et al.). This is not only a result of product value, but the alluring nature of the “Tiffany's from New York” brand imagery and experience (Holt et al.), circulated and celebrated in consumer culture through influential depictions in music, film and literature over time (Knight). Tiffany’s faithfully participates in the magnetic identity myth embodied by the brand and city, and has become globally sought after by consumers near and far, and recognised for its romantic connotations of love, luxury, and New York (Holt). An American Dream: New York Affiliation & Diamond OriginsIt was Truman Capote’s characterisation of Holly Golightly in his book (1958) and film adaption, Breakfast at Tiffany’s (1961) that introduced the world to New York as the infatuating “setting,” upon which the Tiffany’s diamond rested. It was a place, that enabled the iconic Holly Golightly to personify the feeling of being abroad in New York and to demonstrate the seductive nature of a Tiffany’s store experience, further shaping the identity myth encompassed by the brand and the city for their global audience (Holt). Essentially, New York was the influential cultural instigator that propelled Tiffany & Co. from a consumer product, to a cultural icon. It did this by circulating its iconography via celebrity affiliations and representations in music, film, and literature (Knight), and by guiding strong brand associations in the minds of consumers (Arvidsson). However, before Tiffany’s became culturally iconic, it established its place in American heritage through historical contributions (Tiffany & Co.) and pledged an association to New York by personifying the American Dream (Mae). To help achieve his dream in a rapidly evolving economy (Elliott), Charles Lewis Tiffany purportedly brought the first substantial gemstones into America from overseas, and established the first American jewellery store to sell them to the public (Halasz et al.). The Tiffany & Co. origin story personifies the alluring nature of products from abroad, and their influence on individuals seeking an image of affluence for themselves. The ties between New York, Tiffany’s, and its consumers were further strengthened through the established, invaluable and emblematic nature of the diamond, historically launched and controlled by South African Diamond Cartel of De Beers (Twitchell). De Beers manipulated the demand for diamonds and instigated it as a status symbol. It then became a commoditised measurement of an individual’s worth and potential to love (Twitchell), a philosophy, also infused in the Tiffany & Co. brand ideology (Holt). Building on this, Tiffany’s further ritualised the justification of the material symbolisation of love through the idealistic connotations surrounding its assorted diamond ring experiences (Lee). This was projected through a strategic product placement and targeted advertising scheme, evident in dominant culture throughout the brand’s existence (Twitchell). Idealistically discussed by Purinton, this is also what exemplified, for consumers, the enticing cultural symbolism of the crystal rock from New York (Halasz et al.). Brand Essence: Experience & Iconography Prior to pop culture portraying the charming Tiffany’s brand imagery in mainstream media (Balmer et al.), Charles Tiffany directed the company’s ascent into luxury jewellery (Phillips et al.), fashioned the enticing Tiffany’s “store experience”, and initiated the experiential process of purchasing a diamond product. This immediately intertwined the imagery of Tiffany’s with New York, instigating the exclusivity of the experience for consumers (Holt). Tiffany’s provided customers with the opportunity to participate in an intricately branded journey, resulting in the diamond embodiment which declared their love most accurately; a token, packaged and presented within an iconic “Tiffany Blue” box (Klara). Aligning with Keller’s branding blueprint (7), this interactive process enabled Tiffany & Co. to build brand loyalty by consistently connecting with each of its consumers, regardless of their location in the world. The iconography of the coveted “blue box” was crafted when Charles Tiffany trademarked the shade Pantone No. 1837 (Osborne), which he coined for the year of Tiffany’s founding (Klara). Along with the brand promise of containing quality luxury jewellery, the box and that particular shade of blue instantly became a symbol of exclusivity, sophistication, and elegance, as it could only be acquired by purchasing jewellery from a Tiffany’s store (Rawlings). The exclusive packaging began to shape Tiffany’s global brand image, becoming a signifier of style and superiority (Phillips et al.), and eventually just as iconic as the jewellery itself. The blue box is still the strongest signifier of the brand today (Osborne). Ultimately, individuals want to participate in the myth of love, perfection and wealth (Arvidsson), encompassed exclusively by every Tiffany’s “blue box”. Furthermore, Tiffany’s has remained artistically significant within the luxury jewellery landscape since introducing its one-of-a-kind Tiffany Setting in 1886. It was the first jewellery store to fully maximise the potential of the natural beauty possessed of diamonds, while connotatively reflecting the natural beauty of every wearer (Phillips et al.). According to Jeffrey Bennett, the current Vice President of Tiffany & Co. New York, by precisely perching the “Tiffany Diamond” upon six intricately crafted silver prongs, the ring shines to its maximum capacity in a lit environment, while being closely secured to the wearer’s finger (Lee). Hence, the “Tiffany Setting” has become a universally sought after icon of extravagance and intricacy (Knight), and, as Bennett further describes, even today, the setting represents uncompromising quality and is a standard image of true love (Lee). Alluring Brand Imagery & Influential Representations in CultureEmpirical consumer research, involving two focus groups of married and unmarried, ethnically diverse Australian women and conducted in 2015, revealed that even today, individuals accredit their desire for Tiffany’s to the inspirational imagery portrayed in music, movies and television. Through participating in the Tiffany's from New York store experience, consumers are able to indulge in their fantasies of what it would feel like to be abroad and the endless potential a city such as New York could hold for them. Tiffany’s successfully disseminated its brand ideology into consumer culture (Purinton) and extended the brand’s significance for consumers beyond the 1960s through constant representation of the expensive business of love, lust and marriage within media culture. This is demonstrated in such films as Gentlemen Prefer Blondes (1953), Breakfast at Tiffany’s (1961), Sleepless in Seattle (1993), Legally Blonde (2001), Sweet Home Alabama (2002), The Great Gatsby (2013), and in the influential television shows, Gossip Girl (2007—2012), and Glee (2009—2015).The most important of these was the film Breakfast at Tiffany’s (1961), and the iconic embodiment of Capote’s (1958) Holly Golightly by actress Audrey Hepburn (Wasson). Hepburn’s (1961) portrayal of the emotionally evocative connotations of experiencing Tiffany’s in New York, as personified by her romantic dialogue throughout the film (Mae), produced the image that nothing bad could ever happen at a Tiffany’s store. Thus began the Tiffany’s from New York cultural phenomenon, which has been consistently reiterated in popular media culture ever since.Breakfast at Tiffany’s also represented a greater struggle faced by women in the 1960s (Dutt); that of gender roles, women’s place in society, and their desire for stability and freedom simultaneously (Sheehan). Due to Hepburn’s accurate characterisation of this struggle, the film enabled Tiffany & Co. to become more than just jewellery and a symbol of support (Torelli). Tiffany’s also allowed filming to take place inside its New York flagship store to which Capote’s narrative so idealistically alludes, further demonstrating its support for the 1960s women’s movement at an opportune moment in history (Torelli). Hence, Tiffany’s from New York became a symbol for the independent materialistic modern woman (Wasson), an ideal, which has become a repeated motif, re-imagined and embodied by popular icons (Knight) such as, Madonna in Material Girl (1985), and the characterisations of Carrie Bradshaw by Sarah Jessica Parker, Charlotte York by Kristin Davis (Sex and the City), and Donna Paulsen by Sarah Rafferty (Suits). The iconic television series Sex and the City, set in New York, boldly represented Tiffany’s as a symbol of friendship when a fellow female protagonist parted with her lavish Tiffany’s engagement ring to help her friend financially (Sex and the City). This was similarly reimagined in the popular television series Suits, also set in New York, where a protagonist is gifted two Tiffany Boxes from her female friend, as a token of congratulations on her engagement. This allowed Tiffany & Co. to add friendship to its symbolic repertoire (Manning), whilst still personifying a symbol of love in the minds of its consumers who were tactically also the target audiences of these television shows (Wharton).The alluring Tiffany’s image was presented specifically to a male audience through the first iconic Bond Girl named Tiffany Case in the novel Diamonds Are Forever (Fleming). The film adaption made its cultural imprint in 1971 with Sean Connery portraying James Bond, and paired the exaggerated brand of “007” with the evocative imagery of Tiffany’s (Spilski et al.). This served as a reminder to existing audiences about the powerful and seductive connotations of the blue box with the white ribbon (Osborne), as depicted by the enticing Tiffany Case in 1956.Furthermore, the Tiffany’s image was similarly established as a lyrical status symbol of wealth and indulgence (Knight). Portrayed most memorably by Marilyn Monroe’s iconic performance of Diamonds Are a Girl’s Best Friend (Gentlemen Prefer Blondes). Even though the song only mentions Tiffany’s lyrically twice (Vito et al.), through the celebrity affiliation, Monroe was introduced as a credible embodiment of Tiffany’s brand essence (Davis). Consequently, she permanently attached her image to that of the alluring Tiffany Diamonds for the target audience, male and female, past and present (Vito et al.). Exactly thirty-two years later, Monroe’s 1953 depiction was reinforced in consumer culture (Wharton) through an uncanny aesthetic and lyrical reimagining of the original performance by Madonna in her music video Material Girl (1985). This further preserved and familiarised the Tiffany’s image of glamour, luxury and beauty by implanting it in the minds of a new generation (Knight). Despite the shift in celebrity affiliation to a current cultural communicator (Arvidsson), the influential image of the Tiffany Diamond remains constant and Tiffany’s has maintained its place as a popular signifier of affluence and elegance in mainstream consumer culture (Jansson). The main difference, however, between Monroe’s and Madonna’s depictions is that Madonna aspired to be associated with the Tiffany’s brand image because of her appreciation for Marilyn Monroe and her brand image, which also intrinsically exuded beauty, money and glamour (Vito et al.). This suggests that even a musical icon like Madonna was influenced by Tiffany & Co.’s hold on consumer culture (Spilski et al.), and was able to inject the same ideals into her own loyal fan base (Fill). It is evident that Tiffany & Co. is thoroughly in tune with its target market and understands the relevant routes into the minds of its consumers. Kotler (113) identifies that the brand has demonstrated the ability to reach its separate audiences simultaneously, with an image that resonates with them on different levels (Manning). For example, Tiffany & Co. created the jewellery that featured in Baz Luhrmann’s 2013 cinematic adaption of F. Scott Fitzgerald’s novel, The Great Gatsby (1925). Through representing a signifier of love and lust induced by monetary possessions (Fitzgerald), Tiffany’s truthfully portrayed its own brand image and persuaded audiences to associate the brand with these ideals (Holt). By illustrating the romantic, alluring and powerful symbolism of giving or obtaining love, armed with a Tiffany’s Diamond (Mae), Tiffany’s validated its timeless, historical and cultural contemporary relevance (Greene).This was also most recently depicted through Tiffany & Co.’s Will You (2015) advertising campaign. The brand demonstrated its support for marriage equality, by featuring a real life same-sex couple to symbolise that love is not conditional and that Tiffany’s has something that signifies every relationship (Dicker). Thus, because of the brand’s rooted place in central media culture and the ability to appeal to the belief system of its target market while evolving with, and understanding its consumers on a level of metonymy (Manning), Tiffany & Co. has transitioned from a consumer product to a culturally relevant and globally sought-after iconic brand (Holt). ConclusionTiffany & Co.’s place-based association and representational reflection in music, film, and literature, assisted in the formation of loyal global communities that thrive on the identity building side effects associated with luxury brand affiliation (Banet-Weiser et al.). Tiffany’s enables its global target market to revel in the shared meanings surrounding the brand, by signifying a symbolic construct that resonates with consumers (Hall). Tiffany’s inspires consumers to eagerly exercise their brand trust and loyalty by independently ritualising the Tiffany’s from New York brand experience for themselves and the ones they love (Fill). Essentially, Tiffany & Co. successfully established its place in society and strengthened its ties to New York, through targeted promotions and iconographic brand dissemination (Nita).Furthermore, by ritualistically positioning the brand (Holt), surrounding and saturating it in existing cultural practices, supporting significant cultural actions and becoming a symbol of wealth, luxury, commitment, love and exclusivity (Phillips et al.), Tiffany’s has steadily built a positive brand association and desire in the minds of consumers near and far (Keller). As a direct result, Tiffany’s earned and kept its place as a culturally progressive brand in New York and around the world, sustaining its influence and ensuring its survival in today’s contemporary consumer society (Holt).Most importantly, however, although New York has become the anchor in every geographically exemplified Tiffany’s store experience in literature, New York has also become the allegorical anchor in the minds of consumers in actuality (Arvidsson). Hence, Tiffany & Co. has catered to the needs of its global target audience by providing it with convenient local stores abroad, where their love can be personified by purchasing a Tiffany Diamond, the ultimate symbol of authentic commitment, and where they can always experience an allusive piece of New York. ReferencesArvidsson, Adam. Brands: Meaning and Value in Media Culture. New York: Routledge, 2006.Balmer, John M.T., Stephen A. Greyser, and Mats Urde. “Corporate Brands with a Heritage.” Journal of Brand Management 15.1 (2007): 4–17.Banet-Weiser, Sarah, and Charlotte Lapsansky. “RED Is the New Black: Brand Culture, Consumer Citizenship and Political Possibility.” International Journal of Communication 2 (2008): 1248–64. Breakfast at Tiffany’s. Blake Edwards. Paramount Pictures, 1961.Capote, Truman. Breakfast at Tiffany’s. New York: Random House, 1958.Chernatony, Leslie D, and Francesca Dall'Olmo Riley. “Defining a 'Brand': Beyond the Literature with Experts' Interpretations.” Journal of Marketing Management 14.5 (1998): 413–38.Material Girl. Performed by Madonna. Mary Lambert. Warner Bros, 1985. Music Video. Davis, Aeron. Promotional Cultures. Cambridge: Polity Press, 2013.Diamonds Are Forever. Guy Hamilton. United Artists, 1971.Dicker, Ron. “Tiffany Ad Features Gay Couple, Rings in New Year in a Big Way.” The Huffington Post Australia, 11 Jan. 2015. Dutt, Reema. “Behind the Curtain: Women’s Representations in Contemporary Hollywood.” Department of Media and Communications (2014): 2–38. Elliott, Alan. A Daily Dose of the American Dream: Stories of Success, Triumph, and Inspiration. Edinburgh: Thomas Nelson, 1998.Fill, Chris. Marketing Communications: Interactivity, Communities and Content. 5th ed. New Jersey: Prentice Hall, 2009.Fitzgerald, F. Scott. The Great Gatsby. New York: Charles Scribner’s Sons, 1925.Fleming, Ian. Diamonds Are Forever, London: Jonathan Cape, 1956.Gemological Institute of America, “Diamond History and Lore.” GIA, 2002–2016. Gentlemen Prefer Blondes. Howard Hawks. 20th Century Fox, 1953.Glee. Prod. Ryan Murphy. 20th Century Fox. California, 2009–2015. Television.Gossip Girl. Prod. Josh Schwartz. Warner Bros. California, 2007–2012. Television.Greene, Lucie. “Luxury Brands and ‘The Great Gatsby’ Movie.” Style Magazine. 11 May. 2013.Halasz, Robert, and Christina Stansell. “Tiffany & Co.” International Directory of Company Histories, 8 Oct. 2006. Hall, Stuart. Representation: Cultural Representations and Signifying Practices. London: SAGE, 1997. Holt, Douglas B., and Douglas Cameron. Cultural Strategy: Using Innovative Ideologies to Build Breakthrough Brands. Oxford: Oxford UP, 2010.Holt, Douglas B. How Brands Become Icons: The Principles of Cultural Branding. Boston: Harvard Business P, 2004.Jansson, Andre. “The Mediatization of Consumption Towards an Analytical Framework of Image Culture.” Journal of Consumer Culture 2.1 (2002): 5–27.Keller, Kevin L. “Building Customer-Based Brand Equity: A Blueprint for Creating Strong Brands.” Marketing Science Institute (2001): 3–30.Klara, Robert. “How Tiffany’s Iconic Box Became the World’s Most Popular Package.” Adweek, 22 Sep. 2014. Knight, Gladys L. Pop Culture Places: An Encyclopedia of Places in American Popular Culture. Santa Barbara: ABC-CLIO, 2014.Kotler, Philip. Principles of Marketing. 2nd ed. Englewood Cliffs: Prentice Hall, 1983.Lee, Jane. “Deconstructing the Tiffany Setting.” Forbes video clip. YouTube, 3 Oct. 2012.Legally Blonde. Robert Luketic. Metro-Goldwyn-Mayer, 2001.Mae, Caity. “A Love Letter to Tiffany & Co.” Blog post. Thought Catalogue, 7 May. 2014.Manning, Paul. “The Semiotics of Brand.” The Annual Review of Anthropology 39 (2010): 33–46.Nita, Catalina. “Tiffany & Co: Brand Image Linked with American Cinema.” Blog post. Impressive Magazine, 11 Aug. 2013.Osborne, Neil. “Bling in a Blue Box: How an Iconic Brand Delivers Its Promise.” Professional Beauty Magazine: Business Feature, Mar/Apr. 2015: 152–53.Phillips, Clare, and Tiffany and Company. Bejewelled by Tiffany. Connecticut: Yale UP, 2006.Purinton, Elizabeth F. “An Analysis of Consumers' Attitudes about Artificial Diamonds and Artificial Love.” Journal of Business and Behavior Sciences 24.3 (2012): 68–76.Rawlings, Nate. “All–TIME 100 Fashion Icons: Designers & Brands: Tiffany & Co.” Time, 2 Apr. 2012. Sex and the City. TV Series. Prod. Darren Star. Warner Bros. California, 1998–2004.Sheehan, Kim B. Controversies in Contemporary Advertising: Gender and Advertising. 2nd ed. New York: SAGE, 2013.Sleepless in Seattle. Dir. Nora Ephron. TriStar, 1993.Spilski, Anja, and Andrea Groeppel-Klein. “The Persistence of Fictional Character Images beyond the Program and Their Use in Celebrity Endorsem*nt: Experimental Results from a Media Context Perspective.” Advances in Consumer Research 35 (2008): 868–70.Suits. TV series. Prod. Aaron Korsh. New York: NBC Universal, 2011-2016.Sweet Home Alabama. Dir. Andy Tennant. Touchstone, 2002. The Great Gatsby. Dir. Baz Luhrmann. Village Roadshow, 2013.Tiffany & Co. “The World of Tiffany: The Tiffany Story.” T&CO, 2016.Torelli, Carlos, J. Globalization, Culture, and Branding: How to Leverage Cultural Equity for Building Iconic Brands in the Era of Globalization. London: Palgrave Macmillan, 2013.Twitchell, James B. 20 Ads That Shook the World: The Century’s Most Ground-Breaking Advertising and How It Changed Us All. New York: Three Rivers P, 2000.Vito, John D., and Frank Tropea. The Immortal Marilyn: The Depiction of an Icon. Maryland: Scarecrow P, 2006.Wasson, Sam. “How Holly Golightly Changed the World.” Harpers Bazaar, 14 Oct. 2011. Wharton, Chris. Advertising Critical Approaches. New York: Routledge, 2015.Will You. Advertisem*nt. Tiffany & Co. New York: Ogilvy & Mather, 2015.

APA, Harvard, Vancouver, ISO, and other styles

39

Burns, Alex. "Doubting the Global War on Terror." M/C Journal 14, no.1 (January24, 2011). http://dx.doi.org/10.5204/mcj.338.

Full text

Abstract:

Photograph by Gonzalo Echeverria (2010)Declaring War Soon after Al Qaeda’s terrorist attacks on 11 September 2001, the Bush Administration described its new grand strategy: the “Global War on Terror”. This underpinned the subsequent counter-insurgency in Afghanistan and the United States invasion of Iraq in March 2003. Media pundits quickly applied the Global War on Terror label to the Madrid, Bali and London bombings, to convey how Al Qaeda’s terrorism had gone transnational. Meanwhile, international relations scholars debated the extent to which September 11 had changed the international system (Brenner; Mann 303). American intellectuals adopted several variations of the Global War on Terror in what initially felt like a transitional period of US foreign policy (Burns). Walter Laqueur suggested Al Qaeda was engaged in a “cosmological” and perpetual war. Paul Berman likened Al Qaeda and militant Islam to the past ideological battles against communism and fascism (Heilbrunn 248). In a widely cited article, neoconservative thinker Norman Podhoretz suggested the United States faced “World War IV”, which had three interlocking drivers: Al Qaeda and trans-national terrorism; political Islam as the West’s existential enemy; and nuclear proliferation to ‘rogue’ countries and non-state actors (Friedman 3). Podhoretz’s tone reflected a revival of his earlier Cold War politics and critique of the New Left (Friedman 148-149; Halper and Clarke 56; Heilbrunn 210). These stances attracted widespread support. For instance, the United States Marine Corp recalibrated its mission to fight a long war against “World War IV-like” enemies. Yet these stances left the United States unprepared as the combat situations in Afghanistan and Iraq worsened (Ricks; Ferguson; Filkins). Neoconservative ideals for Iraq “regime change” to transform the Middle East failed to deal with other security problems such as Pakistan’s Musharraf regime (Dorrien 110; Halper and Clarke 210-211; Friedman 121, 223; Heilbrunn 252). The Manichean and open-ended framing became a self-fulfilling prophecy for insurgents, jihadists, and militias. The Bush Administration quietly abandoned the Global War on Terror in July 2005. Widespread support had given way to policymaker doubt. Why did so many intellectuals and strategists embrace the Global War on Terror as the best possible “grand strategy” perspective of a post-September 11 world? Why was there so little doubt of this worldview? This is a debate with roots as old as the Sceptics versus the Sophists. Explanations usually focus on the Bush Administration’s “Vulcans” war cabinet: Vice President Dick Cheney, Secretary of Defense Donald Rumsfield, and National Security Advisor Condoleezza Rice, who later became Secretary of State (Mann xv-xvi). The “Vulcans” were named after the Roman god Vulcan because Rice’s hometown Birmingham, Alabama, had “a mammoth fifty-six foot statue . . . [in] homage to the city’s steel industry” (Mann x) and the name stuck. Alternatively, explanations focus on how neoconservative thinkers shaped the intellectual climate after September 11, in a receptive media climate. Biographers suggest that “neoconservatism had become an echo chamber” (Heilbrunn 242) with its own media outlets, pundits, and think-tanks such as the American Enterprise Institute and Project for a New America. Neoconservatism briefly flourished in Washington DC until Iraq’s sectarian violence discredited the “Vulcans” and neoconservative strategists like Paul Wolfowitz (Friedman; Ferguson). The neoconservatives' combination of September 11’s aftermath with strongly argued historical analogies was initially convincing. They conferred with scholars such as Bernard Lewis, Samuel P. Huntington and Victor Davis Hanson to construct classicist historical narratives and to explain cultural differences. However, the history of the decade after September 11 also contains mis-steps and mistakes which make it a series of contingent decisions (Ferguson; Bergen). One way to analyse these contingent decisions is to pose “what if?” counterfactuals, or feasible alternatives to historical events (Lebow). For instance, what if September 11 had been a chemical and biological weapons attack? (Mann 317). Appendix 1 includes a range of alternative possibilities and “minimal rewrites” or slight variations on the historical events which occurred. Collectively, these counterfactuals suggest the role of agency, chance, luck, and the juxtaposition of better and worse outcomes. They pose challenges to the classicist interpretation adopted soon after September 11 to justify “World War IV” (Podhoretz). A ‘Two-Track’ Process for ‘World War IV’ After the September 11 attacks, I think an overlapping two-track process occurred with the “Vulcans” cabinet, neoconservative advisers, and two “echo chambers”: neoconservative think-tanks and the post-September 11 media. Crucially, Bush’s “Vulcans” war cabinet succeeded in gaining civilian control of the United States war decision process. Although successful in initiating the 2003 Iraq War this civilian control created a deeper crisis in US civil-military relations (Stevenson; Morgan). The “Vulcans” relied on “politicised” intelligence such as a United Kingdom intelligence report on Iraq’s weapons development program. The report enabled “a climate of undifferentiated fear to arise” because its public version did not distinguish between chemical, biological, radiological or nuclear weapons (Halper and Clarke, 210). The cautious 2003 National Intelligence Estimates (NIE) report on Iraq was only released in a strongly edited form. For instance, the US Department of Energy had expressed doubts about claims that Iraq had approached Niger for uranium, and was using aluminium tubes for biological and chemical weapons development. Meanwhile, the post-September 11 media had become a second “echo chamber” (Halper and Clarke 194-196) which amplified neoconservative arguments. Berman, Laqueur, Podhoretz and others who framed the intellectual climate were “risk entrepreneurs” (Mueller 41-43) that supported the “World War IV” vision. The media also engaged in aggressive “flak” campaigns (Herman and Chomsky 26-28; Mueller 39-42) designed to limit debate and to stress foreign policy stances and themes which supported the Bush Administration. When former Central Intelligence Agency director James Woolsey’s claimed that Al Qaeda had close connections to Iraqi intelligence, this was promoted in several books, including Michael Ledeen’s War Against The Terror Masters, Stephen Hayes’ The Connection, and Laurie Mylroie’s Bush v. The Beltway; and in partisan media such as Fox News, NewsMax, and The Weekly Standard who each attacked the US State Department and the CIA (Dorrien 183; Hayes; Ledeen; Mylroie; Heilbrunn 237, 243-244; Mann 310). This was the media “echo chamber” at work. The group Accuracy in Media also campaigned successfully to ensure that US cable providers did not give Al Jazeera English access to US audiences (Barker). Cosmopolitan ideals seemed incompatible with what the “flak” groups desired. The two-track process converged on two now infamous speeches. US President Bush’s State of the Union Address on 29 January 2002, and US Secretary of State Colin Powell’s presentation to the United Nations on 5 February 2003. Bush’s speech included a line from neoconservative David Frumm about North Korea, Iraq and Iran as an “Axis of Evil” (Dorrien 158; Halper and Clarke 139-140; Mann 242, 317-321). Powell’s presentation to the United Nations included now-debunked threat assessments. In fact, Powell had altered the speech’s original draft by I. Lewis “Scooter” Libby, who was Cheney’s chief of staff (Dorrien 183-184). Powell claimed that Iraq had mobile biological weapons facilities, linked to Abu Musab al-Zarqawi. However, the International Atomic Energy Agency’s (IAEA) Mohamed El-Baradei, the Defense Intelligence Agency, the State Department, and the Institute for Science and International Security all strongly doubted this claim, as did international observers (Dorrien 184; Halper and Clarke 212-213; Mann 353-354). Yet this information was suppressed: attacked by “flak” or given little visible media coverage. Powell’s agenda included trying to rebuild an international coalition and to head off weather changes that would affect military operations in the Middle East (Mann 351). Both speeches used politicised variants of “weapons of mass destruction”, taken from the counterterrorism literature (Stern; Laqueur). Bush’s speech created an inflated geopolitical threat whilst Powell relied on flawed intelligence and scientific visuals to communicate a non-existent threat (Vogel). However, they had the intended effect on decision makers. US Under-Secretary of Defense, the neoconservative Paul Wolfowitz, later revealed to Vanity Fair that “weapons of mass destruction” was selected as an issue that all potential stakeholders could agree on (Wilkie 69). Perhaps the only remaining outlet was satire: Armando Iannucci’s 2009 film In The Loop parodied the diplomatic politics surrounding Powell’s speech and the civil-military tensions on the Iraq War’s eve. In the short term the two track process worked in heading off doubt. The “Vulcans” blocked important information on pre-war Iraq intelligence from reaching the media and the general public (Prados). Alternatively, they ignored area specialists and other experts, such as when Coalition Provisional Authority’s L. Paul Bremer ignored the US State Department’s fifteen volume ‘Future of Iraq’ project (Ferguson). Public “flak” and “risk entrepreneurs” mobilised a range of motivations from grief and revenge to historical memory and identity politics. This combination of private and public processes meant that although doubts were expressed, they could be contained through the dual echo chambers of neoconservative policymaking and the post-September 11 media. These factors enabled the “Vulcans” to proceed with their “regime change” plans despite strong public opposition from anti-war protestors. Expressing DoubtsMany experts and institutions expressed doubt about specific claims the Bush Administration made to support the 2003 Iraq War. This doubt came from three different and sometimes overlapping groups. Subject matter experts such as the IAEA’s Mohamed El-Baradei and weapons development scientists countered the UK intelligence report and Powell’s UN speech. However, they did not get the media coverage warranted due to “flak” and “echo chamber” dynamics. Others could challenge misleading historical analogies between insurgent Iraq and Nazi Germany, and yet not change the broader outcomes (Benjamin). Independent journalists one group who gained new information during the 1990-91 Gulf War: some entered Iraq from Kuwait and documented a more humanitarian side of the war to journalists embedded with US military units (Uyarra). Finally, there were dissenters from bureaucratic and institutional processes. In some cases, all three overlapped. In their separate analyses of the post-September 11 debate on intelligence “failure”, Zegart and Jervis point to a range of analytic misperceptions and institutional problems. However, the intelligence community is separated from policymakers such as the “Vulcans”. Compartmentalisation due to the “need to know” principle also means that doubting analysts can be blocked from releasing information. Andrew Wilkie discovered this when he resigned from Australia’s Office for National Assessments (ONA) as a transnational issues analyst. Wilkie questioned the pre-war assessments in Powell’s United Nations speech that were used to justify the 2003 Iraq War. Wilkie was then attacked publicly by Australian Prime Minister John Howard. This overshadowed a more important fact: both Howard and Wilkie knew that due to Australian legislation, Wilkie could not publicly comment on ONA intelligence, despite the invitation to do so. This barrier also prevented other intelligence analysts from responding to the “Vulcans”, and to “flak” and “echo chamber” dynamics in the media and neoconservative think-tanks. Many analysts knew that the excerpts released from the 2003 NIE on Iraq was highly edited (Prados). For example, Australian agencies such as the ONA, the Department of Foreign Affairs and Trade, and the Department of Defence knew this (Wilkie 98). However, analysts are trained not to interfere with policymakers, even when there are significant civil-military irregularities. Military officials who spoke out about pre-war planning against the “Vulcans” and their neoconservative supporters were silenced (Ricks; Ferguson). Greenlight Capital’s hedge fund manager David Einhorn illustrates in a different context what might happen if analysts did comment. Einhorn gave a speech to the Ira Sohn Conference on 15 May 2002 debunking the management of Allied Capital. Einhorn’s “short-selling” led to retaliation from Allied Capital, a Securities and Exchange Commission investigation, and growing evidence of potential fraud. If analysts adopted Einhorn’s tactics—combining rigorous analysis with targeted, public denunciation that is widely reported—then this may have short-circuited the “flak” and “echo chamber” effects prior to the 2003 Iraq War. The intelligence community usually tries to pre-empt such outcomes via contestation exercises and similar processes. This was the goal of the 2003 NIE on Iraq, despite the fact that the US Department of Energy which had the expertise was overruled by other agencies who expressed opinions not necessarily based on rigorous scientific and technical analysis (Prados; Vogel). In counterterrorism circles, similar disinformation arose about Aum Shinrikyo’s biological weapons research after its sarin gas attack on Tokyo’s subway system on 20 March 1995 (Leitenberg). Disinformation also arose regarding nuclear weapons proliferation to non-state actors in the 1990s (Stern). Interestingly, several of the “Vulcans” and neoconservatives had been involved in an earlier controversial contestation exercise: Team B in 1976. The Central Intelligence Agency (CIA) assembled three Team B groups in order to evaluate and forecast Soviet military capabilities. One group headed by historian Richard Pipes gave highly “alarmist” forecasts and then attacked a CIA NIE about the Soviets (Dorrien 50-56; Mueller 81). The neoconservatives adopted these same tactics to reframe the 2003 NIE from its position of caution, expressed by several intelligence agencies and experts, to belief that Iraq possessed a current, covert program to develop weapons of mass destruction (Prados). Alternatively, information may be leaked to the media to express doubt. “Non-attributable” background interviews to establishment journalists like Seymour Hersh and Bob Woodward achieved this. Wikileaks publisher Julian Assange has recently achieved notoriety due to US diplomatic cables from the SIPRNet network released from 28 November 2010 onwards. Supporters have favourably compared Assange to Daniel Ellsberg, the RAND researcher who leaked the Pentagon Papers (Ellsberg; Ehrlich and Goldsmith). Whilst Elsberg succeeded because a network of US national papers continued to print excerpts from the Pentagon Papers despite lawsuit threats, Assange relied in part on favourable coverage from the UK’s Guardian newspaper. However, suspected sources such as US Army soldier Bradley Manning are not protected whilst media outlets are relatively free to publish their scoops (Walt, ‘Woodward’). Assange’s publication of SIPRNet’s diplomatic cables will also likely mean greater restrictions on diplomatic and military intelligence (Walt, ‘Don’t Write’). Beyond ‘Doubt’ Iraq’s worsening security discredited many of the factors that had given the neoconservatives credibility. The post-September 11 media became increasingly more critical of the US military in Iraq (Ferguson) and cautious about the “echo chamber” of think-tanks and media outlets. Internet sites for Al Jazeera English, Al-Arabiya and other networks have enabled people to bypass “flak” and directly access these different viewpoints. Most damagingly, the non-discovery of Iraq’s weapons of mass destruction discredited both the 2003 NIE on Iraq and Colin Powell’s United Nations presentation (Wilkie 104). Likewise, “risk entrepreneurs” who foresaw “World War IV” in 2002 and 2003 have now distanced themselves from these apocalyptic forecasts due to a series of mis-steps and mistakes by the Bush Administration and Al Qaeda’s over-calculation (Bergen). The emergence of sites such as Wikileaks, and networks like Al Jazeera English and Al-Arabiya, are a response to the politics of the past decade. They attempt to short-circuit past “echo chambers” through providing access to different sources and leaked data. The Global War on Terror framed the Bush Administration’s response to September 11 as a war (Kirk; Mueller 59). Whilst this prematurely closed off other possibilities, it has also unleashed a series of dynamics which have undermined the neoconservative agenda. The “classicist” history and historical analogies constructed to justify the “World War IV” scenario are just one of several potential frameworks. “Flak” organisations and media “echo chambers” are now challenged by well-financed and strategic alternatives such as Al Jazeera English and Al-Arabiya. Doubt is one defence against “risk entrepreneurs” who seek to promote a particular idea: doubt guards against uncritical adoption. Perhaps the enduring lesson of the post-September 11 debates, though, is that doubt alone is not enough. What is needed are individuals and institutions that understand the strategies which the neoconservatives and others have used, and who also have the soft power skills during crises to influence critical decision-makers to choose alternatives. Appendix 1: Counterfactuals Richard Ned Lebow uses “what if?” counterfactuals to examine alternative possibilities and “minimal rewrites” or slight variations on the historical events that occurred. The following counterfactuals suggest that the Bush Administration’s Global War on Terror could have evolved very differently . . . or not occurred at all. Fact: The 2003 Iraq War and 2001 Afghanistan counterinsurgency shaped the Bush Administration’s post-September 11 grand strategy. Counterfactual #1: Al Gore decisively wins the 2000 U.S. election. Bush v. Gore never occurs. After the September 11 attacks, Gore focuses on international alliance-building and gains widespread diplomatic support rather than a neoconservative agenda. He authorises Special Operations Forces in Afghanistan and works closely with the Musharraf regime in Pakistan to target Al Qaeda’s muhajideen. He ‘contains’ Saddam Hussein’s Iraq through measurement and signature, technical intelligence, and more stringent monitoring by the International Atomic Energy Agency. Minimal Rewrite: United 93 crashes in Washington DC, killing senior members of the Gore Administration. Fact: U.S. Special Operations Forces failed to kill Osama bin Laden in late November and early December 2001 at Tora Bora. Counterfactual #2: U.S. Special Operations Forces kill Osama bin Laden in early December 2001 during skirmishes at Tora Bora. Ayman al-Zawahiri is critically wounded, captured, and imprisoned. The rest of Al Qaeda is scattered. Minimal Rewrite: Osama bin Laden’s death turns him into a self-mythologised hero for decades. Fact: The UK Blair Government supplied a 50-page intelligence dossier on Iraq’s weapons development program which the Bush Administration used to support its pre-war planning. Counterfactual #3: Rogue intelligence analysts debunk the UK Blair Government’s claims through a series of ‘targeted’ leaks to establishment news sources. Minimal Rewrite: The 50-page intelligence dossier is later discovered to be correct about Iraq’s weapons development program. Fact: The Bush Administration used the 2003 National Intelligence Estimate to “build its case” for “regime change” in Saddam Hussein’s Iraq. Counterfactual #4: A joint investigation by The New York Times and The Washington Post rebuts U.S. Secretary of State Colin Powell’s speech to the United National Security Council, delivered on 5 February 2003. Minimal Rewrite: The Central Intelligence Agency’s whitepaper “Iraq’s Weapons of Mass Destruction Programs” (October 2002) more accurately reflects the 2003 NIE’s cautious assessments. Fact: The Bush Administration relied on Ahmed Chalabi for its postwar estimates about Iraq’s reconstruction. Counterfactual #5: The Bush Administration ignores Chalabi’s advice and relies instead on the U.S. State Department’s 15 volume report “The Future of Iraq”. Minimal Rewrite: The Coalition Provisional Authority appoints Ahmed Chalabi to head an interim Iraqi government. Fact: L. Paul Bremer signed orders to disband Iraq’s Army and to De-Ba’athify Iraq’s new government. Counterfactual #6: Bremer keeps Iraq’s Army intact and uses it to impose security in Baghdad to prevent looting and to thwart insurgents. Rather than a De-Ba’athification policy, Bremer uses former Baath Party members to gather situational intelligence. Minimal Rewrite: Iraq’s Army refuses to disband and the De-Ba’athification policy uncovers several conspiracies to undermine the Coalition Provisional Authority. AcknowledgmentsThanks to Stephen McGrail for advice on science and technology analysis.References Barker, Greg. “War of Ideas”. PBS Frontline. Boston, MA: 2007. ‹http://www.pbs.org/frontlineworld/stories/newswar/video1.html› Benjamin, Daniel. “Condi’s Phony History.” Slate 29 Aug. 2003. ‹http://www.slate.com/id/2087768/pagenum/all/›. Bergen, Peter L. The Longest War: The Enduring Conflict between America and Al Qaeda. New York: The Free Press, 2011. Berman, Paul. Terror and Liberalism. W.W. Norton & Company: New York, 2003. Brenner, William J. “In Search of Monsters: Realism and Progress in International Relations Theory after September 11.” Security Studies 15.3 (2006): 496-528. Burns, Alex. “The Worldflash of a Coming Future.” M/C Journal 6.2 (April 2003). ‹http://journal.media-culture.org.au/0304/08-worldflash.php›. Dorrien, Gary. Imperial Designs: Neoconservatism and the New Pax Americana. New York: Routledge, 2004. Ehrlich, Judith, and Goldsmith, Rick. The Most Dangerous Man in America: Daniel Ellsberg and the Pentagon Papers. Berkley CA: Kovno Communications, 2009. Einhorn, David. Fooling Some of the People All of the Time: A Long Short (and Now Complete) Story. Hoboken NJ: John Wiley & Sons, 2010. Ellison, Sarah. “The Man Who Spilled The Secrets.” Vanity Fair (Feb. 2011). ‹http://www.vanityfair.com/politics/features/2011/02/the-guardian-201102›. Ellsberg, Daniel. Secrets: A Memoir of Vietnam and the Pentagon Papers. New York: Viking, 2002. Ferguson, Charles. No End in Sight, New York: Representational Pictures, 2007. Filkins, Dexter. The Forever War. New York: Vintage Books, 2008. Friedman, Murray. The Neoconservative Revolution: Jewish Intellectuals and the Shaping of Public Policy. New York: Cambridge UP, 2005. Halper, Stefan, and Jonathan Clarke. America Alone: The Neo-Conservatives and the Global Order. New York: Cambridge UP, 2004. Hayes, Stephen F. The Connection: How Al Qaeda’s Collaboration with Saddam Hussein Has Endangered America. New York: HarperCollins, 2004. Heilbrunn, Jacob. They Knew They Were Right: The Rise of the Neocons. New York: Doubleday, 2008. Herman, Edward S., and Noam Chomsky. Manufacturing Consent: The Political Economy of the Mass Media. Rev. ed. New York: Pantheon Books, 2002. Iannucci, Armando. In The Loop. London: BBC Films, 2009. Jervis, Robert. Why Intelligence Fails: Lessons from the Iranian Revolution and the Iraq War. Ithaca NY: Cornell UP, 2010. Kirk, Michael. “The War behind Closed Doors.” PBS Frontline. Boston, MA: 2003. ‹http://www.pbs.org/wgbh/pages/frontline/shows/iraq/›. Laqueur, Walter. No End to War: Terrorism in the Twenty-First Century. New York: Continuum, 2003. Lebow, Richard Ned. Forbidden Fruit: Counterfactuals and International Relations. Princeton NJ: Princeton UP, 2010. Ledeen, Michael. The War against The Terror Masters. New York: St. Martin’s Griffin, 2003. Leitenberg, Milton. “Aum Shinrikyo's Efforts to Produce Biological Weapons: A Case Study in the Serial Propagation of Misinformation.” Terrorism and Political Violence 11.4 (1999): 149-158. Mann, James. Rise of the Vulcans: The History of Bush’s War Cabinet. New York: Viking Penguin, 2004. Morgan, Matthew J. The American Military after 9/11: Society, State, and Empire. New York: Palgrave Macmillan, 2008. Mueller, John. Overblown: How Politicians and the Terrorism Industry Inflate National Security Threats, and Why We Believe Them. New York: The Free Press, 2009. Mylroie, Laurie. Bush v The Beltway: The Inside Battle over War in Iraq. New York: Regan Books, 2003. Nutt, Paul C. Why Decisions Fail. San Francisco: Berrett-Koelher, 2002. Podhoretz, Norman. “How to Win World War IV”. Commentary 113.2 (2002): 19-29. Prados, John. Hoodwinked: The Documents That Reveal How Bush Sold Us a War. New York: The New Press, 2004. Ricks, Thomas. Fiasco: The American Military Adventure in Iraq. New York: The Penguin Press, 2006. Stern, Jessica. The Ultimate Terrorists. Boston, MA: Harvard UP, 2001. Stevenson, Charles A. Warriors and Politicians: US Civil-Military Relations under Stress. New York: Routledge, 2006. Walt, Stephen M. “Should Bob Woodward Be Arrested?” Foreign Policy 10 Dec. 2010. ‹http://walt.foreignpolicy.com/posts/2010/12/10/more_wikileaks_double_standards›. Walt, Stephen M. “‘Don’t Write If You Can Talk...’: The Latest from WikiLeaks.” Foreign Policy 29 Nov. 2010. ‹http://walt.foreignpolicy.com/posts/2010/11/29/dont_write_if_you_can_talk_the_latest_from_wikileaks›. Wilkie, Andrew. Axis of Deceit. Melbourne: Black Ink Books, 2003. Uyarra, Esteban Manzanares. “War Feels like War”. London: BBC, 2003. Vogel, Kathleen M. “Iraqi Winnebagos™ of Death: Imagined and Realized Futures of US Bioweapons Threat Assessments.” Science and Public Policy 35.8 (2008): 561–573. Zegart, Amy. Spying Blind: The CIA, the FBI and the Origins of 9/11. Princeton NJ: Princeton UP, 2007.

APA, Harvard, Vancouver, ISO, and other styles

40

Putri, Arridha Hutami, and Nelva Karmila Jusuf. "Plant Stem Cell sebagai Antipenuaan Kulit." Media Dermato Venereologica Indonesiana 48, no.4 (February15, 2022). http://dx.doi.org/10.33820/mdvi.v48i4.119.

Full text

Abstract:

PENDAHULUAN Stem cell sering disebut sebagai sel punca atau sel induk, bertanggung jawab atas regenerasi dan pemeliharaan jaringan serta memiliki karakteristik yang unik yaitu menghasilkan salinan dirinya dan keturunan sel yang berbeda ketika membelah.1 Stem cell yang berasal dari tumbuhan memiliki sifat membantu merangsang dan meregenerasi tanaman setelah cedera. Sifat unik plant stem cell telah menjadi bidang yang banyak diminati baru-baru ini, terutama dalam mengembangkan kosmetik baru dan mempelajari bagaimana ekstrak/phytohormone ini dapat mempengaruhi kulit. Usaha regeneratif yang dilakukan tumbuh-tumbuhan tidak hanya pada perbaikan jaringan akibat kerusakan, tetapi juga perkembangan tumbuhan yang baru.2,3Penuaan kulit merupakan suatu proses kompleks yang dipengaruhi faktor internal dan eksternal serta melibatkan seluruh lapisan epidermis dan dermis.4,5 Tujuan dari kosmetik antipenuaan modern adalah untuk memperbaiki tampilan kulit dengan menstimulasi dan meregenerasi proses fisiologis alami demi perbaikan kondisi kulit dan perlindungan dari berbagai faktor yang menyebabkan penuaan, terlepas berapapun usia sesungguhnya. Kandungan yang menarik perhatian adalah plant stem cell, telah dinyatakan memberikan efek proteksi terhadap stem cell manusia dengan cara menstimulasi regenerasi kulit dan mencegah proses penuaannya.4 Penuaan KulitPenuaan adalah proses biologis yang tak terhindarkan, kompleks dan dinamis yang ditandai dengan kemunduran progresif dari berbagai sistem pada tubuh dan penurunan kapasitas cadangan fisiologis.5 Kulit manusia mengalami dua jenis penuaan yaitu penuaan intrinsik dan ekstrinsik. Penuaan intrinsik mencakup serangkaian perubahan fisiologis bertahap yang merupakan konsekuensi dari waktu ke waktu dan dipengaruhi genetik dan hormonal. Penuaan ekstrinsik merupakan perubahan struktural dan fungsional yang disebabkan oleh faktor eksogen, terutama paparan sinar matahari (disebut juga photoaging), alkohol, merokok, malnutrisi dan lingkungan yang merugikan, namun dalam kondisi tertentu masih dapat dihindari.5-7Proses penuaan kulit intrinsik ditandai dengan adanya proses penuaan seluler, penurunan kapasitas proliferasi, penurunan kemampuan perbaikan deoxyribonucleic acid (DNA), stres oksidatif dan mutasi gen.8 Fungsi sawar kulit terganggu akibat perubahan struktur filamen keratin dan penurunan filagrin.Dalam hormonal, hormon seks terutama estrogen mempengaruhi sintesis kolagen, asam hialuronat, elastin dan komponen lain dari matriks ekstraseluler. Bersama-sama, ketiga komponen ini memberikan tampilan kulit yang sehat dan muda.Perubahan biokimia yang terjadi pada kolagen, elastin dan komponen dasar kulit menyebabkan penuaan kulit.5,9 Umumnya terjadi pada area kulit yang terlindungi dari paparan sinar matahari dengan klinis yang relatif lebih ringan, ditandai dengan tampilan kulit kering, pucat dan kendur dengan kerutan halus dan atau berbagai bentuk neoplasma jinak.10Sumber terbesar penuaan ekstrinsik adalah akumulasi dan paparan sinar matahari pada area yang tidak terlindungi seperti wajah, leher, dada dan lengan ekstensor. Faktor lain yang berpengaruh adalah merokok, terbukti kadar matrix metalloproteinase-1 (MMP-1) lebih tinggi pada perokok.5,6 Diet nutrisi seimbang memperlambat penuaan dengan menyediakan nutrisi, air dan oksigen yang diperlukan sel dalam pembelahan, mengirimkan informasi dan memperbaiki kerusakan.5 Photoaging atau penuaan kulit dini merupakan istilah yang digunakan untuk menggambarkan klinis dan histologi akibat paparan sinar matahari kronis.5-7,11 Peningkatan kerusakan dan penurunan produksi kolagen adalah landasan dari photoaging, ditandai dengan penampilan kulit yang kasar, kerutan, warna kulit menjadi pudar, telangiektasis, pigmentasi tidak merata, dan berbagai lesi jinak, premaligna dan neoplasma ganas.5,9-11 Stres oksidatif dan penuaanSalah satu teori penuaan melibatkan proses penuaan seluler atau apoptosis sekunder adalah stres oksidatif. Stres oksidatif merupakan kondisi ketidakseimbangan antara reactive oxygen species (ROS) dengan mekanisme antioksidan. Pertahanan antioksidan sistem enzimatik dan non-enzimatik pada kulit cenderung melemah seiring bertambahnya usia.5,10 Kerusakan oksidatif menyebabkan peningkatan pembentukan faktor-faktor yang berhubungan dengan stres, kemudian memicu proses penuaan intrinsik. Misalnya, hypoxia-inducible factor dan nuclear factor ĸB menginduksi ekspresi sitokin interleukin 1, interleukin 6, vascular endothelial growth factor (VEGF) dan tumor necrosis factor α (TNFα), yang telah terbukti merupakan regulator proinflamasi dan modulator penghancuran MMP. Selain itu, kerusakan oksidatif terhadap protein seluler bersamaan dengan penurunan aktivitas proteasom sejalan usia membentuk akumulasi kerusakan protein yang dapat mengganggu fungsi seluler normal.5Stres oksidatif juga mampu memodifikasi telomer yang awalnya bertahan terhadap degradasi, fusi atau rekombinasi abnormal.3,5 Pemendekan telomer adalah hasil dari ketidakmampuan DNA polimerase untuk mereplikasi pasangan basa akhir kromosom. Ketika mencapai ambang "sangat pendek", sel akan mengalami penuaan proliferatif atau apoptosis. Mekanisme umum penuaan intrinsik dan photoaging disebabkan oleh gangguan struktur siklus putaran normal pada akhir telomer. Pemaparan ini kemudian mengaktifkan pensinyalan p53 yang mengarah pada peristiwa penuaan proliferatif dan apoptosis.5Penuaan kulit merupakan proses kompleks yang melibatkan seluruh lapisan epidermis dan dermis, mencakup denaturasi protein dan penurunan fungsi regeneratif stem cell.3 Penurunan fungsi stem cell epidermis telah diamati berhubungan dengan telomer yang lebih pendek, yang mengurangi potensi proliferatif sebagai respon terhadap paparan UV.5 Plant Stem CellKarakteristik plant stem cellSalah satu teori Weismann mengenai penuaan menjelaskan bagaimana organisme multiselular menua melalui germ line yang imortal dengan akumulasi kerusakan lebih didistribusikan pada sel somatik. Tumbuhan tidak secara jelas memisahkan mana germ line dan sel somatik, sehingga menjadi pertanyaan apakah teori penuaan berlaku untuk tumbuh-tumbuhan. Plant stem cell memiliki tampilan seperti germ line, sem*ntara jaringan tumbuhan yang mati pada saat musiman, seperti daun dan xilem, memiliki sifat seperti sel somatik. Bagaimana sebuah tumbuhan dapat mencapai usia yang ekstrem, plant stem cell mungkin memegang kunci dalam hal ini karena tumbuhan memiliki pasokan stem cell terus menerus.12Stem cell dipertahankan secara terus menerus melalui mekanisme pembaruan diri yang terjadi di dalam niches stem cell atau dediferensiasi struktur dewasa. Sel-sel ini memunculkan organ baru sehingga memungkinkan bertahan dalam kondisi ekstrem. Sebuah studi mengenai model embriogenesis somatik menunjukkan sistem yang menarik yaitu regenerasi tanaman dari protoplas mesofil sebagai jenis sel yang terpapar dan berkemungkinan dapat mengakumulasi kerusakan lalu berdediferensiasi menjadi sel pluripoten. Contoh model protoplas dari sel-sel mesofil yaitu Arabidopsis, dapat diinduksi dengan menambahkan phytohormones cytokinin dan auksin. Akar dan pucuknya dapat beregenerasi dari callus untuk menghasilkan tanaman dewasa dan memungkinkan untuk digunakan dalam perangkat molekuler genetik yang tersedia. 12Plant stem cell dikelompokkan menjadi niches yang disebut meristem, terdiri atas primer dan sekunder. Meristem primer adalah meristem apikal (pucuk pertumbuhan batang dan akar), meristem interkalari (sisipan) dan meristem germ. Meristem sekunder adalah bagian lateral yaitu kambium (smear) dan phellogen serta bagian traumatik (callus). Pada meristem apikal pucuk batang, proliferasi dan diferensiasi plant stem cell dikendalikan oleh banyak faktor, termasuk proses siklus putaran reversibel negatif antara produk ekspresi gen, yaitu protein WUSCHEL (WUS) dan CLAVATA3 (CLV3). Protein WUS disekresi oleh sel-sel pusat organisasi dan merupakan sinyal untuk proliferasi stem cell, sedangkan protein CLV3 disekresikan oleh stem cell dan terbatas pada area  WUS. Kelebihan stem cell menyebabkan CLV3 berlebihan dan merangsang pengurangan sekresi WUS sehingga sinyal proliferasi menurun. Namun, jika jumlah stem cell terlalu rendah (defisit CLV3), maka WUS akan meningkatkan jumlah stem cell.2,13Meristem traumatik (callus) muncul pada bagian tumbuhan yang terlukai, paling sering berdiferensiasi menjadi kambium. Fenomena penciptaan callus pertama kali dijelaskan oleh ahli botani Austria, Gottlieb Heberlandt pada tahun 1902. Dia menyatakan bahwa sel tumbuhan mampu meregenerasi seluruh tanaman dan percobaan pada tahun 1958, wortel berhasil dikloning dari sel wortel yang dibudidayakan secara in vitro. Proses pembuatan callus adalah satu tahap embriogenesis sel-sel somatik (pembentukan zigot tanpa pembuahan) atau disebut juga tumbuhan mengalami dediferensiasi menjadi stem cell yang mampu menghasilkan jaringan baru atau bahkan seluruh organ. Penelitian menunjukkan bahwa sitokin bertanggung jawab dalam memproduksi batang dari callus, sedangkan auksin bertanggung jawab memproduksi akar.2,13 Contoh lain adalah pada pucuk akar Arabidopsis sp., bagian pusatnya tidak aktif bermitosis namun dikelilingi oleh stem cell yang membentuk bagian distal, lateral serta bagian sel akar proksimal.12Kemampuan diferensiasi plant stem cell untuk dediferensiasi kembali menjadi status pluripotensial saat ini banyak dimanfaatkan untuk menghilangkan gejala penuaan kulit pada manusia dalam bentuk sediaan perawatan kulit atau prosedur kosmetik. Teknologi kultur plant stem cellTeknologi kultur sel tumbuhan memastikan pertumbuhan sel tumbuhan, jaringan atau organ dalam lingkungan dengan nutrisi yang bebas mikroba dan memungkinkan untuk sintesis zat aktif biologis. Kultur ini memungkinkan akses dengan material bebas polusi, mikroorganisme atau toksin, mampu di setiap musim, dengan kandungan zat aktif yang hampir sama di setiap bagian.4 Teknik kultur sel tumbuhan dengan metode perbanyakan plant stem cell bertujuan mendapatkan metabolit tumbuhan.3 Dasar biologis di dalam semua tumbuhan adalah reservoir stem cell yang pluripoten dan sel-sel dengan kemampuan berdediferensiasi (pluripoten). Dengan nutrisi yang tepat, callus dapat tumbuh dalam kultur dan dengan menggunakan stimulasi hormon yang tepat, mungkin dapat menstimulasi regenerasi tumbuhan dewasa (disebut sebagai teknik reproduksi mikro).4,13Langkah pertama adalah memilih bahan tumbuhan yang tepat (buah, daun atau akar). Selanjutnya jaringan tumbuhan disterilisasi dan direduksi menjadi fragmen mikroskopis (disebut "eksplan"). Eksplan ditempatkan pada cawan petri beserta nutrisi solid. Kultur dibuat dalam kondisi gelap (tidak berfotosintesis) dan disuplai oleh zat sumber karbon dan energi organik (seperti sakarosa), phytohormone (auksin dan sitokin), vitamin serta unsur mikro dan makro. Kemudian dipilih turunan sel dengan karakteristik biokimia dan metabolisme terbaik (produktif dalam waktu pembelahan terpendek), stabil dan seragam.Selanjutnya pembesaran volume biomassa yang disebut "scaling". Kultur suspense beradaptasi secara bertahap dimulai dari tabung (volume 200 mL) hingga dalam bioreaktor (volume 100 L). Proses fermentasi dipantau dengan pengukuran kadar gula, konduktivitas, tingkat pH, densitas optik, vitalitas sel dan isi metabolit sekunder seperti, asam ursolat.3,4,14Tahap akhir dari fermentasi adalah pengolahan biomassa yang diawali dengan pencampuran konten kultur dalam suspense, yang terdiri atas liposom, phenoxyethanol (pengawet) dan antioksidan (asam askorbat atau tokoferol). Selanjutnya, dilakukan hom*ogenisasi tekanan tinggi, di mana dinding stem cell dihancurkan, komponen yang dimasukkan dilepaskan secara bersamaan komponen lipofilik ditutup di dalam liposom (lecithin), sedangkan komponen hidrofilik dilarutkan dalam fase air. Produk yang diperoleh adalah likuid berwarna kekuningan dan amber. Solusio ini berasal dari perusahaan Swiss Mibelle AG Biochemistry dan menamakan teknologi mereka PhytoCellTecTM (PCT).3,4,14,15   Plant stem cell versus ekstrak plant stem cellTerminologi merupakan hal yang sangat penting dalam hal penegasan cosmeceutical, yaitu pemahaman bahwa ketika istilah “plant stem cell” digunakan sebagai komposisi, sebenarnya mengacu pada ekstrak dari plant stem cell. Banyak perusahaan perawatan kulit mempromosikan produk mereka dengan mengklaim memanfaatkan teknologi stem cell.Ekstrak dari plant stem cell tidak dapat bertindak dengan cara yang sama seperti stem cell yang hidup.3 Menggabungkan ekstrak plant stem cell di dalam zat pembawa yang dapat membantu sel menembus hingga ke dalam kulit untuk memberikan manfaat kosmetik yang sebenarnya memerlukan teknologi yang tepat untuk mendapatkan potensi yang melekat dalam sediaan perawatan kulit.3,14Dengan pengaturan sedemikian rupa, kultur sel tumbuhan terdediferensiasi dapat mewarisi beberapa modifikasi epigenetik yaitu karakteristik biosintesis dan pertumbuhan jaringan yang sangat heterogen. Fakta ini memungkinkan untuk menghasilkan turunan sel tumbuhan dengan jumlah hampir tak terbatas dengan sifat phytochemical yang unik dan karakteristik tumbuh yang hampir sama dengan yang digunakan untuk inisiasi. Istilah “plant stem cell” dalam komposisi kosmetik sebenarnya mengacu pada kultur callus atau suspensi sel yang didapatkan dari ekstrak kultur sel tumbuhan yang berdediferensiasi ditambah solusio berteknologi tinggi yang mampu mempertahankan potensinya.14 1. 2. Ekstrak Plant Stem Cell sebagai Antipenuaan KulitEkstrak plant stem cell sebagai terapi regeneratif kulit Ekstrak terbaik dapat diperoleh dari plant stem cell yang biji atau buahnya mampu mempertahankan kesegaran dan reproduksibilitas dalam jangka waktu yang lama. Faktor penting yang harus dipertimbangkan selama pemilihan tanaman adalah habitatnya dalam kondisi lingkungan yang sulit atau kemampuannya untuk "menyembuhkan" tanaman lainnya.5 Pelopor dalam memproduksi plant stem cell untuk industri kosmetik adalah Mibelle AG Biochemistry company (Swiss), yang mengimplementasikan stem cell buah apel (PhytoCellTecTM Malus Domestica) dan dipublikasi pada tahun 2008. Pada studi klinis menggunakan krim PhytoCellTecTM Malus Domestica 2% selama 4 minggu, kerutan pada wajah berkurang.3 Sejak saat itu, Mibelle AG Biochemistry telah memperkenalkan ekstrak dari plant stem cell Vitis vinifera (PhytoCellTecTM Solar Vitis), Saponaria pumila (PhytoCellTecTM nunatak®) atau Argania spinosa (PhytoCellTecTM Argan) di pasar dalam bentuk suspensi yang memberikan efek antikerut serta meningkatkan aktivitas stem cell epidermis.21 Selain itu, terdapat bukti yang menunjukkan auksin tanaman memiliki efek regulasi terhadap panjang telomer.4Penting diketahui bahwa plant stem cell sangat sensitif terhadap faktor eksternal, seperti cahaya atau suhu. Dalam produk kosmetik, agar mereka dapat bertahan maka digunakan dalam bentuk ekstrak yang larut dalam lipid (diekstraksi dengan minyak) dan larut dalam air (diekstraksi dengan gliserol), ekstrak bubuk (dengan maltodekstrin), liposom, nanoemulsi atau suspensi.4,14 Aktivitas antioksidan dari ekstrak plant stem cellSeperti yang telah disebutkan di atas, radikal bebas dianggap sebagai senyawa aktif yang paling berperan dalam proses penuaan kulit. Ia merusak DNA dan membantu dehidrogenasi, hidroksilasi dan glikasi protein selain merusak lipid di stratum korneum. Akibatnya, kulit kehilangan elastisitas dan kapasitas dalam mengatur transepidermal water loss (TEWL) serta replikasi sel kurang efisien. Oleh karena itu, antioksidan adalah bahan baku penting dalam cosmeceutical.4 Ekstrak dari plant stem cell merupakan sumber senyawa antioksidan yang sangat baik, seperti polifenol, asam phenolic, flavonoid, triterpenes, karotenoid, stilbenes, steroidal saponin dan peptide.14Goutzourelas et al. mempelajari efek antioksidan senyawa phenolic dari ekstrak stem cell anggur (Vitis vinifera) pada sel endotel dan otot.Terapi ekstrak stem cell anggur konsentrasi rendah mampu meningkatkan status redoks sel. Trans-resveratrol, asam gallic, (+)-catechin, asam ferullic, asam caffeic, quercetin, asam coumaric dan kaempferol merupakan bahan utama aktivitas antioksidan dari ekstrak stem cell anggur. Sumber lain yang kaya senyawa phenylpropanoid, terutama isoverbascoside adalah ekstrak kultur sel daun Syringa Vulgaris.4,14 Tito juga melaporkan bahwa ekstrak stem cell tomat memiliki kandungan asam rutin, coumaric, protocatechuic dan chlorogenic yang lebih tinggi dari pada buah tomat dan memiliki kemampuan antioksidan lebih tinggi. Aktivitas antioksidan yang tinggi dari ekstrak stem cell raspberry juga telah dilaporkan oleh Barbulova dan rekannya. Selain senyawa polyphenolic, ditemukan juga banyak kandungan asam ferulic dan quercitin ramnoside.4Studi Bazylak dan Gryn membandingkan beberapa ekstrak plant stem cell dalam total konten polyphenolic dan scavenging radikal diphenyl picrylhydrazin (DPPH) pada ekstrak stem cell paper mulberry (Brussonetia kazinoki), anggur (Vitis vinifer), magnolsi (Magnolia sieboldii), teh hijau (Camelia sinensis), ginseng putih (Panax ginsgen) dan ginseng hidroponik. Hasilnya menunjukkan semua ekstrak memiliki aktivitas antioksidan serta yang paling tinggi dan efektif adalah teh hijau dan ginseng putih.3,17 KinetinSalah satu agen terpenting yang memberikan sifat antipenuaan pada ekstrak plant stem cell adalah kinetin (N6-furfuryladenine), suatu phytohormone cytokinin. Kinetin merupakan salah satu basa purin asam nukleat turunan adenin.18,19 Kinetin terbentuk secara alami dalam plant stem cell, misalnya, pohon pinus Australia (Casuarina equisetifolia) atau gingergrass (Cymbopogon martinii var. Motia). Konsentrasi kinetin yang sangat tinggi ditemukan dalam stem cell lemon (Citrus limon) dan raspberry (Rubus chamaemorus).4Kinetin dianggap sebagai antioksidan alami terkuat. Ia terlibat dalam induksi sintesis enzim regeneratif dan membentuk senyawa kompleks dengan ion tembaga (II) dan mengaktifkan superoksida dismutase. Kinetin juga melindungi DNA sel dengan menghambat pembentukan 8-oxo-dG, penanda kerusakan oksidatif yang terbentuk dari reaksi Fenton.18-21Faktor pertumbuhan alami ini adalah agen yang tepat untuk merangsang stem cell kulit. Menurut penelitian, ia memperbaiki fungsi sawar pada lapisan spinosum epidermis, merangsang keratinosit, menurunkan TEWL, yang memperbaiki pigmentasi dan mengurangi kerutan permukaan. Efek antipenuaan dari kinetin juga telah terbukti bermanfaat pada sel-sel endotel kulit yaitu dengan cara mengaktifkan proliferasi sel, menghambat penuaan sel dan menstimulasi zat-zat substansi proliferasi dan metaboliknya.4,20,21 SIMPULANTumbuhan memiliki umur panjang karena stem cell-nya mampu berdediferensiasi menjadi pluripoten dan dapat dimanfaatkan guna menghambat penuaan kulit manusia. Penggunaan plant stem cell memerlukan teknologi yang tepat agar mendapatkan potensi yang diharapkan dalam sediaan perawatan kulit. Ekstrak dari plant stem cell merupakan sumber senyawa antioksidan yang sangat baik seperti polifenol, asam phenolic, flavonoid, triterpenes, karotenoid, stilbenes, steroidal saponin dan peptida. Efek yang ditimbulkan adalah stimulasi fibroblas, perbaikan epidermis, perbaikan DNA sel serta melindungi kulit dari paparan sinar UV dan stres oksidatif sebagai antioksidan. Dibutuhkan penelitian lanjutan untuk menilai efektifitas dan keamanan ekstrak plant stem cell sebagai antipenuaan kulit. DAFTAR PUSTAKASlack JMW. What is a Stem Cell?. Dalam: The Science of Stem Cells. United States: John Wiley & Sons;2018.h.1-11.Fehér A. Somatic embryogenesis—stress-induced remodeling of plant cell fate. BBA-Gene Regulatory Mechanisms. 2015;1849(4):385-402.Trehan S, Michniak-Kohn B, Beri K. Plant stem cells in cosmetics: Current trends and future directions. FSOA. 2017;3(4):FS0026.Miastkowska M, Sikora E. Anti-Aging Properties Of Plant Stem Cell Extracts. MDPI Journal Cosmetics. 2018:5(55):1-8.Kerns ML, Chien AL, Kang Sewon. Skin Aging. Dalam: Kang S, Amagai M, Bruckner AL, Enk AH, Margolis DJ, McMichael AJ, dkk, penyunting. Fitzpatrick’s Dermatology in General Medicine. Edisi ke-9. New York: McGraw Hill. 2019.h.1779-91Baumann L, Saghari S. Photoaging. Dalam: Baumann L, Saghari S, Edmund W, penyunting. Cosmetic Dermatology. Edisi ke-2. New York: Mc Graw Hill; 2009.h.34-41.Jusuf NK. Broccoli flower extract (Brassica oleracea L. var.italica plenck) inhibits photoaging by increasing type I procollagen expression in human skin fibroblast. Int J PharmTech Res. 2016;9(3):114–8.Assaf H, Adly M, Hussein M. Aging and intrinsic aging; pathogenesis and manifestations. Dalam: Farage MA, Miller KW, Maibach HI, penyunting. Textbook of Aging Skin. Berlin: Springer; 2010:130-318.Poon F, Kang S, Chien AL. Mechanisms and treatments of photoaging. PPP. 2015;31(2):65-74.Rinnerthaler M, Bischof J, Streubel MK, Trost A, Richter K. Oxidative stress in aging human skin. Biomolecules. 2015;5(2):545-89.Singh J, Chopra D, Dwivedi A, Ray RS. Photoaging. Dalam: Photocarcinogenesis & Photoprotection. Singapore: Springer; 2018.h.65-75.Dijkwel PP, Lai AG, Hypothesis: Plant stem cell hold the key to extreme longevity. TMA. 2019;3:14-6.Moru´s M, Baran M, Rost-Roszkowska M, Skotnicka-Graca U. Plant stem cells as innovation in cosmetics. Acta Poloniae Pharmaceutica. 2014;71(5):701-7.Georgiev V, Slavov A, Vasileva I, Pavlov A. Plant cell culture as emerging technology for production of active cosmetic ingredients. EngLifeSci. 2018;18(11):779-98.Pavlović M, Radotić K. Cultured Plant Stem Cells as a Source of Plant Natural Products. Dalam: Animal and Plant Stem Cells. Cham: Springer;2017.h.211-216.Goutzourelas N, Stagos D, Spanidis Y, Liosi M, Apostolou A, Priftis A, et al. Polyphenolic composition of grape stem extracts affects antioxidant activity in endothelial and muscle cells. Mol. Med. Rep. 2015;12: 5846–56.Bazylak G, Gryn A. Antioxidant activity and total flavonoid content in variable phyto-stem cells extracts obtained by high-pressure hom*ogenization method and assigned for use in biocosmetics. PlantaMed. 2015; 81(16):PW_211.An S, Cha HJ, Ko JM, Han H, Kim SY, Kim KS, et al. Kinetin improves barrier function of the skin by modulating keratinocyte differentiation markers. Ann Dermatol.2017;29:6–12.Voller J, Maková B, Kadlecová A, Gonzalez G, Strnad M. Plant hormone cytokinins for modulating human aging and age-related diseases. Dalam: Hormones in Ageing and Longevity. Cham: Springer; 2017.h.311-335.Kadlecova A, Makova B, Artal-Sanz M, Strnad M, Voller J. The plant hormone kinetin in disease therapy and healthy aging. Ageing research reviews. 2019;55:100958.Jabłońska-Trypuć A, Matejczyk M, Czerpak R. N6-benzyladenine and kinetin influence antioxidative stress parameters in human skin fibroblasts. Molecular and cellular biochemistry. 2016;413(1-2):97-107.

APA, Harvard, Vancouver, ISO, and other styles

41

Burns, Alex. "Select Issues with New Media Theories of Citizen Journalism." M/C Journal 10, no.6 (April1, 2008). http://dx.doi.org/10.5204/mcj.2723.

Full text

Abstract:

“Journalists have to begin a new type of journalism, sometimes being the guide on the side of the civic conversation as well as the filter and gatekeeper.” (Kolodzy 218) “In many respects, citizen journalism is simply public journalism removed from the journalism profession.” (Barlow 181) 1. Citizen Journalism — The Latest Innovation? New Media theorists such as Dan Gillmor, Henry Jenkins, Jay Rosen and Jeff Howe have recently touted Citizen Journalism (CJ) as the latest innovation in 21st century journalism. “Participatory journalism” and “user-driven journalism” are other terms to describe CJ, which its proponents argue is a disruptive innovation (Christensen) to the agenda-setting media institutions, news values and “objective” reportage. In this essay I offer a “contrarian” view, informed by two perspectives: (1) a three-stage model of theory-building (Carlile & Christensen) to evaluate the claims made about CJ; and (2) self-reflexive research insights (Etherington) from editing the US-based news site Disinformation between November 1999 and February 2008. New media theories can potentially create “cognitive dissonance” (Festinger) when their explanations of CJ practices are compared with what actually happens (Feyerabend). First I summarise Carlile & Christensen’s model and the dangers of “bad theory” (Ghoshal). Next I consider several problems in new media theories about CJ: the notion of ‘citizen’, new media populism, parallels in event-driven and civic journalism, and mergers and acquisitions. Two ‘self-reflexive’ issues are considered: ‘pro-ams’ or ‘professional amateurs’ as a challenge to professional journalists, and CJ’s deployment in new media operations and production environments. Finally, some exploratory questions are offered for future researchers. 2. An Evaluative Framework for New Media Theories on Citizen Journalism Paul Carlile and Clayton M. Christensen’s model offers one framework with which to evaluate new media theories on CJ. This framework is used below to highlight select issues and gaps in CJ’s current frameworks and theories. Carlile & Christensen suggest that robust theory-building emerges via three stages: Descriptive, Categorisation and Normative (Carlile & Christensen). There are three sub-stages in Descriptive theory-building; namely, the observation of phenomena, inductive classification into schemas and taxonomies, and correlative relationships to develop models (Carlile & Christensen 2-5). Once causation is established, Normative theory evolves through deductive logic which is subject to Kuhnian paradigm shifts and Popperian falsifiability (Carlile & Christensen 6). Its proponents situate CJ as a Categorisation or new journalism agenda that poses a Normative challenged and Kuhnian paradigm shift to traditional journalism. Existing CJ theories jump from the Descriptive phase of observations like “smart mobs” in Japanese youth subcultures (Rheingold) to make broad claims for Categorisation such as that IndyMedia, blogs and wiki publishing systems as new media alternatives to traditional media. CJ theories then underpin normative beliefs, values and worldviews. Correlative relationships are also used to differentiate CJ from the demand side of microeconomic analysis, from the top-down editorial models of traditional media outlets, and to adopt a vanguard stance. To support this, CJ proponents cite research on emergent collective behaviour such as the “wisdom of crowds” hypothesis (Surowiecki) or peer-to-peer network “swarms” (Pesce) to provide scientific justification for their Normative theories. However, further evaluative research is needed for three reasons: the emergent collective behaviour hypothesis may not actually inform CJ practices, existing theories may have “correlation not cause” errors, and the link may be due to citation network effects between CJ theorists. Collectively, this research base also frames CJ as an “ought to” Categorisation and then proceeds to Normative theory-building (Carlile & Christensen 7). However, I argue below that this Categorisation may be premature: its observations and correlative relationships might reinforce a ‘weak’ Normative theory with limited generalisation. CJ proponents seem to imply that it can be applied anywhere and under any condition—a “statement of causality” that almost makes it a fad (Carlile & Christensen 8). CJ that relies on Classification and Normative claims will be problematic without a strong grounding in Descriptive observation. To understand what’s potentially at stake for CJ’s future consider the consider the parallel debate about curricula renewal for the Masters of Business Administration in the wake of high-profile corporate collapses such as Enron, Worldcom, HIH and OneTel. The MBA evolved as a sociological and institutional construct to justify management as a profession that is codified, differentiated and has entry barriers (Khurana). This process might partly explain the pushback that some media professionals have to CJ as one alternative. MBA programs faced criticism if they had student cohorts with little business know-how or experiential learning (Mintzberg). Enron’s collapse illustrated the ethical dilemmas and unintended consequences that occurred when “bad theories” were implemented (Ghoshal). Professional journalists are aware of this: MBA-educated managers challenged the “craft” tradition in the early 1980s (Underwood). This meant that journalism’s ‘self-image’ (Morgan; Smith) is intertwined with managerial anxieties about media conglomerates in highly competitive markets. Ironically, as noted below, Citizen Journalists who adopt a vanguard position vis-a-vis media professionals step into a more complex game with other players. However, current theories have a naïve idealism about CJ’s promise of normative social change in the face of Machiavellian agency in business, the media and politics. 3. Citizen Who? Who is the “citizen” in CJ? What is their self-awareness as a political agent? CJ proponents who use the ‘self-image’ of ‘citizen’ draw on observations from the participatory vision of open source software, peer-to-peer networks, and case studies such as Howard Dean’s 2004 bid for the Democrat Party nominee in the US Presidential election campaign (Trippi). Recent theorists note Alexander Hamilton’s tradition of civic activism (Barlow 178) which links contemporary bloggers with the Federalist Papers and early newspaper pamphlets. One unsurfaced assumption in these observations and correlations is that most bloggers will adopt a coherent political philosophy as informed citizens: a variation on Lockean utilitarianism, Rawlsian liberalism or Nader consumer activism. To date there is little discussion about how political philosophy could deepen CJ’s ‘self-image’: how to critically evaluate sources, audit and investigation processes, or strategies to deal with elites, deterrence and power. For example, although bloggers kept Valerie Plame’s ‘outing’ as a covert intelligence operative highly visible in the issues-attention cycle, it was agenda-setting media like The New York Times who the Bush Administration targeted to silence (Pearlstine). To be viable, CJ needs to evolve beyond a new media populism, perhaps into a constructivist model of agency, norms and social change (Finnemore). 4. Citizen Journalism as New Media Populism Several “precursor trends” foreshadowed CJ notably the mid-1990s interest in “cool-hunting” by new media analysts and subculture marketeers (Gibson; Gladwell). Whilst this audience focus waned with the 1995-2000 dotcom bubble it resurfaced in CJ and publisher Tim O’Reilly’s Web 2.0 vision. Thus, CJ might be viewed as new media populism that has flourished with the Web 2.0 boom. Yet if the boom becomes a macroeconomic bubble (Gross; Spar) then CJ could be written off as a “silver bullet” that ultimately failed to deliver on its promises (Brooks, Jr.). The reputations of uncritical proponents who adopted a “true believer” stance would also be damaged (Hoffer). This risk is evident if CJ is compared with a parallel trend that shares its audience focus and populist view: day traders and technical analysts who speculate on financial markets. This parallel trend provides an alternative discipline in which the populism surfaced in an earlier form (Carlile & Christensen 12). Fidelity’s Peter Lynch argues that stock pickers can use their Main Street knowledge to beat Wall Street by exploiting information asymmetries (Lynch & Rothchild). Yet Lynch’s examples came from the mid-1970s to early 1980s when indexed mutual fund strategies worked, before deregulation and macroeconomic volatility. A change in the Web 2.0 boom might similarly trigger a reconsideration of Citizen Journalism. Hedge fund maven Victor Niederhoffer contends that investors who rely on technical analysis are practicing a Comtean religion (Niederhoffer & Kenner 72-74) instead of Efficient Market Hypothesis traders who use statistical arbitrage to deal with ‘random walks’ or Behavioural Finance experts who build on Amos Tversky and Daniel Kahneman’s Prospect Theory (Kahneman & Tversky). Niederhoffer’s deeper point is that technical analysts’ belief that the “trend is your friend” is no match for the other schools, despite a mini-publishing industry and computer trading systems. There are also ontological and epistemological differences between the schools. Similarly, CJ proponents who adopt a ‘Professional Amateur’ or ‘Pro-Am’ stance (Leadbeater & Miller) may face a similar gulf when making comparisons with professional journalists and the production environments in media organisations. CJ also thrives as new media populism because of institutional vested interests. When media conglomerates cut back on cadetships and internships CJ might fill the market demand as one alternative. New media programs at New York University and others can use CJ to differentiate themselves from “hyperlocal” competitors (Christensen; Slywotzky; Christensen, Curtis & Horn). This transforms CJ from new media populism to new media institution. 5. Parallels: Event-driven & Civic Journalism For new media programs, CJ builds on two earlier traditions: the Event-driven journalism of crises like the 1991 Gulf War (Wark) and the Civic Journalism school that emerged in the 1960s social upheavals. Civic Journalism’s awareness of minorities and social issues provides the character ethic and political philosophy for many Citizen Journalists. Jay Rosen and others suggest that CJ is the next-generation heir to Civic Journalism, tracing a thread from the 1968 Chicago Democratic Convention to IndyMedia’s coverage of the 1999 “Battle in Seattle” (Rosen). Rosen’s observation could yield an interesting historiography or genealogy. Events such as the Southeast Asian tsunami on 26 December 2004 or Al Qaeda’s London bombings on 7 July 2005 are cited as examples of CJ as event-driven journalism and “pro-am collaboration” (Kolodzy 229-230). Having covered these events and Al Qaeda’s attacks on 11th September 2001, I have a slightly different view: this was more a variation on “first responder” status and handicam video footage that journalists have sourced for the past three decades when covering major disasters. This different view means that the “salience of categories” used to justify CJ and “pro-am collaboration” these events does not completely hold. Furthermore, when Citizen Journalism proponents tout Flickr and Wikipedia as models of real-time media they are building on a broader phenomenon that includes CNN’s Gulf War coverage and Bloomberg’s dominance of financial news (Loomis). 6. The Mergers & Acquisitions Scenario CJ proponents often express anxieties about the resilience of their outlets in the face of predatory venture capital firms who initiate Mergers & Acquisitions (M&A) activities. Ironically, these venture capital firms have core competencies and expertise in the event-driven infrastructure and real-time media that CJ aspires to. Sequoia Capital and other venture capital firms have evaluative frameworks that likely surpass Carlile & Christensen in sophistication, and they exploit parallels, information asymmetries and market populism. Furthermore, although venture capital firms such as Union Street Ventures have funded Web 2.0 firms, they are absent from the explanations of some theorists, whose examples of Citizen Journalism and Web 2.0 success may be the result of survivorship bias. Thus, the venture capital market remains an untapped data source for researchers who want to evaluate the impact of CJ outlets and institutions. The M&A scenario further problematises CJ in several ways. First, CJ is framed as “oppositional” to traditional media, yet this may be used as a stratagem in a game theory framework with multiple stakeholders. Drexel Burnham Lambert’s financier Michael Milken used market populism to sell ‘high-yield’ or ‘junk’ bonds to investors whilst disrupting the Wall Street establishment in the late 1980s (Curtis) and CJ could fulfil a similar tactical purpose. Second, the M&A goal of some Web 2.0 firms could undermine the participatory goals of a site’s community if post-merger integration fails. Jason Calacanis’s sale of Weblogs, Inc to America Online in 2005 and MSNBC’s acquisition of Newsvine on 5 October 2007 (Newsvine) might be success stories. However, this raises issues of digital “property rights” if you contribute to a community that is then sold in an M&A transaction—an outcome closer to business process outsourcing. Third, media “buzz” can create an unrealistic vision when a CJ site fails to grow beyond its start-up phase. Backfence.com’s demise as a “hyperlocal” initiative (Caverly) is one cautionary event that recalls the 2000 dotcom crash. The M&A scenarios outlined above are market dystopias for CJ purists. The major lesson for CJ proponents is to include other market players in hypotheses about causation and correlation factors. 7. ‘Pro-Ams’ & Professional Journalism’s Crisis CJ emerged during a period when Professional Journalism faced a major crisis of ‘self-image’. The Demos report The Pro-Am Revolution (Leadbeater & Miller) popularised the notion of ‘professional amateurs’ which some CJ theorists adopt to strengthen their categorisation. In turn, this triggers a response from cultural theorists who fear bloggers are new media’s barbarians (Keen). I concede Leadbeater and Miller have identified an important category. However, how some CJ theorists then generalise from ‘Pro-Ams’ illustrates the danger of ‘weak’ theory referred to above. Leadbeater and Miller’s categorisation does not really include a counter-view on the strengths of professionals, as illustrated in humanistic consulting (Block), professional service firms (Maister; Maister, Green & Galford), and software development (McConnell). The signs of professionalism these authors mention include a commitment to learning and communal verification, mastery of a discipline and domain application, awareness of methodology creation, participation in mentoring, and cultivation of ethical awareness. Two key differences are discernment and quality of attention, as illustrated in how the legendary Hollywood film editor Walter Murch used Apple’s Final Cut Pro software to edit the 2003 film Cold Mountain (Koppelman). ‘Pro-Ams’ might not aspire to these criteria but Citizen Journalists shouldn’t throw out these standards, either. Doing so would be making the same mistake of overconfidence that technical analysts make against statistical arbitrageurs. Key processes—fact-checking, sub-editing and editorial decision-making—are invisible to the end-user, even if traceable in a blog or wiki publishing system, because of the judgments involved. One post-mortem insight from Assignment Zero was that these processes were vital to create the climate of authenticity and trust to sustain a Citizen Journalist community (Howe). CJ’s trouble with “objectivity” might also overlook some complexities, including the similarity of many bloggers to “noise traders” in financial markets and to op-ed columnists. Methodologies and reportage practices have evolved to deal with the objections that CJ proponents raise, from New Journalism’s radical subjectivity and creative non-fiction techniques (Wolfe & Johnson) to Precision Journalism that used descriptive statistics (Meyer). Finally, journalism frameworks could be updated with current research on how phenomenological awareness shapes our judgments and perceptions (Thompson). 8. Strategic Execution For me, one of CJ’s major weaknesses as a new media theory is its lack of “rich description” (Geertz) about the strategic execution of projects. As Disinfo.com site editor I encountered situations ranging from ‘denial of service’ attacks and spam to site migration, publishing systems that go offline, and ensuring an editorial consistency. Yet the messiness of these processes is missing from CJ theories and accounts. Theories that included this detail as “second-order interactions” (Carlile & Christensen 13) would offer a richer view of CJ. Many CJ and Web 2.0 projects fall into the categories of mini-projects, demonstration prototypes and start-ups, even when using a programming language such as Ajax or Ruby on Rails. Whilst the “bootstrap” process is a benefit, more longitudinal analysis and testing needs to occur, to ensure these projects are scalable and sustainable. For example, South Korea’s OhmyNews is cited as an exemplar that started with “727 citizen reporters and 4 editors” and now has “38,000 citizen reporters” and “a dozen editors” (Kolodzy 231). How does OhmyNews’s mix of hard and soft news change over time? Or, how does OhmyNews deal with a complex issue that might require major resources, such as security negotiations between North and South Korea? Such examples could do with further research. We need to go beyond “the vision thing” and look at the messiness of execution for deeper observations and counterintuitive correlations, to build new descriptive theories. 9. Future Research This essay argues that CJ needs re-evaluation. Its immediate legacy might be to splinter ‘journalism’ into micro-trends: Washington University’s Steve Boriss proclaims “citizen journalism is dead. Expert journalism is the future.” (Boriss; Mensching). The half-lives of such micro-trends demand new categorisations, which in turn prematurely feeds the theory-building cycle. Instead, future researchers could reinvigorate 21st century journalism if they ask deeper questions and return to the observation stage of building descriptive theories. In closing, below are some possible questions that future researchers might explore: Where are the “rich descriptions” of journalistic experience—“citizen”, “convergent”, “digital”, “Pro-Am” or otherwise in new media? How could practice-based approaches inform this research instead of relying on espoused theories-in-use? What new methodologies could be developed for CJ implementation? What role can the “heroic” individual reporter or editor have in “the swarm”? Do the claims about OhmyNews and other sites stand up to longitudinal observation? Are the theories used to justify Citizen Journalism’s normative stance (Rheingold; Surowiecki; Pesce) truly robust generalisations for strategic execution or do they reflect the biases of their creators? How could developers tap the conceptual dimensions of information technology innovation (Shasha) to create the next Facebook, MySpace or Wikipedia? References Argyris, Chris, and Donald Schon. Theory in Practice. San Francisco: Jossey-Bass Publishers, 1976. Barlow, Aaron. The Rise of the Blogosphere. Westport, CN: Praeger Publishers, 2007. Block, Peter. Flawless Consulting. 2nd ed. San Francisco, CA: Jossey-Bass/Pfeiffer, 2000. Boriss, Steve. “Citizen Journalism Is Dead. Expert Journalism Is the Future.” The Future of News. 28 Nov. 2007. 20 Feb. 2008 http://thefutureofnews.com/2007/11/28/citizen-journalism-is-dead- expert-journalism-is-the-future/>. Brooks, Jr., Frederick P. The Mythical Man-Month: Essays on Software Engineering. Rev. ed. Reading, MA: Addison-Wesley Publishing Company, 1995. Campbell, Vincent. Information Age Journalism: Journalism in an International Context. New York: Arnold, 2004. Carlile, Paul R., and Clayton M. Christensen. “The Cycles of Building Theory in Management Research.” Innosight working paper draft 6. 6 Jan. 2005. 19 Feb. 2008 http://www.innosight.com/documents/Theory%20Building.pdf>. Caverly, Doug. “Hyperlocal News Site Takes A Hit.” WebProNews.com 6 July 2007. 19 Feb. 2008 http://www.webpronews.com/topnews/2007/07/06/hyperlocal-news- sites-take-a-hit>. Chenoweth, Neil. Virtual Murdoch: Reality Wars on the Information Superhighway. Sydney: Random House Australia, 2001. Christensen, Clayton M. The Innovator’s Dilemma: When New Technologies Cause Great Firms to Fail. Boston, MA: Harvard Business School Press, 1997. Christensen, Clayton M., Curtis Johnson, and Michael Horn. Disrupting Class: How Disruptive Innovation Will Change the Way the World Learns. New York: McGraw-Hill, 2008. Curtis, Adam. The Mayfair Set. London: British Broadcasting Corporation, 1999. Etherington, Kim. Becoming a Reflexive Researcher: Using Ourselves in Research. London: Jessica Kingsley Publishers, 2004. Festinger, Leon. A Theory of Cognitive Dissonance. Stanford, CA: Stanford University Press, 1962. Feyerabend, Paul. Against Method. 3rd ed. London: Verso, 1993. Finnemore, Martha. National Interests in International Society. Ithaca, NY: Cornell University Press, 1996. Geertz, Clifford. The Interpretation of Cultures. New York: Basic Books, 1973. Ghoshal, Sumantra. “Bad Management Theories Are Destroying Good Management Practices.” Academy of Management Learning & Education 4.1 (2005): 75-91. Gibson, William. Pattern Recognition. London: Viking, 2003. Gladwell, Malcolm. “The Cool-Hunt.” The New Yorker Magazine 17 March 1997. 20 Feb. 2008 http://www.gladwell.com/1997/1997_03_17_a_cool.htm>. Gross, Daniel. Pop! Why Bubbles Are Great for the Economy. New York: Collins, 2007. Hoffer, Eric. The True Believer. New York: Harper, 1951. Howe, Jeff. “Did Assignment Zero Fail? A Look Back, and Lessons Learned.” Wired News 16 July 2007. 19 Feb. 2008 http://www.wired.com/techbiz/media/news/2007/07/assignment_ zero_final?currentPage=all>. Kahneman, Daniel, and Amos Tversky. Choices, Values and Frames. Cambridge: Cambridge UP, 2000. Keen, Andrew. The Cult of the Amateur. New York: Doubleday Currency, 2007. Khurana, Rakesh. From Higher Aims to Hired Hands. Princeton, NJ: Princeton UP, 2007. Kolodzy, Janet. Convergence Journalism: Writing and Reporting across the News Media. Oxford: Rowman & Littlefield, 2006. Koppelman, Charles. Behind the Seen: How Walter Murch Edited Cold Mountain Using Apple’s Final Cut Pro and What This Means for Cinema. Upper Saddle River, NJ: New Rider, 2004. Leadbeater, Charles, and Paul Miller. “The Pro-Am Revolution”. London: Demos, 24 Nov. 2004. 19 Feb. 2008 http://www.demos.co.uk/publications/proameconomy>. Loomis, Carol J. “Bloomberg’s Money Machine.” Fortune 5 April 2007. 20 Feb. 2008 http://money.cnn.com/magazines/fortune/fortune_archive/2007/04/16/ 8404302/index.htm>. Lynch, Peter, and John Rothchild. Beating the Street. Rev. ed. New York: Simon & Schuster, 1994. Maister, David. True Professionalism. New York: The Free Press, 1997. Maister, David, Charles H. Green, and Robert M. Galford. The Trusted Advisor. New York: The Free Press, 2004. Mensching, Leah McBride. “Citizen Journalism on Its Way Out?” SFN Blog, 30 Nov. 2007. 20 Feb. 2008 http://www.sfnblog.com/index.php/2007/11/30/940-citizen-journalism- on-its-way-out>. Meyer, Philip. Precision Journalism. 4th ed. Lanham, MD: Rowman & Littlefield, 2002. McConnell, Steve. Professional Software Development. Boston, MA: Addison-Wesley, 2004. Mintzberg, Henry. Managers Not MBAs. San Francisco, CA: Berrett-Koehler, 2004. Morgan, Gareth. Images of Organisation. Rev. ed. Thousand Oaks, CA: Sage, 2006. Newsvine. “Msnbc.com Acquires Newsvine.” 7 Oct. 2007. 20 Feb. 2008 http://blog.newsvine.com/_news/2007/10/07/1008889-msnbccom- acquires-newsvine>. Niederhoffer, Victor, and Laurel Kenner. Practical Speculation. New York: John Wiley & Sons, 2003. Pearlstine, Norman. Off the Record: The Press, the Government, and the War over Anonymous Sources. New York: Farrar, Straus & Giroux, 2007. Pesce, Mark D. “Mob Rules (The Law of Fives).” The Human Network 28 Sep. 2007. 20 Feb. 2008 http://blog.futurestreetconsulting.com/?p=39>. Rheingold, Howard. Smart Mobs: The Next Social Revolution. Cambridge MA: Basic Books, 2002. Rosen, Jay. What Are Journalists For? Princeton NJ: Yale UP, 2001. Shasha, Dennis Elliott. Out of Their Minds: The Lives and Discoveries of 15 Great Computer Scientists. New York: Copernicus, 1995. Slywotzky, Adrian. Value Migration: How to Think Several Moves Ahead of the Competition. Boston, MA: Harvard Business School Press, 1996. Smith, Steve. “The Self-Image of a Discipline: The Genealogy of International Relations Theory.” Eds. Steve Smith and Ken Booth. International Relations Theory Today. Cambridge, UK: Polity Press, 1995. 1-37. Spar, Debora L. Ruling the Waves: Cycles of Discovery, Chaos and Wealth from the Compass to the Internet. New York: Harcourt, 2001. Surowiecki, James. The Wisdom of Crowds. New York: Doubleday, 2004. Thompson, Evan. Mind in Life: Biology, Phenomenology, and the Sciences of Mind. Cambridge, MA: Belknap Press, 2007. Trippi, Joe. The Revolution Will Not Be Televised. New York: ReganBooks, 2004. Underwood, Doug. When MBA’s Rule the Newsroom. New York: Columbia University Press, 1993. Wark, McKenzie. Virtual Geography: Living with Global Media Events. Bloomington IN: Indiana UP, 1994. Wolfe, Tom, and E.W. Johnson. The New Journalism. New York: Harper & Row, 1973. Citation reference for this article MLA Style Burns, Alex. "Select Issues with New Media Theories of Citizen Journalism." M/C Journal 10.6/11.1 (2008). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0804/10-burns.php>. APA Style Burns, A. (Apr. 2008) "Select Issues with New Media Theories of Citizen Journalism," M/C Journal, 10(6)/11(1). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0804/10-burns.php>.

APA, Harvard, Vancouver, ISO, and other styles

42

Burns, Alex. "Select Issues with New Media Theories of Citizen Journalism." M/C Journal 11, no.1 (June1, 2008). http://dx.doi.org/10.5204/mcj.30.

Full text

Abstract:

“Journalists have to begin a new type of journalism, sometimes being the guide on the side of the civic conversation as well as the filter and gatekeeper.” (Kolodzy 218) “In many respects, citizen journalism is simply public journalism removed from the journalism profession.” (Barlow 181) 1. Citizen Journalism — The Latest Innovation? New Media theorists such as Dan Gillmor, Henry Jenkins, Jay Rosen and Jeff Howe have recently touted Citizen Journalism (CJ) as the latest innovation in 21st century journalism. “Participatory journalism” and “user-driven journalism” are other terms to describe CJ, which its proponents argue is a disruptive innovation (Christensen) to the agenda-setting media institutions, news values and “objective” reportage. In this essay I offer a “contrarian” view, informed by two perspectives: (1) a three-stage model of theory-building (Carlile & Christensen) to evaluate the claims made about CJ; and (2) self-reflexive research insights (Etherington) from editing the US-based news site Disinformation between November 1999 and February 2008. New media theories can potentially create “cognitive dissonance” (Festinger) when their explanations of CJ practices are compared with what actually happens (Feyerabend). First I summarise Carlile & Christensen’s model and the dangers of “bad theory” (Ghoshal). Next I consider several problems in new media theories about CJ: the notion of ‘citizen’, new media populism, parallels in event-driven and civic journalism, and mergers and acquisitions. Two ‘self-reflexive’ issues are considered: ‘pro-ams’ or ‘professional amateurs’ as a challenge to professional journalists, and CJ’s deployment in new media operations and production environments. Finally, some exploratory questions are offered for future researchers. 2. An Evaluative Framework for New Media Theories on Citizen Journalism Paul Carlile and Clayton M. Christensen’s model offers one framework with which to evaluate new media theories on CJ. This framework is used below to highlight select issues and gaps in CJ’s current frameworks and theories. Carlile & Christensen suggest that robust theory-building emerges via three stages: Descriptive, Categorisation and Normative (Carlile & Christensen). There are three sub-stages in Descriptive theory-building; namely, the observation of phenomena, inductive classification into schemas and taxonomies, and correlative relationships to develop models (Carlile & Christensen 2-5). Once causation is established, Normative theory evolves through deductive logic which is subject to Kuhnian paradigm shifts and Popperian falsifiability (Carlile & Christensen 6). Its proponents situate CJ as a Categorisation or new journalism agenda that poses a Normative challenged and Kuhnian paradigm shift to traditional journalism. Existing CJ theories jump from the Descriptive phase of observations like “smart mobs” in Japanese youth subcultures (Rheingold) to make broad claims for Categorisation such as that IndyMedia, blogs and wiki publishing systems as new media alternatives to traditional media. CJ theories then underpin normative beliefs, values and worldviews. Correlative relationships are also used to differentiate CJ from the demand side of microeconomic analysis, from the top-down editorial models of traditional media outlets, and to adopt a vanguard stance. To support this, CJ proponents cite research on emergent collective behaviour such as the “wisdom of crowds” hypothesis (Surowiecki) or peer-to-peer network “swarms” (Pesce) to provide scientific justification for their Normative theories. However, further evaluative research is needed for three reasons: the emergent collective behaviour hypothesis may not actually inform CJ practices, existing theories may have “correlation not cause” errors, and the link may be due to citation network effects between CJ theorists. Collectively, this research base also frames CJ as an “ought to” Categorisation and then proceeds to Normative theory-building (Carlile & Christensen 7). However, I argue below that this Categorisation may be premature: its observations and correlative relationships might reinforce a ‘weak’ Normative theory with limited generalisation. CJ proponents seem to imply that it can be applied anywhere and under any condition—a “statement of causality” that almost makes it a fad (Carlile & Christensen 8). CJ that relies on Classification and Normative claims will be problematic without a strong grounding in Descriptive observation. To understand what’s potentially at stake for CJ’s future consider the consider the parallel debate about curricula renewal for the Masters of Business Administration in the wake of high-profile corporate collapses such as Enron, Worldcom, HIH and OneTel. The MBA evolved as a sociological and institutional construct to justify management as a profession that is codified, differentiated and has entry barriers (Khurana). This process might partly explain the pushback that some media professionals have to CJ as one alternative. MBA programs faced criticism if they had student cohorts with little business know-how or experiential learning (Mintzberg). Enron’s collapse illustrated the ethical dilemmas and unintended consequences that occurred when “bad theories” were implemented (Ghoshal). Professional journalists are aware of this: MBA-educated managers challenged the “craft” tradition in the early 1980s (Underwood). This meant that journalism’s ‘self-image’ (Morgan; Smith) is intertwined with managerial anxieties about media conglomerates in highly competitive markets. Ironically, as noted below, Citizen Journalists who adopt a vanguard position vis-a-vis media professionals step into a more complex game with other players. However, current theories have a naïve idealism about CJ’s promise of normative social change in the face of Machiavellian agency in business, the media and politics. 3. Citizen Who? Who is the “citizen” in CJ? What is their self-awareness as a political agent? CJ proponents who use the ‘self-image’ of ‘citizen’ draw on observations from the participatory vision of open source software, peer-to-peer networks, and case studies such as Howard Dean’s 2004 bid for the Democrat Party nominee in the US Presidential election campaign (Trippi). Recent theorists note Alexander Hamilton’s tradition of civic activism (Barlow 178) which links contemporary bloggers with the Federalist Papers and early newspaper pamphlets. One unsurfaced assumption in these observations and correlations is that most bloggers will adopt a coherent political philosophy as informed citizens: a variation on Lockean utilitarianism, Rawlsian liberalism or Nader consumer activism. To date there is little discussion about how political philosophy could deepen CJ’s ‘self-image’: how to critically evaluate sources, audit and investigation processes, or strategies to deal with elites, deterrence and power. For example, although bloggers kept Valerie Plame’s ‘outing’ as a covert intelligence operative highly visible in the issues-attention cycle, it was agenda-setting media like The New York Times who the Bush Administration targeted to silence (Pearlstine). To be viable, CJ needs to evolve beyond a new media populism, perhaps into a constructivist model of agency, norms and social change (Finnemore). 4. Citizen Journalism as New Media Populism Several “precursor trends” foreshadowed CJ notably the mid-1990s interest in “cool-hunting” by new media analysts and subculture marketeers (Gibson; Gladwell). Whilst this audience focus waned with the 1995-2000 dotcom bubble it resurfaced in CJ and publisher Tim O’Reilly’s Web 2.0 vision. Thus, CJ might be viewed as new media populism that has flourished with the Web 2.0 boom. Yet if the boom becomes a macroeconomic bubble (Gross; Spar) then CJ could be written off as a “silver bullet” that ultimately failed to deliver on its promises (Brooks, Jr.). The reputations of uncritical proponents who adopted a “true believer” stance would also be damaged (Hoffer). This risk is evident if CJ is compared with a parallel trend that shares its audience focus and populist view: day traders and technical analysts who speculate on financial markets. This parallel trend provides an alternative discipline in which the populism surfaced in an earlier form (Carlile & Christensen 12). Fidelity’s Peter Lynch argues that stock pickers can use their Main Street knowledge to beat Wall Street by exploiting information asymmetries (Lynch & Rothchild). Yet Lynch’s examples came from the mid-1970s to early 1980s when indexed mutual fund strategies worked, before deregulation and macroeconomic volatility. A change in the Web 2.0 boom might similarly trigger a reconsideration of Citizen Journalism. Hedge fund maven Victor Niederhoffer contends that investors who rely on technical analysis are practicing a Comtean religion (Niederhoffer & Kenner 72-74) instead of Efficient Market Hypothesis traders who use statistical arbitrage to deal with ‘random walks’ or Behavioural Finance experts who build on Amos Tversky and Daniel Kahneman’s Prospect Theory (Kahneman & Tversky). Niederhoffer’s deeper point is that technical analysts’ belief that the “trend is your friend” is no match for the other schools, despite a mini-publishing industry and computer trading systems. There are also ontological and epistemological differences between the schools. Similarly, CJ proponents who adopt a ‘Professional Amateur’ or ‘Pro-Am’ stance (Leadbeater & Miller) may face a similar gulf when making comparisons with professional journalists and the production environments in media organisations. CJ also thrives as new media populism because of institutional vested interests. When media conglomerates cut back on cadetships and internships CJ might fill the market demand as one alternative. New media programs at New York University and others can use CJ to differentiate themselves from “hyperlocal” competitors (Christensen; Slywotzky; Christensen, Curtis & Horn). This transforms CJ from new media populism to new media institution. 5. Parallels: Event-driven & Civic Journalism For new media programs, CJ builds on two earlier traditions: the Event-driven journalism of crises like the 1991 Gulf War (Wark) and the Civic Journalism school that emerged in the 1960s social upheavals. Civic Journalism’s awareness of minorities and social issues provides the character ethic and political philosophy for many Citizen Journalists. Jay Rosen and others suggest that CJ is the next-generation heir to Civic Journalism, tracing a thread from the 1968 Chicago Democratic Convention to IndyMedia’s coverage of the 1999 “Battle in Seattle” (Rosen). Rosen’s observation could yield an interesting historiography or genealogy. Events such as the Southeast Asian tsunami on 26 December 2004 or Al Qaeda’s London bombings on 7 July 2005 are cited as examples of CJ as event-driven journalism and “pro-am collaboration” (Kolodzy 229-230). Having covered these events and Al Qaeda’s attacks on 11th September 2001, I have a slightly different view: this was more a variation on “first responder” status and handicam video footage that journalists have sourced for the past three decades when covering major disasters. This different view means that the “salience of categories” used to justify CJ and “pro-am collaboration” these events does not completely hold. Furthermore, when Citizen Journalism proponents tout Flickr and Wikipedia as models of real-time media they are building on a broader phenomenon that includes CNN’s Gulf War coverage and Bloomberg’s dominance of financial news (Loomis). 6. The Mergers & Acquisitions Scenario CJ proponents often express anxieties about the resilience of their outlets in the face of predatory venture capital firms who initiate Mergers & Acquisitions (M&A) activities. Ironically, these venture capital firms have core competencies and expertise in the event-driven infrastructure and real-time media that CJ aspires to. Sequoia Capital and other venture capital firms have evaluative frameworks that likely surpass Carlile & Christensen in sophistication, and they exploit parallels, information asymmetries and market populism. Furthermore, although venture capital firms such as Union Street Ventures have funded Web 2.0 firms, they are absent from the explanations of some theorists, whose examples of Citizen Journalism and Web 2.0 success may be the result of survivorship bias. Thus, the venture capital market remains an untapped data source for researchers who want to evaluate the impact of CJ outlets and institutions. The M&A scenario further problematises CJ in several ways. First, CJ is framed as “oppositional” to traditional media, yet this may be used as a stratagem in a game theory framework with multiple stakeholders. Drexel Burnham Lambert’s financier Michael Milken used market populism to sell ‘high-yield’ or ‘junk’ bonds to investors whilst disrupting the Wall Street establishment in the late 1980s (Curtis) and CJ could fulfil a similar tactical purpose. Second, the M&A goal of some Web 2.0 firms could undermine the participatory goals of a site’s community if post-merger integration fails. Jason Calacanis’s sale of Weblogs, Inc to America Online in 2005 and MSNBC’s acquisition of Newsvine on 5 October 2007 (Newsvine) might be success stories. However, this raises issues of digital “property rights” if you contribute to a community that is then sold in an M&A transaction—an outcome closer to business process outsourcing. Third, media “buzz” can create an unrealistic vision when a CJ site fails to grow beyond its start-up phase. Backfence.com’s demise as a “hyperlocal” initiative (Caverly) is one cautionary event that recalls the 2000 dotcom crash. The M&A scenarios outlined above are market dystopias for CJ purists. The major lesson for CJ proponents is to include other market players in hypotheses about causation and correlation factors. 7. ‘Pro-Ams’ & Professional Journalism’s Crisis CJ emerged during a period when Professional Journalism faced a major crisis of ‘self-image’. The Demos report The Pro-Am Revolution (Leadbeater & Miller) popularised the notion of ‘professional amateurs’ which some CJ theorists adopt to strengthen their categorisation. In turn, this triggers a response from cultural theorists who fear bloggers are new media’s barbarians (Keen). I concede Leadbeater and Miller have identified an important category. However, how some CJ theorists then generalise from ‘Pro-Ams’ illustrates the danger of ‘weak’ theory referred to above. Leadbeater and Miller’s categorisation does not really include a counter-view on the strengths of professionals, as illustrated in humanistic consulting (Block), professional service firms (Maister; Maister, Green & Galford), and software development (McConnell). The signs of professionalism these authors mention include a commitment to learning and communal verification, mastery of a discipline and domain application, awareness of methodology creation, participation in mentoring, and cultivation of ethical awareness. Two key differences are discernment and quality of attention, as illustrated in how the legendary Hollywood film editor Walter Murch used Apple’s Final Cut Pro software to edit the 2003 film Cold Mountain (Koppelman). ‘Pro-Ams’ might not aspire to these criteria but Citizen Journalists shouldn’t throw out these standards, either. Doing so would be making the same mistake of overconfidence that technical analysts make against statistical arbitrageurs. Key processes—fact-checking, sub-editing and editorial decision-making—are invisible to the end-user, even if traceable in a blog or wiki publishing system, because of the judgments involved. One post-mortem insight from Assignment Zero was that these processes were vital to create the climate of authenticity and trust to sustain a Citizen Journalist community (Howe). CJ’s trouble with “objectivity” might also overlook some complexities, including the similarity of many bloggers to “noise traders” in financial markets and to op-ed columnists. Methodologies and reportage practices have evolved to deal with the objections that CJ proponents raise, from New Journalism’s radical subjectivity and creative non-fiction techniques (Wolfe & Johnson) to Precision Journalism that used descriptive statistics (Meyer). Finally, journalism frameworks could be updated with current research on how phenomenological awareness shapes our judgments and perceptions (Thompson). 8. Strategic Execution For me, one of CJ’s major weaknesses as a new media theory is its lack of “rich description” (Geertz) about the strategic execution of projects. As Disinfo.com site editor I encountered situations ranging from ‘denial of service’ attacks and spam to site migration, publishing systems that go offline, and ensuring an editorial consistency. Yet the messiness of these processes is missing from CJ theories and accounts. Theories that included this detail as “second-order interactions” (Carlile & Christensen 13) would offer a richer view of CJ. Many CJ and Web 2.0 projects fall into the categories of mini-projects, demonstration prototypes and start-ups, even when using a programming language such as Ajax or Ruby on Rails. Whilst the “bootstrap” process is a benefit, more longitudinal analysis and testing needs to occur, to ensure these projects are scalable and sustainable. For example, South Korea’s OhmyNews is cited as an exemplar that started with “727 citizen reporters and 4 editors” and now has “38,000 citizen reporters” and “a dozen editors” (Kolodzy 231). How does OhmyNews’s mix of hard and soft news change over time? Or, how does OhmyNews deal with a complex issue that might require major resources, such as security negotiations between North and South Korea? Such examples could do with further research. We need to go beyond “the vision thing” and look at the messiness of execution for deeper observations and counterintuitive correlations, to build new descriptive theories. 9. Future Research This essay argues that CJ needs re-evaluation. Its immediate legacy might be to splinter ‘journalism’ into micro-trends: Washington University’s Steve Boriss proclaims “citizen journalism is dead. Expert journalism is the future.” (Boriss; Mensching). The half-lives of such micro-trends demand new categorisations, which in turn prematurely feeds the theory-building cycle. Instead, future researchers could reinvigorate 21st century journalism if they ask deeper questions and return to the observation stage of building descriptive theories. In closing, below are some possible questions that future researchers might explore: Where are the “rich descriptions” of journalistic experience—“citizen”, “convergent”, “digital”, “Pro-Am” or otherwise in new media?How could practice-based approaches inform this research instead of relying on espoused theories-in-use?What new methodologies could be developed for CJ implementation?What role can the “heroic” individual reporter or editor have in “the swarm”?Do the claims about OhmyNews and other sites stand up to longitudinal observation?Are the theories used to justify Citizen Journalism’s normative stance (Rheingold; Surowiecki; Pesce) truly robust generalisations for strategic execution or do they reflect the biases of their creators?How could developers tap the conceptual dimensions of information technology innovation (Shasha) to create the next Facebook, MySpace or Wikipedia? References Argyris, Chris, and Donald Schon. Theory in Practice. San Francisco: Jossey-Bass Publishers, 1976. Barlow, Aaron. The Rise of the Blogosphere. Westport, CN: Praeger Publishers, 2007. Block, Peter. Flawless Consulting. 2nd ed. San Francisco, CA: Jossey-Bass/Pfeiffer, 2000. Boriss, Steve. “Citizen Journalism Is Dead. Expert Journalism Is the Future.” The Future of News. 28 Nov. 2007. 20 Feb. 2008 < http://thefutureofnews.com/2007/11/28/citizen-journalism-is-dead- expert-journalism-is-the-future/ >. Brooks, Jr., Frederick P. The Mythical Man-Month: Essays on Software Engineering. Rev. ed. Reading, MA: Addison-Wesley Publishing Company, 1995. Campbell, Vincent. Information Age Journalism: Journalism in an International Context. New York: Arnold, 2004. Carlile, Paul R., and Clayton M. Christensen. “The Cycles of Building Theory in Management Research.” Innosight working paper draft 6. 6 Jan. 2005. 19 Feb. 2008 < http://www.innosight.com/documents/Theory%20Building.pdf >. Caverly, Doug. “Hyperlocal News Site Takes A Hit.” WebProNews.com 6 July 2007. 19 Feb. 2008 < http://www.webpronews.com/topnews/2007/07/06/hyperlocal-news- sites-take-a-hit >. Chenoweth, Neil. Virtual Murdoch: Reality Wars on the Information Superhighway. Sydney: Random House Australia, 2001. Christensen, Clayton M. The Innovator’s Dilemma: When New Technologies Cause Great Firms to Fail. Boston, MA: Harvard Business School Press, 1997. Christensen, Clayton M., Curtis Johnson, and Michael Horn. Disrupting Class: How Disruptive Innovation Will Change the Way the World Learns. New York: McGraw-Hill, 2008. Curtis, Adam. The Mayfair Set. London: British Broadcasting Corporation, 1999. Etherington, Kim. Becoming a Reflexive Researcher: Using Ourselves in Research. London: Jessica Kingsley Publishers, 2004. Festinger, Leon. A Theory of Cognitive Dissonance. Stanford, CA: Stanford University Press, 1962. Feyerabend, Paul. Against Method. 3rd ed. London: Verso, 1993. Finnemore, Martha. National Interests in International Society. Ithaca, NY: Cornell University Press, 1996. Geertz, Clifford. The Interpretation of Cultures. New York: Basic Books, 1973. Ghoshal, Sumantra. “Bad Management Theories Are Destroying Good Management Practices.” Academy of Management Learning & Education 4.1 (2005): 75-91. Gibson, William. Pattern Recognition. London: Viking, 2003. Gladwell, Malcolm. “The Cool-Hunt.” The New Yorker Magazine 17 March 1997. 20 Feb. 2008 < http://www.gladwell.com/1997/1997_03_17_a_cool.htm >. Gross, Daniel. Pop! Why Bubbles Are Great for the Economy. New York: Collins, 2007. Hoffer, Eric. The True Believer. New York: Harper, 1951. Howe, Jeff. “Did Assignment Zero Fail? A Look Back, and Lessons Learned.” Wired News 16 July 2007. 19 Feb. 2008 < http://www.wired.com/techbiz/media/news/2007/07/assignment_ zero_final?currentPage=all >. Kahneman, Daniel, and Amos Tversky. Choices, Values and Frames. Cambridge: Cambridge UP, 2000. Keen, Andrew. The Cult of the Amateur. New York: Doubleday Currency, 2007. Khurana, Rakesh. From Higher Aims to Hired Hands. Princeton, NJ: Princeton UP, 2007. Kolodzy, Janet. Convergence Journalism: Writing and Reporting across the News Media. Oxford: Rowman & Littlefield, 2006. Koppelman, Charles. Behind the Seen: How Walter Murch Edited Cold Mountain Using Apple’s Final Cut Pro and What This Means for Cinema. Upper Saddle River, NJ: New Rider, 2004. Leadbeater, Charles, and Paul Miller. “The Pro-Am Revolution”. London: Demos, 24 Nov. 2004. 19 Feb. 2008 < http://www.demos.co.uk/publications/proameconomy >. Loomis, Carol J. “Bloomberg’s Money Machine.” Fortune 5 April 2007. 20 Feb. 2008 < http://money.cnn.com/magazines/fortune/fortune_archive/2007/04/16/ 8404302/index.htm >. Lynch, Peter, and John Rothchild. Beating the Street. Rev. ed. New York: Simon & Schuster, 1994. Maister, David. True Professionalism. New York: The Free Press, 1997. Maister, David, Charles H. Green, and Robert M. Galford. The Trusted Advisor. New York: The Free Press, 2004. Mensching, Leah McBride. “Citizen Journalism on Its Way Out?” SFN Blog, 30 Nov. 2007. 20 Feb. 2008 < http://www.sfnblog.com/index.php/2007/11/30/940-citizen-journalism- on-its-way-out >. Meyer, Philip. Precision Journalism. 4th ed. Lanham, MD: Rowman & Littlefield, 2002. McConnell, Steve. Professional Software Development. Boston, MA: Addison-Wesley, 2004. Mintzberg, Henry. Managers Not MBAs. San Francisco, CA: Berrett-Koehler, 2004. Morgan, Gareth. Images of Organisation. Rev. ed. Thousand Oaks, CA: Sage, 2006. Newsvine. “Msnbc.com Acquires Newsvine.” 7 Oct. 2007. 20 Feb. 2008 < http://blog.newsvine.com/_news/2007/10/07/1008889-msnbccom- acquires-newsvine >. Niederhoffer, Victor, and Laurel Kenner. Practical Speculation. New York: John Wiley & Sons, 2003. Pearlstine, Norman. Off the Record: The Press, the Government, and the War over Anonymous Sources. New York: Farrar, Straus & Giroux, 2007. Pesce, Mark D. “Mob Rules (The Law of Fives).” The Human Network 28 Sep. 2007. 20 Feb. 2008 < http://blog.futurestreetconsulting.com/?p=39 >. Rheingold, Howard. Smart Mobs: The Next Social Revolution. Cambridge MA: Basic Books, 2002. Rosen, Jay. What Are Journalists For? Princeton NJ: Yale UP, 2001. Shasha, Dennis Elliott. Out of Their Minds: The Lives and Discoveries of 15 Great Computer Scientists. New York: Copernicus, 1995. Slywotzky, Adrian. Value Migration: How to Think Several Moves Ahead of the Competition. Boston, MA: Harvard Business School Press, 1996. Smith, Steve. “The Self-Image of a Discipline: The Genealogy of International Relations Theory.” Eds. Steve Smith and Ken Booth. International Relations Theory Today. Cambridge, UK: Polity Press, 1995. 1-37. Spar, Debora L. Ruling the Waves: Cycles of Discovery, Chaos and Wealth from the Compass to the Internet. New York: Harcourt, 2001. Surowiecki, James. The Wisdom of Crowds. New York: Doubleday, 2004. Thompson, Evan. Mind in Life: Biology, Phenomenology, and the Sciences of Mind. Cambridge, MA: Belknap Press, 2007. Trippi, Joe. The Revolution Will Not Be Televised. New York: ReganBooks, 2004. Underwood, Doug. When MBA’s Rule the Newsroom. New York: Columbia University Press, 1993. Wark, McKenzie. Virtual Geography: Living with Global Media Events. Bloomington IN: Indiana UP, 1994. Wolfe, Tom, and E.W. Johnson. The New Journalism. New York: Harper & Row, 1973.

APA, Harvard, Vancouver, ISO, and other styles

43

Hawley, Erin. "Re-imagining Horror in Children's Animated Film." M/C Journal 18, no.6 (March7, 2016). http://dx.doi.org/10.5204/mcj.1033.

Full text

Abstract:

Introduction It is very common for children’s films to adapt, rework, or otherwise re-imagine existing cultural material. Such re-imaginings are potential candidates for fidelity criticism: a mode of analysis whereby an adaptation is judged according to its degree of faithfulness to the source text. Indeed, it is interesting that while fidelity criticism is now considered outdated and problematic by adaptation theorists (see Stam; Leitch; and Whelehan) the issue of fidelity has tended to linger in the discussions that form around material adapted for children. In particular, it is often assumed that the re-imagining of cultural material for children will involve a process of “dumbing down” that strips the original text of its complexity so that it is more easily consumed by young audiences (see sem*nza; Kellogg; Hastings; and Napolitano). This is especially the case when children’s films draw from texts—or genres—that are specifically associated with an adult readership. This paper explores such an interplay between children’s and adult’s culture with reference to the re-imagining of the horror genre in children’s animated film. Recent years have seen an inrush of animated films that play with horror tropes, conventions, and characters. These include Frankenweenie (2012), ParaNorman (2012), Hotel Transylvania (2012), Igor (2008), Monsters Inc. (2001), Monster House (2006), and Monsters vs Aliens (2009). Often diminishingly referred to as “kiddie horror” or “goth lite”, this re-imagining of the horror genre is connected to broader shifts in children’s culture, literature, and media. Anna Jackson, Karen Coats, and Roderick McGillis, for instance, have written about the mainstreaming of the Gothic in children’s literature after centuries of “suppression” (2); a glance at the titles in a children’s book store, they tell us, may suggest that “fear or the pretence of fear has become a dominant mode of enjoyment in literature for young people” (1). At the same time, as Lisa Hopkins has pointed out, media products with dark, supernatural, or Gothic elements are increasingly being marketed to children, either directly or through product tie-ins such as toys or branded food items (116-17). The re-imagining of horror for children demands our attention for a number of reasons. First, it raises questions about the commercialisation and repackaging of material that has traditionally been considered “high culture”, particularly when the films in question are seen to pilfer from sites of the literary Gothic such as Mary Shelley’s Frankenstein (1818) or Bram Stoker’s Dracula (1897). The classic horror films of the 1930s such as James Whale’s Frankenstein (1931) also have their own canonical status within the genre, and are objects of reverence for horror fans and film scholars alike. Moreover, aficionados of the genre have been known to object vehemently to any perceived simplification or dumbing down of horror conventions in order to address a non-horror audience. As Lisa Bode has demonstrated, such objections were articulated in many reviews of the film Twilight, in which the repackaging and simplifying of vampire mythology was seen to pander to a female, teenage or “tween” audience (710-11). Second, the re-imagining of horror for children raises questions about whether the genre is an appropriate source of pleasure and entertainment for young audiences. Horror has traditionally been understood as problematic and damaging even for adult viewers: Mark Jancovich, for instance, writes of the long-standing assumption that horror “is moronic, sick and worrying; that any person who derives pleasure from the genre is moronic, sick and potentially dangerous” and that both the genre and its fans are “deviant” (18). Consequently, discussions about the relationship between children and horror have tended to emphasise regulation, restriction, censorship, effect, and “the dangers of imitative violence” (Buckingham 95). As Paul Wells observes, there is a “consistent concern […] that horror films are harmful to children, but clearly these films are not made for children, and the responsibility for who views them lies with adult authority figures who determine how and when horror films are seen” (24). Previous academic work on the child as horror viewer has tended to focus on children as consumers of horror material designed for adults. Joanne Cantor’s extensive work in this area has indicated that fright reactions to horror media are commonly reported and can be long-lived (Cantor; and Cantor and Oliver). Elsewhere, the work of Sarah Smith (45-76) and David Buckingham (95-138) has indicated that children, like adults, can gain certain pleasures from the genre; it has also indicated that children can be quite media savvy when viewing horror, and can operate effectively as self-censors. However, little work has yet been conducted on whether (and how) the horror genre might be transformed for child viewers. With this in mind, I explore here the re-imagining of horror in two children’s animated films: Frankenweenie and ParaNorman. I will consider the way horror tropes, narratives, conventions, and characters have been reshaped in each film with a child’s perspective in mind. This, I argue, does not make them simplified texts or unsuitable objects of pleasure for adults; instead, the films demonstrate that the act of re-imagining horror for children calls into question long-held assumptions about pleasure, taste, and the boundaries between “adult” and “child”. Frankenweenie and ParaNorman: Rewriting the Myth of Childhood Innocence Frankenweenie is a stop-motion animation written by John August and directed by Tim Burton, based on a live-action short film made by Burton in 1984. As its name suggests, Frankenweenie re-imagines Shelley’s Frankenstein by transforming the relationship between creator and monster into that between child and pet. Burton’s Victor Frankenstein is a young boy living in a small American town, a creative loner who enjoys making monster movies. When his beloved dog Sparky is killed in a car accident, young Victor—like his predecessor in Shelley’s novel—is driven by the awfulness of this encounter with death to discover the “mysteries of creation” (Shelley 38): he digs up Sparky’s body, drags the corpse back to the family home, and reanimates him in the attic. This coming-to-life sequence is both a re-imagining of the famous animation scene in Whale’s film Frankenstein and a tender expression of the love between a boy and his dog. The re-imagined creation scene therefore becomes a site of negotiation between adult and child audiences: adult viewers familiar with Whale’s adaptation and its sense of electric spectacle are invited to rethink this scene from a child’s perspective, while child viewers are given access to a key moment from the horror canon. While this blurring of the lines between child and adult is a common theme in Burton’s work—many of his films exist in a liminal space where a certain childlike sensibility mingles with a more adult-centric dark humour—Frankenweenie is unique in that it actively re-imagines as “childlike” a film and/or work of literature that was previously populated by adult characters and associated with adult audiences. ParaNorman is the second major film from the animation studio Laika Entertainment. Following in the footsteps of the earlier Laika film Coraline (2009)—and paving the way for the studio’s 2014 release, Boxtrolls—ParaNorman features stop-motion animation, twisted storylines, and the exploration of dark themes and spaces by child characters. The film tells the story of Norman, an eleven year old boy who can see and communicate with the dead. This gift marks him as an outcast in the small town of Blithe Hollow, which has built its identity on the historic trial and hanging of an “evil” child witch. Norman must grapple with the town’s troubled past and calm the spirit of the vengeful witch; along the way, he and an odd assortment of children battle zombies and townsfolk alike, the latter appearing more monstrous than the former as the film progresses. Although ParaNorman does not position itself as an adaptation of a specific horror text, as does Frankenweenie, it shares with Burton’s film a playful intertextuality whereby references are constantly made to iconic films in the horror genre (including Halloween [1978], Friday the 13th [1980], and Day of the Dead [1985]). Both films were released in 2012 to critical acclaim. Interestingly, though, film critics seemed to disagree over who these texts were actually “for.” Some reviewers described the films as children’s texts, and warned that adults would likely find them “tame and compromised” (Scott), “toothless” (McCarthy) or “sentimental” (Bradshaw). These comments carry connotations of simplification: the suggestion is that the conventions and tropes of the horror genre have been weakened (or even contaminated) by the association with child audiences, and that consequently adults cannot (or should not) take pleasure in the films. Other reviewers of ParaNorman and Frankenweenie suggested that adults were more likely to enjoy the films than children (O’Connell; Berardinelli; and Wolgamott). Often, this suggestion came together with a warning about scary or dark content: the films were deemed to be too frightening for young children, and this exclusion of the child audience allowed the reviewer to acknowledge his or her own enjoyment of and investment in the film (and the potential enjoyment of other adult viewers). Lou Lumenick, for instance, peppers his review of ParaNorman with language that indicates his own pleasure (“probably the year’s most visually dazzling movie so far”; the climax is “too good to spoil”; the humour is “deliciously twisted”), while warning that children as old as eight should not be taken to see the film. Similarly, Christy Lemire warns that certain elements of Frankenweenie are scary and that “this is not really a movie for little kids”; she goes on to add that this scariness “is precisely what makes ‘Frankenweenie’ such a consistent wonder to watch for the rest of us” (emphasis added). In both these cases a line is drawn between child and adult viewers, and arguably it is the film’s straying into the illicit area of horror from the confines of a children’s text that renders it an object of pleasure for the adult viewer. The thrill of being scared is also interpreted here as a specifically adult pleasure. This need on the part of critics to establish boundaries between child and adult viewerships is interesting given that the films themselves strive to incorporate children (as characters and as viewers) into the horror space. In particular, both films work hard to dismantle the myths of childhood innocence—and associated ideas about pleasure and taste—that have previously seen children excluded from the culture of the horror film. Both the young protagonists, for instance, are depicted as media-literate consumers or makers of horror material. Victor is initially seen exhibiting one of his home-made monster movies to his bemused parents, and we first encounter Norman watching a zombie film with his (dead) grandmother; clearly a consummate horror viewer, Norman decodes the film for Grandma, explaining that the zombie is eating the woman’s head because, “that’s what they do.” In this way, the myth of childhood innocence is rewritten: the child’s mature engagement with the horror genre gives him agency, which is linked to his active position in the narrative (both Norman and Victor literally save their towns from destruction); the parents, meanwhile, are reduced to babbling stereotypes who worry that their sons will “turn out weird” (Frankenweenie) or wonder why they “can’t be like other kids” (ParaNorman). The films also rewrite the myth of childhood innocence by depicting Victor and Norman as children with dark, difficult lives. Importantly, each boy has encountered death and, for each, his parents have failed to effectively guide him through the experience. In Frankenweenie Victor is grief-stricken when Sparky dies, yet his parents can offer little more than platitudes to quell the pain of loss. “When you lose someone you love they never really leave you,” Victor’s mother intones, “they just move into a special place in your heart,” to which Victor replies “I don’t want him in my heart—I want him here with me!” The death of Norman’s grandmother is similarly dismissed by his mother in ParaNorman. “I know you and Grandma were very close,” she says, “but we all have to move on. Grandma’s in a better place now.” Norman objects: “No she’s not, she’s in the living room!” In both scenes, the literal-minded but intelligent child seems to understand death, loss, and grief while the parents are unable to speak about these “mature” concepts in a meaningful way. The films are also reminders that a child’s first experience of death can come very young, and often occurs via the loss of an elderly relative or a beloved pet. Death, Play, and the Monster In both films, therefore, the audience is invited to think about death. Consequently, there is a sense in each film that while the violent and sexual content of most horror texts has been stripped away, the dark centre of the horror genre remains. As Paul Wells reminds us, horror “is predominantly concerned with the fear of death, the multiple ways in which it can occur, and the untimely nature of its occurrence” (10). Certainly, the horror texts which Frankenweenie and ParaNorman re-imagine are specifically concerned with death and mortality. The various adaptations of Frankenstein that are referenced in Frankenweenie and the zombie films to which ParaNorman pays homage all deploy “the monster” as a figure who defies easy categorisation as living or dead. The othering of this figure in the traditional horror narrative allows him/her/it to both subvert and confirm cultural ideas about life, death, and human status: for monsters, as Elaine Graham notes, have long been deployed in popular culture as figures who “mark the fault-lines” and also “signal the fragility” of boundary structures, including the boundary between human and not human, and that between life and death (12). Frankenweenie’s Sparky, as an iteration of the Frankenstein monster, clearly fits this description: he is neither living nor dead, and his monstrosity emerges not from any act of violence or from physical deformity (he remains, throughout the film, a cute and lovable dog, albeit with bolts fixed to his neck) but from his boundary-crossing status. However, while most versions of the Frankenstein monster are deliberately positioned to confront ideas about the human/machine boundary and to perform notions of the posthuman, such concerns are sidelined in Frankenweenie. Instead, the emphasis is on concerns that are likely to resonate with children: Sparky is a reminder of the human preoccupation with death, loss, and the question of why (or whether, or when) we should abide by the laws of nature. Arguably, this indicates a re-imagining of the Frankenstein tale not only for child audiences but from a child’s perspective. In ParaNorman, similarly, the zombie–often read as an articulation of adult anxieties about war, apocalypse, terrorism, and the deterioration of social order (Platts 551-55)—is re-used and re-imagined in a childlike way. From a child’s perspective, the zombie may represent the horrific truth of mortality and/or the troublesome desire to live forever that emerges once this truth has been confronted. More specifically, the notion of dealing meaningfully with the past and of honouring rather than silencing the dead is a strong thematic undercurrent in ParaNorman, and in this sense the zombies are important figures who dramatise the connections between past and present. While this past/present connection is explored on many levels in ParaNorman—including the level of a town grappling with its dark history—it is Norman and his grandmother who take centre stage: the boundary-crossing figure of the zombie is re-realised here in terms of a negotiation with a presence that is now absent (the elderly relative who has died but is still remembered). Indeed, the zombies in this film are an implicit rebuke to Norman’s mother and her command that Norman “move on” after his grandmother’s death. The dead are still present, this film playfully reminds us, and therefore “moving on” is an overly simplistic and somewhat disrespectful response (especially when imposed on children by adult authority figures.) If the horror narrative is built around the notion that “normality is threatened by the Monster”, as Robin Wood has famously suggested, ParaNorman and Frankenweenie re-imagine this narrative of subversion from a child’s perspective (31). Both films open up a space within which the child is permitted to negotiate with the destabilising figure of the monster; the normality that is “threatened” here is the adult notion of the finality of death and, relatedly, the assumption that death is not a suitable subject for children to think or talk about. Breaking down such understandings, Frankenweenie and ParaNorman strive not so much to play with death (a phrase that implies a certain callousness, a problematic disregard for human life) but to explore death through the darkness of play. This is beautifully imaged in a scene from ParaNorman in which Norman and his friend Neil play with the ghost of Neil’s recently deceased dog. “We’re going to play with a dead dog in the garden,” Neil enthusiastically announces to his brother, “and we’re not even going to have to dig him up first!” Somewhat similarly, film critic Richard Corliss notes in his review of Frankenweenie that the film’s “message to the young” is that “children should play with dead things.” Through this intersection between “death” and “play”, both films propose a particularly child-like (although not necessarily child-ish) way of negotiating horror’s dark territory. Conclusion Animated film has always been an ambiguous space in terms of age, pleasure, and viewership. As film critic Margaret Pomeranz has observed, “there is this perception that if it’s an animated film then you can take the little littlies” (Pomeranz and Stratton). Animation itself is often a signifier of safety, fun, nostalgia, and childishness; it is a means of addressing families and young audiences. Yet at the same time, the fantastic and transformative aspects of animation can be powerful tools for telling stories that are dark, surprising, or somehow subversive. It is therefore interesting that the trend towards re-imagining horror for children that this paper has identified is unfolding within the animated space. It is beyond the scope of this paper to fully consider what animation as a medium brings to this re-imagining process. However, it is worth noting that the distinctive stop-motion style used in both films works to position them as alternatives to Disney products (for although Frankenweenie was released under the Disney banner, it is visually distinct from most of Disney’s animated ventures). The majority of Disney films are adaptations or re-imaginings of some sort, yet these re-imaginings look to fairytales or children’s literature for their source material. In contrast, as this paper has demonstrated, Frankenweenie and ParaNorman open up a space for boundary play: they give children access to tropes, narratives, and characters that are specifically associated with adult viewers, and they invite adults to see these tropes, narratives, and characters from a child’s perspective. Ultimately, it is difficult to determine the success of this re-imagining process: what, indeed, does a successful re-imagining of horror for children look like, and who might be permitted to take pleasure from it? Arguably, ParaNorman and Frankenweenie have succeeded in reshaping the genre without simplifying it, deploying tropes and characters from classic horror texts in a meaningful way within the complex space of children’s animated film. References Berardinelli, James. “Frankenweenie (Review).” Reelviews, 4 Oct. 2012. 6 Aug. 2014 ‹http://www.reelviews.net/php_review_template.php?identifier=2530›. Bode, Lisa. “Transitional Tastes: Teen Girls and Genre in the Critical Reception of Twilight.” Continuum: Journal of Media & Cultural Studies 24.5 (2010): 707-19. Bradshaw, Peter. “Frankenweenie: First Look Review.” The Guardian, 11 Oct. 2012. 6 Aug. 2014 ‹http://www.theguardian.com/film/2012/oct/10/frankenweenie-review-london-film-festival-tim-burton›. Buckingham, David. Moving Images: Understanding Children’s Emotional Responses to Television. Manchester and New York: Manchester University Press, 1996. Cantor, Joanne. “‘I’ll Never Have a Clown in My House’ – Why Movie Horror Lives On.” Poetics Today 25.2 (2004): 283-304. Cantor, Joanne, and Mary Beth Oliver. “Developmental Differences in Responses to Horror”. The Horror Film. Ed. Stephen Prince. New Brunswick, NJ: Rutgers UP, 2004. 224-41. Corliss, Richard. “‘Frankenweenie’ Movie Review: A Re-Animated Delight”. Time, 4 Oct. 2012. 6 Aug. 2014 ‹http://entertainment.time.com/2012/10/04/tim-burtons-frankenweenie-a-re-animated-delight/›. Frankenweenie. Directed by Tim Burton. Walt Disney Pictures, 2012. Graham, Elaine L. Representations of the Post/Human: Monsters, Aliens and Others in Popular Culture. Manchester: Manchester UP, 2002. Hastings, A. Waller. “Moral Simplification in Disney’s The Little Mermaid.” The Lion and the Unicorn 17.1 (1993): 83-92. Hopkins, Lisa. Screening the Gothic. Austin: U of Texas P, 2005. Jackson, Anna, Karen Coats, and Roderick McGillis. “Introduction.” The Gothic in Children’s Literature: Haunting the Borders. Eds. Anna Jackson, Karen Coats, and Roderick McGillis. New York: Routledge, 2008. 1-14. Jancovich, Mark. “General Introduction.” Horror: The Film Reader. Ed. Mark Jancovich. London: Routledge, 2002. 1-19. Kellogg, Judith L. “The Dynamics of Dumbing: The Case of Merlin.” The Lion and the Unicorn 17.1 (1993): 57-72. Leitch, Thomas. “Twelve Fallacies in Contemporary Adaptation Theory.” Criticism 45.2 (2003): 149-71. Lemire, Christy. “‘Frankenweenie’ Review: Tim Burton Reminds Us Why We Love Him.” The Huffington Post, 2 Oct. 2012. 6 Aug. 2014 ‹http://www.huffingtonpost.com/2012/10/03/frankenweenie-review-tim-burton_n_1935142.html›. Lumenick, Lou. “So Good, It’s Scary (ParaNorman Review)”. New York Post, 17 Aug. 2012. 3 Jun. 2015 ‹http://nypost.com/2012/08/17/so-good-its-scary/›. McCarthy, Todd. “Frankenweenie: Film Review.” The Hollywood Reporter, 20 Sep. 2012. 6 Aug. 2014 ‹http://www.hollywoodreporter.com/movie/frankenweenie/review/372720›. Napolitano, Marc. “Disneyfying Dickens: Oliver & Company and The Muppet Christmas Carol as Dickensian Musicals.” Studies in Popular Culture 32.1 (2009): 79-102. O’Connell, Sean. “Middle School and Zombies? Awwwkward!” Washington Post, 17 Aug. 2012. 3 Jun. 2015 ‹http://www.washingtonpost.com/gog/movies/paranorman,1208210.html›. ParaNorman. Directed by Chris Butler and Sam Fell. Focus Features/Laika Entertainment, 2012. Platts, Todd K. “Locating Zombies in the Sociology of Popular Culture”. Sociology Compass 7 (2013): 547-60. Pomeranz, Margaret, and David Stratton. “Igor (Review).” At the Movies, 14 Dec. 2008. 6 Aug. 2014 ‹http://www.abc.net.au/atthemovies/txt/s2426109.htm›. Scott, A.O. “It’s Aliiiive! And Wagging Its Tail: ‘Frankenweenie’, Tim Burton’s Homage to Horror Classics.” New York Times, 4 Oct. 2012. 6 Aug. 2014 ‹http://www.nytimes.com/2012/10/05/movies/frankenweenie-tim-burtons-homage-to-horror-classics.html›. sem*nza, Gregory M. Colón. “Teens, Shakespeare, and the Dumbing Down Cliché: The Case of The Animated Tales.” Shakespeare Bulletin 26.2 (2008): 37-68. Shelley, Mary. Frankenstein, or, The Modern Prometheus. Hertfordshire: Wordsworth Editions, 1993 [1818]. Smith, Sarah J. Children, Cinema and Censorship: From Dracula to the Dead End Kids. London: I.B. Tauris, 2005. Stam, Robert. “Introduction: The Theory and Practice of Adaptation.” Literature and Film: A Guide to the Theory and Practice of Film Adaptation. Eds. Robert Stam and Alessandra Raengo. Oxford: Blackwell, 2005. 1-52. Wells, Paul. The Horror Genre: From Beelzebub to Blair Witch. London: Wallflower, 2000. Whelehan, Imelda. “Adaptations: the Contemporary Dilemmas.” Adaptations: From Text to Screen, Screen to Text. Eds. Deborah Cartmell and Imelda Whelehan. London: Routledge, 1999. 3-19. Wolgamott, L. Kent. “‘Frankenweenie’ A Box-Office Bomb, But Superior Film.” Lincoln Journal Star, 10 Oct. 2012. 18 Aug. 2014 ‹http://journalstar.com/entertainment/movies/l-kent-wolgamott-frankenweenie-a-box-office-bomb-but-superior/article_42409e82-89b9-5794-8082-7b5de3d469e2.html›. Wood, Robin. “The American Nightmare: Horror in the 70s.” Horror: The Film Reader. Ed. Mark Jancovich. London: Routledge, 2002. 25-32.

APA, Harvard, Vancouver, ISO, and other styles

44

Cinque, Toija. "A Study in Anxiety of the Dark." M/C Journal 24, no.2 (April27, 2021). http://dx.doi.org/10.5204/mcj.2759.

Full text

Abstract:

Introduction This article is a study in anxiety with regard to social online spaces (SOS) conceived of as dark. There are two possible ways to define ‘dark’ in this context. The first is that communication is dark because it either has limited distribution, is not open to all users (closed groups are a case example) or hidden. The second definition, linked as a result of the first, is the way that communication via these means is interpreted and understood. Dark social spaces disrupt the accepted top-down flow by the ‘gazing elite’ (data aggregators including social media), but anxious users might need to strain to notice what is out there, and this in turn destabilises one’s reception of the scene. In an environment where surveillance technologies are proliferating, this article examines contemporary, dark, interconnected, and interactive communications for the entangled affordances that might be brought to bear. A provocation is that resistance through counterveillance or “sousveillance” is one possibility. An alternative (or addition) is retreating to or building ‘dark’ spaces that are less surveilled and (perhaps counterintuitively) less fearful. This article considers critically the notion of dark social online spaces via four broad socio-technical concerns connected to the big social media services that have helped increase a tendency for fearful anxiety produced by surveillance and the perceived implications for personal privacy. It also shines light on the aspect of darkness where some users are spurred to actively seek alternative, dark social online spaces. Since the 1970s, public-key cryptosystems typically preserved security for websites, emails, and sensitive health, government, and military data, but this is now reduced (Williams). We have seen such systems exploited via cyberattacks and misappropriated data acquired by affiliations such as Facebook-Cambridge Analytica for targeted political advertising during the 2016 US elections. Via the notion of “parasitic strategies”, such events can be described as news/information hacks “whose attack vectors target a system’s weak points with the help of specific strategies” (von Nordheim and Kleinen-von Königslöw, 88). In accord with Wilson and Serisier’s arguments (178), emerging technologies facilitate rapid data sharing, collection, storage, and processing wherein subsequent “outcomes are unpredictable”. This would also include the effect of acquiescence. In regard to our digital devices, for some, being watched overtly—through cameras encased in toys, computers, and closed-circuit television (CCTV) to digital street ads that determine the resonance of human emotions in public places including bus stops, malls, and train stations—is becoming normalised (McStay, Emotional AI). It might appear that consumers immersed within this Internet of Things (IoT) are themselves comfortable interacting with devices that record sound and capture images for easy analysis and distribution across the communications networks. A counter-claim is that mainstream social media corporations have cultivated a sense of digital resignation “produced when people desire to control the information digital entities have about them but feel unable to do so” (Draper and Turow, 1824). Careful consumers’ trust in mainstream media is waning, with readers observing a strong presence of big media players in the industry and are carefully picking their publications and public intellectuals to follow (Mahmood, 6). A number now also avoid the mainstream internet in favour of alternate dark sites. This is done by users with “varying backgrounds, motivations and participation behaviours that may be idiosyncratic (as they are rooted in the respective person’s biography and circ*mstance)” (Quandt, 42). By way of connection with dark internet studies via Biddle et al. (1; see also Lasica), the “darknet” is a collection of networks and technologies used to share digital content … not a separate physical network but an application and protocol layer riding on existing networks. Examples of darknets are peer-to-peer file sharing, CD and DVD copying, and key or password sharing on email and newsgroups. As we note from the quote above, the “dark web” uses existing public and private networks that facilitate communication via the Internet. Gehl (1220; see also Gehl and McKelvey) has detailed that this includes “hidden sites that end in ‘.onion’ or ‘.i2p’ or other Top-Level Domain names only available through modified browsers or special software. Accessing I2P sites requires a special routing program ... . Accessing .onion sites requires Tor [The Onion Router]”. For some, this gives rise to social anxiety, read here as stemming from that which is not known, and an exaggerated sense of danger, which makes fight or flight seem the only options. This is often justified or exacerbated by the changing media and communication landscape and depicted in popular documentaries such as The Social Dilemma or The Great Hack, which affect public opinion on the unknown aspects of internet spaces and the uses of personal data. The question for this article remains whether the fear of the dark is justified. Consider that most often one will choose to make one’s intimate bedroom space dark in order to have a good night’s rest. We might pleasurably escape into a cinema’s darkness for the stories told therein, or walk along a beach at night enjoying unseen breezes. Most do not avoid these experiences, choosing to actively seek them out. Drawing this thread, then, is the case made here that agency can also be found in the dark by resisting socio-political structural harms. 1. Digital Futures and Anxiety of the Dark Fear of the darkI have a constant fear that something's always nearFear of the darkFear of the darkI have a phobia that someone's always there In the lyrics to the song “Fear of the Dark” (1992) by British heavy metal group Iron Maiden is a sense that that which is unknown and unseen causes fear and anxiety. Holding a fear of the dark is not unusual and varies in degree for adults as it does for children (Fellous and Arbib). Such anxiety connected to the dark does not always concern darkness itself. It can also be a concern for the possible or imagined dangers that are concealed by the darkness itself as a result of cognitive-emotional interactions (McDonald, 16). Extending this claim is this article’s non-binary assertion that while for some technology and what it can do is frequently misunderstood and shunned as a result, for others who embrace the possibilities and actively take it on it is learning by attentively partaking. Mistakes, solecism, and frustrations are part of the process. Such conceptual theorising falls along a continuum of thinking. Global interconnectivity of communications networks has certainly led to consequent concerns (Turkle Alone Together). Much focus for anxiety has been on the impact upon social and individual inner lives, levels of media concentration, and power over and commercialisation of the internet. Of specific note is that increasing commercial media influence—such as Facebook and its acquisition of WhatsApp, Oculus VR, Instagram, CRTL-labs (translating movements and neural impulses into digital signals), LiveRail (video advertising technology), Chainspace (Blockchain)—regularly changes the overall dynamics of the online environment (Turow and Kavanaugh). This provocation was born out recently when Facebook disrupted the delivery of news to Australian audiences via its service. Mainstream social online spaces (SOS) are platforms which provide more than the delivery of media alone and have been conceptualised predominantly in a binary light. On the one hand, they can be depicted as tools for the common good of society through notional widespread access and as places for civic participation and discussion, identity expression, education, and community formation (Turkle; Bruns; Cinque and Brown; Jenkins). This end of the continuum of thinking about SOS seems set hard against the view that SOS are operating as businesses with strategies that manipulate consumers to generate revenue through advertising, data, venture capital for advanced research and development, and company profit, on the other hand. In between the two polar ends of this continuum are the range of other possibilities, the shades of grey, that add contemporary nuance to understanding SOS in regard to what they facilitate, what the various implications might be, and for whom. By way of a brief summary, anxiety of the dark is steeped in the practices of privacy-invasive social media giants such as Facebook and its ancillary companies. Second are the advertising technology companies, surveillance contractors, and intelligence agencies that collect and monitor our actions and related data; as well as the increased ease of use and interoperability brought about by Web 2.0 that has seen a disconnection between technological infrastructure and social connection that acts to limit user permissions and online affordances. Third are concerns for the negative effects associated with depressed mental health and wellbeing caused by “psychologically damaging social networks”, through sleep loss, anxiety, poor body image, real world relationships, and the fear of missing out (FOMO; Royal Society for Public Health (UK) and the Young Health Movement). Here the harms are both individual and societal. Fourth is the intended acceleration toward post-quantum IoT (Fernández-Caramés), as quantum computing’s digital components are continually being miniaturised. This is coupled with advances in electrical battery capacity and interconnected telecommunications infrastructures. The result of such is that the ontogenetic capacity of the powerfully advanced network/s affords supralevel surveillance. What this means is that through devices and the services that they provide, individuals’ data is commodified (Neff and Nafus; Nissenbaum and Patterson). Personal data is enmeshed in ‘things’ requiring that the decisions that are both overt, subtle, and/or hidden (dark) are scrutinised for the various ways they shape social norms and create consequences for public discourse, cultural production, and the fabric of society (Gillespie). Data and personal information are retrievable from devices, sharable in SOS, and potentially exposed across networks. For these reasons, some have chosen to go dark by being “off the grid”, judiciously selecting their means of communications and their ‘friends’ carefully. 2. Is There Room for Privacy Any More When Everyone in SOS Is Watching? An interesting turn comes through counterarguments against overarching institutional surveillance that underscore the uses of technologies to watch the watchers. This involves a practice of counter-surveillance whereby technologies are tools of resistance to go ‘dark’ and are used by political activists in protest situations for both communication and avoiding surveillance. This is not new and has long existed in an increasingly dispersed media landscape (Cinque, Changing Media Landscapes). For example, counter-surveillance video footage has been accessed and made available via live-streaming channels, with commentary in SOS augmenting networking possibilities for niche interest groups or micropublics (Wilson and Serisier, 178). A further example is the Wordpress site Fitwatch, appealing for an end to what the site claims are issues associated with police surveillance (fitwatch.org.uk and endpolicesurveillance.wordpress.com). Users of these sites are called to post police officers’ identity numbers and photographs in an attempt to identify “cops” that might act to “misuse” UK Anti-terrorism legislation against activists during legitimate protests. Others that might be interested in doing their own “monitoring” are invited to reach out to identified personal email addresses or other private (dark) messaging software and application services such as Telegram (freeware and cross-platform). In their work on surveillance, Mann and Ferenbok (18) propose that there is an increase in “complex constructs between power and the practices of seeing, looking, and watching/sensing in a networked culture mediated by mobile/portable/wearable computing devices and technologies”. By way of critical definition, Mann and Ferenbok (25) clarify that “where the viewer is in a position of power over the subject, this is considered surveillance, but where the viewer is in a lower position of power, this is considered sousveillance”. It is the aspect of sousveillance that is empowering to those using dark SOS. One might consider that not all surveillance is “bad” nor institutionalised. It is neither overtly nor formally regulated—as yet. Like most technologies, many of the surveillant technologies are value-neutral until applied towards specific uses, according to Mann and Ferenbok (18). But this is part of the ‘grey area’ for understanding the impact of dark SOS in regard to which actors or what nations are developing tools for surveillance, where access and control lies, and with what effects into the future. 3. Big Brother Watches, So What Are the Alternatives: Whither the Gazing Elite in Dark SOS? By way of conceptual genealogy, consideration of contemporary perceptions of surveillance in a visually networked society (Cinque, Changing Media Landscapes) might be usefully explored through a revisitation of Jeremy Bentham’s panopticon, applied here as a metaphor for contemporary surveillance. Arguably, this is a foundational theoretical model for integrated methods of social control (Foucault, Surveiller et Punir, 192-211), realised in the “panopticon” (prison) in 1787 by Jeremy Bentham (Bentham and Božovič, 29-95) during a period of social reformation aimed at the improvement of the individual. Like the power for social control over the incarcerated in a panopticon, police power, in order that it be effectively exercised, “had to be given the instrument of permanent, exhaustive, omnipresent surveillance, capable of making all visible … like a faceless gaze that transformed the whole social body into a field of perception” (Foucault, Surveiller et Punir, 213–4). In grappling with the impact of SOS for the individual and the collective in post-digital times, we can trace out these early ruminations on the complex documentary organisation through state-controlled apparatuses (such as inspectors and paid observers including “secret agents”) via Foucault (Surveiller et Punir, 214; Subject and Power, 326-7) for comparison to commercial operators like Facebook. Today, artificial intelligence (AI), facial recognition technology (FRT), and closed-circuit television (CCTV) for video surveillance are used for social control of appropriate behaviours. Exemplified by governments and the private sector is the use of combined technologies to maintain social order, from ensuring citizens cross the street only on green lights, to putting rubbish in the correct recycling bin or be publicly shamed, to making cashless payments in stores. The actions see advantages for individual and collective safety, sustainability, and convenience, but also register forms of behaviour and attitudes with predictive capacities. This gives rise to suspicions about a permanent account of individuals’ behaviour over time. Returning to Foucault (Surveiller et Punir, 135), the impact of this finds a dissociation of power from the individual, whereby they become unwittingly impelled into pre-existing social structures, leading to a ‘normalisation’ and acceptance of such systems. If we are talking about the dark, anxiety is key for a Ministry of SOS. Following Foucault again (Subject and Power, 326-7), there is the potential for a crawling, creeping governance that was once distinct but is itself increasingly hidden and growing. A blanket call for some form of ongoing scrutiny of such proliferating powers might be warranted, but with it comes regulation that, while offering certain rights and protections, is not without consequences. For their part, a number of SOS platforms had little to no moderation for explicit content prior to December 2018, and in terms of power, notwithstanding important anxiety connected to arguments that children and the vulnerable need protections from those that would seek to take advantage, this was a crucial aspect of community building and self-expression that resulted in this freedom of expression. In unearthing the extent that individuals are empowered arising from the capacity to post sexual self-images, Tiidenberg ("Bringing Sexy Back") considered that through dark SOS (read here as unregulated) some users could work in opposition to the mainstream consumer culture that provides select and limited representations of bodies and their sexualities. This links directly to Mondin’s exploration of the abundance of queer and feminist p*rnography on dark SOS as a “counterpolitics of visibility” (288). This work resulted in a reasoned claim that the technological structure of dark SOS created a highly political and affective social space that users valued. What also needs to be underscored is that many users also believed that such a space could not be replicated on other mainstream SOS because of the differences in architecture and social norms. Cho (47) worked with this theory to claim that dark SOS are modern-day examples in a history of queer individuals having to rely on “underground economies of expression and relation”. Discussions such as these complicate what dark SOS might now become in the face of ‘adult’ content moderation and emerging tracking technologies to close sites or locate individuals that transgress social norms. Further, broader questions are raised about how content moderation fits in with the public space conceptualisations of SOS more generally. Increasingly, “there is an app for that” where being able to identify the poster of an image or an author of an unknown text is seen as crucial. While there is presently no standard approach, models for combining instance-based and profile-based features such as SVM for determining authorship attribution are in development, with the result that potentially far less content will remain hidden in the future (Bacciu et al.). 4. There’s Nothing New under the Sun (Ecclesiastes 1:9) For some, “[the] high hopes regarding the positive impact of the Internet and digital participation in civic society have faded” (Schwarzenegger, 99). My participant observation over some years in various SOS, however, finds that critical concern has always existed. Views move along the spectrum of thinking from deep scepticisms (Stoll, Silicon Snake Oil) to wondrous techo-utopian promises (Negroponte, Being Digital). Indeed, concerns about the (then) new technologies of wireless broadcasting can be compared with today’s anxiety over the possible effects of the internet and SOS. Inglis (7) recalls, here, too, were fears that humanity was tampering with some dangerous force; might wireless wave be causing thunderstorms, droughts, floods? Sterility or strokes? Such anxieties soon evaporated; but a sense of mystery might stay longer with evangelists for broadcasting than with a laity who soon took wireless for granted and settled down to enjoy the products of a process they need not understand. As the analogy above makes clear, just as audiences came to use ‘the wireless’ and later the internet regularly, it is reasonable to argue that dark SOS will also gain widespread understanding and find greater acceptance. Dark social spaces are simply the recent development of internet connectivity and communication more broadly. The dark SOS afford choice to be connected beyond mainstream offerings, which some users avoid for their perceived manipulation of content and user both. As part of the wider array of dark web services, the resilience of dark social spaces is reinforced by the proliferation of users as opposed to decentralised replication. Virtual Private Networks (VPNs) can be used for anonymity in parallel to TOR access, but they guarantee only anonymity to the client. A VPN cannot guarantee anonymity to the server or the internet service provider (ISP). While users may use pseudonyms rather than actual names as seen on Facebook and other SOS, users continue to take to the virtual spaces they inhabit their off-line, ‘real’ foibles, problems, and idiosyncrasies (Chenault). To varying degrees, however, people also take their best intentions to their interactions in the dark. The hyper-efficient tools now deployed can intensify this, which is the great advantage attracting some users. In balance, however, in regard to online information access and dissemination, critical examination of what is in the public’s interest, and whether content should be regulated or controlled versus allowing a free flow of information where users self-regulate their online behaviour, is fraught. O’Loughlin (604) was one of the first to claim that there will be voluntary loss through negative liberty or freedom from (freedom from unwanted information or influence) and an increase in positive liberty or freedom to (freedom to read or say anything); hence, freedom from surveillance and interference is a kind of negative liberty, consistent with both libertarianism and liberalism. Conclusion The early adopters of initial iterations of SOS were hopeful and liberal (utopian) in their beliefs about universality and ‘free’ spaces of open communication between like-minded others. This was a way of virtual networking using a visual motivation (led by images, text, and sounds) for consequent interaction with others (Cinque, Visual Networking). The structural transformation of the public sphere in a Habermasian sense—and now found in SOS and their darker, hidden or closed social spaces that might ensure a counterbalance to the power of those with influence—towards all having equal access to platforms for presenting their views, and doing so respectfully, is as ever problematised. Broadly, this is no more so, however, than for mainstream SOS or for communicating in the world. References Bacciu, Andrea, Massimo La Morgia, Alessandro Mei, Eugenio Nerio Nemmi, Valerio Neri, and Julinda Stefa. “Cross-Domain Authorship Attribution Combining Instance Based and Profile-Based Features.” CLEF (Working Notes). Lugano, Switzerland, 9-12 Sep. 2019. Bentham, Jeremy, and Miran Božovič. The Panopticon Writings. London: Verso Trade, 1995. Biddle, Peter, et al. “The Darknet and the Future of Content Distribution.” Proceedings of the 2002 ACM Workshop on Digital Rights Management. Vol. 6. Washington DC, 2002. Bruns, Axel. Blogs, Wikipedia, Second Life, and Beyond: From Production to Produsage. New York: Peter Lang, 2008. Chenault, Brittney G. “Developing Personal and Emotional Relationships via Computer-Mediated Communication.” CMC Magazine 5.5 (1998). 1 May 2020 <http://www.december.com/cmc/mag/1998/may/chenault.html>. Cho, Alexander. “Queer Reverb: Tumblr, Affect, Time.” Networked Affect. Eds. K. Hillis, S. Paasonen, and M. Petit. Cambridge, Mass.: MIT Press, 2015: 43-58. Cinque, Toija. Changing Media Landscapes: Visual Networking. London: Oxford UP, 2015. ———. “Visual Networking: Australia's Media Landscape.” Global Media Journal: Australian Edition 6.1 (2012): 1-8. Cinque, Toija, and Adam Brown. “Educating Generation Next: Screen Media Use, Digital Competencies, and Tertiary Education.” Digital Culture & Education 7.1 (2015). Draper, Nora A., and Joseph Turow. “The Corporate Cultivation of Digital Resignation.” New Media & Society 21.8 (2019): 1824-1839. Fellous, Jean-Marc, and Michael A. Arbib, eds. Who Needs Emotions? The Brain Meets the Robot. New York: Oxford UP, 2005. Fernández-Caramés, Tiago M. “From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things.” IEEE Internet of Things Journal 7.7 (2019): 6457-6480. Foucault, Michel. Surveiller et Punir: Naissance de la Prison [Discipline and Punish—The Birth of The Prison]. Trans. Alan Sheridan. New York: Random House, 1977. Foucault, Michel. “The Subject and Power.” Michel Foucault: Power, the Essential Works of Michel Foucault 1954–1984. Vol. 3. Trans. R. Hurley and others. Ed. J.D. Faubion. London: Penguin, 2001. Gehl, Robert W. Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P. Cambridge, Massachusetts: MIT Press, 2018. Gehl, Robert, and Fenwick McKelvey. “Bugging Out: Darknets as Parasites of Large-Scale Media Objects.” Media, Culture & Society 41.2 (2019): 219-235. Gillespie, Tarleton. Custodians of the Internet: Platforms, Content Moderation, and the Hidden Decisions That Shape Social Media. London: Yale UP, 2018. Habermas, Jürgen. The Structural Transformation of the Public Sphere: An Inquiry into a Category of Bourgeois Society. Trans. Thomas Burger with the assistance of Frederick Lawrence. Cambridge, Mass.: MIT Press, 1989. Inglis, Ken S. This Is the ABC: The Australian Broadcasting Commission 1932–1983. Melbourne: Melbourne UP, 1983. Iron Maiden. “Fear of the Dark.” London: EMI, 1992. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York UP, 2006. Lasica, J. D. Darknet: Hollywood’s War against the Digital Generation. New York: John Wiley and Sons, 2005. Mahmood, Mimrah. “Australia's Evolving Media Landscape.” 13 Apr. 2021 <https://www.meltwater.com/en/resources/australias-evolving-media-landscape>. Mann, Steve, and Joseph Ferenbok. “New Media and the Power Politics of Sousveillance in a Surveillance-Dominated World.” Surveillance & Society 11.1/2 (2013): 18-34. McDonald, Alexander J. “Cortical Pathways to the Mammalian Amygdala.” Progress in Neurobiology 55.3 (1998): 257-332. McStay, Andrew. Emotional AI: The Rise of Empathic Media. London: Sage, 2018. Mondin, Alessandra. “‘Tumblr Mostly, Great Empowering Images’: Blogging, Reblogging and Scrolling Feminist, Queer and BDSM Desires.” Journal of Gender Studies 26.3 (2017): 282-292. Neff, Gina, and Dawn Nafus. Self-Tracking. Cambridge, Mass.: MIT Press, 2016. Negroponte, Nicholas. Being Digital. New York: Alfred A. Knopf, 1995. Nissenbaum, Helen, and Heather Patterson. “Biosensing in Context: Health Privacy in a Connected World.” Quantified: Biosensing Technologies in Everyday Life. Ed. Dawn Nafus. 2016. 68-79. O’Loughlin, Ben. “The Political Implications of Digital Innovations.” Information, Communication and Society 4.4 (2001): 595–614. Quandt, Thorsten. “Dark Participation.” Media and Communication 6.4 (2018): 36-48. Royal Society for Public Health (UK) and the Young Health Movement. “#Statusofmind.” 2017. 2 Apr. 2021 <https://www.rsph.org.uk/our-work/campaigns/status-of-mind.html>. Statista. “Number of IoT devices 2015-2025.” 27 Nov. 2020 <https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/>. Schwarzenegger, Christian. “Communities of Darkness? Users and Uses of Anti-System Alternative Media between Audience and Community.” Media and Communication 9.1 (2021): 99-109. Stoll, Clifford. Silicon Snake Oil: Second Thoughts on the Information Highway. Anchor, 1995. Tiidenberg, Katrin. “Bringing Sexy Back: Reclaiming the Body Aesthetic via Self-Shooting.” Cyberpsychology: Journal of Psychosocial Research on Cyberspace 8.1 (2014). The Great Hack. Dirs. Karim Amer, Jehane Noujaim. Netflix, 2019. The Social Dilemma. Dir. Jeff Orlowski. Netflix, 2020. Turkle, Sherry. The Second Self: Computers and the Human Spirit. Cambridge, Mass.: MIT Press, 2005. Turkle, Sherry. Alone Together: Why We Expect More from Technology and Less from Each Other. UK: Hachette, 2017. Turow, Joseph, and Andrea L. Kavanaugh, eds. The Wired Homestead: An MIT Press Sourcebook on the Internet and the Family. Cambridge, Mass.: MIT Press, 2003. Von Nordheim, Gerret, and Katharina Kleinen-von Königslöw. “Uninvited Dinner Guests: A Theoretical Perspective on the Antagonists of Journalism Based on Serres’ Parasite.” Media and Communication 9.1 (2021): 88-98. Williams, Chris K. “Configuring Enterprise Public Key Infrastructures to Permit Integrated Deployment of Signature, Encryption and Access Control Systems.” MILCOM 2005-2005 IEEE Military Communications Conference. IEEE, 2005. Wilson, Dean, and Tanya Serisier. “Video Activism and the Ambiguities of Counter-Surveillance.” Surveillance & Society 8.2 (2010): 166-180.

APA, Harvard, Vancouver, ISO, and other styles

You might also be interested in the bibliographies on the topic 'John A. Roebling's Sons Company' for other source types:

Books

We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography
Journal articles: 'John A. Roebling's Sons Company' – Grafiati (2024)

References

Top Articles
Latest Posts
Article information

Author: Patricia Veum II

Last Updated:

Views: 5945

Rating: 4.3 / 5 (64 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Patricia Veum II

Birthday: 1994-12-16

Address: 2064 Little Summit, Goldieton, MS 97651-0862

Phone: +6873952696715

Job: Principal Officer

Hobby: Rafting, Cabaret, Candle making, Jigsaw puzzles, Inline skating, Magic, Graffiti

Introduction: My name is Patricia Veum II, I am a vast, combative, smiling, famous, inexpensive, zealous, sparkling person who loves writing and wants to share my knowledge and understanding with you.