Journal articles: 'United States, Social services, Army spouses' – Grafiati (2024)

  • Bibliography
  • Subscribe
  • News
  • Referencing guides Blog Automated transliteration Relevant bibliographies by topics

Log in

Українська Français Italiano Español Polski Português Deutsch

We are proudly a Ukrainian website. Our country was attacked by Russian Armed Forces on Feb. 24, 2022.
You can support the Ukrainian Army by following the link: https://u24.gov.ua/. Even the smallest donation is hugely appreciated!

Relevant bibliographies by topics / United States, Social services, Army spouses / Journal articles

To see the other types of publications on this topic, follow the link: United States, Social services, Army spouses.

Author: Grafiati

Published: 4 June 2021

Last updated: 1 February 2022

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Consult the top 15 journal articles for your research on the topic 'United States, Social services, Army spouses.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Gubernskaya, Zoya, and Joanna Dreby. "US Immigration Policy and the Case for Family Unity." Journal on Migration and Human Security 5, no.2 (June 2017): 417–30. http://dx.doi.org/10.1177/233150241700500210.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

As the Trump administration contemplates immigration reform, it is important to better understand what works and what does not in the current system. This paper reviews and critically evaluates the principle of family unity, a hallmark of US immigration policy over the past 50 years and the most important mechanism for immigration to the United States. Since 1965, the United States has been admitting a relatively high proportion of family-based migrants and allowing for the immigration of a broader range of family members. However, restrictive annual quotas have resulted in a long line of prospective immigrants waiting outside of the United States or within the United States, but without status. Further policy changes have led to an increasing number of undocumented migrants and mixed-status families in the United States. Several policies and practices contribute to prolonged periods of family separation by restricting travel and effectively locking in a large number of people either inside or outside of the United States. On top of that, increasingly aggressive enforcement practices undermine family unity of a large number of undocumented and mixed-status families. Deportations — and even a fear of deportation —cause severe psychological distress and often leave US-born children of undocumented parents without economic and social support. A recent comprehensive report concluded that immigration has overall positive impact on the US economy, suggesting that a predominantly family-based migration system carries net economic benefits. Immigrants rely on family networks for employment, housing, transportation, informal financial services, schooling, childcare, and old age care. In the US context where there is nearly no federal support for immigrants' integration and limited welfare policies, family unity is critical for promoting immigrant integration, social and economic well-being, and intergenerational mobility. Given the benefits of family unity in the US immigrant context and the significant negative consequences of family separation, the United States would do well to make a number of changes to current policy and practice that reaffirm its commitment to family unity. Reducing wait times for family reunification with spouses and children of lawful permanent residents, allowing prospective family-based migrants to visit their relatives in the United States while their applications are being processed, and providing relief from deportation and a path to legalization to parents and spouses of US citizens should be prioritized. The cost to implement these measures would likely be minor compared to current and projected spending on immigration enforcement and it would be more than offset by the improved health and well-being of American families.

2

Wright,JamesR., and LelandB.Baskin. "Pathology and Laboratory Medicine Support for the American Expeditionary Forces by the US Army Medical Corps During World War I." Archives of Pathology & Laboratory Medicine 139, no.9 (September1, 2015): 1161–72. http://dx.doi.org/10.5858/arpa.2014-0528-hp.

Full text

Abstract:

Context Historical research on pathology and laboratory medicine services in World War I has been limited. In the Spanish American War, these efforts were primarily focused on tropical diseases. World War I problems that could be addressed by pathology and laboratory medicine were strikingly different because of the new field of clinical pathology. Geographic differences, changing war tactics, and trench warfare created new issues. Objectives To describe the scope of pathology and laboratory medicine services in World War I and the value these services brought to the war effort. Methods Available primary and secondary sources related to American Expeditionary Forces' laboratory services were analyzed and contrasted with the British and German approaches. Results The United States entered the war in April 1917. Colonel Joseph Siler, MD, a career medical officer, was the director, and Colonel Louis B. Wilson, MD, head of pathology at the Mayo Clinic, was appointed assistant director of the US Army Medical Corps Division of Laboratories and Infectious Disease, based in Dijon, France. During the next year, they organized 300 efficient laboratories to support the American Expeditionary Forces. Autopsies were performed to better understand treatment of battlefield injuries, effects of chemical warfare agents, and the influenza pandemic; autopsies also generated teaching specimens for the US Army Medical Museum. Bacteriology services focused on communicable diseases. Laboratory testing for social diseases was very aggressive. Significant advances in blood transfusion techniques, which allowed brief blood storage, occurred during the war but were not primarily overseen by laboratory services. Conclusions Both Siler and Wilson received Distinguished Service Medals. Wilson's vision for military pathology services helped transform American civilian laboratory services in the 1920s.

3

Cudabec, Bill. "Book Review: International Stars at War; Stars in Khaki: Movie Actors in the Army and the Air Services; Stars in the Corps: Movie Actors in the United States Marines; Stars in Blue: Movie Actors in America's Sea Services." Armed Forces & Society 30, no.1 (October 2003): 161–67. http://dx.doi.org/10.1177/0095327x0303000107.

Full text

APA, Harvard, Vancouver, ISO, and other styles

4

Grattan,LaurenE., BrittneyS.Mengistu, StevenH.Bullock, Theresa Jackson Santo, and DawnyéaD.Jackson. "Restricting Retail Hours of Alcohol Sales within an Army Community." Military Medicine 184, no.9-10 (April5, 2019): e400-e405. http://dx.doi.org/10.1093/milmed/usz044.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Abstract Introduction Excessive alcohol consumption continues to be a significant concern to overall military readiness; each year, it results in non-deployable active duty service members and service members separated from service. In 2009, The Community Preventive Services Task Force recommended limiting the hours of alcohol sales as an evidence-based and effective intervention to reduce alcohol-related harms. In June 2014, partnerships at an Army Installation in the Midwestern United States implemented a policy to reduce excessive alcohol consumption and associated alcohol-related harms. Although community-based interventions have been shown to successfully reduce alcohol-related negative consequences, little research has explored the effects of these interventions in military communities. Materials and Methods The intervention reduced the retail sale of alcoholic beverages by eight hours daily (11:01 pm to 6:59 am) within the installation community. The U.S. Army Public Health Review Board approved this study as public health practice. The quantitative assessment from a mixed-methods evaluation implemented an interrupted time series design to assess changes in the community resulting from the intervention. Revenue and crime data were collected 11 months and 12 months prior to and after the onset of the intervention, respectively, to quantify the adherence to and effectiveness of the policy. The outcome variables measured in the evaluation were Serious Incident Reports (SIRs) and Driving Under the Influence/Driving While Intoxicated (DUI/DWI) citations. A Wilcoxon Signed-Rank Test of significance was used to measure changes in crime outcomes post-policy. Results The results indicated that pre-policy rates of overall DUI/DWI citations, and DUI/DWI citations on-post were significantly higher than post-policy DUI/DWI citations (p < 0.05). The results also indicated that pre-policy rates of overall SIRS, alcohol-related SIRs, and SIRs occurring at night were not statistically higher than post-policy rates (p ≥ 0.05). The pre-policy DUI/DWI citations occurring off-post and DUI/DWI citations occurring at night did not reach statistical significance (p > 0.05). Policy adherence was good and total alcohol sales revenue remained stable before and after policy implementation. Conclusions This was the first known evaluation within a military community to report improvements in crime statistics following an eight hour reduction in daily retail sale hours of alcohol. The reduction in alcohol-related harms presented in this evaluation are typical for small communities implementing alcohol-related policies; however, the effect sizes reported here are larger than those reported in the current literature, suggesting that the policy positively impacted the installation community in decreasing alcohol-related harms. Evaluation data did not show statistically significant reductions in DUI/DWI citations and SIRs occurring during night hours. Further, the evaluation design disallows the ability to draw a causal relationship between the intervention and measured outcomes. Additional installations should consider implementing similar policies to determine if observed effects are replicable. Future studies should include a longitudinal design that would allow for long-lasting changes to be observed within the population, measurement of additional proximal outcomes (e.g., reported alcohol consumption), and investigating social and health outcomes both inside and outside the confines of the installation community.

5

Li, Qiao, Wenqing Xue, Wenjie Gong, Xin Quan, Quanlei Li, Lina Xiao, Dong Xu, EricD.Caine, and EllenL.Poleshuck. "Experiences and perceptions of perinatal depression among new immigrant Chinese parents: a qualitative study." BMC Health Services Research 21, no.1 (July26, 2021). http://dx.doi.org/10.1186/s12913-021-06752-2.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Abstract Background Immigrant status, acculturation level, race and ethnicity have been found to contribute to the utilization of mental health services in the perinatal period. This study explored perinatal experiences and perceptions among Chinese immigrant mothers and their spouses, as well as the possible barriers and facilitators that affect their health care utilization. Methods We recruited 13 women ages 18–35 years born in mainland China, living in Rochester, New York, and residing less than 5 years in the United States. Participants primary language was Mandarin Chinese and all had given birth to at least one live infant within the past 7 years. Participants’ age was at least 18 years old at the time of delivery. Five spouses also participated. We divided women in two focus groups and held one focus group for men, with data collection including demographic questionnaires and semi-structured focus group questions conducted in December 2014. Data were analyzed following thematic analysis. Results Four themes emerged: experiences of perinatal depression; perceptions of perinatal depression; general preventive and coping strategies; and attitudes toward the supportive use social media applications (apps) and text messaging during the perinatal period. Participants had limited knowledge of perinatal depression and had difficulty distinguishing between normal perinatal mood fluctuations and more severe symptoms of depression. They discussed immigrant-related stress, conflicts with parents/in-laws while “doing the month”, the perceived gap between the ideal of “perfect moms” and reality, and challenges with parenting as the causes of perinatal depression. Women approved of screening for the condition but were conservative about follow-up interventions. As for the management of perinatal depression, participants preferred to deal with the problem within the family before seeking external help, due to potential stigma as well as Chinese traditional culture. They were receptive to obtaining pertinent health information from anonymous social media apps, preferring these to personal text messages. Conclusion The recent immigrant Chinese parents to the United States in the study had limited knowledge of perinatal depression and did not make full use of mental health services for support due to language and cultural barriers. Screening for perinatal depression is only the first step. Future research should explore what interventions may serve as an acceptable approach to overcoming these gaps.

6

snyder, Brett, and N.ClaireNapawan. "Porosity : Networking Cities for a Changing Climate." Architecture_MPS, November1, 2014. http://dx.doi.org/10.14324/111.444.amps.2014v6i1.001.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

On October 28th 2013 Hurricane Sandy hit land on the East Coast of the United States. The deadliest storm to hit the country since 2005 it caused tens of billions of dollars in damage, destroyed thousands of homes, left millions without electric service, and caused 117 deaths in the United States, including 53 in New York, making Sandy the most life costly hurricane to hit the United States mainland since Hurricane Katrina. In all an estimated 186 people were killed across the United States, the Caribbean, and Canada. In the immediate aftermath of the storm not only did the emergency services, state and federal government implement emergency plans of action, including both direct intervention on the ground and massive financial support, so too did a number of charities, community and residents groups across the US. One of the most surprising of these groups was what became known as Occupy Sandy. As noted by the Homeland Security Studies and Analysis Institute: “Within hours of Sandy’s landfall, members from the Occupy Wall Street movement used social media to tap the wider Occupy network for volunteers and aid. Overnight, a volunteer army of young, educated, tech-savvy individuals with time and a desire to help others emerged. In the days, weeks, and months that followed, “Occupy Sandy” became one of the leading humanitarian groups providing relief to survivors across New York City and New Jersey. At its peak, it had grown to an estimated 60,000 volunteers—more than four times the number deployed by the American Red Cross.” What this phenomenon clearly demonstrates is the potential for digital networking to improve response to catastrophic storm events at a community level. Far from being solely a question of material support and logistics, the response to the disaster was one equally definable as digital. Pointing to the possible rethinking of issues around the extreme and localised consequences of climate change and responses to it in purely traditional infrastructural terms, the social media focused organisation of Occupy Sandy potentially offers us a new frame of reference to deal with these, and less catastrophic issues around climate change and our response to it. This paper provides a discussion of the projected impacts of global environmental change in urban environments in the United States, with a particular focus on their impact on existing storm and sanitary water infrastructure. However, it theorizes a new approach to this archaic system of infrastructure that exploits social networking tools and digital technologies to build greater networks for climate change resilience across the United States and, by extension, elsewhere.

7

Waugh,SheldonG., and SaraB.Mullaney. "Progress towards Companion Animal Zoonotic Disease Surveillance in the U.S. Army." Online Journal of Public Health Informatics 11, no.1 (May30, 2019). http://dx.doi.org/10.5210/ojphi.v11i1.9888.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

ObjectiveWe assesed the feasibility of a zoonotic disease surveillance system through the current EHR (ROVR) for all POAs and GOAs. Additionally, we conducted a retrospective observational study querying and collecting reported zoonoses of interest, for 2017.IntroductionDogs, cats and other companion animals have played an integral role in many aspects of human life. Human and companion animal (CAs) interactions have a wide range of benefits to human health1–3. The threat of zoonotic transmission between CAs and humans is exacerbated by proximity (56% of dog owners and 62% of cat owners sleep with their animal next to them4) and the number of diseases CAs share with humans. Many of these highlighted zoonoses are spread by direct contact, and others are vector-transmitted (e.g., fleas, ticks, flies, and mosquitos). Within the realm of the One-Health concept, CAs can serve multiple roles in zoonotic transmission chains between humans and animals. They can serve as intermediate hosts between wildlife reservoirs and humans, or as possible sentinel or proxy species for emerging diseases5. Given the large number of CAs within the United States (estimated 72 million pet dogs, 81 million pet cats), understanding and preventing the diseases prevalent in CA populations is of utmost importance.Biosurveillance is a critical component of One Health initiatives including zoonotic disease mitigation and control. As Lead Service for Veterinary Animal and Public Health Services, the Army has a responsibility to champion biosurveillance efforts to support One Health initiatives, improving Servicemember, family, and retiree health across the Joint Force. Additionally, with military personnel experiencing apparent increased rates of job-reducing ailments such as diarrheal, bacterial and viral disease6–8, it is essential that the Army focus on maximizing their operational potential by minimizing the amount of time personnel are sick from these transmissible diseases and observing potential sources of infection. By observing the zoonotic disease burden in privately owned (POAs) and government-owned (GOAs) animals, public health investigators can increase focus on what transmittable diseases are at greatest risk of being spread from companion animals to military personnel.To address this potential source of infection, the Department of Defense (DoD) sought and continues to seek to establish a centralized and integrated veterinary zoonotic surveillance system to provide Commanders with a clear picture of disease burden9. With this assigned responsibility, the Army Veterinary Service (VS) seeks to centralize and enhance surveillance efforts through the Remote Online Veterinary Record (ROVR) Electronic Health Record (EHR), an enterprise web-based application to support the Army VS, accurately establishing a zoonotic epidemiological baseline and sustaining consistent future reporting.MethodsThrough a requested effort and proof of concept, the Army Public Health Center’s (APHC) One Health Division tested the feasibility of a zoonotic disease surveillance system through the current EHR (ROVR) for all POAs and GOAs. We obtained one year (2017) worth of zoonotic encounters of interest through ROVR, querying a population of roughly 202,000 animals (n=202,217). We conducted a retrospective observational study comparing reported zoonoses of interest between CA populations. Maximum Likelihood Estimations of frequency detailed comparisons of frequency and prevalence between GOAs and POAs, within the ROVR EHR. Additionally, we evaluated the accuracy of surveillance data queried, proposed potential metrics and dashboards for commanders and stakeholders to easily observe zoonotic burden of companion animals and developed potential courses of action for future tools, collaborations, and educational interventions.ResultsOf the 512 collected zoonotic encounters, Giardia and Hookworm were the two most prevalent zoonoses overall, with 4.23 and 5.43 cases per 10,000 outpatient visits (OPVs), respectively. We observed a significant differential frequency of Giardia and Hookworm between GOAs and POAs (63% (CI: 54.6-71.4) vs 12.7% (CI: 9.7-16.1) and 2.5% (CI: 0.1-5.9) vs 41.9% (CI: 37.1-46.8) of all queried zoonotic diseases of interest, respectively). In addition to back-end database and querying improvements, we suggested the development of an educational intervention based at Army First-Year Graduate Veterinary Education program (FYGVE) locations to emphasize the important benefits of capturing zoonotic diseases of interest correctly, early stages in the clinical experience. The intervention would focus on increasing accurate data capture with the ultimate goal of a phased regional rollout through education and collaboartive buy-in.ConclusionsFrom these results and recent CDC guidance of data-driven surveillance, we’ve proposed a phased surveillance development plan focused on systematic data collection, collaboration, and evaluation. Our idenfitied overexpressed zoonoses will focus our efforts on tracking Giardia and Hookworm through multi-year trends. This assessment and proof of concept allows for illumination of gaps and limitations within the Army VS to effectively track the zoonotic burden of GOA and POA populations. Our current and future work will look to close surveillance gaps and help identify potential routes of transmission from companion animals to humans.References1. Edney AT. Companion animals and human health: an overview. J R Soc Med. 1995 Dec;88(12):704p-708p.2. Wells DL. The Effects of Animals on Human Health and Well-Being. Journal of Social Issues. 2009 Sep 1;65(3):523–43.3. O’Haire M. Companion animals and human health: Benefits, challenges, and the road ahead. Journal of Veterinary Behavior: Clinical Applications and Research. 2010 Sep 1;5(5):226–34.4. Krahn LE, Tovar MD, Miller B. Are Pets in the Bedroom a Problem? Mayo Clinic Proceedings. 2015 Dec 1;90(12):1663–5.5. Day MJ, Breitschwerdt E, Cleaveland S, Karkare U, Khanna C, Kirpensteijn J, et al. Surveillance of Zoonotic Infectious Disease Transmitted by Small Companion Animals. Emerg Infect Dis. 2012 Dec;18(12):e1.6. Cook GC. Influence of diarrhoeal disease on military and naval campaigns. J R Soc Med. 2001 Feb 1;94(2):95–7.7. Sanchez JL, Gelnett J, Petruccelli BP, Defraites RF, Taylor DN. Diarrheal disease incidence and morbidity among United States military personnel during short-term missions overseas. The American journal of tropical medicine and hygiene. 1998;58(3):299–304.8. Russell KL, Hawksworth AW, Ryan MAK, Strickler J, Irvine M, Hansen CJ, et al. Vaccine-preventable adenoviral respiratory illness in US military recruits, 1999–2004. Vaccine. 2006 Apr 5;24(15):2835–42.9. Richardson TR. DoD Directive 6400.04E: DoD Veterinary Public and Animal Health Services [Internet]. Monterey, California. Naval Postgraduate School; 2000 [cited 2017 Jul 26]. Available from: http://calhoun.nps.edu/handle/10945/9216

8

Kadivar, Jamileh. "Government Surveillance and Counter-Surveillance on Social and Mobile Media: The Case of Iran (2009)." M/C Journal 18, no.2 (April29, 2015). http://dx.doi.org/10.5204/mcj.956.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Human history has witnessed varied surveillance and counter-surveillance activities from time immemorial. Human beings could not surveille others effectively and accurately without the technology of their era. Technology is a tool that can empower both people and governments. The outcomes are different based on the users’ intentions and aims. 2,500 years ago, Sun Tzu noted that ‘If you know both yourself and your enemy, you can win numerous (literally, "a hundred") battles without jeopardy’. His words still ring true. To be a good surveiller and counter-surveiller it is essential to know both sides, and in order to be good at these activities access to technology is vital. There is no doubt that knowledge is power, and without technology to access the information, it is impossible to be powerful. As we become more expert at technology, we will learn what makes surveillance and counter-surveillance more effective, and will be more powerful.“Surveillance” is one of the most important aspects of living in the convergent media environment. This essay illustrates government surveillance and counter-surveillance during the Iranian Green Movement (2009) on social and mobile media. The Green Movement refers to a non-violent movement that arose after the disputed presidential election on June 2009. After that Iran was facing its most serious political crisis since the 1979 revolution. Claims of vote fraud triggered massive street protests. Many took to the streets with “Green” signs, chanting slogans such as ‘the government lied’, and ‘where is my vote?’ There is no doubt that social and mobile media has played an important role in Iran’s contemporary politics. According to Internet World Stats (IWS) Internet users in 2009 account for approximately 48.5 per cent of the population of Iran. In 2009, Iran had 30.2 million mobile phone users (Freedom House), and 72 cellular subscriptions for every 100 people (World Bank). Today, while Iran has the 19th-largest population in the world, its blogosphere holds the third spot in terms of number of users, just behind the United States and China (Beth Elson et al.). In this essay the use of social and mobile media (technology) is not debated, but the extent of this use, and who, why and how it is used, is clearly scrutinised.Visibility and Surveillance There have been different kinds of surveillance for a very long time. However, all types of surveillance are based on the notion of “visibility”. Previous studies show that visibility is not a new term (Foucault Discipline). The new things in the new era, are its scale, scope and complicated ways to watch others without being watched, which are not limited to a specific time, space and group, and are completely different from previous instruments for watching (Andrejevic). As Meikle and Young (146) have mentioned ‘networked digital media bring with them a new kind of visibility’, based on different kinds of technology. Internet surveillance has important implications in politics to control, protect, and influence (Marx Ethics; Castells; Fuchs Critique). Surveillance has been improved during its long history, and evolved from very simple spying and watching to complicated methods of “iSpy” (Andrejevic). To understand the importance of visibility and its relationship with surveillance, it is essential to study visibility in conjunction with the notion of “panopticon” and its contradictory functions. Foucault uses Bentham's notion of panopticon that carries within itself visibility and transparency to control others. “Gaze” is a central term in Bentham’s view. ‘Bentham thinks of a visibility organised entirely around a dominating, overseeing gaze’ (Foucault Eye). Moreover, Thomson (Visibility 11) notes that we are living in the age of ‘normalizing the power of the gaze’ and it is clear that the influential gaze is based on powerful means to see others.Lyon (Surveillance 2) explains that ‘surveillance is any collection and processing of personal data, whether identifiable or not, for the purpose of influencing or managing those whose data have been granted…’. He mentions that today the most important means of surveillance reside in computer power which allows collected data to be sorted, matched, retrieved, processed, marketed and circulated.Nowadays, the Internet has become ubiquitous in many parts of the world. So, the changes in people’s interactions have influenced their lives. Fuchs (Introduction 15) argues that ‘information technology enables surveillance at a distance…in real time over networks at high transmission speed’. Therefore, visibility touches different aspects of people’s lives and living in a “glasshouse” has caused a lot of fear and anxiety about privacy.Iran’s Green Movement is one of many cases for studying surveillance and counter-surveillance technologies in social and mobile media. Government Surveillance on Social and Mobile Media in Iran, 2009 In 2009 the Iranian government controlled technology that allowed them to monitor, track, and limit access to the Internet, social media and mobiles communication, which has resulted in the surveillance of Green Movement’s activists. The Iranian government had improved its technical capabilities to monitor the people’s behavior on the Internet long before the 2009 election. The election led to an increase in online surveillance. Using social media the Iranian government became even more powerful than it was before the election. Social media was a significant factor in strengthening the government’s power. In the months after the election the virtual atmosphere became considerably more repressive. The intensified filtering of the Internet and implementation of more advanced surveillance systems strengthened the government’s position after the election. The Open Net Initiative revealed that the Internet censorship system in Iran is one of the most comprehensive and sophisticated censorship systems in the world. It emphasized that ‘Advances in domestic technical capacity have contributed to the implementation of a centralized filtering strategy and a reduced reliance on Western technologies’.On the other hand, the authorities attempted to block all access to political blogs (Jaras), either through cyber-security methods or through threats (Tusa). The Centre for Investigating Organized Cyber Crimes, which was founded in 2007 partly ‘to investigate and confront social and economic offenses on the Internet’ (Cyber Police), became increasingly important over the course of 2009 as the government combated the opposition’s online activities (Beth Elson et al. 16). Training of "senior Internet lieutenants" to confront Iran's "virtual enemies online" was another attempt that the Intelligence minister announced following the protests (Iran Media Program).In 2009 the Iranian government enacted the Computer Crime Law (Jaras). According to this law the Committee in Charge of Determining Unauthorized Websites is legally empowered to identify sites that carry forbidden content and report that information to TCI and other major ISPs for blocking (Freedom House). In the late fall of 2009, the government started sending threatening and warning text messages to protesters about their presence in the protests (BBC). Attacking, blocking, hacking and hijacking of the domain names of some opposition websites such as Jaras and Kaleme besides a number of non-Iranian sites such as Twitter were among the other attempts of the Iranian Cyber Army (Jaras).It is also said that the police and security forces arrested dissidents identified through photos and videos posted on the social media that many imagined had empowered them. Furthermore, the online photos of the active protesters were posted on different websites, asking people to identify them (Valizadeh).In late June 2009 the Iranian government was intentionally permitting Internet traffic to and from social networking sites such as Facebook and Twitter so that it could use a sophisticated practice called Deep Packet Inspection (DPI) to collect information about users. It was reportedly also applying the same technology to monitor mobile phone communications (Beth Elson et al. 15).On the other hand, to cut communication between Iranians inside and outside the country, Iran slowed down the Internet dramatically (Jaras). Iran also blocked access to Facebook, YouTube, Wikipedia, Twitter and many blogs before, during and after the protests. Moreover, in 2009, text message services were shut down for over 40 days, and mobile phone subscribers could not send or receive text messages regardless of their mobile carriers. Subsequently it was disrupted on a temporary basis immediately before and during key protests days.It was later discovered that the Nokia Siemens Network provided the government with surveillance technologies (Wagner; Iran Media Program). The Iranian government built a complicated system that enabled it to monitor, track and intercept what was said on mobile phones. Nokia Siemens Network confirmed it supplied Iran with the technology needed to monitor, control, and read local telephone calls [...] The product allowed authorities to monitor any communications across a network, including voice calls, text messaging, instant messages, and web traffic (Cellan-Jones). Media sources also reported that two Chinese companies, Huawei and ZTE, provided surveillance technologies to the government. The Nic Payamak and Saman Payamak websites, that provide mass text messaging services, also reported that operator Hamrah Aval commonly blocked texts with words such as meeting, location, rally, gathering, election and parliament (Iran Media Program). Visibility and Counter-Surveillance The panopticon is not limited to the watchers. Similarly, new kinds of panopticon and visibility are not confined to government surveillance. Foucault points out that ‘the seeing machine was once a sort of dark room into which individuals spied; it has become a transparent building in which the exercise of power may be supervised by society as a whole’ (Discipline 207). What is important is Foucault's recognition that transparency, not only of those who are being observed but also of those who are observing, is central to the notion of the panopticon (Allen) and ‘any member of society will have the right to come and see with his own eyes how schools, hospitals, factories, and prisons function’ (Foucault, Discipline 207). Counter-surveillance is the process of detecting and mitigating hostile surveillance (Burton). Therefore, while the Internet is a surveillance instrument that enables governments to watch people, it also improves the capacity to counter-surveille, and draws public attention to governments’ injustice. As Castells (185) notes the Internet could be used by citizens to watch their government as an instrument of control, information, participation, and even decision-making, from the bottom up.With regards to the role of citizens in counter-surveillance we can draw on Jay Rosen’s view of Internet users as ‘the people formerly known as the audience’. In counter-surveillance it can be said that passive citizens (formerly the audience) have turned into active citizens. And this change was becoming impossible without mobile and social media platforms. These new techniques and technologies have empowered people and given them the opportunity to have new identities. When Thompson wrote ‘the exercise of power in modern societies remains in many ways shrouded in secrecy and hidden from the public gaze’ (Media 125), perhaps he could not imagine that one day people can gaze at the politicians, security forces and the police through the use of the Internet and mobile devices.Furthermore, while access to mobile media allows people to hold authorities accountable for their uses and abuses of power (Breen 183), social media can be used as a means of representation, organization of collective action, mobilization, and drawing attention to police brutality and reasons for political action (Gerbaudo).There is no doubt that having creativity and using alternative platforms are important aspects in counter-surveillance. For example, images of Lt. Pike “Pepper Spray Cop” from the University of California became the symbol of the senselessness of police brutality during the Occupy Movement (Shaw). Iranians’ Counter-Surveillance on Social and Mobile Media, 2009 Iran’s Green movement (2009) triggered a lot of discussions about the role of technology in social movements. In this regard, there are two notable attitudes about the role of technology: techno-optimistic (Shriky and Castells) and techno-pessimistic (Morozov and Gladwell) views should be taken into account. While techno-optimists overrated the role of social media, techno-pessimists underestimated its role. However, there is no doubt that technology has played a great role as a counter-surveillance tool amongst Iranian people in Iran’s contemporary politics.Apart from the academic discussions between techno-optimists and techno-pessimists, there have been numerous debates about the role of new technologies in Iran during the Green Movement. This subject has received interest from different corners of the world, including Western countries, Iranian authorities, opposition groups, and also some NGOs. However, its role as a means of counter-surveillance has not received adequate attention.As the tools of counter-surveillance are more or less the tools of surveillance, protesters learned from the government to use the same techniques to challenge authority on social media.Establishing new websites (such as JARAS, RASA, Kalemeh, and Iran green voice) or strengthening some previous ones (such as Saham, Emrooz, Norooz), also activating different platforms such as Facebook, Twitter, and YouTube accounts to broadcast the voice of the Iranian Green Movement and neutralize the government’s propaganda were the most important ways to empower supporters of Iran’s Green Movement in counter-surveillance.‘Reporters Without Borders issued a statement, saying that ‘the new media, and particularly social networks, have given populations collaborative tools with which they can change the social order’. It is also mentioned that despite efforts by the Iranian government to prevent any reporting of the protests and due to considerable pressure placed on foreign journalists inside Iran, social media played a significant role in sending the messages and images of the movement to the outside world (Axworthy). However, at that moment, many thought that Twitter performed a liberating role for Iranian dissenters. For example, Western media heralded the Green Movement in Iran as a “Twitter revolution” fuelled by information and communication technologies (ICTs) and social media tools (Carrieri et al. 4). “The Revolution Will Be Twittered” was the first in a series of blog posts published by Andrew Sullivan a few hours after the news of the protests was released.According to the researcher’s observation the numbers of Twitter users inside Iran who tweeted was very limited in 2009 and social media was most useful in the dissemination of information, especially from those inside Iran to outsiders. Mobile phones were mostly influential as an instrument firstly used for producing contents (images and videos) and secondly for the organisation of protests. There were many photos and videos that were filmed by very simple mobile cell phones, uploaded by ordinary people onto YouTube and other platforms. The links were shared many times on Twitter and Facebook and released by mainstream media. The most frequently circulated story from the Iranian protests was a video of Neda Agha-Sultan. Her final moments were captured by some bystanders with mobile phone cameras and rapidly spread across the global media and the Internet. It showed that the camera-phone had provided citizens with a powerful means, allowing for the creation and instant sharing of persuasive personalised eyewitness records with mobile and globalised target populations (Anden-Papadopoulos).Protesters used another technique, DDOS (distributed denial of service attacks), for political protest in cyber space. Anonymous people used DDOS to overload a website with fake requests, making it unavailable for users and disrupting the sites set as targets (McMillan) in effect, shutting down the site. DDOS is an important counter-surveillance activity by grassroots activists or hackers. It was a cyber protest that knocked the main Iranian governmental websites off-line and caused crowdsourcing and false trafficking. Amongst them were Mahmoud Ahmadinejad, Iran's supreme leader’s websites and those which belong to or are close to the government or security forces, including news agencies (Fars, IRNA, Press TV…), the Ministry of Foreign Affairs, the Ministry of Justice, the Police, and the Ministry of the Interior.Moreover, as authorities uploaded the pictures of protesters onto different platforms to find and arrest them, in some cities people started to put the pictures, phone numbers and addresses of members of security forces and plain clothes police officers who attacked them during the protests and asked people to identify and report the others. They also wanted people to send information about suspects who infringed human rights. Conclusion To sum up, visibility, surveillance and counter-surveillance are not new phenomena. What is new is the technology, which increased their complexity. As Foucault (Discipline 200) mentioned ‘visibility is a trap’, so being visible would be the weakness of those who are being surveilled in the power struggle. In the convergent era, in order to be more powerful, both surveillance and counter-surveillance activities aim for more visibility. Although both attempt to use the same means (technology) to trap the other side, the differences are in their subjects, objects, goals and results.While in surveillance, visibility of the many by the few is mostly for the purpose of control and influence in undemocratic ways, in counter-surveillance, the visibility of the few by the many is mostly through democratic ways to secure more accountability and transparency from the governments.As mentioned in the case of Iran’s Green Movement, the scale and scope of visibility are different in surveillance and counter-surveillance. The importance of what Shaw wrote about Sydney occupy counter-surveillance, applies to other places, such as Iran. She has stressed that ‘protesters and police engaged in a dance of technology and surveillance with one another. Both had access to technology, but there were uncertainties about the extent of technology and its proficient use…’In Iran (2009), both sides (government and activists) used technology and benefited from digital networked platforms, but their levels of access and domains of influence were different, which was because the sources of power, information and wealth were divided asymmetrically between them. Creativity was important for both sides to make others more visible, and make themselves invisible. Also, sharing information to make the other side visible played an important role in these two areas. References Alen, David. “The Trouble with Transparency: The Challenge of Doing Journalism Ethics in a Surveillance Society.” Journalism Studies 9.3 (2008): 323-40. 8 Dec. 2013 ‹http://www.tandfonline.com/doi/full/10.1080/14616700801997224#.UqRFSuIZsqN›. Anden-Papadopoulos, Kari. “Citizen Camera-Witnessing: Embodied Political Dissent in the Age of ‘Mediated Mass Self-Communication.’” New Media & Society 16.5 (2014). 753-69. 9 Aug. 2014 ‹http://nms.sagepub.com/content/16/5/753.full.pdf+html›. Andrejevic, Mark. iSpy: Surveillance and Power in the Interactive Era. Lawrence, Kan: UP of Kansas, 2007. Axworthy, Micheal. Revolutionary Iran: A History of the Islamic Republic. London: Penguin Books, 2014. Bentham, Jeremy. Panopticon Postscript. London: T. Payne, 1791. Beth Elson, Sara, Douglas Yeung, Parisa Roshan, S.R. Bohandy, and Alireza Nader. Using Social Media to Gauge Iranian Public Opinion and Mood after the 2009 Election. Santa Monica: RAND Corporation, 2012. 1 Aug. 2014 ‹http://www.rand.org/content/dam/rand/pubs/technical_reports/2012/RAND_TR1161.pdf›. Breen, Marcus. Uprising: The Internet’s Unintended Consequences. Champaign, Ill: Common Ground Pub, 2011. Burton, Fred. “The Secrets of Counter-Surveillance.” Stratfor Global Intelligence. 2007. 19 April 2015 ‹https://www.stratfor.com/secrets_countersurveillance›. Carrieri, Matthew, Ali Karimzadeh Bangi, Saad Omar Khan, and Saffron Suud. After the Green Movement Internet Controls in Iran, 2009-2012. OpenNet Initiative, 2013. 17 Dec. 2013 ‹https://opennet.net/sites/opennet.net/files/iranreport.pdf›. Castells, Manuel. The Internet Galaxy: Reflections on the Internet, Business, and Society. Oxford: Oxford UP: 2001. Cellan-Jones, Rory. “Hi-Tech Helps Iranian Monitoring.” BBC, 2009. 26 July 2014 ‹http://news.bbc.co.uk/1/hi/technology/8112550.stm›. “Cyber Crimes’ List.” Iran: Cyber Police, 2009. 17 July 2014 ‹http://www.cyberpolice.ir/page/2551›. Foucault, Michel. Discipline and Punish: The Birth of the Prison. Trans. Alan Sheridan. Harmondsworth: Penguin, 1977. Foucault, Michel. “The Eye of Power.” 1980. 12 Dec. 2013 ‹https://nbrokaw.files.wordpress.com/2010/12/the-eye-of-power.doc›. Freedom House. “Special Report: Iran.” 2009. 14 June 2014 ‹http://www.sssup.it/UploadDocs/4661_8_A_Special_Report_Iran_Feedom_House_01.pdf›. Fuchs, Christian. “Introduction.” Internet and Surveillance: The Challenges of Web 2.0 and Social Media. Ed. Christian Fuchs. London: Routledge, 2012. 1-28. Fuchs, Christian. “Critique of the Political Economy of Web 2.0 Surveillance.” Internet and Surveillance: The Challenges of Web 2.0 and Social Media. Ed. Christian Fuchs. London: Routledge, 2012. 30-70. Gerbaudo, Paolo. Tweets and the Streets: Social Media and Contemporary Activism. London: Pluto, 2012. “Internet: Iran’s New Imaginary Enemy.” Jaras Mar. 2009. 28 June 2014 ‹http://www.rahesabz.net/print/12143›.Iran Media Program. “Text Messaging as Iran's New Filtering Frontier.” 2013. 25 July 2014 ‹http://www.iranmediaresearch.org/en/blog/227/13/04/25/136›. Internet World Stats News. The Internet Hits 1.5 Billion. 2009. 3 July 2014 ‹ http://www.internetworldstats.com/pr/edi038.htm›. Lyon, David. Surveillance Society: Monitoring Everyday Life. Buckingham: Open UP, 2001. Lyon, David. “9/11, Synopticon, and Scopophilia: Watching and Being Watched.” The New Politics of Surveillance and Visibility. Eds. Richard V. Ericson and Kevin D. Haggerty. Toronto: UP of Toronto, 2006. 35-54. Marx, Gary T. “What’s New about the ‘New Surveillance’? Classify for Change and Continuity.” Surveillance & Society 1.1 (2002): 9-29. McMillan, Robert. “With Unrest in Iran, Cyber-Attacks Begin.” PC World 2009. 17 Apr. 2015 ‹http://www.pcworld.com/article/166714/article.html›. Meikle, Graham, and Sherman Young. Media Convergence: Networked Digital Media in Everyday Life. London: Palgrave Macmillan, 2012. Morozov, Evgeny. “How Dictators Watch Us on the Web.” Prospect 2009. 15 June 2014 ‹http://www.prospectmagazine.co.uk/magazine/how-dictators-watch-us-on-the-web/#.U5wU6ZRdU00›.Open Net. “Iran.” 2009. 26 June 2014 ‹https://opennet.net/research/profiles/iran›. Reporters without Borders. “Web 2.0 versus Control 2.0.” 2010. 27 May 2014 ‹http://en.rsf.org/web-2-0-versus-control-2-0-18-03-2010,36697›.Rosen, Jay. The People Formerly Known as the Audience. 2006. 7 Dec. 2013 ‹http://www.huffingtonpost.com/jay-rosen/the-people-formerly-known_1_b_24113.html›. Shaw, Frances. “'Walls of Seeing': Protest Surveillance, Embodied Boundaries, and Counter-Surveillance at Occupy Sydney.” Transformation 23 (2013). 9 Dec. 2013 ‹http://www.transformationsjournal.org/journal/issue_23/article_04.shtml›. “The Warning of the Iranian Revolutionary Guard Corps (IRGC) to the Weblogs and Websites.” BBC, 2009. 27 July 2014 ‹http://www.bbc.co.uk/persian/iran/2009/06/090617_ka_ir88_sepah_internet.shtml›. Thompson, John B. The Media And Modernity: A Social Theory of the Media. Cambridge: Polity Press, 1995. Thompson, John B. “The New Visibility.” Theory, Culture & Society 22.6 (2005): 31-51. 10 Dec. 2013 ‹http://tcs.sagepub.com/content/22/6/31.full.pdf+html›. Tusa, Felix. “How Social Media Can Shape a Protest Movement: The Cases of Egypt in 2011 and Iran in 2009.” Arab Media and Society 17 (Winter 2013). 15 July 2014 ‹http://www.arabmediasociety.com/index.php?article=816&p=0›. Tzu, Sun. Sun Tzu: The Art of War. S.l.: Pax Librorum Pub. H, 2009. Valizadeh, Reza. “Invitation to the Public Shooting with the Camera.” RFI, 2011. 19 June 2014 ‹http://www.persian.rfi.fr/%D8%AF%D8%B9%D9%88%D8%AA-%D8%A8%D9%87-%D8%B4%D9%84%DB%8C%DA%A9-%D8%B9%D9%85%D9%88%D9%85%DB%8C-%D8%A8%D8%A7-%D8%AF%D9%88%D8%B1%D8%A8%DB%8C%D9%86-%D8%B9%DA%A9%D8%A7%D8%B3%DB%8C-20110307/%D8%A7%DB%8C%D8%B1%D8%A7%D9%86›. Wagner, Ben. Exporting Censorship and Surveillance Technology. Netherlands: Humanist Institute for Co-operation with Developing Countries (Hivos), 2012. 7 July 2014 ‹https://hivos.org/sites/default/files/exporting_censorship_and_surveillance_technology_by_ben_wagner.pdf›. World Bank. Mobile Cellular Subscriptions (per 100 People). The World Bank. N.d. 27 June 2014 ‹http://data.worldbank.org/indicator/IT.CEL.SETS.P2›.

9

White,PeterB., and Naomi White. "Staying Safe and Guilty Pleasures." M/C Journal 10, no.1 (March1, 2007). http://dx.doi.org/10.5204/mcj.2614.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Introduction In a period marked by the pervasiveness of new mobile technologies saturating urban areas of the Asia-Pacific region, it can be easy to forget the realities of life in the rural areas. In a location such as Australia, in which 80% of the population lives in urban areas, one must be reminded of the sociotechnological realities of rural existence where often-newer mobile communication devices cease to function. This paper focuses on these black spots – and often forgotten areas – where examples of older, mediated technologies such as UHF Citizen Band (CB) radios can be found as integral to practices of everyday rural life. As Anderson notes, constructs of the nation are formed through contested notions of what individuals and communities imagine and project as a sense of place. In Australia, one of the dominant contested imageries can be found in the urban and rural divide, a divide that is not just social and cultural but technological; it is marked by a digital divide. This divide neatly corresponds to the images of Australia experienced by Australians (predominantly living in urban areas) and exported tourist images of the rugged vast rural landscapes. The remote Australia Outback is a popular destination for domestic tourists. Its sparsely populated and rough terrain attracts tourists seeking a quintessentially Australian experience. Roads are often unmade and in poor condition. Fuel and food supplies and health services are widely separated and there is almost no permanent accommodation. Apart from a small number of regional centres there is no access to mobile phones or radio broadcasts. As a consequence tourists must be largely self sufficient. While the primary roads carry significant road traffic it is possible to drive all day on secondary roads without seeing another person. Isolation and self-sufficiency are both an attraction and a challenge. Travelling in campervans, towing caravans or camper trailers and staying in caravan parks, national parks, roadside stops or alone in the bush, tourists spend extended times in areas where there are few other tourists. Many tourists deal with this isolation by equipping their vehicles with CB radios. Depending on the terrain, they are able to listen to, and participate in conversations with other CB users within a 10-20 kilometre range. In some areas where there are repeater stations, the range of radio transmissions can be extended. This paper examines the role of these CB radios in the daily life of tourists in the Australian Outback. Theoretical Issues The links between travel, the new communications technologies and the diminished spatial-time divide have been explored by John Urry. According to Urry, mobile electronic devices make it possible for people “to leave traces of their selves in informational space” (266). Using these informational traces, mobile communication technologies ‘track’ the movements of travellers, enabling them to communicate synchronously. People become ’nodes in multiple networks of communication and mobility’ (266). Another consequence of readily available communication independent of location is for the meaning of social connections. Social encounters provide tourists with the opportunity to develop and affirm understandings of their shared common occupation of unfamiliar social and cultural landscapes (Harrison). Both transitory and enduring relationships provide information, companionship and resources that allow tourists to create, share and give meaning to their experiences (Stokowski). Communication technology also enables individuals to enter and remain part of social networks while physically absent and distant from them (Johnsen; Makimoto and Manners, Urry). The result is a “nomadic intimacy” in an everyday social and physical environment characterised by extended spaces and individual freedom to move around in these spaces (Fortunati). For travellers in the Australian Outback, this “nomadic intimacy” is both literal and metaphorical. Research has shown that travellers use mobile communications services and a range of other communication strategies to maintain a “symbolic proximity” with family, friends and colleagues (Wurtzel and Turner) and to promote a sense of “presence while absent”, or ‘co-presence’ (Gergen; Lury; Short, Williams and Christie; White and White, “Keeping Connected”; White and White, “Home and Away”). Central to the original notion of co-presence was that it was contingent on those involved in a given communication both being and feeling close enough to perceive each other and to be perceived in the course of their activities (Goffman). That is, the notion of co-presence initially referred to physical presence in face-to-face contact and interactions. However, increasing use of mobile phones in particular has meant that this sense of connection can be affirmed at a distance. But what happens when travellers do not have access to mobile phones and the Internet, and as a consequence, do not have access to their networks of family, friends and colleagues? How do they deal with travel and isolation in a harsh environment? These issues are the starting point for the present paper, which examines travellers’ experience of CB radio in the remote Australian Outback. This exploration of how the CB radio has been incorporated into the daily lives of these travellers can be seen as a contribution to an understanding of the domestication of mobile communications (Haddon). Methodology People were included in the study if they used CB radios while travelling in remote parts of Western Australian and the Northern Territory. The participants were approached in caravan parks, camping grounds and at roadside stops. Most were travelling in caravans while others were using camper trailers and campervans. Twenty-four travellers were interviewed, twelve men and twelve women. All were travelling with partners or spouses, and one group of two couples was travelling together. They ranged in age from twenty five to seventy years, and all were Australian residents. The duration of their travels varied from six weeks to eleven months. Participants were interviewed using a semi-structured interview schedule. The interviews were transcribed and then thematically coded with respect to regularly articulated points of view. Where points of view were distinctive, they were noted during the coding process as contrasting instances. While the relatively small sample size limits generalizability, the issues raised by the respondents provide insights into the meaning of CB radio use in the daily life of travellers in the Australian Outback. Findings Staying Safe The primary reason given for travelling with a CB radio was personal safety. The tourists interviewed were aware of the risks associated with travelling in the Outback. Health emergencies, car accidents and problems with tyres in a harsh and hot environment without ready access to water were often mentioned. ‘If you call a May Day someone will come out and answer…” (Female, 55). Another interviewee reported that: Last year we helped some folk who were bogged in the sand right at the end of the road in the middle of nowhere. The wife just started calling the various channels explaining that they were bogged and asking whether there was anyone out there….We went and towed them out. …. It would have been a long walk for them to get help. (Female, 55) Even though most interviewees had not themselves experienced a personal emergency, many recounted stories about how CB radio had been used to come to the aid of someone in distress. Road conditions were another concern. Travellers were often rightly very concerned about hazards ahead. One traveller noted: You are always going to hear someone who gives you an insight as to what is happening up ahead on the road. If there’s an accident up ahead someone’s going to get on the radio and let people know. Or there could be road works or the road could be sh*tty. (Male, 50) Safety arose in another context. Tourists share the rough and often dusty roads with road trains towing up to three trailers. These vehicles can be 50 metres long. A road train creates wind turbulence when it passes a car and trailer or caravan and the dust it raises reduces visibility. Because of this car drivers and caravanners need to be extremely careful when they pass or are passed by one. Passing a road train at 100 km can take 2.5km. Interviewees reported that they communicated with road train drivers to negotiate a safe time and place to pass. One caravanner noted: Sometimes you see a road train coming up behind you. You call him up and say ” I’ll pull over for you mate and slow down and you go”. You use it a lot because it’s safer. We are not in a hurry. Road trains are working and they are in a hurry and he (sic.) is bigger, so he has the right of way. (Male, 50) As with the dominant rationale for installing and using a CB radio, Rice and Katz showed that concern about safety is the primary motive for women acquiring a mobile phone, and safety was also important for men. The social contact enabled by CB radio provided a means of tracking the movements of other travellers who were nearby. This tracking ability engendered a sense of comfort and enabled them to communicate and exchange information synchronously in a potentially dangerous environment. As a consequence, a ‘metaworld’ (Suvantola) of ‘informational traces’ (Urry) was created. Making Oneself Known All interactions entail conventions and signals that enable a conversation to commence. These conventions were also seen to apply to CB conversations. Driving in a car or truck involves being physically enclosed with the drivers and passengers being either invisible or only partially visible to other travellers. Caravanners deal with this lack of visibility in a number of ways. Many have their first names, the name of their caravan and the channel they use on the rear of their van. A typical sign was “Bill and Rose, Travelling Everywhere, Channel 18” or “Harry and Mary, Bugger Work, Gone Fishing”, Channel 18” clearly visible to anyone coming from behind. (The male partner’s name was invariably first.) A sign that identified the occupants was seen as an invitation to chat by other travellers. One traveller said that if he saw such a sign he would call up by saying: “Hello Harry and Mary”. From then on who knows where it goes. It depends on the people. If someone comes back really cheery and a bit cheeky I can be cheery and cheeky back. (Male, 50) The names of caravans were used in other more personal ways. One couple from South Africa had given their van a Zulu name and that was seen as a way of identifying their origins and encouraging a specific kind of conversation while they were on the road. This couple reported that People call us up and ask us what it means. We have lots of calls about that. We’ve had more conversations about that than anything else. (Male, 67) Another caravanner reported that he had seen a van with “Nanna and Poppa’ on the back. They used that as a cue to start a conversation about their grandchildren. But caravan names linked to their CB radio channel can have a deeper personal meaning. One couple had their first names and the number 58 on the rear of their van. (The number 58 is beyond the range of CB channels.) On further questioning the number 58 was revealed to be the football club number of a daughter who had died. The sign was an attempt to deal with their grief and its public display a way of entering into a conversation about grief and loss. It has probably backfired because it puts people back into their shell because they think “We don’t want to talk about death”. But because of the sign we’ve met people who’ve lost a child too. (Male, 50) As Featherstone notes, drivers develop competence in switching between a range of communicative modes while they are travelling. These range from body gestures to formal signalling devices on other cars. Signage on caravans designed to invite conversation was a specialised signalling device specific to the CB user. Talking Loneliness was another theme emerging from the interviews. One of the attractions of the Outback is its sparse population. As one interviewee noted ‘You can travel all day and not see another soul’ (Female, 35). But this loneliness can be a challenge. Some of these roads are pretty lonely, the radio lets you know that there’s somebody else out there. (Male, 54) Hearing other travellers talk was comforting. As with previous research showing that travellers use mobile communications services to maintain a “symbolic proximity” (Gergen; Lury; Short, Williams and Christie; White and White, “Keeping Connected”) the CB conversations enabled the travellers to feel this sense of connection. These interactions also offered them the possibility of converting mediated relationships into face-to-face encounters along the road. That is, some travellers reported that CB-based chats with people while they were driving would lead to a decision to stop along the road for a shared morning tea or lunch. Conventions governed the use of specific channels. Some of these are government regulated, while others are user generated. For instance, Channels 18 and 40, were seen as ‘working channels’. Some interviewees felt very strongly about people who ‘cluttered up’ these channels and moved to another unused channel when they wanted to have an extended conversation. One couple was unaware of the local convention and could not understand why no one was calling them up. They later discovered that they were on the ‘wrong channel’. Interviewees travelling in a convoy would use the standard channel for travellers and then agree to move to another channel of their choice. When we travelling in a convoy we go off Channel 18 and use another channel to talk. The girls love it to talk about their knitting and work out what they’ve done wrong. We sometimes tell jokes. Also we work out what we are going to do in the next town. (Male, 67) These extended conversations parallel the lengthy conversations between drivers equipped with CB radio in the United States during the 1970’s which Dannaher described as ‘as diverse as those found at a co*cktail party’. They also provided a sense of the “nomadic intimacy” described by Fortunati. Eavesdropping While travellers used Channel 18 for conversations they set their radio to automatically scan all forty channels. When a conversation was located the radio would stop scanning and they could listen to what was being said. This meant that travellers would overhear conversations between strangers. We scan all the channels so you can hear anyone coming up behind, especially trucks and you can hear them say “that damn caravan” and you can say ’ that damn caravan will pull over at the first opportunity.” (Female, 44) But the act of listening in to other people’s conversations created moral dilemmas for some travellers. One interviewee described it as “voyeurism for the ears”. While she described listening to farm conversations as giving her an insight into daily life on huge cattle station she was tempted to butt into one conversation that she was listening to. On reflection she decided against entering the conversation. She said: I didn’t want them to know that we were eavesdropping on their conversation. I’d be embarrassed if a third-party knew that we were listening in. I guess that I’ve been taught that you shouldn’t listen in to other people’s conversations. It’s not good manners… (Female, 35) When travellers overheard conversations between road train or truck drivers they had mixed responses. These conversations were often sexually loaded and seen as coarse by the middle class travellers. Some were forgiving of the conversational excesses, distinguishing themselves from the rough and tumble world of the ‘truckies’. One traveller noted that the truck drivers use a lot of bad language, but you’ve got to go with that, because that’s the type of people they are. But you have to go with the flow. We know that we are ‘playing’ and the truckies are ‘working’ so you have to be considerate to them. (Female, 50) While the language of the truck drivers was often threatening to middle class travellers, overhearing their conversations was also seen as a comfort. One traveller remarked that sometimes you hear truckies talking about their families and they obviously know each other. It’s kind of nice to see how they think. (Female, 50) Travellers had similar feelings when they overheard conversations from cattle stations. Also, local cattle station workers and their families would use CB radios for their social and working communications. Travellers would often overhear these conversations. One traveller noted that when we are driving through a cattle station we work out which channel they are using, and we lock it on that one. And then we listen until they are out of range. We are city people and listening to the station chatter gives us a bit of an insight into what it must be like as a farmer working land out here. And then we talk about the farmers’ conversations. (Female, 35) Another traveller noted: If you are travelling and there’s nothing you can see you can listen to the farmer talking to his wife or the kids. It’s absolutely awesome to hear conversations on radio. (Female, 67) This empathic listening allows the travellers to imagine the lives of others in settings quite different from those with which they are familiar. Furthermore, hearing farmers talking about fixing the fence in the left paddock or rounding up strays makes ‘you feel that you’re not alone’. The networking of the travellers’ social life arising from listening in to others meant that they were able to learn about the environment in which they found themselves, as well as enabling them to feel that they continued to remain embedded or ‘co-present’ in social relationships in circ*mstances of considerable physical isolation. Conclusions The accounts provided by tourists illustrated the way communications technologies – in this case, CB radio – enabled people to become ’nodes in multiple networks of communication and mobility’ described by Urry and to maintain ‘co-presence’. The CB radio allowed tourists to remain part of social networks while being physically absent from them (Gergen). Their responses also demonstrated the significance of CB radio in giving meaning to the experience of travel. The CB radio was shown to be an important part of the travel experience in the remote Australian Outback. The use of CB made it possible for travellers in the Australian Outback to obtain information vital for the safe traverse of the huge distances and isolated roads. The technology enabled them to break down the atomism and frontier-like isolation of the highway. Drivers and their passengers could reach out to other travellers and avoid remaining unconnected strangers. Long hours on the road could be dealt with by listening in on others’ conversations, even though some ambivalence was expressed about this activity. Despite an awareness that they could be violating the personal boundaries of others and that their conversations could be overheard, the use of CB radio meant staying safe and enjoying guilty pleasures. Imagined or not. References Anderson, Benedict. Imagined Community. London: Verso, 1983 Dannefer, W. Dale. “The C.B. Phenomenon: A Sociological Appraisal.” Journal of Popular Culture 12 (1979): 611-19. Featherstone, Mike. “Automobilities: An Introduction.” Theory, Culture and Society 21.4/5 (2004): 1-24. Fortunati, Leopoldina. “The Mobile Phone: Towards New Categories and Social Relations.” Information, Communication and Society 5.2 (2002): 513-28. Gergen, Kenneth. “The Challenge of Absence Presence.” Perpetual Contact: Mobile Communications, Private Talk, Public Performance. Ed. James Katz. Cambridge: Cambridge UP, 2002. 227-54. Goffman, Erving. Behavior in Public Places: Notes on the Social Organization of Gatherings. New York: Free Press of Glencoe, 1963. Haddon, Leslie. “Domestication and Mobile Telephony.” Machines That Become Us: The Social Context of Personal Communication Technology. Ed. James E. Katz. New Brunswick, N.J.: Transaction Publishers, 2003. 43-55. Harrison, Julia. Being a Tourist: Finding Meaning in Pleasure Travel. Vancouver: U of British Columbia P, 2003. Johnsen, Truls Erik. “The Social Context of Mobile Use of Norwegian Teens.” Machines That Become Us: The Social Context of Personal Communication Technology. Ed. James Katz. London: Transaction Publishers, 2003. 161-69. Ling, Richard. “One Can Talk about Common Manners! The Use of Mobile Telephones in Inappropiate Situations.” Communications on the Move: The Experience of Mobile Telephony in the 1990s (Report of Cost 248: The Future European Telecommunications User Mobile Workgroup). Ed. Leslie Haddon. Farsta, Sweden: Telia AB, 1997. 97-120. Lury, Celia. “The Objects of Travel.” Touring Cultures: Transformations of Travel and Theory. Eds. Chris Rojek and John Urry. London: Routledge, 1997. 75-95. Rice, Ronald E., and James E. Katz. “Comparing Internet and Mobile Phone Usage: Digital Divides of Usage, Adoption and Dropouts.” Telecommunications Policy 27 (2003): 597-623. Short, J., E. Williams, and B. Christie. The Social Psychology of Telecommunications. New York: Wiley, 1976. Stokowski, Patricia. “Social Networks and Tourist Behavior.” American Behavioural Scientist 36.2 (1992): 212-21. Suvantola, Jaakko. Tourist’s Experience of Place. Aldershot: Ashgate, 2002. Urry, John. “Mobility and Proximity.” Sociology 36.2 (2002): 255-74. ———. “Social Networks, Travel and Talk.” British Journal of Sociology 54.2 (2003): 155-75. White, Naomi Rosh, and Peter B. White. “Home and Away: Tourists in a Connected World.” Annals of Tourism Research 34. 1 (2007): 88-104. White, Peter B., and Naomi Rosh White. “Keeping Connected: Travelling with the Telephone.” Convergence: The International Journal of Research into New Media Technologies 11.2 (2005): 102-18. Williams, Stephen, and Lynda Williams. “Space Invaders: The Negotiation of Teenage Boundaries through the Mobile Phone.” The Sociological Review 53.2 (2005): 314-31. Wurtzel, Alan H., and Colin Turner. “Latent Functions of the Telephone: What Missing the Extension Means.” The Social Impact of the Telephone. Ed. Ithiel de Sola Pool. Cambridge: MIT Press, 1977. 246-61. Citation reference for this article MLA Style White, Peter B., and Naomi White. "Staying Safe and Guilty Pleasures: Tourists and CB Radio in the Australian Outback." M/C Journal 10.1 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0703/11-white-white.php>. APA Style White, P., and N. White. (Mar. 2007) "Staying Safe and Guilty Pleasures: Tourists and CB Radio in the Australian Outback," M/C Journal, 10(1). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0703/11-white-white.php>.

10

Dodd, Adam. "Making It Unpopular." M/C Journal 2, no.4 (June1, 1999). http://dx.doi.org/10.5204/mcj.1767.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

It is time for the truth to be brought out ... . Behind the scenes high-ranking Air Force officers are soberly concerned about the UFOs. But through official secrecy and ridicule, many citizens are led to believe the unknown flying objects are nonsense. -- Rear Admiral Roscoe Hillenkoetter, Director of Central Intelligence (1947-50), signed statement to Congress, 22 Aug. 1960 As an avid UFO enthusiast, an enduring subject of frustration for me is the complacency and ignorance that tends to characterise public knowledge of the phenomenon itself and its social repercussions. Its hard for people like myself to understand how anyone could not be interested in UFOs, let alone Congressional statements from ex-Directors of the Central Intelligence Agency testifying to an official policy of secrecy and ridicule (in other words, propaganda), which aims to suppress public interest and belief in UFOs. As a student of cultural studies who also happens to be a conspiracy theorist, the idea of the Central Intelligence Agency seeking to manipulate one of the twentieth century's most significant icons -- the UFO -- is a fascinating one, because it allows for the possibility that the ways in which the UFO has come to be understood by the public may involve more than the everyday cultural processes described by cultural studies. A review of the history of the CIA's interest in UFO phenomena actually suggests, quite compellingly I think, that since the 1950s, American culture (and, indirectly and to a lesser degree, the rest of the western world) may have been subjected to a highly sophisticated system of UFO propaganda that originated from the Central Intelligence Agency. This is, of course, a highly contentious claim which would bring many important repercussions should it turn out to be true. There is no point pretending that it doesn't sound like a basic premise of The X-Files -- of course it does. So to extract the idea from its comfortable fictional context and attempt to place it into a real historical one (a completely legitimate endeavour) one must become familiar with the politics of the UFO phenomenon in Cold War America, a field of history which is, to understate the matter, largely ignored by academia. A cursory glance at the thousands of (now declassified) UFO-related documents that once circulated through some of the highest channels of US intelligence reveal that, rather than the nonsense topic it is often considered, the UFO phenomenon has been a matter of great concern for the US government since 1947. To get a sense of just how seriously UFOs were taken by the CIA in the 1950s, consider this declassified 'Secret' memorandum from H. Marshall Chadwell, Assistant Director of Scientific Intelligence, to the Director of Central Intelligence, General Walter Bedell Smith, dated 24 September 1952: a world-wide reporting system has been instituted and major Air Force bases have been ordered to make interceptions of unidentified flying objects ... . Since 1947, ATIC [Air Technical Intelligence Center, a branch of the US Air Force] has received approximately 1500 official reports of sightings ... . During 1952 alone, official reports totalled 250. Of the 1500 reports, Air Force carries 20 percent as unexplained and of those received from January through July 1952 it carries 28 percent as unexplained. (qtd. in Good 390) Fifteen-hundred reports in five years is roughly three-hundred reports per year, which is dangerously close to one per day. Although only twenty percent, or one-fifth of these reports were unexplained, equalling about 60 unexplained sightings per year, this still equalled more than one unexplained sighting per week. But these were just the unexplained, official sightings collected by ATIC, which was by no means a comprehensive database of all sightings occurring in the United States, or the rest of the world, for that matter. Extrapolation of these figures suggested that the UFO problem was probably much more extensive than the preliminary findings were indicating, hence the erection of a world-wide reporting system and the interception of UFOs by major US Air Force bases. The social consequences of the UFO problem quickly became a matter of major importance to the CIA. Chadwell went on to point out that: The public concern with the phenomena, which is reflected both in the United States press and in the pressure of inquiry upon the Air Force, indicates that a fair proportion of our population is mentally conditioned to the acceptance of the incredible. In this fact lies the potential for the touching-off of mass hysteria and panic. (qtd. in Good 393) By "acceptance of the incredible" Chadwell was probably referring to acceptance of the existence of intelligently controlled, disc-shaped craft which are capable of performing aerial manoeuvres far in excess of those possible with contemporary technology. Flying saucers were, and remain, incredible. Yet belief in them had permeated the US government as early as 1947, when a 'Secret' Air Materiel Command report (now declassified) from Lieutenant General Nathan Twining to the Commanding General, Army Air Forces, announced that: It is the opinion that: (a) The phenomenon reported is something real and not visionary and fictitious. There are objects probably approximating the shape of a disc, of such appreciable size as to appear to be as large as man-made aircraft. There is a possibility that some of the incidents may be caused by natural phenomena, such as meteors. (b) The reported operating characteristics such as extreme rates of climb, manoeuvrability (particularly in roll), and action which must be considered evasive when sighted or contacted by friendly aircraft or radar, lend belief to the possibility that some of the objects are controlled either manually, automatically, or remotely. -- (qtd. in Good 313-4) This report was compiled only two months after the term flying saucer had been invented, following pilot Kenneth Arnold's historic sighting of nine saucer-like objects in June 1947. The fact that a phenomenon which should have been ignored as a tabloid fad was being confirmed, extremely quickly, by the Air Materiel Command Headquarters suggested that those people mentally conditioned to accept the impossible were not restricted to the public domain. They also, apparently, held positions of considerable power within the government itself. This rapid acceptance, at the highest levels of America's defense agencies, of the UFO reality must have convinced certain segments of the CIA that a form of hysteria had already begun, so powerful that those whose job it was to not only remain immune from such psychosocial forces, but to manage them, were actually succumbing to it themselves. What the CIA faced, then, was nothing short of a nation on the verge of believing in aliens. Considering this, it should become a little clearer why the CIA might develop an interest in the UFO phenomenon at this point. Whether aliens were here or not did not, ultimately, matter. What did matter was the obvious social phenomenon of UFO belief. Walter Bedell Smith, Director of Central Intelligence, realised this in 1952, and wrote to the Executive Secretary of the National Security Council (in a letter previously classified 'Secret'): It is my view that this situation has possible implications for our national security which transcend the interests of a single service. A broader, coordinated effort should be initiated to develop a firm scientific understanding of the several phenomena which apparently are involved in these reports, and to assure ourselves that the incidents will not hamper our present efforts in the Cold War or confuse our early warning system in case of an attack. I therefore recommend that this Agency and the agencies of the Department of Defense be directed to formulate and carry out a program of intelligence and research activities required to solve the problem of instant positive identification of unidentified flying objects ... . This effort shall be coordinated with the military services and the Research and Development Board of the Department of Defense, with the Psychological Strategy Board and other Governmental agencies as appropriate. (qtd. in Good 400-1) What the Director was asserting, basically, was that the UFO problem was too big for the CIA to solve alone. Any government agencies it was deemed necessary to involve were to be called into action to deal with the UFOs. If this does not qualify UFOs as serious business, it is difficult to imagine what would. In the same year, Chadwell again reported to the CIA Director in a memo which suggests that he and his colleagues were on the brink of believing not only that UFOs were real, but that they represented an extraterrestrial presence: At this time, the reports of incidents convince us that there is something going on that must have immediate attention ... . Sightings of unexplained objects at great altitudes and traveling at high speeds in the vicinity of major US defense installations are of such nature that they are not attributable to natural phenomena or known types of aerial vehicles. (qtd. in Good 403) In 1953, these concerns eventually led to the CIA's most public investigation of the UFO phenomenon, the Robertson Panel. Its members were Dr H. P. Robertson (physics and radar); Dr Lloyd V. Berkner (geophysics); Dr Samuel Goudsmit (atomic structure and statistical problems); and Dr Thornton Page (astronomy and astrophysics). Associate members were Dr J. Allen Hynek (astronomy) and Frederick C. Durant (missiles and rockets). Twelve hours of meetings ensued (not nearly enough time to absorb all of the most compelling UFO data gathered at this point), during which the panel was shown films of UFOs, case histories and sightings prepared by the ATIC, and intelligence reports relating to the Soviet Union's interest in US sightings, as well as numerous charts depicting, for example, frequency and geographic location of sightings (Good 404). The report (not fully declassified until 1975) concluded with a highly skeptical, and highly ambiguous, view of UFO phenomena. Part IV, titled "Comments and Suggestions of the Panel", stated that: Reasonable explanations could be suggested for most sightings ... by deduction and scientific method it could be induced (given additional data) that other cases might be explained in a similar manner. (qtd. in Good 404) However, even if the panel's insistence that UFOs were not of extraterrestrial origin seemed disingenuous, it still noted the subjectivity of the public to mass hysteria and greater vulnerability to possible enemy psychological warfare (qtd. in Good 405). To remedy this, it recommended quite a profound method of propaganda: The debunking aim would result in reduction in public interest in flying saucers which today evokes a strong psychological reaction. This education could be accomplished by mass media such [as] television, motion pictures, and popular articles. Basis of such education would be actual case histories which had been puzzling at first but later explained. As in the case of conjuring tricks, there is much less stimulation if the secret is known. Such a program should tend to reduce the current gullibility of the public and consequently their susceptibility to clever hostile propaganda. The panel noted that the general absence of Russian propaganda based on a subject with so many obvious possibilities for exploitation might indicate a possible Russian official policy ... . It was felt strongly that psychologists familiar with mass psychology should advise on the nature and extent of the program ... . It was believed that business clubs, high schools, colleges, and television stations would all be pleased to cooperate in the showing of documentary type motion pictures if prepared in an interesting manner. The use of true cases showing first the mystery and then the explanation would be forceful ... . The continued emphasis on the reporting of these phenomena does, in these parlous times, result in a threat to the orderly functioning of the protective organs of the body politic ... . [It is recommended that] the national security agencies take immediate steps to strip the Unidentified Flying Objects of the special status they have been given and the aura of mystery they have unfortunately acquired; that the national security agencies institute policies on intelligence, training, and public education designed to prepare the material defenses and the morale of the country to recognise most promptly and to react most effectively to true indications of hostile intent or action. We suggest that these aims may be achieved by an integrated program designed to reassure the public of the total lack of evidence of inimical forces behind the phenomena, to train personnel to recognize and reject false indications quickly and effectively, and to strengthen regular channels for the evaluation of and prompt reaction to true indications of hostile measures. (qtd. in Good 405-6) The general aim of the Robertson Panel's recommendations, then, was to not only stop people believing in UFOs, but to stop people seeing UFOs, which constitutes an extreme manipulation of the public consciousness. It was the intention of the CIA to ensure, as subtly as was possible, that most people interpreted specific visual experiences (i.e. UFO sightings) in terms of a strict CIA-developed criterion. This momentous act basically amounts to an attempt to define, control and enforce a particular construction of reality which specifically excludes UFOs. In an ironic way, the Robertson Panel report advocated a type of modern exorcism, and may have been the very birthplace of the idea that such an obvious icon of wonder and potential as the UFO is, it can never be more than a misidentification or a hoax. We cannot be certain to what extent the recommendations of the Robertson Panel were put into practice, but we can safely assume that its findings were not ignored by the CIA. For example, Captain Edward J. Ruppelt, Chief of the ATIC's Aerial Phenomena Branch, has testified that "[We were] ordered to hide sightings when possible, but if a strong report does get out, we have to publish a fast explanation -- make up something to kill the report in a hurry, and also ridicule the witnesses, especially if we can't find a plausible answer. We even have to discredit our own pilots" (Good 407). Comments like these make one wonder just how extensive the program of debunking and ridicule actually was. What I have suggested here is that during the 1950s, and possibly throughout the four decades since, an objective of the CIA has been to downplay its own interest in the UFO phenomenon to the public whilst engaging in secret, complex investigations of the phenomenon itself and its social repercussions. If this is the case, as the evidence -- the best of which can be found in the government's own files (even though such evidence, as tens of thousands of conspiracy theorists continue to stress, can hardly be taken simply at face value) -- indicates, then the construction of the UFO in western popular culture will have to be revised as a process involving more than just the projection of popular hopes, desires and anxieties onto an abstract, mythical object. It will also need to be seen as involving the clandestine manipulation of this process by immeasurably powerful groups within the culture itself, such as the CIA. And since the CIAs major concerns about UFOs haved traditionally been explicitly related to the Cold War, the renewed prominence of the UFO in western popular culture since the demise of the Soviet Union requires immediate, serious investigation in a political context. For the UFO issue is, and has always been, a political issue. I suggest that until this fascinating chapter of American domestic history is explored more thoroughly, the cultural function of the UFO will remain just as poorly understood as its physical nature. References Good, Timothy. Beyond Top Secret: The Worldwide UFO Security Threat. London: MacMillan, 1996. Citation reference for this article MLA style: Adam Dodd. "Making It Unpopular: The CIA and UFOs in Popular Culture." M/C: A Journal of Media and Culture 2.4 (1999). [your date of access] <http://www.uq.edu.au/mc/9906/cia.php>. Chicago style: Adam Dodd, "Making It Unpopular: The CIA and UFOs in Popular Culture," M/C: A Journal of Media and Culture 2, no. 4 (1999), <http://www.uq.edu.au/mc/9906/cia.php> ([your date of access]). APA style: Adam Dodd. (1999) Making it unpopular: the CIA and UFOs in popular culture. M/C: A Journal of Media and Culture 2(4). <http://www.uq.edu.au/mc/9906/cia.php> ([your date of access]).

11

Gregson, Kimberly. "Bad Avatar!" M/C Journal 10, no.5 (October1, 2007). http://dx.doi.org/10.5204/mcj.2708.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

While exploring the virtual world Second Life one day, I received a group message across the in-world communication system – “there’s a griefer on the beach. Stay away from the beach till we catch him.” There was no need to explain; everyone receiving the message knew what a griefer was and had a general idea of the kinds of things that could be happening. We’d all seen griefers at work before – someone monopolising the chat channel so no one else can communicate, people being “caged” at random, or even weapons fire causing so much “overhead” that all activity in the area slows to a crawl. These kinds of attacks are not limited to virtual worlds. Most people have experienced griefing in their everyday lives, which might best be defined as having fun at someone else’s expense. More commonly seen examples of this in the real world include teasing, bullying, and harassment; playground bullies have long made other children’s free time miserable. More destructive griefing includes arson and theft. Griefing activities happen in all kinds of games and virtual worlds. Griefers who laugh at new users and “yell” (so that all players can hear) that they stink, have followed new users of Disney’s tween-popular ToonTown. Griefers pose as friendly, helpful players who offer to show new users a path through difficult parts of a game, but then who abandon the new user in a spot where he or she does not have the skills to proceed. In World of Warcraft, a popular massively multiplayer online role playing game (MMORPG) created by Blizzard with more than seven million registered, if not active, users, griefers engage in what is known as corpse camping; they sit by a corpse, killing it over and over every time the player tries to get back into the game. The griefer gets a small number of experience points; the player being killed gets aggravated and has to wait out the griefing to play the game again (Warner & Raiter). Griefing in World of Warcraft was featured in an award nominated episode of the television program South Park, in which one character killed every other player he met. This paper considers different types of griefing, both in online games and virtual worlds, and then looks at the actions other players, those being griefed, take against griefers. A variety of examples from Second Life are considered because of the open-structure of the world and its developing nature. Definitions and Types Griefing in online environments such as video games and virtual worlds has been defined as “purposefully engaging in activities to disrupt the gaming experience of other players” (Mulligan & Patrovsky 250). The “purposeful” part of the definition means that accidental bumping and pushing, behaviours often exhibited by new users, are not griefing (Warner & Raiter). Rossingol defines a griefer as, “a player of malign intentions. They will hurt, humiliate and dishevel the average gamer through bending and breaking the rules of online games. ...They want glory, gain or just to partake in a malignant joy at the misfortune of others.” Davis, who maintains a gaming blog, describes Second Life as being populated by “those who build things and those who like to tear them down,” with the latter being the griefers who may be drawn to the unstructured anything-goes nature of the virtual world (qtd. in Girard). Definitions of griefing differ based on context. For instance, griefing has been examined in a variety of multi-player online games. These games often feature missions where players have to kill other players (PvP), behaviour that in other contexts such as virtual worlds would be considered griefing. Putting a monster on the trail of a player considered rude or unskilled might be a way to teach a lesson, but also an example of griefing (Taylor). Foo and Koivisto define griefing in MMORPGs as “play styles that disrupt another player’s gaming experience, usually with specific intention. When the act is not specifically intended to disrupt and yet the actor is the sole beneficiary, it is greed play, a subtle form of grief play” (11). Greed play usually involves actions that disrupt the game play of others but without technically breaking any game rules. A different way of looking at griefing is that it is a sign that the player understands the game or virtual world deeply enough to take advantage of ambiguities in the rules by changing the game to something new (Koster). Many games have a follow option; griefers pick a victim, stand near them, get as naked as possible, and then just follow them around without talking or explaining their actions (Walker). Another example is the memorial service in World of Warcraft for a player who died in real life. The service was interrupted by an attack from another clan; everyone at the memorial service was killed. It is not clear cut who the griefers actually were in this case – the mourners who chose to have their peaceful service in an area marked for player combat or the attackers following the rules for that area and working to earn points and progress in the game. In the case of the mourners, they were changing the rules of the game to suit them, to create something unique – a shared space to mourn a common friend. But they were definitely not playing by the rules. The attackers, considered griefers by many both in and outside of the game, did nothing that broke any rules of the game, though perhaps they broke rules of common decency (“World”); what they did does not fit into the definition of griefing, as much as do the actions of the mourners (Kotaku). Reshaping the game can be done to embed a new, sometimes political, message into the game. A group named Velvet Strike formed to protest US military action. They went into Counter Strike to bring a “message of peace, love and happiness to online shooters by any means necessary” (King). They placed spray painted graphics containing anti-war messages into the game; when confronted with people from other teams the Velvet Strike members refused to shoot (King). The group website contains “recipes” for non-violent game play. One “recipe” involved the Velvet Strike member hiding at the beginning of a mission and not moving for the rest of the game. The other players would shoot each other and then be forced to spend the rest of the game looking for the last survivor in order to get credit for the win. Similar behaviour has been tried inside the game America’s Army. Beginning March, 2006, deLappe, an artist who opposes the U.S. government’s involvement in Iraq, engaged in griefing behaviour by filling (spamming) the in-game text channel with the names of the people killed in the war; no one else can communicate on that channel. Even his character name, dead-in-Iraq, is an anti-war protest (deLappe). “I do not participate in the proscribed mayhem. Rather, I stand in position and type until I am killed. After death, I hover over my dead avatar’s body and continue to type. Upon being re-incarnated in the next round, I continue the cycle” (deLappe n.p.). What about these games and virtual worlds might lead people to even consider griefing? For one thing, they seem anonymous, which can lead to irresponsible behaviour. Players use fake names. Characters on the screen do not seem real. Another reason may be that rules can be broken in videogames and virtual worlds with few consequences, and in fact the premise of the game often seems to encourage such rule breaking. The rules are not always clearly laid out. Each game or world has a Terms of Service agreement that set out basic acceptable behaviour. Second Life defines griefing in terms of the Terms of Service that all users agree to when opening accounts. Abuse is when someone consciously and with malicious intent violates those terms. On top of that limited set of guidelines, each landowner in a virtual world such as Second Life can also set rules for their own property, from dress code, to use of weapons, to allowable conversation topics. To better understand griefing, it is necessary to consider the motivations of the people involved. Early work on categorising player types was completed by Bartle, who studied users of virtual worlds, specifically MUDs, and identified four player types: killers, achievers, socialisers, and explorers. Killers and achievers seem most relevant in a discussion about griefing. Killers enjoy using other players to get ahead. They want to do things to other people (not for or with others), and they get the most pleasure if they can act without the consent of the other player. Knowing about a game or a virtual world gives no power unless that knowledge can be used to gain some advantage over others and to enhance your standing in the game. Achievers want power and dominance in a game so they can do things to the game and master it. Griefing could help them feel a sense of power if they got people to do their will to stop the griefing behavior. Yee studied the motivations of people who play MMORPGs. He found that people who engage in griefing actually scored high in being motivated to play by both achieving and competition (“Facets”). Griefers often want attention. They may want to show off their scripting skills in the hope of earning respect among other coders and possibly be hired to program for others. But many players are motivated by a desire to compete and to win; these categories do not seem to be adequate for understanding the different types of griefing (Yee, “Faces of Grief”). The research on griefing in games has also suggested ways to categorise griefers in virtual worlds. Suler divides griefers into two types (qtd. in Becker). The first is those who grief in order to make trouble for authority figures, including the people who create the worlds. A few of the more spectacular griefing incidents seem designed to cause trouble for Linden Lab, the creators of Second Life. Groups attacked the servers that run Second Life, known as the grid, in October of 2005; this became known as the “gray goo attack” (Second Life; Wallace). Servers were flooded with objects and Second Life had to be taken off line to be restored from backups. More organised groups, such as the W-hats, the SL Liberation Army, and Patriotic Nigas engage in more large scale and public griefing. Some groups hope to draw attention to the group’s goals. The SL Liberation Army wants Linden Lab to open up the governance of the virtual world so that users can vote on changes and policies being implemented and limit corporate movement into Second Life (MarketingVox). Patriotic Nigas, with about 35 active members, want to slow the entry of corporations into Second Life (Cabron, “Who are Second Life’s”). One often discussed griefer attack in Second Life included a flood of pink flying penises directed against land owner and the first person to have made a profit of more than one million United States dollars in a virtual world, Anshe Chung, during a well-publicised and attended interview in world with technology news outlet CNET (Walsh, “Second Life Millionaire” ). The second type proposed by Suler is the griefer who wants to hurt and victimise others (qtd. in Becker). Individual players often go naked into PG-rated areas to cause trouble. Weapons are used in areas where weapons are banned. Second Life publishes a police blotter, which lists examples of minor griefing and assigned punishment, including incidents of disturbing the peace and violating community standards for which warnings and short bans have been issued. These are the actions of individuals for the most part, as were the people who exploited security holes to enter the property uninvited during the grand opening of Endemol’s Big Brother island in Second Life; guests to the opening were firebombed and caged. One of the griefers explained her involvement: Well I’m from The Netherlands, and as you might know the tv concept of big brother was invented here, and it was in all the newspapers in Holland. So I thought It would be this huge event with lots of media. Then I kinda got the idea ‘hey I could ruin this and it might make the newspaper or tv. So that’s what set me off, lol. (qtd. in Sklar) Some groups do grief just to annoy. The Patriotic Nigas claim to have attacked the John Edwards headquarters inside SL wearing Bush ‘08 buttons (Cabron, “John Edwards Attackers”), but it was not a political attack. The group’s founder, Mudkips Acronym (the name of his avatar in SL) said, “I’m currently rooting for Obama, but that doesn’t mean we won’t raid him or anything. We’ll hit anyone if it’s funny, and if the guy I want to be president in 2008’s campaign provides the lulz, we’ll certainly not cross him off our list” (qtd. in Cabron, “John Edwards Attackers”). If they disrupt a high profile event or site, the attack will be covered by media that can amplify the thrill of the attack, enhance their reputation among other griefers, and add to their enjoyment of the griefing. Part of the definition of griefing is that the griefer enjoys causing other players pain and disrupting their game. One resident posted on the SL blog, “Griefers, for the most part, have no other agenda other than the thrill of sneaking one past and causing a big noise. Until a spokesperson comes forward with a manifesto, we can safely assume that this is the work of the “Jackass” generation, out to disrupt things to show that they can“ (Scarborough). Usually to have fun, griefers go after individuals, rather than the owners and administrators of the virtual world and so fit into Suler’s second type of griefing. These griefers enjoy seeing others get angry and frustrated. As one griefer said: Understanding the griefer mindset begins with this: We don’t take the game seriously at all. It continues with this: It’s fun because you react. Lastly: We do it because we’re jerks and like to laugh at you. I am the fly that kamikazes into your soup. I am the reason you can’t have nice things … . If I make you cry, you’ve made my day. (Drake) They have fun by making the other players mad. “Causing grief is the name of his game. His objective is simple: Make life hell for anyone unlucky enough to be playing with him. He’s a griefer. A griefer is a player bent on purposely frustrating others during a multiplayer game” (G4). “I’m a griefer. It’s what I do,” the griefer says. “And, man, people get so pissed off. It’s great” (G4). Taking Action against Griefers Understanding griefing from the griefer point of view leads us to examine the actions of those being griefed. Suler suggests several pairs of opposing actions that can be taken against griefers, based on his experience in an early social environment called Palace. Many of the steps still being used fit into these types. He first describes preventative versus remedial action. Preventative steps include design features to minimise griefing. The Second Life interface includes the ability to build 3D models and to create software; it also includes a menu for land owners to block those features at will, a design feature that helps prevent much griefing. Remedial actions are those taken by the administrators to deal with the effects of griefing; Linden Lab administrators can shut down whole islands to keep griefer activities from spreading to nearby islands. The second pair is interpersonal versus technical; interpersonal steps involve talking to the griefers to get them to stop ruining the game for others, while technical steps prevent griefers from re-entering the world. The elven community in Second Life strongly supports interpersonal steps; they have a category of members in their community known as guardians who receive special training in how to talk to people bent on destroying the peacefulness of the community or disturbing an event. The creators of Camp Darfur on Better World island also created a force of supporters to fend off griefer attacks after the island was destroyed twice in a week in 2006 (Kenzo). Linden Lab also makes use of technical methods; they cancel accounts so known griefers can not reenter. There were even reports that they had created a prison island where griefers whose antics were not bad enough to be totally banned would be sent via a one-way teleporter (Walsh, “Hidden Virtual World Prison”). Some users of Second Life favour technical steps; they believe that new users should be held a fixed amount of time on the Orientation island which would stop banned users from coming back into the world immediately. The third is to create tools for average users or super users (administrators); both involve software features, some of which are available to all users to help them make the game good for them while others are available only to people with administrator privileges. Average users who own land have a variety of tools available to limit griefing behaviour on their own property. In Second Life, the land owner is often blamed because he or she did not use the tools provided to landowners by Linden Lab; they can ban individual users, remove users from the land, mute their conversation, return items left on the property, and prevent people from building or running scripts. As one landowner said, “With the newbies coming in there, I’ve seen their properties just littered with crap because they don’t know protective measures you need to take as far as understanding land control and access rights” (qtd. in Girard). Super users, those who work for Linden Lab, can remove a player from the game for a various lengths of time based on their behaviour patterns. Responses to griefers can also be examined as either individual or joint actions. Individual actions include those that land owners can take against individual griefers. Individual users, regardless of account type, can file abuse reports against other individuals; Linden Lab investigates these reports and takes appropriate action. Quick and consistent reporting of all griefing, no matter how small, is advocated by most game companies and user groups as fairly successful. Strangely, some types of joint actions have been not so successful. Landowners have tried to form the Second Life Anti-Griefing Guild, but it folded because of lack of involvement. Groups providing security services have formed; many event organisers use this kind of service. (Hoffman). More successful efforts have included the creation of software, such as SLBanLink.com, Karma, and TrustNet that read lists of banned users into the banned list on all participating property. A last category of actions to be taken against griefers, and a category used by most residents of virtual worlds, is to leave them alone—to ignore them, to tolerate their actions. The thinking is that, as with many bullies in real life, griefers want attention; when deprived of that, they will move on to find other amusem*nts. Yelling and screaming at griefers just reinforces their bad behaviour. Users simply teleport to other locations or log off. They warn others of the griefing behaviour using the various in-world communication tools so they too can stay away from the griefers. Most of the actions described above are not useful against griefers for whom a bad reputation is part of their credibility in the griefer community. The users of Second Life who staged the Gray Goo denial of service attack in October, 2005 fit into that category. They did nothing to hide the fact that they wanted to cause massive trouble; they named the self-replicating object that they created Grief Spawn and discussed ways to bring down the world on griefer forums (Wallace) Conclusion The most effective griefing usually involves an individual or small group who are only looking to have fun at someone else’s expense. It’s a small goal, and as long as there are any other users, it is easy to obtain the desired effect. In fact, as word spreads of the griefing and users feel compelled to change their behaviour to stave off future griefer attacks, the griefers have fun and achieve their goal. The key point here is that everyone has the same goal – have fun. Unfortunately, for one group – the griefers – achieving their goal precludes other users from reaching theirs. Political griefers are less successful in achieving their goals. Political creative play as griefing, like other kinds of griefing, is not particularly effective, which is another aspect of griefing as error. Other players react with frustration and violence to the actions of griefers such as deLappe and Velvet-Strike. If griefing activity makes people upset, they are less open to considering the political or economic motives of the griefers. Some complaints are relatively mild; “I’m all for creative protest and what not, but this is stupid. It’s not meaningful art or speaking out or anything of the type, its just annoying people who are never going to change their minds about how awesome they think war is” (Borkingchikapa). Others are more negative: “Somebody really needs to go find where that asshole lives and beat the sh*t out of him. Yeah, it’s a free country and he can legally pull this crap, but that same freedom extends to some patriot kicking the living sh*t out of him” (Reynolds). In this type of griefing no one’s goals for using the game are satisfied. The regular users can not have fun, but neither do they seem to be open to or accepting of the political griefer’s message. This pattern of success and failure may explain why there are so many examples of griefing to disrupt rather then the politically motivated kind. It may also suggest why efforts to curb griefing have been so ineffective in the past. Griefers who seek to disrupt for fun would see it as a personal triumph if others organised against them. Even if they found themselves banned from one area, they could quickly move somewhere else to have their fun since whom or where they harass does not really matter. Perhaps not all griefing is in error, rather, only those griefing activities motivated by any other goal than have fun. People invest their time and energy in creating their characters and developing skills. The behaviour of people in these virtual environments has a definite bearing on the real world. And perhaps that explains why people in these virtual worlds react so strongly to the behaviour. So, remember, stay off the beach until they catch the griefers, and if you want to make up the game as you go along, be ready for the other players to point at you and say “Bad, Bad Avatar.” References Bartle, Richard. “Players Who Suit MUDs.” Journal of MUD Research 1.1 (June 1996). 10 Sep. 2007 http://www.mud.co.uk/richard/hcds.htm>. Becker, David. Inflicting Pain on “Griefers.” 13 Dec. 2004. 10 Oct. 2007 http://www.news.com/Inflicting-pain-on-griefers/2100-1043_3-5488403.html>. Borkingchikapa. Playing America’s Army. 30 May 2006. 10 Aug. 2007 http://www.metafilter.com/51938/playing-Americas-Army>. Cabron, Lou. John Edwards Attackers Unmasked. 5 Mar. 2007. 29 Apr. 2007 http://www.10zenmonkeys.com/2007/03/05/john-edwards-virtual-attackers-unmasked/>. Cabron, Lou. Who Are Second Life’s “Patriotic Nigas”? 8 Mar. 2007. 30 Apr. 2007 http://www.10zenmonkeys.com/2007/03/08/patriotic-nigras-interview-john-edwards-second-life/>. DeLappe, Joseph. Joseph deLappe. 2006. 10 Aug. 2007. http://www.unr.edu/art/DELAPPE/DeLappe%20Main%20Page/DeLappe%20Online%20MAIN.html>. Drake, Shannon. “Jerk on the Internet.” The Escapist Magazine 15 Nov. 2005: 31-32. 20 June 2007 http://www.escapistmagazine.com/issue/19/31>. Foo, Chek Yang. Redefining Grief Play. 2004. 10 Oct. 2007 http://64.233.167.104/search?q=cache:1mBYzWVqAsIJ:www.itu.dk/op/papers/ yang_foo.pdf+foo+koivisto&hl=en&ct=clnk&cd=7&gl=us&client=firefox-a>. Foo, Chek Yang, and Elina Koivisto. Grief Player Motivations. 2004. 15 Aug. 2007 http://www.itu.dk/op/papers/yang_foo_koivisto.pdf>. G4. Confessions of a Griefer. N.D. 21 June 2007 http://www.g4tv.com/xplay/features/42527/Confessions_of_a_Griefer.html>. Girard, Nicole. “Griefer Madness: Terrorizing Virtual Worlds.”_ Linux Insider_ 19 Sep. 2007. 3 Oct. 2007 http://www.linuxinsider.com/story/59401.html>. Hoffman, E. C. “Tip Sheet: When Griefers Attack.” Business Week. 2007. 21 June 2007 http://www.businessweek.com/playbook/07/0416_1.htm>. Kenzo, In. “Comment: Has Plastic Duck Migrated Back to SL?” Second Life Herald Apr. 2006. 10 Oct. 2007 http://www.secondlifeherald.com/slh/2006/04/has_plastic_duc.html>. King, Brad. “Make Love, Not War.” Wired June 2002. 10 Aug. 2007 http://www.wired.com/gaming/gamingreviews/news/2002/06/52894>. Koster, Raph. A Theory of Fun for Game Design. Scotsdale, AZ: Paraglyph, 2005. Kotaku. _WoW Funeral Party Gets Owned. _2006. 15 Aug. 2007 http://kotaku.com/gaming/wow/wow-funeral-party-gets-owned-167354.php>. MarketingVox. Second Life Liberation Army Targets Brands. 7. Dec. 2006. 10 Aug. 2007 http://www.marketingvox.com/archives/2006/12/07/second-life-liberation-army-targets-brands/>. Mulligan, Jessica, and Bridget Patrovsky. Developing Online Games: An Insider’s Guide. Indianapolis: New Riders, 2003. Reynolds, Ren. Terra Nova: dead-in-iraq. 7 May 2006. 15 Aug. 2007 http://terranova.blogs.com/terra_nova/2006/05/deadiniraq_.html>. Rossingnol, Jim. “A Deadly Dollar.” The Escapist Magazine 15 Nov. 2005: 23-27. 20 June 2007 http://www.escapistmagazine.com/issue/19/23>. Scarborough, Solivar. Mass Spam Issue Inworld Being Investigated. 13 Oct. 2006. 20 June 2007 http://blog.secondlife.com/2006/10/13/mass-spam-issue-inworld-being-investigated/>. Sklar, Urizenus. “Big Brother Opening Hypervent Griefed for 4 Hours.” Second Life Herald 12 Dec. 2006. 10 Aug. 2007 http://www.secondlifeherald.com/slh/2006/12/big_brother_ope.html>. Suler, John. The Bad Boys of Cyberspace. 1997. 10 Oct. 2007 http://www-usr.rider.edu/~suler/psycyber/badboys.html>. Taylor, T.L. Play between Worlds: Exploring Online Game Culture. Cambridge, MA: MIT, 2006. Velvet Strike. Velvet-Strike. N.D. 10 Aug. 2007 http://www.opensorcery.net/velvet-strike/nonflame.html>. Walker, John. “How to Be a Complete Bastard.” PC Gamer 13 Mar. 2007. 10 Aug. 2007 http://www.computerandvideogames.com/article.php?id=159883&site=pcg>. Wallace, Mark. “The Day the Grid Disappeared.” Escapist Magazine 15 Nov. 2005: 11. 20 June 2007 http://www.escapistmagazine.com/issue/19/11>. Walsh, Tony. Hidden Virtual-World Prison Revealed. 3 Jan. 2006. 10 Oct. 2007 http://www.secretlair.com/index.php?/clickableculture/entry/hidden_virtual_world_prison_revealed/>. Walsh, Tony. Second Life Millionaire Interview Penis-Bombed. 20 Dec. 2006. 10 Oct. 2007 http://www.secretlair.com/index.php?/clickableculture/entry/second_life_millionaire_interview_penis_bombed/>. Warner, Dorothy, and Mike Raiter. _Social Context in Massively-Multiplayer Online Games. _2005. 20 Aug. 2007 http://www.i-r-i-e.net/inhalt/004/Warner-Raiter.pdf>. “World of Warcraft: Funeral Ambush.” 2006. YouTube. 15 Aug. 2007 http://www.youtube.com/watch?v=31MVOE2ak5w>. Yee, Nicholas. Facets: 5 Motivational Factors for Why People Play MMORPG’s. 2002. 10 Oct. 2007 http://www.nickyee.com/facets/home.html>. Yee, Nicholas. Faces of Grief. 2005. June 2007 http://www.nickyee.com/daedalus/archives/000893.php?page=1>. Citation reference for this article MLA Style Gregson, Kimberly. "Bad Avatar!: Griefing in Virtual Worlds." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/06-gregson.php>. APA Style Gregson, K. (Oct. 2007) "Bad Avatar!: Griefing in Virtual Worlds," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/06-gregson.php>.

12

Lukas,ScottA. "Nevermoreprint." M/C Journal 8, no.2 (June1, 2005). http://dx.doi.org/10.5204/mcj.2336.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Perhaps the supreme quality of print is one that is lost on us, since it has so casual and obvious an existence (McLuhan 160). Print Machine (Thad Donovan, 1995) In the introduction to his book on 9/11, Welcome to the Desert of the Real, Slavoj Zizek uses an analogy of letter writing to emphasize the contingency of post-9/11 reality. In the example, Zizek discusses the efforts of writers to escape the eyes of governmental censors and a system that used blue ink to indicate a message was true, red ink to indicate it was false. The story ends with an individual receiving a letter from the censored country stating that the writer could not find any red ink. The ambiguity and the duplicity of writing, suggested in Zizek’s tale of colored inks, is a condition of the contemporary world, even if we are unaware of it. We exist in an age in which print—the economization of writing—has an increasingly significant and precarious role in our lives. We turn to the Internet chat room for textual interventions in our sexual, political and aesthetic lives. We burn satanic Harry Potter books and issue fatwas against writers like Salman Rushdie. We narrate our lives using pictures, fonts of varying typeface and color, and sound on our personalized homepages. We throw out our printed books and buy audio ones so we can listen to our favorite authors in the car. We place trust of our life savings, personal numbers, and digital identity in the hands of unseen individuals behind computer screens. Decisively, we are a print people, but our very nature of being dependent on the technologies of print in our public and private lives leads to our inability to consider the epistemological, social and existential effects of print on us. In this article, I focus on the current manifestations of print—what I call “newprint”—including their relationships to consumerism, identity formation and the politics of the state. I will then consider the democratic possibilities of print, suggested by the personalization of print through the Internet and home publishing, and conclude with the implications of the end of print that include the possibility of a post-print language and the middle voice. In order to understand the significance of our current print culture, it is important to situate print in the context of the history of communication. In earlier times, writing had magical associations (Harris 10), and commonly these underpinnings led to the stratification of communities. Writing functioned as a type of black box, “the mysterious technology by which any message [could] be concealed from its illiterate bearer” (Harris 16). Plato and Socrates warned against the negative effects of writing on the mind, including the erosion of memory (Ong 81). Though it once supplemented the communicational bases of orality, the written word soon supplanted it and created a dramatic existential shift in people—a separation of “the knower from the known” (Ong 43-44). As writing moved from the inconvenience of illuminated manuscripts and hand-copied texts, it became systemized in Gutenberg print, and writing then took on the signature of the state—messages between people were codified in the technology of print. With the advent of computer technologies in the 1990s, including personal computers, word processing programs, printers, and the Internet, the age of newprint begins. Newprint includes the electronic language of the Internet and other examples of the public alphabet, including billboards, signage and the language of advertising. As much as members of consumer society are led to believe that newprint is the harbinger of positive identity construction and individualism, closer analysis of the mechanisms of newprint leads to a different conclusion. An important context of new print is found in the space of the home computer. The home computer is the workstation of the contemporary discursive culture—people send and receive emails, do their shopping on the Internet, meet friends and even spouses through dating services, conceal their identity on MUDs and MOOs, and produce state-of-the-art publishing projects, even books. The ubiquity of print in the space of the personal computer leads to the vital illusion that this newprint is emancipatory. Some theorists have argued that the Internet exhibits the spirit of communicative action addressed by Juergen Habermas, but such thinkers have neglected the fact that the foundations of newprint, just like those of Gutenberg print, are the state and the corporation. Recent advertising of Hewlett-Packard and other computer companies illustrates this point. One advertisem*nt suggested that consumers could “invent themselves” through HP computer and printer technology: by using the varied media available to them, consumers can make everything from personalized greeting cards to full-fledged books. As Friedrich Kittler illustrates, we should resist the urge to separate the practices of writing from the technologies of their production, what Jay David Bolter (41) denotes as the “writing space”. For as much as we long for new means of democratic and individualistic expression, we should not succumb to the urge to accept newprint because of its immediacy, novelty or efficiency. Doing so will relegate us to a mechanistic existence, what is referenced metaphorically in Thad Donovan’s “print machine.” In multiple contexts, newprint extends the corporate state’s propaganda industry by turning the written word into artifice. Even before newprint, the individual was confronted with the hegemony of writing. Writing creates “context-free language” or “autonomous discourse,” which means an individual cannot directly confront the language or speaker as one could in oral cultures (Ong 78). This further division of the individual from the communicational world is emphasized in newprint’s focus on the aesthetics of the typeface. In word processing programs like Microsoft Word, and specialized ones like TwistType, the consumer can take a word or a sentence and transform it into an aesthetic formation. On the word processing program that is producing this text, I can choose from Blinking Background, Las Vegas Lights, Marching Red or Black Ants, Shimmer, and Sparkle Text. On my campus email system I am confronted with pictorial backgrounds, font selection and animation as an intimate aspect of the communicational system of my college. On my cell phone I can receive text messages, and I can choose to use emoticons (iconic characters and messages) on the Internet. As Walter Ong wrote, “print situates words in space more relentlessly than writing ever did … control of position is everything in print” (Ong 121). In the case of the new culture of print, the control over more functions of the printed page, specifically its presentation, leads some consumers to believe that choice and individuality are the outcomes. Newprint does not free the writer from the constraints imposed by the means of traditional print—the printing press—rather, it furthers them as the individual operates by the logos of a predetermined and programmed electronic print. The capacity to spell and write grammatically correct sentences is abated by the availability of spell- and grammar-checking functions in word processing software. In many ways, the aura of writing is lost in newprint in the same way in which art lost its organic nature as it moved into the age of reproducibility (Benjamin). Just as filters in imaging programs like Photoshop reduce the aesthetic functions of the user to the determinations of the software programmer, the use of automated print technologies—whether spell-checking or fanciful page layout software like QuarkXpress or Page Maker—will further dilute the voice of the writer. Additionally, the new forms of print can lead to a fracturing of community, the opposite intent of Habermas’ communicative action. An example is the recent growth of specialized languages on the Internet. Some of the newer forms of such languages use combinations of alphanumeric characters to create a language that can only be read by those with the code. As Internet print becomes more specialized, a tribal effect may be felt within our communities. Since email began a few years ago, I have noticed that the nature of the emails I receive has been dramatically altered. Today’s emails tend to be short and commonly include short hands (“LOL” = “laugh out loud”), including the elimination of capitalization and punctuation. In surveying students on the reasons behind such alterations of language in email, I am told that these short hands allow for more efficient forms of communication. In my mind, this is the key issue that is at stake in both print and newprint culture—for as long as we rely on print and other communicational systems as a form of efficiency, we are doomed to send and receive inaccurate and potentially dangerous messages. Benedict Anderson and Hannah Arendt addressed the connections of print to nationalistic and fascist urges (Anderson; Arendt), and such tendencies are seen in the post-9/11 discursive formations within the United States. Bumper stickers and Presidential addresses conveyed the same simplistic printed messages: “Either You are with Us or You are with the Terrorists.” Whether dropping leaflets from airplanes or in scrolling text messages on the bottom of the television news screen, the state is dependent on the efficiency of print to maintain control of the citizen. A feature of this efficiency is that newprint be rhetorically immediate in its results, widely available in different forms of technology, and dominated by the notion of individuality and democracy that is envisioned in HP’s “invent yourself” advertsiements. As Marshall McLuhan’s epigram suggests, we have an ambiguous relationship to print. We depend on printed language in our daily lives, for education and for the economic transactions that underpin our consumer world, yet we are unable to confront the rhetoric of the state and mass media that are consequences of the immediacy and magic of both print and new print. Print extends the domination of our consciousness by forms of discourse that privilege representation over experience and the subject over the object. As we look to new means of communicating with one another and of expressing our intimate lives, we must consider altering the discursive foundations of our communication, such as looking to the middle voice. The middle voice erases the distinctions between subjects and objects and instead emphasizes the writer being in the midst of things, as a part of the world as opposed to dominating it (Barthes; Tyler). A few months prior to writing this article, I spent the fall quarter teaching in London. One day I received an email that changed my life. My partner of nearly six years announced that she was leaving me. I was gripped with the fact of my being unable to discuss the situation with her as we were thousands of miles apart and I struggled to understand how such a significant and personal circ*mstance could be communicated with the printed word of email. Welcome to new print! References Anderson, Benedict. Imagined Communities: Reflections on the Origin and Spread of Nationalism. London: Verso, 1991. Arendt, Hannah. The Origins of Totalitarianism. San Diego: Harcourt Brace, 1976. Barthes, Roland. “To Write: An Intransitive Verb?” The Languages of Criticism and the Sciences of Man: The Structuralist Controversy. Ed. Richard Macksey and Eugenio Donato. Baltimore: Johns Hopkins UP, 1970. 134-56. Benjamin, Walter. “The Work of Art in the Age of Its Technological Reproducibility: Second Version.” Walter Benjamin: Selected Writings, Volume 3: 1935-1938. Cambridge: Belknap/Harvard, 2002. Bolter, Jay David. Writing Space: The Computer, Hypertext, and the History of Writing. Hillsdale, NJ: Lawrence Erlbaum, 1991. Habermas, Jürgen. The Theory of Communicative Action. Vol. I. Boston: Beacon Press, 1985. Harris, Roy. The Origin of Writing. La Salle, IL: Open Court, 1986. Kittler, Friedrich A. Discourse Networks 1800/1900. Stanford: Stanford UP, 1990. McLuhan, Marshall. Understanding Media: The Extensions of Man. Cambridge: MIT P, 1994. Ong, Walter J. Orality and Literacy: The Technologizing of the Word. London: Routledge, 1991. Tyler, Stephen A. “The Middle Voice: The Influence of Post-Modernism on Empirical Research in Anthropology.” Post-modernism and Anthropology. Eds. K. Geuijen, D. Raven, and J. de Wolf. Assen, The Neatherlands: Van Gorcum, 1995. Zizek, Slavoj. Welcome to the Desert of the Real. London: Verso, 2002. Citation reference for this article MLA Style Lukas, Scott A. "Nevermoreprint." M/C Journal 8.2 (2005). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0506/04-lukas.php>. APA Style Lukas, S. (Jun. 2005) "Nevermoreprint," M/C Journal, 8(2). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0506/04-lukas.php>.

13

Franks, Rachel. "Building a Professional Profile: Charles Dickens and the Rise of the “Detective Force”." M/C Journal 20, no.2 (April26, 2017). http://dx.doi.org/10.5204/mcj.1214.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

IntroductionAccounts of criminals, their victims, and their pursuers have become entrenched within the sphere of popular culture; most obviously in the genres of true crime and crime fiction. The centrality of the pursuer in the form of the detective, within these stories, dates back to the nineteenth century. This, often highly-stylised and regularly humanised protagonist, is now a firm feature of both factual and fictional accounts of crime narratives that, today, regularly focus on the energies of the detective in solving a variety of cases. So familiar is the figure of the detective, it seems that these men and women—amateurs and professionals—have always had an important role to play in the pursuit and punishment of the wrongdoer. Yet, the first detectives were forced to overcome significant resistance from a suspicious public. Some early efforts to reimagine punishment and to laud the detective include articles written by Charles Dickens; pieces on public hangings and policing that reflect the great Victorian novelist’s commitment to shed light on, through written commentaries, a range of important social issues. This article explores some of Dickens’s lesser-known pieces, that—appearing in daily newspapers and in one of his own publications Household Words—helped to change some common perceptions of punishment and policing. Image 1: Harper's Magazine 7 December 1867 (Charles Dickens Reading, by Charles A. Barry). Image credit: United States Library of Congress Prints and Photographs Division. A Reliance on the Scaffold: Early Law Enforcement in EnglandCrime control in 1720s England was dependent upon an inconsistent, and by extension ineffective, network of constables and night watchmen. It would be almost another three decades before Henry Fielding established the Bow Street Foot Patrol, or Bow Street Runners, in 1749, “six men in blue coats, patrolling the area within six miles of Charing Cross” (Worsley 35). A large-scale, formalised police force was attempted by Pitt the Younger in 1785 with his “Bill for the Further prevention of Crime and for the more Speedy Detection and Punishment of Offenders against the Peace” (Lyman 144). The proposed legislation was withdrawn due to fierce opposition that was underpinned by fears, held by officials, of a divestment of power to a new body of law enforcers (Lyman 144).The type of force offered in 1785 would not be realised until the next century, when the work of Robert Peel saw the passing of the Metropolitan Police Act 1829. The Police Act, which “constituted a revolution in traditional methods of law enforcement” (Lyman 141), was focused on the prevention of crime, “to reassure the lawful and discourage the wrongdoer” (Hitchens 51). Until these changes were implemented violent punishment, through the Waltham Black Act 1723, remained firmly in place (Cruickshanks and Erskine-Hill 359) as part of the state’s arsenal against crime (Pepper 473).The Black Act, legislation often referred to as the ‘Bloody Code’ as it took the number of capital felonies to over 350 (Pepper 473), served in lieu of consistency and cooperation, across the country, in relation to the safekeeping of the citizenry. This situation inevitably led to anxieties about crime and crime control. In 1797 Patrick Colquhoun, a magistrate, published A Treatise on the Police of the Metropolis in which he estimated that, out of a city population of just under 1 million, 115,000 men and women supported themselves “in and near the Metropolis by pursuits either criminal-illegal-or immoral” (Lyman 144). Andrew Pepper highlights tensions between “crime, governance and economics” as well as “rampant petty criminality [… and] widespread political corruption” (474). He also notes a range of critical responses to crime and how, “a particular kind of writing about crime in the 1720s demonstrated, perhaps for the first time, an awareness of, or self-consciousness about, this tension between competing visions of the state and state power” (Pepper 474), a tension that remains visible today in modern works of true crime and crime fiction. In Dickens’s day, crime and its consequences were serious legal, moral, and social issues (as, indeed, they are today). An increase in the crime rate, an aggressive state, the lack of formal policing, the growth of the printing industry, and writers offering diverse opinions—from the sympathetic to the retributive—on crime changed crime writing. The public wanted to know about the criminal who had disturbed society and wanted to engage with opinions on how the criminal should be stopped and punished. The public also wanted to be updated on changes to the judicial system such as the passing of the Judgement of Death Act 1823 which drastically reduced the number of capital crimes (Worsley 122) and how the Gaols Act, also of 1823, “moved tentatively towards national prison reform” (Gattrell 579). Crimes continued to be committed and alongside the wrongdoers were readers that wanted to be diverted from everyday events by, but also had a genuine need to be informed about, crime. A demand for true crime tales demonstrating a broader social need for crimes, even the most minor infractions, to be publicly punished: first on the scaffold and then in print. Some cases were presented as sensationalised true crime tales; others would be fictionalised in short stories and novels. Standing Witness: Dickens at the ScaffoldIt is interesting to note that Dickens witnessed at least four executions in his lifetime (Simpson 126). The first was the hanging of a counterfeiter, more specifically a coiner, which in the 1800s was still a form of high treason. The last person executed for coining in England was in early 1829; as Dickens arrived in London at the end of 1822, aged just 10-years-old (Simpson 126-27) he would have been a boy when he joined the crowds around the scaffold. Many journalists and writers who have documented executions have been “criticised for using this spectacle as a source for generating sensational copy” (Simpson 127). Dickens also wrote about public hangings. His most significant commentaries on the issue being two sets of letters: one set published in The Daily News (1846) and a second set published in The Times (1849) (Brandwood 3). Yet, he was immune from the criticism directed at so many other writers, in large part, due to his reputation as a liberal, “social reformer moved by compassion, but also by an antipathy toward waste, bureaucratic incompetence, and above all toward exploitation and injustice” (Simpson 127). As Anthony Simpson points out, Dickens did not sympathise with the condemned: “He wrote as a realist and not a moralist and his lack of sympathy for the criminal was clear, explicit and stated often” (128). Simpson also notes that Dickens’s letters on execution written in 1846 were “strongly supportive of total abolition” while later letters, written in 1849, presented arguments against public executions rather than the practice of execution. In 1859 Dickens argued against pardoning a poisoner. While in 1864 he supported the execution of the railway carriage murderer Franz Müller, explaining he would be glad to abolish both public executions and capital punishment, “if I knew what to do with the Savages of civilisation. As I do not, I would rid Society of them, when they shed blood, in a very solemn manner” (in Simpson 138-39) that is, executions should proceed but should take place in private.Importantly, Dickens was consistently concerned about society’s fascination with the scaffold. In his second letter to The Daily News, Dickens asks: round what other punishment does the like interest gather? We read of the trials of persons who have rendered themselves liable to transportation for life, and we read of their sentences, and, in some few notorious instances, of their departure from this country, and arrival beyond the sea; but they are never followed into their cells, and tracked from day to day, and night to night; they are never reproduced in their false letters, flippant conversations, theological disquisitions with visitors, lay and clerical […]. They are tried, found guilty, punished; and there an end. (“To the Editors of The Daily News” 6)In this passage, Dickens describes an overt curiosity with those criminals destined for the most awful of punishments. A curiosity that was put on vile display when a mob gathered on the concourse to watch a hanging; a sight which Dickens readily admitted “made [his] blood run cold” (“Letter to the Editor” 4).Dickens’s novels are grand stories, many of which feature criminals and criminal sub-plots. There are, for example, numerous criminals, including the infamous fa*gin in Oliver Twist; or, The Parish Boy’s Progress (1838); several rioters are condemned to hang in Barnaby Rudge: A Tale of the Riots of Eighty (1841); there is murder in The Life and Adventures of Martin Chuzzlewit (1844); and murder, too, in Bleak House (1853). Yet, Dickens never wavered in his revulsion for the public display of the execution as revealed in his “refusal to portray the scene at the scaffold [which] was principled and heartfelt. He came, reluctantly to support capital punishment, but he would never use its application for dramatic effect” (Simpson 141).The Police Detective: A Public Relations ExerciseBy the mid-1700s the crime story was one of “sin to crime and then the gallows” (Rawlings online): “Crimes of every defcription (sic) have their origin in the vicious and immoral habits of the people” (Colquhoun 32). As Philip Rawlings notes, “once sin had been embarked upon, capture and punishment followed” (online). The origins of this can be found in the formula relied upon by Samuel Smith in the seventeenth century. Smith was the Ordinary of Newgate, or prison chaplain (1676–1698), who published Accounts of criminals and their gruesome ends. The outputs swelled the ranks of the already burgeoning market of broadsides, handbills and pamphlets. Accounts included: 1) the sermon delivered as the prisoner awaited execution; 2) a brief overview of the crimes for which the prisoner was being punished; and 3) a reporting of the events that surrounded the execution (Gladfelder 52–53), including the prisoner’s behaviour upon the scaffold and any last words spoken. For modern readers, the detective and the investigation is conspicuously absent. These popular Accounts (1676–1772)—over 400 editions offering over 2,500 criminal biographies—were only a few pence a copy. With print runs in the thousands, the Ordinary earnt up to £200 per year for his efforts (Emsley, Hitchco*ck, and Shoemaker online). For:penitence and profit made comfortable bedfellows, ensuring true crime writing became a firm feature of the business of publishing. That victims and villains suffered was regrettable but no horror was so terrible anyone forgot there was money to be made. (Franks, “Stealing Stories” 7)As the changes brought about by the Industrial Revolution were having their full impact, many were looking for answers, and certainty, in a period of radical social transformation. Sin as a central motif in crime stories was insufficient: the detective was becoming essential (Franks, “True Crime” 239). “In the nineteenth century, the role of the newly-fashioned detective as an agent of consolation or security is both commercially and ideologically central to the subsequent project of popular crime writing” (Bell 8). This was supported by an “increasing professionalism and proficiency of policemen, detectives, and prosecutors, new understandings about psychology, and advances in forensic science and detection techniques” (Murley 10). Elements now included in most crime narratives. Dickens insisted that the detective was a crucial component of the justice system—a figure to be celebrated, one to take centre stage in the crime story—reflecting his staunch support “of the London Metropolitan Police” (Simpson 140). Indeed, while Dickens is known principally for exposing wretched poverty, he was also interested in a range of legal issues as can be evinced from his writings for Household Words. Image 2: Household Words 27 July 1850 (Front Page). Image credit: Dickens Journals Online. W.H. Wills argued for the acceptance of the superiority of the detective when, in 1850, he outlined the “difference between a regular and a detective policeman” (368). The detective must, he wrote: “counteract every sort of rascal whose only means of existence it avowed rascality, but to clear up mysteries, the investigation of which demands the utmost delicacy and tact” (368). The detective is also extraordinarily efficient; cases are solved quickly, in one example a matter is settled in just “ten minutes” (369).Dickens’s pro-police pieces, included a blatantly promotional, two-part work “A Detective Police Party” (1850). The narrative begins with open criticism of the Bow Street Runners contrasting these “men of very indifferent character” to the Detective Force which is “so well chosen and trained, proceeds so systematically and quietly, does its business in such a workman-like manner, and is always so calmly and steadily engaged in the service of the public” (“Police Party, Part I” 409). The “party” is just that: a gathering of detectives and editorial staff. Men in a “magnificent chamber”, seated at “a round table […] with some glasses and cigars arranged upon it; and the editorial sofa elegantly hemmed in between that stately piece of furniture and the wall” (“Police Party, Part I” 409). Two inspectors and five sergeants are present. Each man prepared to share some of their experiences in the service of Londoners:they are, [Dickens tells us] one and all, respectable-looking men; of perfectly good deportment and unusual intelligence; with nothing lounging or slinking in their manners; with an air of keen observation, and quick perception when addressed; and generally presenting in their faces, traces more or less marked of habitually leading lives of strong mental excitement. (“Police Party, Part I” 410) Dickens goes to great lengths to reinforce the superiority of the police detective. These men, “in a glance, immediately takes an inventory of the furniture and an accurate sketch of the editorial presence” and speak “very concisely, and in well-chosen language” and who present as an “amicable brotherhood” (“Police Party, Part I” 410). They are also adaptable and constantly working to refine their craft, through apeculiar ability, always sharpening and being improved by practice, and always adapting itself to every variety of circ*mstances, and opposing itself to every new device that perverted ingenuity can invent, for which this important social branch of the public service is remarkable! (“Police Party, Part II” 459)These detectives are also, in some ways, familiar. Dickens’s offerings include: a “shrewd, hard-headed Scotchman – in appearance not at all unlike a very acute, thoroughly-trained schoolmaster”; a man “with a ruddy face and a high sun-burnt forehead, [who] has the air of one who has been a Sergeant in the army” (“Police Party, Part I” 409-10); and another man who slips easily into the role of the “greasy, sleepy, shy, good-natured, chuckle-headed, un-suspicious, and confiding young butcher” (“Police Party, Part II” 457). These descriptions are more than just attempts to flesh out a story; words on a page reminding us that the author is not just another journalist but one of the great voices of the Victorian era. These profiles are, it is argued here, a deliberate strategy to reassure readers.In summary, police detectives are only to be feared by those residing on the wrong side of the law. For those without criminal intent; detectives are, in some ways, like us. They are people we already know and trust. The stern but well-meaning, intelligent school teacher; the brave and loyal soldier defending the Empire; and the local merchant, a person we see every day. Dickens provides, too, concrete examples for how everyone can contribute to a safer society by assisting these detectives. This, is perfect public relations. Thus, almost singlehandedly, he builds a professional profile for a new type of police officer. The problem (crime) and its solution (the detective) neatly packaged, with step-by-step instructions for citizens to openly support this new-style of constabulary and so achieve a better, less crime-ridden community. This is a theme pursued in “Three Detective Anecdotes” (1850) where Dickens continued to successfully merge “solid lower-middle-class respectability with an intimate knowledge of the criminal world” (Priestman 177); so, proffering the ideal police detective. A threat to the criminal but not to the hard-working and honest men, women, and children of the city.The Detective: As Fact and as FictionThese writings are also a precursor to one of the greatest fictional detectives of the English-speaking world. Dickens observes that, for these new-style police detectives: “Nothing is so common or deceptive as such appearances at first” (“Police Party, Part I” 410). In 1891, Arthur Conan Doyle would write that: “There is nothing so deceptive as an obvious fact” (78). Dickens had prepared readers for the consulting detective Sherlock Holmes: who was smarter, more observant and who had more determination to take on criminals than the average person. The readers of Dickens were, in many respects, positioned as prototypes of Dr John Watson: a hardworking, loyal Englishman. Smart. But not as smart as those who would seek to do harm. Watson needed Holmes to make the world a better place; the subscriber to Household Words needed the police detective.Another article, “On Duty with Inspector Field” (1851), profiled the “well-known hand” responsible for bringing numerous offenders to justice and sending them, “inexorably, to New South Wales” (Dickens 266). Critically this true crime narrative would be converted into a crime fiction story as Inspector Field is transformed (it is widely believed) into the imagined Inspector Bucket. The 1860s have been identified as “a period of awakening for the detective novel” (Ashley x), a predictor of which is the significant sub-plot of murder in Dickens’s Bleak House. In this novel, a murder is committed with the case taken on, and competently solved by, Bucket who is a man of “skill and integrity” a man presented as an “ideal servant” though one working for a “flawed legal system” (Walton 458). Mr Snagsby, of Bleak House, observes Bucket as a man whoseems in some indefinable manner to lurk and lounge; also, that whenever he is going to turn to the right or left, he pretends to have a fixed purpose in his mind of going straight ahead, and wheels off, sharply at the very last moment [… He] notices things in general, with a face as unchanging as the great mourning ring on his little finger, or the brooch, composed of not much diamond and a good deal of setting, which he wears in his shirt. (278) This passage, it is argued here, places Bucket alongside the men at the detective police party in Household Words. He is simultaneously superhuman in mind and manner, though rather ordinary in dress. Like the real-life detectives of Dickens’s articles; he is a man committed to keeping the city safe while posing no threat to law-abiding citizens. ConclusionThis article has explored, briefly, the contributions of the highly-regarded Victorian author, Charles Dickens, to factual and fictional crime writing. The story of Dickens as a social commentator is one that is familiar to many; what is less well-known is the connection of Dickens to important conversations around capital punishment and the rise of the detective in crime-focused narratives; particularly how he assisted in building the professional profile of the police detective. In this way, through fact and fiction, Dickens performed great (if under-acknowledged) public services around punishment and law enforcement: he contributed to debates on the death penalty and he helped to build trust in the radical social project that established modern-day policing.AcknowledgementsThe author offers her sincere thanks to the New South Wales Dickens Society, Simon Dwyer, and Peter Kirkpatrick. The author is also grateful to the reviewers of this article for their thoughtful comments and valuable suggestions. ReferencesAshley, Mike. “Introduction: Seeking the Evidence.” The Notting Hill Mystery. Author. Charles Warren Adams. London: The British Library, 2012. xxi-iv. Bell, Ian A. “Eighteenth-Century Crime Writing.” The Cambridge Companion to Crime Fiction. Ed. Martin Priestman. Cambridge: Cambridge UP, 2003/2006. 7-17.Brandwood, Katherine. “The Dark and Dreadful Interest”: Charles Dickens, Public Death and the Amusem*nts of the People. MA Thesis. Washington, DC: Georgetown University, 2013. 19 Feb. 2017 <https://repository.library.georgetown.edu/bitstream/handle/10822/558266/Brandwood_georgetown_0076M_12287.pdf;sequence=1>.Collins, Philip. Dickens and Crime. London: Macmillan & Co, 1964.Cruickshanks, Eveline, and Howard Erskine-Hill. “The Waltham Black Act and Jacobitism.” Journal of British Studies 24.3 (1985): 358-65.Dickens, Charles. Oliver Twist; or, The Parish Boy’s Progress. London: Richard Bentley,1838.———. Barnaby Rudge: A Tale of the Riots of Eighty. London: Chapman & Hall, 1841. ———. The Life and Adventures of Martin Chuzzlewit. London: Chapman & Hall, 1844.———. “To the Editors of The Daily News.” The Daily News 28 Feb. 1846: 6. (Reprinted in Antony E. Simpson. Witnesses to the Scaffold. Lambertville: True Bill P, 2008. 141–149.)———. “Letter to the Editor.” The Times 14 Nov. 1849: 4. (Reprinted in Antony E. Simpson. Witnesses to the Scaffold. Lambertville: True Bill P, 2008. 149-51.)———. “A Detective Police Party, Part I.” Household Words 1.18 (1850): 409-14.———. “A Detective Police Party, Part II.” Household Words 1.20 (1850): 457-60.———. “Three Detective Anecdotes.” Household Words 1.25 (1850): 577-80.———. “On Duty with Inspector Field.” Household Words 3.64 (1851): 265-70.———. Bleak House. London: Bradbury and Evans, 1853/n.d.Doyle, Arthur Conan. “The Boscombe Valley Mystery.” The Adventures of Sherlock Holmes. London: Penguin, 1892/1981. 74–99.Emsley, Clive, Tim Hitchco*ck, and Robert Shoemaker. “The Proceedings: Ordinary of Newgate’s Accounts.” Old Bailey Proceedings Online, n.d. 4 Feb. 2017 <https://www.oldbaileyonline.org/static/Ordinarys-accounts.jsp>. Franks, Rachel. “True Crime: The Regular Reinvention of a Genre.” Journal of Asia-Pacific Pop Culture 1.2 (2016): 239-54. ———. “Stealing Stories: Punishment, Profit and the Ordinary of Newgate.” Refereed Proceedings of the 21st Conference of the Australasian Association of Writing Programs: Authorised Theft. Eds. Niloofar Fanaiyan, Rachel Franks, and Jessica Seymour. 2016. 1-11. 20 Mar. 2017 <http://www.aawp.org.au/publications/the-authorised-theft-papers/>.Gatrell, V.A.C. The Hanging Tree: Execution and the English People, 1770-1868. Oxford: Oxford UP, 1996.Gladfelder, Hal. Criminality and Narrative in Eighteenth-Century England. Baltimore: Johns Hopkins UP, 2001.Hitchens, Peter. A Brief History of Crime: The Decline of Order, Justice and Liberty in England. London: Atlantic Books, 2003.Lyman, J.L. “The Metropolitan Police Act of 1829.” Journal of Criminal Law, Criminology and Police Science 55.1 (1964): 141-54.Murley, Jean. The Rise of True Crime: 20th Century Murder and American Popular Culture. Westport: Praeger, 2008.Pepper, Andrew. “Early Crime Writing and the State: Jonathan Wilde, Daniel Defoe and Bernard Mandeville in 1720s London.” Textual Practice 25.3 (2011): 473-91. Priestman, Martin. “Post-War British Crime Fiction.” The Cambridge Companion to Crime Fiction. Ed. Martin Priestman. Cambridge: Cambridge UP, 2003. 173-89.Rawlings, Philip. “True Crime.” The British Criminology Conferences: Selected Proceedings, Volume 1: Emerging Themes in Criminology. Eds. Jon Vagg and Tim Newburn. London: British Society of Criminology (1998). 4 Feb. 2017 <http://www.britsoccrim.org/volume1/010.pdf>.Simpson, Antony E. Witnesses to the Scaffold: English Literary Figures as Observers of Public Executions. Lambertville: True Bill P, 2008.Walton, James. “Conrad, Dickens, and the Detective Novel.” Nineteenth-Century Fiction 23.4 (1969): 446-62.Wills, William Henry. “The Modern Science of Thief-Taking.” Household Words 1.16 (1850): 368-72.Worsley, Lucy. A Very British Murder: The Curious Story of How Crime Was Turned into Art. London: BBC Books, 2013/2014.

14

Brandt, Marisa Renee. "Cyborg Agency and Individual Trauma: What Ender's Game Teaches Us about Killing in the Age of Drone Warfare." M/C Journal 16, no.6 (November6, 2013). http://dx.doi.org/10.5204/mcj.718.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

During the War on Terror, the United States military has been conducting an increasing number of foreign campaigns by remote control using drones—also called unmanned aerial vehicles (UAVs) or remotely piloted vehicles (RPVs)—to extend the reach of military power and augment the technical precision of targeted strikes while minimizing bodily risk to American combatants. Stationed on bases throughout the southwest, operators fly weaponized drones over the Middle East. Viewing the battle zone through a computer screen that presents them with imagery captured from a drone-mounted camera, these combatants participate in war from a safe distance via an interface that resembles a video game. Increasingly, this participation takes the form of targeted killing. Despite their relative physical safety, in 2008 reports began mounting that like boots-on-the-ground combatants, many drone operators seek the services of chaplains or other mental health professionals to deal with the emotional toll of their work (Associated Press; Schachtman). Questions about the nature of the stress or trauma that drone operators experience have become a trope in news coverage of drone warfare (see Bumiller; Bowden; Saleton; Axe). This was exemplified in May 2013, when former Air Force drone pilot Brandon Bryant became a public figure after speaking to National Public Radio about his remorse for participating in targeted killing strikes and his subsequent struggle with post-traumatic stress (PTS) (Greene and McEvers). Stories like Bryant’s express American culture’s struggle to understand the role screen-mediated, remotely controlled killing plays in shifting the location of combatants’s sense of moral agency. That is, their sense of their ability to act based on their own understanding of right and wrong. Historically, one of the primary ways that psychiatry has conceptualized combat trauma has been as combatants’s psychological response losing their sense of moral agency on the battlefield (Lifton).This articleuses the popular science fiction novel Ender's Game as an analytic lens through which to examine the ways that screen-mediated warfare may result in combat trauma by investigating the ways in which it may compromise moral agency. The goal of this analysis is not to describe the present state of drone operators’s experience (see Asaro), but rather to compare and contrast contemporary public discourses on the psychological impact of screen-mediated war with the way it is represented in one of the most influential science fiction novels of all times (The book won the Nebula Award in 1985, the Hugo Award in 1986, and appears on both the Modern Library 100 Best Novels and American Library Association’s “100 Best Books for Teens” lists). In so doing, the paper aims to counter prevalent modes of critical analysis of screen-mediated war that cannot account for drone operators’s trauma. For decades, critics of postmodern warfare have denounced how fighting from inside tanks, the co*ckpits of planes, or at office desks has removed combatants from the experiences of risk and endangerment that historically characterized war (see Gray; Levidow & Robins). They suggest that screen-mediation enables not only physical but also cognitive and emotional distance from the violence of war-fighting by circ*mscribing it in a “magic circle.” Virtual worlds scholars adopted the term “magic circle” from cultural historian Johan Huizinga, who described it as the membrane that separates the time and space of game-play from those of real life (Salen and Zimmerman). While military scholars have long recognized that only 2% of soldiers can kill without hesitation (Grossman), critics of “video game wars” suggest that screen-mediation puts war in a magic circle, thereby creating cyborg human-machine assemblages capable of killing in cold blood. In other words, these critics argue that screen-mediated war distributes agency between humans and machines in such a way that human combatants do not feel morally responsible for killing. In contrast, Ender’s Game suggests that even when militaries utilize video game aesthetics to create weapons control interfaces, screen-mediation alone ultimately cannot blur the line between war and play and thereby psychically shield cyborg soldiers from combat trauma.Orson Scott Card’s 1985 novel Ender’s Game—and the 2013 film adaptation—tells the story of a young boy at an elite military academy. Set several decades after a terrible war between humans and an alien race called the buggers, the novel follows the life of a boy named Ender. At age 6, recruiters take Andrew “Ender” Wiggin from his family to begin military training. He excels in all areas and eventually enters officer training. There he encounters a new video game-like simulator in which he commands space ship battalions against increasingly complex configurations of bugger ships. At the novel’s climax, Ender's mentor, war hero Mazer Rackham, brings him to a room crowded with high-ranking military personnel in order to take his final test on the simulator. In order to win Ender opts to launch a massive bomb, nicknamed “Little Doctor”, at the bugger home world. The image on his screen of a ball of space dust where once sat the enemy planet is met by victory cheers. Mazer then informs Ender that since he began officer training, he has been remotely controlling real ships. The video game war was, "Real. Not a game" (Card 297); Ender has exterminated the bugger species. But rather than join the celebration, Ender is devastated to learn he has committed "xenocide." Screen-mediation, the novel shows, can enable people to commit acts that they would otherwise find heinous.US military advisors have used the story to set an agenda for research and development in augmented media. For example, Dr. Michael Macedonia, Chief Technology Officer of the Army Office for Simulation, Training, and Instrumentation told a reporter for the New York Times that Ender's Game "has had a lot of influence on our thinking" about how to use video game-like technologies in military operations (Harmon; Silberman; Mead). Many recent programs to develop and study video game-like military training simulators have been directly inspired by the book and its promise of being able to turn even a six-year-old into a competent combatant through well-structured human-computer interaction (Mead). However, it would appear that the novel’s moral regarding the psychological impact of actual screen-mediated combat did not dissuade military investment in drone warfare. The Air Force began using drones for surveillance during the Gulf War, but during the Global War on Terror they began to be equipped with weapons. By 2010, the US military operated over 7,000 drones, including over 200 weapons-ready Predator and Reaper drones. It now invests upwards of three-billion dollars a year into the drone program (Zucchino). While there are significant differences between contemporary drone warfare and the plot of Ender's Game—including the fact that Ender is a child, that he alone commands a fleet, that he thinks he is playing a game, and that, except for a single weapon of mass destruction, he and his enemies are equally well equipped—for this analysis, I will focus on their most important similarities: both Ender and actual drone operators work on teams for long shifts using video game-like technology to remotely control vehicles in aerial combat against an enemy. After he uses the Little Doctor, Mazer and Graff, Ender's long-time training supervisors, first work to circumvent his guilt by reframing his actions as heroic. “You're a hero, Ender. They've seen what you did, you and the others. I don't think there's a government on Earth that hasn't voted you their highest metal.” “I killed them all, didn't I?” Ender asked. “All who?” asked Graff. “The buggers? That was the idea.” Mazer leaned in close. “That's what the war was for.” “All their queens. So I killed all their children, all of everything.” “They decided that when they attacked us. It wasn't your fault. It's what had to happen.” Ender grabbed Mazer's uniform and hung onto it, pulling him down so they were face to face. “I didn't want to kill them all. I didn't want to kill anybody! I'm not a killer! […] but you made me do it, you tricked me into it!” He was crying. He was out of control. (Card 297–8)The novel up to this point has led us to believe that Ender at the very least understands that what he does in the game will be asked of him in real life. But his traumatic response to learning the truth reveals that he was in the magic circle. When he thinks he is playing a game, succeeding is a matter of ego: he wants to be the best, to live up to the expectations of his trainers that he is humanity’s last hope. When the magic circle is broken, Ender reconsiders his decision to use the Little Doctor. Tactics he could justify to win the game, reframed as real military tactics, threaten his sense of himself as a moral agent. Being told he is a hero provides no solace.Card wrote the novel during the Cold War, when computers were coming to play an increasingly large role in military operations. Historians of military technology have shown that during this time human behavior began to be defined in machine-like, functionalist terms by scientists working on cybernetic systems (see Edwards; Galison; Orr). Human skills were defined as components of large technological systems, such as tanks and anti-aircraft weaponry: a human skill was treated as functionally the same as a machine one. The only issue of importance was how all the components could work together in order to meet strategic goals—a cybernetic problem. The reasons that Mazer and Graff have for lying to Ender suggest that the author believed that as a form of technical augmentation, screen-mediation can be used to evacuate individual moral agency and submit human will to the command of the larger cybernetic system. Issues of displaced agency in the military cyborg assemblage are apparent in the following quote, in which Mazer compares Ender himself to the bomb he used to destroy the bugger home world: “You had to be a weapon, Ender. Like a gun, like the Little Doctor, functioning perfectly but not knowing what you were aimed at. We aimed you. We're responsible. If there was something wrong, we did it” (298). Questions of distributed agency have also surfaced in the drone debates. Government and military leaders have attempted to depersonalize drone warfare by assuring the American public that the list of targets is meticulously researched: drones kill those who we need killed. Drone warfare, media theorist Peter Asaro argues, has “created new and complex forms of human-machine subjectivity” that cannot be understood by considering the agency of the technology alone because it is distributed between humans and machines (25). While our leaders’s decisions about who to kill are central to this new cyborg subjectivity, the operators who fire the weapons nevertheless experience at least a retrospective sense of agency. As phenomenologist John Protevi notes, in the wake of wars fought by modern military networks, many veterans diagnosed with PTS still express guilt and personal responsibility for the outcomes of their participation in killing (Protevi). Mazer and Graff explain that the two qualities that make Ender such a good weapon also create an imperative to lie to him: his compassion and his innocence. For his trainers, compassion means a capacity to truly think like others, friend or foe, and understand their motivations. Graff explains that while his trainers recognized Ender's compassion as an invaluable tool, they also recognized that it would preclude his willingness to kill.It had to be a trick or you couldn't have done it. It's the bind we were in. We had to have a commander with so much empathy that he would think like the buggers, understand them and anticipate them. So much compassion that he could win the love of his underlings and work with them like a perfect machine, as perfect as the buggers. But somebody with that much compassion could never be the killer we needed. Could never go into battle willing to win at all costs. If you knew, you couldn't do it. If you were the kind of person who would do it even if you knew, you could never have understood the buggers well enough. (298)In learning that the game was real, Ender learns that he was not merely coming to understand a programmed simulation of bugger behavior, but their actual psychology. Therefore, his compassion has not only helped him understand the buggers’ military strategy, but also to identify with them.Like Ender, drone operators spend weeks or months following their targets, getting to know them and their routines from a God’s eye perspective. They both also watch the repercussions of their missions on screen. Unlike fighter pilots who drop bombs and fly away, drone operators use high-resolution cameras and fly much closer to the ground both when flying and assessing the results of their strikes. As one drone operator interviewed by the Los Angeles Times explained, "When I flew the B-52, it was at 30,000 to 40,000 feet, and you don't even see the bombs falling … Here, you're a lot closer to the actual fight, or that's the way it seems" (Zucchino). Brookings Institute scholar Peter Singer has argued that in this way screen mediation actually enables a more intimate experience of violence for drone operators than airplane pilots (Singer).The second reason Ender’s trainers give for lying is that they need someone not only compassionate, but also innocent of the horrors of war. The war veteran Mazer explains: “And it had to be a child, Ender,” said Mazer. “You were faster than me. Better than me. I was too old and cautious. Any decent person who knows what warfare is can never go into battle with a whole heart. But you didn't know. We made sure you didn't know" (298). When Ender discovers what he has done, he loses not only his innocence but his sense of himself as a moral agent. After such a trauma, his heart is no longer whole.Actual drone operators are, of course, not kept in a magic circle, innocent of the repercussions of their actions. Nor do they otherwise feel as though they are playing, as several have publicly stated. Instead, they report finding drone work tedious, and some even play video games for fun (Asaro). However, Air Force recruitment advertising makes clear analogies between the skills they desire and those of video game play (Brown). Though the first generations of drone operators were pulled from the ranks of flight pilots, in 2009 the Air Force began training them from the ground. Many drone operators, then, enter the role having no other military service and may come into it believing, on some level, that their work will be play.Recent military studies of drone operators have raised doubts about whether drone operators really experience high rates of trauma, suggesting that the stresses they experience are seated instead in occupational issues like long shifts (Ouma, Chappelle, and Salinas; Chappelle, Psy, and Salinas). But several critics of these studies have pointed out that there is a taboo against speaking about feelings of regret and trauma in the military in general and among drone operators in particular. A PTS diagnosis can end a military career; given the Air Force’s career-focused recruiting emphasis, it makes sense that few would come forward (Dao). Therefore, it is still important to take drone operator PTS seriously and try to understand how screen-mediation augments their experience of killing.While critics worry that warfare mediated by a screen and joystick leads to a “‘Playstation’ mentality towards killing” (Alston 25), Ender's Game presents a theory of remote-control war wherein this technological redistribution of the act of killing does not, in itself, create emotional distance or evacuate the killer’s sense of moral agency. In order to kill, Ender must be distanced from reality as well. While drone operators do not work shielded by the magic circle—and therefore do not experience the trauma of its dissolution—every day when they leave the cyborg assemblage of their work stations and rejoin their families they still have to confront themselves as individual moral agents and bear their responsibility for ending lives. In both these scenarios, a human agent’s combat trauma serves to remind us that even when their bodies are physically safe, war is hell for those who fight. This paper has illustrated how a science fiction story can be used as an analytic lens for thinking through contemporary discourses about human-technology relationships. However, the US military is currently investing in drones that are increasingly autonomous from human operators. This redistribution of agency may reduce incidence of PTS among operators by decreasing their role in, and therefore sense of moral responsibility for, killing (Axe). Reducing mental illness may seem to be a worthwhile goal, but in a world wherein militaries distribute the agency for killing to machines in order to reduce the burden on humans, societies will have to confront the fact that combatants’s trauma cannot be a compass by which to measure the morality of wars. Too often in the US media, the primary stories that Americans are told about the violence of their country’s wars are those of their own combatants—not only about their deaths and physical injuries, but their suicide and PTS. To understand war in such a world, we will need new, post-humanist stories where the cyborg assemblage and not the individual is held accountable for killing and morality is measured in lives taken, not rates of mental illness. ReferencesAlston, Phillip. “Report of the Special Rapporteur on Extrajudicial, Summary, or Arbitrary Executions, Addendum: Study on Targeted Killings.” United Nations Human Rights Council (2010). Asaro, Peter M. “The Labor of Surveillance and Bureaucratized Killing: New Subjectivities of Military Drone Operators”. Social Semiotics 23.2 (2013): 196-22. Associated Press. “Predator Pilots Suffering War Stress.” Military.com 2008. Axe, David. “How to Prevent Drone Pilot PTSD: Blame the ’Bot.” Wired June 2012.Bowden, Mark. “The Killing Machines: How to Think about Drones.” The Atlantic Sep. 2013.Brown, Melissa T. Enlisting Masculinity: The Construction of Gender in US Military Recruiting Advertising during the All-Volunteer Force. London: Oxford University Press, 2012. Bumiller, Elisabeth. “Air Force Drone Operators Report High Levels of Stress.” New York Times 18 Dec. 2011: n. pag. Card, Orson Scott. Ender’s Game. Tom Doherty Associates, Inc., 1985. Chappelle, Wayne, D. Psy, and Amber Salinas. “Psychological Health Screening of Remotely Piloted Aircraft (RPA) Operators and Supporting Units.” Paper presented at the Symposium on Mental Health and Well-Being across the Military Spectrum, Bergen, Norway, 12 April 2011: 1–12. Dao, James. “Drone Pilots Are Found to Get Stress Disorders Much as Those in Combat Do.” New York Times 22 Feb. 2013: n. pag. Edwards, Paul N. The Closed World: Computers and the Politics of Discourse in Cold War America. Cambridge: MIT Press, 1997.Galison, Peter. “The Ontology of the Enemy: Norbert Wiener and the Cybernetic Vision.” Critical Inquiry 21.1 (1994): 228.Gray, Chris Hables “Posthuman Soldiers in Postmodern War.” Body & Society 9.4 (2003): 215–226. 27 Nov. 2010.Greene, David, and Kelly McEvers. “Former Air Force Pilot Has Cautionary Tales about Drones.” National Public Radio 10 May 2013.Grossman, David. On Killing. Revised. Boston: Back Bay Books, 2009. Harmon, Amy. “More than Just a Game, But How Close to Reality?” New York Times 3 Apr. 2003: n. pag. Levidow, Les, and Robins. Cyborg Worlds: The Military Information Society. London: Free Association Books, 1989. Lifton, Robert Jay. Home from the War: Vietnam Veterans: Neither Victims nor Executioners. New York: Random House, 1973. Mead, Corey. War Play: Video Games and the Future of Armed Conflict. Boston: Houghton Mifflin Harcourt, 2013. Orr, Jackie. Panic Diaries: A Genealogy of Panic Disorder. Durham: Duke University Press, 2006.Ouma, J.A., W.L. Chappelle, and A. Salinas. Facets of Occupational Burnout among US Air Force Active Duty and National Guard/Reserve MQ-1 Predator and MQ-9 Reaper Operators. Air Force Research Labs Technical Report AFRL-SA-WP-TR-2011-0003. Wright-Patterson AFB, OH: Air Force Research Laboratory. 2011.Protevi, John. “Affect, Agency and Responsibility: The Act of Killing in the Age of Cyborgs.” Phenomenology and the Cognitive Sciences 7.3 (2008): 405–413. Salen, Katie, and Eric Zimmerman. Rules of Play: Game Design Fundamentals. Cambridge, MA: MIT Press, 2003. Saleton, William. “Ghosts in the Machine: Do Remote-Control War Pilots Get Combat Stress?” Slate.com Aug. 2008. Schachtman, Nathan. “Shrinks Help Drone Pilots Cope with Robo-Violence.” Wired Aug. 2008.Silberman, Steve. “The War Room.” Wired Sep. 2004: 1–5.Singer, P.W. Wired for War: The Robotics Revolution and Conflict in the Twenty-First Century. New York: Penguin Press, 2009. Zucchino, David. “Drone Pilots Have Front-Row Seat on War, from Half a World Away.” Los Angeles Times 21 Feb. 2010: n. pag.

15

Pavlidis, Adele, and David Rowe. "The Sporting Bubble as Gilded Cage." M/C Journal 24, no.1 (March15, 2021). http://dx.doi.org/10.5204/mcj.2736.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Introduction: Bubbles and Sport The ephemeral materiality of bubbles – beautiful, spectacular, and distracting but ultimately fragile – when applied to protect or conserve in the interests of sport-media profit, creates conditions that exacerbate existing inequalities in sport and society. Bubbles are usually something to watch, admire, and chase after in their brief yet shiny lives. There is supposed to be, technically, nothing inside them other than one or more gasses, and yet we constantly refer to people and objects being inside bubbles. The metaphor of the bubble has been used to describe the life of celebrities, politicians in purpose-built capital cities like Canberra, and even leftist, environmentally activist urban dwellers. The metaphorical and material qualities of bubbles are aligned—they cannot be easily captured and are liable to change at any time. In this article we address the metaphorical sporting bubble, which is often evoked in describing life in professional sport. This is a vernacular term used to capture and condemn the conditions of life of elite sportspeople (usually men), most commonly after there has been a sport-related scandal, especially of a sexual nature (Rowe). It is frequently paired with connotatively loaded adjectives like pampered and indulged. The sporting bubble is rarely interrogated in academic literature, the concept largely being left to the media and moral entrepreneurs. It is represented as involving a highly privileged but also pressurised life for those who live inside it. A sporting bubble is a world constructed for its most prized inhabitants that enables them to be protected from insurgents and to set the terms of their encounters with others, especially sport fans and disciplinary agents of the state. The Covid-19 pandemic both reinforced and reconfigured the operational concept of the bubble, re-arranging tensions between safety (protecting athletes) and fragility (short careers, risks of injury, etc.) for those within, while safeguarding those without from bubble contagion. Privilege and Precarity Bubble-induced social isolation, critics argue, encourages a loss of perspective among those under its protection, an entitled disconnection from the usual rules and responsibilities of everyday life. For this reason, the denizens of the sporting bubble are seen as being at risk to themselves and, more troublingly, to those allowed temporarily to penetrate it, especially young women who are first exploited by and then ejected from it (Benedict). There are many well-documented cases of professional male athletes “behaving badly” and trying to rely on institutional status and various versions of the sporting bubble for shelter (Flood and Dyson; Reel and Crouch; Wade). In the age of mobile and social media, it is increasingly difficult to keep misbehaviour in-house, resulting in a slew of media stories about, for example, drunkenness and sexual misconduct, such as when then-Sydney Roosters co-captain Mitchell Pearce was suspended and fined in 2016 after being filmed trying to force an unwanted kiss on a woman and then simulating a lewd act with her dog while drunk. There is contestation between those who condemn such behaviour as aberrant and those who regard it as the conventional expression of youthful masculinity as part of the familiar “boys will be boys” dictum. The latter naturalise an inequitable gender order, frequently treating sportsmen as victims of predatory women, and ignoring asymmetries of power between men and women, especially in hom*osocial environments (Toffoletti). For those in the sporting bubble (predominantly elite sportsmen and highly paid executives, also mostly men, with an array of service staff of both sexes moving in and out of it), life is reflected for those being protected via an array of screens (small screens in homes and indoor places of entertainment, and even smaller screens on theirs and others’ phones, as well as huge screens at sport events). These male sport stars are paid handsomely to use their skill and strength to perform for the sporting codes, their every facial expression and bodily action watched by the media and relayed to audiences. This is often a precarious existence, the usually brief career of an athlete worker being dependent on health, luck, age, successful competition with rivals, networks, and club and coach preferences. There is a large, aspirational reserve army of athletes vying to play at the elite level, despite risks of injury and invasive, life-changing medical interventions. Responsibility for avoiding performance and image enhancing drugs (PIEDs) also weighs heavily on their shoulders (Connor). Professional sportspeople, in their more reflective moments, know that their time in the limelight will soon be up, meaning that getting a ticket to the sporting bubble, even for a short time, can make all the difference to their post-sport lives and those of their families. The most vulnerable of the small minority of participants in sport who make a good, short-term living from it are those for whom, in the absence of quality education and prior social status, it is their sole likely means of upward social mobility (Spaaij). Elite sport performers are surrounded by minders, doctors, fitness instructors, therapists, coaches, advisors and other service personnel, all supporting athletes to stay focussed on and maximise performance quality to satisfy co-present crowds, broadcasters, sponsors, sports bodies and mass media audiences. The shield offered by the sporting bubble supports the teleological win-at-all-costs mentality of professional sport. The stakes are high, with athlete and executive salaries, sponsorships and broadcasting deals entangled in a complex web of investments in keeping the “talent” pivotal to the “attention economy” (Davenport and Beck)—the players that provide the content for sale—in top form. Yet, the bubble cannot be entirely secured and poor behaviour or performance can have devastating effects, including permanent injury or disability, mental illness and loss of reputation (Rowe, “Scandals and Sport”). Given this fragile materiality of the sporting bubble, it is striking that, in response to the sudden shutdown following the economic and health crisis caused by the 2020 global pandemic, the leaders of professional sport decided to create more of them and seek to seal the metaphorical and material space with unprecedented efficiency. The outcome was a multi-sided tale of mobility, confinement, capital, labour, and the gendering of sport and society. The Covid-19 Gilded Cage Sociologists such as Zygmunt Bauman and John Urry have analysed the socio-politics of mobilities, whereby some people in the world, such as tourists, can traverse the globe at their leisure, while others remain fixed in geographical space because they lack the means to be mobile or, in contrast, are involuntarily displaced by war, so-called “ethnic cleansing”, famine, poverty or environmental degradation. The Covid-19 global pandemic re-framed these matters of mobilities (Rowe, “Subjecting Pandemic Sport”), with conventional moving around—between houses, businesses, cities, regions and countries—suddenly subjected to the imperative to be static and, in perniciously unreflective technocratic discourse, “socially distanced” (when what was actually meant was to be “physically distanced”). The late-twentieth century analysis of the “risk society” by Ulrich Beck, in which the mysterious consequences of humans’ predation on their environment are visited upon them with terrifying force, was dramatically realised with the coming of Covid-19. In another iteration of the metaphor, it burst the bubble of twenty-first century global sport. What we today call sport was formed through the process of sportisation (Maguire), whereby hyper-local, folk physical play was reconfigured as multi-spatial industrialised sport in modernity, becoming increasingly reliant on individual athletes and teams travelling across the landscape and well over the horizon. Co-present crowds were, in turn, overshadowed in the sport economy when sport events were taken to much larger, dispersed audiences via the media, especially in broadcast mode (Nicholson, Kerr, and Sherwood). This lucrative mediation of professional sport, though, came with an unforgiving obligation to generate an uninterrupted supply of spectacular live sport content. The pandemic closed down most sports events and those that did take place lacked the crucial participation of the co-present crowd to provide the requisite event atmosphere demanded by those viewers accustomed to a sense of occasion. Instead, they received a strange spectacle of sport performers operating in empty “cathedrals”, often with a “faked” crowd presence. The mediated sport spectacle under the pandemic involved cardboard cut-out and sex doll spectators, Zoom images of fans on large screens, and sampled sounds of the crowd recycled from sport video games. Confected co-presence produced simulacra of the “real” as Baudrillardian visions came to life. The sporting bubble had become even more remote. For elite sportspeople routinely isolated from the “common people”, the live sport encounter offered some sensory experience of the social – the sounds, sights and even smells of the crowd. Now the sporting bubble closed in on an already insulated and insular existence. It exposed the irony of the bubble as a sign of both privileged mobility and incarcerated athlete work, both refuge and prison. Its logic of contagion also turned a structure intended to protect those inside from those outside into, as already observed, a mechanism to manage the threat of insiders to outsiders. In Australia, as in many other countries, the populace was enjoined by governments and health authorities to help prevent the spread of Covid-19 through isolation and immobility. There were various exceptions, principally those classified as essential workers, a heterogeneous cohort ranging from supermarket shelf stackers to pharmacists. People in the cultural, leisure and sports industries, including musicians, actors, and athletes, were not counted among this crucial labour force. Indeed, the performing arts (including dance, theatre and music) were put on ice with quite devastating effects on the livelihoods and wellbeing of those involved. So, with all major sports shut down (the exception being horse racing, which received the benefit both of government subsidies and expanding online gambling revenue), sport organisations began to represent themselves as essential services that could help sustain collective mental and even spiritual wellbeing. This case was made most aggressively by Australian Rugby League Commission Chairman, Peter V’landys, in contending that “an Australia without rugby league is not Australia”. In similar vein, prominent sport and media figure Phil Gould insisted, when describing rugby league fans in Western Sydney’s Penrith, “they’re lost, because the football’s not on … . It holds their families together. People don’t understand that … . Their life begins in the second week of March, and it ends in October”. Despite misgivings about public safety and equality before the pandemic regime, sporting bubbles were allowed to form, re-form and circulate. The indefinite shutdown of the National Rugby League (NRL) on 23 March 2020 was followed after negotiation between multiple entities by its reopening on 28 May 2020. The competition included a team from another nation-state (the Warriors from Aotearoa/New Zealand) in creating an international sporting bubble on the Central Coast of New South Wales, separating them from their families and friends across the Tasman Sea. Appeals to the mental health of fans and the importance of the NRL to myths of “Australianness” notwithstanding, the league had not prudently maintained a financial reserve and so could not afford to shut down for long. Significant gambling revenue for leagues like the NRL and Australian Football League (AFL) also influenced the push to return to sport business as usual. Sport contests were needed in order to exploit the gambling opportunities – especially online and mobile – stimulated by home “confinement”. During the coronavirus lockdowns, Australians’ weekly spending on gambling went up by 142 per cent, and the NRL earned significantly more than usual from gambling revenue—potentially $10 million above forecasts for 2020. Despite the clear financial imperative at play, including heavy reliance on gambling, sporting bubble-making involved special licence. The state of Queensland, which had pursued a hard-line approach by closing its borders for most of those wishing to cross them for biographical landmark events like family funerals and even for medical treatment in border communities, became “the nation's sporting hub”. Queensland became the home of most teams of the men’s AFL (notably the women’s AFLW season having been cancelled) following a large Covid-19 second wave in Melbourne. The women’s National Netball League was based exclusively in Queensland. This state, which for the first time hosted the AFL Grand Final, deployed sport as a tool in both national sports tourism marketing and internal pre-election politics, sponsoring a documentary, The Sporting Bubble 2020, via its Tourism and Events arm. While Queensland became the larger bubble incorporating many other sporting bubbles, both the AFL and the NRL had versions of the “fly in, fly out” labour rhythms conventionally associated with the mining industry in remote and regional areas. In this instance, though, the bubble experience did not involve long stays in miners’ camps or even the one-night hotel stopovers familiar to the popular music and sport industries. Here, the bubble moved, usually by plane, to fulfil the requirements of a live sport “gig”, whereupon it was immediately returned to its more solid bubble hub or to domestic self-isolation. In the space created between disciplined expectation and deplored non-compliance, the sporting bubble inevitably became the scrutinised object and subject of scandal. Sporting Bubble Scandals While people with a very low risk of spreading Covid-19 (coming from areas with no active cases) were denied entry to Queensland for even the most serious of reasons (for example, the death of a child), images of AFL players and their families socialising and enjoying swimming at the Royal Pines Resort sporting bubble crossed our screens. Yet, despite their (players’, officials’ and families’) relative privilege and freedom of movement under the AFL Covid-Safe Plan, some players and others inside the bubble were involved in “scandals”. Most notable was the case of a drunken brawl outside a Gold Coast strip club which led to two Richmond players being “banished”, suspended for 10 matches, and the club fined $100,000. But it was not only players who breached Covid-19 bubble protocols: Collingwood coaches Nathan Buckley and Brenton Sanderson paid the $50,000 fine imposed on the club for playing tennis in Perth outside their bubble, while Richmond was fined $45,000 after Brooke Cotchin, wife of team captain Trent, posted an image to Instagram of a Gold Coast day spa that she had visited outside the “hub” (the institutionally preferred term for bubble). She was subsequently distressed after being trolled. Also of concern was the lack of physical distancing, and the range of people allowed into the sporting bubble, including babysitters, grandparents, and swimming coaches (for children). There were other cases of players being caught leaving the bubble to attend parties and sharing videos of their “antics” on social media. Biosecurity breaches of bubbles by players occurred relatively frequently, with stern words from both the AFL and NRL leaders (and their clubs) and fines accumulating in the thousands of dollars. Some people were also caught sneaking into bubbles, with Lekahni Pearce, the girlfriend of Swans player Elijah Taylor, stating that it was easy in Perth, “no security, I didn’t see a security guard” (in Barron, Stevens, and Zaczek) (a month later, outside the bubble, they had broken up and he pled guilty to unlawfully assaulting her; Ramsey). Flouting the rules, despite stern threats from government, did not lead to any bubble being popped. The sport-media machine powering sporting bubbles continued to run, the attendant emotional or health risks accepted in the name of national cultural therapy, while sponsorship, advertising and gambling revenue continued to accumulate mostly for the benefit of men. Gendering Sporting Bubbles Designed as biosecurity structures to maintain the supply of media-sport content, keep players and other vital cogs of the machine running smoothly, and to exclude Covid-19, sporting bubbles were, in their most advanced form, exclusive luxury camps that illuminated the elevated socio-cultural status of sportsmen. The ongoing inequalities between men’s and women’s sport in Australia and around the world were clearly in evidence, as well as the politics of gender whereby women are obliged to “care” and men are enabled to be “careless” – or at least to manage carefully their “duty of care”. In Australia, the only sport for women that continued during the height of the Covid-19 lockdown was netball, which operated in a bubble that was one of sacrifice rather than privilege. With minimum salaries of only $30,000 – significantly less than the lowest-paid “rookies” in the AFL – and some being mothers of small children and/or with professional jobs juggled alongside their netball careers, these elite sportswomen wanted to continue to play despite the personal inconvenience or cost (Pavlidis). Not one breach of the netballers out of the bubble was reported, indicating that they took their responsibilities with appropriate seriousness and, perhaps, were subjected to less scrutiny than the sportsmen accustomed to attracting front-page headlines. National Netball League (also known after its Queensland-based naming rights sponsor as Suncorp Super Netball) players could be regarded as fortunate to have the opportunity to be in a bubble and to participate in their competition. The NRL Women’s (NRLW) Premiership season was also completed, but only involved four teams subject to fly in, fly out and bubble arrangements, and being played in so-called curtain-raiser games for the NRL. As noted earlier, the AFLW season was truncated, despite all the prior training and sacrifice required of its players. Similarly, because of their resource advantages, the UK men’s and boy’s top six tiers of association football were allowed to continue during lockdown, compared to only two for women and girls. In the United States, inequalities between men’s and women’s sports were clearly demonstrated by the conditions afforded to those elite sportswomen inside the Women’s National Basketball Association (WNBA) sport bubble in the IMG Academy in Florida. Players shared photos of rodent traps in their rooms, insect traps under their mattresses, inedible food and blocked plumbing in their bubble accommodation. These conditions were a far cry from the luxury usually afforded elite sportsmen, including in Florida’s Walt Disney World for the men’s NBA, and is just one of the many instances of how gendered inequality was both reproduced and exacerbated by Covid-19. Bursting the Bubble As we have seen, governments and corporate leaders in sport were able to create material and metaphorical bubbles during the Covid-19 lockdown in order to transmit stadium sport contests into home spaces. The rationale was the importance of sport to national identity, belonging and the routines and rhythms of life. But for whom? Many women, who still carry the major responsibilities of “care”, found that Covid-19 intensified the affective relations and gendered inequities of “home” as a leisure site (Fullagar and Pavlidis). Rates of domestic violence surged, and many women experienced significant anxiety and depression related to the stress of home confinement and home schooling. During the pandemic, women were also more likely to experience the stress and trauma of being first responders, witnessing virus-related sickness and death as the majority of nurses and care workers. They also bore the brunt of much of the economic and employment loss during this time. Also, as noted above, livelihoods in the arts and cultural sector did not receive the benefits of the “bubble”, despite having a comparable claim to sport in contributing significantly to societal wellbeing. This sector’s workforce is substantially female, although men dominate its senior roles. Despite these inequalities, after the late March to May hiatus, many elite male sportsmen – and some sportswomen - operated in a bubble. Moving in and out of them was not easy. Life inside could be mentally stressful (especially in long stays of up to 150 days in sports like cricket), and tabloid and social media troll punishment awaited those who were caught going “over the fence”. But, life in the sporting bubble was generally preferable to the daily realities of those afflicted by the trauma arising from forced home confinement, and for whom watching moving sports images was scant compensation for compulsory immobility. The ethical foundation of the sparkly, ephemeral fantasy of the sporting bubble is questionable when it is placed in the service of a voracious “media sports cultural complex” (Rowe, Global Media Sport) that consumes sport labour power and rolls back progress in gender relations as a default response to a global pandemic. Covid-19 dramatically highlighted social inequalities in many areas of life, including medical care, work, and sport. For the small minority of people involved in sport who are elite professionals, the only thing worse than being in a sporting bubble during the pandemic was not being in one, as being outside precluded their participation. Being inside the bubble was a privilege, albeit a dubious one. But, as in wider society, not all sporting bubbles are created equal. Some are more opulent than others, and the experiences of the supporting and the supported can be very different. The surface of the sporting bubble may be impermanent, but when its interior is opened up to scrutiny, it reveals some very durable structures of inequality. Bubbles are made to burst. They are, by nature, temporary, translucent structures created as spectacles. As a form of luminosity, bubbles “allow a thing or object to exist only as a flash, sparkle or shimmer” (Deleuze, 52). In echoing Deleuze, Angela McRobbie (54) argues that luminosity “softens and disguises the regulative dynamics of neoliberal society”. The sporting bubble was designed to discharge that function for those millions rendered immobile by home confinement legislation in Australia and around the world, who were having to deal with the associated trauma, risk and disadvantage. Hence, the gender and class inequalities exacerbated by Covid-19, and the precarious and pressured lives of elite athletes, were obscured. We contend that, in the final analysis, the sporting bubble mainly serves those inside, floating tantalisingly out of reach of most of those outside who try to grasp its elusive power. Yet, it is a small group beyond who wield that power, having created bubbles as armoured vehicles to salvage any available profit in the midst of a global pandemic. References AAP. “NRL Makes Desperate Plea to Government as It Announces Season Will Go Ahead.” 7News.com.au 15 Mar. 2020. 8 Mar. 2021 <https://7news.com.au/sport/rugby-league/nrl-makes-desperate-plea-to-government-as-it-announces-season-will-go-ahead-c-745711>. Al Jazeera English. “Sports TV: Faking Spectators and Spectacles.” The Listening Post 26 Sep. 2020 <https://www.youtube.com/watch?v=0AlD63s26sQ&feature=youtu.be&t=827>. Barron, Jackson, Kylie Stevens, and Zoe Zaczek. “WAG Who Broke into COVID-19 Bubble for an Eight-Hour Rendezvous with Her AFL Star Boyfriend Opens Up on ‘How Easy It Was’—and Apologises for ‘Really Big Mistake’ That Cost Club $50,000.” The Daily Mail 19 Aug. 2020. 8 Mar. 2021 <https://www.dailymail.co.uk/news/article-8638959/WAG-AFL-star-sacked-season-coronavirus-breach-reveals-easy-sneak-in.html>. Bauman, Zygmunt. Liquid Modernity. Cambridge: Polity Press, 2000. Beck, Ulrich. Risk Society: Towards a New Modernity. London: Sage, 1992. Benedict, Jeff. Public Heroes, Private Felons: Athletes and Crimes against Women. Boston: Northeastern Uni. Press, 1999. Benfante, Agata, Marialaura di Tella, Annunziata Romeo, and Lorys Castelli. “Traumatic Stress in Healthcare Workers during COVID-19 Pandemic: A Review of the Immediate Impact.” Frontiers in Psychology 11 (23 Oct. 2020). Blaine, Lech. “The Art of Class War.” The Monthly. 17 Aug. 2020. 8 Mar. 2021 <https://www.themonthly.com.au/issue/2020/august/1596204000/lech-blaine/art-class-war#mtr>. Brooks, Samantha K., Rebecca K. Webster, Louise E. Smith, Lisa Woodland, Simon Wessely, Neil Greenberg, and Gideon J. Rubin. “The Psychological Impact of Quarantine and How to Reduce It: Rapid Review of the Evidence.” The Lancet 26 Feb. 2020. 8 Mar. 2021 <https://www.thelancet.com/journals/lancet/article/PIIS0140-6736(20)30460-8/fulltext>. Caust, Jo. “Coronavirus: 3 in 4 Australians Employed in the Creative and Performing Arts Could Lose Their Jobs.” The Conversation 20 Apr. 2020. 8 Mar. 2021 <https://theconversation.com/coronavirus-3-in-4-australians-employed-in-the-creative-and-performing-arts-could-lose-their-jobs-136505>. Connor, James. “The Athlete as Widget: How Exploitation Explains Elite Sport.” Sport in Society 12.10 (2009): 1369–77. Courage, Cara. “Women in the Arts: Some Questions.” The Guardian 5 Mar. 2012. 8 Mar. 2021 <https://www.theguardian.com/culture-professionals-network/culture-professionals-blog/2012/mar/05/women-in-the-arts-introduction>. Davenport, Thomas H., and John C. Beck. The Attention Economy: Understanding the New Currency of Business. Cambridge, MA: Harvard Business Review Press, 2001. Deleuze, Gilles. Foucault. Trans. and ed. S. Hand. Minneapolis: University of Minnesota Press, 1986. Dennien, Matt, and Lydia Lynch. “Footage Shows Relaxed Scenes from AFL Hub amid Calls for Exception Overhaul.” Brisbane Times 3 Sep. 2020. 8 Mar. 2021 <https://www.brisbanetimes.com.au/national/queensland/footage-shows-relaxed-scenes-from-afl-hub-amid-calls-for-exemption-overhaul-20200903-p55s74.html>. Dobeson, Shanee. “Bailey Defends Qld Border Rules after Grieving Mother Denied Entry to Bury Son.” MyGC.com.au 12 Sep. 2020. 8 Mar. 2021 <https://www.mygc.com.au/bailey-defends-qld-border-rules-after-grieving-mother-denied-exemption-to-bury-son>. Dunn, Amelia. “Who Is Deemed an ‘Essential’ Worker under Australia’s COVID-19 Rules?” SBS News 26 Mar. 2020. 8 Mar. 2021 <https://www.youtube.com/watch?v=0AlD63s26sQ&feature=youtu.be&t=827>. Emiko. “Women’s Unpaid Care Work in Australia.” YWCA n.d. 8 Mar. 2021 <https://www.ywca.org.au/opinion/womens-unpaid-care-work-in-australia>. Fullagar, Simone, and Adele Pavlidis. “Thinking through the Disruptive Effects and Affects of the Coronavirus with Feminist New Materialism.” Leisure Sciences (2020). 8 Mar. 2021 <https://www.tandfonline.com/doi/abs/10.1080/01490400.2020.1773996?journalCode=ulsc20>. Flood, Michael, and Sue Dyson. “Sport, Athletes, and Violence against Women.” NTV Journal 4.3 (2007): 37–46. Goodwin, Sam. “AFL Boss Left Fuming over ‘Out of Control’ Quarantine Party.” Yahoo! Sport 8 Sep. 2020. 8 Mar. 2021 <https://au.sports.yahoo.com/afl-2020-uproar-out-of-control-quarantine-party-224251554.html>. Griffith News. “New Research Shows Why Musicians among the Hardest Hit by COVID-19.” 18 June 2020. 8 Mar. 2021 <https://news.griffith.edu.au/2020/06/18/new-research-shows-why-musicians-among-the-hardest-hit-by-COVID-19>. Hart, Chloe. “‘This Is the Hardest It’s Going to Get’: NZ Warriors Open Up about Relocating to Australia for NRL.” ABC News 8 Aug. 2020. 8 Mar. 2021 <https://www.abc.net.au/news/2020-08-08/nz-warriors-open-up-about-relocation-to-australia-for-nrl/12531074>. Hooper, James. “10 Broncos Hit with Fines as Club Cops Huge Sanction over Pub Bubble Breach.” Fox Sports 18 Aug. 2020. 8 Mar. 2021 <https://www.foxsports.com.au/nrl/nrl-premiership/teams/broncos/nrl-2020-brisbane-broncos-pub-covid19-bubble-breach-fine-sanctions-who-was-at-the-pub/news-story/d3bd3c559289a8b83bc3fccbceaffe78>. Hytner, Mike. “AFL Suspends Season and Cancels AFLW amid Coronavirus Crisis.” The Guardian 22 Mar. 2020. 8 Mar. 2021 <https://www.theguardian.com/sport/2020/mar/22/afl-nrl-and-a-league-press-on-despite-restrictions>. Jones, Wayne. “Ray of Hope for Medical Care across Border.” Echo Netdaily 14 Aug. 2020. 8 Mar. 2021 <https://www.echo.net.au/2020/08/ray-of-hope-for-medical-care-across-border>. Jouavel, Levi. “Women’s Football Shutdowns: ‘It’s Unfair Boys’ Academies Can Still Play’.” BBC News 10 Nov. 2020. 8 Mar. 2021 <https://www.bbc.com/news/newsbeat-54876198>. Keh, Andrew. “We Hope Your Cheers for This Article Are for Real.” The New York Times 16 June 2020. 8 Mar. 2021 <https://www.nytimes.com/2020/06/16/sports/coronavirus-stadium-fans-crowd-noise.html>. Kennedy, Else. “‘The Worst Year’: Domestic Violence Soars in Australia during COVID-19.” The Guardian 1 Dec. 2020. 8 Mar. 2021 <https://www.theguardian.com/society/2020/dec/01/the-worst-year-domestic-violence-soars-in-australia-during-COVID-19>. Keoghan, Sarah. “‘Everyone’s Concerned’: Players Cop 70% Pay Cut.” Sydney Morning Herald 28 Mar. 2020. 8 Mar. 2021 <https://www.smh.com.au/sport/netball/everyone-s-concerned-players-cop-70-per-cent-pay-cut-20200328-p54esz.html>. Knox, Malcolm. “Gambling’s Share of NRL Revenue Could Well Double: That Brings Power.” Sydney Morning Herald. 15 May 2020. 8 Mar. 2021 <https://www.smh.com.au/sport/gambling-s-share-of-nrl-revenue-could-well-double-that-brings-power-20200515-p54tbg.html>. McGrath, Pat. “Racing Victoria Got $16.6 Million in Emergency COVID Funding: Then Online Horse Racing Gambling Revenue Skyrocketed.” ABC News 3 Nov. 2020. 8 Mar. 2021 <https://www.abc.net.au/news/2020-11-03/racing-victoria-emergency-coronavirus-COVID-funding/12838012>. McRobbie, Angela. The Aftermath of Feminism: Gender, Culture and Social Change. Thousand Oaks, CA: Sage, 2009. Madden, Helena. “Lebron James’s Suite in the NBA Bubble Is Fit for a King.” Robb Report 16 Sep. 2020. 8 Mar. 2021 <https://robbreport.com/travel/hotels/lebron-james-nba-bubble-suite-1234569303>. Maguire, Joseph. “Sportization.” The Blackwell Encyclopedia of Sociology. Ed. George Ritzer. Oxford: Blackwell, 2007. 4710–11. Mathieson, Craig. “Michael Jordan Pierces the Bubble of Elite Sport in Juicy ESPN Doco.” Sydney Morning Herald. 13 May 2020. 8 Mar. 2021 <https://www.smh.com.au/culture/tv-and-radio/michael-jordan-pierces-the-bubble-of-elite-sport-in-juicy-espn-doco-20200511-p54rwc.html>. Maurice, Megan. “Australia’s Summer of Cricket during COVID Is about Money and Power—and Men”. 6 Jan. 2021. 8 Mar. 2021 <https://www.theguardian.com/sport/2021/jan/06/australias-summer-of-cricket-during-COVID-is-about-money-and-power-and-men>. Murphy, Catherine. “Cricket Australia Contributed to Circ*mstances Surrounding Ball-Tampering Scandal, Review Finds”. ABC News 20 Oct. 2018. 8 Mar. 2021 <https://www.abc.net.au/news/2018-10-29/scathing-report-released-into-cricket-australia-culture/10440972>. News.com.au. “How an AFL Star Wide’s Instagram Post Led to a Hefty Fine and a Journalist Being Stood Down.” NZ Herald 3 Aug. 2020. 8 Mar. 2021 <https://www.nzherald.co.nz/sport/how-an-afl-star-wifes-instagram-post-led-to-a-hefty-fine-and-a-journalist-being-stood-down/7IDR4SXQ6QW5WDFBV42BK3M7YQ>. Nicholson, Matthew, Anthony Kerr, and Merryn Sherwood. Sport and the Media: Managing the Nexus. 2nd ed. London: Routledge, 2015. Pavlidis, Adele. “Being Grateful: Materialising ‘Success’ in Women’s Contact Sport.” Emotion, Space and Society 35 (2020). 8 Mar. 2021 <https://www.sciencedirect.com/science/article/abs/pii/S1755458620300207>. Phillips, Sam. “‘The Future of the Season Is in Their Hands’: Palaszczuk’s NRL Warning.” Sydney Morning Herald 10 Aug. 2020. 8 Mar. 2021 <https://www.smh.com.au/sport/nrl/the-future-of-the-season-is-in-their-hands-palaszczuk-s-nrl-warning-20200810-p55k7j.html>. Pierik, Jon, and Ryan, Peter. “‘I Own the Consequences’: Stack, Coleman-Jones Apologise for Gold Coast Incident.” The Age 5 Sep. 2020. 8 Mar. 2021 <https://www.theage.com.au/sport/afl/i-own-the-consequences-stack-apologises-for-gold-coast-incident-20200905-p55spq.html>. Poposki, Claudia, and Louise Ayling. “AFL Star’s Wife Who Caused Uproar by Breaching Quarantine to Go to a Spa Reveals She’s Been Smashed by Vile Trolls.” Daily Mail Australia 29 Aug. 2020. 8 Mar. 2021 <https://www.dailymail.co.uk/news/article-8674083/AFL-WAG-Brooke-Cotchin-breached-COVID-19-quarantine-spa-cops-abuse-trolls.html>. Ramsey, Michael. “Axed Swan Spared Jail over Ex-Girlfriend Assault.” AFL.com.au 2 Dec. 2020. 8 Mar. 2021 <https://www.afl.com.au/news/526677/axed-swan-spared-jail-over-ex-girlfriend-assault>. Read, Brent. “The NRL Is Set to Finish the Season on a High after Stunning Financial Results.” The Australian 1 Dec. 2020. 8 Mar. 2021 <https://www.theaustralian.com.au/sport/nrl/the-nrl-is-set-to-finish-the-season-on-a-high-after-stunning-financial-results/news-story/1ce9c2f9b598441d88daaa8cc2b44dc1>. Reel, Justine, J., and Emily Crouch. “#MeToo: Uncovering Sexual Harassment and Assault in Sport.” Journal of Clinical Sport Psychology 13.2 (2018): 177–79. Rogers, Michael. “Buckley, Sanderson to Pay Pies’ Huge Fine for COVID Breach.” AFL.com.au 1 Aug. 2020. 8 Mar. 2021 <https://www.afl.com.au/news/479118/buckley-sanderson-to-pay-pies-huge-fine-for-COVID-breach>. Richardson, David, and Richard Denniss. “Gender Experiences during the COVID-19 Lockdown: Women Lose from COVID-19, Men to Gain from Stimulus.” The Australia Institute June 2020. 8 Mar. 2021 <https://australiainstitute.org.au/report/gender-experiences-during-the-COVID-19-lockdown>. Rowe, David. “All Sport Is Global: A Hard Lesson from the Pandemic.” Open Forum 28 Mar. 2020. 8 Mar. 2021 <https://www.openforum.com.au/all-sport-is-global-a-hard-lesson-from-the-pandemic>. ———. “And the Winner Is … Television: Spectacle and Sport in a Pandemic.” Open Forum 19 Sep. 2020. 8 Mar. 2021 <https://www.openforum.com.au/and-the-winner-istelevision-spectacle-and-sport-in-a-pandemic>. ———. Global Media Sport: Flows, Forms and Futures. London: Bloomsbury, 2011. ———. “Scandals and Sport.” Routledge Companion to Media and Scandal. Eds. Howard Tumber and Silvio Waisbord. London: Routledge, 2019. 324–32. ———. “Subjecting Pandemic Sport to a Sociological Procedure.” Journal of Sociology 56.4 (2020): 704–13. Schout, David. “Cricket Prepares for Mental Health Challenges Thrown Up by Bubble Life.” The Guardian 8 Nov. 2020. 8 Mar. 2021 <https://www.theguardian.com/sport/2020/nov/08/cricket-prepares-for-mental-health-challenges-thrown-up-by-bubble-life>. Spaaij, Ramón. Sport and Social Mobility: Crossing Boundaries. London: Routledge, 2011. The Sporting Bubble. Dir. Peter Dickson. Nine Network Australia, 2020. Swanston, Tim. “With Coronavirus Limiting Interstate Movement, Queensland Is the Nation’s Sporting Hub—Is That Really Safe?” ABC News 29 Aug. 2020. 8 Mar. 2021 <https://www.abc.net.au/news/2020-08-29/coronavirus-queensland-rules-for-sports-teams-explainer/12542634>. Toffoletti, Kim. “How Is Gender-Based Violence Covered in the Sporting News? An Account of the Australian Football League Sex Scandal.” Women's Studies International Forum 30.5 (2007): 427–38. Urry, John. Mobilities. Cambridge: Polity Press, 2007. Walter, Brad. “From Shutdown to Restart: How NRL Walked Tightrope to Get Season Going Again.” NRL.com 25 May 2020. 8 Mar. 2021 <https://www.nrl.com/news/2020/05/25/from-shutdown-to-restart-how-nrl-walked-tightrope-to-get-season-going-again>. Wade, Lisa. “Rape on Campus: Athletes, Status, and the Sexual Assault Crisis.” The Conversation 7 Mar. 2017. 8 Mar. 2021 <https://theconversation.com/rape-on-campus-athletes-status-and-the-sexual-assault-crisis-72255>. Webster, Andrew. “Sydney Roosters’ Mitchell Pearce Involved in a Drunken Incident with a Dog? And Your Point Is ...?” Sydney Morning Herald 28 Jan. 2016. 8 Mar. 2021 <https://www.smh.com.au/sport/nrl/sydney-roosters-mitchell-pearce-involved-in-a-drunken-incident-with-a-dog-and-your-point-is--20160127-gmfemh.html>. Whittaker, Troy. “Three-Peat Not Driving Broncos in NRLW Grand Final.” NRL.com 24 Oct. 2020. 8 Mar. 2021 <https://www.nrl.com/news/2020/10/24/three-peat-not-driving-broncos-in-nrlw-grand-final>. Yahoo! Sport Staff. “‘Not Okay’: Uproar over ‘Disgusting’ Find inside Quarantine.” Yahoo! Sport 9 July 2020. 8 Mar. 2021 <https://au.sports.yahoo.com/wnba-disturbing-conditions-coronavirus-bubble-slammed-003557243.html>.

You might also be interested in the bibliographies on the topic 'United States, Social services, Army spouses' for other source types:

Books

To the bibliography
Journal articles: 'United States, Social services, Army spouses' – Grafiati (2024)

References

Top Articles
Latest Posts
Article information

Author: Domingo Moore

Last Updated:

Views: 5861

Rating: 4.2 / 5 (53 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Domingo Moore

Birthday: 1997-05-20

Address: 6485 Kohler Route, Antonioton, VT 77375-0299

Phone: +3213869077934

Job: Sales Analyst

Hobby: Kayaking, Roller skating, Cabaret, Rugby, Homebrewing, Creative writing, amateur radio

Introduction: My name is Domingo Moore, I am a attractive, gorgeous, funny, jolly, spotless, nice, fantastic person who loves writing and wants to share my knowledge and understanding with you.