Academic literature on the topic 'Self-defense equipment industry'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Self-defense equipment industry.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Self-defense equipment industry"

1

Shin, Hyun-Jun, Kyoung-Woo Cho, and Chang-Heon Oh. "SVM-Based Dynamic Reconfiguration CPS for Manufacturing System in Industry 4.0." Wireless Communications and Mobile Computing 2018 (2018): 1–13. http://dx.doi.org/10.1155/2018/5795037.

Full text
Abstract:
CPS is potential application in various fields, such as medical, healthcare, energy, transportation, and defense, as well as Industry 4.0 in Germany. Although studies on the equipment aging and prediction of problem have been done by combining CPS with Industry 4.0, such studies were based on small numbers and majority of the papers focused primarily on CPS methodology. Therefore, it is necessary to study active self-protection to enable self-management functions, such as self-healing by applying CPS in shop-floor. In this paper, we have proposed modeling of shop-floor and a dynamic reconfigurable CPS scheme that can predict the occurrence of anomalies and self-protection in the model. For this purpose, SVM was used as a machine learning technology and it was possible to restrain overloading in manufacturing process. In addition, we design CPS framework based on machine learning for Industry 4.0, simulate it, and perform. Simulation results show the simulation model autonomously detects the abnormal situation and it is dynamically reconfigured through self-healing.
APA, Harvard, Vancouver, ISO, and other styles
2

Elisabeth, Sereffina Yohanna, Sutrimo Sumarlan, Triyoga Budi Prasetyo, and Jones Hutauruk. "INDONESIA’S DEFENSE DIPLOMACY IN JOINT PRODUCTION OF HARIMAU MEDIUM TANK BETWEEN INDONESIA-TURKEY." Jurnal Pertahanan: Media Informasi ttg Kajian & Strategi Pertahanan yang Mengedepankan Identity, Nasionalism & Integrity 7, no. 2 (August 31, 2021): 243. http://dx.doi.org/10.33172/jp.v7i2.1241.

Full text
Abstract:
<div><p class="Els-history-head">Indonesia-Turkey defense diplomacy which aims to achieve self-sufficiency in defense equipment has resulted in the joint production of a medium tank called the Harimau or Kaplan. Each country requires a medium tank because this type of tank can operate in various geographical conditions found in Indonesia and Turkey. The purpose of this study is to examine the factors that contribute to the realization of joint production of tanks through the implementation of defense diplomacy strategies. Data were obtained through interviews with former Indonesian defense ministers for the period 2009-2014 as well as from the defense industry. In addition, secondary data was obtained from search results of official documents, official websites, and journals. Then the results of the interviews were analyzed descriptively. From this research, the factors that influence the cooperation between Indonesia and Turkey are obtained, namely the principle of equality, the principle of mutual trust and need, and the principle of business. In addition, Indonesia's defense diplomacy strategy is in the alignment of domestic and foreign defense policies, assessments, and maximizing the concepts of Government to Government (G to G) and Business to Business (B to B).</p></div>
APA, Harvard, Vancouver, ISO, and other styles
3

Irfan, Faishal, Romie Oktovianus Bura, and Heri Yansyah. "DEVELOPMENT STRATEGIC OF SIMULATOR TECHNOLOGY 4.5 GENERATION FIGHTER AIRCRAFT FOR SUPPORTING NATIONAL DEFENSE SYSTEM." Jurnal Pertahanan: Media Informasi ttg Kajian & Strategi Pertahanan yang Mengedepankan Identity, Nasionalism & Integrity 6, no. 3 (December 31, 2020): 357. http://dx.doi.org/10.33172/jp.v6i3.834.

Full text
Abstract:
<div><p class="Els-history-head">The fighter aircraft project is one of the defense and security equipment (alpalhankam or alat peralatan pertahanan dan keamanan) priority programs contained in the defense industry roadmap. Indonesia and South Korea undertook a joint development program in developing 4.5 generation fighter aircraft. However, Indonesia experiences several obstacles in the development of fighter aircraft, one of which is the ability of disparity and mastery of fighter technology. One of the critical components used as one of the development programs is simulator technology development. Mastery of simulator technology can improve the ability of Technology Readiness Level (TRL) from technology development fighter aircraft and can cause multiplier effects in other fields. Therefore we need a development strategy that is appropriate for the development of simulator technology. This study aims to analyze and define the benchmark level of performance or from the critical components which will then be used as a reference for the development strategy of the 4.5 generation fighter simulator for joint development projects. The method used in this study is a mixed-method with an approach system engineering uses quality function deployment tools and Critical Technology Element (CTE) technology assessment to identify which CTE then used as a reference strategy for the development of fighter simulator technology. The results of the study show that there are several CTE values along with simulator technology performance scores, among others mission 92.5%, data 83.56%, motion 52.51%, and strategic options that can be used in the technological development of fighter simulator generation 4.5 such as strategic joint development, self-development, and local content/offset.</p></div><div> </div>
APA, Harvard, Vancouver, ISO, and other styles
4

Pransky, Joanne. "The Pransky interview: Mel Torrie, Founder, CEO and President of Autonomous Solutions, Inc." Industrial Robot: An International Journal 45, no. 1 (January 15, 2018): 7–10. http://dx.doi.org/10.1108/ir-11-2017-0199.

Full text
Abstract:
Purpose The following paper is a “Q&A interview” conducted by Joanne Pransky of Industrial Robot Journal as a method to impart the combined technological, business and personal experience of a prominent, robotic industry engineer-turned successful innovator and leader, regarding the challenges of bringing technological discoveries to fruition. This paper aims to discuss these issues. Design/methodology/approach The interviewee is Mel Torrie, CEO and President of Autonomous Solutions, Inc. (ASI). ASI manufactures an OEM/vendor independent software and hardware solution retrofitted to existing equipment to create a wide variety of fully autonomous vehicles spanning agriculture, mining, automotive, industrial cleaning, security and government/military applications. In this interview, Torrie shares how he first got started in the robotics field along with his experiences in running his ground-breaking startup. Findings In 1999, Torrie received a Master’s Degree in Electrical Engineering at Utah State University (USU) where he worked on two National Aeronautics and Space Administration (NASA) space shuttle payloads. After his work at USU, he managed robotics development programs for John Deere, the US Department of Defense and the US Department of Energy. He founded ASI, a spin-off of the Center of Self Organizing and Intelligent Systems (CSOIS) at USU, in 2000. Originality/value Torrie was a pioneer and visionary who bootstrapped ASI from the beginning. Under Torrie’s leadership, ASI raised over $85m in a unique business model where there is no equity but only strategic partners. These foremost companies are given exclusive rights to their vertical market and jointly own their industry’s driverless vehicle’s intellectual property (IP) with ASI. The vehicles are developed and tested at ASI’s 100-acre proving ground facility in Utah. To date, ASI’s more than 100 employees and their business partners have automated 75 different vehicle types and ASI continues to create new markets. Some of ASI’s notable installations include the Bingham Canyon Mine clean-up effort; BatCat, the teleoperated CAT telehandler for the Los Angeles Police Department; and the robotic durability testing program with Ford Motors, Toyota, Fiat Chrysler Automotive, Hyundai, General Motors as well as other private proving grounds.
APA, Harvard, Vancouver, ISO, and other styles
5

Losh, Elizabeth. "Artificial Intelligence." M/C Journal 10, no. 5 (October 1, 2007). http://dx.doi.org/10.5204/mcj.2710.

Full text
Abstract:
On the morning of Thursday, 4 May 2006, the United States House Permanent Select Committee on Intelligence held an open hearing entitled “Terrorist Use of the Internet.” The Intelligence committee meeting was scheduled to take place in Room 1302 of the Longworth Office Building, a Depression-era structure with a neoclassical façade. Because of a dysfunctional elevator, some of the congressional representatives were late to the meeting. During the testimony about the newest political applications for cutting-edge digital technology, the microphones periodically malfunctioned, and witnesses complained of “technical problems” several times. By the end of the day it seemed that what was to be remembered about the hearing was the shocking revelation that terrorists were using videogames to recruit young jihadists. The Associated Press wrote a short, restrained article about the hearing that only mentioned “computer games and recruitment videos” in passing. Eager to have their version of the news item picked up, Reuters made videogames the focus of their coverage with a headline that announced, “Islamists Using US Videogames in Youth Appeal.” Like a game of telephone, as the Reuters videogame story was quickly re-run by several Internet news services, each iteration of the title seemed less true to the exact language of the original. One Internet news service changed the headline to “Islamic militants recruit using U.S. video games.” Fox News re-titled the story again to emphasise that this alert about technological manipulation was coming from recognised specialists in the anti-terrorism surveillance field: “Experts: Islamic Militants Customizing Violent Video Games.” As the story circulated, the body of the article remained largely unchanged, in which the Reuters reporter described the digital materials from Islamic extremists that were shown at the congressional hearing. During the segment that apparently most captured the attention of the wire service reporters, eerie music played as an English-speaking narrator condemned the “infidel” and declared that he had “put a jihad” on them, as aerial shots moved over 3D computer-generated images of flaming oil facilities and mosques covered with geometric designs. Suddenly, this menacing voice-over was interrupted by an explosion, as a virtual rocket was launched into a simulated military helicopter. The Reuters reporter shared this dystopian vision from cyberspace with Western audiences by quoting directly from the chilling commentary and describing a dissonant montage of images and remixed sound. “I was just a boy when the infidels came to my village in Blackhawk helicopters,” a narrator’s voice said as the screen flashed between images of street-level gunfights, explosions and helicopter assaults. Then came a recording of President George W. Bush’s September 16, 2001, statement: “This crusade, this war on terrorism, is going to take a while.” It was edited to repeat the word “crusade,” which Muslims often define as an attack on Islam by Christianity. According to the news reports, the key piece of evidence before Congress seemed to be a film by “SonicJihad” of recorded videogame play, which – according to the experts – was widely distributed online. Much of the clip takes place from the point of view of a first-person shooter, seen as if through the eyes of an armed insurgent, but the viewer also periodically sees third-person action in which the player appears as a running figure wearing a red-and-white checked keffiyeh, who dashes toward the screen with a rocket launcher balanced on his shoulder. Significantly, another of the player’s hand-held weapons is a detonator that triggers remote blasts. As jaunty music plays, helicopters, tanks, and armoured vehicles burst into smoke and flame. Finally, at the triumphant ending of the video, a green and white flag bearing a crescent is hoisted aloft into the sky to signify victory by Islamic forces. To explain the existence of this digital alternative history in which jihadists could be conquerors, the Reuters story described the deviousness of the country’s terrorist opponents, who were now apparently modifying popular videogames through their wizardry and inserting anti-American, pro-insurgency content into U.S.-made consumer technology. One of the latest video games modified by militants is the popular “Battlefield 2” from leading video game publisher, Electronic Arts Inc of Redwood City, California. Jeff Brown, a spokesman for Electronic Arts, said enthusiasts often write software modifications, known as “mods,” to video games. “Millions of people create mods on games around the world,” he said. “We have absolutely no control over them. It’s like drawing a mustache on a picture.” Although the Electronic Arts executive dismissed the activities of modders as a “mustache on a picture” that could only be considered little more than childish vandalism of their off-the-shelf corporate product, others saw a more serious form of criminality at work. Testifying experts and the legislators listening on the committee used the video to call for greater Internet surveillance efforts and electronic counter-measures. Within twenty-four hours of the sensationalistic news breaking, however, a group of Battlefield 2 fans was crowing about the idiocy of reporters. The game play footage wasn’t from a high-tech modification of the software by Islamic extremists; it had been posted on a Planet Battlefield forum the previous December of 2005 by a game fan who had cut together regular game play with a Bush remix and a parody snippet of the soundtrack from the 2004 hit comedy film Team America. The voice describing the Black Hawk helicopters was the voice of Trey Parker of South Park cartoon fame, and – much to Parker’s amusement – even the mention of “goats screaming” did not clue spectators in to the fact of a comic source. Ironically, the moment in the movie from which the sound clip is excerpted is one about intelligence gathering. As an agent of Team America, a fictional elite U.S. commando squad, the hero of the film’s all-puppet cast, Gary Johnston, is impersonating a jihadist radical inside a hostile Egyptian tavern that is modelled on the cantina scene from Star Wars. Additional laughs come from the fact that agent Johnston is accepted by the menacing terrorist cell as “Hakmed,” despite the fact that he utters a series of improbable clichés made up of incoherent stereotypes about life in the Middle East while dressed up in a disguise made up of shoe polish and a turban from a bathroom towel. The man behind the “SonicJihad” pseudonym turned out to be a twenty-five-year-old hospital administrator named Samir, and what reporters and representatives saw was nothing more exotic than game play from an add-on expansion pack of Battlefield 2, which – like other versions of the game – allows first-person shooter play from the position of the opponent as a standard feature. While SonicJihad initially joined his fellow gamers in ridiculing the mainstream media, he also expressed astonishment and outrage about a larger politics of reception. In one interview he argued that the media illiteracy of Reuters potentially enabled a whole series of category errors, in which harmless gamers could be demonised as terrorists. It wasn’t intended for the purpose what it was portrayed to be by the media. So no I don’t regret making a funny video . . . why should I? The only thing I regret is thinking that news from Reuters was objective and always right. The least they could do is some online research before publishing this. If they label me al-Qaeda just for making this silly video, that makes you think, what is this al-Qaeda? And is everything al-Qaeda? Although Sonic Jihad dismissed his own work as “silly” or “funny,” he expected considerably more from a credible news agency like Reuters: “objective” reporting, “online research,” and fact-checking before “publishing.” Within the week, almost all of the salient details in the Reuters story were revealed to be incorrect. SonicJihad’s film was not made by terrorists or for terrorists: it was not created by “Islamic militants” for “Muslim youths.” The videogame it depicted had not been modified by a “tech-savvy militant” with advanced programming skills. Of course, what is most extraordinary about this story isn’t just that Reuters merely got its facts wrong; it is that a self-identified “parody” video was shown to the august House Intelligence Committee by a team of well-paid “experts” from the Science Applications International Corporation (SAIC), a major contractor with the federal government, as key evidence of terrorist recruitment techniques and abuse of digital networks. Moreover, this story of media illiteracy unfolded in the context of a fundamental Constitutional debate about domestic surveillance via communications technology and the further regulation of digital content by lawmakers. Furthermore, the transcripts of the actual hearing showed that much more than simple gullibility or technological ignorance was in play. Based on their exchanges in the public record, elected representatives and government experts appear to be keenly aware that the digital discourses of an emerging information culture might be challenging their authority and that of the longstanding institutions of knowledge and power with which they are affiliated. These hearings can be seen as representative of a larger historical moment in which emphatic declarations about prohibiting specific practices in digital culture have come to occupy a prominent place at the podium, news desk, or official Web portal. This environment of cultural reaction can be used to explain why policy makers’ reaction to terrorists’ use of networked communication and digital media actually tells us more about our own American ideologies about technology and rhetoric in a contemporary information environment. When the experts come forward at the Sonic Jihad hearing to “walk us through the media and some of the products,” they present digital artefacts of an information economy that mirrors many of the features of our own consumption of objects of electronic discourse, which seem dangerously easy to copy and distribute and thus also create confusion about their intended meanings, audiences, and purposes. From this one hearing we can see how the reception of many new digital genres plays out in the public sphere of legislative discourse. Web pages, videogames, and Weblogs are mentioned specifically in the transcript. The main architecture of the witnesses’ presentation to the committee is organised according to the rhetorical conventions of a PowerPoint presentation. Moreover, the arguments made by expert witnesses about the relationship of orality to literacy or of public to private communications in new media are highly relevant to how we might understand other important digital genres, such as electronic mail or text messaging. The hearing also invites consideration of privacy, intellectual property, and digital “rights,” because moral values about freedom and ownership are alluded to by many of the elected representatives present, albeit often through the looking glass of user behaviours imagined as radically Other. For example, terrorists are described as “modders” and “hackers” who subvert those who properly create, own, legitimate, and regulate intellectual property. To explain embarrassing leaks of infinitely replicable digital files, witness Ron Roughead says, “We’re not even sure that they don’t even hack into the kinds of spaces that hold photographs in order to get pictures that our forces have taken.” Another witness, Undersecretary of Defense for Policy and International Affairs, Peter Rodman claims that “any video game that comes out, as soon as the code is released, they will modify it and change the game for their needs.” Thus, the implication of these witnesses’ testimony is that the release of code into the public domain can contribute to political subversion, much as covert intrusion into computer networks by stealthy hackers can. However, the witnesses from the Pentagon and from the government contractor SAIC often present a contradictory image of the supposed terrorists in the hearing transcripts. Sometimes the enemy is depicted as an organisation of technological masterminds, capable of manipulating the computer code of unwitting Americans and snatching their rightful intellectual property away; sometimes those from the opposing forces are depicted as pre-modern and even sub-literate political innocents. In contrast, the congressional representatives seem to focus on similarities when comparing the work of “terrorists” to the everyday digital practices of their constituents and even of themselves. According to the transcripts of this open hearing, legislators on both sides of the aisle express anxiety about domestic patterns of Internet reception. Even the legislators’ own Web pages are potentially disruptive electronic artefacts, particularly when the demands of digital labour interfere with their duties as lawmakers. Although the subject of the hearing is ostensibly terrorist Websites, Representative Anna Eshoo (D-California) bemoans the difficulty of maintaining her own official congressional site. As she observes, “So we are – as members, I think we’re very sensitive about what’s on our Website, and if I retained what I had on my Website three years ago, I’d be out of business. So we know that they have to be renewed. They go up, they go down, they’re rebuilt, they’re – you know, the message is targeted to the future.” In their questions, lawmakers identify Weblogs (blogs) as a particular area of concern as a destabilising alternative to authoritative print sources of information from established institutions. Representative Alcee Hastings (D-Florida) compares the polluting power of insurgent bloggers to that of influential online muckrakers from the American political Right. Hastings complains of “garbage on our regular mainstream news that comes from blog sites.” Representative Heather Wilson (R-New Mexico) attempts to project a media-savvy persona by bringing up the “phenomenon of blogging” in conjunction with her questions about jihadist Websites in which she notes how Internet traffic can be magnified by cooperative ventures among groups of ideologically like-minded content-providers: “These Websites, and particularly the most active ones, are they cross-linked? And do they have kind of hot links to your other favorite sites on them?” At one point Representative Wilson asks witness Rodman if he knows “of your 100 hottest sites where the Webmasters are educated? What nationality they are? Where they’re getting their money from?” In her questions, Wilson implicitly acknowledges that Web work reflects influences from pedagogical communities, economic networks of the exchange of capital, and even potentially the specific ideologies of nation-states. It is perhaps indicative of the government contractors’ anachronistic worldview that the witness is unable to answer Wilson’s question. He explains that his agency focuses on the physical location of the server or ISP rather than the social backgrounds of the individuals who might be manufacturing objectionable digital texts. The premise behind the contractors’ working method – surveilling the technical apparatus not the social network – may be related to other beliefs expressed by government witnesses, such as the supposition that jihadist Websites are collectively produced and spontaneously emerge from the indigenous, traditional, tribal culture, instead of assuming that Iraqi insurgents have analogous beliefs, practices, and technological awareness to those in first-world countries. The residual subtexts in the witnesses’ conjectures about competing cultures of orality and literacy may tell us something about a reactionary rhetoric around videogames and digital culture more generally. According to the experts before Congress, the Middle Eastern audience for these videogames and Websites is limited by its membership in a pre-literate society that is only capable of abortive cultural production without access to knowledge that is archived in printed codices. Sometimes the witnesses before Congress seem to be unintentionally channelling the ideas of the late literacy theorist Walter Ong about the “secondary orality” associated with talky electronic media such as television, radio, audio recording, or telephone communication. Later followers of Ong extend this concept of secondary orality to hypertext, hypermedia, e-mail, and blogs, because they similarly share features of both speech and written discourse. Although Ong’s disciples celebrate this vibrant reconnection to a mythic, communal past of what Kathleen Welch calls “electric rhetoric,” the defence industry consultants express their profound state of alarm at the potentially dangerous and subversive character of this hybrid form of communication. The concept of an “oral tradition” is first introduced by the expert witnesses in the context of modern marketing and product distribution: “The Internet is used for a variety of things – command and control,” one witness states. “One of the things that’s missed frequently is how and – how effective the adversary is at using the Internet to distribute product. They’re using that distribution network as a modern form of oral tradition, if you will.” Thus, although the Internet can be deployed for hierarchical “command and control” activities, it also functions as a highly efficient peer-to-peer distributed network for disseminating the commodity of information. Throughout the hearings, the witnesses imply that unregulated lateral communication among social actors who are not authorised to speak for nation-states or to produce legitimated expert discourses is potentially destabilising to political order. Witness Eric Michael describes the “oral tradition” and the conventions of communal life in the Middle East to emphasise the primacy of speech in the collective discursive practices of this alien population: “I’d like to point your attention to the media types and the fact that the oral tradition is listed as most important. The other media listed support that. And the significance of the oral tradition is more than just – it’s the medium by which, once it comes off the Internet, it is transferred.” The experts go on to claim that this “oral tradition” can contaminate other media because it functions as “rumor,” the traditional bane of the stately discourse of military leaders since the classical era. The oral tradition now also has an aspect of rumor. A[n] event takes place. There is an explosion in a city. Rumor is that the United States Air Force dropped a bomb and is doing indiscriminate killing. This ends up being discussed on the street. It ends up showing up in a Friday sermon in a mosque or in another religious institution. It then gets recycled into written materials. Media picks up the story and broadcasts it, at which point it’s now a fact. In this particular case that we were telling you about, it showed up on a network television, and their propaganda continues to go back to this false initial report on network television and continue to reiterate that it’s a fact, even though the United States government has proven that it was not a fact, even though the network has since recanted the broadcast. In this example, many-to-many discussion on the “street” is formalised into a one-to many “sermon” and then further stylised using technology in a one-to-many broadcast on “network television” in which “propaganda” that is “false” can no longer be disputed. This “oral tradition” is like digital media, because elements of discourse can be infinitely copied or “recycled,” and it is designed to “reiterate” content. In this hearing, the word “rhetoric” is associated with destructive counter-cultural forces by the witnesses who reiterate cultural truisms dating back to Plato and the Gorgias. For example, witness Eric Michael initially presents “rhetoric” as the use of culturally specific and hence untranslatable figures of speech, but he quickly moves to an outright castigation of the entire communicative mode. “Rhetoric,” he tells us, is designed to “distort the truth,” because it is a “selective” assembly or a “distortion.” Rhetoric is also at odds with reason, because it appeals to “emotion” and a romanticised Weltanschauung oriented around discourses of “struggle.” The film by SonicJihad is chosen as the final clip by the witnesses before Congress, because it allegedly combines many different types of emotional appeal, and thus it conveniently ties together all of the themes that the witnesses present to the legislators about unreliable oral or rhetorical sources in the Middle East: And there you see how all these products are linked together. And you can see where the games are set to psychologically condition you to go kill coalition forces. You can see how they use humor. You can see how the entire campaign is carefully crafted to first evoke an emotion and then to evoke a response and to direct that response in the direction that they want. Jihadist digital products, especially videogames, are effective means of manipulation, the witnesses argue, because they employ multiple channels of persuasion and carefully sequenced and integrated subliminal messages. To understand the larger cultural conversation of the hearing, it is important to keep in mind that the related argument that “games” can “psychologically condition” players to be predisposed to violence is one that was important in other congressional hearings of the period, as well one that played a role in bills and resolutions that were passed by the full body of the legislative branch. In the witness’s testimony an appeal to anti-game sympathies at home is combined with a critique of a closed anti-democratic system abroad in which the circuits of rhetorical production and their composite metonymic chains are described as those that command specific, unvarying, robotic responses. This sharp criticism of the artful use of a presentation style that is “crafted” is ironic, given that the witnesses’ “compilation” of jihadist digital material is staged in the form of a carefully structured PowerPoint presentation, one that is paced to a well-rehearsed rhythm of “slide, please” or “next slide” in the transcript. The transcript also reveals that the members of the House Intelligence Committee were not the original audience for the witnesses’ PowerPoint presentation. Rather, when it was first created by SAIC, this “expert” presentation was designed for training purposes for the troops on the ground, who would be facing the challenges of deployment in hostile terrain. According to the witnesses, having the slide show showcased before Congress was something of an afterthought. Nonetheless, Congressman Tiahrt (R-KN) is so impressed with the rhetorical mastery of the consultants that he tries to appropriate it. As Tiarht puts it, “I’d like to get a copy of that slide sometime.” From the hearing we also learn that the terrorists’ Websites are threatening precisely because they manifest a polymorphously perverse geometry of expansion. For example, one SAIC witness before the House Committee compares the replication and elaboration of digital material online to a “spiderweb.” Like Representative Eshoo’s site, he also notes that the terrorists’ sites go “up” and “down,” but the consultant is left to speculate about whether or not there is any “central coordination” to serve as an organising principle and to explain the persistence and consistency of messages despite the apparent lack of a single authorial ethos to offer a stable, humanised, point of reference. In the hearing, the oft-cited solution to the problem created by the hybridity and iterability of digital rhetoric appears to be “public diplomacy.” Both consultants and lawmakers seem to agree that the damaging messages of the insurgents must be countered with U.S. sanctioned information, and thus the phrase “public diplomacy” appears in the hearing seven times. However, witness Roughhead complains that the protean “oral tradition” and what Henry Jenkins has called the “transmedia” character of digital culture, which often crosses several platforms of traditional print, projection, or broadcast media, stymies their best rhetorical efforts: “I think the point that we’ve tried to make in the briefing is that wherever there’s Internet availability at all, they can then download these – these programs and put them onto compact discs, DVDs, or post them into posters, and provide them to a greater range of people in the oral tradition that they’ve grown up in. And so they only need a few Internet sites in order to distribute and disseminate the message.” Of course, to maintain their share of the government market, the Science Applications International Corporation also employs practices of publicity and promotion through the Internet and digital media. They use HTML Web pages for these purposes, as well as PowerPoint presentations and online video. The rhetoric of the Website of SAIC emphasises their motto “From Science to Solutions.” After a short Flash film about how SAIC scientists and engineers solve “complex technical problems,” the visitor is taken to the home page of the firm that re-emphasises their central message about expertise. The maps, uniforms, and specialised tools and equipment that are depicted in these opening Web pages reinforce an ethos of professional specialisation that is able to respond to multiple threats posed by the “global war on terror.” By 26 June 2006, the incident finally was being described as a “Pentagon Snafu” by ABC News. From the opening of reporter Jake Tapper’s investigative Webcast, established government institutions were put on the spot: “So, how much does the Pentagon know about videogames? Well, when it came to a recent appearance before Congress, apparently not enough.” Indeed, the very language about “experts” that was highlighted in the earlier coverage is repeated by Tapper in mockery, with the significant exception of “independent expert” Ian Bogost of the Georgia Institute of Technology. If the Pentagon and SAIC deride the legitimacy of rhetoric as a cultural practice, Bogost occupies himself with its defence. In his recent book Persuasive Games: The Expressive Power of Videogames, Bogost draws upon the authority of the “2,500 year history of rhetoric” to argue that videogames represent a significant development in that cultural narrative. Given that Bogost and his Watercooler Games Weblog co-editor Gonzalo Frasca were actively involved in the detective work that exposed the depth of professional incompetence involved in the government’s line-up of witnesses, it is appropriate that Bogost is given the final words in the ABC exposé. As Bogost says, “We should be deeply bothered by this. We should really be questioning the kind of advice that Congress is getting.” Bogost may be right that Congress received terrible counsel on that day, but a close reading of the transcript reveals that elected officials were much more than passive listeners: in fact they were lively participants in a cultural conversation about regulating digital media. After looking at the actual language of these exchanges, it seems that the persuasiveness of the misinformation from the Pentagon and SAIC had as much to do with lawmakers’ preconceived anxieties about practices of computer-mediated communication close to home as it did with the contradictory stereotypes that were presented to them about Internet practices abroad. In other words, lawmakers found themselves looking into a fun house mirror that distorted what should have been familiar artefacts of American popular culture because it was precisely what they wanted to see. References ABC News. “Terrorist Videogame?” Nightline Online. 21 June 2006. 22 June 2006 http://abcnews.go.com/Video/playerIndex?id=2105341>. Bogost, Ian. Persuasive Games: Videogames and Procedural Rhetoric. Cambridge, MA: MIT Press, 2007. Game Politics. “Was Congress Misled by ‘Terrorist’ Game Video? We Talk to Gamer Who Created the Footage.” 11 May 2006. http://gamepolitics.livejournal.com/285129.html#cutid1>. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York UP, 2006. julieb. “David Morgan Is a Horrible Writer and Should Be Fired.” Online posting. 5 May 2006. Dvorak Uncensored Cage Match Forums. http://cagematch.dvorak.org/index.php/topic,130.0.html>. Mahmood. “Terrorists Don’t Recruit with Battlefield 2.” GGL Global Gaming. 16 May 2006 http://www.ggl.com/news.php?NewsId=3090>. Morgan, David. “Islamists Using U.S. Video Games in Youth Appeal.” Reuters online news service. 4 May 2006 http://today.reuters.com/news/ArticleNews.aspx?type=topNews &storyID=2006-05-04T215543Z_01_N04305973_RTRUKOC_0_US-SECURITY- VIDEOGAMES.xml&pageNumber=0&imageid=&cap=&sz=13&WTModLoc= NewsArt-C1-ArticlePage2>. Ong, Walter J. Orality and Literacy: The Technologizing of the Word. London/New York: Methuen, 1982. Parker, Trey. Online posting. 7 May 2006. 9 May 2006 http://www.treyparker.com>. Plato. “Gorgias.” Plato: Collected Dialogues. Princeton: Princeton UP, 1961. Shrader, Katherine. “Pentagon Surfing Thousands of Jihad Sites.” Associated Press 4 May 2006. SonicJihad. “SonicJihad: A Day in the Life of a Resistance Fighter.” Online posting. 26 Dec. 2005. Planet Battlefield Forums. 9 May 2006 http://www.forumplanet.com/planetbattlefield/topic.asp?fid=13670&tid=1806909&p=1>. Tapper, Jake, and Audery Taylor. “Terrorist Video Game or Pentagon Snafu?” ABC News Nightline 21 June 2006. 30 June 2006 http://abcnews.go.com/Nightline/Technology/story?id=2105128&page=1>. U.S. Congressional Record. Panel I of the Hearing of the House Select Intelligence Committee, Subject: “Terrorist Use of the Internet for Communications.” Federal News Service. 4 May 2006. Welch, Kathleen E. Electric Rhetoric: Classical Rhetoric, Oralism, and the New Literacy. Cambridge, MA: MIT Press, 1999. Citation reference for this article MLA Style Losh, Elizabeth. "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/08-losh.php>. APA Style Losh, E. (Oct. 2007) "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/08-losh.php>.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Self-defense equipment industry"

1

inc, International Resource Development, ed. Portable personal self-defense products. Norwalk, Conn., U.S.A. (6 Prowitt St., Norwalk 06855): International Resource Development, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Self-defense equipment industry"

1

Lemm, Thomas C. "DuPont: Safety Management in a Re-Engineered Corporate Culture." In ASME 1996 Citrus Engineering Conference. American Society of Mechanical Engineers, 1996. http://dx.doi.org/10.1115/cec1996-4202.

Full text
Abstract:
Attention to safety and health are of ever-increasing priority to industrial organizations. Good Safety is demanded by stockholders, employees, and the community while increasing injury costs provide additional motivation for safety and health excellence. Safety has always been a strong corporate value of DuPont and a vital part of its culture. As a result, DuPont has become a benchmark in safety and health performance. Since 1990, DuPont has re-engineered itself to meet global competition and address future vision. In the new re-engineered organizational structures, DuPont has also had to re-engineer its safety management systems. A special Discovery Team was chartered by DuPont senior management to determine the “best practices’ for safety and health being used in DuPont best-performing sites. A summary of the findings is presented, and five of the practices are discussed. Excellence in safety and health management is more important today than ever. Public awareness, federal and state regulations, and enlightened management have resulted in a widespread conviction that all employees have the right to work in an environment that will not adversely affect their safety and health. In DuPont, we believe that excellence in safety and health is necessary to achieve global competitiveness, maintain employee loyalty, and be an accepted member of the communities in which we make, handle, use, and transport products. Safety can also be the “catalyst” to achieving excellence in other important business parameters. The organizational and communication skills developed by management, individuals, and teams in safety can be directly applied to other company initiatives. As we look into the 21st Century, we must also recognize that new organizational structures (flatter with empowered teams) will require new safety management techniques and systems in order to maintain continuous improvement in safety performance. Injury costs, which have risen dramatically in the past twenty years, provide another incentive for safety and health excellence. Shown in the Figure 1, injury costs have increased even after correcting for inflation. Many companies have found these costs to be an “invisible drain” on earnings and profitability. In some organizations, significant initiatives have been launched to better manage the workers’ compensation systems. We have found that the ultimate solution is to prevent injuries and incidents before they occur. A globally-respected company, DuPont is regarded as a well-managed, extremely ethical firm that is the benchmark in industrial safety performance. Like many other companies, DuPont has re-engineered itself and downsized its operations since 1985. Through these changes, we have maintained dedication to our principles and developed new techniques to manage in these organizational environments. As a diversified company, our operations involve chemical process facilities, production line operations, field activities, and sales and distribution of materials. Our customer base is almost entirely industrial and yet we still maintain a high level of consumer awareness and positive perception. The DuPont concern for safety dates back to the early 1800s and the first days of the company. In 1802 E.I. DuPont, a Frenchman, began manufacturing quality grade explosives to fill America’s growing need to build roads, clear fields, increase mining output, and protect its recently won independence. Because explosives production is such a hazardous industry, DuPont recognized and accepted the need for an effective safety effort. The building walls of the first powder mill near Wilmington, Delaware, were built three stones thick on three sides. The back remained open to the Brandywine River to direct any explosive forces away from other buildings and employees. To set the safety example, DuPont also built his home and the homes of his managers next to the powder yard. An effective safety program was a necessity. It represented the first defense against instant corporate liquidation. Safety needs more than a well-designed plant, however. In 1811, work rules were posted in the mill to guide employee work habits. Though not nearly as sophisticated as the safety standards of today, they did introduce an important basic concept — that safety must be a line management responsibility. Later, DuPont introduced an employee health program and hired a company doctor. An early step taken in 1912 was the keeping of safety statistics, approximately 60 years before the federal requirement to do so. We had a visible measure of our safety performance and were determined that we were going to improve it. When the nation entered World War I, the DuPont Company supplied 40 percent of the explosives used by the Allied Forces, more than 1.5 billion pounds. To accomplish this task, over 30,000 new employees were hired and trained to build and operate many plants. Among these facilities was the largest smokeless powder plant the world had ever seen. The new plant was producing granulated powder in a record 116 days after ground breaking. The trends on the safety performance chart reflect the problems that a large new work force can pose until the employees fully accept the company’s safety philosophy. The first arrow reflects the World War I scale-up, and the second arrow represents rapid diversification into new businesses during the 1920s. These instances of significant deterioration in safety performance reinforced DuPont’s commitment to reduce the unsafe acts that were causing 96 percent of our injuries. Only 4 percent of injuries result from unsafe conditions or equipment — the remainder result from the unsafe acts of people. This is an important concept if we are to focus our attention on reducing injuries and incidents within the work environment. World War II brought on a similar set of demands. The story was similar to World War I but the numbers were even more astonishing: one billion dollars in capital expenditures, 54 new plants, 75,000 additional employees, and 4.5 billion pounds of explosives produced — 20 percent of the volume used by the Allied Forces. Yet, the performance during the war years showed no significant deviation from the pre-war years. In 1941, the DuPont Company was 10 times safer than all industry and 9 times safer than the Chemical Industry. Management and the line organization were finally working as they should to control the real causes of injuries. Today, DuPont is about 50 times safer than US industrial safety performance averages. Comparing performance to other industries, it is interesting to note that seemingly “hazard-free” industries seem to have extraordinarily high injury rates. This is because, as DuPont has found out, performance is a function of injury prevention and safety management systems, not hazard exposure. Our success in safety results from a sound safety management philosophy. Each of the 125 DuPont facilities is responsible for its own safety program, progress, and performance. However, management at each of these facilities approaches safety from the same fundamental and sound philosophy. This philosophy can be expressed in eleven straightforward principles. The first principle is that all injuries can be prevented. That statement may seem a bit optimistic. In fact, we believe that this is a realistic goal and not just a theoretical objective. Our safety performance proves that the objective is achievable. We have plants with over 2,000 employees that have operated for over 10 years without a lost time injury. As injuries and incidents are investigated, we can always identify actions that could have prevented that incident. If we manage safety in a proactive — rather than reactive — manner, we will eliminate injuries by reducing the acts and conditions that cause them. The second principle is that management, which includes all levels through first-line supervisors, is responsible and accountable for preventing injuries. Only when senior management exerts sustained and consistent leadership in establishing safety goals, demanding accountability for safety performance and providing the necessary resources, can a safety program be effective in an industrial environment. The third principle states that, while recognizing management responsibility, it takes the combined energy of the entire organization to reach sustained, continuous improvement in safety and health performance. Creating an environment in which employees feel ownership for the safety effort and make significant contributions is an essential task for management, and one that needs deliberate and ongoing attention. The fourth principle is a corollary to the first principle that all injuries are preventable. It holds that all operating exposures that may result in injuries or illnesses can be controlled. No matter what the exposure, an effective safeguard can be provided. It is preferable, of course, to eliminate sources of danger, but when this is not reasonable or practical, supervision must specify measures such as special training, safety devices, and protective clothing. Our fifth safety principle states that safety is a condition of employment. Conscientious assumption of safety responsibility is required from all employees from their first day on the job. Each employee must be convinced that he or she has a responsibility for working safely. The sixth safety principle: Employees must be trained to work safely. We have found that an awareness for safety does not come naturally and that people have to be trained to work safely. With effective training programs to teach, motivate, and sustain safety knowledge, all injuries and illnesses can be eliminated. Our seventh principle holds that management must audit performance on the workplace to assess safety program success. Comprehensive inspections of both facilities and programs not only confirm their effectiveness in achieving the desired performance, but also detect specific problems and help to identify weaknesses in the safety effort. The Company’s eighth principle states that all deficiencies must be corrected promptly. Without prompt action, risk of injuries will increase and, even more important, the credibility of management’s safety efforts will suffer. Our ninth principle is a statement that off-the-job safety is an important part of the overall safety effort. We do not expect nor want employees to “turn safety on” as they come to work and “turn it off” when they go home. The company safety culture truly becomes of the individual employee’s way of thinking. The tenth principle recognizes that it’s good business to prevent injuries. Injuries cost money. However, hidden or indirect costs usually exceed the direct cost. Our last principle is the most important. Safety must be integrated as core business and personal value. There are two reasons for this. First, we’ve learned from almost 200 years of experience that 96 percent of safety incidents are directly caused by the action of people, not by faulty equipment or inadequate safety standards. But conversely, it is our people who provide the solutions to our safety problems. They are the one essential ingredient in the recipe for a safe workplace. Intelligent, trained, and motivated employees are any company’s greatest resource. Our success in safety depends upon the men and women in our plants following procedures, participating actively in training, and identifying and alerting each other and management to potential hazards. By demonstrating a real concern for each employee, management helps establish a mutual respect, and the foundation is laid for a solid safety program. This, of course, is also the foundation for good employee relations. An important lesson learned in DuPont is that the majority of injuries are caused by unsafe acts and at-risk behaviors rather than unsafe equipment or conditions. In fact, in several DuPont studies it was estimated that 96 percent of injuries are caused by unsafe acts. This was particularly revealing when considering safety audits — if audits were only focused on conditions, at best we could only prevent four percent of our injuries. By establishing management systems for safety auditing that focus on people, including audit training, techniques, and plans, all incidents are preventable. Of course, employee contribution and involvement in auditing leads to sustainability through stakeholdership in the system. Management safety audits help to make manage the “behavioral balance.” Every job and task performed at a site can do be done at-risk or safely. The essence of a good safety system ensures that safe behavior is the accepted norm amongst employees, and that it is the expected and respected way of doing things. Shifting employees norms contributes mightily to changing culture. The management safety audit provides a way to quantify these norms. DuPont safety performance has continued to improve since we began keeping records in 1911 until about 1990. In the 1990–1994 time frame, performance deteriorated as shown in the chart that follows: This increase in injuries caused great concern to senior DuPont management as well as employees. It occurred while the corporation was undergoing changes in organization. In order to sustain our technological, competitive, and business leadership positions, DuPont began re-engineering itself beginning in about 1990. New streamlined organizational structures and collaborative work processes eliminated many positions and levels of management and supervision. The total employment of the company was reduced about 25 percent during these four years. In our traditional hierarchical organization structures, every level of supervision and management knew exactly what they were expected to do with safety, and all had important roles. As many of these levels were eliminated, new systems needed to be identified for these new organizations. In early 1995, Edgar S. Woolard, DuPont Chairman, chartered a Corporate Discovery Team to look for processes that will put DuPont on a consistent path toward a goal of zero injuries and occupational illnesses. The cross-functional team used a mode of “discovery through learning” from as many DuPont employees and sites around the world. The Discovery Team fostered the rapid sharing and leveraging of “best practices” and innovative approaches being pursued at DuPont’s plants, field sites, laboratories, and office locations. In short, the team examined the company’s current state, described the future state, identified barriers between the two, and recommended key ways to overcome these barriers. After reporting back to executive management in April, 1995, the Discovery Team was realigned to help organizations implement their recommendations. The Discovery Team reconfirmed key values in DuPont — in short, that all injuries, incidents, and occupational illnesses are preventable and that safety is a source of competitive advantage. As such, the steps taken to improve safety performance also improve overall competitiveness. Senior management made this belief clear: “We will strengthen our business by making safety excellence an integral part of all business activities.” One of the key findings of the Discovery Team was the identification of the best practices used within the company, which are listed below: ▪ Felt Leadership – Management Commitment ▪ Business Integration ▪ Responsibility and Accountability ▪ Individual/Team Involvement and Influence ▪ Contractor Safety ▪ Metrics and Measurements ▪ Communications ▪ Rewards and Recognition ▪ Caring Interdependent Culture; Team-Based Work Process and Systems ▪ Performance Standards and Operating Discipline ▪ Training/Capability ▪ Technology ▪ Safety and Health Resources ▪ Management and Team Audits ▪ Deviation Investigation ▪ Risk Management and Emergency Response ▪ Process Safety ▪ Off-the-Job Safety and Health Education Attention to each of these best practices is essential to achieve sustained improvements in safety and health. The Discovery Implementation in conjunction with DuPont Safety and Environmental Management Services has developed a Safety Self-Assessment around these systems. In this presentation, we will discuss a few of these practices and learn what they mean. Paper published with permission.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography