To see the other types of publications on this topic, follow the link: J.M. McCullough's Sons Company.

Journal articles on the topic 'J.M. McCullough's Sons Company'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 21 journal articles for your research on the topic 'J.M. McCullough's Sons Company.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Newbury, Colin. "Technology, Capital, and Consolidation: The Performance of De Beers Mining Company Limited, 1880–1889." Business History Review 61, no. 1 (1987): 1–42. http://dx.doi.org/10.2307/3115773.

Full text
Abstract:
In this article, Dr. Newbury focuses on the technical and financial reasons for amalgamation at the Kimberley mines in South Africa, drawing on primary records to account for the rise of De Beers as the world's major diamond mining company in the 1880s. He finds that prior experience in local government and on the mining boards prepared company directors for competition in joint stock enterprise, while differences in production policies and performance influenced the pattern of mergers within and among the four Kimberley mines. De Beers's close relationship with diamond merchants and private banks in London, particularly N. M. Rothschild & Sons, was central to its position as a prime mover toward consolidation. Dr. Newbury views De Beers as a firm that relied for its success less on its renowned chairman, Cecil J. Rhodes, than on a combined managerial expertise that reflected the interests of both mining producers and merchant buyers.
APA, Harvard, Vancouver, ISO, and other styles
2

Santoso, Halim Budi, Priyanka Ayu Sonia Putri, and Budi Sutedjo Dharma Oetomo. "Implementation of Sales Executive Dashboard for A Multistore Company in Yogyakarta." International Journal of New Media Technology 4, no. 1 (June 14, 2017): 59–68. http://dx.doi.org/10.31937/ijnmt.v4i1.540.

Full text
Abstract:
Information Technology is a part of strategic part for enterprise strategic planning. Information Technology can help the enterprise to determine its strategic planning. Through data from the past, thecompany can learn something and help to decide some strategic issue. A Multistore Company in Yogyakarta has more than five stores. The problem raises to generate real-time sales reporting. Sales manager and owner do not have access to real-time sales condition. To ease management analyzing and reporting sales condition, dimension model of the sales data needs to be built. This dimension model will help to make executive report from some dimensions mentioned in data warehouse. Sales data will pass through some processes: Extract, Transform, and Load (ETL) in order to prepare the data warehouse. This process is preprocessing data before dimensional model is built. In this research multi-dimensional modelling by taking data from 3 stores ranging from 1 February 2014 to 31 January 2015. By implementing sales executive dashboard, it helps to monitor and analyze sales condition. Dashboard shows graphic which ease user, especially sales manager and owner to learn current and updated sales condition based on dimensions: time, outlet / store, and product. Report gives detail information and multidimensionalhelps to analyze data from different perspective. Index Terms—Dashboard, Multi Dimentional Model, ETL, Executive Reporting REFERENCES[1] W. Eckerson, Performance Dashboard: Measuring,Monitoring, and Managing Your Business, New Jersey: JohnWiley & Sons, 2011. [2] O. Romero and A. Abello, "A Survey of MultidimensionalModelling Methodologies," International Journal of Data Warehousing and Mining, vol. 5, no. 2, pp. 1-23, 2009. [3] R. Kimball and J. Caserta, The Data Warehouse ETL Toolkit:Practical Techniques for Extracting, Cleaning, Conforming, and Delivering Data, Indianapolis: Wiley Publishing, Inc., 2004. [4] G. Dhillon and J. Backhouse, "Information System Security Management in the New Millenium," Communications of the ACM, vol. 43, no. 7, pp. 125-128, 2000. [5] C. Ballard, D. M. Farrell, A. Gupta, C. Mazuela and S. Vohnik, Dimensional Modelling: In a Business Intelligence Environment, IBM Redbooks, 2006. [6] E. Fernández-Medina, J. Trujillo and M. Piattini, "Modeldriven multidimensional modeling of secure datawarehouses," European Journal of Information Systems, vol. 16, no. 4, pp. 374-389, 2007. [7] E. Johnson and J. Jones, Building ETL Processes for Business Intelligence Solutions Built on Microsoft SQL Server, CA ERwin, 2007. [8] J. Mylopoulos, L. Liu and M. T. Owen, "Database Design," inEnsyclopedia of Database System, United States, Springer,2009, pp. 708 - 710. [9] K. R. Gadda and S. Dey, "Business Intelligence for PublicSector Banks in India: A Case study. Design, Development,and Deployment," Journal of Finance, Accounting and Management, vol. 5, no. 2, pp. 37-58, 2014. [10] D. J. Power, "DSS Resources," 6 June 2007. [Online]. Available: http://dssresources.com/. [Accessed 29 May 2017]. [11] D. Hedgebeth, "Data-driven decision making for the enterprise: an overview of business intelligence applications," The Journal of Information and Knowledge Management System, vol. 37, no. 4, pp. 414-420, 2007. [12] S. Williams and N. Williams, The Profit Impact of Business Intelligence, San Fransisco: Elsevier, 2007. [13] Imelda, "Business Intelligence," in Majalah Ilmiah Unikom, Bandung, UNIKOM, 2013, pp. 111-112.
APA, Harvard, Vancouver, ISO, and other styles
3

Felicia and Rizka Indri Arfianti. "PENGARUH LEVEL DIVERSIFIKASI, JUMLAH SEGMEN, DAN JENIS SEKTOR INDUSTRI TERHADAP KINERJA PERUSAHAAN PADA PERUSAHAAN MANUFAKTUR YANG TERDAFTAR DI BURSA EFEK INDONESIA TAHUN 2016 – 2018." Jurnal Akuntansi 9, no. 2 (August 15, 2020): 73–92. http://dx.doi.org/10.46806/ja.v9i2.762.

Full text
Abstract:
The high competition in the business world with many competitors has forced the company to develop its business, one of them by diversification. This study aims to investigate the influence of diversification level, segment numbers, and industrial sector types on firm performance measured by the excess value. The theory underlying this research is agency theory, which describes the relationship between the company owner with the company management, The number of samples of this study are 333 companies from miscellaneous industry sector, and consumer goods sector, and basic industry and chemicals sector listed on the Indonesia Stock Exchange throughout 2017 – 2018. The results showed that data can be pooled for 3 years, all classic assumption tests are fulfilled, and partial regression coefficient test found that variable diversification level and variable number of segments > 0.05, then Ho1 and Ho2 rejected, while type of miscellaneous industry sector and Type of consumer goods sector <0.05, then Ho3 and Ho4 received. The conclusion showed that variable diversification level and variable number of segments has not sufficient evidence of negative effect on excess value, while type of miscellaneous industry sector and Type of consumer goods sector sufficient evidence of negative effect on excess value. Keywords: Firm Performance, Diversification Level, Number of Segments, and Industrial Sector. References: Amyulianthy, R., & Nuraini, Sari. (2013), “Pengaruh Diversifikasi Terhadap Kinerja Perusahaan”, Binus Business Review, Vol.4, no.1, pp.215–230. Berger, P. G., & Eli, O. (1995), “Diversification’s Effect on Firm Value”, Journal of Financial Economics, Vol.37, pp.39–65. Bowerman, B. L., O’Connell, R. T., & Murphree, E. S. (1979), Business Statistics in Practice, Edisi 7, New York: McGraw-Hill/Irwin. Chandra, D., & Triyani, Y. (2015), “Pengaruh Level Diversifikasi, Leverage, Return On Asset, Umur Perusahaan, Dan Sektor Industri Terhadap Nilai Perusahaan Yang Terdaftar Di BEI Periode 2009-2011”, Jurnal Akuntansi Manajemen, Vol.4, no.2, pp.66–84. Cooper, D. R., & Schindler, P. S. (2013), Business Research Methods, Edisi 12, New York: McGraw-Hill. 'Diversifikasi Usaha, Unilever Masuk Bisnis Saus Sambal' (2018), CNBC Indonesia, 28 September, diakses 9 Oktober 2019, https://www.cnbcindonesia.com/market/20180928100757-17-35152/diversifikasi-usaha-unilever-masuk-bisnis-saus-sambal Ghozali, I. (2013), Aplikasi Analisis Multivariette Dengan Program IBM SPSS 23, Edisi 8, Semarang: Badan Penerbit Universitas Diponegoro. Gujarati, D., & Dawn, P. (2009), Basic Econometrics, Edisi 4, New York: McGraw-Hill. Harto, P. (2005), “Kebijakan Diversifikasi Perusahaan Dan Pengaruhnya Terhadap Kinerja: Studi Empiris Pada Perusahaan Publik Di Indonesia”, SNA VIII Solo, pp.297-307. Ikatan Akuntan Indonesia (2014), Standar Akuntansi Keuangan, Jakarta: Salemba Empat. Jensen, M. C., & William, H. M. (1976), "Theory of The Firm: Managerial Behavior, Agency Cost and Ownership Structure", Journal of Financial Economic, Vol.3, No.4, pp.1-75. Kamus Besar Bahasa Indonesia. 2014. “Kamus Besar Bahasa Indonesia Online”, diakses 5 Oktober 2019 http://www.kbbi.web.id. Kieso, D. E., Weygandt, J. J., & Warfield, T. D. (2016), Intermediate Accounting, Edisi 16, John Wiley and Sons, Inc. Lucyanda, J., & Wardhani, R. H. K. (2017), “Pengaruh Diversifikasi Dan Karakteristik Perusahaan Terhadap Kinerja Perusahaan”, Jurnal Riset Akuntansi dan Keuangan. Montgomery, Cynthia A. (1994), Corporate Diversification, Journal of Economic Perspectives, Vol.8, No.3, pp.163-178. Rani, P. (2015). “Peran Kepemilikan Manajerial Dalam Memoderasi Pengaruh Strategi Diversifikasi Terhadap Kinerja Perusahaan”, Jurnal Akuntansi dan Keuangan, Vol.4, no.2, pp.162–82. Salindeho, A. O., Ivonne, S. S., & Joubert, B. M. (2018), “Pengaruh Diversifikasi Usaha Terhadap Kinerja Keuangan Dan Return Saham Study Kasus Pada Perusahaan Manufaktur Automotive and Effect of Business Diversification of Financial Performance and Return Stock Case Stock in Automotive and Component Manufacturing”, Jurnal Riset Akuntansi dan Keuangan, Vol.6, no.3, pp.1078–87. Sari, I. A., Wiratno, A., & Suyono, E. (2014), “Pengaruh Strategi Diversifikasi Dan Karakteristik Perusahaan Terhadap Kinerja Perusahaan”, JAFFA (Journal of Auditing, Finance, and Forensic Accounting), Vol.02, no.1, pp.13–22. Scott, W. R. (2015), Financial Accounting Theory, Edisi 7, Toronto: Pearson Canada Inc. Setionoputri, A., Meiden, C., & Siagian, D. (2007), “Pengaruh Diversifikasi Korporat Terhadap Excess Value Perusahaan Manufaktur, Perdagangan Grosir Dan Eceran, Serta Properti Dan Real Estate Yang Terdaftar Di BEI Tahun 2005-2007” Bidang Akuntansi Private: Akuntansi Keuangan dan Pasar Modal, pp.1–25. Satoto, S. S. (2009), “Strategi Diversifikasi Terhadap Kinerja Perusahaan”, Jurnal Keuangan dan Perbankan, Vol.13, no.2, pp.280–287. Spence, M. (2002), “Signaling in Retrospect and the Informational Structure of Markets”, American Economic Review, Vol.92, no.3, pp.434–459. Thompson, A. J. G., & Peteraf, M. (2012), Crafting and Executing Strategy: Concept and Cases, Edisi 18, New York: McGraw Hill. Virginia, Y. M., & Ratnasih, C. (2017), “Pengaruh Lingkungan Kerja Dan Stres Kerja Terhadap Produktivitas Kerja Dan Berimplikasi Pada Kinerja Karyawan”, Journal of Chemical Information and Modeling, Vol.53, no.9, pp.1689–99. Wolk, H. I., Dodd, J. L., & Tearney, M. G. (2003), Accounting Theory: Conceptual Issues in a Political and Economic Environment, Edisi 6, Mason: South-Western College Pub.
APA, Harvard, Vancouver, ISO, and other styles
4

Ruiz, Yadira, Viviana Valenzuela, and Julio Tapia. "EL CONTROL INTERNO COMO INSTRUMENTO DE GESTIÓN DE LIQUIDEZ EMPRESARIAL: UN ANÁLISIS META-ANALÍTICO EN EL CANTÓN LATACUNGA." Universidad Ciencia y Tecnología 24, no. 106 (November 15, 2020): 5–12. http://dx.doi.org/10.47460/uct.v24i106.389.

Full text
Abstract:
En las organizaciones se presentan varias debilidades vulnerables en los sistemas de control interno y en la manera en que las empresas gestionan su liquidez, de modo, que el control interno debe garantizar la efectividad de los objetivos económicos empresariales. El objetivo de este trabajo es analizar el constructo teórico del control interno mediante el modelo COSO, a través de un análisis meta-analítico. Adicionalmente, se aplicó la técnica estadística de meta-análisis, con el fin de evaluar el nivel de significancia y su sesgo de error, por tal razón se direccionó bajo un diseño metodológico mixto. Los resultados revelaron que el factor ambiente de control, es descuidado por parte de las organizaciones debido al empirismo que maneja el directorio administrativo de las pequeñas y medianas empresas. Se concluye que el modelo COSO, si mantiene relación consistente con el control interno y la gestión de liquidez empresarial. Palabras Clave: control interno, liquidez, gestión empresarial. Referencias [1]A. I. Calderón Peña y K. J. Jáuregui Salcedo, «El control interno y su relación con el cumplimiento de las obligaciones tributarias en las empresas comerciales,Chaclacayo, 2015,» Revista de Investigación Universitaria, vol. 5, nº 1, pp. 32-27, 2016. [2]H. Almeida, M. Campello, I. Cunha y M. S. Weisbach, «Corporate Liquidity Management: A conceptual Framework and Survey» El Annual Review of FinancialEconomics, vol. 6, pp. 135-162, 2014. [3]R. M. Cedeño Zambrano y L. M. Morell González, La gestión de riesgos en Ecuador: una aproximaciónevolutiva desde el control interno,» Cofín Habana., vol.12, nº 2, pp. 306-318, 2018. [4]M. P. Suntasig Tigse, El control interno del proceso de concesión de créditos y cobranzasy su incidencia en la liquidez de la empresa cereales La Pradera de la parroquia Belisario Quevedo, en el primer trimestre del año 2014, Latacunga: Universidad Técnica de Cotopaxi, 2014. [5]L. Graham, Internal Control Audit and Compliance, Canadá: JohnWiley & Sons, Inc., Hoboken, New Jersey. Published, 2015. [6]S. Mantilla, Auditoría del control interno (3a. ed.), México: ECOE, 2013. [7]N. Viloria, «Factores que inciden en el sistema de control interno de una organización.,» Actualidad Contable Faces, vol. 8, nº 11, pp. 87-92, 2005. [8]M. Samuel, Internal Control- Integrated Framework.,México: ECOE, 2008. [9]R. Estupiñán Gaitán, Administración de riesgos E.R.M. y la auditoría interna, 2006. [10]G. Rivas Márquez, «Modelos contemporáneos de control interno. Fundamentos teóricos,» Observatorio Laboral Revista Venezolana, vol. 4, nº 8, pp. 115-136, 2011. [11]S. A. Mantilla B, Control Interno Informe COSO, 2017. [12]L. R. Sánchez Sánchez, «COSO ERM y la Gestión de Riesgos.,» QUIPUKAMAYOC Revista de la Facultad de Ciencias Contables, vol. 23, nº 44, pp. 43-50, 2015. [13]M. E. Vivanco Vergara, «Los manuales de procedimientos como herramientas de control interno de una organización,» vol. 9, pp. 313-318, 2017. [14]A. L. Quispe Otoma, M. P. Padilla Matínez y J. A. Telot, «Tecnologías de información y comunicación en la gestión empresarial de pymes comerciales,» vol. XXXVIII, nº 1, pp. 81-92, 2017. [15]I. Domínguez García, «Evolución de la teoría sobre el análisis y gestión de la liquidez empresarial,» vol. 9, nº 1, pp. 66-80, 2015. [16]L. Gitman y C. Zutter, Prinpios de administración financiera, México, 2012. [17]F. Madrigal, S. Ayala y L. Chávez, «Análisis e interpretaciónde estados financieros en condiciones de incertidumbre,» vol. 2, p. 380, 2015. [18]J. Sánchez, «Cómo realizar una revisión sistemática y un meta-análisis,» Aula abierta, vol. 38, nº 2, pp. 53-64, 2010. [19]D. Ojeda y J. Wurth, «Qué es un Meta análisis ?,»Revista Chilena de Anestesía, nº 43, pp. 343-350, 2014. [20]J. A. González, E. Cobo y M. Villaró, «Revisión sistemática y meta-análisis,» Bioestadistica para no estadísticos, pp. 1-42, 2014. [21]E. Osadchy y E. M. Akhmetshin, «Development of the financial control system in the company in crisis,» Mediterranean Journal of Social Sciences, vol. 6, nº552, pp. 390-398, 2015. [22]I. C. Asubadin Azubadin, Control interno del Proceso de compras y su incidencia en la liquidez de la empresa comercial Yucailla Cia. Ltda. Latacunga durante el año 2010”, Latacunga: Universidad Técnica de Ambato, 2011. [23]J. C. Viera Quishpe, Diseño de un sistema de control interno administrativo y contable para el laboratorio autoservicio diésel de la sierra, ubicado en la ciudad de Latacunga, Latacunga: Universidad Central del Ecuador, 2015. [24]M. Nava Rosillón, «Análisis financiero: una herramienta clave para una gestión financiera eficiente.,» Revista Venezolana de Gerencia, vol. 14, nº 48, pp. 606-628, 2009. [25]S. P. Guayaquil Villarroel, El control interno y la razonabilidad de la información financiera en el Centro Comercial Popular de la ciudad de Latacunga en los locales comerciales de calzado en el período Enero - Junio 2016, Latacunga: Universidad Técnica de Ambato, 2015. [26]A. Masli, G. E. Peters, V. J. Richardson y J. Sanchez, «Examining the potential benefits of internal control monitoring technology, » Accounting Review, vol.85, nº 3, pp. 1001-1034, 2010. [27]D. C. Chasi Toca, “Gestión de riesgos y su incidencia en el control interno en el departamento financiero de la florícola fegacón cía. Ltda. Parroquia Joseguango bajo, cantón Latacunga, provincia de Cotopaxi”, Latacunga: Universidad Técnica De Cotopaxi Facultad, 2017.
APA, Harvard, Vancouver, ISO, and other styles
5

Silva, Joao Carlos Marques, and José Azevedo Pereira. "Taking the highway out: exiting the stock market to maximize results." CASE Journal 18, no. 2 (December 29, 2021): 170–219. http://dx.doi.org/10.1108/tcj-01-2021-0020.

Full text
Abstract:
Theoretical basis The essence of discounted cash flow valuation is simple; the asset is worth the expected cash flows it will generate, discounted to the reference date for the valuation exercise (normally, the day of the calculation). A survey article was written in Parker (1968), where it was stated that the earliest interest rate tables (use to discount value to the present) dated back to 1340. Works from Boulding (1935) and Keynes (1936) derived the IRR (Internal Rate of Return) for an investment. Samuelson (1937) compared the IRR and NPV (Net Present Value) approaches, arguing that rational investors should maximize NPV and not IRR. The previously mentioned works and the publication of Joel Dean’s reference book (Dean, 1951) on capital budgeting set the basis for the widespread use of the discounted cash flow approach into all business areas, aided by developments in portfolio theory. Nowadays, probably the model with more widespread use is the FCFE/FCFF (Free Cash Flow to Equity and Free Cash Flow to Firm) model. For simplification purposes, we will focus on the FCFE model, which basically is the FCF model’s version for the potential dividends. The focus is to value the business based on its dividends (potential or real), and thus care must be taken in order not to double count cash flows (this matter was treated in this case) and to assess what use is given to that excess cash flow – if it is invested wisely, what returns will come of them, how it is accounted for, etc. (Damodaran, 2006). The bridge to the FCFF model is straightforward; the FCFF includes FCFE and added cash that is owed to debtholders. References: Parker, R.H. (1968). “Discounted Cash Flow in Historical Perspective”, Journal of Accounting Research, v6, pp58-71. Boulding, K.E. (1935). “The Theory of a Single Investment”, Quarterly Journal of Economics, v49, pp479-494. Keynes, J. M. (1936). “The General Theory of Employment”, Macmillan, London. Samuelson, P. (1937). “Some Aspects of the Pure Theory of Capital”, Quarterly Journal of Economics, v51, pp. 469–496. Dean, Joel. (1951). “Capital Budgeting”, Columbia University Press, New York. Damodaran, A. (2006). “Damodaran on Valuation”, Second Edition, John Wiley and Sons, New York. Research methodology All information is taken from public sources and with consented company interviews. Case overview/synopsis Opportunities for value creation may be found in awkward and difficult circumstances. Good strategic thinking and ability to act swiftly are usually crucial to be able to take advantage of such tough environments. Amidst a country-wide economic crisis and general disbelief, José de Mello Group (JMG) saw one of its main assets’ (Brisa Highways) market value tumble down to unforeseen figures and was forced to act on it. Brisa’s main partners were eager in overpowering JMG’s control of the company, and outside pressure from Deutsche Bank was rising, due to the use of Brisa’s shares as collateral. JMG would have to revise its strategy and see if Brisa was worth fighting for; the market implicit assessment about the company’s prospects was very penalizing, but JMG’s predictions on Brisa’s future performance indicated that this could be an investment opportunity. Would it be wise to bet against the market? Complexity academic level This study is excellent for finance and strategy courses, at both undergraduate and graduate levels. Company valuation and corporate strategy are required.
APA, Harvard, Vancouver, ISO, and other styles
6

Кючуков, Хрісто. "“Parno Sar Papin – White as a Swan”, Or How Metaphors Help Roma Children to Acquire Grammatical Categories in Romani." East European Journal of Psycholinguistics 4, no. 1 (June 27, 2017): 100–113. http://dx.doi.org/10.29038/eejpl.2017.4.1.kyu.

Full text
Abstract:
The paper presents the process of language socialization and acquisition of grammatical categories through the Roma oral culture in which metaphors are extensively used. Roma children who grow up in extended Roma families and community learn the language through communication with speakers of different registers. Research with 22 Roma children between three and six years of age from Croatia was carried in order to find out what grammatical categories are learned in this period of the life of children. The children were tested with a specially designed language assessment test in Romani (Kyuchukov & de Villiers, 2014b). The results show that Roma boys perform the test much better than Roma girls. Boys learn Romani from folkloristic genres which are rich in metaphors and this helps them to acquire complex grammatical categories. References Beller, S. (2008). Fostering Language Acquisition in Daycare Settings. The Hague:Bernard van Leer Foundation. Black, B. & Logan, A. (1995). Links between communication patterns in mother-child,father-child, and child-peer interactions and children’s social status. Child Development,66, 255–271. Bloom, L. et al. (1996). Early conversations and word learning: contributions form childand adult. Child Development, 67, 3154–3175. Blount, B. (1995). Parental speech and language acquisition: and anthropologicalperspective. In: Language, Culture, and Society. A book of Readings. Second edition, (pp.551–566). B. Blount (ed.). Prospect Heights, IL: Waveland Press. Bokus, B. & Garstka, T. (2009). Toward a shared metaphoric meaning in children’sdiscourse. The role of argumentation. Polish Psychological Bulletin, 40(4), 193–203. Bowdle, B. (1998) Alignment and Abstraction in Metaphor. In: Advances in AnalogyResearch: Integration of Theory and Data form the Cognitive, Computational and NeutralSciences, (pp. 300–307). K. Holiyok, D. Gentner & K. Kokinov (Eds.). Sofia: NewBulgarian University. Crystal, D. (1992). An Encyclopedic Dictionary of Language and Languages. London:Penguin Dryll, E. (2009). Changes in metaphor comprehension in children. Polish PsychologicalBulletin, 40(4), 204 – 212. Elbers, E., Maier, R., Hoekstra, T., Hoogsteder, M. (1992) Internalization and adult-childinteraction. Learning and Instruction, 2, 101–118. Ervin, S. & Miller, W. (1972). Language Development. In: Readings in the Sociology ofLanguage, (pp. 68–98). J. Fishman (ed.). The Hague: Mouton. Gleason, J. Berko (1992). Language Acquisition and Socialization. University Lecture.Boston: Boston University Press. Granquist, K. (2012). Metaphors of Finish Roma in Finish and Romani. In: EndangeredMetaphors, (pp. 293–313). A. Idstrom, T. Falzett, E. Piirainen (eds.). Amsterdam: JohnBenjamins Publishing Company. Haslett, B. (1989). Communication and language acquisition within a cultural context. In:Language, Communication and Culture. Current Directions, (pp. 19–34). S. TingToomey & F. Korzenny (eds.). Newbury Park, CA: SAGE Publications. Hoff, E. (2003). Language development in childhood. In: Handbook of Psychology. Vol.6. Developmental Psychology, (pp. 171– 193). R. Lerner, M.A. Easterbrooks, J. Mistry(eds.). Hoboken, NJ: John Wiley &Sons. Kubanik, P. (2016). Using Romani in language socialization in a Czech family. In: Roma:Past, Present, Future, (pp. 238–249). H. Kyuchukov, E. Marushiakova & V. Popov (eds).Munich: Lincom, Kyuchukov, H. (2014a). Acquisition of Romani in a bilingual context. Psychology ofLanguage and Communication, 18, 211–225. Kyuchukov, H. (2014b). Romani language assessment of Roma children. Journal ofLanguage and Cultural Education, 2, 52–64. Kyuchukov, H. (2010). Romani language competence. In: Situation of Roma Minority inCzech, Hungary, Poland and Slovakia, (pp. 427–465). J. Balvin and L. Kwadrants (eds.).Wroclaw: Prom. Kyuchukov, H. & de Villiers, J. (2014a). Roma children’s knowledge on Romani.Journal of Psycholinguistics, 19, 58–65. Kyuchukov, H. & de Villiers, J. (2014b) Addressing the rights of Roma children for alanguage assessment in their native language of Romani. Poster presented at the35th Annual Symposium on Research in Child Language Disorders. Madison,Wisconsin June 12–14. Kyuchukov, H., Kaleja, M. &Samko, M. (2016). Roma parents as educators of theirchildren. Intercultural Education, 26, 444–448. Lakoff, G. & Johnson, M. (1980). Metaphors We Live By. Chicago: The University ofChicago Press. Macwhinney, B. (2001) First language acquisition. In: The Handbook of Linguistics, (pp.466–489). M. Aronoff & J. Rees-Miller (eds.). Oxford: Blackwell Publisher. Ochs, E. & Schieffelin, B. (1983). Acquiring Conversational Competence. London:Routledge & Kegan Paul. Ochs, E. & Schieffelin, B. (1995). Language acquisition and Socialization: Threedevelopmental stories and their implications. In: Language, Culture, and Society. A bookof Readings. Second edition, (pp. 470–512). B. Blount (ed.). Prospect Heights, IL:Waveland Press. Ozcaliskan, S. (2014). Development of metaphor. In: Encyclopedia of languagedevelopment, (pp. 374–375). P. Brookse, V. Kempe, & G.J. Golson (eds.). NY: SagePublishers. Penalosa, F. (1981). Introduction to the sociology of language. Rowley, MA: NewburyHouse Publishers. Rácová, A. & Samko, M. (2015). Structural Patterns and Functions of ReduplicativeConstructions in Slovak Romani. Asian and African Studies, 24, 165–189. Reger, Z. & Gleason, J. Berko (1991). Romani child-directed speech and children’slanguage among Gypsies in Hungary. Language in Society, 20(4), 601–617. Reger, Z. (1999). Teasing in the linguistic socialization of Gypsy children in Hungary.Acta Linguistica Hungarica, 46(3–4), 289–315. Rondal, J. (1985). Adult-Child Interaction and the Process of Language Acquisition. NewYork: Praeger Publishers. Samko, M. & Kapalková, S. (2014). Analýza naratívnej schopnosti rómskeho dieťaťa vrómčine a slovenčine. Psychológia a Patopsychológia Dieťaťa, 48, 372–384. Winner, E. (1988). The Point of Words. Children’s Understanding of Metaphor andIrony. Cambridge, MA: Harvard University Press.
APA, Harvard, Vancouver, ISO, and other styles
7

Nuhin, Muhammad Al Fansa, and Noven Suprayogi. "Pengaruh Kinerja Manajemen, Efisiensi, Kinerja Underwriting dan Likuiditas terhadap Profitabilitas Perusahaan Asuransi Syariah di Indonesia Periode 2015-2019." Jurnal Ekonomi Syariah Teori dan Terapan 9, no. 5 (September 30, 2022): 628–42. http://dx.doi.org/10.20473/vol9iss20225pp628-642.

Full text
Abstract:
ABSTRAK Penelitian ini bertujuan untuk mengetahui pengaruh kinerja manajemen, efisiensi, kinerja underwriting dan likuiditas terhadap profitabilitas perusahaan asuransi syariah di Indonesia periode 2015-2019 secara parsial dan simultan. Penelitian ini menggunakan metode kuantitatif dengan teknik analisis regresi data panel dan mengambil 24 sampel perusahaan asuransi jiwa maupun umum syariah di Indonesia, sumber data diambil dari laporan keuangan masing-masing perusahaan asuransi syariah dan laporan statistik keuangan OJK. secara parsial kinerja manajemen dan kinerja underwriting berpengaruh positif signifikan terhadap profitabilitas, efisiensi dan likuiditas berpengaruh negatif signifikan terhadap profitabilitas. secara simultan variabel kinerja manajemen, efisiensi, kinerja underwriting dan likuiditas yang diukur melalui rasio perubahan surplus, rasio underwriting, rasio biaya manajemen dan rasio likuiditas berpengaruh signifikan terhadap profitabilitas yang diukur dengan ROE pada perusahaan asuransi syariah di Indonesia periode 2015-2019. Perusahaan asuransi syariah diharapkan dapat mengoptimalkan struktur modal perusahaannya, lalu menjaga kondisi keuangan perusahaan dengan baik terutama dari sisi kewajiban dan biaya operasional perusahaan asuransi syariah. Perusahaan juga diharapkan mampu mengelola dana pesertanya dengan baik agar tidak mengalami defisit underwriting. Kata kunci: Kinerja Manajemen, Efisiensi, Kinerja Underwriting, Likuiditas, Profitabilitas. ABSTRACT This study aims to determine the effect of management performance, efficiency, underwriting performance and liquidity on the profitability of Islamic insurance companies in Indonesia for the 2015-2019 period partially and simultaneously. This study uses a quantitative method with panel data regression analysis techniques and takes 24 samples of sharia life and general insurance companies in Indonesia, the data sources are taken from the financial statements of each sharia insurance company and OJK financial statistics reports. partially management performance and underwriting performance have a significant positive effect on profitability, efficiency and liquidity have a significant negative effect on profitability. Simultaneously, the variables of management performance, efficiency, underwriting performance and liquidity as measured by the ratio of changes in surplus, underwriting ratio, management expense ratio and liquidity ratio have a significant effect on profitability as measured by ROE in Islamic insurance companies in Indonesia for the 2015-2019 period. Islamic insurance companies are expected to optimize the company's capital structure, then maintain the company's financial condition well, especially in terms of obligations and operational costs of sharia insurance companies. The company is also expected to be able to manage the funds of its participants well so as not to experience an underwriting deficit. Keywords: Management Performance, Efficiency, Underwriting Performance, Liquidity, Profitability. DAFTAR PUSTAKA Akotey G., J. O., & Manso, S. L. (2013). The financial performance of life insurance companies in Ghana. Journal of Risk Finance, 14(3), 286-302. https://doi.org/10.1108/JRF-11-2012-0081 Anshori, M., & Iswati, S. (2009). Metodologi penelitian kuantitatif. Surabaya: Universitas Airlangga. Azhari, R. A. (2021). Studi analisis meta pada determinan profitabilitas perusahaan asuransi syariah di Indonesia. Skripsi tidak dipublikasikan. Surabaya: Universitas Airlangga. Bakri, W. (2015). Prinsip-prinsip dasar asuransi syariah. Ijtihad: Jurnal Hukum dan Ekonomi Islam, 9(2), 195-214. http://dx.doi.org/10.21111/ijtihad.v9i2.2521 Baltagi, B. H. (2005). Econometric analysis of panel data. West Sussex: John Willey and Sons Ltd. Darmawi. (2006). Manajemen asuransi. Jakarta: Bumi Aksara. DSN MUI. (2001). Fatwa DSN MUI Nomor 21/DSN-MUI/X/2001 tentang pedoman umum asuransi syariah. Jakarta: DSN MUI. Fadrul., & Simorangkir, M. A. (2019). Pengaruh early warning system dan risk-based capital terhadap kinerja keuangan perusahaan asuransi. Bilancia: Jurnal Ilmiah Akuntansi, 3(3), 348-359. Harahap, S. S. (2001). Teori akuntansi. Jakarta: PT. Raja Grafindo Persada . Juwita, T. (2017). Analisis pengaruh premi klaim investasi dan surplus underwriting terhadap pertumbuhan laba pada industri asuransi syariah tahun 2012-2016. Skripsi tidak dipublikasikan. Salatiga: Institut Agama Islam Negeri (IAIN) Salatiga. Kaya, E. O. (2015). The effects of firm-specific factors on the profitability of non-life insurance companies in Turkey. Int. J. Financial Stud, 3(4), 510-529. https://doi.org/10.3390/ijfs3040510 Kumar, K. A. (2015). International Financial Reporting Standards (IFRS) Adoption on Financial Decisions. J Account Mark, 4(3), 1-6. https://doi.org/10.4172/2168-9601.1000141 Kuncoro, M. (2011). Metode kuantitatif. Yogyakarta: Sekolah Tinggi Ilmu Manajemen YKPN. Makhrus, A. (2017). Manajemen asuransi syariah. Yogyakarta: Litera. Mardhiyyah, A. Z. (2019). Analisis pengaruh pertumbuhan premi, hasil investasi, risiko likuiditas, tingkat kesehatan (solvabilitas) dengan nilai risk based capital dan tingkat efesiensi terhadap kinerja keuangan pada perusahaan asuransi syariah di Indonesia. Skripsi tidak dipublikasikan. Jakarta: Universitas Islam Negeri Syarif Hidayatullah Jakarta. Ngunguni, N. J., Misango, S. M., & Onsiro, M. (2020). Examining the effects of financial factors on profitability of general insurance companies in Kenya. International Journal of Finance of Accounting, 5(1), 1-18. http://dx.doi.org/10.47604/ijfa.1066 Ningrum, S. D. (2014). Analisis faktor-faktor yang mempengaruhi return on equity pada perusahaan asuransi umum. Skripsi tidak dipublikasikan. Semarang: Universitas Diponegoro. OJK. (2015). Laporan statistik perasuransian Indonesia. Jakarta: Otoritas Jasa Keuangan. OJK. (2016). Laporan statistik perasuransian Indonesia. Jakarta: Otoritas Jasa Keuangan. OJK. (2017). Laporan statistik perasuransian Indonesia. Jakarta: Otoritas Jasa Keuangan. OJK. (2018). Laporan statistik perasuransian Indonesia. Jakarta: Otoritas Jasa Keuangan. OJK. (2019). Laporan statistik perasuransian Indonesia. Jakarta: Otoritas Jasa Keuangan. OJK. (2019). Laporan perkembangan keuangan syariah di Indonesia. Jakarta: Otoritas Jasa Keuangan. Puspitasari, N. (2012). Model proporsi tabarru dan ujrah pada bisnis asuransi umum syariah di indonesia. Jurnal Akuntansi dan Keuangan Indonesia, 9(1), 43-55. http://dx.doi.org/10.21002/jaki.2012.03 Ramadhan, Y. (2019). Pengaruh ujrah diterima, beban klaim dan total investasi terhadap laba asuransi jiwa syariah di Indonesia periode 2008-2017. Skripsi tidak dipublikasikan. Surabaya: Universitas Airlangga. Safitri, K. E., & Suprayogi, N. (2017). Analisis kesehatan keuangan dana tabarru yang mempengaruhi profitabilitas pada asuransi syariah di Indonesia. Jurnal Ekonomi Syariah Teori dan Terapan, 4(1), 73-88. https://doi.org/10.20473/vol4iss20171pp73-88 Salsabila, F. H. (2020). Pengaruh rasio-rasio early warning system terhadap profitabilitas perusahaan asuransi jiwa syariah periode 2014-2018. Skripsi tidak dipublikasikan. Surabaya: Universitas Airlangga. Satria, S. (1994). Pengukuran kinerja keuangan perusahaan asuransi kerugian di Indonesia dengan analisis rasio keuangan early warning system. Jakarta : Lembaga penerbit FE-UI. Silalahi, D., Sitepu, R., & Tarigan, G. (2014). Analisis ketahanan pangan dengan model regresi data panel. Saintia Matematika, 2(3), 237-251. Utami, I. G. A. M. P., & Werastuti, D. N. S. (2020). Pengaruh mekanisme corporate governance, early warning system, risk based capital dan hasil investasi terhadap kinerja keuangan. Jurnal Ilmiah Mahasiswa Akuntansi Undiksha, 11(2). 54-64. https://doi.org/10.23887/jimat.v11i2.25922 Wibisono. (2005). Metode statistika. Yogyakarta: Gajah Mada University Press. Widarjono, A. (2013). Ekonometrika: Pengantar dan aplikasinya. Jakarta: Eknosia. Widyarochma, F. (2018). Pengaruh likuiditas pertumbuhan premi dan hasil investasi terhadap profitabilitas perusahaan asuransi syariah di Indonesia Periode 2012-2016. Skripsi tidak dipublikasikan. Surabaya: Universitas Airlangga. Yuliana, Y. (2008). Kinerja keuangan PT. Panin Insurance Tbk. dengan metode MDA. Ilmiah Manajemen Bisnis, 8(1), 75-88. Yuniarti, T. (2020). Pengaruh underwriting dan dana tabarru terhadap laba perusahaan asuransi syariah di Indonesia. Skripsi tidak dipublikasikan. Lampung: Universitas Islam Negeri Raden Intan Lampung.
APA, Harvard, Vancouver, ISO, and other styles
8

GOMES, Almir Anacleto De Araújo, Rubens Marques de LUCENA, and Mikaylson Rocha da SILVA. "A VOGAL DE APOIO EM POSIÇÃO INICIAL EM CLUSTERS /SC/ POR APRENDIZES DE INGLÊS COMO L2." Trama 15, no. 34 (February 27, 2019): 68–81. http://dx.doi.org/10.48075/rt.v15i34.20946.

Full text
Abstract:
Este estudo descreve e analisa o processo variável da vogal epentética em palavras na língua inglesa iniciadas por clusters por aprendizes brasileiros de inglês como segunda língua (L2). O objetivo dessa pesquisa é, então, identificar a frequência de inserção da vogal de apoio na posição inicial das palavras em língua inglesa que se iniciam com um dos seguintes clusters: /sp/, /st/, /sk/, /sl/, /sm/, e /sn/. O corpus deste estudo é constituído por 18 informantes paraibanos, aprendizes de inglês como L2, estratificados nos níveis básico, intermediário e avançado de proficiência. Os dados mostram que as variáveis sonoridade do encontro consonantal, nível de proficiência, instrução explícita na L2 e contexto precedente foram as mais relevantes à realização do fenômeno. REFERÊNCIASALLAN, D. Oxford placement test 1. Oxford: Oxford University Press, 2004.ALVES, U. K. O que é consciência fonológica. IN: LAMPRECHT et. al. Consciência dos sons da língua: subsídios teóricos e práticos para alfabetizadores, fonoaudiólogos e professores de língua inglesa. 2 ed. Porto Alegre: EDIPUCRS, 2012, p. 29-41.BOUDAOUD, M.; CARDOSO, W. Vocalic [e] epenthesis and variation in Farsi-English interlanguage speech. Concordia Working Papers in Applied Linguistics, 2, 2009.CARDOSO, W. The variable development of English word-final stops by Brazilian Portuguese speakers:A stochastic optimality theoretic account. Language variation and change, v.19, 2007, p. 1-30.______, W. The Development of sC Onset Clusters in interlanguage: markedness vs. frequency effects. Proceedings of the 9th Generative Approaches to Second Language Acquisition Conference, (GASLA 2007), ed. Roumyana Slabakova et al., 15-29. Somerville, MA: Cascadilla Proceedings Project, 2008.CARLISLE, R. The effects of markedness on epenthesis in Spanish/English interlanguage phonology. Issues and Developments in English and Applied Linguistics, 3, 1988, 15-23._______, R.S. The Influence of Environment on Vowel Epenthesis in Spanish/English Interphonology. Applied linguistics, v.12, n.1, 1991, p. 76-95._______, R. Environment and markedness as interacting constraints on vowel epenthesis. In:_______ J. Leather; JAMES, A (Eds.), New sounds 92 (p. 64–75). Amsterdam: University of Amsterdam Press, 1992._______, R. S. Markedness and environment as internal constraints in the variability of interlanguage phonology. In:_____. M. Yavas (ed.) First and Second Language Phonology. San Diego: Singular Publishing Company, 1994 p. 223-249.______, R. The modification of onsets in a markedness relationship: Testing the interlanguage structural conformity hypothesis. Language learning, v.47, 1997, p. 327-361.______, R. The acquisition of onsets in a markedness relationship. A longitudinal study. Studies in second language acquisition. 20, 1998, 245–260.COLLISCHONN, G. Um estudo da epêntese à luz da teoria da sílaba de Junko Ito (1986). Letras de hoje, Porto Alegre: v. 31, n.2, 1996, p. 149-158.CORNELIAN JR, D. Brazilian learners’ production of initial /s/ clusters: Phonological structure and environment. New Sounds 2007: Proceedings of the Fifth International Symposium on the Acquisition of Second Language Speech, 2007.DUBOIS, J. et al. Dicionário de lingüística. São Paulo: Cultrix, 2006.ESCARTÍN, C. I. The development of sC onset clusters in Spanish English. Tese – Concordia University, Canadá, 2005.GASS, S.; SELINKER, L. (eds). Language transfer in language vs learning. Newbury House, Rowley, Massachusetts, 2008.LABOV, W. Padrões sociolinguísticos. Tradução de Marcos Bagno; Mª Marta Pereira Scherre e Caroline Rodrigues Cardoso. São Paulo: Parábola Editorial, (1972) 2008.LUCENA, R. M; ALVES, F. C. Análise Variacionista da Aquisição do /p/ em Coda Silábica por Aprendizes de Inglês Como LE. Revista Intertexto. v. 5, n. 2, 2012.PEREYRON, L. Epêntese vocálica em encontros consonantais mediais por falantes porto-alegrenses de inglês como língua estrangeira. Dissertação (Mestrado) – Pontifícia Universidade Católica do Rio Grande do Sul, Porto Alegre: 2008.RAUBER, A. S. The production of English initial /s/ clusters by Portuguese and Spanish EFL speakers. Unpublished Master's thesis, Universidade Federal de Santa Catarina, Florianópolis, SC: Brazil, 2002.RAUBER S.; BAPTISTA. The production of English initial /s/ clusters by Portuguese and Spanish EFL speakers. Rev. Est. Ling. Belo Horizonte: v. 12, n. 2, 2004, p. 459-473.REBELLO, J. T. The acquisition of English initial /s/ clusters by Brazilian EFL learners. Florianópolis: UFSC, 1997.SANKOFF, D.; TAGLIAMONTE, S.; SMITH, E. GoldVarb X: a variable rule application for Macintosh and Windows. Department of Linguistics. University of Toronto, 2005.SELINKER, L. Rediscovering interlanguage. New York: Longman, 1972.SILVA. T. C. Dicionário de fonética e fonologia. São Paulo: Contexto, 2011. Recebido em 30-10-2018.Aceito em 22-02-2019.
APA, Harvard, Vancouver, ISO, and other styles
9

Olivo, Adrian, and Juan Toledo. "Electromagnetic model for the study of transitory phenomena associated with atmospheric discharges on transmission lines." ATH 2, no. 5 (September 18, 2021): 5–28. http://dx.doi.org/10.47460/athenea.v2i5.22.

Full text
Abstract:
The analysis of a research work developed in the company C.V.G CARBONORCA of Venezuela is presented, which has two gas purification plants for the cooking area, designed to purify the gas that comes from the cooking ovens. Each plant is made up of solenoid valves, pneumatic valves, transmitters, process mimic panel and a supervisory system. All these elements are governed by a SIEMENS S5-115U PLC which is in a state of obsolescence, which is why the replacement of these automata by ALLEN BRADLEY ContolLogix automata was designed, in order to guarantee continuity in operations in plant. The research was done with a descriptive design of the field experimental type. A code for each gas treatment plant was obtained in RSLOGIX 5000 v17.00.00 and the update of the database of the supervisory system. The operation of the program was also verified through a simulation of the plant in a supervisory system, the deployment of which was designed for this purpose. Keywords: Automation, Modernization, ControlLogix, Supervisory System, Mimic Panel References [1]M. Uman, D. Mclain and P. Krider. “The Electromagnetic Radiation from a finite antenna” AJP, vol. 43, 1975. 1975. [2]A. Agrawal, H. Price and S. Gurbaxani. “Transient response of multiconductor transmission lines excited by a no uniform electromagnetic field”. IEEE Transactions on electromagnetic compatibility, (2), 119-129. 1980. [3]C. Nucci, F. Rachidi, M. Ianoz and C. Mazzetti. “Comparison of two coupling models for lightning-induced overvoltage calculations”. IEEE Transactions on power delivery, 10(1), 330-339. 1995. [4]R. Thottappillil and M. Uman. “Comparison of lightning return‐stroke models”. Journal of Geophysical Research: Atmospheres, 98(D12), 22903-22914. 1993. [5]K. Yee. “Numerical solution of initial boundary value problems involving Maxwell’s equations in isotropic media”, IEEE Transactions on Antennas and Propagation, vol. AP-14, no. 3, pp. 302–307, May 1966. 1966. [6]A. Taflove and S. Hagness. “Computational Electrodynamics: The Finite-Difference Time-Domain Method”. Boston-London: 2005. [7]A. Elsherbeni and V. Demir. “The finite-difference time-domain method for electromagnetics with MATLAB simulations”. The Institution of Engineering and Technology. 2016. [8]V. Silva. “Aplicação do método FDTD para avaliação da resposta de linhas de transmissão e aterramentos elétricos frente a descargas atmosféricas”. Dissertação de Mestrado, Universidade federal de minas gerais. Belo Horizonte, Brasil. 2017. [9]T. Noda and S. Yokoyama. “Thin wire representation in finite difference time domain surge simulation”. IEEE Transactions on Power Delivery, 17(3), 840-847. 2002. [10]R. Chamié-Filho. Análise de tensões induzidas em linhas de distribuição de baixa tensão frente a uma descarga atmosférica. 2009. [11]R. Jiménez. “Lightning Induced Voltages on Overhead Lines above Non-Uniform and Non-Homogeneous Ground” Doctoral dissertation, Universidad Nacional de Colombia-Sede Medellín. 2014. [12]S. Visacro and A. Soares. “HEM: A model for simulation of lightning-related engineering problems”. IEEE Transactions on power delivery, 20(2), 1206-1208. 2005. [13]J. Herrera. “Nuevas aproximaciones en el cálculo de tensiones inducidas por descargas eléctricas atmosféricas”. Programa de Doctorado en Ingeniería Eléctrica, Facultad de Ingeniería, Departamento de Ingeniería Eléctrica y Electrónica, Universidad Nacional de Colombia, Bogotá, 128 . 2006. [14]C. McAfee. “Lightning return stroke electromagnetics-time domain evaluation and application” Doctoral dissertation. 2016. [15] S. Gedney. “Introduction to the finite-difference time-domain (FDTD) method for electromagnetics”. Synthesis Lectures on Computational Electromagnetics, 6(1), 1-250. 2011. [16]Y. Taniguchi, Y. Baba, N. Nagaoka and A. Ametani. “An improved thin wire representation for FDTD computations”. IEEE Transactions on Antennas and Propagation, 56(10), 3248-3252. 2008. [17]E. Soto. “Cálculo de campo electromagnético producido por rayo para terreno no plano y su efecto en las tensiones inducidas en líneas de distribución”. Tesis de Maestría, Universidad Nacional de Colombia. Manizales, Colombia. 2010. [18]D. Sullivan. “Electromagnetic simulation using the FDTD method”. John Wiley & Sons. 2013.
APA, Harvard, Vancouver, ISO, and other styles
10

Любимова, Світлана. "Etymological Memory of a Word in Designating Sociocultural Stereotype." East European Journal of Psycholinguistics 4, no. 1 (June 27, 2017): 140–49. http://dx.doi.org/10.29038/eejpl.2017.4.1.lyu.

Full text
Abstract:
The article presents the semantic history of the word flapper that denotes social stereotype of American culture. Being a multifaceted phenomenon of semantic cognition, a sociocultural stereotype presents a condensed and coded information that develops on the background of a cultural context. The semantic analysis from diachronic perspective sets up a correspondence of Latin origin of the word flapper with Indo-European stem that produced a number of words in Germanic languages. The cognate words of related languages reveal conformity of negative connotations determined by attitude to human weakness in different forms of its manifestations. This presumes historically determined negative connotation of the word flapper. The initial designation was motivated by kinetic characteristic of the object – a vertical movement. The meaning “a young and daring American girl of the 1920s” of the word flapper was semantically motivated. As it was stated, at the moment of designation, youth and immaturity of a girl were conceived of a fledgling image, that traditionally symbolizes inexperience of a youngster. This zoomorphic metaphor acts as the source of categorization of a cultural and social phenomenon “Flapper”. References Апресян Ю. Д. Избранные труды: Т. 1: Лексическая семантика. Синонимическиесредства языка. М.: Языки русской культуры, 1995.Apresyan, Yu. D. (1995). Izbrannyie Trudy: T.1. Leksicheskaya Semantika.Sinonimicheskie Sredstva Yazyka [Lexical Semantics. Synonymic Means of Language].Moscow: Yazyki Russkoy Kultury. Арутюнова Н. Д. Язык и мир человека. Часть IV: В сторону семиотики и стилистики.М.: Высшая школа, 1999.Arutyunova, N. D. (1999). Yazyk i Mir Cheloveka. P. IV: V Storonu Semiotiki i Stilistiki[Language and Human World. Part 4: Towards Semiotics and Stylistics]. Moscow:Vysshaya Shkola. Гумбольдт В. Избранные труды по языкознанию. М.: Прогресс, 1984.Humboldt, W. (1984). Izbrannyie Trudy po Yazyikoznaniyu [Selected Works inLinguistics]. Moscow: Progress. Jackson, F. (1998). From Metaphysics to Ethics. Oxford: Oxford University Press. Кифер Ф. О пресуппозициях / Новое в зарубежной лингвистике. М. : 1978, 337–353.Kiefer, F. (1978). O presuppozitsiyah [On Presuppositions]. In: Novoe v Zarubezhnoylingvistike. (337-353), T. M. Nikolayeva, Ed. Moscow: Progress. Laurence, S., Margolis, E. (2003). Concepts and Conceptual Analysis. Philosophy andPhenomenological Research, 67(2), 253–282. McRae, K.; Jones, M. Semantic Memory. (2013). The Oxford Handbook of CognitivePsychology. New York, NY: Oxford University Press, 206–216. Ogden, C.K, Richards, I.A. (1952). The Meaning of meaning. In: A Study of the Influenceof Language upon Thought and of The Science of Symbolism. With Supplementary Essaysby B. Malinowski and F. G. Crookshank. London: Routledge & Kegan Paul. Partridge, E. (1938).The World of Words: An Introduction to Language in General and toEnglish and American in Particular. London: George Routledge & Sons. Пирс Ч.С. Избранные произведения. М.: Логос, 2000.Peirce, Ch. S. (2000). Izbrannyie Proizvedeniya [Selected Works]. Moscow: Logos. Потебня А. А. Из записок по русской грамматике. М.: Изд-во Мин-ва просвещенияРСФСР, 1958. Potebnya, A. A. (1958). Iz zapisok po Russkoy Grammatike [From the Notes on RussianGrammar]. Moscow: Ministry of Education of RSFSR. Quiles, C. A., Lopez-Menchero, F. (2009). Grammar of Modern Endo-European. IndoEuropean Language Association. Stalnaker, R. C. (1974). Pragmatic Presuppositions. In: Semantics and Philosophy. (pp.197-230). M. Munitz and P. Unger, (Eds.). N.Y.: New York University Press. Taylor, J. R. (2006). Polysemy and lexicon. In: Cognitive Linguistics: Current ApplicationsAnd Future Perspectives. (pp. 51-81), G. Kristiansen, M. Achard and R. Dirven (eds.).Berlin–New York: Monton de Gruyter. Телия В. Н. Коннотативный аспект семантики номинативных единиц. М.: Наука,1986.Teliya, V. N. (1986). Konnotativnyiy Aspekt Semantiki Nominativnyh Yedinits [ConnotativeAspect in the Meaning of Denotative Units]. Moscow: Nauka. Urban, W. M. (2013). Language and Reality. Philosophy of Language and the Principles ofSymbolism. London and New York: Routledge Taylor and Francis Group. Sources A Comprehensive Etymological Dictionary of the English Language (1966). Vol. I. Dr.Ernest Klein. Barking, Essex: Elsevier Publishing Company. A Dictionary of Slang and Unconventional English. (1937). E. Partidge. London:Routledge. Chamber’s Dictionary of Etymology. (1999). R. K. Barnhart, Ed. N.Y.: Wilson. Crawfurd, O. A. (1895). A Year of Sport and Natural History. Shooting, Hunting,Coursing, Falconry. London: Chapman and Hall. Retrieved from:https://ia600205.us.archive.org/2/items/cu31924022547263/cu31924022547263.pdf Dalzell, T. (1996). Flappers to Rappers. American Youth Slang. Springfield,Massachusetts: Merriam Webster. Das großen Wörterbuch den Sprach in 10 Bänden, Band 3. (1999). Leipzig–Wien–Zürich:Dudenverlag, Mannheim. Deutsches Wörterbuch von Jakob Grimm und Wilhelm Grimm (Nachdruck derErstausgabe 1862). (1999). Band 3. München: Lizenzausgabe des Deutschen TashenbuchVerlages. Duden Deutsches Universal Wörterbuch. (2001). Leipzig–Wien–Zürich: Dudenverlag,Mannheim. Голландско-русский словарь. Под общ. руководством С. А. Миронова. М.: Гос.изд-во ин. и нац. словарей, 1954 Gollandsko-russkiy slovar [Dutch-Russian Dictionary]. (1954). Pod obsch. rukovodstvomS. A. Mironova. M. : Gos. izd-vo in. i nats. Slovarey. Green, R. (1970). The Revels Plays. James the IV. Ed. by N. Sandlers. Welwyn GardenCity, Herts: The Broad Water Press. Indogermanisches Etymologishes Woerterbuch. (1959). Julius Pokorny, (ed). BandI. Bern: Francke. Manipulus Vocabulorum: a Rhyming Dictionary of the English Language. (2001).Ed. H. B. Wheatley. Elibron Classics book a facsimile reprint of a 1867 edition by N. Trübner& Co. London: Adamant Media Corporation. Maugham, W. S. (2007). Of Human Bondage. Winnetka, CA: Norilana. Норвежско-русский словарь. Сост. В. Д. Аракин. М.: Гос. изд-во ин. и нац.словарей, 1963
APA, Harvard, Vancouver, ISO, and other styles
11

Nuryani, Nunung. "PENGARUH BIAYA AUDIT TERHADAP KUALITAS AUDIT DAN DETERMINAN BIAYA AUDIT." Jurnal Akuntansi 9, no. 2 (August 15, 2020): 32–47. http://dx.doi.org/10.46806/ja.v9i2.760.

Full text
Abstract:
Financial information is one of the important information in decision making. However, many cases of fraud committed by management so that the information in the financial statements cannot be relied upon in decision making. Therefore, the auditor's job is to ensure that the company's financial statements are represented correctly (faithful representation) so that financial statement information becomes more quality and useful in making decisions. So this study aims to examine the effect of audit fee on audit quality. In addition, this study also examines important determinants of audit costs, namely company size, profitability, audit risk, complexity, and firm size. By using the purposive sampling method, samples of the financial and manufacturing industry in 2010-2017 used are 39 firms per year. This sample is used to examine the effect of audit fee on audit quality and the determinant of audit fee using simple linear regression analysis and multiple linear regression analysis. The result of this research shows that audit fees have a significant positive effect on audit quality. In addition, this study shows that firm size, complexity, and firm size are important determinants that determine audit fee. However, profitability and audit risk have not been proven to explain audit fees. Keywords: Audit Quality, Audit Fee, Firm Size, Profitability, Audit Risk, Complexity, Auditor Size Referencens: Al-Harshani, Meshari O. (2008), The pricing of audit services: Evidence from Kuwait. Managerial Auditing Journal, 23(7), 685–696. Al-Thuneibat, Ali. Abedalqader, Ream Tawfiq Ibrahim Al Issa, & Rana Ahmad Ata Baker, (2011), Do audit tenure and firm size contribute to audit quality? Empirical evidence from Jordan. Managerial Auditing Journal, 26(4), 317–334. Arens, Alvin A., Randal J. Elder,. Mark S. Beasley (2014), Auditing and Assurance Services: An Integrated Approach. United States: Pearson Education, Inc. Association of Certified Fraud Examiners (2018), Report to the Nations: 2018 Global Study on Occupational Fraud and Abuse, United States: ACFE. Bhandari, L. C. (1988), Debt/Equity Ratio and Expected Common Stock Returns : Empirical Evidence. The Journal of Finance, 43(2), 507–528. Bowerman, Bruce L., Richard T. O'Connell, Emily S. Murphree (2017), Business Statistics in Practice, Eighth Edition, New York: McGraw Hill Education. Brealey, Richard A., Myers, Stewart C. (2000), Principles of Corporate Finance, Boston: McGraw Hill Companies, Inc. Carey, P. J. (2008), The Benefits of Services Provided by External Accountants to Small and Medium Sized Enterprises. Carey, P., & Simnett, R. (2006), Audit partner tenure and audit quality. Accounting Review, 81(3), 653–676. Castro, Walther Bottaro de Lima, Ivam Ricardo Peleias, & Glauco Peres da Silva (2015), Determinants of Audit Fees: A Study in the Companies Listed on the BM&FBOVESPA, Brasil. Revista Contabilidade & Finanças, 26(69), 261–273. Chen, C. (2008), Audit Partner Tenure , Audit Firm Tenure , and Discretionary Accruals : Does Long Auditor Tenure Impair Earnings Quality ?, 25(2), 415–445. Cooper, D. R., & Schindler, P. S. (2014), Business Research Methods (Twelfth Edition). New York: McGraw-Hill/Irwin. DeAngelo, L. E. (1981), Auditor size and audit quality. Journal of Accounting and Economics, 3(3), 183–199. Dechow, Patricia. M., Richard. G. Sloan, & Amy P. Sweeney (1995), Detecting Earnings Management. The Accounting Review. DeFond, M., & Zhang, J. (2014), A review of archival auditing research. Journal of Accounting and Economics, 58(2–3), 275–326. Deis, Donald R., & Gary Giroux (1996), The effect of auditor changes on audit fees, audit hours, and audit quality. Journal of Accounting and Public Policy, 15(1), 55–76. Eilifsen, Aasmund, Jr William F Messier, Steven M Glover, Douglas F Prawitt (2014), Auditing & Assurance Services, Third Edition, London: McGraw-Hill. Ettredge, Michael., Elizabeth Emeigh Fuerherm, & Chan Li (2014), Fee pressure and audit quality. Accounting, Organizations and Society, 39(4), 247–263. Ferri, Michael G., & Wesley H. Jones (1979), Determinants of financial structure: a new methodological approach. The Journal of Finance, 34(3), 631–643. Francis, Jere. R. (2011), A Framework For Understanding And Researching Audit Quality. Auditing, 30(2), 125–152. Ghozali, H. Imam (2016), Aplikasi Analisis Multivariete dengan Program IBM SPSS 23, Edisi ke-8, Semarang: Badan Penerbit Universitas Diponegoro. Gitman, Lawrence J., Chad J. Zutter (2012), Principles Of Managerial Finance (Thirteenth). United States: Lawrence J. Gitman. Hoitash, Rani., Ariel Markelevich, & Charles A. Barragato (2007), Auditor fees and audit quality. Managerial Auditing Journal, 22(8), 761–786. Horngren, Charles T., L. Sundem, John A. Elliott (1999), Introduction to Financial Accounting, Seventh Edition, New Jersey: Prentice-Hall,Inc. Ikatan Akuntansi Indonesia (2017), Standar Akuntansi Keuangan (SAK), Jakarta: IAI International Accounting Standard Board (2018), The Conceptual Framework for Financial Reporting 2018. London : IASB. Jan, Chyan Long (2018), An effective financial statements fraud detection model for the sustainable development of financial markets: Evidence from Taiwan. Sustainability (Switzerland), 10(2). Jensen, Michael C., & William H. Meckling (1976), Theory Of The Firm : Managerial Behavior , Agency Costs And Ownership Structure, 3, 305–360. Joshi, P. L., & Hasan AL-bastaki (2000), Determinants of Audit Fees : Evidence from the Companies Listed in Bahrain, 138(November 1999), 129–138. Jubb. (1996), Audit fee determinants: The plural nature of risk. Managerial Auditing Journal, 11(3), 25–40. Kieso, Donald E., Jerry J. Weygandt, & Paul D. Kimmel (2013), Financial Accounting IFRS Edition. United States: John Wiley & Sons, Inc. Kieso, Donald E, Jerry J Weygandt, Terry D Warfield (2018), Intermediate Accounting: IFRS Edition Third Edition, United States: John Willey & Sons, Inc. Kikhia, Hassan Yahia (2014), Determinants of Audit Fees: Evidence from Jordan. Accounting and Finance Research, 4(1), 42–53. Knechel, Robert W., & Ann Vanstraelen (2007), The Relationship between Auditor Tenure and Audit Quality Implied by Going Concern Opinions. AUDITING: A Journal of Practice & Theory, 26(May), 113–131. Knechel, W. Robert, Gopal V. Krishnan, Mikhail Pevzner, Lori B Shefchik, & Uma K. Velury (2013), Audit quality: Insights from the academic literature. Auditing, 32(SUPPL.1), 385–421. Konrath, Larry F. (2002), Auditing A Risk Analysis Approach, Fifth Edition, South Western. Kusharyanti (2013), Analysis of the Factors Determining the Audit Fee. Journal of Economics, Business, and Accountancy | Ventura, 16(1), 147–160. Lennox, C. (1999), Are large auditors more accurate than small auditors? Accounting and Business Research, 29(3), 217–227. Lennox, C. S. (1999) Audit quality and auditor size: An evaluation of reputation and deep pockets hypotheses. Journal of Business Finance and Accounting, 26(7–8), 789–805. Liu, Siheng. (2017), An Empirical Study: Auditors’ Characteristics and Audit Fee. Open Journal of Accounting, 06(02), 52–70. Lobo, Gerald, & Yuping Zhao (2013), Relation between Audit Effort and Financial Report Misstatements: Evidence from Quarterly and Annual Restatements. Journal of International Accounting Research, 90(4), 1395–1435. Manry, David L, Theodore J. Mock, & Jerry L. Turner (2008), Does increased audit partner tenure reduce audit quality? Journal of Accounting, Auditing and Finance, 23(4), 553–572. Mohammed, Nishtiman Hashim, & Abdullah Saeed Barwari (2018), Determinants of Audit Fees : Evidence from UK Alternative Investment Market. Academic Journal of Nawroz University, 7(3), 34–47. Musah, A. (2017), Determinants of Audit fees in a Developing Economy: Evidence from Ghana. International Journal of Academic Research in Business and Social Sciences, 7(11). Newton, Nathan J., Dechun Wang, & Michael S. Wilkins (2013), Does a lack of choice lead to lower quality? evidence from auditor competition and client restatements. Auditing, 32(3), 31–67. Nikkinen, J., & Petri Sahlström (2004), Does Agency Theory Provide a General Framework for Audit Pricing ? International Journal of Auditing, 8, 253–262. Ohidoa, T., & Okun, O. O. (2018), Firms Attributes and Audit Fees in Nigeria Quoted Firms. International Journal of Academic Research in Business and Social Sciences, 8(3), 685–699. Pham, Ngoc Kim, Hung Nguyen Duong, Tin Pham Quang, & Nga Ho Thi Thuy (2017), Audit Firm Size, Audit Fee, Audit Reputation and Audit Quality: The Case of Listed Companies in Vietnam. Asian Journal of Finance & Accounting, 9(1), 429. Rahman, Dr Onaolapo Adekunle Abdul, Ajulo Olajide Benjamin, Onifade Hakeem Olayinka (2017), Effect of Audit Fees on Audit Quality: Evidence from Cement Manufacturing Companies in Nigeria. Effect of Audit Fees on Audit Quality: Evidence from Cement Manufacturing Companies in Nigeria., 5(1), 6–17. Rahmina, Listya Yuniastuti, & Sukrisno Agoes (2015), Influence of Auditor Independence, Audit Tenure, and Audit Fee on Audit Quality of Members of Capital Market Accountant Forum in Indonesia. Procedia - Social and Behavioral Sciences, 164(August), 324–331. Republik Indonesia (2008), Undang-Undang Republik Indonesia Nomor 20 tahun 2008 Tentang Usaha Mikro, Kecil, Dan Menengah. Sandra, & Patrick. (1996), The Deteminants of Audit Fees in HongKong: An Empirical Study. Asian Review of Accounting, 4(2), 32–50. Scott, William R (2015), Financial Accounting Theory, Seventh Edition, United States: Pearson Canada Inc. Shibano, T. (1990), Assessing Audit Risk from Errors and Irregularities. Journal of Accounting Research, 28(1990), 110. Sivathaasan, N., R. Tharanika, M. Sinthuja, V. Hanitha (2013), Factors determining Profitability: A Study of Selected Manufacturing Companies listed on Colombo Stock Exchange in Sri Lanka. European Journal of Business and Management, 5(27), 99-107–107. Subramanyam, K. R. (2014), Financial Statement Analysis, Eleventh Edition, New York: McGraw-Hill Education. Sun, Jerry, & Guoping Liu (2011), Client-specific litigation risk and audit quality differentiation. Managerial Auditing Journal, 26(4), 300–316. Tritschler, Jonas (2013), Audit Quality: Association Between Published Reporting Errors and Audit Firm Characteristics. Vu, Dinh Ha Thu Vu (2012), Determinants of audit fees for Swedish listed non-financial firms in NASDAQ OMX Stockholm. Whittington, Ray & Kurt Pany (2004), Principles of Auditing and Other Assurance Services, New York: McGraw-Hill/Irwin. Williams, David D. (1988), The Potential Determinants of Auditor Change. Journal of Business Finance & Accounting, 15(2), 243–261. Wooten, T. C. (2003), Research About Audit Quality. Wu, Shu-Hsing, Tsung-Che Wu, & Kun-Lin Yang (2017), Fair Value Information, Audit fees and Audit Committee in Taiwan. International Journal of Financial Research, 8(2), 124. Xu, Jiabing (2017), Analysis on the Relationship between Audit Fee Management and Audit Quality in China, 53(ICEM 2017), 530–533.
APA, Harvard, Vancouver, ISO, and other styles
12

Hoang Thuy Bich Tram, Nguyen, and Tran Thi Thuy Linh. "Institutional Quality Matter and Vietnamese Corporate Debt Maturity." VNU Journal of Science: Economics and Business 33, no. 5E (December 25, 2017). http://dx.doi.org/10.25073/2588-1108/vnueab.4099.

Full text
Abstract:
This article studies whether firm-level and country-level factors affect to the corporation's debt maturity in case of Vietnam or not. The paper adopts the balance panel data of 267 listed companies on two trading board HOSE and HNX in the period from 2008 to 2015, estimated by FEM, REM, 2SLS and GMM method. To intrinsic factors, research results show that financial leverage and default risk control have high positive statistical significance with the debt maturity, but tangible assets are lower than those factors. In addition, growth opportunities and company quality have negative impacts to the debt maturity. To external factors, the results point out that economic growth, stock market development and governmental regulation's efficiency demonstrate the positive relationship to the debt maturity with fairly low correlation levels. In spite of that, inflation rate, financial development, the rule of law, corruption control and the rights of creditor factors have negative correlations to the debt maturity. Keywords Debt maturity, long-term debt ratio, GMM system, firm-level factors, country-level factors References [1] Barclay, M., Smith, C., Jr., “The maturity structure of corporate debt”, Journal of Finance, 50 (1995), 609-631. [2] Kirch, G., Terra, P.R.S., “Determinants of corporate debt maturity in SouthAmerica: Do institutional quality and financial development matter?”, Journal ofCorporate Finance, 18 (2012) 4, 980-993.[3] Cai, K., Fairchild, R., Guney, Y., “Debt maturity structure of Chinese companies”, Pacific Basin Finance Journal, 16 (2008), 268-297.[4] Deesomsak, R., Paudyal, K. & Pescetto, G., “Debt Maturity Structure and the 1997 Asian Financial Crisis”, Journal of Multinational Financial Management ,19(2009) 1, 26-42. [5] Goyal, V.K., Wang, W., “Debt maturity and asymmetric information: Evidence from default risk changes”, Journal of Financial and Quantitative Analysis, 48 (2013), 789-817.[6] Tesfaye T. Lemma, Minga Negash, “Debt Maturity Choice of a Firm: Evidence from African Countries”, Journal of Business and Policy Research, 7 (2012) 2, 60-92[7] Sérgio Costaa, Luis M. S. Laureanoa, Raul M. S. Laureanoa, “The debt maturity of Portuguese SMEs: The aftermath of the 2008 financial crisis”, Social and Behavioral Sciences, 150 (2014 ), 172-181.[8] Myers, S. C., “The Capital Structure Puzzle”, Journal of Finance, 39 (1984), 575-592.[9] Lucas, D., and R. L. McDonald, R. L., “Equity Issues and Stock Price Dynamics”, Journal of Finance, 45 (1990),1019-1043.[10] Flannery, M. J., “Asymmetric Information and Risky Debt Maturity Choice”, Journal of Finance, 41 (1986), 19-37.[11] Douglas W. Diamond, “Monitoring and Reputation: The Choice between Bank Loans and Directly Placed Debt”, The Journal of Political Economy, 99 (1991) 4, 689-721.[12] Morris, “On corporate debt maturity strategies”, Journal of Finance, 31 (1976) 1, 29-37.[13] Myers, S. C.,“Determinants of Corporate Borrowings”, The Journal of Finance, 5 (1977), 147-175.[14] Amir Barnea, Robert A. Haugen, Lemma W. Senbet, “A rationale for debt maturity structure and call provisions in the agency theoretic framework”, The Journal of Finance, 35 (1980) 5, 1223-1234.[15] Jensen M. and W. Meckling, “Theory of the Firm: Managerial Behavior, Agency Costs, and Capital Structure”, Journal of Financial Economics, 3 (1976), 305-360.[16] Douglass C. North, “Institutions”, Journal of Economic Perspectives, 5 (1990) 1, 97-112.[17] Meyer, K. E., “Institutions, transaction costs and entry mode choice in Eastern Europe”, Journal of International Business Studies, 32 (2001), 357-67.[18] Barclay, M.J., Marx, L.M., Smith, C.W., “The joint determination of leverage and maturity”, Journal of Corporate Finance, 9 (2003), 149-167.[19] Johnson, S.A., “Debt maturity and the effects of growth opportunities and liquidity risk on leverage”, Review of Financial Studies, 16 (2003), 209-236.[20] Antoniou, A., Guney, Y., Paudyal, K., “The determinants of debt maturity structure: Evidence from France, Germany and the UK”, European Financial Management, 12 (2006) 2, 161-194.[21] Lopez-Gracia, J., Mestre-Barbera, R., “Tax effect on Spanish SME optimum debt maturity structure”, Journal of Business Research, 64 (2011), 649-65.[22] Custódio, C., Ferreira, A., Laureano, L., “Why are US firms using more short-term debt?”, Journal of Financial Economics, 108 (2013) 1, 182-212.[23] El Ghoul, S., Guedhami, O., Pittman, J., Rizeanu, S., “Cross-country evidence on the importance of auditor choice to corporate debt maturity”, Contemporary Accounting Research (2014).[24] Belkhir, M., Ben-Nasr, H., Boubaker, S., “Labor protection and corporate debt maturity: International evidence”, UAE University working paper (2014).[25] Stephan, A., Talavera,O., Tsapin, A., “Corporate debt maturity choice in emerging financial markets”, Quarterly Review of Economics and Finance, 51 (2011), 141-151.[26] Bae, K. H., Goyal, V. K., “Creditor rights, enforcement, and bank loans”, The Journal of Finance, 64 (2009) 2, 823-860.[27] Gonzalez-Mendez, V.M., “Determinants of debt maturity structure across firm size”, Spanish Journal of Finance and Accounting, 17 (2013), 187-209.[28] Mark Hoven Stohs, David C. Mauer, “The Determinants of Corporate Debt Maturity Structure”, Journal of Business, 69 (1996) 3.[29] Scherr, F. C. and Hulburt, H. M., “The Debt Maturity Structure of Small Firms”, Financial Management, 1 (2001), 85-111.[30] Magri, S., “Debt maturity of Italian firms”, Journal of Money, Credit and Banking, 42 2010, 443-463.[31] Oman, C., Köksal, B., “Debt maturity across firm types: Evidence from a major developing economy”, Emerging Markets Review, 30 (2017), 169-199.[32] Awartani, B., Belkhir, M., Boubaker, S., Maghyereh, A., “Corporate debt maturity in the MENA region: Does institutional quality matter?”, International Review of Financial Analysis, 46 (2016), 309-325.[33] Antonios Antoniou, Yilmaz Guney, Krishna Paudyal, The Determinants of Debt Maturity Structure: Evidence from France, Germany and the UK, European Financial Management, 12 (2006) 2, 161-194.[34] Antoniou, A., Guney, Y., Paudyal, K., “The determinants of capital structure: Capital market-oriented versus bank-oriented institutions”, Journal of Financial and Quantitative Analysis, 43 (2008) 1, 59-92.[35] Fan, J. P., Titman, S., Twite, G., “An international comparison of capital structure and debt maturity choices”, Journal of Financial and Quantitative Analysis, 47 (2012) 1, 23.[36] Garcia-Teruel P, Martinez-Solano P., “Short-term debt in Spanish SMEs”, Int Small Bussiness Journal, 25 (2007), 579-602.[37] Giannetti, M., “Do better institutions mitigate agency problems? Evidence fromcorporate finance choices”, Journal of Financial and Quantitative Analysis, 38 (2003) 1, 185-212.[38] Diamond, W., “Presidential address, committing to commit: Short-term debtwhen enforcement is costly”, The Journal of Finance, 59 (2004) 4, 1447-1479.[39] Qian, J., Strahan, E., “How laws and institutions shape financial contracts: The case of bank loans”, The Journal of Finance, 62 (2007) 6, 2803-2834.[40] Aris, “Legal systems, capital structure, and debt maturity in developing countries”, Corp. Gov., 24 (2016), 130-144.[41] Cuneyt Orman, Bülent Köksal, “Debt Maturity across Firm Types: Evidence from a Major Developing Economy”, Emerging Markets Review, 30 (2016). [42] Zheng, X., El Ghoul, S., Guedhami, O., Kwok, C., “National culture and corporate debt maturity”, Journal of Banking & Finance, 36 (2012) 2, 468-488.[43] Jun Qian, Philip E. Strahan, “How Laws and Institutions Shape Financial Contracts: The Case of Bank Loans”, The Journal of Finance, 62 (2007) 6, 2803-2834.[44] Vig, V., “Access to collateral and corporate debt structure: Evidence from a natural experiment”, The Journal of Finance, 68 (2013) 3, 881-928.[45] Cho, S., El Ghoul, S., Guedhami, O., Suh, J., “Creditor rights and capital structure: Evidence from international data”, Journal of Corporate Finance, 25 (2014), 40-60.[46] Mark Hoven Stohs, David C Mauer, “The Determinants of Corporate Debt Maturity Structure”, The Journal of Business, 69 (1996) 3, 279-312. [47] Kane, A., A. J. Marcus, R. L. McDonald, “Debt Policy and the Rate of Return Premium to Leverage”, The Journal of Financial and Quantitative Analysis, 20 (1985) 4, 479-499.[48] E. I. Altman, “Corporate financial distress: A complete guide to predicting, avoiding, and dealing with bankruptcy”, New York: John Wiley & Sons, 1983. [49] Mackie-Mason, Jeffrey K., “Do Taxes Affect Corporate Financing Decisions?”, Journal of Finance, 45 (1990) 5, 1471-1493.[50] Djankov, S., C. McLiesh, and A. Shleifer, “Private credit in 129 countries”, Journal of Financial Economics, 84 (2007), 299-329.
APA, Harvard, Vancouver, ISO, and other styles
13

Mohseni, M. Rohangis, and Jessica Grau Chopite. "Online Incel Speech (Hate Speech/Incivility)." DOCA - Database of Variables for Content Analysis, June 18, 2022. http://dx.doi.org/10.34778/5j.

Full text
Abstract:
Involuntarily celibate men (Incels) form online communities in which they “often bemoan their lack of a loving relationship with a woman while simultaneously dehumanizing women and calling for misogynistic violence” (Glace et al., 2021, p. 288). Several studies investigate this dehumanization and misogyny including (gendered) hate speech in online comments from Incels (e.g., Glace et al., 2021). However, not all online comments from Incels contain misogyny or gendered hate speech. To get a better understanding of the phenomenon of Incels, it would be better to not only focus on these problematic comments. Thus, we propose a new construct called “Online Incel speech”, which is defined as the sum of all online comments from Incels that are related to Inceldom, that is, being or becoming an Incel. In an approach to provide an extensive system of categorization, Grau Chopite (2022) synthesized codebooks from several studies on Incels (see example studies table note) and put it to an empirical test. She found that most Incel comments found online can be categorized into three subdimensions. The first two subdimensions cover framing by Incels, namely how Incels frame the subjective causes of becoming an Incel and how they frame the subjective emotional consequences of being an Incel. Both subdimensions can also be interpreted as part of a subjective theory (sensu Groeben et al., 1988) of Inceldom. In contrast to this, the third subdimension does not consist of framing, but of observable verbal behaviors, which are often linked to gendered hate speech. When trying to categorize online comments from Incels, former studies often applied the construct “Hybrid Masculinities” (e.g., Glace et al, 2021). This construct from Bridge and Pascoe (2014) suggests that “some men develop masculinities which appear to subvert, but actually reaffirm, White hegemonic masculinities” (Glace et al., 2021, p. 289). Glace et al. (2021) structure the construct into three subdimensions, namely (1) discursive distancing (claiming distance from hegemonic masculine roles without actually relinquishing masculine power), (2) strategic borrowing (appropriating the cultures of nondominant groups of men), and (3) fortifying boundaries (continually using hegemonic standards to constrain masculinity and demeaning men who fail to meet them). However, the construct only covers a part of Inceldom, which Glace et al. (2021) indirectly acknowledge by adding two inductive categories, that is, hostile sexism (shaming and degrading women) and suicidality (reporting suicidal thoughts, feelings, and intentions). Field of application/theoretical foundation: The construct “Online Incel speech” was coined by Grau Chopite (2022), and there are currently no other studies making use of it. However, there are studies (e.g., Vu & Lynn, 2020; also see the entry “Frames (Automated Content Analysis”) based on the framing theory by Entman (1991) where the subdimension “subjective causes” would correspond to Entman’s “causal interpretation frame”, while the “subjective emotional consequences” would correspond to Entman’s “problem definition frame”. The “subjective causes” also correspond to the “discursive distancing” and the “emotional consequences” to “suicidality” in the construct of Hybrid Masculinities. The third subdimension “verbal behavior” corresponds to gendered online hate speech (e.g., Döring & Mohseni, 2019), but also to “hostile sexism” and “fortifying boundaries” in the construct of Hybrid Masculinities. References/combination with other methods: The study by Grau Chopite (2022) employs a quantitative manual content analysis using a deductive approach. Studies based on the construct of Hybrid Masculinities also employ manual online content analyses or manual thematic analyses, but those are often qualitative in nature (e.g., Glace et al., 2021). Framing is also often assessed with manual content analyses (e.g., Nitsch & Lichtenstein, 2019), but newer studies try to assess it computationally (e.g., Vu & Lynn, 2020). Hate speech is often assessed with manual content analyses (e.g., Döring & Mohseni, 2019) and surveys (e.g., Oksanen et al., 2014), but some newer studies try to assess it computationally (e.g., Al-Hassan & Al-Dossari, 2019). As Online Incel Speech is related to framing and gendered hate speech, it seems plausible that manual content analyses of Online Incel Speech could be combined with computational analyses, too, to enable the investigation of large samples. However, computational analyses of subtle forms of verbal behavior can be challenging because the number of wrong categorizations increases (e.g., for sexism detection see Samory et al., 2021; for hate speech detection see Ruiter et al., 2022). Example studies: Example study Construct Dimensions Explanation Reliability Online Incel speech Grau Chopite (2022) Subjective Causes of Inceldom Race/Ethnicity having certain racial features and/or belonging to a certain ethnic κ = .55;AC1 = .80 Mental Health suffering from any mental health issue κ = .58;AC1 = .90 Employment difficulties with getting and/or maintaining employment; experiencing dissatisfaction in the workplace κ = .85;AC1 = .98 Family having family issues (e.g., an abusive family member) κ = .66;AC1 = .98 Subjective Emotional Consequences of Inceldom Hopelessness expressing hopelessness κ = .37;AC1 = .89 Sadness expressing sadness κ = .26;AC1 = .91 Suicidality expressing suicidality κ = .24;AC1 = .95 Anger expressing anger κ = .44;AC1 = .87 Hatred expressing hatred κ = .40;AC1 = .83 Verbal Behavior of Incels Using Gendered Hate Speech Against Women hostile sexism against women and misogynistic speech κ = .80;AC1 = .87 Adopting Social Justice Language claiming unfairness/ injustice of being discriminated by society or groups (e.g., other men, other races) κ = .48;AC1 = .82 Claiming Lack of Masculine Traits lacking masculine traits (e.g., muscles, a big penis) κ = .62;AC1 = .86 Shaming Other Men shaming of other men directly by calling them terms related to being “effeminate” or “unmanly” κ = .71;AC1 = .91 Claiming Lack of Female Interest being unable to attract women or being rejected by women κ = .61;AC1 = .87 Hybrid Masculinities Glace et al. (2021) Discursive Distancing Lack of Female Interest claiming a lack of ability to attract female romantic companionship and sexual interest n/a Lack of Masculine Traits claiming a lack of traditionally attractive masculine physical traits n/a Strategic Borrowing Race and Racism appropriating the culture of racial and ethnic minority men n/a Social Justice Language using the language of the marginalized to diminish one’s own position of power n/a Fortifying Boundaries Soyboys deriding non-Incel men as weak and desperate n/a Cucks deriding non-Incel men as being cheated or exploited by women n/a Hostile Sexism Women are Ugly deriding women for being unattractive n/a Slut-Shaming deriding women for having sex n/a False Rape Claims claiming that women make false rape claims (e.g., when approached by an Incel) n/a Women’s Only Value is Sex claiming that women’s only value is their sexuality n/a Women are Subhuman dehumanizing women n/a Suicidality Due to Incel Experience attributing suicidal thoughts, feelings, and intentions to Incel status n/a The “Clown World” claiming that the world is meaningless and nonsensical n/a Note: The codebook from Grau Chopite (2022) is based on the codebook and findings of Glace et al. (2021) and other studies (Baele et al., 2019; Bou-Franch & Garcés-Conejos Blitvich, 2021; Bridges & Pascoe, 2014; Cottee, 2020; Döring & Mohseni, 2019; D’Souza et al., 2018; Marwick & Caplan, 2018; Mattheis & Waltman, 2021; Maxwell et al., 2020; Rogers et al., 2015; Rouda & Siegel, 2020; Scaptura & Boyle, 2019; Williams & Arntfield, 2020; Williams et al., 2021). Gwet’s AC1 was calculated in addition to Cohen’s Kappa because some categories were rarely coded, which biases Cohen’s Kappa. The codebook is available at http://doi.org/10.23668/psycharchives.5626 References Al-Hassan, A., & Al-Dossari, Hmood (2019). Detection of hate speech in social networks: A survey on multilingual corpus. In D. Nagamalai & D. C. Wyld (Eds.), Computer Science & Information Technology. Proceedings of the 6th International Conference on Computer Science and Information Technology (pp. 83–100). AIRCC Publishing. doi:10.5121/csit.2019.90208 Baele, S. J., Brace, L., & Coan, T. G. (2019). From “Incel” to “Saint”: Analyzing the violent worldview behind the 2018 Toronto attack. Terrorism and Political Violence, 1–25. doi:10.1080/09546553.2019.1638256 Bou-Franch, P., & Garcés-Conejos Blitvich, P. (2021). Gender ideology and social identity processes in online language aggression against women. In R. M. DeKeyser (Ed.), Benjamins Current Topics: Vol. 116. Aptitude-Treatment Interaction in Second Language Learning (Vol. 86, pp. 59–81). John Benjamins Publishing Company. doi:10.1075/bct.86.03bou Bridges, T., & Pascoe, C. J. (2014). Hybrid masculinities: New directions in the sociology of men and masculinities. Sociology Compass, 8(3), 246–258. doi:10.1111/soc4.12134 Cottee, S. (2021). Incel (e)motives: Resentment, shame and revenge. Studies in Conflict & Terrorism, 44(2), 93–114. doi:10.1080/1057610X.2020.1822589 Döring, N., & Mohseni, M. R. (2018). Male dominance and sexism on YouTube: Results of three content analyses. Feminist Media Studies, 19(4), 512–524. doi:10.1080/14680777.2018.1467945 D'Souza, T., Griffin, L., Shackelton, N., & Walt, D. (2018). Harming women with words: The failure of Australian law to prohibit gendered hate speech. University of New South Wales Law Journal, 41(3), 939–976. Entman, R. M. 1991. Framing U.S. coverage of international news: contrasts in narratives of the KAL and Iran Air incidents. Journal of Communication, 41(4), 6-7. Glace, A. M., Dover, T. L., & Zatkin, J. G. (2021). Taking the black pill: An empirical analysis of the “Incel”. Psychology of Men & Masculinities, 22(2), 288–297. doi:10.1037/men0000328 Grau Chopite, J. (2022). Framing of Inceldom on incels.is: A content analysis [Master’s thesis, TU Ilmenau]. Psycharchives. doi:10.23668/psycharchives.5626 Groeben, N., Wahl, D., Schlee, J., & Scheele, B. (Eds.). (1988). Das Forschungsprogramm Subjektive Theorien: eine Einführung in die Psychologie des reflexiven Subjekts. Francke. Retrieved from https://nbn-resolving.org/urn:nbn:de:0168-ssoar-27658 Marwick, A. E., & Caplan, R. (2018). Drinking male tears: language, the manosphere, and networked harassment. Feminist Media Studies, 18(4), 543–559. doi:10.1080/14680777.2018.1450568 Mattheis, A. A., & Waltman, M. S. (2021). Gendered hate online. In K. Ross & I. Bachmann (Eds.), The Wiley Blackwell-ICA international encyclopedias of communication. The international encyclopedia of gender, media, and communication (pp. 1–5). John Wiley & Sons Inc. doi:10.1002/9781119429128.iegmc019 Maxwell, D., Robinson, S. R., Williams, J. R., & Keaton, C. (2020). “A short story of a lonely guy”: A qualitative thematic analysis of involuntary celibacy using Reddit. Sexuality & Culture, 24(6), 1852–1874. doi:10.1007/s12119-020-09724-6 Nitsch, C. & Lichtenstein, D. (2019). Satirizing international crises. The depiction of the Ukraine, Greek debt and migration crises in political satire. Studies in Communication Science (SComS), 19(1), 85-103. doi:10.24434/j.scoms.2019.01.007 Oksanen, A., Hawdon, J., Holkeri, E., Näsi, M., & Räsänen, P. (2014). Exposure to online hate among young social media users. In N. Warehime (Ed.), Soul of Society: A focus on the lives of children & youth (p. 253-273). doi:10.1108/S1537-466120140000018021 Rogers, D. L., Cervantes, E., & Espinosa, J. C. (2015). Development and validation of the belief in female sexual deceptiveness scale. Journal of Interpersonal Violence, 30(5), 744–761. doi:10.1177/0886260514536282 Rouda, B., & Siegel, A. (2020). I’d kill for a girl like that”: The black pill and the Incel uprising. International Multidisciplinary Program in the Humanities, Tel Aviv University. Retrieved from https://www.academia.edu/43663741/_Id_kill_for_a_girl_like_that_The_Black_Pill_and_the_Incel_Uprising Ruiter, D., Reiners, L., Geet D’Sa, A., Kleinbauer, Th., Fohr, D., Illina, I., Klakow. D., Schemer, Ch., & Monnier, A. (2022). Placing m-phasis on the plurality of hate. A feature-based corpus of hate online. Preprint. Retrieved from https://doi.org/10.48550/arXiv.2204.13400 Samory, M., Sen, I., Kohne, J., Flöck, F., & Wagner, C. (2021). “Call me sexist, but...”: Revisiting sexism detection using psychological scales and adversarial samples. Proceedings of the International AAAI Conference on Web and Social Media, 15(1), 573-584. Retrieved from https://ojs.aaai.org/index.php/ICWSM/article/view/18085 Scaptura, M. N., & Boyle, K. M. (2019). Masculinity threat, “Incel” traits, and violent fantasies among heterosexual men in the United States. Feminist Criminology, 15(3), 278–298. doi:10.1177/1557085119896415 Vu, H. T., & Lynn, N. (2020). When the news takes sides: Automated framing analysis of news coverage of the Rohingya crisis by the elite press from three countries. Journalism Studies. Online first publication. doi:10.1080/1461670X.2020.1745665 Williams, D. J., & Arntfield, M. (2020). Extreme sex-negativity: An examination of helplessness, hopelessness, and misattribution of blame among “Incel” multiple homicide offenders. Journal of Positive Sexuality, 6(1), 33–42. doi:10.51681/1.613 Williams, D. J., Arntfield, M., Schaal, K., & Vincent, J. (2021). Wanting sex and willing to kill: Examining demographic and cognitive characteristics of violent "involuntary celibates". Behavioral Sciences & the Law, 39(4), 386–401. doi:10.1002/bsl.2512
APA, Harvard, Vancouver, ISO, and other styles
14

Elliott, Charlene. "Colour™." M/C Journal 8, no. 4 (August 1, 2005). http://dx.doi.org/10.5204/mcj.2393.

Full text
Abstract:
The brand, by definition, promises the experience of the scan. A quick glance at the exterior (i.e. brand name/image) presumably conveys a host of brand attributes to the shopper. This scanning experience is particularly intriguing when it comes to colour trademarks, for it presumes that the sight of a colour brings individuals to the same set of associations—that purple connotes Cadbury chocolate, for instance, while pink signifies Owens Corning Fiberglass insulation and orange suggests Orange Personal Communications. But there is a complexity to both colour trademarks and this scanning ‘experience’ that demands a closer look; this paper probes the logic of the ‘colour scan’, as well as its significance. Sketching out 1) how the legal ownership of colour alone or colour per se corresponds to and idealises practices of scanning, and 2) how colour trademarks are positioned (in legal and marketing literature) as a means of dealing with information overload, the paper then addresses how the granting of colour marks by the trademark office/courts creates various difficulties—both for competing brands and for colour communication itself. Most problematic about the ‘brand’ colour scan is that it runs counter to the very nature of colour, which bursts free of constraints with its infinite potential to signify. I Granting legal ownership to colour corresponds to and idealises practices of scanning One great thing about colour, argues Martin Lindstrom in his newly published marketing book Brand Sense (2005) is that it contributes to the ‘smashability’ of a brand. Successful brands can be ‘smashed’ like a glass bottle of Coca-Cola and consumers would still recognise the brand from its pieces. Logically, then, marketers should place a ‘signature’ colour at the center of all branding efforts. Trademarking this colour is even better, as it secures the hue as a distinct part of a particular brand’s sensory experience (119). More to the point, it prevents competitors from using the trademarked colour—or any confusingly similar shade—to promote their products. Of course, marketers have long recognised this fact, and the history of the U.S. is dappled with attempts to ‘own’ a colour. Examples range from Leschen & Sons Rope Company’s claim to ‘blue’ woven into wire rope in 1906 and Campbell Soup’s quest to monopolise red and white for soup labels in 1949, to Life Savers’ desire for certain candy wrapper colours in 1950 and Kraft’s application for royal blue on silver solely for its Klondike bars in 1986. In 1990, NutraSweet Co. even sought rights to the spectrum of blue for its sweetener, arguing that “the accepted market understanding is that pastel blue means ‘Equal,’ pink means ‘Sweet ‘N Low’ and yellow means ‘Sugar Twin’” (Kearns, 355ff). All of these requests demonstrate that colour fits the demands of the glance—it is scanworthy—an understanding the U.S. Supreme Court ultimately supported in 1995 in Qualitex Co. v. Jacobson Products Co. when it ruled that colour per se could in fact constitute a legal trademark. Some analysts see a “trademark disaster” looming in colour ownership (Overcamp); its trademarking certainly provides a vivid example of what Carol Rose deems the “propertisation” of seemingly “un-ownable resources” (Rose, 94). But disaster and propertisation aside, colour trademarks suggest the idealised object d’scan; purple, for instance, provides an instant sensory strike, but if the logic of colour trademarks works, purple also connotes a host of very specific meanings. Within the world of confectionaries in the UK, purple means not simply chocolate but chocolate by Cadbury Limited. This is an important point, since the function of a trademark is not merely to distinguish products from one another but also to indicate the source or origin of a product. As such, purple simultaneously embodies both definitions of scan—both the “quick glance” and the “measured study”—because the exteriority of purple (so we are to understand) immediately gives way to the interiority of the brand. Purple’s exteriority singularly connotes the “taste, smoothness and snap characteristic of Cadbury chocolate” in the confectionary sector (Cadbury). Perhaps this is not too much to ask of colour. After all, the Latin colorem “is related to celare, to hide or conceal; in Middle English ‘to colour’ is to embellish or adorn” as well as “to disguise” (Batchelor 52). Perhaps purple really does conceal the ‘source’ of Cadbury Limited, the fact that a certain product in the UK confectionary sector originates with Cadbury. But perhaps (as will be discussed) it conceals something more… II Colour trademarks are positioned as means of dealing with information overload Practices of scanning, suggest the editors of this issue, stem from “the increased number of things to consider and the reduced amount of time to consider them”. Despite the fact that they are not designed to do so1, colour trademarks shine as a golden solution to this problem of information overload, as well as to a variety of other marketing challenges. Observing colour takes no time, it makes consideration easy and it transcends borders, cultures, and language barriers. Colour naturally draws attention. So, if we’re dealing with a saturated marketplace characterised by information overload, the push for colour trademarks actually works to shift the balance of both the overload and the saturation. Today’s aim is for colour saturation, with brighter, bolder, weirder, and signature hues colonising untapped arenas—as per pink Parkay margarine and blue Heinz fries (which failed), and “Funky Purple” and “Blastin’ Green” Heinz EZ Squirt ketchup (which triumphed). Think, too, of crayoned cell phones, fruit-flavored iMacs, or even Air Canada’s Zip airlines, which coloured the runways in September 2002 with its bold palette of blue, fuchsia, orange and green planes. This push to create a distinct ‘signature’ colour is actually a type of colour overload, with unusual hues being stuffed into ordinary arenas. Ironically, colour is equally used to promise a respite for consumers overwhelmed by a complex environment. Orange Personal Communications, the UK’s largest telecommunications provider, reassures customers with the tagline “The Future’s Bright, The Future’s Orange”—a promise that the company visually demonstrates with its legally trademarked orange (Pantone No. 151) used to market its telephones and all things related to its telecommunication services. III Significance of the colour™ scan The obvious problem with the colour™ scan is that its immediate sensory strike may not take consumers to the ‘deeper’ associations of the brand. Trademarks, observes Celia Lury, are “a way of fixing things” (98) but it is difficult to believe that blue or orange or purple (etc.) can be tacked down so neatly. Does the ordinary consumer really associate turquoise with H.J. Heinz in the category of canned beans? And do consumers make these links even though our world is saturated with colourful experiences and products? Businesses argue that they do and frequently roll out survey data, advertising expenditures, and the paid services of visual ‘experts’ to demonstrate and prove its particular colour ‘rights’ to the trademark office and/or court. In this way, corporate players, supported by the courts, authorise specific colour meanings, and discount others. But perhaps colour isn’t smashable. Even corporately ‘authorised’ colour readings (i.e. those that purportedly ‘scan’ in sync with the brand) encounter difficulties because the semiotics of colour continually evades the quest to pin it down. Regardless of its legal status, a trademark does not actually sequester colour or spontaneously combust a precise brand meaning within individuals. Orange Personal Communications may own the rights to Pantone No. 151 (orange) in the UK, but this has not stopped easyMobile from using a very similar shade of orange to promote its nascent cell phone services. Although Orange began court action against easyMobile over the colour orange on February 18, 2005, the legal ‘solution’ to this infringement is unclear. The problem is that easyMobile is not merely an upstart company, but a subsidiary of easyGroup, well known for its signature orange shellacking its entire discount brand—a brand spanning jet planes, car rentals, internet cafes, movie theatres, cruise lines, male toiletries, and pizza delivery. Thus, the company with the rights to orange for its telecommunications has challenged a company that places orange at the very centre of its brand. What is to be done? Should easyGroup be blocked from using its signature colour for one branch of its operations? If so, wouldn’t this be counter to the very logic of branding? Conversely, what about Orange Communications’ “rights to orange” within the realm of mobile phone services? Aren’t they being infringed? The solution is unclear. And the waters are no less muddied by the fact that the ‘trademarked’ orange in question is Pantone No. 151, while easyGroup uses Pantone No. 023. The numbers, objectively, are different—but what do consumers see? What is the meaning of orange for them? These Pantone numbers, just like advertising expenditures, trademark certifications, and ‘expert’ opinions, remain utterly silent on the question of colour meaning and personal interpretation. And so, we are left with a troubled notion of the scanning of trademarked colours. It’s a practice that promises—but cannot guarantee—a particular meaning and reading within a certain context, one that is perfectly suited to the ‘instant look’ yet might contain a significance far different than the one authored and authorised by a business and the trademark office. While colour is scanworthy, it has multiple meanings and multiple readings; it is subject to recoding and reworking and distortion. That is what makes it colourful. Notes Trademarks recognise distinctiveness within a particular class of goods or services (i.e. Cadbury Ltd. successfully registered purple in the UK for use in the category of chocolate and chocolate confectionary, and a similar mark has been accepted for registration in New Zealand. This does not, of course, give Cadbury Ltd. the exclusive right to purple in unrelated categories, such as sporting goods. Interestingly, Cadbury’s application to register eight different shades of ‘Cadbury purple’ in Australia was unsuccessful.) The author gratefully acknowledges the thoughtful and thorough commentary provided by an anonymous referee. Thank you. Many excellent points were raised which, due to space constraints, were woefully under-addressed in this piece. References Batchelor, D. Chromophobia. London: Reaktion Books, 2000. Cadbury. “History of Chocolate.” 26 June 2005 http://www.cadbury.co.uk/>. Kearns, J. H. “Qualitex Co. v. Jacobson Products Co.: Orange You Sorry the Supreme Court Protected Color?” St. John’s Law Review 70.2 (1996): 337-58. Lindstrom, M. Brand Sense: Build Powerful Brands through Touch, Taste, Smell, Sight, and Sound. New York: Free Press, 2005. Lury, C. Brands: The Logos of the Global Economy. New York: Routledge, 2004. Overcamp, E. (1995). “The Qualitex Monster: The Color Trademark Disaster.” Journal of Intellectual Property Law 2.2 (1995): 595-620. Rose, C. “Romans, Roads, and Romantic Creators: Traditions of Public Property in the Information Age.” Law and Contemporary Problems 89 (Winter/Spring 2003): 89-110. Cases Qualitex Co. v. Jacobson Products Co., 514 U.S. 159, (1995). Citation reference for this article MLA Style Elliott, Charlene. "Colour™: Law and the Sensory Scan." M/C Journal 8.4 (2005). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0508/06-elliott.php>. APA Style Elliott, C. (Aug. 2005) "Colour™: Law and the Sensory Scan," M/C Journal, 8(4). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0508/06-elliott.php>.
APA, Harvard, Vancouver, ISO, and other styles
15

Putri, Arridha Hutami, and Nelva Karmila Jusuf. "Plant Stem Cell sebagai Antipenuaan Kulit." Media Dermato Venereologica Indonesiana 48, no. 4 (February 15, 2022). http://dx.doi.org/10.33820/mdvi.v48i4.119.

Full text
Abstract:
PENDAHULUAN Stem cell sering disebut sebagai sel punca atau sel induk, bertanggung jawab atas regenerasi dan pemeliharaan jaringan serta memiliki karakteristik yang unik yaitu menghasilkan salinan dirinya dan keturunan sel yang berbeda ketika membelah.1 Stem cell yang berasal dari tumbuhan memiliki sifat membantu merangsang dan meregenerasi tanaman setelah cedera. Sifat unik plant stem cell telah menjadi bidang yang banyak diminati baru-baru ini, terutama dalam mengembangkan kosmetik baru dan mempelajari bagaimana ekstrak/phytohormone ini dapat mempengaruhi kulit. Usaha regeneratif yang dilakukan tumbuh-tumbuhan tidak hanya pada perbaikan jaringan akibat kerusakan, tetapi juga perkembangan tumbuhan yang baru.2,3Penuaan kulit merupakan suatu proses kompleks yang dipengaruhi faktor internal dan eksternal serta melibatkan seluruh lapisan epidermis dan dermis.4,5 Tujuan dari kosmetik antipenuaan modern adalah untuk memperbaiki tampilan kulit dengan menstimulasi dan meregenerasi proses fisiologis alami demi perbaikan kondisi kulit dan perlindungan dari berbagai faktor yang menyebabkan penuaan, terlepas berapapun usia sesungguhnya. Kandungan yang menarik perhatian adalah plant stem cell, telah dinyatakan memberikan efek proteksi terhadap stem cell manusia dengan cara menstimulasi regenerasi kulit dan mencegah proses penuaannya.4 Penuaan KulitPenuaan adalah proses biologis yang tak terhindarkan, kompleks dan dinamis yang ditandai dengan kemunduran progresif dari berbagai sistem pada tubuh dan penurunan kapasitas cadangan fisiologis.5 Kulit manusia mengalami dua jenis penuaan yaitu penuaan intrinsik dan ekstrinsik. Penuaan intrinsik mencakup serangkaian perubahan fisiologis bertahap yang merupakan konsekuensi dari waktu ke waktu dan dipengaruhi genetik dan hormonal. Penuaan ekstrinsik merupakan perubahan struktural dan fungsional yang disebabkan oleh faktor eksogen, terutama paparan sinar matahari (disebut juga photoaging), alkohol, merokok, malnutrisi dan lingkungan yang merugikan, namun dalam kondisi tertentu masih dapat dihindari.5-7Proses penuaan kulit intrinsik ditandai dengan adanya proses penuaan seluler, penurunan kapasitas proliferasi, penurunan kemampuan perbaikan deoxyribonucleic acid (DNA), stres oksidatif dan mutasi gen.8 Fungsi sawar kulit terganggu akibat perubahan struktur filamen keratin dan penurunan filagrin.Dalam hormonal, hormon seks terutama estrogen mempengaruhi sintesis kolagen, asam hialuronat, elastin dan komponen lain dari matriks ekstraseluler. Bersama-sama, ketiga komponen ini memberikan tampilan kulit yang sehat dan muda.Perubahan biokimia yang terjadi pada kolagen, elastin dan komponen dasar kulit menyebabkan penuaan kulit.5,9 Umumnya terjadi pada area kulit yang terlindungi dari paparan sinar matahari dengan klinis yang relatif lebih ringan, ditandai dengan tampilan kulit kering, pucat dan kendur dengan kerutan halus dan atau berbagai bentuk neoplasma jinak.10Sumber terbesar penuaan ekstrinsik adalah akumulasi dan paparan sinar matahari pada area yang tidak terlindungi seperti wajah, leher, dada dan lengan ekstensor. Faktor lain yang berpengaruh adalah merokok, terbukti kadar matrix metalloproteinase-1 (MMP-1) lebih tinggi pada perokok.5,6 Diet nutrisi seimbang memperlambat penuaan dengan menyediakan nutrisi, air dan oksigen yang diperlukan sel dalam pembelahan, mengirimkan informasi dan memperbaiki kerusakan.5 Photoaging atau penuaan kulit dini merupakan istilah yang digunakan untuk menggambarkan klinis dan histologi akibat paparan sinar matahari kronis.5-7,11 Peningkatan kerusakan dan penurunan produksi kolagen adalah landasan dari photoaging, ditandai dengan penampilan kulit yang kasar, kerutan, warna kulit menjadi pudar, telangiektasis, pigmentasi tidak merata, dan berbagai lesi jinak, premaligna dan neoplasma ganas.5,9-11 Stres oksidatif dan penuaanSalah satu teori penuaan melibatkan proses penuaan seluler atau apoptosis sekunder adalah stres oksidatif. Stres oksidatif merupakan kondisi ketidakseimbangan antara reactive oxygen species (ROS) dengan mekanisme antioksidan. Pertahanan antioksidan sistem enzimatik dan non-enzimatik pada kulit cenderung melemah seiring bertambahnya usia.5,10 Kerusakan oksidatif menyebabkan peningkatan pembentukan faktor-faktor yang berhubungan dengan stres, kemudian memicu proses penuaan intrinsik. Misalnya, hypoxia-inducible factor dan nuclear factor ĸB menginduksi ekspresi sitokin interleukin 1, interleukin 6, vascular endothelial growth factor (VEGF) dan tumor necrosis factor α (TNFα), yang telah terbukti merupakan regulator proinflamasi dan modulator penghancuran MMP. Selain itu, kerusakan oksidatif terhadap protein seluler bersamaan dengan penurunan aktivitas proteasom sejalan usia membentuk akumulasi kerusakan protein yang dapat mengganggu fungsi seluler normal.5Stres oksidatif juga mampu memodifikasi telomer yang awalnya bertahan terhadap degradasi, fusi atau rekombinasi abnormal.3,5 Pemendekan telomer adalah hasil dari ketidakmampuan DNA polimerase untuk mereplikasi pasangan basa akhir kromosom. Ketika mencapai ambang "sangat pendek", sel akan mengalami penuaan proliferatif atau apoptosis. Mekanisme umum penuaan intrinsik dan photoaging disebabkan oleh gangguan struktur siklus putaran normal pada akhir telomer. Pemaparan ini kemudian mengaktifkan pensinyalan p53 yang mengarah pada peristiwa penuaan proliferatif dan apoptosis.5Penuaan kulit merupakan proses kompleks yang melibatkan seluruh lapisan epidermis dan dermis, mencakup denaturasi protein dan penurunan fungsi regeneratif stem cell.3 Penurunan fungsi stem cell epidermis telah diamati berhubungan dengan telomer yang lebih pendek, yang mengurangi potensi proliferatif sebagai respon terhadap paparan UV.5 Plant Stem CellKarakteristik plant stem cellSalah satu teori Weismann mengenai penuaan menjelaskan bagaimana organisme multiselular menua melalui germ line yang imortal dengan akumulasi kerusakan lebih didistribusikan pada sel somatik. Tumbuhan tidak secara jelas memisahkan mana germ line dan sel somatik, sehingga menjadi pertanyaan apakah teori penuaan berlaku untuk tumbuh-tumbuhan. Plant stem cell memiliki tampilan seperti germ line, sementara jaringan tumbuhan yang mati pada saat musiman, seperti daun dan xilem, memiliki sifat seperti sel somatik. Bagaimana sebuah tumbuhan dapat mencapai usia yang ekstrem, plant stem cell mungkin memegang kunci dalam hal ini karena tumbuhan memiliki pasokan stem cell terus menerus.12Stem cell dipertahankan secara terus menerus melalui mekanisme pembaruan diri yang terjadi di dalam niches stem cell atau dediferensiasi struktur dewasa. Sel-sel ini memunculkan organ baru sehingga memungkinkan bertahan dalam kondisi ekstrem. Sebuah studi mengenai model embriogenesis somatik menunjukkan sistem yang menarik yaitu regenerasi tanaman dari protoplas mesofil sebagai jenis sel yang terpapar dan berkemungkinan dapat mengakumulasi kerusakan lalu berdediferensiasi menjadi sel pluripoten. Contoh model protoplas dari sel-sel mesofil yaitu Arabidopsis, dapat diinduksi dengan menambahkan phytohormones cytokinin dan auksin. Akar dan pucuknya dapat beregenerasi dari callus untuk menghasilkan tanaman dewasa dan memungkinkan untuk digunakan dalam perangkat molekuler genetik yang tersedia. 12Plant stem cell dikelompokkan menjadi niches yang disebut meristem, terdiri atas primer dan sekunder. Meristem primer adalah meristem apikal (pucuk pertumbuhan batang dan akar), meristem interkalari (sisipan) dan meristem germ. Meristem sekunder adalah bagian lateral yaitu kambium (smear) dan phellogen serta bagian traumatik (callus). Pada meristem apikal pucuk batang, proliferasi dan diferensiasi plant stem cell dikendalikan oleh banyak faktor, termasuk proses siklus putaran reversibel negatif antara produk ekspresi gen, yaitu protein WUSCHEL (WUS) dan CLAVATA3 (CLV3). Protein WUS disekresi oleh sel-sel pusat organisasi dan merupakan sinyal untuk proliferasi stem cell, sedangkan protein CLV3 disekresikan oleh stem cell dan terbatas pada area  WUS. Kelebihan stem cell menyebabkan CLV3 berlebihan dan merangsang pengurangan sekresi WUS sehingga sinyal proliferasi menurun. Namun, jika jumlah stem cell terlalu rendah (defisit CLV3), maka WUS akan meningkatkan jumlah stem cell.2,13Meristem traumatik (callus) muncul pada bagian tumbuhan yang terlukai, paling sering berdiferensiasi menjadi kambium. Fenomena penciptaan callus pertama kali dijelaskan oleh ahli botani Austria, Gottlieb Heberlandt pada tahun 1902. Dia menyatakan bahwa sel tumbuhan mampu meregenerasi seluruh tanaman dan percobaan pada tahun 1958, wortel berhasil dikloning dari sel wortel yang dibudidayakan secara in vitro. Proses pembuatan callus adalah satu tahap embriogenesis sel-sel somatik (pembentukan zigot tanpa pembuahan) atau disebut juga tumbuhan mengalami dediferensiasi menjadi stem cell yang mampu menghasilkan jaringan baru atau bahkan seluruh organ. Penelitian menunjukkan bahwa sitokin bertanggung jawab dalam memproduksi batang dari callus, sedangkan auksin bertanggung jawab memproduksi akar.2,13 Contoh lain adalah pada pucuk akar Arabidopsis sp., bagian pusatnya tidak aktif bermitosis namun dikelilingi oleh stem cell yang membentuk bagian distal, lateral serta bagian sel akar proksimal.12Kemampuan diferensiasi plant stem cell untuk dediferensiasi kembali menjadi status pluripotensial saat ini banyak dimanfaatkan untuk menghilangkan gejala penuaan kulit pada manusia dalam bentuk sediaan perawatan kulit atau prosedur kosmetik. Teknologi kultur plant stem cellTeknologi kultur sel tumbuhan memastikan pertumbuhan sel tumbuhan, jaringan atau organ dalam lingkungan dengan nutrisi yang bebas mikroba dan memungkinkan untuk sintesis zat aktif biologis. Kultur ini memungkinkan akses dengan material bebas polusi, mikroorganisme atau toksin, mampu di setiap musim, dengan kandungan zat aktif yang hampir sama di setiap bagian.4 Teknik kultur sel tumbuhan dengan metode perbanyakan plant stem cell bertujuan mendapatkan metabolit tumbuhan.3 Dasar biologis di dalam semua tumbuhan adalah reservoir stem cell yang pluripoten dan sel-sel dengan kemampuan berdediferensiasi (pluripoten). Dengan nutrisi yang tepat, callus dapat tumbuh dalam kultur dan dengan menggunakan stimulasi hormon yang tepat, mungkin dapat menstimulasi regenerasi tumbuhan dewasa (disebut sebagai teknik reproduksi mikro).4,13Langkah pertama adalah memilih bahan tumbuhan yang tepat (buah, daun atau akar). Selanjutnya jaringan tumbuhan disterilisasi dan direduksi menjadi fragmen mikroskopis (disebut "eksplan"). Eksplan ditempatkan pada cawan petri beserta nutrisi solid. Kultur dibuat dalam kondisi gelap (tidak berfotosintesis) dan disuplai oleh zat sumber karbon dan energi organik (seperti sakarosa), phytohormone (auksin dan sitokin), vitamin serta unsur mikro dan makro. Kemudian dipilih turunan sel dengan karakteristik biokimia dan metabolisme terbaik (produktif dalam waktu pembelahan terpendek), stabil dan seragam.Selanjutnya pembesaran volume biomassa yang disebut "scaling". Kultur suspense beradaptasi secara bertahap dimulai dari tabung (volume 200 mL) hingga dalam bioreaktor (volume 100 L). Proses fermentasi dipantau dengan pengukuran kadar gula, konduktivitas, tingkat pH, densitas optik, vitalitas sel dan isi metabolit sekunder seperti, asam ursolat.3,4,14Tahap akhir dari fermentasi adalah pengolahan biomassa yang diawali dengan pencampuran konten kultur dalam suspense, yang terdiri atas liposom, phenoxyethanol (pengawet) dan antioksidan (asam askorbat atau tokoferol). Selanjutnya, dilakukan homogenisasi tekanan tinggi, di mana dinding stem cell dihancurkan, komponen yang dimasukkan dilepaskan secara bersamaan komponen lipofilik ditutup di dalam liposom (lecithin), sedangkan komponen hidrofilik dilarutkan dalam fase air. Produk yang diperoleh adalah likuid berwarna kekuningan dan amber. Solusio ini berasal dari perusahaan Swiss Mibelle AG Biochemistry dan menamakan teknologi mereka PhytoCellTecTM (PCT).3,4,14,15   Plant stem cell versus ekstrak plant stem cellTerminologi merupakan hal yang sangat penting dalam hal penegasan cosmeceutical, yaitu pemahaman bahwa ketika istilah “plant stem cell” digunakan sebagai komposisi, sebenarnya mengacu pada ekstrak dari plant stem cell. Banyak perusahaan perawatan kulit mempromosikan produk mereka dengan mengklaim memanfaatkan teknologi stem cell.Ekstrak dari plant stem cell tidak dapat bertindak dengan cara yang sama seperti stem cell yang hidup.3 Menggabungkan ekstrak plant stem cell di dalam zat pembawa yang dapat membantu sel menembus hingga ke dalam kulit untuk memberikan manfaat kosmetik yang sebenarnya memerlukan teknologi yang tepat untuk mendapatkan potensi yang melekat dalam sediaan perawatan kulit.3,14Dengan pengaturan sedemikian rupa, kultur sel tumbuhan terdediferensiasi dapat mewarisi beberapa modifikasi epigenetik yaitu karakteristik biosintesis dan pertumbuhan jaringan yang sangat heterogen. Fakta ini memungkinkan untuk menghasilkan turunan sel tumbuhan dengan jumlah hampir tak terbatas dengan sifat phytochemical yang unik dan karakteristik tumbuh yang hampir sama dengan yang digunakan untuk inisiasi. Istilah “plant stem cell” dalam komposisi kosmetik sebenarnya mengacu pada kultur callus atau suspensi sel yang didapatkan dari ekstrak kultur sel tumbuhan yang berdediferensiasi ditambah solusio berteknologi tinggi yang mampu mempertahankan potensinya.14 1. 2. Ekstrak Plant Stem Cell sebagai Antipenuaan KulitEkstrak plant stem cell sebagai terapi regeneratif kulit Ekstrak terbaik dapat diperoleh dari plant stem cell yang biji atau buahnya mampu mempertahankan kesegaran dan reproduksibilitas dalam jangka waktu yang lama. Faktor penting yang harus dipertimbangkan selama pemilihan tanaman adalah habitatnya dalam kondisi lingkungan yang sulit atau kemampuannya untuk "menyembuhkan" tanaman lainnya.5 Pelopor dalam memproduksi plant stem cell untuk industri kosmetik adalah Mibelle AG Biochemistry company (Swiss), yang mengimplementasikan stem cell buah apel (PhytoCellTecTM Malus Domestica) dan dipublikasi pada tahun 2008. Pada studi klinis menggunakan krim PhytoCellTecTM Malus Domestica 2% selama 4 minggu, kerutan pada wajah berkurang.3 Sejak saat itu, Mibelle AG Biochemistry telah memperkenalkan ekstrak dari plant stem cell Vitis vinifera (PhytoCellTecTM Solar Vitis), Saponaria pumila (PhytoCellTecTM nunatak®) atau Argania spinosa (PhytoCellTecTM Argan) di pasar dalam bentuk suspensi yang memberikan efek antikerut serta meningkatkan aktivitas stem cell epidermis.21 Selain itu, terdapat bukti yang menunjukkan auksin tanaman memiliki efek regulasi terhadap panjang telomer.4Penting diketahui bahwa plant stem cell sangat sensitif terhadap faktor eksternal, seperti cahaya atau suhu. Dalam produk kosmetik, agar mereka dapat bertahan maka digunakan dalam bentuk ekstrak yang larut dalam lipid (diekstraksi dengan minyak) dan larut dalam air (diekstraksi dengan gliserol), ekstrak bubuk (dengan maltodekstrin), liposom, nanoemulsi atau suspensi.4,14 Aktivitas antioksidan dari ekstrak plant stem cellSeperti yang telah disebutkan di atas, radikal bebas dianggap sebagai senyawa aktif yang paling berperan dalam proses penuaan kulit. Ia merusak DNA dan membantu dehidrogenasi, hidroksilasi dan glikasi protein selain merusak lipid di stratum korneum. Akibatnya, kulit kehilangan elastisitas dan kapasitas dalam mengatur transepidermal water loss (TEWL) serta replikasi sel kurang efisien. Oleh karena itu, antioksidan adalah bahan baku penting dalam cosmeceutical.4 Ekstrak dari plant stem cell merupakan sumber senyawa antioksidan yang sangat baik, seperti polifenol, asam phenolic, flavonoid, triterpenes, karotenoid, stilbenes, steroidal saponin dan peptide.14Goutzourelas et al. mempelajari efek antioksidan senyawa phenolic dari ekstrak stem cell anggur (Vitis vinifera) pada sel endotel dan otot.Terapi ekstrak stem cell anggur konsentrasi rendah mampu meningkatkan status redoks sel. Trans-resveratrol, asam gallic, (+)-catechin, asam ferullic, asam caffeic, quercetin, asam coumaric dan kaempferol merupakan bahan utama aktivitas antioksidan dari ekstrak stem cell anggur. Sumber lain yang kaya senyawa phenylpropanoid, terutama isoverbascoside adalah ekstrak kultur sel daun Syringa Vulgaris.4,14 Tito juga melaporkan bahwa ekstrak stem cell tomat memiliki kandungan asam rutin, coumaric, protocatechuic dan chlorogenic yang lebih tinggi dari pada buah tomat dan memiliki kemampuan antioksidan lebih tinggi. Aktivitas antioksidan yang tinggi dari ekstrak stem cell raspberry juga telah dilaporkan oleh Barbulova dan rekannya. Selain senyawa polyphenolic, ditemukan juga banyak kandungan asam ferulic dan quercitin ramnoside.4Studi Bazylak dan Gryn membandingkan beberapa ekstrak plant stem cell dalam total konten polyphenolic dan scavenging radikal diphenyl picrylhydrazin (DPPH) pada ekstrak stem cell paper mulberry (Brussonetia kazinoki), anggur (Vitis vinifer), magnolsi (Magnolia sieboldii), teh hijau (Camelia sinensis), ginseng putih (Panax ginsgen) dan ginseng hidroponik. Hasilnya menunjukkan semua ekstrak memiliki aktivitas antioksidan serta yang paling tinggi dan efektif adalah teh hijau dan ginseng putih.3,17 KinetinSalah satu agen terpenting yang memberikan sifat antipenuaan pada ekstrak plant stem cell adalah kinetin (N6-furfuryladenine), suatu phytohormone cytokinin. Kinetin merupakan salah satu basa purin asam nukleat turunan adenin.18,19 Kinetin terbentuk secara alami dalam plant stem cell, misalnya, pohon pinus Australia (Casuarina equisetifolia) atau gingergrass (Cymbopogon martinii var. Motia). Konsentrasi kinetin yang sangat tinggi ditemukan dalam stem cell lemon (Citrus limon) dan raspberry (Rubus chamaemorus).4Kinetin dianggap sebagai antioksidan alami terkuat. Ia terlibat dalam induksi sintesis enzim regeneratif dan membentuk senyawa kompleks dengan ion tembaga (II) dan mengaktifkan superoksida dismutase. Kinetin juga melindungi DNA sel dengan menghambat pembentukan 8-oxo-dG, penanda kerusakan oksidatif yang terbentuk dari reaksi Fenton.18-21Faktor pertumbuhan alami ini adalah agen yang tepat untuk merangsang stem cell kulit. Menurut penelitian, ia memperbaiki fungsi sawar pada lapisan spinosum epidermis, merangsang keratinosit, menurunkan TEWL, yang memperbaiki pigmentasi dan mengurangi kerutan permukaan. Efek antipenuaan dari kinetin juga telah terbukti bermanfaat pada sel-sel endotel kulit yaitu dengan cara mengaktifkan proliferasi sel, menghambat penuaan sel dan menstimulasi zat-zat substansi proliferasi dan metaboliknya.4,20,21 SIMPULANTumbuhan memiliki umur panjang karena stem cell-nya mampu berdediferensiasi menjadi pluripoten dan dapat dimanfaatkan guna menghambat penuaan kulit manusia. Penggunaan plant stem cell memerlukan teknologi yang tepat agar mendapatkan potensi yang diharapkan dalam sediaan perawatan kulit. Ekstrak dari plant stem cell merupakan sumber senyawa antioksidan yang sangat baik seperti polifenol, asam phenolic, flavonoid, triterpenes, karotenoid, stilbenes, steroidal saponin dan peptida. Efek yang ditimbulkan adalah stimulasi fibroblas, perbaikan epidermis, perbaikan DNA sel serta melindungi kulit dari paparan sinar UV dan stres oksidatif sebagai antioksidan. Dibutuhkan penelitian lanjutan untuk menilai efektifitas dan keamanan ekstrak plant stem cell sebagai antipenuaan kulit. DAFTAR PUSTAKASlack JMW. What is a Stem Cell?. Dalam: The Science of Stem Cells. United States: John Wiley & Sons;2018.h.1-11.Fehér A. Somatic embryogenesis—stress-induced remodeling of plant cell fate. BBA-Gene Regulatory Mechanisms. 2015;1849(4):385-402.Trehan S, Michniak-Kohn B, Beri K. Plant stem cells in cosmetics: Current trends and future directions. FSOA. 2017;3(4):FS0026.Miastkowska M, Sikora E. Anti-Aging Properties Of Plant Stem Cell Extracts. MDPI Journal Cosmetics. 2018:5(55):1-8.Kerns ML, Chien AL, Kang Sewon. Skin Aging. Dalam: Kang S, Amagai M, Bruckner AL, Enk AH, Margolis DJ, McMichael AJ, dkk, penyunting. Fitzpatrick’s Dermatology in General Medicine. Edisi ke-9. New York: McGraw Hill. 2019.h.1779-91Baumann L, Saghari S. Photoaging. Dalam: Baumann L, Saghari S, Edmund W, penyunting. Cosmetic Dermatology. Edisi ke-2. New York: Mc Graw Hill; 2009.h.34-41.Jusuf NK. Broccoli flower extract (Brassica oleracea L. var.italica plenck) inhibits photoaging by increasing type I procollagen expression in human skin fibroblast. Int J PharmTech Res. 2016;9(3):114–8.Assaf H, Adly M, Hussein M. Aging and intrinsic aging; pathogenesis and manifestations. Dalam: Farage MA, Miller KW, Maibach HI, penyunting. Textbook of Aging Skin. Berlin: Springer; 2010:130-318.Poon F, Kang S, Chien AL. Mechanisms and treatments of photoaging. PPP. 2015;31(2):65-74.Rinnerthaler M, Bischof J, Streubel MK, Trost A, Richter K. Oxidative stress in aging human skin. Biomolecules. 2015;5(2):545-89.Singh J, Chopra D, Dwivedi A, Ray RS. Photoaging. Dalam: Photocarcinogenesis & Photoprotection. Singapore: Springer; 2018.h.65-75.Dijkwel PP, Lai AG, Hypothesis: Plant stem cell hold the key to extreme longevity. TMA. 2019;3:14-6.Moru´s M, Baran M, Rost-Roszkowska M, Skotnicka-Graca U. Plant stem cells as innovation in cosmetics. Acta Poloniae Pharmaceutica. 2014;71(5):701-7.Georgiev V, Slavov A, Vasileva I, Pavlov A. Plant cell culture as emerging technology for production of active cosmetic ingredients. EngLifeSci. 2018;18(11):779-98.Pavlović M, Radotić K. Cultured Plant Stem Cells as a Source of Plant Natural Products. Dalam: Animal and Plant Stem Cells. Cham: Springer;2017.h.211-216.Goutzourelas N, Stagos D, Spanidis Y, Liosi M, Apostolou A, Priftis A, et al. Polyphenolic composition of grape stem extracts affects antioxidant activity in endothelial and muscle cells. Mol. Med. Rep. 2015;12: 5846–56.Bazylak G, Gryn A. Antioxidant activity and total flavonoid content in variable phyto-stem cells extracts obtained by high-pressure homogenization method and assigned for use in biocosmetics. PlantaMed. 2015; 81(16):PW_211.An S, Cha HJ, Ko JM, Han H, Kim SY, Kim KS, et al. Kinetin improves barrier function of the skin by modulating keratinocyte differentiation markers. Ann Dermatol.2017;29:6–12.Voller J, Maková B, Kadlecová A, Gonzalez G, Strnad M. Plant hormone cytokinins for modulating human aging and age-related diseases. Dalam: Hormones in Ageing and Longevity. Cham: Springer; 2017.h.311-335.Kadlecova A, Makova B, Artal-Sanz M, Strnad M, Voller J. The plant hormone kinetin in disease therapy and healthy aging. Ageing research reviews. 2019;55:100958.Jabłońska-Trypuć A, Matejczyk M, Czerpak R. N6-benzyladenine and kinetin influence antioxidative stress parameters in human skin fibroblasts. Molecular and cellular biochemistry. 2016;413(1-2):97-107.
APA, Harvard, Vancouver, ISO, and other styles
16

Burns, Alex. "Select Issues with New Media Theories of Citizen Journalism." M/C Journal 10, no. 6 (April 1, 2008). http://dx.doi.org/10.5204/mcj.2723.

Full text
Abstract:
“Journalists have to begin a new type of journalism, sometimes being the guide on the side of the civic conversation as well as the filter and gatekeeper.” (Kolodzy 218) “In many respects, citizen journalism is simply public journalism removed from the journalism profession.” (Barlow 181) 1. Citizen Journalism — The Latest Innovation? New Media theorists such as Dan Gillmor, Henry Jenkins, Jay Rosen and Jeff Howe have recently touted Citizen Journalism (CJ) as the latest innovation in 21st century journalism. “Participatory journalism” and “user-driven journalism” are other terms to describe CJ, which its proponents argue is a disruptive innovation (Christensen) to the agenda-setting media institutions, news values and “objective” reportage. In this essay I offer a “contrarian” view, informed by two perspectives: (1) a three-stage model of theory-building (Carlile & Christensen) to evaluate the claims made about CJ; and (2) self-reflexive research insights (Etherington) from editing the US-based news site Disinformation between November 1999 and February 2008. New media theories can potentially create “cognitive dissonance” (Festinger) when their explanations of CJ practices are compared with what actually happens (Feyerabend). First I summarise Carlile & Christensen’s model and the dangers of “bad theory” (Ghoshal). Next I consider several problems in new media theories about CJ: the notion of ‘citizen’, new media populism, parallels in event-driven and civic journalism, and mergers and acquisitions. Two ‘self-reflexive’ issues are considered: ‘pro-ams’ or ‘professional amateurs’ as a challenge to professional journalists, and CJ’s deployment in new media operations and production environments. Finally, some exploratory questions are offered for future researchers. 2. An Evaluative Framework for New Media Theories on Citizen Journalism Paul Carlile and Clayton M. Christensen’s model offers one framework with which to evaluate new media theories on CJ. This framework is used below to highlight select issues and gaps in CJ’s current frameworks and theories. Carlile & Christensen suggest that robust theory-building emerges via three stages: Descriptive, Categorisation and Normative (Carlile & Christensen). There are three sub-stages in Descriptive theory-building; namely, the observation of phenomena, inductive classification into schemas and taxonomies, and correlative relationships to develop models (Carlile & Christensen 2-5). Once causation is established, Normative theory evolves through deductive logic which is subject to Kuhnian paradigm shifts and Popperian falsifiability (Carlile & Christensen 6). Its proponents situate CJ as a Categorisation or new journalism agenda that poses a Normative challenged and Kuhnian paradigm shift to traditional journalism. Existing CJ theories jump from the Descriptive phase of observations like “smart mobs” in Japanese youth subcultures (Rheingold) to make broad claims for Categorisation such as that IndyMedia, blogs and wiki publishing systems as new media alternatives to traditional media. CJ theories then underpin normative beliefs, values and worldviews. Correlative relationships are also used to differentiate CJ from the demand side of microeconomic analysis, from the top-down editorial models of traditional media outlets, and to adopt a vanguard stance. To support this, CJ proponents cite research on emergent collective behaviour such as the “wisdom of crowds” hypothesis (Surowiecki) or peer-to-peer network “swarms” (Pesce) to provide scientific justification for their Normative theories. However, further evaluative research is needed for three reasons: the emergent collective behaviour hypothesis may not actually inform CJ practices, existing theories may have “correlation not cause” errors, and the link may be due to citation network effects between CJ theorists. Collectively, this research base also frames CJ as an “ought to” Categorisation and then proceeds to Normative theory-building (Carlile & Christensen 7). However, I argue below that this Categorisation may be premature: its observations and correlative relationships might reinforce a ‘weak’ Normative theory with limited generalisation. CJ proponents seem to imply that it can be applied anywhere and under any condition—a “statement of causality” that almost makes it a fad (Carlile & Christensen 8). CJ that relies on Classification and Normative claims will be problematic without a strong grounding in Descriptive observation. To understand what’s potentially at stake for CJ’s future consider the consider the parallel debate about curricula renewal for the Masters of Business Administration in the wake of high-profile corporate collapses such as Enron, Worldcom, HIH and OneTel. The MBA evolved as a sociological and institutional construct to justify management as a profession that is codified, differentiated and has entry barriers (Khurana). This process might partly explain the pushback that some media professionals have to CJ as one alternative. MBA programs faced criticism if they had student cohorts with little business know-how or experiential learning (Mintzberg). Enron’s collapse illustrated the ethical dilemmas and unintended consequences that occurred when “bad theories” were implemented (Ghoshal). Professional journalists are aware of this: MBA-educated managers challenged the “craft” tradition in the early 1980s (Underwood). This meant that journalism’s ‘self-image’ (Morgan; Smith) is intertwined with managerial anxieties about media conglomerates in highly competitive markets. Ironically, as noted below, Citizen Journalists who adopt a vanguard position vis-a-vis media professionals step into a more complex game with other players. However, current theories have a naïve idealism about CJ’s promise of normative social change in the face of Machiavellian agency in business, the media and politics. 3. Citizen Who? Who is the “citizen” in CJ? What is their self-awareness as a political agent? CJ proponents who use the ‘self-image’ of ‘citizen’ draw on observations from the participatory vision of open source software, peer-to-peer networks, and case studies such as Howard Dean’s 2004 bid for the Democrat Party nominee in the US Presidential election campaign (Trippi). Recent theorists note Alexander Hamilton’s tradition of civic activism (Barlow 178) which links contemporary bloggers with the Federalist Papers and early newspaper pamphlets. One unsurfaced assumption in these observations and correlations is that most bloggers will adopt a coherent political philosophy as informed citizens: a variation on Lockean utilitarianism, Rawlsian liberalism or Nader consumer activism. To date there is little discussion about how political philosophy could deepen CJ’s ‘self-image’: how to critically evaluate sources, audit and investigation processes, or strategies to deal with elites, deterrence and power. For example, although bloggers kept Valerie Plame’s ‘outing’ as a covert intelligence operative highly visible in the issues-attention cycle, it was agenda-setting media like The New York Times who the Bush Administration targeted to silence (Pearlstine). To be viable, CJ needs to evolve beyond a new media populism, perhaps into a constructivist model of agency, norms and social change (Finnemore). 4. Citizen Journalism as New Media Populism Several “precursor trends” foreshadowed CJ notably the mid-1990s interest in “cool-hunting” by new media analysts and subculture marketeers (Gibson; Gladwell). Whilst this audience focus waned with the 1995-2000 dotcom bubble it resurfaced in CJ and publisher Tim O’Reilly’s Web 2.0 vision. Thus, CJ might be viewed as new media populism that has flourished with the Web 2.0 boom. Yet if the boom becomes a macroeconomic bubble (Gross; Spar) then CJ could be written off as a “silver bullet” that ultimately failed to deliver on its promises (Brooks, Jr.). The reputations of uncritical proponents who adopted a “true believer” stance would also be damaged (Hoffer). This risk is evident if CJ is compared with a parallel trend that shares its audience focus and populist view: day traders and technical analysts who speculate on financial markets. This parallel trend provides an alternative discipline in which the populism surfaced in an earlier form (Carlile & Christensen 12). Fidelity’s Peter Lynch argues that stock pickers can use their Main Street knowledge to beat Wall Street by exploiting information asymmetries (Lynch & Rothchild). Yet Lynch’s examples came from the mid-1970s to early 1980s when indexed mutual fund strategies worked, before deregulation and macroeconomic volatility. A change in the Web 2.0 boom might similarly trigger a reconsideration of Citizen Journalism. Hedge fund maven Victor Niederhoffer contends that investors who rely on technical analysis are practicing a Comtean religion (Niederhoffer & Kenner 72-74) instead of Efficient Market Hypothesis traders who use statistical arbitrage to deal with ‘random walks’ or Behavioural Finance experts who build on Amos Tversky and Daniel Kahneman’s Prospect Theory (Kahneman & Tversky). Niederhoffer’s deeper point is that technical analysts’ belief that the “trend is your friend” is no match for the other schools, despite a mini-publishing industry and computer trading systems. There are also ontological and epistemological differences between the schools. Similarly, CJ proponents who adopt a ‘Professional Amateur’ or ‘Pro-Am’ stance (Leadbeater & Miller) may face a similar gulf when making comparisons with professional journalists and the production environments in media organisations. CJ also thrives as new media populism because of institutional vested interests. When media conglomerates cut back on cadetships and internships CJ might fill the market demand as one alternative. New media programs at New York University and others can use CJ to differentiate themselves from “hyperlocal” competitors (Christensen; Slywotzky; Christensen, Curtis & Horn). This transforms CJ from new media populism to new media institution. 5. Parallels: Event-driven & Civic Journalism For new media programs, CJ builds on two earlier traditions: the Event-driven journalism of crises like the 1991 Gulf War (Wark) and the Civic Journalism school that emerged in the 1960s social upheavals. Civic Journalism’s awareness of minorities and social issues provides the character ethic and political philosophy for many Citizen Journalists. Jay Rosen and others suggest that CJ is the next-generation heir to Civic Journalism, tracing a thread from the 1968 Chicago Democratic Convention to IndyMedia’s coverage of the 1999 “Battle in Seattle” (Rosen). Rosen’s observation could yield an interesting historiography or genealogy. Events such as the Southeast Asian tsunami on 26 December 2004 or Al Qaeda’s London bombings on 7 July 2005 are cited as examples of CJ as event-driven journalism and “pro-am collaboration” (Kolodzy 229-230). Having covered these events and Al Qaeda’s attacks on 11th September 2001, I have a slightly different view: this was more a variation on “first responder” status and handicam video footage that journalists have sourced for the past three decades when covering major disasters. This different view means that the “salience of categories” used to justify CJ and “pro-am collaboration” these events does not completely hold. Furthermore, when Citizen Journalism proponents tout Flickr and Wikipedia as models of real-time media they are building on a broader phenomenon that includes CNN’s Gulf War coverage and Bloomberg’s dominance of financial news (Loomis). 6. The Mergers & Acquisitions Scenario CJ proponents often express anxieties about the resilience of their outlets in the face of predatory venture capital firms who initiate Mergers & Acquisitions (M&A) activities. Ironically, these venture capital firms have core competencies and expertise in the event-driven infrastructure and real-time media that CJ aspires to. Sequoia Capital and other venture capital firms have evaluative frameworks that likely surpass Carlile & Christensen in sophistication, and they exploit parallels, information asymmetries and market populism. Furthermore, although venture capital firms such as Union Street Ventures have funded Web 2.0 firms, they are absent from the explanations of some theorists, whose examples of Citizen Journalism and Web 2.0 success may be the result of survivorship bias. Thus, the venture capital market remains an untapped data source for researchers who want to evaluate the impact of CJ outlets and institutions. The M&A scenario further problematises CJ in several ways. First, CJ is framed as “oppositional” to traditional media, yet this may be used as a stratagem in a game theory framework with multiple stakeholders. Drexel Burnham Lambert’s financier Michael Milken used market populism to sell ‘high-yield’ or ‘junk’ bonds to investors whilst disrupting the Wall Street establishment in the late 1980s (Curtis) and CJ could fulfil a similar tactical purpose. Second, the M&A goal of some Web 2.0 firms could undermine the participatory goals of a site’s community if post-merger integration fails. Jason Calacanis’s sale of Weblogs, Inc to America Online in 2005 and MSNBC’s acquisition of Newsvine on 5 October 2007 (Newsvine) might be success stories. However, this raises issues of digital “property rights” if you contribute to a community that is then sold in an M&A transaction—an outcome closer to business process outsourcing. Third, media “buzz” can create an unrealistic vision when a CJ site fails to grow beyond its start-up phase. Backfence.com’s demise as a “hyperlocal” initiative (Caverly) is one cautionary event that recalls the 2000 dotcom crash. The M&A scenarios outlined above are market dystopias for CJ purists. The major lesson for CJ proponents is to include other market players in hypotheses about causation and correlation factors. 7. ‘Pro-Ams’ & Professional Journalism’s Crisis CJ emerged during a period when Professional Journalism faced a major crisis of ‘self-image’. The Demos report The Pro-Am Revolution (Leadbeater & Miller) popularised the notion of ‘professional amateurs’ which some CJ theorists adopt to strengthen their categorisation. In turn, this triggers a response from cultural theorists who fear bloggers are new media’s barbarians (Keen). I concede Leadbeater and Miller have identified an important category. However, how some CJ theorists then generalise from ‘Pro-Ams’ illustrates the danger of ‘weak’ theory referred to above. Leadbeater and Miller’s categorisation does not really include a counter-view on the strengths of professionals, as illustrated in humanistic consulting (Block), professional service firms (Maister; Maister, Green & Galford), and software development (McConnell). The signs of professionalism these authors mention include a commitment to learning and communal verification, mastery of a discipline and domain application, awareness of methodology creation, participation in mentoring, and cultivation of ethical awareness. Two key differences are discernment and quality of attention, as illustrated in how the legendary Hollywood film editor Walter Murch used Apple’s Final Cut Pro software to edit the 2003 film Cold Mountain (Koppelman). ‘Pro-Ams’ might not aspire to these criteria but Citizen Journalists shouldn’t throw out these standards, either. Doing so would be making the same mistake of overconfidence that technical analysts make against statistical arbitrageurs. Key processes—fact-checking, sub-editing and editorial decision-making—are invisible to the end-user, even if traceable in a blog or wiki publishing system, because of the judgments involved. One post-mortem insight from Assignment Zero was that these processes were vital to create the climate of authenticity and trust to sustain a Citizen Journalist community (Howe). CJ’s trouble with “objectivity” might also overlook some complexities, including the similarity of many bloggers to “noise traders” in financial markets and to op-ed columnists. Methodologies and reportage practices have evolved to deal with the objections that CJ proponents raise, from New Journalism’s radical subjectivity and creative non-fiction techniques (Wolfe & Johnson) to Precision Journalism that used descriptive statistics (Meyer). Finally, journalism frameworks could be updated with current research on how phenomenological awareness shapes our judgments and perceptions (Thompson). 8. Strategic Execution For me, one of CJ’s major weaknesses as a new media theory is its lack of “rich description” (Geertz) about the strategic execution of projects. As Disinfo.com site editor I encountered situations ranging from ‘denial of service’ attacks and spam to site migration, publishing systems that go offline, and ensuring an editorial consistency. Yet the messiness of these processes is missing from CJ theories and accounts. Theories that included this detail as “second-order interactions” (Carlile & Christensen 13) would offer a richer view of CJ. Many CJ and Web 2.0 projects fall into the categories of mini-projects, demonstration prototypes and start-ups, even when using a programming language such as Ajax or Ruby on Rails. Whilst the “bootstrap” process is a benefit, more longitudinal analysis and testing needs to occur, to ensure these projects are scalable and sustainable. For example, South Korea’s OhmyNews is cited as an exemplar that started with “727 citizen reporters and 4 editors” and now has “38,000 citizen reporters” and “a dozen editors” (Kolodzy 231). How does OhmyNews’s mix of hard and soft news change over time? Or, how does OhmyNews deal with a complex issue that might require major resources, such as security negotiations between North and South Korea? Such examples could do with further research. We need to go beyond “the vision thing” and look at the messiness of execution for deeper observations and counterintuitive correlations, to build new descriptive theories. 9. Future Research This essay argues that CJ needs re-evaluation. Its immediate legacy might be to splinter ‘journalism’ into micro-trends: Washington University’s Steve Boriss proclaims “citizen journalism is dead. Expert journalism is the future.” (Boriss; Mensching). The half-lives of such micro-trends demand new categorisations, which in turn prematurely feeds the theory-building cycle. Instead, future researchers could reinvigorate 21st century journalism if they ask deeper questions and return to the observation stage of building descriptive theories. In closing, below are some possible questions that future researchers might explore: Where are the “rich descriptions” of journalistic experience—“citizen”, “convergent”, “digital”, “Pro-Am” or otherwise in new media? How could practice-based approaches inform this research instead of relying on espoused theories-in-use? What new methodologies could be developed for CJ implementation? What role can the “heroic” individual reporter or editor have in “the swarm”? Do the claims about OhmyNews and other sites stand up to longitudinal observation? Are the theories used to justify Citizen Journalism’s normative stance (Rheingold; Surowiecki; Pesce) truly robust generalisations for strategic execution or do they reflect the biases of their creators? How could developers tap the conceptual dimensions of information technology innovation (Shasha) to create the next Facebook, MySpace or Wikipedia? References Argyris, Chris, and Donald Schon. Theory in Practice. San Francisco: Jossey-Bass Publishers, 1976. Barlow, Aaron. The Rise of the Blogosphere. Westport, CN: Praeger Publishers, 2007. Block, Peter. Flawless Consulting. 2nd ed. San Francisco, CA: Jossey-Bass/Pfeiffer, 2000. Boriss, Steve. “Citizen Journalism Is Dead. Expert Journalism Is the Future.” The Future of News. 28 Nov. 2007. 20 Feb. 2008 http://thefutureofnews.com/2007/11/28/citizen-journalism-is-dead- expert-journalism-is-the-future/>. Brooks, Jr., Frederick P. The Mythical Man-Month: Essays on Software Engineering. Rev. ed. Reading, MA: Addison-Wesley Publishing Company, 1995. Campbell, Vincent. Information Age Journalism: Journalism in an International Context. New York: Arnold, 2004. Carlile, Paul R., and Clayton M. Christensen. “The Cycles of Building Theory in Management Research.” Innosight working paper draft 6. 6 Jan. 2005. 19 Feb. 2008 http://www.innosight.com/documents/Theory%20Building.pdf>. Caverly, Doug. “Hyperlocal News Site Takes A Hit.” WebProNews.com 6 July 2007. 19 Feb. 2008 http://www.webpronews.com/topnews/2007/07/06/hyperlocal-news- sites-take-a-hit>. Chenoweth, Neil. Virtual Murdoch: Reality Wars on the Information Superhighway. Sydney: Random House Australia, 2001. Christensen, Clayton M. The Innovator’s Dilemma: When New Technologies Cause Great Firms to Fail. Boston, MA: Harvard Business School Press, 1997. Christensen, Clayton M., Curtis Johnson, and Michael Horn. Disrupting Class: How Disruptive Innovation Will Change the Way the World Learns. New York: McGraw-Hill, 2008. Curtis, Adam. The Mayfair Set. London: British Broadcasting Corporation, 1999. Etherington, Kim. Becoming a Reflexive Researcher: Using Ourselves in Research. London: Jessica Kingsley Publishers, 2004. Festinger, Leon. A Theory of Cognitive Dissonance. Stanford, CA: Stanford University Press, 1962. Feyerabend, Paul. Against Method. 3rd ed. London: Verso, 1993. Finnemore, Martha. National Interests in International Society. Ithaca, NY: Cornell University Press, 1996. Geertz, Clifford. The Interpretation of Cultures. New York: Basic Books, 1973. Ghoshal, Sumantra. “Bad Management Theories Are Destroying Good Management Practices.” Academy of Management Learning & Education 4.1 (2005): 75-91. Gibson, William. Pattern Recognition. London: Viking, 2003. Gladwell, Malcolm. “The Cool-Hunt.” The New Yorker Magazine 17 March 1997. 20 Feb. 2008 http://www.gladwell.com/1997/1997_03_17_a_cool.htm>. Gross, Daniel. Pop! Why Bubbles Are Great for the Economy. New York: Collins, 2007. Hoffer, Eric. The True Believer. New York: Harper, 1951. Howe, Jeff. “Did Assignment Zero Fail? A Look Back, and Lessons Learned.” Wired News 16 July 2007. 19 Feb. 2008 http://www.wired.com/techbiz/media/news/2007/07/assignment_ zero_final?currentPage=all>. Kahneman, Daniel, and Amos Tversky. Choices, Values and Frames. Cambridge: Cambridge UP, 2000. Keen, Andrew. The Cult of the Amateur. New York: Doubleday Currency, 2007. Khurana, Rakesh. From Higher Aims to Hired Hands. Princeton, NJ: Princeton UP, 2007. Kolodzy, Janet. Convergence Journalism: Writing and Reporting across the News Media. Oxford: Rowman & Littlefield, 2006. Koppelman, Charles. Behind the Seen: How Walter Murch Edited Cold Mountain Using Apple’s Final Cut Pro and What This Means for Cinema. Upper Saddle River, NJ: New Rider, 2004. Leadbeater, Charles, and Paul Miller. “The Pro-Am Revolution”. London: Demos, 24 Nov. 2004. 19 Feb. 2008 http://www.demos.co.uk/publications/proameconomy>. Loomis, Carol J. “Bloomberg’s Money Machine.” Fortune 5 April 2007. 20 Feb. 2008 http://money.cnn.com/magazines/fortune/fortune_archive/2007/04/16/ 8404302/index.htm>. Lynch, Peter, and John Rothchild. Beating the Street. Rev. ed. New York: Simon & Schuster, 1994. Maister, David. True Professionalism. New York: The Free Press, 1997. Maister, David, Charles H. Green, and Robert M. Galford. The Trusted Advisor. New York: The Free Press, 2004. Mensching, Leah McBride. “Citizen Journalism on Its Way Out?” SFN Blog, 30 Nov. 2007. 20 Feb. 2008 http://www.sfnblog.com/index.php/2007/11/30/940-citizen-journalism- on-its-way-out>. Meyer, Philip. Precision Journalism. 4th ed. Lanham, MD: Rowman & Littlefield, 2002. McConnell, Steve. Professional Software Development. Boston, MA: Addison-Wesley, 2004. Mintzberg, Henry. Managers Not MBAs. San Francisco, CA: Berrett-Koehler, 2004. Morgan, Gareth. Images of Organisation. Rev. ed. Thousand Oaks, CA: Sage, 2006. Newsvine. “Msnbc.com Acquires Newsvine.” 7 Oct. 2007. 20 Feb. 2008 http://blog.newsvine.com/_news/2007/10/07/1008889-msnbccom- acquires-newsvine>. Niederhoffer, Victor, and Laurel Kenner. Practical Speculation. New York: John Wiley & Sons, 2003. Pearlstine, Norman. Off the Record: The Press, the Government, and the War over Anonymous Sources. New York: Farrar, Straus & Giroux, 2007. Pesce, Mark D. “Mob Rules (The Law of Fives).” The Human Network 28 Sep. 2007. 20 Feb. 2008 http://blog.futurestreetconsulting.com/?p=39>. Rheingold, Howard. Smart Mobs: The Next Social Revolution. Cambridge MA: Basic Books, 2002. Rosen, Jay. What Are Journalists For? Princeton NJ: Yale UP, 2001. Shasha, Dennis Elliott. Out of Their Minds: The Lives and Discoveries of 15 Great Computer Scientists. New York: Copernicus, 1995. Slywotzky, Adrian. Value Migration: How to Think Several Moves Ahead of the Competition. Boston, MA: Harvard Business School Press, 1996. Smith, Steve. “The Self-Image of a Discipline: The Genealogy of International Relations Theory.” Eds. Steve Smith and Ken Booth. International Relations Theory Today. Cambridge, UK: Polity Press, 1995. 1-37. Spar, Debora L. Ruling the Waves: Cycles of Discovery, Chaos and Wealth from the Compass to the Internet. New York: Harcourt, 2001. Surowiecki, James. The Wisdom of Crowds. New York: Doubleday, 2004. Thompson, Evan. Mind in Life: Biology, Phenomenology, and the Sciences of Mind. Cambridge, MA: Belknap Press, 2007. Trippi, Joe. The Revolution Will Not Be Televised. New York: ReganBooks, 2004. Underwood, Doug. When MBA’s Rule the Newsroom. New York: Columbia University Press, 1993. Wark, McKenzie. Virtual Geography: Living with Global Media Events. Bloomington IN: Indiana UP, 1994. Wolfe, Tom, and E.W. Johnson. The New Journalism. New York: Harper & Row, 1973. Citation reference for this article MLA Style Burns, Alex. "Select Issues with New Media Theories of Citizen Journalism." M/C Journal 10.6/11.1 (2008). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0804/10-burns.php>. APA Style Burns, A. (Apr. 2008) "Select Issues with New Media Theories of Citizen Journalism," M/C Journal, 10(6)/11(1). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0804/10-burns.php>.
APA, Harvard, Vancouver, ISO, and other styles
17

Burns, Alex. "Select Issues with New Media Theories of Citizen Journalism." M/C Journal 11, no. 1 (June 1, 2008). http://dx.doi.org/10.5204/mcj.30.

Full text
Abstract:
“Journalists have to begin a new type of journalism, sometimes being the guide on the side of the civic conversation as well as the filter and gatekeeper.” (Kolodzy 218) “In many respects, citizen journalism is simply public journalism removed from the journalism profession.” (Barlow 181) 1. Citizen Journalism — The Latest Innovation? New Media theorists such as Dan Gillmor, Henry Jenkins, Jay Rosen and Jeff Howe have recently touted Citizen Journalism (CJ) as the latest innovation in 21st century journalism. “Participatory journalism” and “user-driven journalism” are other terms to describe CJ, which its proponents argue is a disruptive innovation (Christensen) to the agenda-setting media institutions, news values and “objective” reportage. In this essay I offer a “contrarian” view, informed by two perspectives: (1) a three-stage model of theory-building (Carlile & Christensen) to evaluate the claims made about CJ; and (2) self-reflexive research insights (Etherington) from editing the US-based news site Disinformation between November 1999 and February 2008. New media theories can potentially create “cognitive dissonance” (Festinger) when their explanations of CJ practices are compared with what actually happens (Feyerabend). First I summarise Carlile & Christensen’s model and the dangers of “bad theory” (Ghoshal). Next I consider several problems in new media theories about CJ: the notion of ‘citizen’, new media populism, parallels in event-driven and civic journalism, and mergers and acquisitions. Two ‘self-reflexive’ issues are considered: ‘pro-ams’ or ‘professional amateurs’ as a challenge to professional journalists, and CJ’s deployment in new media operations and production environments. Finally, some exploratory questions are offered for future researchers. 2. An Evaluative Framework for New Media Theories on Citizen Journalism Paul Carlile and Clayton M. Christensen’s model offers one framework with which to evaluate new media theories on CJ. This framework is used below to highlight select issues and gaps in CJ’s current frameworks and theories. Carlile & Christensen suggest that robust theory-building emerges via three stages: Descriptive, Categorisation and Normative (Carlile & Christensen). There are three sub-stages in Descriptive theory-building; namely, the observation of phenomena, inductive classification into schemas and taxonomies, and correlative relationships to develop models (Carlile & Christensen 2-5). Once causation is established, Normative theory evolves through deductive logic which is subject to Kuhnian paradigm shifts and Popperian falsifiability (Carlile & Christensen 6). Its proponents situate CJ as a Categorisation or new journalism agenda that poses a Normative challenged and Kuhnian paradigm shift to traditional journalism. Existing CJ theories jump from the Descriptive phase of observations like “smart mobs” in Japanese youth subcultures (Rheingold) to make broad claims for Categorisation such as that IndyMedia, blogs and wiki publishing systems as new media alternatives to traditional media. CJ theories then underpin normative beliefs, values and worldviews. Correlative relationships are also used to differentiate CJ from the demand side of microeconomic analysis, from the top-down editorial models of traditional media outlets, and to adopt a vanguard stance. To support this, CJ proponents cite research on emergent collective behaviour such as the “wisdom of crowds” hypothesis (Surowiecki) or peer-to-peer network “swarms” (Pesce) to provide scientific justification for their Normative theories. However, further evaluative research is needed for three reasons: the emergent collective behaviour hypothesis may not actually inform CJ practices, existing theories may have “correlation not cause” errors, and the link may be due to citation network effects between CJ theorists. Collectively, this research base also frames CJ as an “ought to” Categorisation and then proceeds to Normative theory-building (Carlile & Christensen 7). However, I argue below that this Categorisation may be premature: its observations and correlative relationships might reinforce a ‘weak’ Normative theory with limited generalisation. CJ proponents seem to imply that it can be applied anywhere and under any condition—a “statement of causality” that almost makes it a fad (Carlile & Christensen 8). CJ that relies on Classification and Normative claims will be problematic without a strong grounding in Descriptive observation. To understand what’s potentially at stake for CJ’s future consider the consider the parallel debate about curricula renewal for the Masters of Business Administration in the wake of high-profile corporate collapses such as Enron, Worldcom, HIH and OneTel. The MBA evolved as a sociological and institutional construct to justify management as a profession that is codified, differentiated and has entry barriers (Khurana). This process might partly explain the pushback that some media professionals have to CJ as one alternative. MBA programs faced criticism if they had student cohorts with little business know-how or experiential learning (Mintzberg). Enron’s collapse illustrated the ethical dilemmas and unintended consequences that occurred when “bad theories” were implemented (Ghoshal). Professional journalists are aware of this: MBA-educated managers challenged the “craft” tradition in the early 1980s (Underwood). This meant that journalism’s ‘self-image’ (Morgan; Smith) is intertwined with managerial anxieties about media conglomerates in highly competitive markets. Ironically, as noted below, Citizen Journalists who adopt a vanguard position vis-a-vis media professionals step into a more complex game with other players. However, current theories have a naïve idealism about CJ’s promise of normative social change in the face of Machiavellian agency in business, the media and politics. 3. Citizen Who? Who is the “citizen” in CJ? What is their self-awareness as a political agent? CJ proponents who use the ‘self-image’ of ‘citizen’ draw on observations from the participatory vision of open source software, peer-to-peer networks, and case studies such as Howard Dean’s 2004 bid for the Democrat Party nominee in the US Presidential election campaign (Trippi). Recent theorists note Alexander Hamilton’s tradition of civic activism (Barlow 178) which links contemporary bloggers with the Federalist Papers and early newspaper pamphlets. One unsurfaced assumption in these observations and correlations is that most bloggers will adopt a coherent political philosophy as informed citizens: a variation on Lockean utilitarianism, Rawlsian liberalism or Nader consumer activism. To date there is little discussion about how political philosophy could deepen CJ’s ‘self-image’: how to critically evaluate sources, audit and investigation processes, or strategies to deal with elites, deterrence and power. For example, although bloggers kept Valerie Plame’s ‘outing’ as a covert intelligence operative highly visible in the issues-attention cycle, it was agenda-setting media like The New York Times who the Bush Administration targeted to silence (Pearlstine). To be viable, CJ needs to evolve beyond a new media populism, perhaps into a constructivist model of agency, norms and social change (Finnemore). 4. Citizen Journalism as New Media Populism Several “precursor trends” foreshadowed CJ notably the mid-1990s interest in “cool-hunting” by new media analysts and subculture marketeers (Gibson; Gladwell). Whilst this audience focus waned with the 1995-2000 dotcom bubble it resurfaced in CJ and publisher Tim O’Reilly’s Web 2.0 vision. Thus, CJ might be viewed as new media populism that has flourished with the Web 2.0 boom. Yet if the boom becomes a macroeconomic bubble (Gross; Spar) then CJ could be written off as a “silver bullet” that ultimately failed to deliver on its promises (Brooks, Jr.). The reputations of uncritical proponents who adopted a “true believer” stance would also be damaged (Hoffer). This risk is evident if CJ is compared with a parallel trend that shares its audience focus and populist view: day traders and technical analysts who speculate on financial markets. This parallel trend provides an alternative discipline in which the populism surfaced in an earlier form (Carlile & Christensen 12). Fidelity’s Peter Lynch argues that stock pickers can use their Main Street knowledge to beat Wall Street by exploiting information asymmetries (Lynch & Rothchild). Yet Lynch’s examples came from the mid-1970s to early 1980s when indexed mutual fund strategies worked, before deregulation and macroeconomic volatility. A change in the Web 2.0 boom might similarly trigger a reconsideration of Citizen Journalism. Hedge fund maven Victor Niederhoffer contends that investors who rely on technical analysis are practicing a Comtean religion (Niederhoffer & Kenner 72-74) instead of Efficient Market Hypothesis traders who use statistical arbitrage to deal with ‘random walks’ or Behavioural Finance experts who build on Amos Tversky and Daniel Kahneman’s Prospect Theory (Kahneman & Tversky). Niederhoffer’s deeper point is that technical analysts’ belief that the “trend is your friend” is no match for the other schools, despite a mini-publishing industry and computer trading systems. There are also ontological and epistemological differences between the schools. Similarly, CJ proponents who adopt a ‘Professional Amateur’ or ‘Pro-Am’ stance (Leadbeater & Miller) may face a similar gulf when making comparisons with professional journalists and the production environments in media organisations. CJ also thrives as new media populism because of institutional vested interests. When media conglomerates cut back on cadetships and internships CJ might fill the market demand as one alternative. New media programs at New York University and others can use CJ to differentiate themselves from “hyperlocal” competitors (Christensen; Slywotzky; Christensen, Curtis & Horn). This transforms CJ from new media populism to new media institution. 5. Parallels: Event-driven & Civic Journalism For new media programs, CJ builds on two earlier traditions: the Event-driven journalism of crises like the 1991 Gulf War (Wark) and the Civic Journalism school that emerged in the 1960s social upheavals. Civic Journalism’s awareness of minorities and social issues provides the character ethic and political philosophy for many Citizen Journalists. Jay Rosen and others suggest that CJ is the next-generation heir to Civic Journalism, tracing a thread from the 1968 Chicago Democratic Convention to IndyMedia’s coverage of the 1999 “Battle in Seattle” (Rosen). Rosen’s observation could yield an interesting historiography or genealogy. Events such as the Southeast Asian tsunami on 26 December 2004 or Al Qaeda’s London bombings on 7 July 2005 are cited as examples of CJ as event-driven journalism and “pro-am collaboration” (Kolodzy 229-230). Having covered these events and Al Qaeda’s attacks on 11th September 2001, I have a slightly different view: this was more a variation on “first responder” status and handicam video footage that journalists have sourced for the past three decades when covering major disasters. This different view means that the “salience of categories” used to justify CJ and “pro-am collaboration” these events does not completely hold. Furthermore, when Citizen Journalism proponents tout Flickr and Wikipedia as models of real-time media they are building on a broader phenomenon that includes CNN’s Gulf War coverage and Bloomberg’s dominance of financial news (Loomis). 6. The Mergers & Acquisitions Scenario CJ proponents often express anxieties about the resilience of their outlets in the face of predatory venture capital firms who initiate Mergers & Acquisitions (M&A) activities. Ironically, these venture capital firms have core competencies and expertise in the event-driven infrastructure and real-time media that CJ aspires to. Sequoia Capital and other venture capital firms have evaluative frameworks that likely surpass Carlile & Christensen in sophistication, and they exploit parallels, information asymmetries and market populism. Furthermore, although venture capital firms such as Union Street Ventures have funded Web 2.0 firms, they are absent from the explanations of some theorists, whose examples of Citizen Journalism and Web 2.0 success may be the result of survivorship bias. Thus, the venture capital market remains an untapped data source for researchers who want to evaluate the impact of CJ outlets and institutions. The M&A scenario further problematises CJ in several ways. First, CJ is framed as “oppositional” to traditional media, yet this may be used as a stratagem in a game theory framework with multiple stakeholders. Drexel Burnham Lambert’s financier Michael Milken used market populism to sell ‘high-yield’ or ‘junk’ bonds to investors whilst disrupting the Wall Street establishment in the late 1980s (Curtis) and CJ could fulfil a similar tactical purpose. Second, the M&A goal of some Web 2.0 firms could undermine the participatory goals of a site’s community if post-merger integration fails. Jason Calacanis’s sale of Weblogs, Inc to America Online in 2005 and MSNBC’s acquisition of Newsvine on 5 October 2007 (Newsvine) might be success stories. However, this raises issues of digital “property rights” if you contribute to a community that is then sold in an M&A transaction—an outcome closer to business process outsourcing. Third, media “buzz” can create an unrealistic vision when a CJ site fails to grow beyond its start-up phase. Backfence.com’s demise as a “hyperlocal” initiative (Caverly) is one cautionary event that recalls the 2000 dotcom crash. The M&A scenarios outlined above are market dystopias for CJ purists. The major lesson for CJ proponents is to include other market players in hypotheses about causation and correlation factors. 7. ‘Pro-Ams’ & Professional Journalism’s Crisis CJ emerged during a period when Professional Journalism faced a major crisis of ‘self-image’. The Demos report The Pro-Am Revolution (Leadbeater & Miller) popularised the notion of ‘professional amateurs’ which some CJ theorists adopt to strengthen their categorisation. In turn, this triggers a response from cultural theorists who fear bloggers are new media’s barbarians (Keen). I concede Leadbeater and Miller have identified an important category. However, how some CJ theorists then generalise from ‘Pro-Ams’ illustrates the danger of ‘weak’ theory referred to above. Leadbeater and Miller’s categorisation does not really include a counter-view on the strengths of professionals, as illustrated in humanistic consulting (Block), professional service firms (Maister; Maister, Green & Galford), and software development (McConnell). The signs of professionalism these authors mention include a commitment to learning and communal verification, mastery of a discipline and domain application, awareness of methodology creation, participation in mentoring, and cultivation of ethical awareness. Two key differences are discernment and quality of attention, as illustrated in how the legendary Hollywood film editor Walter Murch used Apple’s Final Cut Pro software to edit the 2003 film Cold Mountain (Koppelman). ‘Pro-Ams’ might not aspire to these criteria but Citizen Journalists shouldn’t throw out these standards, either. Doing so would be making the same mistake of overconfidence that technical analysts make against statistical arbitrageurs. Key processes—fact-checking, sub-editing and editorial decision-making—are invisible to the end-user, even if traceable in a blog or wiki publishing system, because of the judgments involved. One post-mortem insight from Assignment Zero was that these processes were vital to create the climate of authenticity and trust to sustain a Citizen Journalist community (Howe). CJ’s trouble with “objectivity” might also overlook some complexities, including the similarity of many bloggers to “noise traders” in financial markets and to op-ed columnists. Methodologies and reportage practices have evolved to deal with the objections that CJ proponents raise, from New Journalism’s radical subjectivity and creative non-fiction techniques (Wolfe & Johnson) to Precision Journalism that used descriptive statistics (Meyer). Finally, journalism frameworks could be updated with current research on how phenomenological awareness shapes our judgments and perceptions (Thompson). 8. Strategic Execution For me, one of CJ’s major weaknesses as a new media theory is its lack of “rich description” (Geertz) about the strategic execution of projects. As Disinfo.com site editor I encountered situations ranging from ‘denial of service’ attacks and spam to site migration, publishing systems that go offline, and ensuring an editorial consistency. Yet the messiness of these processes is missing from CJ theories and accounts. Theories that included this detail as “second-order interactions” (Carlile & Christensen 13) would offer a richer view of CJ. Many CJ and Web 2.0 projects fall into the categories of mini-projects, demonstration prototypes and start-ups, even when using a programming language such as Ajax or Ruby on Rails. Whilst the “bootstrap” process is a benefit, more longitudinal analysis and testing needs to occur, to ensure these projects are scalable and sustainable. For example, South Korea’s OhmyNews is cited as an exemplar that started with “727 citizen reporters and 4 editors” and now has “38,000 citizen reporters” and “a dozen editors” (Kolodzy 231). How does OhmyNews’s mix of hard and soft news change over time? Or, how does OhmyNews deal with a complex issue that might require major resources, such as security negotiations between North and South Korea? Such examples could do with further research. We need to go beyond “the vision thing” and look at the messiness of execution for deeper observations and counterintuitive correlations, to build new descriptive theories. 9. Future Research This essay argues that CJ needs re-evaluation. Its immediate legacy might be to splinter ‘journalism’ into micro-trends: Washington University’s Steve Boriss proclaims “citizen journalism is dead. Expert journalism is the future.” (Boriss; Mensching). The half-lives of such micro-trends demand new categorisations, which in turn prematurely feeds the theory-building cycle. Instead, future researchers could reinvigorate 21st century journalism if they ask deeper questions and return to the observation stage of building descriptive theories. In closing, below are some possible questions that future researchers might explore: Where are the “rich descriptions” of journalistic experience—“citizen”, “convergent”, “digital”, “Pro-Am” or otherwise in new media?How could practice-based approaches inform this research instead of relying on espoused theories-in-use?What new methodologies could be developed for CJ implementation?What role can the “heroic” individual reporter or editor have in “the swarm”?Do the claims about OhmyNews and other sites stand up to longitudinal observation?Are the theories used to justify Citizen Journalism’s normative stance (Rheingold; Surowiecki; Pesce) truly robust generalisations for strategic execution or do they reflect the biases of their creators?How could developers tap the conceptual dimensions of information technology innovation (Shasha) to create the next Facebook, MySpace or Wikipedia? References Argyris, Chris, and Donald Schon. Theory in Practice. San Francisco: Jossey-Bass Publishers, 1976. Barlow, Aaron. The Rise of the Blogosphere. Westport, CN: Praeger Publishers, 2007. Block, Peter. Flawless Consulting. 2nd ed. San Francisco, CA: Jossey-Bass/Pfeiffer, 2000. Boriss, Steve. “Citizen Journalism Is Dead. Expert Journalism Is the Future.” The Future of News. 28 Nov. 2007. 20 Feb. 2008 < http://thefutureofnews.com/2007/11/28/citizen-journalism-is-dead- expert-journalism-is-the-future/ >. Brooks, Jr., Frederick P. The Mythical Man-Month: Essays on Software Engineering. Rev. ed. Reading, MA: Addison-Wesley Publishing Company, 1995. Campbell, Vincent. Information Age Journalism: Journalism in an International Context. New York: Arnold, 2004. Carlile, Paul R., and Clayton M. Christensen. “The Cycles of Building Theory in Management Research.” Innosight working paper draft 6. 6 Jan. 2005. 19 Feb. 2008 < http://www.innosight.com/documents/Theory%20Building.pdf >. Caverly, Doug. “Hyperlocal News Site Takes A Hit.” WebProNews.com 6 July 2007. 19 Feb. 2008 < http://www.webpronews.com/topnews/2007/07/06/hyperlocal-news- sites-take-a-hit >. Chenoweth, Neil. Virtual Murdoch: Reality Wars on the Information Superhighway. Sydney: Random House Australia, 2001. Christensen, Clayton M. The Innovator’s Dilemma: When New Technologies Cause Great Firms to Fail. Boston, MA: Harvard Business School Press, 1997. Christensen, Clayton M., Curtis Johnson, and Michael Horn. Disrupting Class: How Disruptive Innovation Will Change the Way the World Learns. New York: McGraw-Hill, 2008. Curtis, Adam. The Mayfair Set. London: British Broadcasting Corporation, 1999. Etherington, Kim. Becoming a Reflexive Researcher: Using Ourselves in Research. London: Jessica Kingsley Publishers, 2004. Festinger, Leon. A Theory of Cognitive Dissonance. Stanford, CA: Stanford University Press, 1962. Feyerabend, Paul. Against Method. 3rd ed. London: Verso, 1993. Finnemore, Martha. National Interests in International Society. Ithaca, NY: Cornell University Press, 1996. Geertz, Clifford. The Interpretation of Cultures. New York: Basic Books, 1973. Ghoshal, Sumantra. “Bad Management Theories Are Destroying Good Management Practices.” Academy of Management Learning & Education 4.1 (2005): 75-91. Gibson, William. Pattern Recognition. London: Viking, 2003. Gladwell, Malcolm. “The Cool-Hunt.” The New Yorker Magazine 17 March 1997. 20 Feb. 2008 < http://www.gladwell.com/1997/1997_03_17_a_cool.htm >. Gross, Daniel. Pop! Why Bubbles Are Great for the Economy. New York: Collins, 2007. Hoffer, Eric. The True Believer. New York: Harper, 1951. Howe, Jeff. “Did Assignment Zero Fail? A Look Back, and Lessons Learned.” Wired News 16 July 2007. 19 Feb. 2008 < http://www.wired.com/techbiz/media/news/2007/07/assignment_ zero_final?currentPage=all >. Kahneman, Daniel, and Amos Tversky. Choices, Values and Frames. Cambridge: Cambridge UP, 2000. Keen, Andrew. The Cult of the Amateur. New York: Doubleday Currency, 2007. Khurana, Rakesh. From Higher Aims to Hired Hands. Princeton, NJ: Princeton UP, 2007. Kolodzy, Janet. Convergence Journalism: Writing and Reporting across the News Media. Oxford: Rowman & Littlefield, 2006. Koppelman, Charles. Behind the Seen: How Walter Murch Edited Cold Mountain Using Apple’s Final Cut Pro and What This Means for Cinema. Upper Saddle River, NJ: New Rider, 2004. Leadbeater, Charles, and Paul Miller. “The Pro-Am Revolution”. London: Demos, 24 Nov. 2004. 19 Feb. 2008 < http://www.demos.co.uk/publications/proameconomy >. Loomis, Carol J. “Bloomberg’s Money Machine.” Fortune 5 April 2007. 20 Feb. 2008 < http://money.cnn.com/magazines/fortune/fortune_archive/2007/04/16/ 8404302/index.htm >. Lynch, Peter, and John Rothchild. Beating the Street. Rev. ed. New York: Simon & Schuster, 1994. Maister, David. True Professionalism. New York: The Free Press, 1997. Maister, David, Charles H. Green, and Robert M. Galford. The Trusted Advisor. New York: The Free Press, 2004. Mensching, Leah McBride. “Citizen Journalism on Its Way Out?” SFN Blog, 30 Nov. 2007. 20 Feb. 2008 < http://www.sfnblog.com/index.php/2007/11/30/940-citizen-journalism- on-its-way-out >. Meyer, Philip. Precision Journalism. 4th ed. Lanham, MD: Rowman & Littlefield, 2002. McConnell, Steve. Professional Software Development. Boston, MA: Addison-Wesley, 2004. Mintzberg, Henry. Managers Not MBAs. San Francisco, CA: Berrett-Koehler, 2004. Morgan, Gareth. Images of Organisation. Rev. ed. Thousand Oaks, CA: Sage, 2006. Newsvine. “Msnbc.com Acquires Newsvine.” 7 Oct. 2007. 20 Feb. 2008 < http://blog.newsvine.com/_news/2007/10/07/1008889-msnbccom- acquires-newsvine >. Niederhoffer, Victor, and Laurel Kenner. Practical Speculation. New York: John Wiley & Sons, 2003. Pearlstine, Norman. Off the Record: The Press, the Government, and the War over Anonymous Sources. New York: Farrar, Straus & Giroux, 2007. Pesce, Mark D. “Mob Rules (The Law of Fives).” The Human Network 28 Sep. 2007. 20 Feb. 2008 < http://blog.futurestreetconsulting.com/?p=39 >. Rheingold, Howard. Smart Mobs: The Next Social Revolution. Cambridge MA: Basic Books, 2002. Rosen, Jay. What Are Journalists For? Princeton NJ: Yale UP, 2001. Shasha, Dennis Elliott. Out of Their Minds: The Lives and Discoveries of 15 Great Computer Scientists. New York: Copernicus, 1995. Slywotzky, Adrian. Value Migration: How to Think Several Moves Ahead of the Competition. Boston, MA: Harvard Business School Press, 1996. Smith, Steve. “The Self-Image of a Discipline: The Genealogy of International Relations Theory.” Eds. Steve Smith and Ken Booth. International Relations Theory Today. Cambridge, UK: Polity Press, 1995. 1-37. Spar, Debora L. Ruling the Waves: Cycles of Discovery, Chaos and Wealth from the Compass to the Internet. New York: Harcourt, 2001. Surowiecki, James. The Wisdom of Crowds. New York: Doubleday, 2004. Thompson, Evan. Mind in Life: Biology, Phenomenology, and the Sciences of Mind. Cambridge, MA: Belknap Press, 2007. Trippi, Joe. The Revolution Will Not Be Televised. New York: ReganBooks, 2004. Underwood, Doug. When MBA’s Rule the Newsroom. New York: Columbia University Press, 1993. Wark, McKenzie. Virtual Geography: Living with Global Media Events. Bloomington IN: Indiana UP, 1994. Wolfe, Tom, and E.W. Johnson. The New Journalism. New York: Harper & Row, 1973.
APA, Harvard, Vancouver, ISO, and other styles
18

Burns, Alex. "Doubting the Global War on Terror." M/C Journal 14, no. 1 (January 24, 2011). http://dx.doi.org/10.5204/mcj.338.

Full text
Abstract:
Photograph by Gonzalo Echeverria (2010)Declaring War Soon after Al Qaeda’s terrorist attacks on 11 September 2001, the Bush Administration described its new grand strategy: the “Global War on Terror”. This underpinned the subsequent counter-insurgency in Afghanistan and the United States invasion of Iraq in March 2003. Media pundits quickly applied the Global War on Terror label to the Madrid, Bali and London bombings, to convey how Al Qaeda’s terrorism had gone transnational. Meanwhile, international relations scholars debated the extent to which September 11 had changed the international system (Brenner; Mann 303). American intellectuals adopted several variations of the Global War on Terror in what initially felt like a transitional period of US foreign policy (Burns). Walter Laqueur suggested Al Qaeda was engaged in a “cosmological” and perpetual war. Paul Berman likened Al Qaeda and militant Islam to the past ideological battles against communism and fascism (Heilbrunn 248). In a widely cited article, neoconservative thinker Norman Podhoretz suggested the United States faced “World War IV”, which had three interlocking drivers: Al Qaeda and trans-national terrorism; political Islam as the West’s existential enemy; and nuclear proliferation to ‘rogue’ countries and non-state actors (Friedman 3). Podhoretz’s tone reflected a revival of his earlier Cold War politics and critique of the New Left (Friedman 148-149; Halper and Clarke 56; Heilbrunn 210). These stances attracted widespread support. For instance, the United States Marine Corp recalibrated its mission to fight a long war against “World War IV-like” enemies. Yet these stances left the United States unprepared as the combat situations in Afghanistan and Iraq worsened (Ricks; Ferguson; Filkins). Neoconservative ideals for Iraq “regime change” to transform the Middle East failed to deal with other security problems such as Pakistan’s Musharraf regime (Dorrien 110; Halper and Clarke 210-211; Friedman 121, 223; Heilbrunn 252). The Manichean and open-ended framing became a self-fulfilling prophecy for insurgents, jihadists, and militias. The Bush Administration quietly abandoned the Global War on Terror in July 2005. Widespread support had given way to policymaker doubt. Why did so many intellectuals and strategists embrace the Global War on Terror as the best possible “grand strategy” perspective of a post-September 11 world? Why was there so little doubt of this worldview? This is a debate with roots as old as the Sceptics versus the Sophists. Explanations usually focus on the Bush Administration’s “Vulcans” war cabinet: Vice President Dick Cheney, Secretary of Defense Donald Rumsfield, and National Security Advisor Condoleezza Rice, who later became Secretary of State (Mann xv-xvi). The “Vulcans” were named after the Roman god Vulcan because Rice’s hometown Birmingham, Alabama, had “a mammoth fifty-six foot statue . . . [in] homage to the city’s steel industry” (Mann x) and the name stuck. Alternatively, explanations focus on how neoconservative thinkers shaped the intellectual climate after September 11, in a receptive media climate. Biographers suggest that “neoconservatism had become an echo chamber” (Heilbrunn 242) with its own media outlets, pundits, and think-tanks such as the American Enterprise Institute and Project for a New America. Neoconservatism briefly flourished in Washington DC until Iraq’s sectarian violence discredited the “Vulcans” and neoconservative strategists like Paul Wolfowitz (Friedman; Ferguson). The neoconservatives' combination of September 11’s aftermath with strongly argued historical analogies was initially convincing. They conferred with scholars such as Bernard Lewis, Samuel P. Huntington and Victor Davis Hanson to construct classicist historical narratives and to explain cultural differences. However, the history of the decade after September 11 also contains mis-steps and mistakes which make it a series of contingent decisions (Ferguson; Bergen). One way to analyse these contingent decisions is to pose “what if?” counterfactuals, or feasible alternatives to historical events (Lebow). For instance, what if September 11 had been a chemical and biological weapons attack? (Mann 317). Appendix 1 includes a range of alternative possibilities and “minimal rewrites” or slight variations on the historical events which occurred. Collectively, these counterfactuals suggest the role of agency, chance, luck, and the juxtaposition of better and worse outcomes. They pose challenges to the classicist interpretation adopted soon after September 11 to justify “World War IV” (Podhoretz). A ‘Two-Track’ Process for ‘World War IV’ After the September 11 attacks, I think an overlapping two-track process occurred with the “Vulcans” cabinet, neoconservative advisers, and two “echo chambers”: neoconservative think-tanks and the post-September 11 media. Crucially, Bush’s “Vulcans” war cabinet succeeded in gaining civilian control of the United States war decision process. Although successful in initiating the 2003 Iraq War this civilian control created a deeper crisis in US civil-military relations (Stevenson; Morgan). The “Vulcans” relied on “politicised” intelligence such as a United Kingdom intelligence report on Iraq’s weapons development program. The report enabled “a climate of undifferentiated fear to arise” because its public version did not distinguish between chemical, biological, radiological or nuclear weapons (Halper and Clarke, 210). The cautious 2003 National Intelligence Estimates (NIE) report on Iraq was only released in a strongly edited form. For instance, the US Department of Energy had expressed doubts about claims that Iraq had approached Niger for uranium, and was using aluminium tubes for biological and chemical weapons development. Meanwhile, the post-September 11 media had become a second “echo chamber” (Halper and Clarke 194-196) which amplified neoconservative arguments. Berman, Laqueur, Podhoretz and others who framed the intellectual climate were “risk entrepreneurs” (Mueller 41-43) that supported the “World War IV” vision. The media also engaged in aggressive “flak” campaigns (Herman and Chomsky 26-28; Mueller 39-42) designed to limit debate and to stress foreign policy stances and themes which supported the Bush Administration. When former Central Intelligence Agency director James Woolsey’s claimed that Al Qaeda had close connections to Iraqi intelligence, this was promoted in several books, including Michael Ledeen’s War Against The Terror Masters, Stephen Hayes’ The Connection, and Laurie Mylroie’s Bush v. The Beltway; and in partisan media such as Fox News, NewsMax, and The Weekly Standard who each attacked the US State Department and the CIA (Dorrien 183; Hayes; Ledeen; Mylroie; Heilbrunn 237, 243-244; Mann 310). This was the media “echo chamber” at work. The group Accuracy in Media also campaigned successfully to ensure that US cable providers did not give Al Jazeera English access to US audiences (Barker). Cosmopolitan ideals seemed incompatible with what the “flak” groups desired. The two-track process converged on two now infamous speeches. US President Bush’s State of the Union Address on 29 January 2002, and US Secretary of State Colin Powell’s presentation to the United Nations on 5 February 2003. Bush’s speech included a line from neoconservative David Frumm about North Korea, Iraq and Iran as an “Axis of Evil” (Dorrien 158; Halper and Clarke 139-140; Mann 242, 317-321). Powell’s presentation to the United Nations included now-debunked threat assessments. In fact, Powell had altered the speech’s original draft by I. Lewis “Scooter” Libby, who was Cheney’s chief of staff (Dorrien 183-184). Powell claimed that Iraq had mobile biological weapons facilities, linked to Abu Musab al-Zarqawi. However, the International Atomic Energy Agency’s (IAEA) Mohamed El-Baradei, the Defense Intelligence Agency, the State Department, and the Institute for Science and International Security all strongly doubted this claim, as did international observers (Dorrien 184; Halper and Clarke 212-213; Mann 353-354). Yet this information was suppressed: attacked by “flak” or given little visible media coverage. Powell’s agenda included trying to rebuild an international coalition and to head off weather changes that would affect military operations in the Middle East (Mann 351). Both speeches used politicised variants of “weapons of mass destruction”, taken from the counterterrorism literature (Stern; Laqueur). Bush’s speech created an inflated geopolitical threat whilst Powell relied on flawed intelligence and scientific visuals to communicate a non-existent threat (Vogel). However, they had the intended effect on decision makers. US Under-Secretary of Defense, the neoconservative Paul Wolfowitz, later revealed to Vanity Fair that “weapons of mass destruction” was selected as an issue that all potential stakeholders could agree on (Wilkie 69). Perhaps the only remaining outlet was satire: Armando Iannucci’s 2009 film In The Loop parodied the diplomatic politics surrounding Powell’s speech and the civil-military tensions on the Iraq War’s eve. In the short term the two track process worked in heading off doubt. The “Vulcans” blocked important information on pre-war Iraq intelligence from reaching the media and the general public (Prados). Alternatively, they ignored area specialists and other experts, such as when Coalition Provisional Authority’s L. Paul Bremer ignored the US State Department’s fifteen volume ‘Future of Iraq’ project (Ferguson). Public “flak” and “risk entrepreneurs” mobilised a range of motivations from grief and revenge to historical memory and identity politics. This combination of private and public processes meant that although doubts were expressed, they could be contained through the dual echo chambers of neoconservative policymaking and the post-September 11 media. These factors enabled the “Vulcans” to proceed with their “regime change” plans despite strong public opposition from anti-war protestors. Expressing DoubtsMany experts and institutions expressed doubt about specific claims the Bush Administration made to support the 2003 Iraq War. This doubt came from three different and sometimes overlapping groups. Subject matter experts such as the IAEA’s Mohamed El-Baradei and weapons development scientists countered the UK intelligence report and Powell’s UN speech. However, they did not get the media coverage warranted due to “flak” and “echo chamber” dynamics. Others could challenge misleading historical analogies between insurgent Iraq and Nazi Germany, and yet not change the broader outcomes (Benjamin). Independent journalists one group who gained new information during the 1990-91 Gulf War: some entered Iraq from Kuwait and documented a more humanitarian side of the war to journalists embedded with US military units (Uyarra). Finally, there were dissenters from bureaucratic and institutional processes. In some cases, all three overlapped. In their separate analyses of the post-September 11 debate on intelligence “failure”, Zegart and Jervis point to a range of analytic misperceptions and institutional problems. However, the intelligence community is separated from policymakers such as the “Vulcans”. Compartmentalisation due to the “need to know” principle also means that doubting analysts can be blocked from releasing information. Andrew Wilkie discovered this when he resigned from Australia’s Office for National Assessments (ONA) as a transnational issues analyst. Wilkie questioned the pre-war assessments in Powell’s United Nations speech that were used to justify the 2003 Iraq War. Wilkie was then attacked publicly by Australian Prime Minister John Howard. This overshadowed a more important fact: both Howard and Wilkie knew that due to Australian legislation, Wilkie could not publicly comment on ONA intelligence, despite the invitation to do so. This barrier also prevented other intelligence analysts from responding to the “Vulcans”, and to “flak” and “echo chamber” dynamics in the media and neoconservative think-tanks. Many analysts knew that the excerpts released from the 2003 NIE on Iraq was highly edited (Prados). For example, Australian agencies such as the ONA, the Department of Foreign Affairs and Trade, and the Department of Defence knew this (Wilkie 98). However, analysts are trained not to interfere with policymakers, even when there are significant civil-military irregularities. Military officials who spoke out about pre-war planning against the “Vulcans” and their neoconservative supporters were silenced (Ricks; Ferguson). Greenlight Capital’s hedge fund manager David Einhorn illustrates in a different context what might happen if analysts did comment. Einhorn gave a speech to the Ira Sohn Conference on 15 May 2002 debunking the management of Allied Capital. Einhorn’s “short-selling” led to retaliation from Allied Capital, a Securities and Exchange Commission investigation, and growing evidence of potential fraud. If analysts adopted Einhorn’s tactics—combining rigorous analysis with targeted, public denunciation that is widely reported—then this may have short-circuited the “flak” and “echo chamber” effects prior to the 2003 Iraq War. The intelligence community usually tries to pre-empt such outcomes via contestation exercises and similar processes. This was the goal of the 2003 NIE on Iraq, despite the fact that the US Department of Energy which had the expertise was overruled by other agencies who expressed opinions not necessarily based on rigorous scientific and technical analysis (Prados; Vogel). In counterterrorism circles, similar disinformation arose about Aum Shinrikyo’s biological weapons research after its sarin gas attack on Tokyo’s subway system on 20 March 1995 (Leitenberg). Disinformation also arose regarding nuclear weapons proliferation to non-state actors in the 1990s (Stern). Interestingly, several of the “Vulcans” and neoconservatives had been involved in an earlier controversial contestation exercise: Team B in 1976. The Central Intelligence Agency (CIA) assembled three Team B groups in order to evaluate and forecast Soviet military capabilities. One group headed by historian Richard Pipes gave highly “alarmist” forecasts and then attacked a CIA NIE about the Soviets (Dorrien 50-56; Mueller 81). The neoconservatives adopted these same tactics to reframe the 2003 NIE from its position of caution, expressed by several intelligence agencies and experts, to belief that Iraq possessed a current, covert program to develop weapons of mass destruction (Prados). Alternatively, information may be leaked to the media to express doubt. “Non-attributable” background interviews to establishment journalists like Seymour Hersh and Bob Woodward achieved this. Wikileaks publisher Julian Assange has recently achieved notoriety due to US diplomatic cables from the SIPRNet network released from 28 November 2010 onwards. Supporters have favourably compared Assange to Daniel Ellsberg, the RAND researcher who leaked the Pentagon Papers (Ellsberg; Ehrlich and Goldsmith). Whilst Elsberg succeeded because a network of US national papers continued to print excerpts from the Pentagon Papers despite lawsuit threats, Assange relied in part on favourable coverage from the UK’s Guardian newspaper. However, suspected sources such as US Army soldier Bradley Manning are not protected whilst media outlets are relatively free to publish their scoops (Walt, ‘Woodward’). Assange’s publication of SIPRNet’s diplomatic cables will also likely mean greater restrictions on diplomatic and military intelligence (Walt, ‘Don’t Write’). Beyond ‘Doubt’ Iraq’s worsening security discredited many of the factors that had given the neoconservatives credibility. The post-September 11 media became increasingly more critical of the US military in Iraq (Ferguson) and cautious about the “echo chamber” of think-tanks and media outlets. Internet sites for Al Jazeera English, Al-Arabiya and other networks have enabled people to bypass “flak” and directly access these different viewpoints. Most damagingly, the non-discovery of Iraq’s weapons of mass destruction discredited both the 2003 NIE on Iraq and Colin Powell’s United Nations presentation (Wilkie 104). Likewise, “risk entrepreneurs” who foresaw “World War IV” in 2002 and 2003 have now distanced themselves from these apocalyptic forecasts due to a series of mis-steps and mistakes by the Bush Administration and Al Qaeda’s over-calculation (Bergen). The emergence of sites such as Wikileaks, and networks like Al Jazeera English and Al-Arabiya, are a response to the politics of the past decade. They attempt to short-circuit past “echo chambers” through providing access to different sources and leaked data. The Global War on Terror framed the Bush Administration’s response to September 11 as a war (Kirk; Mueller 59). Whilst this prematurely closed off other possibilities, it has also unleashed a series of dynamics which have undermined the neoconservative agenda. The “classicist” history and historical analogies constructed to justify the “World War IV” scenario are just one of several potential frameworks. “Flak” organisations and media “echo chambers” are now challenged by well-financed and strategic alternatives such as Al Jazeera English and Al-Arabiya. Doubt is one defence against “risk entrepreneurs” who seek to promote a particular idea: doubt guards against uncritical adoption. Perhaps the enduring lesson of the post-September 11 debates, though, is that doubt alone is not enough. What is needed are individuals and institutions that understand the strategies which the neoconservatives and others have used, and who also have the soft power skills during crises to influence critical decision-makers to choose alternatives. Appendix 1: Counterfactuals Richard Ned Lebow uses “what if?” counterfactuals to examine alternative possibilities and “minimal rewrites” or slight variations on the historical events that occurred. The following counterfactuals suggest that the Bush Administration’s Global War on Terror could have evolved very differently . . . or not occurred at all. Fact: The 2003 Iraq War and 2001 Afghanistan counterinsurgency shaped the Bush Administration’s post-September 11 grand strategy. Counterfactual #1: Al Gore decisively wins the 2000 U.S. election. Bush v. Gore never occurs. After the September 11 attacks, Gore focuses on international alliance-building and gains widespread diplomatic support rather than a neoconservative agenda. He authorises Special Operations Forces in Afghanistan and works closely with the Musharraf regime in Pakistan to target Al Qaeda’s muhajideen. He ‘contains’ Saddam Hussein’s Iraq through measurement and signature, technical intelligence, and more stringent monitoring by the International Atomic Energy Agency. Minimal Rewrite: United 93 crashes in Washington DC, killing senior members of the Gore Administration. Fact: U.S. Special Operations Forces failed to kill Osama bin Laden in late November and early December 2001 at Tora Bora. Counterfactual #2: U.S. Special Operations Forces kill Osama bin Laden in early December 2001 during skirmishes at Tora Bora. Ayman al-Zawahiri is critically wounded, captured, and imprisoned. The rest of Al Qaeda is scattered. Minimal Rewrite: Osama bin Laden’s death turns him into a self-mythologised hero for decades. Fact: The UK Blair Government supplied a 50-page intelligence dossier on Iraq’s weapons development program which the Bush Administration used to support its pre-war planning. Counterfactual #3: Rogue intelligence analysts debunk the UK Blair Government’s claims through a series of ‘targeted’ leaks to establishment news sources. Minimal Rewrite: The 50-page intelligence dossier is later discovered to be correct about Iraq’s weapons development program. Fact: The Bush Administration used the 2003 National Intelligence Estimate to “build its case” for “regime change” in Saddam Hussein’s Iraq. Counterfactual #4: A joint investigation by The New York Times and The Washington Post rebuts U.S. Secretary of State Colin Powell’s speech to the United National Security Council, delivered on 5 February 2003. Minimal Rewrite: The Central Intelligence Agency’s whitepaper “Iraq’s Weapons of Mass Destruction Programs” (October 2002) more accurately reflects the 2003 NIE’s cautious assessments. Fact: The Bush Administration relied on Ahmed Chalabi for its postwar estimates about Iraq’s reconstruction. Counterfactual #5: The Bush Administration ignores Chalabi’s advice and relies instead on the U.S. State Department’s 15 volume report “The Future of Iraq”. Minimal Rewrite: The Coalition Provisional Authority appoints Ahmed Chalabi to head an interim Iraqi government. Fact: L. Paul Bremer signed orders to disband Iraq’s Army and to De-Ba’athify Iraq’s new government. Counterfactual #6: Bremer keeps Iraq’s Army intact and uses it to impose security in Baghdad to prevent looting and to thwart insurgents. Rather than a De-Ba’athification policy, Bremer uses former Baath Party members to gather situational intelligence. Minimal Rewrite: Iraq’s Army refuses to disband and the De-Ba’athification policy uncovers several conspiracies to undermine the Coalition Provisional Authority. AcknowledgmentsThanks to Stephen McGrail for advice on science and technology analysis.References Barker, Greg. “War of Ideas”. PBS Frontline. Boston, MA: 2007. ‹http://www.pbs.org/frontlineworld/stories/newswar/video1.html› Benjamin, Daniel. “Condi’s Phony History.” Slate 29 Aug. 2003. ‹http://www.slate.com/id/2087768/pagenum/all/›. Bergen, Peter L. The Longest War: The Enduring Conflict between America and Al Qaeda. New York: The Free Press, 2011. Berman, Paul. Terror and Liberalism. W.W. Norton & Company: New York, 2003. Brenner, William J. “In Search of Monsters: Realism and Progress in International Relations Theory after September 11.” Security Studies 15.3 (2006): 496-528. Burns, Alex. “The Worldflash of a Coming Future.” M/C Journal 6.2 (April 2003). ‹http://journal.media-culture.org.au/0304/08-worldflash.php›. Dorrien, Gary. Imperial Designs: Neoconservatism and the New Pax Americana. New York: Routledge, 2004. Ehrlich, Judith, and Goldsmith, Rick. The Most Dangerous Man in America: Daniel Ellsberg and the Pentagon Papers. Berkley CA: Kovno Communications, 2009. Einhorn, David. Fooling Some of the People All of the Time: A Long Short (and Now Complete) Story. Hoboken NJ: John Wiley & Sons, 2010. Ellison, Sarah. “The Man Who Spilled The Secrets.” Vanity Fair (Feb. 2011). ‹http://www.vanityfair.com/politics/features/2011/02/the-guardian-201102›. Ellsberg, Daniel. Secrets: A Memoir of Vietnam and the Pentagon Papers. New York: Viking, 2002. Ferguson, Charles. No End in Sight, New York: Representational Pictures, 2007. Filkins, Dexter. The Forever War. New York: Vintage Books, 2008. Friedman, Murray. The Neoconservative Revolution: Jewish Intellectuals and the Shaping of Public Policy. New York: Cambridge UP, 2005. Halper, Stefan, and Jonathan Clarke. America Alone: The Neo-Conservatives and the Global Order. New York: Cambridge UP, 2004. Hayes, Stephen F. The Connection: How Al Qaeda’s Collaboration with Saddam Hussein Has Endangered America. New York: HarperCollins, 2004. Heilbrunn, Jacob. They Knew They Were Right: The Rise of the Neocons. New York: Doubleday, 2008. Herman, Edward S., and Noam Chomsky. Manufacturing Consent: The Political Economy of the Mass Media. Rev. ed. New York: Pantheon Books, 2002. Iannucci, Armando. In The Loop. London: BBC Films, 2009. Jervis, Robert. Why Intelligence Fails: Lessons from the Iranian Revolution and the Iraq War. Ithaca NY: Cornell UP, 2010. Kirk, Michael. “The War behind Closed Doors.” PBS Frontline. Boston, MA: 2003. ‹http://www.pbs.org/wgbh/pages/frontline/shows/iraq/›. Laqueur, Walter. No End to War: Terrorism in the Twenty-First Century. New York: Continuum, 2003. Lebow, Richard Ned. Forbidden Fruit: Counterfactuals and International Relations. Princeton NJ: Princeton UP, 2010. Ledeen, Michael. The War against The Terror Masters. New York: St. Martin’s Griffin, 2003. Leitenberg, Milton. “Aum Shinrikyo's Efforts to Produce Biological Weapons: A Case Study in the Serial Propagation of Misinformation.” Terrorism and Political Violence 11.4 (1999): 149-158. Mann, James. Rise of the Vulcans: The History of Bush’s War Cabinet. New York: Viking Penguin, 2004. Morgan, Matthew J. The American Military after 9/11: Society, State, and Empire. New York: Palgrave Macmillan, 2008. Mueller, John. Overblown: How Politicians and the Terrorism Industry Inflate National Security Threats, and Why We Believe Them. New York: The Free Press, 2009. Mylroie, Laurie. Bush v The Beltway: The Inside Battle over War in Iraq. New York: Regan Books, 2003. Nutt, Paul C. Why Decisions Fail. San Francisco: Berrett-Koelher, 2002. Podhoretz, Norman. “How to Win World War IV”. Commentary 113.2 (2002): 19-29. Prados, John. Hoodwinked: The Documents That Reveal How Bush Sold Us a War. New York: The New Press, 2004. Ricks, Thomas. Fiasco: The American Military Adventure in Iraq. New York: The Penguin Press, 2006. Stern, Jessica. The Ultimate Terrorists. Boston, MA: Harvard UP, 2001. Stevenson, Charles A. Warriors and Politicians: US Civil-Military Relations under Stress. New York: Routledge, 2006. Walt, Stephen M. “Should Bob Woodward Be Arrested?” Foreign Policy 10 Dec. 2010. ‹http://walt.foreignpolicy.com/posts/2010/12/10/more_wikileaks_double_standards›. Walt, Stephen M. “‘Don’t Write If You Can Talk...’: The Latest from WikiLeaks.” Foreign Policy 29 Nov. 2010. ‹http://walt.foreignpolicy.com/posts/2010/11/29/dont_write_if_you_can_talk_the_latest_from_wikileaks›. Wilkie, Andrew. Axis of Deceit. Melbourne: Black Ink Books, 2003. Uyarra, Esteban Manzanares. “War Feels like War”. London: BBC, 2003. Vogel, Kathleen M. “Iraqi Winnebagos™ of Death: Imagined and Realized Futures of US Bioweapons Threat Assessments.” Science and Public Policy 35.8 (2008): 561–573. Zegart, Amy. Spying Blind: The CIA, the FBI and the Origins of 9/11. Princeton NJ: Princeton UP, 2007.
APA, Harvard, Vancouver, ISO, and other styles
19

Brien, Donna Lee. "Forging Continuing Bonds from the Dead to the Living: Gothic Commemorative Practices along Australia’s Leichhardt Highway." M/C Journal 17, no. 4 (July 24, 2014). http://dx.doi.org/10.5204/mcj.858.

Full text
Abstract:
The Leichhardt Highway is a six hundred-kilometre stretch of sealed inland road that joins the Australian Queensland border town of Goondiwindi with the Capricorn Highway, just south of the Tropic of Capricorn. Named after the young Prussian naturalist Ludwig Leichhardt, part of this roadway follows the route his party took as they crossed northern Australia from Morton Bay (Brisbane) to Port Essington (near Darwin). Ignoring the usual colonial practice of honouring the powerful and aristocratic, Leichhardt named the noteworthy features along this route after his supporters and fellow expeditioners. Many of these names are still in use and a series of public monuments have also been erected in the intervening century and a half to commemorate this journey. Unlike Leichhardt, who survived his epic trip, some contemporary travellers who navigate the remote roadway named in his honour do not arrive at their final destinations. Memorials to these violently interrupted lives line the highway, many enigmatically located in places where there is no obvious explanation for the lethal violence that occurred there. This examination profiles the memorials along Leichhardt’s highway as Gothic practice, in order to illuminate some of the uncanny paradoxes around public memorials, as well as the loaded emotional terrain such commemorative practices may inhabit. All humans know that death awaits them (Morell). Yet, despite this, and the unprecedented torrent of images of death and dying saturating news, television, and social media (Duwe; Sumiala; Bisceglio), Gorer’s mid-century ideas about the denial of death and Becker’s 1973 Pulitzer prize-winning description of the purpose of human civilization as a defence against this knowledge remains current in the contemporary trope that individuals (at least in the West) deny their mortality. Contributing to this enigmatic situation is how many deny the realities of aging and bodily decay—the promise of the “life extension” industries (Hall)—and are shielded from death by hospitals, palliative care providers, and the multimillion dollar funeral industry (Kiernan). Drawing on Piatti-Farnell’s concept of popular culture artefacts as “haunted/haunting” texts, the below describes how memorials to the dead can powerfully reconnect those who experience them with death’s reality, by providing an “encrypted passageway through which the dead re-join the living in a responsive cycle of exchange and experience” (Piatti-Farnell). While certainly very different to the “sublime” iconic Gothic structure, the Gothic ruin that Summers argued could be seen as “a sacred relic, a memorial, a symbol of infinite sadness, of tenderest sensibility and regret” (407), these memorials do function in both this way as melancholy/regret-inducing relics as well as in Piatti-Farnell’s sense of bringing the dead into everyday consciousness. Such memorialising activity also evokes one of Spooner’s features of the Gothic, by acknowledging “the legacies of the past and its burdens on the present” (8).Ludwig Leichhardt and His HighwayWhen Leichhardt returned to Sydney in 1846 from his 18-month journey across northern Australia, he was greeted with surprise and then acclaim. Having mounted his expedition without any backing from influential figures in the colony, his party was presumed lost only weeks after its departure. Yet, once Leichhardt and almost all his expedition returned, he was hailed “Prince of Explorers” (Erdos). When awarding him a significant purse raised by public subscription, then Speaker of the Legislative Council voiced what he believed would be the explorer’s lasting memorial —the public memory of his achievement: “the undying glory of having your name enrolled amongst those of the great men whose genius and enterprise have impelled them to seek for fame in the prosecution of geographical science” (ctd. Leichhardt 539). Despite this acclaim, Leichhardt was a controversial figure in his day; his future prestige not enhanced by his Prussian/Germanic background or his disappearance two years later attempting to cross the continent. What troubled the colonial political class, however, was his transgressive act of naming features along his route after commoners rather than the colony’s aristocrats. Today, the Leichhardt Highway closely follows Leichhardt’s 1844-45 route for some 130 kilometres from Miles, north through Wandoan to Taroom. In the first weeks of his journey, Leichhardt named 16 features in this area: 6 of the more major of these after the men in his party—including the Aboriginal man ‘Charley’ and boy John Murphy—4 more after the tradesmen and other non-aristocratic sponsors of his venture, and the remainder either in memory of the journey’s quotidian events or natural features there found. What we now accept as traditional memorialising practice could in this case be termed as Gothic, in that it upset the rational, normal order of its day, and by honouring humble shopkeepers, blacksmiths and Indigenous individuals, revealed the “disturbance and ambivalence” (Botting 4) that underlay colonial class relations (Macintyre). On 1 December 1844, Leichhardt also memorialised his own past, referencing the Gothic in naming a watercourse The Creek of the Ruined Castles due to the “high sandstone rocks, fissured and broken like pillars and walls and the high gates of the ruined castles of Germany” (57). Leichhardt also disturbed and disfigured the nature he so admired, famously carving his initials deep into trees along his route—a number of which still exist, including the so-called Leichhardt Tree, a large coolibah in Taroom’s main street. Leichhardt also wrote his own memorial, keeping detailed records of his experiences—both good and more regretful—in the form of field books, notebooks and letters, with his major volume about this expedition published in London in 1847. Leichhardt’s journey has since been memorialised in various ways along the route. The Leichhardt Tree has been further defaced with numerous plaques nailed into its ancient bark, and the town’s federal government-funded Bicentennial project raised a formal memorial—a large sandstone slab laid with three bronze plaques—in the newly-named Ludwig Leichhardt Park. Leichhardt’s name also adorns many sites both along, and outside, the routes of his expeditions. While these fittingly include natural features such as the Leichhardt River in north-west Queensland (named in 1856 by Augustus Gregory who crossed it by searching for traces of the explorer’s ill-fated 1848 expedition), there are also many businesses across Queensland and the Northern Territory less appropriately carrying his name. More somber monuments to Leichhardt’s legacy also resulted from this journey. The first of these was the white settlement that followed his declaration that the countryside he moved through was well endowed with fertile soils. With squatters and settlers moving in and land taken up before Leichhardt had even arrived back in Sydney, the local Yeeman people were displaced, mistreated and completely eradicated within a decade (Elder). Mid-twentieth century, Patrick White’s literary reincarnation, Voss of the eponymous novel, and paintings by Sidney Nolan and Albert Tucker have enshrined in popular memory not only the difficult (and often described as Gothic) nature of the landscape through which Leichhardt travelled (Adams; Mollinson, and Bonham), but also the distinctive and contrary blend of intelligence, spiritual mysticism, recklessness, and stoicism Leichhardt brought to his task. Roadside Memorials Today, the Leichhardt Highway is also lined with a series of roadside shrines to those who have died much more recently. While, like centotaphs, tombstones, and cemeteries, these memorialise the dead, they differ in usually marking the exact location that death occurred. In 43 BC, Cicero articulated the idea of the dead living in memory, “The life of the dead consists in the recollection cherished of them by the living” (93), yet Nelson is one of very few contemporary writers to link roadside memorials to elements of Gothic sensibility. Such constructions can, however, be described as Gothic, in that they make the roadway unfamiliar by inscribing onto it the memory of corporeal trauma and, in the process, re-creating their locations as vivid sites of pain and suffering. These are also enigmatic sites. Traffic levels are generally low along the flat or gently undulating terrain and many of these memorials are located in locations where there is no obvious explanation for the violence that occurred there. They are loci of contradictions, in that they are both more private than other memorials, in being designed, and often made and erected, by family and friends of the deceased, and yet more public, visible to all who pass by (Campbell). Cemeteries are set apart from their surroundings; the roadside memorial is, in contrast, usually in open view along a thoroughfare. In further contrast to cemeteries, which contain many relatively standardised gravesites, individual roadside memorials encapsulate and express not only the vivid grief of family and friends but also—when they include vehicle wreckage or personal artefacts from the fatal incident—provide concrete evidence of the trauma that occurred. While the majority of individuals interned in cemeteries are long dead, roadside memorials mark relatively contemporary deaths, some so recent that there may still be tyre marks, debris and bloodstains marking the scene. In 2008, when I was regularly travelling this roadway, I documented, and researched, the six then extant memorial sites that marked the locations of ten fatalities from 1999 to 2006. (These were all still in place in mid-2014.) The fatal incidents are very diverse. While half involved trucks and/or road trains, at least three were single vehicle incidents, and the deceased ranged from 13 to 84 years of age. Excell argues that scholarship on roadside memorials should focus on “addressing the diversity of the material culture” (‘Contemporary Deathscapes’) and, in these terms, the Leichhardt Highway memorials vary from simple crosses to complex installations. All include crosses (mostly, but not exclusively, white), and almost all are inscribed with the name and birth/death dates of the deceased. Most include flowers or other plants (sometimes fresh but more often plastic), but sometimes also a range of relics from the crash and/or personal artefacts. These are, thus, unsettling sights, not least in the striking contrast they provide with the highway and surrounding road reserve. The specific location is a key component of their ability to re-sensitise viewers to the dangers of the route they are travelling. The first memorial travelling northwards, for instance, is situated at the very point at which the highway begins, some 18 kilometres from Goondiwindi. Two small white crosses decorated with plastic flowers are set poignantly close together. The inscriptions can also function as a means of mobilising connection with these dead strangers—a way of building Secomb’s “haunted community”, whereby community in the post-colonial age can only be built once past “murderous death” (131) is acknowledged. This memorial is inscribed with “Cec Hann 06 / A Good Bloke / A Good hoarseman [sic]” and “Pat Hann / A Good Woman” to tragically commemorate the deaths of an 84-year-old man and his 79-year-old wife from South Australia who died in the early afternoon of 5 June 2006 when their Ford Falcon, towing a caravan, pulled onto the highway and was hit by a prime mover pulling two trailers (Queensland Police, ‘Double Fatality’; Jones, and McColl). Further north along the highway are two memorials marking the most inexplicable of road deaths: the single vehicle fatality (Connolly, Cullen, and McTigue). Darren Ammenhauser, aged 29, is remembered with a single white cross with flowers and plaque attached to a post, inscribed hopefully, “Darren Ammenhauser 1971-2000 At Rest.” Further again, at Billa Billa Creek, a beautifully crafted metal cross attached to a fence is inscribed with the text, “Kenneth J. Forrester / RIP Jack / 21.10.25 – 27.4.05” marking the death of the 79-year-old driver whose vehicle veered off the highway to collide with a culvert on the creek. It was reported that the vehicle rolled over several times before coming to rest on its wheels and that Forrester was dead when the police arrived (Queensland Police, ‘Fatal Traffic Incident’). More complex memorials recollect both single and multiple deaths. One, set on both sides of the road, maps the physical trajectory of the fatal smash. This memorial comprises white crosses on both sides of road, attached to a tree on one side, and a number of ancillary sites including damaged tyres with crosses placed inside them on both sides of the road. Simple inscriptions relay the inability of such words to express real grief: “Gary (Gazza) Stevens / Sadly missed” and “Gary (Gazza) Stevens / Sadly missed / Forever in our hearts.” The oldest and most complex memorial on the route, commemorating the death of four individuals on 18 June 1999, is also situated on both sides of the road, marking the collision of two vehicles travelling in opposite directions. One memorial to a 62-year-old man comprises a cross with flowers, personal and automotive relics, and a plaque set inside a wooden fence and simply inscribed “John Henry Keenan / 23-11-1936–18-06-1999”. The second memorial contains three white crosses set side-by-side, together with flowers and relics, and reveals that members of three generations of the same family died at this location: “Raymond Campbell ‘Butch’ / 26-3-67–18-6-99” (32 years of age), “Lorraine Margaret Campbell ‘Lloydie’ / 29-11-46–18-6-99” (53 years), and “Raymond Jon Campbell RJ / 28-1-86–18-6-99” (13 years). The final memorial on this stretch of highway is dedicated to Jason John Zupp of Toowoomba who died two weeks before Christmas 2005. This consists of a white cross, decorated with flowers and inscribed: “Jason John Zupp / Loved & missed by all”—a phrase echoed in his newspaper obituary. The police media statement noted that, “at 11.24pm a prime mover carrying four empty trailers [stacked two high] has rolled on the Leichhardt Highway 17km north of Taroom” (Queensland Police, ‘Fatal Truck Accident’). The roadside memorial was placed alongside a ditch on a straight stretch of road where the body was found. The coroner’s report adds the following chilling information: “Mr Zupp was thrown out of the cabin and his body was found near the cabin. There is no evidence whatsoever that he had applied the brakes or in any way tried to prevent the crash … Jason was not wearing his seatbelt” (Cornack 5, 6). Cornack also remarked the truck was over length, the brakes had not been properly adjusted, and the trip that Zupp had undertaken could not been lawfully completed according to fatigue management regulations then in place (8). Although poignant and highly visible due to these memorials, these deaths form a small part of Australia’s road toll, and underscore our ambivalent relationship with the automobile, where road death is accepted as a necessary side-effect of the freedom of movement the technology offers (Ladd). These memorials thus animate highways as Gothic landscapes due to the “multifaceted” (Haider 56) nature of the fear, terror and horror their acknowledgement can bring. Since 1981, there have been, for instance, between some 1,600 and 3,300 road deaths each year in Australia and, while there is evidence of a long term downward trend, the number of deaths per annum has not changed markedly since 1991 (DITRDLG 1, 2), and has risen in some years since then. The U.S.A. marked its millionth road death in 1951 (Ladd) along the way to over 3,000,000 during the 20th century (Advocates). These deaths are far reaching, with U.K. research suggesting that each death there leaves an average of 6 people significantly affected, and that there are some 10 to 20 per cent of mourners who experience more complicated grief and longer term negative affects during this difficult time (‘Pathways Through Grief’). As the placing of roadside memorials has become a common occurrence the world over (Klaassens, Groote, and Vanclay; Grider; Cohen), these are now considered, in MacConville’s opinion, not only “an appropriate, but also an expected response to tragedy”. Hockey and Draper have explored the therapeutic value of the maintenance of “‘continuing bonds’ between the living and the dead” (3). This is, however, only one explanation for the reasons that individuals erect roadside memorials with research suggesting roadside memorials perform two main purposes in their linking of the past with the present—as not only sites of grieving and remembrance, but also of warning (Hartig, and Dunn; Everett; Excell, Roadside Memorials; MacConville). Clark adds that by “localis[ing] and personalis[ing] the road dead,” roadside memorials raise the profile of road trauma by connecting the emotionless statistics of road death directly to individual tragedy. They, thus, transform the highway into not only into a site of past horror, but one in which pain and terror could still happen, and happen at any moment. Despite their increasing commonality and their recognition as cultural artefacts, these memorials thus occupy “an uncomfortable place” both in terms of public policy and for some individuals (Lowe). While in some states of the U.S.A. and in Ireland the erection of such memorials is facilitated by local authorities as components of road safety campaigns, in the U.K. there appears to be “a growing official opposition to the erection of memorials” (MacConville). Criticism has focused on the dangers (of distraction and obstruction) these structures pose to passing traffic and pedestrians, while others protest their erection on aesthetic grounds and even claim memorials can lower property values (Everett). While many ascertain a sense of hope and purpose in the physical act of creating such shrines (see, for instance, Grider; Davies), they form an uncanny presence along the highway and can provide dangerous psychological territory for the viewer (Brien). Alongside the townships, tourist sites, motels, and petrol stations vying to attract customers, they stain the roadway with the unmistakable sign that a violent death has happened—bringing death, and the dead, to the fore as a component of these journeys, and destabilising prominent cultural narratives of technological progress and safety (Richter, Barach, Ben-Michael, and Berman).Conclusion This investigation has followed Goddu who proposes that a Gothic text “registers its culture’s contradictions” (3) and, in profiling these memorials as “intimately connected to the culture that produces them” (Goddu 3) has proposed memorials as Gothic artefacts that can both disturb and reveal. Roadside memorials are, indeed, so loaded with emotional content that their close contemplation can be traumatising (Brien), yet they are inescapable while navigating the roadway. Part of their power resides in their ability to re-animate those persons killed in these violent in the minds of those viewing these memorials. In this way, these individuals are reincarnated as ghostly presences along the highway, forming channels via which the traveller can not only make human contact with the dead, but also come to recognise and ponder their own sense of mortality. While roadside memorials are thus like civic war memorials in bringing untimely death to the forefront of public view, roadside memorials provide a much more raw expression of the chaotic, anarchic and traumatic moment that separates the world of the living from that of the dead. While traditional memorials—such as those dedicated by, and to, Leichhardt—moreover, pay homage to the vitality of the lives of those they commemorate, roadside memorials not only acknowledge the alarming circumstances of unexpected death but also stand testament to the power of the paradox of the incontrovertibility of sudden death versus our lack of ability to postpone it. In this way, further research into these and other examples of Gothic memorialising practice has much to offer various areas of cultural study in Australia.ReferencesAdams, Brian. Sidney Nolan: Such Is Life. Hawthorn, Vic.: Hutchinson, 1987. Advocates for Highway and Auto Safety. “Motor Vehicle Traffic Fatalities & Fatality Rate: 1899-2003.” 2004. Becker, Ernest. The Denial of Death. New York: Simon & Schuster, 1973. Bisceglio, Paul. “How Social Media Is Changing the Way We Approach Death.” The Atlantic 20 Aug. 2013. Botting, Fred. Gothic: The New Critical Idiom. 2nd edition. Abingdon, UK: Routledge, 2014. Brien, Donna Lee. “Looking at Death with Writers’ Eyes: Developing Protocols for Utilising Roadside Memorials in Creative Writing Classes.” Roadside Memorials. Ed. Jennifer Clark. Armidale, NSW: EMU Press, 2006. 208–216. Campbell, Elaine. “Public Sphere as Assemblage: The Cultural Politics of Roadside Memorialization.” The British Journal of Sociology 64.3 (2013): 526–547. Cicero, Marcus Tullius. The Orations of Marcus Tullius Cicero. 43 BC. Trans. C. D. Yonge. London: George Bell & Sons, 1903. Clark, Jennifer. “But Statistics Don’t Ride Skateboards, They Don’t Have Nicknames Like ‘Champ’: Personalising the Road Dead with Roadside Memorials.” 7th International Conference on the Social Context of Death, Dying and Disposal. Bath, UK: University of Bath, 2005. Cohen, Erik. “Roadside Memorials in Northeastern Thailand.” OMEGA: Journal of Death and Dying 66.4 (2012–13): 343–363. Connolly, John F., Anne Cullen, and Orfhlaith McTigue. “Single Road Traffic Deaths: Accident or Suicide?” Crisis: The Journal of Crisis Intervention and Suicide Prevention 16.2 (1995): 85–89. Cornack [Coroner]. Transcript of Proceedings. In The Matter of an Inquest into the Cause and Circumstances Surrounding the Death of Jason John Zupp. Towoomba, Qld.: Coroners Court. 12 Oct. 2007. Davies, Douglas. “Locating Hope: The Dynamics of Memorial Sites.” 6th International Conference on the Social Context of Death, Dying and Disposal. York, UK: University of York, 2002. Department of Infrastructure, Transport, Regional Development and Local Government [DITRDLG]. Road Deaths Australia: 2007 Statistical Summary. Canberra: Commonwealth of Australia, 2008. Duwe, Grant. “Body-count Journalism: The Presentation of Mass Murder in the News Media.” Homicide Studies 4 (2000): 364–399. Elder, Bruce. Blood on the Wattle: Massacres and Maltreatment of Aboriginal Australians since 1788. Sydney: New Holland, 1998. Erdos, Renee. “Leichhardt, Friedrich Wilhelm Ludwig (1813-1848).” Australian Dictionary of Biography Online Edition. Melbourne: Melbourne UP, 1967. Everett, Holly. Roadside Crosses in Contemporary Memorial Culture. Austin: Texas UP, 2002. Excell, Gerri. “Roadside Memorials in the UK.” Unpublished MA thesis. Reading: University of Reading, 2004. ———. “Contemporary Deathscapes: A Comparative Analysis of the Material Culture of Roadside Memorials in the US, Australia and the UK.” 7th International Conference on the Social Context of Death, Dying and Disposal. Bath, UK: University of Bath, 2005. Goddu, Teresa A. Gothic America: Narrative, History, and Nation. New York: Columbia UP, 2007. Gorer, Geoffrey. “The Pornography of Death.” Encounter V.4 (1955): 49–52. Grider, Sylvia. “Spontaneous Shrines: A Modern Response to Tragedy and Disaster.” New Directions in Folklore (5 Oct. 2001). Haider, Amna. “War Trauma and Gothic Landscapes of Dispossession and Dislocation in Pat Barker’s Regeneration Trilogy.” Gothic Studies 14.2 (2012): 55–73. Hall, Stephen S. Merchants of Immortality: Chasing the Dream of Human Life Extension. Boston: Houghton, Mifflin, Harcourt, 2003. Hartig, Kate V., and Kevin M. Dunn. “Roadside Memorials: Interpreting New Deathscapes in Newcastle, New South Wales.” Australian Geographical Studies 36 (1998): 5–20. Hockey, Jenny, and Janet Draper. “Beyond the Womb and the Tomb: Identity, (Dis)embodiment and the Life Course.” Body & Society 11.2 (2005): 41–57. Online version: 1–25. Jones, Ian, and Kaye McColl. (2006) “Highway Tragedy.” Goondiwindi Argus 9 Jun. 2006. Kiernan, Stephen P. “The Transformation of Death in America.” Final Acts: Death, Dying, and the Choices We Make. Eds. Nan Bauer-Maglin, and Donna Perry. Rutgers University: Rutgers UP, 2010. 163–182. Klaassens, M., P.D. Groote, and F.M. Vanclay. “Expressions of Private Mourning in Public Space: The Evolving Structure of Spontaneous and Permanent Roadside Memorials in the Netherlands.” Death Studies 37.2 (2013): 145–171. Ladd, Brian. Autophobia: Love and Hate in the Automotive Age. Chicago: U of Chicago P, 2008. Leichhardt, Ludwig. Journal of an Overland Expedition of Australia from Moreton Bay to Port Essington, A Distance of Upwards of 3000 Miles during the Years 1844–1845. London, T & W Boone, 1847. Facsimile ed. Sydney: Macarthur Press, n.d. Lowe, Tim. “Roadside Memorials in South Eastern Australia.” 7th International Conference on the Social Context of Death, Dying and Disposal. Bath, UK: University of Bath, 2005. MacConville, Una. “Roadside Memorials.” Bath, UK: Centre for Death & Society, Department of Social and Policy Sciences, University of Bath, 2007. Macintyre, Stuart. “The Making of the Australian Working Class: An Historiographical Survey.” Historical Studies 18.71 (1978): 233–253. Mollinson, James, and Nicholas Bonham. Tucker. South Melbourne: Macmillan Company of Australia, and Australian National Gallery, 1982. Morell, Virginia. “Mournful Creatures.” Lapham’s Quarterly 6.4 (2013): 200–208. Nelson, Victoria. Gothicka: Vampire Heroes, Human Gods, and the New Supernatural. Harvard University: Harvard UP, 2012. “Pathways through Grief.” 1st National Conference on Bereavement in a Healthcare Setting. Dundee, 1–2 Sep. 2008. Piatti-Farnell, Lorna. “Words from the Culinary Crypt: Reading the Recipe as a Haunted/Haunting Text.” M/C Journal 16.3 (2013). Queensland Police. “Fatal Traffic Incident, Goondiwindi [Media Advisory].” 27 Apr. 2005. ———. “Fatal Truck Accident, Taroom.” Media release. 11 Dec. 2005. ———. “Double Fatality, Goondiwindi.” Media release. 5 Jun. 2006. Richter, E. D., P. Barach, E. Ben-Michael, and T. Berman. “Death and Injury from Motor Vehicle Crashes: A Public Health Failure, Not an Achievement.” Injury Prevention 7 (2001): 176–178. Secomb, Linnell. “Haunted Community.” The Politics of Community. Ed. Michael Strysick. Aurora, Co: Davies Group, 2002. 131–150. Spooner, Catherine. Contemporary Gothic. London: Reaktion, 2006.
APA, Harvard, Vancouver, ISO, and other styles
20

Cinque, Toija. "A Study in Anxiety of the Dark." M/C Journal 24, no. 2 (April 27, 2021). http://dx.doi.org/10.5204/mcj.2759.

Full text
Abstract:
Introduction This article is a study in anxiety with regard to social online spaces (SOS) conceived of as dark. There are two possible ways to define ‘dark’ in this context. The first is that communication is dark because it either has limited distribution, is not open to all users (closed groups are a case example) or hidden. The second definition, linked as a result of the first, is the way that communication via these means is interpreted and understood. Dark social spaces disrupt the accepted top-down flow by the ‘gazing elite’ (data aggregators including social media), but anxious users might need to strain to notice what is out there, and this in turn destabilises one’s reception of the scene. In an environment where surveillance technologies are proliferating, this article examines contemporary, dark, interconnected, and interactive communications for the entangled affordances that might be brought to bear. A provocation is that resistance through counterveillance or “sousveillance” is one possibility. An alternative (or addition) is retreating to or building ‘dark’ spaces that are less surveilled and (perhaps counterintuitively) less fearful. This article considers critically the notion of dark social online spaces via four broad socio-technical concerns connected to the big social media services that have helped increase a tendency for fearful anxiety produced by surveillance and the perceived implications for personal privacy. It also shines light on the aspect of darkness where some users are spurred to actively seek alternative, dark social online spaces. Since the 1970s, public-key cryptosystems typically preserved security for websites, emails, and sensitive health, government, and military data, but this is now reduced (Williams). We have seen such systems exploited via cyberattacks and misappropriated data acquired by affiliations such as Facebook-Cambridge Analytica for targeted political advertising during the 2016 US elections. Via the notion of “parasitic strategies”, such events can be described as news/information hacks “whose attack vectors target a system’s weak points with the help of specific strategies” (von Nordheim and Kleinen-von Königslöw, 88). In accord with Wilson and Serisier’s arguments (178), emerging technologies facilitate rapid data sharing, collection, storage, and processing wherein subsequent “outcomes are unpredictable”. This would also include the effect of acquiescence. In regard to our digital devices, for some, being watched overtly—through cameras encased in toys, computers, and closed-circuit television (CCTV) to digital street ads that determine the resonance of human emotions in public places including bus stops, malls, and train stations—is becoming normalised (McStay, Emotional AI). It might appear that consumers immersed within this Internet of Things (IoT) are themselves comfortable interacting with devices that record sound and capture images for easy analysis and distribution across the communications networks. A counter-claim is that mainstream social media corporations have cultivated a sense of digital resignation “produced when people desire to control the information digital entities have about them but feel unable to do so” (Draper and Turow, 1824). Careful consumers’ trust in mainstream media is waning, with readers observing a strong presence of big media players in the industry and are carefully picking their publications and public intellectuals to follow (Mahmood, 6). A number now also avoid the mainstream internet in favour of alternate dark sites. This is done by users with “varying backgrounds, motivations and participation behaviours that may be idiosyncratic (as they are rooted in the respective person’s biography and circumstance)” (Quandt, 42). By way of connection with dark internet studies via Biddle et al. (1; see also Lasica), the “darknet” is a collection of networks and technologies used to share digital content … not a separate physical network but an application and protocol layer riding on existing networks. Examples of darknets are peer-to-peer file sharing, CD and DVD copying, and key or password sharing on email and newsgroups. As we note from the quote above, the “dark web” uses existing public and private networks that facilitate communication via the Internet. Gehl (1220; see also Gehl and McKelvey) has detailed that this includes “hidden sites that end in ‘.onion’ or ‘.i2p’ or other Top-Level Domain names only available through modified browsers or special software. Accessing I2P sites requires a special routing program ... . Accessing .onion sites requires Tor [The Onion Router]”. For some, this gives rise to social anxiety, read here as stemming from that which is not known, and an exaggerated sense of danger, which makes fight or flight seem the only options. This is often justified or exacerbated by the changing media and communication landscape and depicted in popular documentaries such as The Social Dilemma or The Great Hack, which affect public opinion on the unknown aspects of internet spaces and the uses of personal data. The question for this article remains whether the fear of the dark is justified. Consider that most often one will choose to make one’s intimate bedroom space dark in order to have a good night’s rest. We might pleasurably escape into a cinema’s darkness for the stories told therein, or walk along a beach at night enjoying unseen breezes. Most do not avoid these experiences, choosing to actively seek them out. Drawing this thread, then, is the case made here that agency can also be found in the dark by resisting socio-political structural harms. 1. Digital Futures and Anxiety of the Dark Fear of the darkI have a constant fear that something's always nearFear of the darkFear of the darkI have a phobia that someone's always there In the lyrics to the song “Fear of the Dark” (1992) by British heavy metal group Iron Maiden is a sense that that which is unknown and unseen causes fear and anxiety. Holding a fear of the dark is not unusual and varies in degree for adults as it does for children (Fellous and Arbib). Such anxiety connected to the dark does not always concern darkness itself. It can also be a concern for the possible or imagined dangers that are concealed by the darkness itself as a result of cognitive-emotional interactions (McDonald, 16). Extending this claim is this article’s non-binary assertion that while for some technology and what it can do is frequently misunderstood and shunned as a result, for others who embrace the possibilities and actively take it on it is learning by attentively partaking. Mistakes, solecism, and frustrations are part of the process. Such conceptual theorising falls along a continuum of thinking. Global interconnectivity of communications networks has certainly led to consequent concerns (Turkle Alone Together). Much focus for anxiety has been on the impact upon social and individual inner lives, levels of media concentration, and power over and commercialisation of the internet. Of specific note is that increasing commercial media influence—such as Facebook and its acquisition of WhatsApp, Oculus VR, Instagram, CRTL-labs (translating movements and neural impulses into digital signals), LiveRail (video advertising technology), Chainspace (Blockchain)—regularly changes the overall dynamics of the online environment (Turow and Kavanaugh). This provocation was born out recently when Facebook disrupted the delivery of news to Australian audiences via its service. Mainstream social online spaces (SOS) are platforms which provide more than the delivery of media alone and have been conceptualised predominantly in a binary light. On the one hand, they can be depicted as tools for the common good of society through notional widespread access and as places for civic participation and discussion, identity expression, education, and community formation (Turkle; Bruns; Cinque and Brown; Jenkins). This end of the continuum of thinking about SOS seems set hard against the view that SOS are operating as businesses with strategies that manipulate consumers to generate revenue through advertising, data, venture capital for advanced research and development, and company profit, on the other hand. In between the two polar ends of this continuum are the range of other possibilities, the shades of grey, that add contemporary nuance to understanding SOS in regard to what they facilitate, what the various implications might be, and for whom. By way of a brief summary, anxiety of the dark is steeped in the practices of privacy-invasive social media giants such as Facebook and its ancillary companies. Second are the advertising technology companies, surveillance contractors, and intelligence agencies that collect and monitor our actions and related data; as well as the increased ease of use and interoperability brought about by Web 2.0 that has seen a disconnection between technological infrastructure and social connection that acts to limit user permissions and online affordances. Third are concerns for the negative effects associated with depressed mental health and wellbeing caused by “psychologically damaging social networks”, through sleep loss, anxiety, poor body image, real world relationships, and the fear of missing out (FOMO; Royal Society for Public Health (UK) and the Young Health Movement). Here the harms are both individual and societal. Fourth is the intended acceleration toward post-quantum IoT (Fernández-Caramés), as quantum computing’s digital components are continually being miniaturised. This is coupled with advances in electrical battery capacity and interconnected telecommunications infrastructures. The result of such is that the ontogenetic capacity of the powerfully advanced network/s affords supralevel surveillance. What this means is that through devices and the services that they provide, individuals’ data is commodified (Neff and Nafus; Nissenbaum and Patterson). Personal data is enmeshed in ‘things’ requiring that the decisions that are both overt, subtle, and/or hidden (dark) are scrutinised for the various ways they shape social norms and create consequences for public discourse, cultural production, and the fabric of society (Gillespie). Data and personal information are retrievable from devices, sharable in SOS, and potentially exposed across networks. For these reasons, some have chosen to go dark by being “off the grid”, judiciously selecting their means of communications and their ‘friends’ carefully. 2. Is There Room for Privacy Any More When Everyone in SOS Is Watching? An interesting turn comes through counterarguments against overarching institutional surveillance that underscore the uses of technologies to watch the watchers. This involves a practice of counter-surveillance whereby technologies are tools of resistance to go ‘dark’ and are used by political activists in protest situations for both communication and avoiding surveillance. This is not new and has long existed in an increasingly dispersed media landscape (Cinque, Changing Media Landscapes). For example, counter-surveillance video footage has been accessed and made available via live-streaming channels, with commentary in SOS augmenting networking possibilities for niche interest groups or micropublics (Wilson and Serisier, 178). A further example is the Wordpress site Fitwatch, appealing for an end to what the site claims are issues associated with police surveillance (fitwatch.org.uk and endpolicesurveillance.wordpress.com). Users of these sites are called to post police officers’ identity numbers and photographs in an attempt to identify “cops” that might act to “misuse” UK Anti-terrorism legislation against activists during legitimate protests. Others that might be interested in doing their own “monitoring” are invited to reach out to identified personal email addresses or other private (dark) messaging software and application services such as Telegram (freeware and cross-platform). In their work on surveillance, Mann and Ferenbok (18) propose that there is an increase in “complex constructs between power and the practices of seeing, looking, and watching/sensing in a networked culture mediated by mobile/portable/wearable computing devices and technologies”. By way of critical definition, Mann and Ferenbok (25) clarify that “where the viewer is in a position of power over the subject, this is considered surveillance, but where the viewer is in a lower position of power, this is considered sousveillance”. It is the aspect of sousveillance that is empowering to those using dark SOS. One might consider that not all surveillance is “bad” nor institutionalised. It is neither overtly nor formally regulated—as yet. Like most technologies, many of the surveillant technologies are value-neutral until applied towards specific uses, according to Mann and Ferenbok (18). But this is part of the ‘grey area’ for understanding the impact of dark SOS in regard to which actors or what nations are developing tools for surveillance, where access and control lies, and with what effects into the future. 3. Big Brother Watches, So What Are the Alternatives: Whither the Gazing Elite in Dark SOS? By way of conceptual genealogy, consideration of contemporary perceptions of surveillance in a visually networked society (Cinque, Changing Media Landscapes) might be usefully explored through a revisitation of Jeremy Bentham’s panopticon, applied here as a metaphor for contemporary surveillance. Arguably, this is a foundational theoretical model for integrated methods of social control (Foucault, Surveiller et Punir, 192-211), realised in the “panopticon” (prison) in 1787 by Jeremy Bentham (Bentham and Božovič, 29-95) during a period of social reformation aimed at the improvement of the individual. Like the power for social control over the incarcerated in a panopticon, police power, in order that it be effectively exercised, “had to be given the instrument of permanent, exhaustive, omnipresent surveillance, capable of making all visible … like a faceless gaze that transformed the whole social body into a field of perception” (Foucault, Surveiller et Punir, 213–4). In grappling with the impact of SOS for the individual and the collective in post-digital times, we can trace out these early ruminations on the complex documentary organisation through state-controlled apparatuses (such as inspectors and paid observers including “secret agents”) via Foucault (Surveiller et Punir, 214; Subject and Power, 326-7) for comparison to commercial operators like Facebook. Today, artificial intelligence (AI), facial recognition technology (FRT), and closed-circuit television (CCTV) for video surveillance are used for social control of appropriate behaviours. Exemplified by governments and the private sector is the use of combined technologies to maintain social order, from ensuring citizens cross the street only on green lights, to putting rubbish in the correct recycling bin or be publicly shamed, to making cashless payments in stores. The actions see advantages for individual and collective safety, sustainability, and convenience, but also register forms of behaviour and attitudes with predictive capacities. This gives rise to suspicions about a permanent account of individuals’ behaviour over time. Returning to Foucault (Surveiller et Punir, 135), the impact of this finds a dissociation of power from the individual, whereby they become unwittingly impelled into pre-existing social structures, leading to a ‘normalisation’ and acceptance of such systems. If we are talking about the dark, anxiety is key for a Ministry of SOS. Following Foucault again (Subject and Power, 326-7), there is the potential for a crawling, creeping governance that was once distinct but is itself increasingly hidden and growing. A blanket call for some form of ongoing scrutiny of such proliferating powers might be warranted, but with it comes regulation that, while offering certain rights and protections, is not without consequences. For their part, a number of SOS platforms had little to no moderation for explicit content prior to December 2018, and in terms of power, notwithstanding important anxiety connected to arguments that children and the vulnerable need protections from those that would seek to take advantage, this was a crucial aspect of community building and self-expression that resulted in this freedom of expression. In unearthing the extent that individuals are empowered arising from the capacity to post sexual self-images, Tiidenberg ("Bringing Sexy Back") considered that through dark SOS (read here as unregulated) some users could work in opposition to the mainstream consumer culture that provides select and limited representations of bodies and their sexualities. This links directly to Mondin’s exploration of the abundance of queer and feminist pornography on dark SOS as a “counterpolitics of visibility” (288). This work resulted in a reasoned claim that the technological structure of dark SOS created a highly political and affective social space that users valued. What also needs to be underscored is that many users also believed that such a space could not be replicated on other mainstream SOS because of the differences in architecture and social norms. Cho (47) worked with this theory to claim that dark SOS are modern-day examples in a history of queer individuals having to rely on “underground economies of expression and relation”. Discussions such as these complicate what dark SOS might now become in the face of ‘adult’ content moderation and emerging tracking technologies to close sites or locate individuals that transgress social norms. Further, broader questions are raised about how content moderation fits in with the public space conceptualisations of SOS more generally. Increasingly, “there is an app for that” where being able to identify the poster of an image or an author of an unknown text is seen as crucial. While there is presently no standard approach, models for combining instance-based and profile-based features such as SVM for determining authorship attribution are in development, with the result that potentially far less content will remain hidden in the future (Bacciu et al.). 4. There’s Nothing New under the Sun (Ecclesiastes 1:9) For some, “[the] high hopes regarding the positive impact of the Internet and digital participation in civic society have faded” (Schwarzenegger, 99). My participant observation over some years in various SOS, however, finds that critical concern has always existed. Views move along the spectrum of thinking from deep scepticisms (Stoll, Silicon Snake Oil) to wondrous techo-utopian promises (Negroponte, Being Digital). Indeed, concerns about the (then) new technologies of wireless broadcasting can be compared with today’s anxiety over the possible effects of the internet and SOS. Inglis (7) recalls, here, too, were fears that humanity was tampering with some dangerous force; might wireless wave be causing thunderstorms, droughts, floods? Sterility or strokes? Such anxieties soon evaporated; but a sense of mystery might stay longer with evangelists for broadcasting than with a laity who soon took wireless for granted and settled down to enjoy the products of a process they need not understand. As the analogy above makes clear, just as audiences came to use ‘the wireless’ and later the internet regularly, it is reasonable to argue that dark SOS will also gain widespread understanding and find greater acceptance. Dark social spaces are simply the recent development of internet connectivity and communication more broadly. The dark SOS afford choice to be connected beyond mainstream offerings, which some users avoid for their perceived manipulation of content and user both. As part of the wider array of dark web services, the resilience of dark social spaces is reinforced by the proliferation of users as opposed to decentralised replication. Virtual Private Networks (VPNs) can be used for anonymity in parallel to TOR access, but they guarantee only anonymity to the client. A VPN cannot guarantee anonymity to the server or the internet service provider (ISP). While users may use pseudonyms rather than actual names as seen on Facebook and other SOS, users continue to take to the virtual spaces they inhabit their off-line, ‘real’ foibles, problems, and idiosyncrasies (Chenault). To varying degrees, however, people also take their best intentions to their interactions in the dark. The hyper-efficient tools now deployed can intensify this, which is the great advantage attracting some users. In balance, however, in regard to online information access and dissemination, critical examination of what is in the public’s interest, and whether content should be regulated or controlled versus allowing a free flow of information where users self-regulate their online behaviour, is fraught. O’Loughlin (604) was one of the first to claim that there will be voluntary loss through negative liberty or freedom from (freedom from unwanted information or influence) and an increase in positive liberty or freedom to (freedom to read or say anything); hence, freedom from surveillance and interference is a kind of negative liberty, consistent with both libertarianism and liberalism. Conclusion The early adopters of initial iterations of SOS were hopeful and liberal (utopian) in their beliefs about universality and ‘free’ spaces of open communication between like-minded others. This was a way of virtual networking using a visual motivation (led by images, text, and sounds) for consequent interaction with others (Cinque, Visual Networking). The structural transformation of the public sphere in a Habermasian sense—and now found in SOS and their darker, hidden or closed social spaces that might ensure a counterbalance to the power of those with influence—towards all having equal access to platforms for presenting their views, and doing so respectfully, is as ever problematised. Broadly, this is no more so, however, than for mainstream SOS or for communicating in the world. References Bacciu, Andrea, Massimo La Morgia, Alessandro Mei, Eugenio Nerio Nemmi, Valerio Neri, and Julinda Stefa. “Cross-Domain Authorship Attribution Combining Instance Based and Profile-Based Features.” CLEF (Working Notes). Lugano, Switzerland, 9-12 Sep. 2019. Bentham, Jeremy, and Miran Božovič. The Panopticon Writings. London: Verso Trade, 1995. Biddle, Peter, et al. “The Darknet and the Future of Content Distribution.” Proceedings of the 2002 ACM Workshop on Digital Rights Management. Vol. 6. Washington DC, 2002. Bruns, Axel. Blogs, Wikipedia, Second Life, and Beyond: From Production to Produsage. New York: Peter Lang, 2008. Chenault, Brittney G. “Developing Personal and Emotional Relationships via Computer-Mediated Communication.” CMC Magazine 5.5 (1998). 1 May 2020 <http://www.december.com/cmc/mag/1998/may/chenault.html>. Cho, Alexander. “Queer Reverb: Tumblr, Affect, Time.” Networked Affect. Eds. K. Hillis, S. Paasonen, and M. Petit. Cambridge, Mass.: MIT Press, 2015: 43-58. Cinque, Toija. Changing Media Landscapes: Visual Networking. London: Oxford UP, 2015. ———. “Visual Networking: Australia's Media Landscape.” Global Media Journal: Australian Edition 6.1 (2012): 1-8. Cinque, Toija, and Adam Brown. “Educating Generation Next: Screen Media Use, Digital Competencies, and Tertiary Education.” Digital Culture & Education 7.1 (2015). Draper, Nora A., and Joseph Turow. “The Corporate Cultivation of Digital Resignation.” New Media & Society 21.8 (2019): 1824-1839. Fellous, Jean-Marc, and Michael A. Arbib, eds. Who Needs Emotions? The Brain Meets the Robot. New York: Oxford UP, 2005. Fernández-Caramés, Tiago M. “From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things.” IEEE Internet of Things Journal 7.7 (2019): 6457-6480. Foucault, Michel. Surveiller et Punir: Naissance de la Prison [Discipline and Punish—The Birth of The Prison]. Trans. Alan Sheridan. New York: Random House, 1977. Foucault, Michel. “The Subject and Power.” Michel Foucault: Power, the Essential Works of Michel Foucault 1954–1984. Vol. 3. Trans. R. Hurley and others. Ed. J.D. Faubion. London: Penguin, 2001. Gehl, Robert W. Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P. Cambridge, Massachusetts: MIT Press, 2018. Gehl, Robert, and Fenwick McKelvey. “Bugging Out: Darknets as Parasites of Large-Scale Media Objects.” Media, Culture & Society 41.2 (2019): 219-235. Gillespie, Tarleton. Custodians of the Internet: Platforms, Content Moderation, and the Hidden Decisions That Shape Social Media. London: Yale UP, 2018. Habermas, Jürgen. The Structural Transformation of the Public Sphere: An Inquiry into a Category of Bourgeois Society. Trans. Thomas Burger with the assistance of Frederick Lawrence. Cambridge, Mass.: MIT Press, 1989. Inglis, Ken S. This Is the ABC: The Australian Broadcasting Commission 1932–1983. Melbourne: Melbourne UP, 1983. Iron Maiden. “Fear of the Dark.” London: EMI, 1992. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York UP, 2006. Lasica, J. D. Darknet: Hollywood’s War against the Digital Generation. New York: John Wiley and Sons, 2005. Mahmood, Mimrah. “Australia's Evolving Media Landscape.” 13 Apr. 2021 <https://www.meltwater.com/en/resources/australias-evolving-media-landscape>. Mann, Steve, and Joseph Ferenbok. “New Media and the Power Politics of Sousveillance in a Surveillance-Dominated World.” Surveillance & Society 11.1/2 (2013): 18-34. McDonald, Alexander J. “Cortical Pathways to the Mammalian Amygdala.” Progress in Neurobiology 55.3 (1998): 257-332. McStay, Andrew. Emotional AI: The Rise of Empathic Media. London: Sage, 2018. Mondin, Alessandra. “‘Tumblr Mostly, Great Empowering Images’: Blogging, Reblogging and Scrolling Feminist, Queer and BDSM Desires.” Journal of Gender Studies 26.3 (2017): 282-292. Neff, Gina, and Dawn Nafus. Self-Tracking. Cambridge, Mass.: MIT Press, 2016. Negroponte, Nicholas. Being Digital. New York: Alfred A. Knopf, 1995. Nissenbaum, Helen, and Heather Patterson. “Biosensing in Context: Health Privacy in a Connected World.” Quantified: Biosensing Technologies in Everyday Life. Ed. Dawn Nafus. 2016. 68-79. O’Loughlin, Ben. “The Political Implications of Digital Innovations.” Information, Communication and Society 4.4 (2001): 595–614. Quandt, Thorsten. “Dark Participation.” Media and Communication 6.4 (2018): 36-48. Royal Society for Public Health (UK) and the Young Health Movement. “#Statusofmind.” 2017. 2 Apr. 2021 <https://www.rsph.org.uk/our-work/campaigns/status-of-mind.html>. Statista. “Number of IoT devices 2015-2025.” 27 Nov. 2020 <https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/>. Schwarzenegger, Christian. “Communities of Darkness? Users and Uses of Anti-System Alternative Media between Audience and Community.” Media and Communication 9.1 (2021): 99-109. Stoll, Clifford. Silicon Snake Oil: Second Thoughts on the Information Highway. Anchor, 1995. Tiidenberg, Katrin. “Bringing Sexy Back: Reclaiming the Body Aesthetic via Self-Shooting.” Cyberpsychology: Journal of Psychosocial Research on Cyberspace 8.1 (2014). The Great Hack. Dirs. Karim Amer, Jehane Noujaim. Netflix, 2019. The Social Dilemma. Dir. Jeff Orlowski. Netflix, 2020. Turkle, Sherry. The Second Self: Computers and the Human Spirit. Cambridge, Mass.: MIT Press, 2005. Turkle, Sherry. Alone Together: Why We Expect More from Technology and Less from Each Other. UK: Hachette, 2017. Turow, Joseph, and Andrea L. Kavanaugh, eds. The Wired Homestead: An MIT Press Sourcebook on the Internet and the Family. Cambridge, Mass.: MIT Press, 2003. Von Nordheim, Gerret, and Katharina Kleinen-von Königslöw. “Uninvited Dinner Guests: A Theoretical Perspective on the Antagonists of Journalism Based on Serres’ Parasite.” Media and Communication 9.1 (2021): 88-98. Williams, Chris K. “Configuring Enterprise Public Key Infrastructures to Permit Integrated Deployment of Signature, Encryption and Access Control Systems.” MILCOM 2005-2005 IEEE Military Communications Conference. IEEE, 2005. Wilson, Dean, and Tanya Serisier. “Video Activism and the Ambiguities of Counter-Surveillance.” Surveillance & Society 8.2 (2010): 166-180.
APA, Harvard, Vancouver, ISO, and other styles
21

Hawley, Erin. "Re-imagining Horror in Children's Animated Film." M/C Journal 18, no. 6 (March 7, 2016). http://dx.doi.org/10.5204/mcj.1033.

Full text
Abstract:
Introduction It is very common for children’s films to adapt, rework, or otherwise re-imagine existing cultural material. Such re-imaginings are potential candidates for fidelity criticism: a mode of analysis whereby an adaptation is judged according to its degree of faithfulness to the source text. Indeed, it is interesting that while fidelity criticism is now considered outdated and problematic by adaptation theorists (see Stam; Leitch; and Whelehan) the issue of fidelity has tended to linger in the discussions that form around material adapted for children. In particular, it is often assumed that the re-imagining of cultural material for children will involve a process of “dumbing down” that strips the original text of its complexity so that it is more easily consumed by young audiences (see Semenza; Kellogg; Hastings; and Napolitano). This is especially the case when children’s films draw from texts—or genres—that are specifically associated with an adult readership. This paper explores such an interplay between children’s and adult’s culture with reference to the re-imagining of the horror genre in children’s animated film. Recent years have seen an inrush of animated films that play with horror tropes, conventions, and characters. These include Frankenweenie (2012), ParaNorman (2012), Hotel Transylvania (2012), Igor (2008), Monsters Inc. (2001), Monster House (2006), and Monsters vs Aliens (2009). Often diminishingly referred to as “kiddie horror” or “goth lite”, this re-imagining of the horror genre is connected to broader shifts in children’s culture, literature, and media. Anna Jackson, Karen Coats, and Roderick McGillis, for instance, have written about the mainstreaming of the Gothic in children’s literature after centuries of “suppression” (2); a glance at the titles in a children’s book store, they tell us, may suggest that “fear or the pretence of fear has become a dominant mode of enjoyment in literature for young people” (1). At the same time, as Lisa Hopkins has pointed out, media products with dark, supernatural, or Gothic elements are increasingly being marketed to children, either directly or through product tie-ins such as toys or branded food items (116-17). The re-imagining of horror for children demands our attention for a number of reasons. First, it raises questions about the commercialisation and repackaging of material that has traditionally been considered “high culture”, particularly when the films in question are seen to pilfer from sites of the literary Gothic such as Mary Shelley’s Frankenstein (1818) or Bram Stoker’s Dracula (1897). The classic horror films of the 1930s such as James Whale’s Frankenstein (1931) also have their own canonical status within the genre, and are objects of reverence for horror fans and film scholars alike. Moreover, aficionados of the genre have been known to object vehemently to any perceived simplification or dumbing down of horror conventions in order to address a non-horror audience. As Lisa Bode has demonstrated, such objections were articulated in many reviews of the film Twilight, in which the repackaging and simplifying of vampire mythology was seen to pander to a female, teenage or “tween” audience (710-11). Second, the re-imagining of horror for children raises questions about whether the genre is an appropriate source of pleasure and entertainment for young audiences. Horror has traditionally been understood as problematic and damaging even for adult viewers: Mark Jancovich, for instance, writes of the long-standing assumption that horror “is moronic, sick and worrying; that any person who derives pleasure from the genre is moronic, sick and potentially dangerous” and that both the genre and its fans are “deviant” (18). Consequently, discussions about the relationship between children and horror have tended to emphasise regulation, restriction, censorship, effect, and “the dangers of imitative violence” (Buckingham 95). As Paul Wells observes, there is a “consistent concern […] that horror films are harmful to children, but clearly these films are not made for children, and the responsibility for who views them lies with adult authority figures who determine how and when horror films are seen” (24). Previous academic work on the child as horror viewer has tended to focus on children as consumers of horror material designed for adults. Joanne Cantor’s extensive work in this area has indicated that fright reactions to horror media are commonly reported and can be long-lived (Cantor; and Cantor and Oliver). Elsewhere, the work of Sarah Smith (45-76) and David Buckingham (95-138) has indicated that children, like adults, can gain certain pleasures from the genre; it has also indicated that children can be quite media savvy when viewing horror, and can operate effectively as self-censors. However, little work has yet been conducted on whether (and how) the horror genre might be transformed for child viewers. With this in mind, I explore here the re-imagining of horror in two children’s animated films: Frankenweenie and ParaNorman. I will consider the way horror tropes, narratives, conventions, and characters have been reshaped in each film with a child’s perspective in mind. This, I argue, does not make them simplified texts or unsuitable objects of pleasure for adults; instead, the films demonstrate that the act of re-imagining horror for children calls into question long-held assumptions about pleasure, taste, and the boundaries between “adult” and “child”. Frankenweenie and ParaNorman: Rewriting the Myth of Childhood Innocence Frankenweenie is a stop-motion animation written by John August and directed by Tim Burton, based on a live-action short film made by Burton in 1984. As its name suggests, Frankenweenie re-imagines Shelley’s Frankenstein by transforming the relationship between creator and monster into that between child and pet. Burton’s Victor Frankenstein is a young boy living in a small American town, a creative loner who enjoys making monster movies. When his beloved dog Sparky is killed in a car accident, young Victor—like his predecessor in Shelley’s novel—is driven by the awfulness of this encounter with death to discover the “mysteries of creation” (Shelley 38): he digs up Sparky’s body, drags the corpse back to the family home, and reanimates him in the attic. This coming-to-life sequence is both a re-imagining of the famous animation scene in Whale’s film Frankenstein and a tender expression of the love between a boy and his dog. The re-imagined creation scene therefore becomes a site of negotiation between adult and child audiences: adult viewers familiar with Whale’s adaptation and its sense of electric spectacle are invited to rethink this scene from a child’s perspective, while child viewers are given access to a key moment from the horror canon. While this blurring of the lines between child and adult is a common theme in Burton’s work—many of his films exist in a liminal space where a certain childlike sensibility mingles with a more adult-centric dark humour—Frankenweenie is unique in that it actively re-imagines as “childlike” a film and/or work of literature that was previously populated by adult characters and associated with adult audiences. ParaNorman is the second major film from the animation studio Laika Entertainment. Following in the footsteps of the earlier Laika film Coraline (2009)—and paving the way for the studio’s 2014 release, Boxtrolls—ParaNorman features stop-motion animation, twisted storylines, and the exploration of dark themes and spaces by child characters. The film tells the story of Norman, an eleven year old boy who can see and communicate with the dead. This gift marks him as an outcast in the small town of Blithe Hollow, which has built its identity on the historic trial and hanging of an “evil” child witch. Norman must grapple with the town’s troubled past and calm the spirit of the vengeful witch; along the way, he and an odd assortment of children battle zombies and townsfolk alike, the latter appearing more monstrous than the former as the film progresses. Although ParaNorman does not position itself as an adaptation of a specific horror text, as does Frankenweenie, it shares with Burton’s film a playful intertextuality whereby references are constantly made to iconic films in the horror genre (including Halloween [1978], Friday the 13th [1980], and Day of the Dead [1985]). Both films were released in 2012 to critical acclaim. Interestingly, though, film critics seemed to disagree over who these texts were actually “for.” Some reviewers described the films as children’s texts, and warned that adults would likely find them “tame and compromised” (Scott), “toothless” (McCarthy) or “sentimental” (Bradshaw). These comments carry connotations of simplification: the suggestion is that the conventions and tropes of the horror genre have been weakened (or even contaminated) by the association with child audiences, and that consequently adults cannot (or should not) take pleasure in the films. Other reviewers of ParaNorman and Frankenweenie suggested that adults were more likely to enjoy the films than children (O’Connell; Berardinelli; and Wolgamott). Often, this suggestion came together with a warning about scary or dark content: the films were deemed to be too frightening for young children, and this exclusion of the child audience allowed the reviewer to acknowledge his or her own enjoyment of and investment in the film (and the potential enjoyment of other adult viewers). Lou Lumenick, for instance, peppers his review of ParaNorman with language that indicates his own pleasure (“probably the year’s most visually dazzling movie so far”; the climax is “too good to spoil”; the humour is “deliciously twisted”), while warning that children as old as eight should not be taken to see the film. Similarly, Christy Lemire warns that certain elements of Frankenweenie are scary and that “this is not really a movie for little kids”; she goes on to add that this scariness “is precisely what makes ‘Frankenweenie’ such a consistent wonder to watch for the rest of us” (emphasis added). In both these cases a line is drawn between child and adult viewers, and arguably it is the film’s straying into the illicit area of horror from the confines of a children’s text that renders it an object of pleasure for the adult viewer. The thrill of being scared is also interpreted here as a specifically adult pleasure. This need on the part of critics to establish boundaries between child and adult viewerships is interesting given that the films themselves strive to incorporate children (as characters and as viewers) into the horror space. In particular, both films work hard to dismantle the myths of childhood innocence—and associated ideas about pleasure and taste—that have previously seen children excluded from the culture of the horror film. Both the young protagonists, for instance, are depicted as media-literate consumers or makers of horror material. Victor is initially seen exhibiting one of his home-made monster movies to his bemused parents, and we first encounter Norman watching a zombie film with his (dead) grandmother; clearly a consummate horror viewer, Norman decodes the film for Grandma, explaining that the zombie is eating the woman’s head because, “that’s what they do.” In this way, the myth of childhood innocence is rewritten: the child’s mature engagement with the horror genre gives him agency, which is linked to his active position in the narrative (both Norman and Victor literally save their towns from destruction); the parents, meanwhile, are reduced to babbling stereotypes who worry that their sons will “turn out weird” (Frankenweenie) or wonder why they “can’t be like other kids” (ParaNorman). The films also rewrite the myth of childhood innocence by depicting Victor and Norman as children with dark, difficult lives. Importantly, each boy has encountered death and, for each, his parents have failed to effectively guide him through the experience. In Frankenweenie Victor is grief-stricken when Sparky dies, yet his parents can offer little more than platitudes to quell the pain of loss. “When you lose someone you love they never really leave you,” Victor’s mother intones, “they just move into a special place in your heart,” to which Victor replies “I don’t want him in my heart—I want him here with me!” The death of Norman’s grandmother is similarly dismissed by his mother in ParaNorman. “I know you and Grandma were very close,” she says, “but we all have to move on. Grandma’s in a better place now.” Norman objects: “No she’s not, she’s in the living room!” In both scenes, the literal-minded but intelligent child seems to understand death, loss, and grief while the parents are unable to speak about these “mature” concepts in a meaningful way. The films are also reminders that a child’s first experience of death can come very young, and often occurs via the loss of an elderly relative or a beloved pet. Death, Play, and the Monster In both films, therefore, the audience is invited to think about death. Consequently, there is a sense in each film that while the violent and sexual content of most horror texts has been stripped away, the dark centre of the horror genre remains. As Paul Wells reminds us, horror “is predominantly concerned with the fear of death, the multiple ways in which it can occur, and the untimely nature of its occurrence” (10). Certainly, the horror texts which Frankenweenie and ParaNorman re-imagine are specifically concerned with death and mortality. The various adaptations of Frankenstein that are referenced in Frankenweenie and the zombie films to which ParaNorman pays homage all deploy “the monster” as a figure who defies easy categorisation as living or dead. The othering of this figure in the traditional horror narrative allows him/her/it to both subvert and confirm cultural ideas about life, death, and human status: for monsters, as Elaine Graham notes, have long been deployed in popular culture as figures who “mark the fault-lines” and also “signal the fragility” of boundary structures, including the boundary between human and not human, and that between life and death (12). Frankenweenie’s Sparky, as an iteration of the Frankenstein monster, clearly fits this description: he is neither living nor dead, and his monstrosity emerges not from any act of violence or from physical deformity (he remains, throughout the film, a cute and lovable dog, albeit with bolts fixed to his neck) but from his boundary-crossing status. However, while most versions of the Frankenstein monster are deliberately positioned to confront ideas about the human/machine boundary and to perform notions of the posthuman, such concerns are sidelined in Frankenweenie. Instead, the emphasis is on concerns that are likely to resonate with children: Sparky is a reminder of the human preoccupation with death, loss, and the question of why (or whether, or when) we should abide by the laws of nature. Arguably, this indicates a re-imagining of the Frankenstein tale not only for child audiences but from a child’s perspective. In ParaNorman, similarly, the zombie–often read as an articulation of adult anxieties about war, apocalypse, terrorism, and the deterioration of social order (Platts 551-55)—is re-used and re-imagined in a childlike way. From a child’s perspective, the zombie may represent the horrific truth of mortality and/or the troublesome desire to live forever that emerges once this truth has been confronted. More specifically, the notion of dealing meaningfully with the past and of honouring rather than silencing the dead is a strong thematic undercurrent in ParaNorman, and in this sense the zombies are important figures who dramatise the connections between past and present. While this past/present connection is explored on many levels in ParaNorman—including the level of a town grappling with its dark history—it is Norman and his grandmother who take centre stage: the boundary-crossing figure of the zombie is re-realised here in terms of a negotiation with a presence that is now absent (the elderly relative who has died but is still remembered). Indeed, the zombies in this film are an implicit rebuke to Norman’s mother and her command that Norman “move on” after his grandmother’s death. The dead are still present, this film playfully reminds us, and therefore “moving on” is an overly simplistic and somewhat disrespectful response (especially when imposed on children by adult authority figures.) If the horror narrative is built around the notion that “normality is threatened by the Monster”, as Robin Wood has famously suggested, ParaNorman and Frankenweenie re-imagine this narrative of subversion from a child’s perspective (31). Both films open up a space within which the child is permitted to negotiate with the destabilising figure of the monster; the normality that is “threatened” here is the adult notion of the finality of death and, relatedly, the assumption that death is not a suitable subject for children to think or talk about. Breaking down such understandings, Frankenweenie and ParaNorman strive not so much to play with death (a phrase that implies a certain callousness, a problematic disregard for human life) but to explore death through the darkness of play. This is beautifully imaged in a scene from ParaNorman in which Norman and his friend Neil play with the ghost of Neil’s recently deceased dog. “We’re going to play with a dead dog in the garden,” Neil enthusiastically announces to his brother, “and we’re not even going to have to dig him up first!” Somewhat similarly, film critic Richard Corliss notes in his review of Frankenweenie that the film’s “message to the young” is that “children should play with dead things.” Through this intersection between “death” and “play”, both films propose a particularly child-like (although not necessarily child-ish) way of negotiating horror’s dark territory. Conclusion Animated film has always been an ambiguous space in terms of age, pleasure, and viewership. As film critic Margaret Pomeranz has observed, “there is this perception that if it’s an animated film then you can take the little littlies” (Pomeranz and Stratton). Animation itself is often a signifier of safety, fun, nostalgia, and childishness; it is a means of addressing families and young audiences. Yet at the same time, the fantastic and transformative aspects of animation can be powerful tools for telling stories that are dark, surprising, or somehow subversive. It is therefore interesting that the trend towards re-imagining horror for children that this paper has identified is unfolding within the animated space. It is beyond the scope of this paper to fully consider what animation as a medium brings to this re-imagining process. However, it is worth noting that the distinctive stop-motion style used in both films works to position them as alternatives to Disney products (for although Frankenweenie was released under the Disney banner, it is visually distinct from most of Disney’s animated ventures). The majority of Disney films are adaptations or re-imaginings of some sort, yet these re-imaginings look to fairytales or children’s literature for their source material. In contrast, as this paper has demonstrated, Frankenweenie and ParaNorman open up a space for boundary play: they give children access to tropes, narratives, and characters that are specifically associated with adult viewers, and they invite adults to see these tropes, narratives, and characters from a child’s perspective. Ultimately, it is difficult to determine the success of this re-imagining process: what, indeed, does a successful re-imagining of horror for children look like, and who might be permitted to take pleasure from it? Arguably, ParaNorman and Frankenweenie have succeeded in reshaping the genre without simplifying it, deploying tropes and characters from classic horror texts in a meaningful way within the complex space of children’s animated film. References Berardinelli, James. “Frankenweenie (Review).” Reelviews, 4 Oct. 2012. 6 Aug. 2014 ‹http://www.reelviews.net/php_review_template.php?identifier=2530›. Bode, Lisa. “Transitional Tastes: Teen Girls and Genre in the Critical Reception of Twilight.” Continuum: Journal of Media & Cultural Studies 24.5 (2010): 707-19. Bradshaw, Peter. “Frankenweenie: First Look Review.” The Guardian, 11 Oct. 2012. 6 Aug. 2014 ‹http://www.theguardian.com/film/2012/oct/10/frankenweenie-review-london-film-festival-tim-burton›. Buckingham, David. Moving Images: Understanding Children’s Emotional Responses to Television. Manchester and New York: Manchester University Press, 1996. Cantor, Joanne. “‘I’ll Never Have a Clown in My House’ – Why Movie Horror Lives On.” Poetics Today 25.2 (2004): 283-304. Cantor, Joanne, and Mary Beth Oliver. “Developmental Differences in Responses to Horror”. The Horror Film. Ed. Stephen Prince. New Brunswick, NJ: Rutgers UP, 2004. 224-41. Corliss, Richard. “‘Frankenweenie’ Movie Review: A Re-Animated Delight”. Time, 4 Oct. 2012. 6 Aug. 2014 ‹http://entertainment.time.com/2012/10/04/tim-burtons-frankenweenie-a-re-animated-delight/›. Frankenweenie. Directed by Tim Burton. Walt Disney Pictures, 2012. Graham, Elaine L. Representations of the Post/Human: Monsters, Aliens and Others in Popular Culture. Manchester: Manchester UP, 2002. Hastings, A. Waller. “Moral Simplification in Disney’s The Little Mermaid.” The Lion and the Unicorn 17.1 (1993): 83-92. Hopkins, Lisa. Screening the Gothic. Austin: U of Texas P, 2005. Jackson, Anna, Karen Coats, and Roderick McGillis. “Introduction.” The Gothic in Children’s Literature: Haunting the Borders. Eds. Anna Jackson, Karen Coats, and Roderick McGillis. New York: Routledge, 2008. 1-14. Jancovich, Mark. “General Introduction.” Horror: The Film Reader. Ed. Mark Jancovich. London: Routledge, 2002. 1-19. Kellogg, Judith L. “The Dynamics of Dumbing: The Case of Merlin.” The Lion and the Unicorn 17.1 (1993): 57-72. Leitch, Thomas. “Twelve Fallacies in Contemporary Adaptation Theory.” Criticism 45.2 (2003): 149-71. Lemire, Christy. “‘Frankenweenie’ Review: Tim Burton Reminds Us Why We Love Him.” The Huffington Post, 2 Oct. 2012. 6 Aug. 2014 ‹http://www.huffingtonpost.com/2012/10/03/frankenweenie-review-tim-burton_n_1935142.html›. Lumenick, Lou. “So Good, It’s Scary (ParaNorman Review)”. New York Post, 17 Aug. 2012. 3 Jun. 2015 ‹http://nypost.com/2012/08/17/so-good-its-scary/›. McCarthy, Todd. “Frankenweenie: Film Review.” The Hollywood Reporter, 20 Sep. 2012. 6 Aug. 2014 ‹http://www.hollywoodreporter.com/movie/frankenweenie/review/372720›. Napolitano, Marc. “Disneyfying Dickens: Oliver & Company and The Muppet Christmas Carol as Dickensian Musicals.” Studies in Popular Culture 32.1 (2009): 79-102. O’Connell, Sean. “Middle School and Zombies? Awwwkward!” Washington Post, 17 Aug. 2012. 3 Jun. 2015 ‹http://www.washingtonpost.com/gog/movies/paranorman,1208210.html›. ParaNorman. Directed by Chris Butler and Sam Fell. Focus Features/Laika Entertainment, 2012. Platts, Todd K. “Locating Zombies in the Sociology of Popular Culture”. Sociology Compass 7 (2013): 547-60. Pomeranz, Margaret, and David Stratton. “Igor (Review).” At the Movies, 14 Dec. 2008. 6 Aug. 2014 ‹http://www.abc.net.au/atthemovies/txt/s2426109.htm›. Scott, A.O. “It’s Aliiiive! And Wagging Its Tail: ‘Frankenweenie’, Tim Burton’s Homage to Horror Classics.” New York Times, 4 Oct. 2012. 6 Aug. 2014 ‹http://www.nytimes.com/2012/10/05/movies/frankenweenie-tim-burtons-homage-to-horror-classics.html›. Semenza, Gregory M. Colón. “Teens, Shakespeare, and the Dumbing Down Cliché: The Case of The Animated Tales.” Shakespeare Bulletin 26.2 (2008): 37-68. Shelley, Mary. Frankenstein, or, The Modern Prometheus. Hertfordshire: Wordsworth Editions, 1993 [1818]. Smith, Sarah J. Children, Cinema and Censorship: From Dracula to the Dead End Kids. London: I.B. Tauris, 2005. Stam, Robert. “Introduction: The Theory and Practice of Adaptation.” Literature and Film: A Guide to the Theory and Practice of Film Adaptation. Eds. Robert Stam and Alessandra Raengo. Oxford: Blackwell, 2005. 1-52. Wells, Paul. The Horror Genre: From Beelzebub to Blair Witch. London: Wallflower, 2000. Whelehan, Imelda. “Adaptations: the Contemporary Dilemmas.” Adaptations: From Text to Screen, Screen to Text. Eds. Deborah Cartmell and Imelda Whelehan. London: Routledge, 1999. 3-19. Wolgamott, L. Kent. “‘Frankenweenie’ A Box-Office Bomb, But Superior Film.” Lincoln Journal Star, 10 Oct. 2012. 18 Aug. 2014 ‹http://journalstar.com/entertainment/movies/l-kent-wolgamott-frankenweenie-a-box-office-bomb-but-superior/article_42409e82-89b9-5794-8082-7b5de3d469e2.html›. Wood, Robin. “The American Nightmare: Horror in the 70s.” Horror: The Film Reader. Ed. Mark Jancovich. London: Routledge, 2002. 25-32.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography