Academic literature on the topic 'Tulsa City-County Library System'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Tulsa City-County Library System.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Tulsa City-County Library System"

1

Waters, Richard L. "Tulsa City-County Public Library." Public Library Quarterly 22, no. 4 (September 2003): 59–61. http://dx.doi.org/10.1300/j118v22n04_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wainwright, Amy, and Michelle Millet. "Social justice, history, and inequity in Cleveland: An overview." College & Research Libraries News 80, no. 2 (February 4, 2019): 105. http://dx.doi.org/10.5860/crln.80.2.105.

Full text
Abstract:
When we first volunteered to be on the Local Arrangements Committee for the ACRL 2019 conference, and to write this specific piece for our colleagues who were coming to our city, neither of us had a clue that the entire third season of the true crime podcast Serial1 would focus on the criminal justice system of Cuyahoga County. But since it was so popular, we considered it a good framing device for a discussion about social justice in Cleveland.If you haven’t listened to Serial, the short version is Cleveland and Cuyahoga County’s criminal and juvenile justice system are shining examples of the inequity that exists in the region. Poverty, segregation, violence, food deserts, crime, and an unfair justice system are all parts of the larger system that remains unjust and unequal in the heart of a Rust Belt city desperate to rise again.
APA, Harvard, Vancouver, ISO, and other styles
3

Stephens, Em. "Syndromic Surveillance on the Mental Health Impact of Political Rallies in Charlottesville, Virginia." Online Journal of Public Health Informatics 10, no. 1 (May 22, 2018). http://dx.doi.org/10.5210/ojphi.v10i1.8974.

Full text
Abstract:
ObjectiveTo describe the impact of civil unrest on the mental health of a community in near real-time using syndromic surveillance.IntroductionAs part of a wide-spread community discussion on the presence of monuments to Confederate Civil War figures, the Charlottesville city council voted to remove a statue of General Robert E. Lee.1 Multiple rallies were then held to protest the statue’s removal. A Ku Klux Klan (KKK) rally on July 8, 2017 (MMWR Week 27) and a Unite the Right rally on August 12, 2017 (MMWR Week 32) held in Charlottesville both resulted in violence and media attention.2,3 The violence associated with the Unite the Right rally included fatalities connected to motor vehicle and helicopter crashes.Syndromic surveillance has been used to study the impact of terrorism on a community’s mental health4 while more traditional data sources have looked at the impact of racially-charged civil unrest.5 Syndromic surveillance, however, has not previously been used to document the effect of racially-charged violence on the health of a community.MethodsThe Virginia Department of Health (VDH) analyzed syndromic surveillance data from three emergency departments (EDs) in the Charlottesville area (defined to include Charlottesville city and Albemarle county), regardless of patient residence following the Unite the Right rally. Visits to these EDs between January 1 and September 2, 2017 were analyzed using the Enhanced Surveillance System for the Early Notification of Community-based Epidemics (ESSENCE) and Microsoft SQL 2012. Encounters were identified as acute anxiety-related visits based on an International Classification of Diseases, Tenth Revision (ICD-10) discharge diagnosis beginning with ’F41’. Analyses were conducted using the ESSENCE algorithm EWMA 1.2 and SAS 9.3.ResultsThe greatest number of visits with a primary diagnosis of anxiety in 2017 (N=20) was observed in MMWR week 34 (August 20-26). This represented a statistically significant increase over baseline with a p-value of 0.01.By race, a significant increase over baseline in visits with a primary diagnosis of anxiety was observed among blacks or African Americans. The largest volume of visits was observed in MMWR week 33 with a total of 8 identified visits or 1.8% of total ED visit volume. The increase in visits for anxiety observed in weeks 33-35 was 2.2 times greater among blacks or African Americans than it was among whites, p = 0.016, 95% CI [1.14, 4.16].ConclusionsPrevious work done in Virginia to identify ED visits related to anxiety included only chief complaint criteria in the syndrome definition. Due to a change in how one ED in the Charlottesville area reported data during the study period, this syndrome definition could not be applied. In order to remove any potential data artifacts, only those visits with an initial diagnosis of anxiety were included in the analysis. The resulting syndrome definition likely underestimated the occurrence of anxiety in the Charlottesville area, both because it lacked chief complaint information and because syndromic surveillance does not include data on visits to mental health providers outside of EDs. This analysis presents a trend over time rather than a true measure of the prevalence of anxiety.This analysis, while conservative in its inclusion criteria, still identified an increase in visits for anxiety, particularly among blacks or African Americans. In today’s political environment of race-related civil unrest, a way to measure the burden of mental illness occurring in the community can be invaluable for public health response. In Charlottesville, the identification of a community-wide need for mental health support prompted many local providers to offer their services to those in need pro-bono.6References1 Suarez, C. (2017, February 6). Charlottesville City Council votes to remove statue from Lee Park. The Daily Progress. Retrieved from http://bit.ly/2wYOHhv2 Spencer, H., & Stevens, M. (2017, July 8). 23 Arrested and Tear Gas Deployed After a K.K.K. Rally in Virginia. The New York Times. Retrieved from http://nyti.ms/2tCiBGU3 Hanna, J., Hartung, K., Sayers, D., & Almasy, S. (2017, August 13). Virginia governor to white nationalists: ‘Go home … shame on you’. CNN. Retrieved from http://cnn.it/2vvAGHt4 Vandentorren, S., Paty, A. C., Baffert, E., Chansard, P., Caserio-Schönemann, C. (2016, February). Syndromic surveillance during the Paris terrorist attacks. The Lancet (387(10021), 846-847. doi:10.1016/S0140-6736(16)00507-95 Yimgang, D. P., Wang, Y., Paik, G., Hager, E. R., & Black, M. M. Civil Unrest in the Context of Chronic Community Violence: Impact on Maternal Depressive Symptoms. American Journal of Public Health 107(9), 1455-1462. doi:10.2105/AJPH.2017.3038766 DeLuca, P. (2017, August 19). Downtown Charlottesville Library Offers Free Counseling. NBC29.com. Retrieved from http://bit.ly/2yIzHbl
APA, Harvard, Vancouver, ISO, and other styles
4

Albert, Stefanie P., and Rosa Ergas. "Public Health Impact of Syndromic Surveillance Data—A Literature Survey." Online Journal of Public Health Informatics 10, no. 1 (May 22, 2018). http://dx.doi.org/10.5210/ojphi.v10i1.8645.

Full text
Abstract:
ObjectiveTo assess evidence for public health impact of syndromic surveillance.IntroductionSystematic syndromic surveillance is undergoing a transition. Building on traditional roots in bioterrorism and situational awareness, proponents are demonstrating the timeliness and informative power of syndromic surveillance data to supplement other surveillance data.MethodsWe used PubMed and Google Scholar to identify articles published since 2007 using key words of interest (e.g., syndromic surveillance in combinations with emergency, evaluation, quality assurance, alerting). The following guiding questions were used to abstract impact measures of syndromic surveillance: 1) what was the public health impact; what decisions or actions occurred because of use of syndromic surveillance data?, 2) were there specific interventions or performance measures for this impact?, and 3) how, and by whom, was this information used?ResultsThirty-five papers were included. Almost all articles (n=33) remarked on the ability of syndromic surveillance to improve public health because of timeliness and/or accuracy of data. Thirty-four articles mentioned that syndromic surveillance data was used or could be useful. However, evidence of health impact directly attributable to syndromic surveillance efforts were lacking. Two articles described how syndromic data were used for decision-making. One article measured the effect of data utilization.ConclusionsWithin the syndromic surveillance literature instances of a conceptual shift from detection to practical response are plentiful. As the field of syndromic surveillance continues to evolve and is used by public health institutions, further evaluation of data utility and impact is needed.ReferencesAyala, A., Berisha, V., Goodin, K., Pogreba-Brown, K., Levy, C., McKinney, B., Koski, L., & Imholte, S. (2016). Public health surveillance strategies for mass gatherings: Super Bowl XLIX and related events, Maricopa County, Arizona, 2015. Health Security, 14(3), 173-84. doi: 10.1089/hs.2016.0029.Bermis, K., Frias, M., Patel, M.T., & Christiansen, D. (2017). Using an Emergency Department Syndromic Surveillance System to Evaluate Reporting of Potential Rabies Exposures, Illinois, 2013-2015. Public Health Reports 132(Supplement 1) 59S-64S."Borroto, R., Williamson, B., Pitcher, P., Ballester, L., Smith, W., Soetebier, K., & Drenzek, C. (2016). Using Syndromic Surveillance Alert Protocols for Epidemiologic Response in Georgia. Online Journal of Public Health Informatics 9(1):e123. doi:10.5210/ojphi.v9i1.7707."Daly, E.R., Dufault, K., Swenson, D.J., Lakevicius, P., Metcalf, E., & Chan, B.P. (2017). Use of emergency department data to monitor and respond to an increase in opioid overdoses in New Hampshire 2011-2015. Public Health Reports 132(Supplement 1) 73S-79S. doi: 10.1177/0033354917707934Deyneka, L., Hakenewerth, A., Faigen, Z., Ising, A., & Barnett, C. (2017). Using syndromic surveillance data to monitor endocarditis and sepsis among drug users. Online Journal of Public Health Informatics, (9)1. doi: http://dx.doi.org/10.5210/ojphi.v9i1.7708DeYoung, K., Chen, Y., Beum, R., Askenazi, M., Zimmerman, C., & Davidson, A. J. (2017). Validation of a syndromic case definition for detecting emergency department visits potentially related to marijuana. Public Health Reports, epublication.doi: 10.1177/0033354917708987"Dinh, M.M., Kastelein, C., Bein, K.J., Bautovich, T., & Ivers, R. (2015). Use of a syndromic surveillance system to describe the trend in cycling-related presentations to emergency departments in Sydney. Emergency Medicine Australasia, 27(4), 343-7. doi: 10.1111/1742-6723.12422Gevitz, K., Madera, R., Newbern, C., Lojo, J., & Johnson, C. Risk of Fall-Related Injury due to Adverse Weather Events, Philadelphia, Pennsylvania, 2006-2011. Public Health Reports (132) 53S-58S. doi: 10.1177/0033354917706968"Gonzales-Colon, F.J., Lake, I., Barker, G., Smith, G.E., Elliot, A.J., & Morbey, R. (2016). Using Bayesian Networks to assist decision-making in syndromic surveillance. Online Journal of Public Health Informatics, 8(1), e15. doi:10.5210/ojphi.v8i1.6415"Harmon, KJ., Proescholdbell, S., Marshall, S., & Waller, A. (2014). Utilization of emergency department data for drug overdose surveillance in North Carolina. Online Journal of Public Health Informatics 6(1), e174. doi: 10.5210/ojphi.v6i1.5200Harris, J.K., Mansour, R., Choucair, B., Olson, J., Nissen, C., & Bhatt, J. (2014). Health department use of social media to identify foodborne illness—Chicago, Illinois, 2013-2014. MMWR Morbidity and Mortality Weekly Report 63(32), 681-685. Retrieved from: https://www.cdc.gov/mmwr/preview/mmwrhtml/mm6332a1.htm"Harrison, C., Jorder, M., Stern, H., Stavinksy, F., Reddy, V., Hanson, H., Waechter, H., Lowe, L., Gravano, L., & Balter, S. (2014). Using online reviews by restaurant patrons to identify unreported cases of foodborne illness — New York City, 2012–2013. MMWR Morbidity and Mortality Weekly Report 63(20), 441-445. Retrieved from:https://www.cdc.gov/MMWr/preview/mmwrhtml/mm6320a1.htm"Hawkins, J.B., Tuli, G., Kluberg, S., Harris, J., Brownstein, J.S., & Nsoesie, E. (2016). A digital platform for local foodborne illness and outbreak surveillance. Online Journal of Public Health Informatics 8(1), e60. http://dx.doi.org/10.5210/ojphi.v8i1.6474Hines, J.Z., Bancroft, J., Powell, M., & Hedberg, K. (2017). Case finding using syndromic surveillance data during an outbreak of Shiga Toxin–Producing Escherichia coli O26 infections, Oregon, 2015. Public Health Reports, epublication. https://doi.org/10.1177/0033354917708994Hudson, L. T., Klekamp, B.G., & Matthews, S.D. (2017). Local Public Health Surveillance of Heroin-Related Morbidity and Mortality, Orange County, Florida, 2010-2014. Public Health Reports (132), 80S-87SHughes, H.E., Morbey, R., Hughes, T.C., Locker, T.E., Pebody, R., Green, H.K., Ellis, J., Smith, G.E., & Elliot, A.J. (2016). Emergency department syndromic surveillance providing early warning of seasonal respiratory activity in England. Epidemiology and Infection, 144(5), 1052-64. doi: 10.1017/S0950268815002125Hughes, H.E., Morbey, R., Hughes, T.C., Locker, T.E., Shannon, T., Carmichael, C., Murray, V., Ibbotson, S., Catchpole, M., McCloskey, B., Smith, G., & Elliot, A.J. (2014). Using an emergency department syndromic surveillance system to investigate the impact of extreme cold weather events. Public Health, 128(7), 628-635. doi: 10.1016/j.puhe.2014.05.007Ising, A., Proescholdbell, S., Harmon, K.J., Sachdeva, N., Marshall, S.W., & Waller, A.E. (2016). Use of syndromic surveillance data to monitor poisonings and drug overdoses in state and local public health agencies. Injury Prevention 22:i43-i49.http://dx.doi.org/10.1136/injuryprev-2015-041821"Johnson, J. I., & Brown, K. (2015). Validation of emergency department and outpatient data using ILI syndrome classifiers. Online Journal of Public Health Informatics, 7(1), e83. http://doi.org/10.5210/ojphi.v7i1.5749Lall, R., Abdelnabi , J., Ngai, S., Parton, H.B., Saunders, K., Sell, J., Wahnich, A., Weiss, D., Marthes, R.W. (2017). Advancing the Use of Emergency Department Syndromic Surveillance Data, New York City, 2012-2016. Public Health Reports (132), 23S-30SLiljeqvist, H. T., Muscatello, D., Sara, G., Dinh, M., & Lawrence, G. L. (2014). Accuracy of automatic syndromic classification of coded emergency department diagnoses in identifying mental health-related presentations for public health surveillance. BMC Medical Informatics and Decision Making, 14(84). http://doi.org/10.1186/1472-6947-14-84Lober, W. B., Reeder, B., Painter, I., Revere, D., Goldov, K., Bugni, P. F., & Olson, D. R. (2014). Technical description of the Distribute Project: a community-basedsyndromic surveillance system implementation. Online Journal of Public Health Informatics, 5(3), 224. http://doi.org/10.5210/ojphi.v5i3.4938Mathes, R. W., Ito, K., & Matte, T. (2011). Assessing syndromic surveillance of cardiovascular outcomes from emergency department chief complaint data in New York City. Public Library of Science ONE, 6(2), e14677. http://doi.org/10.1371/journal.pone.0014677O’Connell, E. K., Zhang, G., Leguen, F., Llau, A., & Rico, E. (2010). Innovative uses for syndromic surveillance. Emerging Infectious Diseases, 16(4), 669–671. http://doi.org/10.3201/eid1604.090688Rumoro, D.P., Hallock, M.M., Silva, J., Shah, S.C., Gibbs, G., Trenholme G.M., & Waddell, M.J. (2013). Why does Influenza-Like Illness surveillance miss true influenza cases in the emergency department?: Implications for health care providers. Annals of Emergency Medicine, 62(4), S75. https://doi.org/10.1016/j.annemergmed.2013.07.024Samoff E, Waller A, Fleischauer A, et al. Integration of Syndromic Surveillance Data into Public Health Practice at State and Local Levels in North Carolina. Public Health Reports. 2012;127(3):310-317.Savard, N., Bédard, L., Allard, R., & Buckeridge, D.L. (2015). Using age, triage score, and disposition data from emergency department electronic records to improve Influenza-Like Illness surveillance. Journal of the American Medical Informatics Association, 22(3): 688-696. doi: 10.1093/jamia/ocu002Seil, K., Marcum, J., Lall, R., & Stayton, C. (2015). Utility of a near real-time emergency department syndromic surveillance system to track injuries in New York City. Injury Epidemiology, 2(1), 11. http://doi.org/10.1186/s40621-015-0044-5Smith, S., Elliot, A. J., Hajat, S., Bone, A., Smith, G. E., & Kovats, S. (2016). Estimating the burden of heat illness in England during the 2013 summer heatwave using syndromic surveillance. Journal of Epidemiology and Community Health, 70(5), 459–465. http://doi.org/10.1136/jech-2015-206079Stephens, E. (2017). Development of syndrome definitions for acute unintentional drug and heroin overdose. Online Journal of Public Health Informatics, (9)1. http://dx.doi.org/10.5210/ojphi.v9i1.7593.Stigi, K., Baer, A., Duchin, J., & Lofy, K. (2014). Evaluation of electronic ambulatory care data for Influenza-Like Illness surveillance, Washington state. Journal of Public Health Management & Practice, 20(6)580-582.doi: 10.1097/PHH.0b013e3182aaa29bVilain, P., Larrieu, S., Mougin-Damour, K., Marianne Dit Cassou, P.J., Weber, M., Combes, X., & Filleul, L. (2017). Emergency department syndromic surveillance to investigate the health impact and factors associated with alcohol intoxication in Reunion Island. Emergency medicine journal 34(6), 386-390. doi: 10.1136/emermed-2015-204987Walsh, A. (2017). Going beyond chief complaints to identify opioid-related emergency department visits. Online Journal of Public Health Informatics, (9)1. http://dx.doi.org/10.5210/ojphi.v9i1.7617.White, J.R., Berisha, V., Lane, K., Menager, H., Gettel, A., & Braun, C.R. (2017). Evaluation of a Novel Syndromic Surveillance Query for Heat-Related Illness Using Hospital Data From Maricopa County, Arizona, 2015. Public Health Reports (132), 31S-39SYih WK, Deshpande S, Fuller C, et al. Evaluating Real-Time Syndromic Surveillance Signals from Ambulatory Care Data in Four States. Public Health Reports. 2010;125(1):111-120.
APA, Harvard, Vancouver, ISO, and other styles
5

Stalcup, Meg. "What If? Re-imagined Scenarios and the Re-Virtualisation of History." M/C Journal 18, no. 6 (March 7, 2016). http://dx.doi.org/10.5204/mcj.1029.

Full text
Abstract:
Image 1: “Oklahoma State Highway Re-imagined.” CC BY-SA 4.0 2015 by author, using Wikimedia image by Ks0stm (CC BY-SA 3 2013). Introduction This article is divided in three major parts. First a scenario, second its context, and third, an analysis. The text draws on ethnographic research on security practices in the United States among police and parts of the intelligence community from 2006 through to the beginning of 2014. Real names are used when the material is drawn from archival sources, while individuals who were interviewed during fieldwork are referred to by their position rank or title. For matters of fact not otherwise referenced, see the sources compiled on “The Complete 911 Timeline” at History Commons. First, a scenario. Oklahoma, 2001 It is 1 April 2001, in far western Oklahoma, warm beneath the late afternoon sun. Highway Patrol Trooper C.L. Parkins is about 80 kilometres from the border of Texas, watching trucks and cars speed along Interstate 40. The speed limit is around 110 kilometres per hour, and just then, his radar clocks a blue Toyota Corolla going 135 kph. The driver is not wearing a seatbelt. Trooper Parkins swung in behind the vehicle, and after a while signalled that the car should pull over. The driver was dark-haired and short; in Parkins’s memory, he spoke English without any problem. He asked the man to come sit in the patrol car while he did a series of routine checks—to see if the vehicle was stolen, if there were warrants out for his arrest, if his license was valid. Parkins said, “I visited with him a little bit but I just barely remember even having him in my car. You stop so many people that if […] you don't arrest them or anything […] you don't remember too much after a couple months” (Clay and Ellis). Nawaf Al Hazmi had a valid California driver’s license, with an address in San Diego, and the car’s registration had been legally transferred to him by his former roommate. Parkins’s inquiries to the National Crime Information Center returned no warnings, nor did anything seem odd in their interaction. So the officer wrote Al Hazmi two tickets totalling $138, one for speeding and one for failure to use a seat belt, and told him to be on his way. Al Hazmi, for his part, was crossing the country to a new apartment in a Virginia suburb of Washington, DC, and upon arrival he mailed the payment for his tickets to the county court clerk in Oklahoma. Over the next five months, he lived several places on the East Coast: going to the gym, making routine purchases, and taking a few trips that included Las Vegas and Florida. He had a couple more encounters with local law enforcement and these too were unremarkable. On 1 May 2001 he was mugged, and promptly notified the police, who documented the incident with his name and local address (Federal Bureau of Investigation, 139). At the end of June, having moved to New Jersey, he was involved in a minor traffic accident on the George Washington Bridge, and officers again recorded his real name and details of the incident. In July, Khalid Al Mihdhar, the previous owner of the car, returned from abroad, and joined Al Hazmi in New Jersey. The two were boyhood friends, and they went together to a library several times to look up travel information, and then, with Al Hazmi’s younger brother Selem, to book their final flight. On 11 September, the three boarded American Airlines flight 77 as part of the Al Qaeda team that flew the mid-sized jet into the west façade of the Pentagon. They died along with the piloting hijacker, all the passengers, and 125 people on the ground. Theirs was one of four airplanes hijacked that day, one of which was crashed by passengers, the others into significant sites of American power, by men who had been living for varying lengths of time all but unnoticed in the United States. No one thought that Trooper Parkins, or the other officers with whom the 9/11 hijackers crossed paths, should have acted differently. The Commissioner of the Oklahoma Department of Public Safety himself commented that the trooper “did the right thing” at that April traffic stop. And yet, interviewed by a local newspaper in January of 2002, Parkins mused to the reporter “it's difficult sometimes to think back and go: 'What if you had known something else?'" (Clay and Ellis). Missed Opportunities Image 2: “Hijackers Timeline (Redacted).” CC BY-SA 4.0 2015 by author, using the Federal Bureau of Investigation (FBI)’s “Working Draft Chronology of Events for Hijackers and Associates”. In fact, several of the men who would become the 9/11 hijackers were stopped for minor traffic violations. Mohamed Atta, usually pointed to as the ringleader, was given a citation in Florida that spring of 2001 for driving without a license. When he missed his court date, a bench warrant was issued (Wall Street Journal). Perhaps the warrant was not flagged properly, however, since nothing happened when he was pulled over again, for speeding. In the government inquiries that followed attack, and in the press, these brushes with the law were “missed opportunities” to thwart the 9/11 plot (Kean and Hamilton, Report 353). Among a certain set of career law enforcement personnel, particularly those active in management and police associations, these missed opportunities were fraught with a sense of personal failure. Yet, in short order, they were to become a source of professional revelation. The scenarios—Trooper Parkins and Al Hazmi, other encounters in other states, the general fact that there had been chance meetings between police officers and the hijackers—were re-imagined in the aftermath of 9/11. Those moments were returned to and reversed, so that multiple potentialities could be seen, beyond or in addition to what had taken place. The deputy director of an intelligence fusion centre told me in an interview, “it is always a local cop who saw something” and he replayed how the incidents of contact had unfolded with the men. These scenarios offered a way to recapture the past. In the uncertainty of every encounter, whether a traffic stop or questioning someone taking photos of a landmark (and potential terrorist target), was also potential. Through a process of re-imagining, police encounters with the public became part of the government’s “national intelligence” strategy. Previously a division had been marked between foreign and domestic intelligence. While the phrase “national intelligence” had long been used, notably in National Intelligence Estimates, after 9/11 it became more significant. The overall director of the US intelligence community became the Director National Intelligence, for instance, and the cohesive term marked the way that increasingly diverse institutional components, types of data and forms of action were evolving to address the collection of data and intelligence production (McConnell). In a series of working groups mobilised by members of major police professional organisations, and funded by the US Department of Justice, career officers and representatives from federal agencies produced detailed recommendations and plans for involving police in the new Information Sharing Environment. Among the plans drawn up during this period was what would eventually come to be the Nationwide Suspicious Activity Reporting Initiative, built principally around the idea of encounters such as the one between Parkins and Al Hazmi. Map 1: Map of pilot sites in the Nationwide Suspicious Activity Reporting Evaluation Environment in 2010 (courtesy of the author; no longer available online). Map 2: Map of participating sites in the Nationwide Suspicious Activity Reporting Initiative, as of 2014. In an interview, a fusion centre director who participated in this planning as well as its implementation, told me that his thought had been, “if we train state and local cops to understand pre-terrorism indicators, if we train them to be more curious, and to question more what they see,” this could feed into “a system where they could actually get that information to somebody where it matters.” In devising the reporting initiative, the working groups counter-actualised the scenarios of those encounters, and the kinds of larger plots to which they were understood to belong, in order to extract a set of concepts: categories of suspicious “activities” or “patterns of behaviour” corresponding to the phases of a terrorism event in the process of becoming (Deleuze, Negotiations). This conceptualisation of terrorism was standardised, so that it could be taught, and applied, in discerning and documenting the incidents comprising an event’s phases. In police officer training, the various suspicious behaviours were called “terrorism precursor activities” and were divided between criminal and non-criminal. “Functional Standards,” developed by the Los Angeles Police Department and then tested by the Department of Homeland Security (DHS), served to code the observed behaviours for sharing (via compatible communication protocols) up the federal hierarchy and also horizontally between states and regions. In the popular parlance of videos made for the public by local police departments and DHS, which would come to populate the internet within a few years, these categories were “signs of terrorism,” more specifically: surveillance, eliciting information, testing security, and so on. Image 3: “The Seven Signs of Terrorism (sometimes eight).” CC BY-SA 4.0 2015 by author, using materials in the public domain. If the problem of 9/11 had been that the men who would become hijackers had gone unnoticed, the basic idea of the Suspicious Activity Reporting Initiative was to create a mechanism through which the eyes and ears of everyone could contribute to their detection. In this vein, “If You See Something, Say Something™” was a campaign that originated with the New York City Metropolitan Transportation Authority, and was then licensed for use to DHS. The tips and leads such campaigns generated, together with the reports from officers on suspicious incidents that might have to do with terrorism, were coordinated in the Information Sharing Environment. Drawing on reports thus generated, the Federal Government would, in theory, communicate timely information on security threats to law enforcement so that they would be better able to discern the incidents to be reported. The cycle aimed to catch events in emergence, in a distinctively anticipatory strategy of counterterrorism (Stalcup). Re-imagination A curious fact emerges from this history, and it is key to understanding how this initiative developed. That is, there was nothing suspicious in the encounters. The soon-to-be terrorists’ licenses were up-to-date, the cars were legal, they were not nervous. Even Mohamed Atta’s warrant would have resulted in nothing more than a fine. It is not self-evident, given these facts, how a governmental technology came to be designed from these scenarios. How––if nothing seemed of immediate concern, if there had been nothing suspicious to discern––did an intelligence strategy come to be assembled around such encounters? Evidently, strident demands were made after the events of 9/11 to know, “what went wrong?” Policies were crafted and implemented according to the answers given: it was too easy to obtain identification, or to enter and stay in the country, or to buy airplane tickets and fly. But the trooper’s question, the reader will recall, was somewhat different. He had said, “It’s difficult sometimes to think back and go: ‘What if you had known something else?’” To ask “what if you had known something else?” is also to ask what else might have been. Janet Roitman shows that identifying a crisis tends to implicate precisely the question of what went wrong. Crisis, and its critique, take up history as a series of right and wrong turns, bad choices made between existing dichotomies (90): liberty-security, security-privacy, ordinary-suspicious. It is to say, what were the possibilities and how could we have selected the correct one? Such questions seek to retrospectively uncover latencies—systemic or structural, human error or a moral lapse (71)—but they ask of those latencies what false understanding of the enemy, of threat, of priorities, allowed a terrible thing to happen. “What if…?” instead turns to the virtuality hidden in history, through which missed opportunities can be re-imagined. Image 4: “The Cholmondeley Sisters and Their Swaddled Babies.” Anonymous, c. 1600-1610 (British School, 17th century); Deleuze and Parnet (150). CC BY-SA 4.0 2015 by author, using materials in the public domain. Gilles Deleuze, speaking with Claire Parnet, says, “memory is not an actual image which forms after the object has been perceived, but a virtual image coexisting with the actual perception of the object” (150). Re-imagined scenarios take up the potential of memory, so that as the trooper’s traffic stop was revisited, it also became a way of imagining what else might have been. As Immanuel Kant, among others, points out, “the productive power of imagination is […] not exactly creative, for it is not capable of producing a sense representation that was never given to our faculty of sense; one can always furnish evidence of the material of its ideas” (61). The “memory” of these encounters provided the material for re-imagining them, and thereby re-virtualising history. This was different than other governmental responses, such as examining past events in order to assess the probable risk of their repetition, or drawing on past events to imagine future scenarios, for use in exercises that identify vulnerabilities and remedy deficiencies (Anderson). Re-imagining scenarios of police-hijacker encounters through the question of “what if?” evoked what Erin Manning calls “a certain array of recognizable elastic points” (39), through which options for other movements were invented. The Suspicious Activity Reporting Initiative’s architects instrumentalised such moments as they designed new governmental entities and programs to anticipate terrorism. For each element of the encounter, an aspect of the initiative was developed: training, functional standards, a way to (hypothetically) get real-time information about threats. Suspicion was identified as a key affect, one which, if cultivated, could offer a way to effectively deal not with binary right or wrong possibilities, but with the potential which lies nestled in uncertainty. The “signs of terrorism” (that is, categories of “terrorism precursor activities”) served to maximise receptivity to encounters. Indeed, it can apparently create an oversensitivity, manifested, for example, in police surveillance of innocent people exercising their right to assemble (Madigan), or the confiscation of photographers’s equipment (Simon). “What went wrong?” and “what if?” were different interrogations of the same pre-9/11 incidents. The questions are of course intimately related. Moments where something went wrong are when one is likely to ask, what else might have been known? Moreover, what else might have been? The answers to each question informed and shaped the other, as re-imagined scenarios became the means of extracting categories of suspicious activities and patterns of behaviour that comprise the phases of an event in becoming. Conclusion The 9/11 Commission, after two years of investigation into the causes of the disastrous day, reported that “the most important failure was one of imagination” (Kean and Hamilton, Summary). The iconic images of 9/11––such as airplanes being flown into symbols of American power––already existed, in guises ranging from fictive thrillers to the infamous FBI field memo sent to headquarters on Arab men learning to fly, but not land. In 1974 there had already been an actual (failed) attempt to steal a plane and kill the president by crashing it into the White House (Kean and Hamilton, Report Ch11 n21). The threats had been imagined, as Pat O’Malley and Philip Bougen put it, but not how to govern them, and because the ways to address those threats had been not imagined, they were discounted as matters for intervention (29). O’Malley and Bougen argue that one effect of 9/11, and the general rise of incalculable insecurities, was to make it necessary for the “merely imaginable” to become governable. Images of threats from the mundane to the extreme had to be conjured, and then imagination applied again, to devise ways to render them amenable to calculation, minimisation or elimination. In the words of the 9/11 Commission, the Government must bureaucratise imagination. There is a sense in which this led to more of the same. Re-imagining the early encounters reinforced expectations for officers to do what they already do, that is, to be on the lookout for suspicious behaviours. Yet, the images of threat brought forth, in their mixing of memory and an elastic “almost,” generated their own momentum and distinctive demands. Existing capacities, such as suspicion, were re-shaped and elaborated into specific forms of security governance. The question of “what if?” and the scenarios of police-hijacker encounter were particularly potent equipment for this re-imagining of history and its re-virtualisation. References Anderson, Ben. “Preemption, Precaution, Preparedness: Anticipatory Action and Future Geographies.” Progress in Human Geography 34.6 (2010): 777-98. Clay, Nolan, and Randy Ellis. “Terrorist Ticketed Last Year on I-40.” NewsOK, 20 Jan. 2002. 25 Nov. 2014 ‹http://newsok.com/article/2779124›. Deleuze, Gilles. Negotiations. New York: Columbia UP, 1995. Deleuze, Gilles, and Claire Parnet. Dialogues II. New York: Columbia UP 2007 [1977]. Federal Bureau of Investigation. “Hijackers Timeline (Redacted) Part 01 of 02.” Working Draft Chronology of Events for Hijackers and Associates. 2003. 18 Apr. 2014 ‹https://vault.fbi.gov/9-11%20Commission%20Report/9-11-chronology-part-01-of-02›. Kant, Immanuel. Anthropology from a Pragmatic Point of View. Trans. Robert B. Louden. Cambridge: Cambridge UP, 2006. Kean, Thomas H., and Lee Hamilton. Executive Summary of the 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks upon the United States. 25 Oct. 2015 ‹http://www.9-11commission.gov/report/911Report_Exec.htm›. Kean, Thomas H., and Lee Hamilton. The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks upon the United States. New York: W.W. Norton, 2004. McConnell, Mike. “Overhauling Intelligence.” Foreign Affairs, July/Aug. 2007. Madigan, Nick. “Spying Uncovered.” Baltimore Sun 18 Jul. 2008. 25 Oct. 2015 ‹http://www.baltimoresun.com/news/maryland/bal-te.md.spy18jul18-story.html›. Manning, Erin. Relationscapes: Movement, Art, Philosophy. Cambridge, MA: MIT P, 2009. O’Malley, P., and P. Bougen. “Imaginable Insecurities: Imagination, Routinisation and the Government of Uncertainty post 9/11.” Imaginary Penalities. Ed. Pat Carlen. Cullompton, UK: Willan, 2008.Roitman, Janet. Anti-Crisis. Durham, NC: Duke UP, 2013. Simon, Stephanie. “Suspicious Encounters: Ordinary Preemption and the Securitization of Photography.” Security Dialogue 43.2 (2012): 157-73. Stalcup, Meg. “Policing Uncertainty: On Suspicious Activity Reporting.” Modes of Uncertainty: Anthropological Cases. Eds. Limor Saminian-Darash and Paul Rabinow. Chicago: U of Chicago P, 2015. 69-87. Wall Street Journal. “A Careful Sequence of Mundane Dealings Sows a Day of Bloody Terror for Hijackers.” 16 Oct. 2001.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Tulsa City-County Library System"

1

Thompson, Mildred Ladner. Tulsa City-County Library, 1912-1991. Lion & Thorne Publishing in cooperation with the Tulsa Library Trust, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Tulsa City-County Library System"

1

Seagraves, Katlin, and Leah Weyand. "From Bake-Alongs to Tech Talks." In Advances in Library and Information Science, 447–80. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-6449-3.ch023.

Full text
Abstract:
In this chapter, the authors provide a snapshot of Tulsa City-County Library's efforts to pivot to virtual programming and services during the early months of the COVID-19 pandemic as well as to practical advice for other libraries that want to expand their virtual programs and services for their own patrons, but aren't sure how to start. The chapter includes practical discussion of different technologies/platforms and their use for various types of programming, as well as concrete examples of virtual programs targeted to different age groups and populations.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography