Academic literature on the topic 'Lieutenant jones'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Lieutenant jones.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Lieutenant jones"

1

Steinhart, Margot M. "Rochambeau: Washington’s Ideal Lieutenant by Jini Jones Vail." French Review 86, no. 6 (2013): 1282–83. http://dx.doi.org/10.1353/tfr.2013.0161.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Michael Todd Landis. "Old Buck's Lieutenant: Glancy Jones, James Buchanan, and the Antebellum Northern Democracy." Pennsylvania Magazine of History and Biography 140, no. 2 (2016): 183. http://dx.doi.org/10.5215/pennmaghistbio.140.2.0183.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Walker, Carole, and Jane L. Littlewood. "A Second Moses in Bonnet and Shawl: Caroline Chisholm, 1808–1877." Recusant History 22, no. 3 (May 1995): 409–23. http://dx.doi.org/10.1017/s0034193200001989.

Full text
Abstract:
Caroline Chisholm was a Victorian philanthropist designated by the Australian Encyclopaedia as ‘the greatest of women pioneers in the history of Australia’. She was born in Northampton in 1808, the daughter of William Jones, hog-jobber of some substance. She married Archibald Chisholm in 1830, a lieutenant in the East India Company Army, ten years her senior, on the understanding that she be allowed to undertake philanthropic works. It is assumed she converted to her husband's Roman Catholic faith either just before or after the marriage. It was in Madras, where her husband was based, that her philanthropic endeavours began and she founded a ‘school of industry for the daughters of European soldiers’. The school educated the sadly-neglected girls in general education and domestic duties.
APA, Harvard, Vancouver, ISO, and other styles
4

Boldrer, Francesca. "From humanitas to amicitia." Humanitas, no. 77 (June 28, 2021): 87–109. http://dx.doi.org/10.14195/2183-1718_77_5.

Full text
Abstract:
The article aims to investigate Cicero’s epistle Fam. 15.21 (46 BC), which is addressed to Trebonius, a former colleague of him and now a lieutenant of Caesar, and deals with the oratory of Calvus, an Atticist (and Catullus’ best friend), to whom Cicero had given praise and rhetorical advice in a previous letter. Cicero shows affection to Trebonius, and care to Calvus, although they weren’t quite friends of him and belonged to different parties, both in politics and oratory. An examination of the text from the point of view of form and content shows here a double example of humanitas both as benevolence (philantrophia) and as an intellectual and didactic approach (paideia). It seems the prelude to a true friendship (which is also the theme of a future dialogue of Cicero), maybe with further effects (Trebonius will participate in the conspiracy against Caesar). Moreover, several allusions and some playful situations related to the letter (such as the gift of a book containing Cicero’s jokes) recalls Catullus’ poems to his friends (above all to Calvus), confirming the idea of ​​a literary contact between the poeta novus and the orator. The result is an intertwining of personal and cultural relationships between personalities who are traditionally believed to be on opposite sides, but are closer than one might think in Cicero’s correspondence.
APA, Harvard, Vancouver, ISO, and other styles
5

Meacham, Standish. "Looking for the Left - Labour People: Leaders and Lieutenants: Hardie to Kinnock. By Kenneth O. Morgan. Oxford: Oxford University Press, 1987. Pp. xii + 370. - Aneurin Bevan and the Mirage of British Socialism. By John Campbell. New York and London: W. W. Norton & Co., 1987. Pp. xvii + 430. - R. H. Tawney. By Anthony Wright. Manchester: Manchester University Press, 1987. Pp. ix + 176. - The British Marxist Historians. By Harvey J. Kaye. Oxford: Polity Press, 1984. Pp. xii + 316. - The British Labour Movement and Film, 1918–1939. By Stephen G. Jones. London and New York: Routledge & Kegan Paul, 1987. Pp. ix + 248. - The Dynamics of Working-Class Politics: The Labour Movement in Preston, 1880–1940. By Michael Savage. Cambridge and New York: Cambridge University Press, 1987. Pp. xii + 280." Journal of British Studies 28, no. 2 (April 1989): 191–99. http://dx.doi.org/10.1086/385934.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Vatchenko, Svetlana A. "Fielding�s �Amelia�. Thematic Plurality of the Novel." Alfred Nobel University Journal of Philology 1, no. 21 (2021). http://dx.doi.org/10.32342/2523-4463-2021-1-21-5.

Full text
Abstract:
Article deals with the attempt to describe the semantic �apacity of Fielding`s last novel �Amelia� that became the notable event in writer�s biography and remains the object of discussion among the researches starting from its first publication. Fielding was at the height of his fame as the magistrate for Westminster and Middlesex and as a celebrated novelist who was an opponent of Samuel Richardson. His novel �Tom Jones� (1749) despite some harsh criticism had been generally acclaimed. According to the title �Amelia� obviously differs from Fielding�s early novels: �Joseph Andrews�, �Jonathan Wild� and �Tom Jones�. With his central heroine Fielding has entered the territory associated with Richardson, whose distressed female characters, Pamela and Clarissa, had captured the attention of the reading public. It is well-known that Amelia Booth was modelled on Fielding�s first wife, Charlotte Craddock, while his hero, Captain Booth, was inspired be the author himself as well as his father, Lieutenant General Edmund Fielding. Trying to defend �Amelia� Fielding in the Covent-Garden Journal insists that he has followed the rules for the epic of Homer and Virgil, saying that the �learned reader will see that the latter was the noble model�. Like the �Aeneid�, �Amelia� consists of twelve books, and the opening section of the novel, set in Newgate, is a parallel to Virgil. The author being in the heyday of his glory brought before the public his new, experimental text, giving up the form of comic epic poem in prose that was immortalized in �The History of Tom Jones, a Foundling�. Denying the technique that was deeply rooted in the English prose due to the narrative skill and the omniscient author (who acted as theorist of the novel), theatrically performing the game with the reader through metanarrative, Fielding in �Amelia� prefers restrained position of the narrator using the recourses of dramatical art. Choosing the plain plot about the everyday difficulties, poverty and humiliations of a young married couple that is peculiar for European sentimentalism, Fielding � due to the thematic tightness of the novel, its allusive fullness, the ambiguity of characters, the poetics of concealment � the narrative about the life of a libertine in a family (W. Scott) presents not so much as the moral lesson for the protagonist that is guided by passions but as ethical transformation that comes with the experience of the �art of life�. In recent decades �Amelia� has been the subject of many investigations, its experimental qualities made it attractive to critics of both the development of the 18th century novel and Fielding�s career. Modern readers however, have shown less interest for the work. Critical hostility to �Amelia� often seems to imply disappointment that it is not like �Tom Jones�. �Amelia� is often called a sequel to his masterpiece �Tom Jones� (Walter Scott) but Fielding adopted a new form of verisimilitude and changed his narrative technique, setting and tone. Historians agree that �Tom Jones� is loosely an epic, with a plot drawn from romance, while �Amelia� is modelled on a classical epic � Virgil�s �Aeneid� � and effects to eschew romance (Martin Battestin, Claude Rawson, Peter Sabor, Ronald Paulson, Simon Varey). The instability of reputation of Fielding�s �Amelia� demonstrates that the novel was traditionally estimated as writer�s failure but nowadays it is viewed as complicated literary form addressed to the highbrow reader. According to Peter Sabor, �Amelia� might never become the �favourite Child� of Fielding�s readers, as it was of Fielding himself, but what remains convincing about his last and most problematic novel is its harsh, world-weary picture of a venal society. Fielding�s darkened view of the people�s community influenced the later samples of the genre and reached successful treatment of the similar themes in the English novel of the 19th century. All the more it is the universal experience of the renewal of genre poetics and the reading of �Amelia� represents Fielding�s original conception of the novel. According to the declared problem the author of the present article uses historical and literary, sociocultural and hermeneutic approaches in the synthesis with the technique of close reading.
APA, Harvard, Vancouver, ISO, and other styles
7

"Recensions / Reviews." Canadian Journal of Political Science 36, no. 1 (March 2003): 185–241. http://dx.doi.org/10.1017/s0008423903778597.

Full text
Abstract:
BLAIS, ANDRÉ, ELISABETH GIDENGIL, RICHARD NADEAU AND NEIL NEVITTE. Anatomy of a Liberal Victory: Making Sense of the Vote in the 2000 Canadian Election. By Linda Trimble 187NEVITTE, NEIL, ed. Value Change and Governance in Canada. By Donald E. Blake 188MONIÈRE, DENIS. Pour comprendre le nationalisme au Québec et ailleurs. Par François- Pierre Gingras 190LAMOUREUX, DIANE. L'amère patrie. Féminisme et nationalisme dans le Québec contemporain. Par Édith Garneau 192MACLURE, JOCELYN. Récits identitaires. Le Québec à l'épreuve du pluralisme. Par Geneviève Nootens 195MASSOLIN, PHILIP. Canadian Intellectuals, The Tory Tradition, and the Challenge of Modernity, 1939-1970. By William Christian 197BETCHERMANN, LITA-ROSE. Ernest Lapointe: Mackenzie King's Great Quebec Lieutenant. By Robert Bothwell 198BRODIE, IAN. Friends of the Court: The Privileging of Interest Groups Litigants in Canada. By Miriam Smith 200ROACH, KENT. The Supreme Court on Trial: Judicial Activism or Democratic Dialogue. By Gerald Baier 202BERNIER, ROBERT. Un siècle de propagande? Information. Communication. Marketing gouvernemental. Par Anne-Marie Gingras 203JOFFRIN, LAURENT. Le gouvernement invisible. Naissance d'une démocratie sans le peuple. Par Réjean Pelletier 205LUXTON, MEG AND JUNE CORMAN. Getting By in Hard Times: Gendered Labour at Home and on the Job. By Stephanie Ross 207VILLALBA, BRUNO ET XAVIER VANDENDRIESSCHE, sous la direction de. Le Front National et le Droit. Par Alain Baccigalupo 209HAYNES, JEFF. Democracy in the Developing World: Africa, Asia, Latin America and the Middle East. By Bruce Morrison 212DEFFONTAINES, JEAN-PIERRE ET JEAN-PIERRE PROD'HOMME. Territoires et acteurs du développement local : de nouveaux lieux de démocratie. Par Guy Chasson 214CORRALES, JAVIER. Presidents without Parties: The Politics of Economic Reform in Argentina and Venezuela in the 1990s. By Anil Hira 215JEFFREY, LESLIE ANN. Sex and Borders: Gender, National Identity, and Prostitution Policy in Thailand. By Teri Caraway 216GAUDREAULT-DESBIENS, JEAN-FRANÇOIS. Le sexe et le droit. Sur le féminisme de Catharine MacKinnon. Par Ann Robinson 218HAFFNER, SEBASTIAN. Allemagne, 1918. Une révolution trahie. Par Augustin Simard 220CRAIG, LEON HAROLD. Of Philosophers and Kings: Political Philosophy in Shakespeare's Macbeth and King Lear. By Edward Andrew 223LECA, JEAN. Pour(quoi) la philosophie politique : petit traité de science politique, Tome 1. Par Chedly Belkhodja 225PIOTTE, JEAN-MARC. Les neufs clés de la modernité. Par Gilles Labelle 227NARDIN, TERRY. The Philosophy of Michael Oakeshott. By Jeremy Rayner 228RAEDER, LINDA C. John Stuart Mill and the Religion of Humanity. By Richard Vernon 230FROESE, KATRIN. Rousseau and Nietzsche: Toward an Aesthetic Morality. By Sophie Bourgault 231TOURAINE, ALAIN. Beyond Neoliberalism. By Pascale Dufour 233BAUDRILLARD, JEAN. D'un fragment l'autre. Entretiens avec François L'Yvonnet. Par Yves Laberge 234WYN JONES, RICHARD, ed. Critical Theory and World Politics. By Jacqueline Best 235DERRIENNIC, JEAN-PIERRE. Les guerres civiles. Par Hugo Loiseau 236O'LEARY, BRENDAN, IAN LUSTICK AND TOM CALLAGHY, eds. Right-Sizing the State: The Politics of Moving Borders. By Tobias Theiler 237BARNETT, MICHAEL. Eyewitness to a Genocide: The United Nations and Rwanda. By John Hickman 239GOLDSTEIN, AVERY. Deterrence and Security in the 21st Century: China, Britain, France and the Enduring Legacy of the Nuclear Revolution. By David G. Haglund 240
APA, Harvard, Vancouver, ISO, and other styles
8

Kadivar, Jamileh. "Government Surveillance and Counter-Surveillance on Social and Mobile Media: The Case of Iran (2009)." M/C Journal 18, no. 2 (April 29, 2015). http://dx.doi.org/10.5204/mcj.956.

Full text
Abstract:
Human history has witnessed varied surveillance and counter-surveillance activities from time immemorial. Human beings could not surveille others effectively and accurately without the technology of their era. Technology is a tool that can empower both people and governments. The outcomes are different based on the users’ intentions and aims. 2,500 years ago, Sun Tzu noted that ‘If you know both yourself and your enemy, you can win numerous (literally, "a hundred") battles without jeopardy’. His words still ring true. To be a good surveiller and counter-surveiller it is essential to know both sides, and in order to be good at these activities access to technology is vital. There is no doubt that knowledge is power, and without technology to access the information, it is impossible to be powerful. As we become more expert at technology, we will learn what makes surveillance and counter-surveillance more effective, and will be more powerful.“Surveillance” is one of the most important aspects of living in the convergent media environment. This essay illustrates government surveillance and counter-surveillance during the Iranian Green Movement (2009) on social and mobile media. The Green Movement refers to a non-violent movement that arose after the disputed presidential election on June 2009. After that Iran was facing its most serious political crisis since the 1979 revolution. Claims of vote fraud triggered massive street protests. Many took to the streets with “Green” signs, chanting slogans such as ‘the government lied’, and ‘where is my vote?’ There is no doubt that social and mobile media has played an important role in Iran’s contemporary politics. According to Internet World Stats (IWS) Internet users in 2009 account for approximately 48.5 per cent of the population of Iran. In 2009, Iran had 30.2 million mobile phone users (Freedom House), and 72 cellular subscriptions for every 100 people (World Bank). Today, while Iran has the 19th-largest population in the world, its blogosphere holds the third spot in terms of number of users, just behind the United States and China (Beth Elson et al.). In this essay the use of social and mobile media (technology) is not debated, but the extent of this use, and who, why and how it is used, is clearly scrutinised.Visibility and Surveillance There have been different kinds of surveillance for a very long time. However, all types of surveillance are based on the notion of “visibility”. Previous studies show that visibility is not a new term (Foucault Discipline). The new things in the new era, are its scale, scope and complicated ways to watch others without being watched, which are not limited to a specific time, space and group, and are completely different from previous instruments for watching (Andrejevic). As Meikle and Young (146) have mentioned ‘networked digital media bring with them a new kind of visibility’, based on different kinds of technology. Internet surveillance has important implications in politics to control, protect, and influence (Marx Ethics; Castells; Fuchs Critique). Surveillance has been improved during its long history, and evolved from very simple spying and watching to complicated methods of “iSpy” (Andrejevic). To understand the importance of visibility and its relationship with surveillance, it is essential to study visibility in conjunction with the notion of “panopticon” and its contradictory functions. Foucault uses Bentham's notion of panopticon that carries within itself visibility and transparency to control others. “Gaze” is a central term in Bentham’s view. ‘Bentham thinks of a visibility organised entirely around a dominating, overseeing gaze’ (Foucault Eye). Moreover, Thomson (Visibility 11) notes that we are living in the age of ‘normalizing the power of the gaze’ and it is clear that the influential gaze is based on powerful means to see others.Lyon (Surveillance 2) explains that ‘surveillance is any collection and processing of personal data, whether identifiable or not, for the purpose of influencing or managing those whose data have been granted…’. He mentions that today the most important means of surveillance reside in computer power which allows collected data to be sorted, matched, retrieved, processed, marketed and circulated.Nowadays, the Internet has become ubiquitous in many parts of the world. So, the changes in people’s interactions have influenced their lives. Fuchs (Introduction 15) argues that ‘information technology enables surveillance at a distance…in real time over networks at high transmission speed’. Therefore, visibility touches different aspects of people’s lives and living in a “glasshouse” has caused a lot of fear and anxiety about privacy.Iran’s Green Movement is one of many cases for studying surveillance and counter-surveillance technologies in social and mobile media. Government Surveillance on Social and Mobile Media in Iran, 2009 In 2009 the Iranian government controlled technology that allowed them to monitor, track, and limit access to the Internet, social media and mobiles communication, which has resulted in the surveillance of Green Movement’s activists. The Iranian government had improved its technical capabilities to monitor the people’s behavior on the Internet long before the 2009 election. The election led to an increase in online surveillance. Using social media the Iranian government became even more powerful than it was before the election. Social media was a significant factor in strengthening the government’s power. In the months after the election the virtual atmosphere became considerably more repressive. The intensified filtering of the Internet and implementation of more advanced surveillance systems strengthened the government’s position after the election. The Open Net Initiative revealed that the Internet censorship system in Iran is one of the most comprehensive and sophisticated censorship systems in the world. It emphasized that ‘Advances in domestic technical capacity have contributed to the implementation of a centralized filtering strategy and a reduced reliance on Western technologies’.On the other hand, the authorities attempted to block all access to political blogs (Jaras), either through cyber-security methods or through threats (Tusa). The Centre for Investigating Organized Cyber Crimes, which was founded in 2007 partly ‘to investigate and confront social and economic offenses on the Internet’ (Cyber Police), became increasingly important over the course of 2009 as the government combated the opposition’s online activities (Beth Elson et al. 16). Training of "senior Internet lieutenants" to confront Iran's "virtual enemies online" was another attempt that the Intelligence minister announced following the protests (Iran Media Program).In 2009 the Iranian government enacted the Computer Crime Law (Jaras). According to this law the Committee in Charge of Determining Unauthorized Websites is legally empowered to identify sites that carry forbidden content and report that information to TCI and other major ISPs for blocking (Freedom House). In the late fall of 2009, the government started sending threatening and warning text messages to protesters about their presence in the protests (BBC). Attacking, blocking, hacking and hijacking of the domain names of some opposition websites such as Jaras and Kaleme besides a number of non-Iranian sites such as Twitter were among the other attempts of the Iranian Cyber Army (Jaras).It is also said that the police and security forces arrested dissidents identified through photos and videos posted on the social media that many imagined had empowered them. Furthermore, the online photos of the active protesters were posted on different websites, asking people to identify them (Valizadeh).In late June 2009 the Iranian government was intentionally permitting Internet traffic to and from social networking sites such as Facebook and Twitter so that it could use a sophisticated practice called Deep Packet Inspection (DPI) to collect information about users. It was reportedly also applying the same technology to monitor mobile phone communications (Beth Elson et al. 15).On the other hand, to cut communication between Iranians inside and outside the country, Iran slowed down the Internet dramatically (Jaras). Iran also blocked access to Facebook, YouTube, Wikipedia, Twitter and many blogs before, during and after the protests. Moreover, in 2009, text message services were shut down for over 40 days, and mobile phone subscribers could not send or receive text messages regardless of their mobile carriers. Subsequently it was disrupted on a temporary basis immediately before and during key protests days.It was later discovered that the Nokia Siemens Network provided the government with surveillance technologies (Wagner; Iran Media Program). The Iranian government built a complicated system that enabled it to monitor, track and intercept what was said on mobile phones. Nokia Siemens Network confirmed it supplied Iran with the technology needed to monitor, control, and read local telephone calls [...] The product allowed authorities to monitor any communications across a network, including voice calls, text messaging, instant messages, and web traffic (Cellan-Jones). Media sources also reported that two Chinese companies, Huawei and ZTE, provided surveillance technologies to the government. The Nic Payamak and Saman Payamak websites, that provide mass text messaging services, also reported that operator Hamrah Aval commonly blocked texts with words such as meeting, location, rally, gathering, election and parliament (Iran Media Program). Visibility and Counter-Surveillance The panopticon is not limited to the watchers. Similarly, new kinds of panopticon and visibility are not confined to government surveillance. Foucault points out that ‘the seeing machine was once a sort of dark room into which individuals spied; it has become a transparent building in which the exercise of power may be supervised by society as a whole’ (Discipline 207). What is important is Foucault's recognition that transparency, not only of those who are being observed but also of those who are observing, is central to the notion of the panopticon (Allen) and ‘any member of society will have the right to come and see with his own eyes how schools, hospitals, factories, and prisons function’ (Foucault, Discipline 207). Counter-surveillance is the process of detecting and mitigating hostile surveillance (Burton). Therefore, while the Internet is a surveillance instrument that enables governments to watch people, it also improves the capacity to counter-surveille, and draws public attention to governments’ injustice. As Castells (185) notes the Internet could be used by citizens to watch their government as an instrument of control, information, participation, and even decision-making, from the bottom up.With regards to the role of citizens in counter-surveillance we can draw on Jay Rosen’s view of Internet users as ‘the people formerly known as the audience’. In counter-surveillance it can be said that passive citizens (formerly the audience) have turned into active citizens. And this change was becoming impossible without mobile and social media platforms. These new techniques and technologies have empowered people and given them the opportunity to have new identities. When Thompson wrote ‘the exercise of power in modern societies remains in many ways shrouded in secrecy and hidden from the public gaze’ (Media 125), perhaps he could not imagine that one day people can gaze at the politicians, security forces and the police through the use of the Internet and mobile devices.Furthermore, while access to mobile media allows people to hold authorities accountable for their uses and abuses of power (Breen 183), social media can be used as a means of representation, organization of collective action, mobilization, and drawing attention to police brutality and reasons for political action (Gerbaudo).There is no doubt that having creativity and using alternative platforms are important aspects in counter-surveillance. For example, images of Lt. Pike “Pepper Spray Cop” from the University of California became the symbol of the senselessness of police brutality during the Occupy Movement (Shaw). Iranians’ Counter-Surveillance on Social and Mobile Media, 2009 Iran’s Green movement (2009) triggered a lot of discussions about the role of technology in social movements. In this regard, there are two notable attitudes about the role of technology: techno-optimistic (Shriky and Castells) and techno-pessimistic (Morozov and Gladwell) views should be taken into account. While techno-optimists overrated the role of social media, techno-pessimists underestimated its role. However, there is no doubt that technology has played a great role as a counter-surveillance tool amongst Iranian people in Iran’s contemporary politics.Apart from the academic discussions between techno-optimists and techno-pessimists, there have been numerous debates about the role of new technologies in Iran during the Green Movement. This subject has received interest from different corners of the world, including Western countries, Iranian authorities, opposition groups, and also some NGOs. However, its role as a means of counter-surveillance has not received adequate attention.As the tools of counter-surveillance are more or less the tools of surveillance, protesters learned from the government to use the same techniques to challenge authority on social media.Establishing new websites (such as JARAS, RASA, Kalemeh, and Iran green voice) or strengthening some previous ones (such as Saham, Emrooz, Norooz), also activating different platforms such as Facebook, Twitter, and YouTube accounts to broadcast the voice of the Iranian Green Movement and neutralize the government’s propaganda were the most important ways to empower supporters of Iran’s Green Movement in counter-surveillance.‘Reporters Without Borders issued a statement, saying that ‘the new media, and particularly social networks, have given populations collaborative tools with which they can change the social order’. It is also mentioned that despite efforts by the Iranian government to prevent any reporting of the protests and due to considerable pressure placed on foreign journalists inside Iran, social media played a significant role in sending the messages and images of the movement to the outside world (Axworthy). However, at that moment, many thought that Twitter performed a liberating role for Iranian dissenters. For example, Western media heralded the Green Movement in Iran as a “Twitter revolution” fuelled by information and communication technologies (ICTs) and social media tools (Carrieri et al. 4). “The Revolution Will Be Twittered” was the first in a series of blog posts published by Andrew Sullivan a few hours after the news of the protests was released.According to the researcher’s observation the numbers of Twitter users inside Iran who tweeted was very limited in 2009 and social media was most useful in the dissemination of information, especially from those inside Iran to outsiders. Mobile phones were mostly influential as an instrument firstly used for producing contents (images and videos) and secondly for the organisation of protests. There were many photos and videos that were filmed by very simple mobile cell phones, uploaded by ordinary people onto YouTube and other platforms. The links were shared many times on Twitter and Facebook and released by mainstream media. The most frequently circulated story from the Iranian protests was a video of Neda Agha-Sultan. Her final moments were captured by some bystanders with mobile phone cameras and rapidly spread across the global media and the Internet. It showed that the camera-phone had provided citizens with a powerful means, allowing for the creation and instant sharing of persuasive personalised eyewitness records with mobile and globalised target populations (Anden-Papadopoulos).Protesters used another technique, DDOS (distributed denial of service attacks), for political protest in cyber space. Anonymous people used DDOS to overload a website with fake requests, making it unavailable for users and disrupting the sites set as targets (McMillan) in effect, shutting down the site. DDOS is an important counter-surveillance activity by grassroots activists or hackers. It was a cyber protest that knocked the main Iranian governmental websites off-line and caused crowdsourcing and false trafficking. Amongst them were Mahmoud Ahmadinejad, Iran's supreme leader’s websites and those which belong to or are close to the government or security forces, including news agencies (Fars, IRNA, Press TV…), the Ministry of Foreign Affairs, the Ministry of Justice, the Police, and the Ministry of the Interior.Moreover, as authorities uploaded the pictures of protesters onto different platforms to find and arrest them, in some cities people started to put the pictures, phone numbers and addresses of members of security forces and plain clothes police officers who attacked them during the protests and asked people to identify and report the others. They also wanted people to send information about suspects who infringed human rights. Conclusion To sum up, visibility, surveillance and counter-surveillance are not new phenomena. What is new is the technology, which increased their complexity. As Foucault (Discipline 200) mentioned ‘visibility is a trap’, so being visible would be the weakness of those who are being surveilled in the power struggle. In the convergent era, in order to be more powerful, both surveillance and counter-surveillance activities aim for more visibility. Although both attempt to use the same means (technology) to trap the other side, the differences are in their subjects, objects, goals and results.While in surveillance, visibility of the many by the few is mostly for the purpose of control and influence in undemocratic ways, in counter-surveillance, the visibility of the few by the many is mostly through democratic ways to secure more accountability and transparency from the governments.As mentioned in the case of Iran’s Green Movement, the scale and scope of visibility are different in surveillance and counter-surveillance. The importance of what Shaw wrote about Sydney occupy counter-surveillance, applies to other places, such as Iran. She has stressed that ‘protesters and police engaged in a dance of technology and surveillance with one another. Both had access to technology, but there were uncertainties about the extent of technology and its proficient use…’In Iran (2009), both sides (government and activists) used technology and benefited from digital networked platforms, but their levels of access and domains of influence were different, which was because the sources of power, information and wealth were divided asymmetrically between them. Creativity was important for both sides to make others more visible, and make themselves invisible. Also, sharing information to make the other side visible played an important role in these two areas. References Alen, David. “The Trouble with Transparency: The Challenge of Doing Journalism Ethics in a Surveillance Society.” Journalism Studies 9.3 (2008): 323-40. 8 Dec. 2013 ‹http://www.tandfonline.com/doi/full/10.1080/14616700801997224#.UqRFSuIZsqN›. Anden-Papadopoulos, Kari. “Citizen Camera-Witnessing: Embodied Political Dissent in the Age of ‘Mediated Mass Self-Communication.’” New Media & Society 16.5 (2014). 753-69. 9 Aug. 2014 ‹http://nms.sagepub.com/content/16/5/753.full.pdf+html›. Andrejevic, Mark. iSpy: Surveillance and Power in the Interactive Era. Lawrence, Kan: UP of Kansas, 2007. Axworthy, Micheal. Revolutionary Iran: A History of the Islamic Republic. London: Penguin Books, 2014. Bentham, Jeremy. Panopticon Postscript. London: T. Payne, 1791. Beth Elson, Sara, Douglas Yeung, Parisa Roshan, S.R. Bohandy, and Alireza Nader. Using Social Media to Gauge Iranian Public Opinion and Mood after the 2009 Election. Santa Monica: RAND Corporation, 2012. 1 Aug. 2014 ‹http://www.rand.org/content/dam/rand/pubs/technical_reports/2012/RAND_TR1161.pdf›. Breen, Marcus. Uprising: The Internet’s Unintended Consequences. Champaign, Ill: Common Ground Pub, 2011. Burton, Fred. “The Secrets of Counter-Surveillance.” Stratfor Global Intelligence. 2007. 19 April 2015 ‹https://www.stratfor.com/secrets_countersurveillance›. Carrieri, Matthew, Ali Karimzadeh Bangi, Saad Omar Khan, and Saffron Suud. After the Green Movement Internet Controls in Iran, 2009-2012. OpenNet Initiative, 2013. 17 Dec. 2013 ‹https://opennet.net/sites/opennet.net/files/iranreport.pdf›. Castells, Manuel. The Internet Galaxy: Reflections on the Internet, Business, and Society. Oxford: Oxford UP: 2001. Cellan-Jones, Rory. “Hi-Tech Helps Iranian Monitoring.” BBC, 2009. 26 July 2014 ‹http://news.bbc.co.uk/1/hi/technology/8112550.stm›. “Cyber Crimes’ List.” Iran: Cyber Police, 2009. 17 July 2014 ‹http://www.cyberpolice.ir/page/2551›. Foucault, Michel. Discipline and Punish: The Birth of the Prison. Trans. Alan Sheridan. Harmondsworth: Penguin, 1977. Foucault, Michel. “The Eye of Power.” 1980. 12 Dec. 2013 ‹https://nbrokaw.files.wordpress.com/2010/12/the-eye-of-power.doc›. Freedom House. “Special Report: Iran.” 2009. 14 June 2014 ‹http://www.sssup.it/UploadDocs/4661_8_A_Special_Report_Iran_Feedom_House_01.pdf›. Fuchs, Christian. “Introduction.” Internet and Surveillance: The Challenges of Web 2.0 and Social Media. Ed. Christian Fuchs. London: Routledge, 2012. 1-28. Fuchs, Christian. “Critique of the Political Economy of Web 2.0 Surveillance.” Internet and Surveillance: The Challenges of Web 2.0 and Social Media. Ed. Christian Fuchs. London: Routledge, 2012. 30-70. Gerbaudo, Paolo. Tweets and the Streets: Social Media and Contemporary Activism. London: Pluto, 2012. “Internet: Iran’s New Imaginary Enemy.” Jaras Mar. 2009. 28 June 2014 ‹http://www.rahesabz.net/print/12143›.Iran Media Program. “Text Messaging as Iran's New Filtering Frontier.” 2013. 25 July 2014 ‹http://www.iranmediaresearch.org/en/blog/227/13/04/25/136›. Internet World Stats News. The Internet Hits 1.5 Billion. 2009. 3 July 2014 ‹ http://www.internetworldstats.com/pr/edi038.htm›. Lyon, David. Surveillance Society: Monitoring Everyday Life. Buckingham: Open UP, 2001. Lyon, David. “9/11, Synopticon, and Scopophilia: Watching and Being Watched.” The New Politics of Surveillance and Visibility. Eds. Richard V. Ericson and Kevin D. Haggerty. Toronto: UP of Toronto, 2006. 35-54. Marx, Gary T. “What’s New about the ‘New Surveillance’? Classify for Change and Continuity.” Surveillance & Society 1.1 (2002): 9-29. McMillan, Robert. “With Unrest in Iran, Cyber-Attacks Begin.” PC World 2009. 17 Apr. 2015 ‹http://www.pcworld.com/article/166714/article.html›. Meikle, Graham, and Sherman Young. Media Convergence: Networked Digital Media in Everyday Life. London: Palgrave Macmillan, 2012. Morozov, Evgeny. “How Dictators Watch Us on the Web.” Prospect 2009. 15 June 2014 ‹http://www.prospectmagazine.co.uk/magazine/how-dictators-watch-us-on-the-web/#.U5wU6ZRdU00›.Open Net. “Iran.” 2009. 26 June 2014 ‹https://opennet.net/research/profiles/iran›. Reporters without Borders. “Web 2.0 versus Control 2.0.” 2010. 27 May 2014 ‹http://en.rsf.org/web-2-0-versus-control-2-0-18-03-2010,36697›.Rosen, Jay. The People Formerly Known as the Audience. 2006. 7 Dec. 2013 ‹http://www.huffingtonpost.com/jay-rosen/the-people-formerly-known_1_b_24113.html›. Shaw, Frances. “'Walls of Seeing': Protest Surveillance, Embodied Boundaries, and Counter-Surveillance at Occupy Sydney.” Transformation 23 (2013). 9 Dec. 2013 ‹http://www.transformationsjournal.org/journal/issue_23/article_04.shtml›. “The Warning of the Iranian Revolutionary Guard Corps (IRGC) to the Weblogs and Websites.” BBC, 2009. 27 July 2014 ‹http://www.bbc.co.uk/persian/iran/2009/06/090617_ka_ir88_sepah_internet.shtml›. Thompson, John B. The Media And Modernity: A Social Theory of the Media. Cambridge: Polity Press, 1995. Thompson, John B. “The New Visibility.” Theory, Culture & Society 22.6 (2005): 31-51. 10 Dec. 2013 ‹http://tcs.sagepub.com/content/22/6/31.full.pdf+html›. Tusa, Felix. “How Social Media Can Shape a Protest Movement: The Cases of Egypt in 2011 and Iran in 2009.” Arab Media and Society 17 (Winter 2013). 15 July 2014 ‹http://www.arabmediasociety.com/index.php?article=816&p=0›. Tzu, Sun. Sun Tzu: The Art of War. S.l.: Pax Librorum Pub. H, 2009. Valizadeh, Reza. “Invitation to the Public Shooting with the Camera.” RFI, 2011. 19 June 2014 ‹http://www.persian.rfi.fr/%D8%AF%D8%B9%D9%88%D8%AA-%D8%A8%D9%87-%D8%B4%D9%84%DB%8C%DA%A9-%D8%B9%D9%85%D9%88%D9%85%DB%8C-%D8%A8%D8%A7-%D8%AF%D9%88%D8%B1%D8%A8%DB%8C%D9%86-%D8%B9%DA%A9%D8%A7%D8%B3%DB%8C-20110307/%D8%A7%DB%8C%D8%B1%D8%A7%D9%86›. Wagner, Ben. Exporting Censorship and Surveillance Technology. Netherlands: Humanist Institute for Co-operation with Developing Countries (Hivos), 2012. 7 July 2014 ‹https://hivos.org/sites/default/files/exporting_censorship_and_surveillance_technology_by_ben_wagner.pdf›. World Bank. Mobile Cellular Subscriptions (per 100 People). The World Bank. N.d. 27 June 2014 ‹http://data.worldbank.org/indicator/IT.CEL.SETS.P2›.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Lieutenant jones"

1

Fielding, Henry. "The adventure of a company of officers." In Tom Jones. Oxford University Press, 2008. http://dx.doi.org/10.1093/owc/9780199536993.003.0094.

Full text
Abstract:
The lieutenant whom we mentioned in the preceding chapter, and who commanded this party, was now near sixty years of age. He had entered very young into the army, and had served in the capacity of an ensign at the Battle of Taisnieres;*...
APA, Harvard, Vancouver, ISO, and other styles
2

Fielding, Henry. "The conclusion of the foregoing adventure." In Tom Jones. Oxford University Press, 2008. http://dx.doi.org/10.1093/owc/9780199536993.003.0097.

Full text
Abstract:
Besides the suspicion of sleep, the lieutenant harboured another and worse doubt against the poor sentinel, and this was that of treachery; for as he believed not one syllable of the apparition, so he imagined the whole to be an invention formed only to...
APA, Harvard, Vancouver, ISO, and other styles
3

Fielding, Henry. "In which the landlady pays a visit to Mr Jones." In Tom Jones. Oxford University Press, 2008. http://dx.doi.org/10.1093/owc/9780199536993.003.0100.

Full text
Abstract:
When Jones had taken leave of his friend, the lieutenant, he endeavoured to close his eyes, but all in vain; his spirits were too lively and wakeful to be lulled to sleep. So having amused, or rather tormented, himself with the thoughts of his...
APA, Harvard, Vancouver, ISO, and other styles
4

Fielding, Henry. "In which the surgeon makes his second appearance." In Tom Jones. Oxford University Press, 2008. http://dx.doi.org/10.1093/owc/9780199536993.003.0101.

Full text
Abstract:
Before we proceed any farther, that the reader may not be mistaken in imagining the landlady knew more than she did, nor surprised that she knew so much, it may be necessary to inform him that the lieutenant had acquainted her that the name...
APA, Harvard, Vancouver, ISO, and other styles
5

Fielding, Henry. "Containing the great address of the landlady, the great learning of a surgeon, and the solid skill in casuistry of the worthy lieutenant." In Tom Jones. Oxford University Press, 2008. http://dx.doi.org/10.1093/owc/9780199536993.003.0095.

Full text
Abstract:
When the wounded man was carried to his bed, and the house began again to clear up from the hurry which this accident had occasioned, the landlady thus addressed the commanding officer. ‘I am afraid, sir,’ said she, ‘this young man did not behave...
APA, Harvard, Vancouver, ISO, and other styles
6

Thackeray, William Makepeace. "Chapter XIII." In Vanity Fair. Oxford University Press, 2015. http://dx.doi.org/10.1093/owc/9780198727712.003.0015.

Full text
Abstract:
fear the gentleman to whom Miss Amelia’s letters were addressed was rather an obdurate critic. Such a number of notes followed Lieutenant Osborne about the country, that he became almost ashamed of the jokes of his mess-room companions regarding them, and ordered his...
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography