Journal articles: 'Defense Contract Audit Agency' – Grafiati (2024)

  • Bibliography
  • Subscribe
  • News
  • Referencing guides Blog Automated transliteration Relevant bibliographies by topics

Log in

Українська Français Italiano Español Polski Português Deutsch

We are proudly a Ukrainian website. Our country was attacked by Russian Armed Forces on Feb. 24, 2022.
You can support the Ukrainian Army by following the link: https://u24.gov.ua/. Even the smallest donation is hugely appreciated!

Relevant bibliographies by topics / Defense Contract Audit Agency / Journal articles

To see the other types of publications on this topic, follow the link: Defense Contract Audit Agency.

Author: Grafiati

Published: 4 June 2021

Last updated: 3 March 2023

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Consult the top 35 journal articles for your research on the topic 'Defense Contract Audit Agency.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Collins,DaleR. "Human Resource Assessment — The Link to Mission." Public Personnel Management 26, no.1 (March 1997): 1–6. http://dx.doi.org/10.1177/009102609702600101.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

The National Performance Review called for a refocusing and revitalizing of mechanisms to assess human resource program effectiveness by relating such effectiveness to mission accomplishment. The traditional Personnel Management Evaluation (PME) Program used by many federal organizations, which emphasized regulatory and statutory conformance, did not fit this new paradigm. The Defense Contract Audit Agency's Human Resource Assessment Model analyzes the degree of achievement in Strategic Plan goal attainment, and, in so doing, serves as a direct measure of Agency mission accomplishment.

2

Gray,O.Ronald, and RichardV.Calvasina. "THE 1826 CONTRACT FOR CONSTRUCTION OF FACILITIES AT THE PENSACOLA NAVAL STATION AND ITS IMPLICATIONS FOR HISTORICAL RESEARCH USING AGENCY THEORY." Accounting Historians Journal 22, no.1 (June1, 1995): 35–55. http://dx.doi.org/10.2308/0148-4184.22.1.35.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

This contract dispute enhances our understanding of agency relationships and fosters greater recognition of the limitations and hazards of historical research using an agency literature framework. The accounting records, related memoranda, and reports submitted also provide insight into the nature and character of early defense contract accounting and relationships between these contractors and the government. Difficulties confronted by the Navy in securing a contractor; contract terms; civilian contractor's project accounting records, related memoranda, and correspondence with naval authorities are reviewed. The post-contract correspondence provides insight into how early 19th century government contractors attempted to resolve disputes with the government.

3

Romero, José Aguado, and AntonioM.LópezHernández. "Cost and price auditing: effectiveness in the procurement of defense services in Spain." Revista de Administração Pública 50, no.5 (October 2016): 745–64. http://dx.doi.org/10.1590/0034-7612152005.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Abstract Contract auditing, or cost and price auditing, has been applied in Spain as a means of determining prices in non-competitive defense contracts since 1989. Factors such as Spain's participation in international defense organizations, the characteristics of the defense market and the contractual legal framework for the procurement of defense goods and services help underscore the need for the Spanish Ministry of Defense to implement cost and price auditing. With the evolution of cost and price auditing in Spain in mind, this paper analyses the entire process, describes the audit procedures that are most commonly used today and assesses the main results achieved, in terms of financial savings. The results obtained show that cost and price auditing does indeed contribute to a more efficient use of public resources.

4

Hiatt,ShonR., and Jin Hyung Kim. "Firm geographic proximity and state agency decisions: An analysis of US Defense Contract Awards." Academy of Management Proceedings 2016, no.1 (January 2016): 12064. http://dx.doi.org/10.5465/ambpp.2016.12064abstract.

Full text

APA, Harvard, Vancouver, ISO, and other styles

5

Cahyana, Taufik Budi, Achmad Wardana, Hudoro Tahdi, and Y.H.Yogaswara. "Strategy for Accelerating the Mastery of Defense Technology in the Procurement of Dassault Rafale Combat Aircraft." International Journal of Social Science Research and Review 6, no.2 (January31, 2023): 199–207. http://dx.doi.org/10.47814/ijssrr.v6i2.825.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

The selection of the Rafale was based on the defense relationship between Indonesia and France which had existed for a very long time, besides that, it was also based on the foreign policy adopted by Indonesia, namely the free and active policy shown by several defense equipments owned by Indonesia, not only from a certain country. In this case, it is hoped that Indonesia will not depend on the procurement of defense equipment from abroad and the implementation of Transfer of Technology, Local Content, and Offsets on Rafale fighter jets can run as expected, therefore a strategy is needed in accelerating defense acquisition, where there are three strategies, namely First is the reform of the defense acquisition system and procedures through a single executor directly under the Minister of Defence; The second is the integration of defense R&D institutions in the Ministry of Defense and all R&D forces into the R&D Agency and the Defense Technology Quality Assurance Agency; The third is improving the quality of the Defense Acquisition Agency's human resources through a transparent and accountable recruitment process. The contract agreement for the procurement of Dassault Rafale fighter aircraft should also carry out defense acquisitions by sending (human resources) (HR) to study and apprentice in the developer industry. In addition to HR offsets, an offset scheme for the production of aircraft components in Indonesia is also needed by the national defense industry.

6

Journalist, Print. "Plan of Colorado School of Mine to develop rapid tunneling technology." New Metro 1, no.1 (December2, 2020): 69–70. http://dx.doi.org/10.37819/nm.001.01.0082.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

According to the news on the foreign tunnellingjournal.com website (tunnellingjournal.com) on May 5, 2020, the Underground Engineering Research Center of Colorado School of Mines and the US Defense Advanced Research Projects Agency (DARPA) recently signed a contract to develop an unprecedented rapid tunneling technology for its “Excavator” project. The research team will conduct a demonstration of tunneling technology at a speed of 366m/h within 15 months.

7

Rendon,JuanitaM., and ReneG.Rendon. "Procurement fraud in the US Department of Defense." Managerial Auditing Journal 31, no.6/7 (June6, 2016): 748–67. http://dx.doi.org/10.1108/maj-11-2015-1267.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Purpose This paper aims to explore selected real-world procurement fraud incidents in the US Department of Defense (DoD) and the implications of these incidents to the DoD’s contracting processes and internal controls. Design/methodology/approach This paper analyzes actual procurement fraud incidents and identifies in which phase of the contract management process the fraud occurred and which internal control component was associated with the fraud scheme. Findings The fraud incidents generally occurred during the source selection and the contract administration phases and involved the control activities, monitoring and control environment components of internal control. Research limitations/implications The fraud incidents are analyzed using contract management and internal control frameworks adopted by the US Government. Recommendations are developed for improving contracting processes and internal controls as an approach to deterring and detecting procurement fraud and may be applicable to other international public procurement bodies. Practical implications Governments are ensuring auditability in public procurement as a means of improving agency governance. The research findings suggest that an emphasis on capable contracting processes and effective internal controls should be adopted for fighting procurement fraud. Social implications Ensuring auditability in public procurement has a far-reaching effect in society. The value of capable processes and effective internal controls is gaining much attention in public agencies, as they strive for accountability, integrity and transparency in their governance processes. Originality/value By emphasizing capable processes and effective internal controls, governments can apply a strategic approach to detecting and deterring fraud and thus ensure that government monies are spent in the most effective and efficient ways.

8

Cannell,PhillipJ. "Evaluation of the End User (Dentist) Experience of Undertaking Clinical Audit in a PCT-Led NHS Modernisation Agency Pilot Scheme." Primary Dental Care os16, no.4 (October 2009): 168–78. http://dx.doi.org/10.1308/135576109789389522.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Introduction A new dental contract was introduced in the National Health Service (NHS) General Dental Services (GDS) in April 2006. Responsibility for clinical audit activities was devolved to Primary Care Trusts (PCTs) as part of their clinical governance remit. In July 2003, an NHS Modernisation Agency pilot scheme for clinical audit was launched by Southend PCT. Aim The aim of this study was to evaluate this scheme. Methods A qualitative research method was used. It used audiotape recorded semi-structured research interviews with eight general dental practitioners (GDPs) who had taken part in the scheme. The evaluation focused on dentists’ experiences of the scheme. Results Dentists appreciated the central PCT-based coordinator for the scheme and found that the streamlining of design, analysis and report writing within the audit projects enabled efficient use of time. The design by an outside agency appeared to add credibility to the scheme. Participants felt that comparability of data derived from clinical audit was enhanced by the scheme and could lead to comparison across PCT patch, regional or even national levels. The use of feedback mechanisms within the scheme was appreciated and thought to help produce maximum value from a clinical audit project. There was evidence of beneficial change occurring within practices and for patients. Conclusions This study provided an evaluation of a particular clinical audit scheme, several aspects of which differed from the traditional GDS scheme. Organisations proposing to undertake clinical audit activities in conjunction with dentistry in the future may benefit from incorporating elements of this scheme into their project design.

9

Puzić, Goran. "Financial statements and audit in the insurance company." Pravo - teorija i praksa 37, no.3 (2020): 76–91. http://dx.doi.org/10.5937/ptp2003076p.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

In accordance with the Law on Insurance and the Law on Accounting and Audit, insurance companies in Serbia are required to prepare financial statements. These materials are submitted to the Agency of Business Registers and the National Bank of Serbia from 31st December of the reporting year according to the Law on Accounting and Audit. Insurance companies which undergo a change in a legal position, such as mergers, divisions, i.e. sales, have to submit financial statements with a cut-off on the day determined by the decision on the change of a legal position or on the day determined by the sales contract. Furthermore, financial reports are submitted in the cases of the insolvency proceedings or liquidation of an insurance company. The notion of audit in an insurance company has its importance from the Insurance Law itself, in which the entire Chapter 9 is dedicated to the audit of financial statements. It deals with the performance of the audit, prior consent to the selection of the audit company, liabilities of the audit company, and the check of the audit report and the notification of the body responsible for supervising the audit. The significance and role of audit in an insurance company is far broader, which will be explored later in this paper.

10

Bardawansyah, Aditya. "The Role Of The Lampung Provincial Financial Audit Agency In Determining State Losses." Administrative and Environmental Law Review 1, no.2 (December23, 2020): 65. http://dx.doi.org/10.25041/aelr.v1i2.2141.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

The Supreme Audit Agency is the institution that has the authority to calculate and determine state losses, but in its implementation, there are still requests for calculating state financial losses that have not been implemented. This study uses a normative juridical approach. Then it is analyzed qualitatively so that the results are obtained: First, the BPK-RI Representatives of Lampung Province have been given the trust by law enforcement officials to calculate and determine state losses, and the State Financial Loss Calculation Result Report submitted by BPK-RI is used as evidence in court as evidence regarding there is a state loss. Second, the methods used by BPK-RI in calculating state financial losses are by using several methods, namely the apple to apple comparison method, the production cost method, the comparison method between the contract value and the market price, the total loss, and the real cost method. The method used by BPK-RI Representatives of Lampung Province in calculating state losses is by using the simple cost method. This method is used by calculating the difference between the funds spent by the state to obtain goods/services from third parties, compared to the value of real expenditures incurred by the implementing party to provide goods/services to the state according to the agreed

11

Majid, Jamaluddin, Alfian Fani, and Marwah Gama. "Internalisasi Goal Congruance untuk Pendeteksian Financial Statement Fraud Berbasis Behaviour Audit (Studi Kasus KAP Benny dan Rekan)." Tasharruf: Journal Economics and Business of Islam 4, no.2 (December24, 2019): 73. http://dx.doi.org/10.30984/tjebi.v4i2.1022.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

This research aims to reveal goal congruence for the financial statement fraud- based behavioral audit. financial statement fraud. The agency relationship theory is a contract between the auditor (agent) and the principal (principal). Agency relationships arise when one or more principals employ another person (agent) to provide a service and then delegate authority to decision making to the agent. This study was conducted at KAP Benny and colleagues using qualitative research using phenomenology approach using secondary data and primary data analyzed using interview and interview method using tools in the form of recorder and manuscript aid and tested its validity. The result of this research is shown by case from from 2015 to 2017. In 2015 there was 86.3% of cases, in 2016 there was 86.7% and down in 2017 by 3.68%. Auditors' perception of goal congruence can help in achieving the goal of information that is not synchronized with other information. For that in building a good goal congruence then we need to build the ethics of an auditor.

12

Handriani, Eka. "Earning Management and the Effect Characteristics of Audit Committee, Independent Commissioners: Evidence From Indonesia." Research in World Economy 11, no.3 (June18, 2020): 108. http://dx.doi.org/10.5430/rwe.v11n3p108.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

This study examines whether companies listed Indonesia Stock Exchange conduct efficient or opportunistic earning management and to investigate the effect the Independent Commissioner and the Characteristics of the Audit Committee (measured by Auditor Size, Independence, Expertise, and Activities) on it. The sample consists of 186 observations of manufacturing companies in Indonesia Stock Exchange during the 2013-2018. Using Panel Regression Fixed Effect method, we find evidence that Independent Commissioners has a significant effect on reducing Earnings Management. The Positive Accounting Theory-the efficient perspective occurs when the compensation contract and internal control system, including monitoring by the board of commissioners, will limit the common view opportunistic manager and motivate the manager to choose the right accounting policy. The effective monitoring conducted by an independent commissioner can reduce agency costs because management prioritizes the best interest of shareholders by maximizing company resources. Furthermore, it was found that Audit Committee Size can reduce earning management. It is due to the wide range of skills of audit committee members in exercising oversight on management. Audit Committees with accounting and financial expertise can reduce earnings management. This finding indicates that the Audit Committee may tend to uphold conservative as accounting mechanism. Accounting conservatism has an important role in restricting opportunistic management behavior.

13

Ahmad, Ahmad, Panji Suwarno, Djamarel Hermanto, and Susilo Adi Purwantoro. "IMPLEMENTATION OF GOOD CORPORATE GOVERNANCE TO SUPPORT THE DEFENSE INDUSTRY." International Journal of Social Science 2, no.5 (January28, 2023): 2187–96. http://dx.doi.org/10.53625/ijss.v2i5.4931.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

This research focuses on the implementation of Good Corporate Governance at PT Dok and Kodja Bahari (Persero) Jakarta to support the defense industry. This research is based on agency theory and the theory of Good Corporate Governance. The research method used in this study is a qualitative method with a descriptive approach. In this study, the research subject to be used was purposive sampling in determining the informants. The data analysis steps used in this study are the Analysis Interactive Model from Miles and Huberman, which divides the steps in data analysis activities into several parts: data collection, data reduction, data presentation, and drawing conclusions or verification. The results of the study stated that the implementation of GCG at PT DKB was quite good even though some had not been implemented as example from SPI before GCG still making reports that were not by the evaluation of the Audit Committee or other divisions, in this case, such as lack of documentation or written reports, then after GCG implementation is an obligation that must be implemented. Likewise, if there are matters related to problems that must be coordinated with the audit committee or other divisions, SPI will make a request letter in terms of coordination related to these problems. While the implementation of GCG at PT DKB still requires improvement and follow-up as a result of the Assessment results report, this requires support from all stakeholders and aspects of the company's organization, but the company still wants to always work hard to make this happen.

14

Enny Susilowati Mardjono and Yahn-Shir Chen. "Earning Management and the Effect Characteristics of Audit Committee, Independent Commissioners: Evidence from Indonesia." International Journal of Business and Society 21, no.2 (July21, 2020): 569–87. http://dx.doi.org/10.33736/ijbs.3272.2020.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

This study aimed to investigate the effect of the independent commissioner and of the characteristics of the audit committee (measured by auditor size, independence, expertise, and activities) on the efficient or opportunistic earnings management. In terms of those companies listed on Indonesia Stock Exchange. The sample consists of 186 observations of those manufacturing companies in Indonesia Stock Exchange during the 2013-2018. Using panel regression fixed effect method, independent commissioners are found to have a significant effect on reducing earnings management. Based on The Positive Accounting Theory, the efficient perspective will occur when the compensation contract and internal control system, including monitoring done by the board of commissioners, limit the common view opportunistic manager and motivate the manager to choose the right accounting policy. The effective monitoring conducted by an independent commissioner can reduce agency costs because management prioritizes the best interests of shareholders by maximizing company resources. Furthermore, it was found that audit committee size can reduce earning management. It is due to the wide range of skills possessed by audit committee members to exercise oversight over management. Audit committees with accounting and financial expertise can reduce earnings management. This part of finding indicates that audit committee may tend to uphold conservative as accounting mechanism. Accounting conservatism has an important role to play in restricting opportunistic management behavior.

15

Wahyudi, Wahyudi. "Effectiveness And Supervision Of Participating Interest By The Bpma: A Legal Analysis." Kanun Jurnal Ilmu Hukum 24, no.2 (August1, 2022): 180–95. http://dx.doi.org/10.24815/kanun.v24i2.28237.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Participating Interest policy (PI) is a new policy in oil and gas working areas; however, the implementation is not optimal. So there needs to be a study on effectiveness and supervision. This paper aims to discuss the formulation of the problem of the effectiveness of the implementation of PI and supervision by the Aceh Oil and Gas Management Agency (BPMA). This is a pure legal research meaning that it only requires data from relevant laws and analyses them descriptively. The Regulation of the Minister of Energy and Mineral Resources Number 37 of 2016 concerning Provisions for Offering 10% of PI in Oil and Gas Working Areas is an implementing regulation. In addition, the Contractors’ Cooperation Contract is required to offer PI to regions. However, there is no sanction for ignoring it which causes ineffectiveness. The Supreme Audit Agency reveals that Aceh had not yet received PIs from several working areas although the BPMA is entitled to do supervision.

16

Choi,YoungB., and ChristopherE.Williams. "A HIPAA Security and Privacy Compliance Audit and Risk Assessment Mitigation Approach." International Journal of Cyber Research and Education 3, no.2 (July 2021): 28–45. http://dx.doi.org/10.4018/ijcre.2021070103.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Data breaches have a profound effect on businesses associated with industries like the US healthcare system. This task extends more pressure on healthcare providers as they continue to gain unprecedented access to patient data, as the US healthcare system integrates further into the digital realm. Pressure has also led to the creation of the Health Insurance Portability and Accountability Act, Omnibus Rule, and Health Information Technology for Economic and Clinical Health laws. The Defense Information Systems Agency also develops and maintains security technical implementation guides that are consistent with DoD cybersecurity policies, standards, architectures, security controls, and validation procedures. The objective is to design a network (physician's office) in order to meet the complexity standards and unpredictable measures posed by attackers. Additionally, the network must adhere to HIPAA security and privacy requirements required by law. Successful implantation of network design will articulate comprehension requirements of information assurance security and control.

17

Meier,StevenR. "Best Project Management and Systems Engineering Practices in the Preacquisition Phase for Federal Intelligence and Defense Agencies." Project Management Journal 39, no.1 (March 2008): 59–71. http://dx.doi.org/10.1002/pmj.20035.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

The analysis of several government defense and intelligence agency large-scale acquisition programs that experienced significant cost and schedule growth shows that several critical factors need to be addressed in the preacquisition phase of the acquisition cycle. These include overzealous advocacy, technology readiness levels, life-cycle cost, schedule details, requirements maturity, acquisition and contract strategy, program office personnel tenure and experience, risk management, systems engineering, and trade studies. The results of this study–which incorporated data from industry responses, government and industry executive interviews, numerous studies, and reports–indicate that early preacquisition activities executed in a rigorous fashion can significantly reduce the risk of cost and schedule growth. In this paper, the root causes of the cost and schedule growth are discussed as well as techniques and alternatives to improve program performance.

18

Muretta, Robert. "Multiple Incentive Contracts Result in Increased Costs—Or Do They?" Delivering Performance at the Speed of Relevance: Agile Aquisition Approaches 26, no.88 (April1, 2019): 152–66. http://dx.doi.org/10.22594/dau.18-814.26.02.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Department of Defense (DoD) incentive contracts usually contain a predetermined formula for profit or fee adjustment based upon the actual cost outcome. Additional incentives can also be included, provided that a cost incentive (or constraint) also exists. Historically, DoD incentive contracts containing multiple incentives exceeded their cost targets 20% more frequently than those containing only a cost incentive. The author conducted a factor analysis to compare incentive contract outcomes between the DoD and other government agencies to determine if any underlying factors exist. One factor identified that the frequency in which schedule incentives and penalties are utilized is agency-centric, and increased use correlates to better schedule outcomes. Moreover, cost outcomes are not associated with that factor. The non-DoD agencies in this sample used predetermined cost constraints coupled with schedule incentives and/or penalties versus cost-plus incentive/fixed-price incentive (CPI/FPI) cost sharing structures with additional incentives.

19

Serwach, Małgorzata. "POSTANOWIENIA ZAKAZUJĄCE STRONIE STOSUNKU UBEZPIECZENIA ODPOWIEDZIALNOŚCI CYWILNEJ SAMODZIELNEGO DOKONYWANIA CZYNNOŚCI USTALAJĄCYCH W USTAWODAWSTWACH PAŃSTW CZŁONKOWSKICH UNII EUROPEJSKIEJ." Zeszyty Prawnicze 4, no.2 (June9, 2017): 163. http://dx.doi.org/10.21697/zp.2004.4.2.10.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

PROVISIONS PROHIBITING A PARTY TO A CIVIL LIABILITY INSURANCE CONTRACT FROM PERFORMING DECLARATORY ACTS IN THE LEGISISLATIONS OF THE MEMBER STATESSummaryAt the m om ent of the insurance occurence a stage o f cooperation, in a broad sense, comes into existence between the parties of a civil liability insurance contract. Its aim is not only a defense against a debt but also against fixing it at an excessive level.An insurance agency, which is actually threatened with an obligation to pay damages, imposes additional duties on the other party. The main duties are the following: a ban on fulfilling the injured party’s claims on his own, concluding a settlement or adm itting the claims. The aim of these bans is protection against overhasty decisions and statements of the insured person as well as against the unfairness o f an entity being in collusion with the injured party which may deliberately mislead the insurer in order to get excessive damages. In some instances the insured party may be led by compassion or regret or act under the influence o f strong emotions justified by the circ*mstances of the accident. Independently of the intentions of the insured, an insurance agency’s liability has an accessorial nature; it is responsible w ithin the same scope as the insured.The topic of this article are the provisions prohibiting the insured from declaratory actions w ithout a prior consent o f the isnsurance agency. Although they are on principle applied in all European law systems, they are not uniform. My analysis regards the solutions of French and German law as well as in the com m on law system; Polish accession to European U nion makes it necssary not only to prom ote our own practice but also to familiarise with the experience of foreign legislations.

20

Casey,PeterM. "The Contract Dispute Act's Statute of Limitations." Texas A&M Journal of Property Law 5, no.1 (October 2018): 57–105. http://dx.doi.org/10.37419/jpl.v5.i1.4.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

The Contract Disputes Act of 1978 (“CDA”) governs disputes “relating to a contract” between federal executive agencies and contractors. It establishes the process for parties to seek administrative remedies for claims under covered contracts. It also limits the right to judicial review of agency decisions to specific “boards of contract appeals” (“BCA”) and the United States Court of Federal Claims (“COFC”). According to the CDA’s sponsors, Congress enacted the law to bring reliability and order to a hodgepodge of conflicting and inconsistent rules for adjudicating contract disputes used by the various executive agencies. The law aimed to simplify the process for resolving agency-contractor disputes in light of the growing complexities and importance of Government procurement programs. In introducing the bill, its primary sponsor underscored the need for an efficient adjudicatory process in which both Government agencies and the contracting industries had confidence: One cannot dispute the almost universal expressions of industry and the practicing bar that the system needs change. A good remedies system is a major element in good procurement, and a good system depends not only on fairness and justice, but also on whether the people who are subject to the system believe it is fair and just. In some respects, the CDA fell short of providing a comprehensive framework for Government contract dispute resolution and its stated aim to “provide to the fullest extent practicable, informal, expeditious, and inexpensive resolution of disputes.” In particular, the Act did not prescribe any period of time for a party to submit an administrative claim for monetary or other relief after occurrence of the breach or other injury. After sixteen years and many complaints from both Government agencies and contractors about dealing with stale claims, Congress finally adopted a CDA limitations period as part of the Federal Acquisition Streamlining Act of 1994 (“FASA”). That statute of limitations, now codified at 41 U.S.C. §7103(a) (4), provides: Each claim by a contractor against the Federal Government relating to a contract and each claim by the Federal Government against a contractor relating to a contract shall be submitted within 6 years after the accrual of the claim. Decisions by BCAs and Federal Circuit courts under the CDA statute of limitations were relatively rare in the several years following the amendment. Since the early 2010s, however, the number of cases has skyrocketed. This spike in limitations disputes undoubtedly is attributable to the massive increase in military procurement following September 11, including unprecedented spending for goods and services in Afghanistan, Iraq, and other conflict zones. The sheer volume of defense contracts and contractual activity often made it difficult for the parties to recognize and submit claims within six years of the occurrence of the underlying facts. In a relatively short period of time, the tribunals with jurisdiction over defense contract litigation had to decide a large number of limitations disputes with little guidance from direct precedent or legislative or regulatory history. These circ*mstances have led to case law that is not always consistent in analysis or reconcilable in outcome. Part I of this Article provides an overview of the architecture and key features of the CDA. Part II examines the salient legislative and regulatory history surrounding the adoption of the CDA statute of limitations. Part III discusses when a CDA claim “accrues” and triggers the six-year time period for submitting a claim. In Part IV, we review some of the major issues that arise under the statute in significant and recurrent types of contractor-agency disputes. Part V concludes with a brief evaluation of whether the CDA statute measures up to the “long tradition of judicial authority to formulate rules ensuring fair and predictable enforcement of statutes of limitations.” Increasing litigation about limitations periods are challenging CDA tribunals to develop coherent and consistent criteria for parties to determine when the six-year period begins to run on their potential claims. Arguably, the trial judges have made that challenge more difficult by attempting to impose precedent under the Tucker Act’s non- discovery-accrual standard on FAR 31.201’s “discovery” rule language. That challenge has been compounded by a general tendency of the BCAs and COFCs to find that claims do not accrue until the claimant possesses the information on which the claim is based. It is reasonable to conclude that the decisional law has not matured to the ideal, and perhaps, idealistic, state of consisting of “rules ensuring fair and predictable enforcement of statutes of limitations.” It may also be observed that, despite the FAR Council’s express intent and “knew or should have known” definition of “accrual” in FAR 33.201, the decisional law to date has not developed or applied typical discovery rule analysis in examining the facts of the cases or in judgments whether claims are timely or untimely. With rare exception, the decisions have not dismissed as untimely claims based on when a claimant “should have known” or been aware of the relevant facts where the claimant did not have actual knowledge or possess the information showing that it had a claim. As a result, the precedent offers virtually no guidance on issues traditionally fundamental to a “reasonably should have learned” analysis, which include the following: (1) What information is sufficient to put a claimant on “notice”? (2) Does “notice” itself trigger the period (as Gray suggests), or does the statute initiate when a diligent claimant discovers the facts, or reasonably would have discovered the facts? (3) When and under what circ*mstances does a claimant have an affirmative duty to make a reasonable inquiry aimed towards “discovery” of potential claims? (4) When and under what circ*mstances may a claimant rely on the other party’s contractual duties to provide information in deter- mining the nature and extent of any “diligence” expected of the claimant? On a more fundamental level, however, the cases have never ad- dressed whether the FAR’s discovery rule definition of “accrual” appropriately serves as controlling over the definition of the otherwise undefined term “accrual” in section 7103(4)(a) of the CDA. The FAR Council undertook to define the word “accrue” in Section 4(a) pursuant to its general authority to promulgate regulations “as may be necessary to implement this Act,” and not in response to any specific delegation. The failure to examine whether the FAR Council’s adoption of its definition of “accrue” is sufficient under the recent Supreme Court decision relating to proper construction of statutory limitations provisions and, separately, deference to federal agencies in implementing regulations, raises questions of whether any “discovery rule” should apply in CDA statute of limitations cases. In several recent cases, the Supreme Court has sent a strong signal that the courts should not “graft” a “discovery rule” on the term “accrues” or the like in a federal statute of limitations absent “textual, historical, or equitable reasons” to do so. In Gabelli v. SEC, the SEC in 2008 filed a civil enforcement action against defendants for securities law violations between 1999 and 2002 and sought civil penalties, which are subject to a statute of limitations that require an action to be brought “within five years from the date when the claim first accrued.” The SEC argued that the statute is subject to a “discovery rule,” delaying accrual until it discovered or “could have been discovered with reasonable diligence.” The Court rejected that argument: “In common parlance a right accrues when it comes into existence . . . .” . . . Thus the “standard rule” is that a claim accrues “when the plaintiff has a complete and present cause of action.” . . . That rule has governed since the 1830’s when the predecessor to §2462 was enacted. . . . And that definition appears in dictionaries from the 19th century up until today. See, e.g., 1 A. Burrill, A Law Dictionary and Glossary 17 (1850) (“an action accrues when the plaintiff has a right to commence it”); Black’s Law Dictionary 23 (9th ed. 2009) (defining “accrue” as “[t]o come into existence as an enforce- able claim or right”). The Court added: “[T]he cases in which ‘a statute of limitation may be suspended by causes not mentioned in the statute itself . . . are very limited in character, and are to be admitted with great caution; other- wise the court would make the law instead of administering it.’” At a minimum, the CDA forums will need to address, if and when any litigant raises the question, whether “accrues” in section 7103(a) (4) (A) means (1) when the claimant “knew or should have known” of the cause, or (2) in light of Gabelli and other recent precedent, when the claimant “has a complete and present cause of action” regardless of the claimant’s state of mind. In this regard, while the FAR Council and the CDA forums have relied significantly on Tucker Act precedent, neither appears to have considered that, as in the CDA, the Tucker Act does not define “accrue,” and since its enactment, the federal courts consistently have construed “accrue” in the Tucker Act to mean the date when “when all the events have occurred which fix the alleged liability of the United States and entitle the claimant to institute an action.” The Supreme Court, moreover, recently clarified that under the Chevron deference analysis, “deference is not due [a regulatory definition of a statutory term] unless a ‘court, employing traditional tools of statutory construction,’ is left with an unresolved ambiguity. . . . Where . . . the canons supply an answer, ‘Chevron leaves the stage.’” Notably, there is no indication in the record that the FAR Council determined that the CDA statute’s use of “accrue” was “ambiguous,” or adopted its “discovery” definition standard to clarify an ambiguity. On the contrary, it noted the “discovery requirement must remain,” notwithstanding little support and much objection among commentators, because “many pricing defect cases have their original events at the beginning of the contract or on contract award, but often cannot be discovered by the Government until years later.” The CDA forum’s “discovery” rule, and the CDA forum’s default use of that definition, may be vulnerable in light of Gabelli, a growing hostility to Chevron deference, and the regulatory record.

21

Carter,SamuelG., Ignas Lekavicius, HunterB.Banks, OneyO.Soykal, ShojanP.Pavunny, Dan Pennachio, JeniferR.Hajzus, et al. "(Invited) Spin and Optical Properties of the Silicon Vacancy in 4H-SiC for Quantum Science and Technology." ECS Meeting Abstracts MA2022-02, no.34 (October9, 2022): 1249. http://dx.doi.org/10.1149/ma2022-02341249mtgabs.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Silicon vacancies in SiC are of significant interest for quantum information and sensing due to their unusual combination of long spin coherence time, optical addressability, and room-temperature operation in an industrially-relevant semiconductor. We characterize the spin and optical properties of the V2 silicon vacancy in 4H-SiC for both single defects and ensembles. We also show that they can be deterministically placed with sub-micron precision using focused Li ion implantation. Low-temperature photoluminescence excitation spectroscopy of the spin-dependent optical transitions of single silicon vacancies reveals two sharp lines with linewidths near the radiative lifetime limit. These lines correspond to the ms=±1/2 and ms=±3/2 states of an S=3/2 spin system that can be optically initialized, coherently manipulated with RF pulses, and read out via spin-dependent photoluminescence. We measure the different properties of spins in the two bases, and compare them to theoretical models. To suppress the limiting effects of the nuclear spin bath, we grow isotopically purified SiC with a very low abundance of 29Si and 13C. Our room temperature spin coherence measurements show orders-of-magnitude improvement of the coherence times in these materials. In particular, the inhom*ogeneous dephasing time T2 * in the ms=±1/2 basis shows a ~100x improvement, reaching 20 μs. We consider the prospects of this system for quantum sensing and as an efficient spin-photon interface for use in quantum networks. This work was supported by the U.S. Office of Naval Research, the OSD Quantum Sciences and Engineering Program, the Defense Threat Reduction Agency, and the Center for Integrated Nanotechnologies, an Office of Science User Facility operated for the U.S. Department of Energy (DOE) Office of Science. Sandia National Laboratories is a multi-mission laboratory managed and operated by National Technology and Engineering Solutions of Sandia, LLC., a wholly owned subsidiary of Honeywell International, Inc., for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-NA-0003525.

22

Tuzzahroh, Fatimah, and Sugiyarti Fatma Laela. "Sharia Audit and Shariah Compliance of Islamic Financial Institutions: A Bibliometric Analysis." Jurnal Ekonomi Syariah Teori dan Terapan 9, no.6 (November30, 2022): 815–33. http://dx.doi.org/10.20473/vol9iss20226pp815-833.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

ABSTRAK Penelitian ini bertujuan untuk memetakan penelitian-penelitian sebelumnya tentang audit syariah dan perannya dalam meningkatkan kepatuhan syariah di lembaga keuangan syariah (LKS). Penelitian ini juga menguraikan tantangan yang dihadapi oleh LKS dan solusi dalam mengimplementasikan audit syariah. Sebanyak 308 publikasi diperoleh dari database Google scholar, Emerald Insight, Research Gate, Crossref, Microsoft Academic and Pubmed yang diakses dengan perangkat lunak Publish or Perish (PoP) dalam kurun waktu 2008-2021. Studi ini menerapkan analisis bibliometrik menggunakan VOSviewer, yang mengubah metadata publikasi menjadi visualisasi sesuai dengan co-occurrence. Hasil penelitian ini menemukan bahwa audit syariah telah diterapkan di beberapa negara yang didominasi oleh Malaysia. Sebagian besar praktik audit syariah merupakan bagian dari fungsi audit internal. Audit syariah diidentifikasi sebagai mekanisme untuk memastikan kepatuhan syariah. Tantangan utama dalam pelaksanaan audit syariah antara lain: kurangnya kerangka dan standar audit syariah yang menyebabkan perselisihan di antara praktisi LKS, kurangnya auditor syariah yang berkualitas yang memiliki pengetahuan syariah yang memadai dan terlatih dengan baik, audit syariah dianggap menciptakan masalah inefisiensi. Peran komite tata kelola syariah dan dewan pengawas syariah direkomendasikan agar lebih optimal untuk memastikan efektivitas audit syariah. Penelitian ini memberikan pembahasan komprehensif tentang audit syariah, perannya dalam meningkatkan kepatuhan syariah, tantangan dan solusi yang ditawarkan belajar dari berbagai negara. Kata Kunci: Audit syariah, kepatuhan syariah, lembaga keuangan syariah, bibliometrik. ABSTRACT This study aimed to map out previous studies on sharia auditing and its role in improving sharia compliance in Islamic financial institutions (IFIs). It also outlined the challenges faced by IFIs and solutions in implementing shariah audit. A total of 308 publications were obtained from the Google scholar database, Emerald Insight, Research Gate, Crossref, Microsoft Academic and Pubmed which were accessed using the Publish or Perish (PoP) software in the 2008-2021 period. This study finds that sharia audits have been implemented in several countries, dominated by Malaysia. Most shariah audit practices are part from internal audit function of IFIs. Sharia audit is identified as a mechanism to assure shariah compliance. The main challenges in implementing sharia audit include: a lack of framework and standard of shariah audit that led to dispute among IFIs practitioners, a lack of qualified shariah auditors who have an adequate shariah knowledge and well trained , shariah audit identifed creating an efficiency issue. The role of the shariah governance committee and the shariah supervisory board may be optimized to ensure the effectiveness of shariah audit. This study provides a comprehensive discussion of shariah audit, its role in improving shariah compliance, challenges, and solutions offered learned from various countries. Keywords: Sharia audit, sharia compliance, Islamic financial institution, bibliometric. REFERENCES Abd Rahman, N., & Mastuki, N. (2019). Internal Shariah audit change: A conceptual paper. Journal of Muwafaqat, 2(April), 45–59. Abdul Rahman, A. R. (2010). Shari’ah audit for Islamic financial services: The needs and challenges. The Journal of Muamalat and Islamic Finance Research, 7(1), 133–145. Akbar, T., Mardian, S., & Anwar, S. (2015). Mengurai permasalahan audit syariah dengan analytical network process (ANP). Jurnal Akuntansi Dan Keuangan Islam, 2(2), 101–123. https://doi.org/10.35836/jakis.v3i2.32 Alahmadi, H. A., Hassan, A. F. S., Karbhari, Y., & Nahar, H. S. (2017). Unravelling shariah audit practice in Saudi Islamic Banks. International Journal of Economic Research, 14(15), 255–269. Alam, T., Aziz, H. A. A., & Iqbal, M. (2020). The current practice of IFI Shariah audit and what it ought to be evidence from Pakistan. Sci.Int, 32(4), 497–500. Alam, T., & Hassan, T. (2017). Competency of Shariah Auditors: Issues and Challenges in Pakistan. Journal of Internet Banking and Commerce, 22(2), 1-11. Algabry, L., Alhabshi, S. M., Soualhi, Y., & Othman, A. H. A. (2020). Assessing the effectiveness of internal Sharīʿah audit structure and its practices in Islamic financial institutions: A case study of Islamic banks in Yemen. Asian Journal of Accounting Research, 6(1), 2–22. https://doi.org/10.1108/AJAR-04-2019-0025 Ali, A., Ahmi, A., & Wan Ahmad, W. N. (2018). The current state of the internal audit research: A bibliometric analysis. Proceedings of the 5th International Conference on Accounting Studies (ICAS 2018), October, 108–113. Ali, N. A. M., Mohamed, Z. M., & Shahimi, S. (2015). Competency of shariah auditors in Malaysia: Issues and challenges. Journal of Islamic Finance, 4(1), 22–30. https://doi.org/10.12816/0024798 Alzeban, A. (2020). Internal audit as an antecedent of economic growth. Journal of Economic Studies, 48(7), 1267-1283. https://doi.org/10.1108/JES-08-2019-0350 Amir Husin, M. N., Zakaria, M. Z., Salleh, A. Z., Mochammad Sahid, M., Abdullah Saidi, H. ’Azeemi, Ab Rahman, M. F., Ab. Aziz, M. R., & Ab. Jalil, M. A. (2019). Ratification of shariah non-compliance issues: Solutions and its implementation in Islamic financial institutions-With Specific reference to tawarruq-based products and services. Graduate International Conference, Pascasarjana IAIN Bukittinggi, Sumatra Barat, November, 1–13. Antonio, M. S. (2001). Bank syariah dari teori ke praktek. Jakarta: Gema Insani. Antonio, M. S., Laela, S. F., & Jazil, T. (2020). Abu Zahrah’S maqasid sharia model as a performance measurement system. Jurnal Akuntansi Multiparadigma, 11(3), 519–541. https://doi.org/10.21776/ub.jamal.2020.11.3.30 Aprillianto, B., Roziq, A., Agustini, A. T., Sayekti, Y., & Jember, U. (2017). Praktik audit syariah dalam perspektif internasional. Prosiding Seminar Nasional Ekonomi dan Bisnis (SNAPER_EBIS 2017), 169-178. Arwani, A. (2018). Issues and challenges of shariah auditing in Islamic financial institutions and corporate governance compliance. Media Riset Akuntansi, Auditing & Informasi, 18(2), 169–186. https://doi.org/10.25105/mraai.v18i2.3008 Auda, J. (2008). Maqasid al syariah as philosophy of Islamic law. The international institute of Islamic thought. Baehaqi, A., & Suyanto, S. (2019). Audit internal lembaga keuangan syariah dalam perpektif al-hisbah. Jurnal Riset Keuangan Dan Akuntansi, 4(2), 15–24. https://doi.org/10.25134/jrka.v4i2.1694 Behrend, J., & Eulerich, M. (2018). Exploring the scientific landscape of internal audit research: A bibliometric analysis. SSRN Electronic Journal, July, 1–65. https://doi.org/10.2139/ssrn.3178362 Behrend, J., & Eulerich, M. (2020). Four decades of audit committee research: A bibliometric analysis (1977 – 2018). SSRN Electronic Journal, 1–46. https://doi.org/10.2139/ssrn.3496040 BNM-SGDP. (2019). Bank Negara Malaysia (Shariah Governance 2019). Bank Negara Malaysia. Retrieved from BNM/RH/PD 028-100, 1–22. Ciger, A. (2020). Audit quality: A bibliometric analysis (1981-2020). Scientific Annals of Economics and Business, 67(4), 473–494. https://doi.org/10.47743/saeb-2020-0031 Eck, N. J. Van, Waltman, L., Dekker, R., & Berg, J. Van Den. (2010). A comparison of two techniques for bibliometric mapping: Multidimensional scaling and VOS. Journal of the American Society for Information Science and Technology, 61(12), 2405–2416. https://doi.org/10.1002/asi.21421 Farida, F., & Dewi, V. S. (2018). Kompetensi auditor dan shariah compliance terhadap praktik audit syariah. Jurnal Analisis Bisnis Ekonomi, 16(1), 45–52. https://doi.org/10.31603/bisnisekonomi.v16i1.2130 Fauzi, A., & Supandi, A. F. (2019). Perkembangan audit syariah di Indonesia. Jurnal Istiqro, 5(1), 24. https://doi.org/10.30739/istiqro.v5i1.339 Fitriyani, N. I., & Kusnugroho, Y. A. (2021). Audit syariah dan audit konvensional: Bukti empiris di Indonesia. AFRE (Accounting and Financial Review), 4(1), 137–145. https://doi.org/10.26905/afr.v4i1.5642 Ghani, N. L. A., & Rahman, A. R. A. (2015). An analysis of Shari’ah audit practices in Islamic banks in Malaysia. Jurnal Pengurusan, 43, 107–118. Ghozali, M., Zeid, A. H., Prastyaningsih, I., & Syauqoti, R. (2020). The implementation of sharia compliance in the murabaha contract. 409(SoRes 2019), 479–481. https://doi.org/10.2991/assehr.k.200225.103 Haleem, A., Khan, M. I., Khan, S., & Jami, A. R. (2020). Research status in Halal: A review and bibliometric analysis. Modern Supply Chain Research and Applications, 2(1), 23–41. https://doi.org/10.1108/mscra-06-2019-0014 Hameed, S., & Ibrahim, M. (2005). The emerging issues on the objectives and characteristics of Islamic accounting for Islamic business organizations. Malaysian Accounting Review, 4(1), 75–92. Hanefah, M. M., Kamaruddin, M. I. H., Salleh, S., Shafii, Z., & Zakaria, N. (2020). Internal control, risk and Sharīʿah non-compliant income in Islamic financial institutions. ISRA International Journal of Islamic Finance, 12(3), 401–417. https://doi.org/10.1108/IJIF-02-2019-0025 Harande, Y. (2001). An investigation of the relationship using the literature of technology. Libri, 51, 124–127. Hassan, A. F. S., & Haridan, N. M. (2019). Shariah auditing and shariah compliance assurance in Malaysian Islamic Banks. Global Journal Al-Thaqafah, December, 61–72. Hassan, R. (2016). Shariah non-compliance risk and its effects on Islamic financial institutions. Al-Shajarah, 21(Special issue), 21–39. ICD - Thomson Reuters Islamic Finance Development Report 2021. (2021). Islamic finance development report (Issue 93 Islamic Banking 96 Takaful 98 Regulatory and Supervisory Framework 99 Talent). Isa, F., Ariffin, N., & Abidin, N. (2020). Shariah Audit practices in Malaysia: Moving forward. Journal of Islamic Finance (ISSN: 2289-2109 e-ISSN: 2289-2117), 9(2), 42–58. ISLAM, K. M. A., & BHUIYAN, A. B. (2021). Determinants of the effectiveness of internal shariah audit: Evidence from Islamic banks in Bangladesh. Journal of Asian Finance, Economics and Business, 8(2), 223–230. https://doi.org/10.13106/jafeb.2021.vol8.no2.0223 Islam, K. M. A., Sadekin, M. S., Rahman, M. T., & Chowdhury, M. A. H. (2021). The impact of shariah supervisory board and shariah audit committee on corporate social responsibility adoption at Islamic banks in Bangladesh. Journal of Asian Finance, Economics and Business, 8(3), 479–485. https://doi.org/10.13106/jafeb.2021.vol8.no3.0479 Islamic Financial Services Board. (2005). Guiding principles of risk management for institutions (Other than insurance institutions) offering only Islamic financial services. Islamic Financial Service Board, December, 1–36. https://www.ifsb.org/published.php Kamaruddin, M. I. H., & Hanefah, M. M. (2017). Enhancing shariah audit practices in Islamic financial institutions in Malaysia. Journal of Modern Accounting and Auditing, 13(11). https://doi.org/10.17265/1548-6583/2017.11.001 Karim, M. R., & Shetu, S. A. (2020). Shariah audit in Islamic financial institutions (IFIs): A literature review. BUFT Journal of Business & Economics (BJBE), 1, 45–66. Kasim, N., Sanusi, Z. M., Mutamimah, T., & Handoyo, S. (2013). Assessing the current practice of Auditing in Islamic Financial Institutions in Malaysia and Indonesia. International Journal of Trade, Economics and Finance, 4,6(January), 414–418. https://doi.org/10.7763/IJTEF.2013.V4.328 Khalid, A. A. (2020). Role of audit and governance committee for internal shariah audit effectiveness in Islamic banks. Asian Journal of Accounting Research, 5(1), 81–89. https://doi.org/10.1108/AJAR-10-2019-0075 Khalid, A. A., Haron, H., & Masron, T. A. (2018). Competency and effectiveness of internal Shariah audit in Islamic financial institutions. Journal of Islamic Accounting and Business Research, 9(2), 201–221. https://doi.org/10.1108/JIABR-01-2016-0009 Khalid, A. A., & Sarea, A. M. (2021). Independence and effectiveness in internal Shariah audit with insights drawn from Islamic agency theory. International Journal of Law and Management, 63(3), 332–346. https://doi.org/10.1108/IJLMA-02-2020-0056 Laela, S. F., Rossieta, H., Wijanto, S. H., & Ismal, R. (2018). Management accounting-strategy coalignment in Islamic banking. International Journal of Islamic and Middle Eastern Finance and Management, 11(4), 667–694. https://doi.org/10.1108/IMEFM-04-2017-0088 Laili, N., Ghani, A., Ariffin, N. M., Rahim, A., Rahman, A. (2019). The measurement of effective internal shariah audit function in Islamic financial institutions. International Journal of Economics, Management and Accounting, 27(1), 141–165. Lamboglia, R., Lavorato, D., Scornavacca, E., & Za, S. (2020). Exploring the relationship between audit and technology. A bibliometric analysis. Meditari Accountancy Research. https://doi.org/10.1108/MEDAR-03-2020-0836 Mardiyah, Q., & Mardian, S. (2015). Praktik audit syariah. Akuntabilitas, 8(1), 1–17. Martasari, L., & Mardian, S. (2015). Persepsi masyarakat terhadap penerapan sharia compliance pada bank syariah di kecamatan Barabai. Jurnal Dinamika Akuntansi Dan Bisnis, 2(1), 45–58. https://doi.org/10.24815/jdab.v2i1.3607 Md Helal Uddin, M. H. U. & M. M. H. (2013). An overview on the basics of Islamic audit. European Journal of Business and Management, 5(28), 9–18. Minarni, M. (2013). Audit syariah, dan tata kelola lembaga keuangan syariah. La_Riba, 7(1), 29–40. https://doi.org/10.20885/lariba.vol7.iss1.art3 Mohamad Puad, N. A., Abdullah, N. I., & Shafii, Z. (2020). Follow up in Shariah auditing: Multiple approaches by Takaful operators. International Journal of Islamic Economics and Finance Research, 3(1), 14–29. Mohd Ali, N. A., Shafii, Z., & Shahimi, S. (2020). Competency model for Shari’ah auditors in Islamic banks. Journal of Islamic Accounting and Business Research, 11(2), 377–399. https://doi.org/10.1108/JIABR-09-2016-0106 Muhammad, R. (2018). Shariah governance for Islamic banking: What can be learnt from Malaysia? Conference on Islamic Management Accounting and Economics, 1(1999), 111–123. Mulazid, A. S. (2016). Pelaksanaan sharia complience pada bank syariah (Studi kasus pada bank syariah mandiri, Jakarta). Madania, 20(1), 37–54. Nurcahyo, A., & Hudrasyah, H. (2017). The influence of halal awareness, halal certification, and personal societal purchase intention. Journal of Business and Management, 6(1), 21–31. Nurhasanah, N. (2013). Pengawasan Islam dalam operasional lembaga keuangan syariah. MIMBAR, Jurnal Sosial Dan Pembangunan, 29(1), 11. https://doi.org/10.29313/mimbar.v29i1.362 Nurhisam, L. (2016). Kepatuhan syariah (Sharia compliance) dalam Industri Keuangan Syariah. Jurnal Hukum IUS QUIA IUSTUM, 23(1), 77–96. https://doi.org/10.20885/iustum.vol23.iss1.art5 Omar, M. (2019). Issues and Challenges of Shariah Compliance Auditing in Islamic Financial Institution. Advanced International Journal of Banking, Accounting and Finance, 1(1), 13–24. https://doi.org/10.35631/aijbaf.11002 Oussii, A. A., & Boulila, N. (2020). Evidence on the relation between audit committee financial expertise and internal audit function effectiveness. Journal of Economic and Administrative Sciences, ahead-of-p(ahead-of-print). https://doi.org/10.1108/jeas-04-2020-0041 PricewaterhouseCoopers. (2011). Shariah Audit: Industry Insights. 1–28. Puneri, A., Chora, M., Ilhamiddin, N., & Benraheem, H. (2020). The Disclosure of Sharia Non-Compliance Income: Comparative Study between Full-fledged and Subsidiaries Malaysian Islamic Banks. JESI (Jurnal Ekonomi Syariah Indonesia), 9(2), 104. https://doi.org/10.21927/jesi.2019.9(2).104-117 Rahman, M. J. (2013). The current perception and practice of “Shariah Auditing” in Bangladeshi Islamic Banks. In Thesis MBA (Issue September). Rahman, N. A., Mastuki, N., Osman, M. R., & Kasim, N. (2020). Islamic legal maxim for Shari’ah audit in Islamic bank. Journal of Islamic Accounting and Business Research, 11(2), 457–471. https://doi.org/10.1108/JIABR-11-2017-0170 Ratu, M. K., & Meiriasari, V. (2021). Analisis perbandingan audit syariah pada lembaga keuangan Islam di Asia Tenggara (Studi literatur di Indonesia, Malaysia, Dan Brunei). Jurnal Proaksi, 8(1), 50–57. https://doi.org/10.32534/jpk.v8i1.1526 Rohmah, F., & Kusumo, R. W. (2020). Faktor-faktor yang mempengaruhi kualitas audit syariah pada perusahaan yang terdaftar di JII (Jakarta Islamic Index) tahun 2014-2018. The 11th University Research Colloquium 2020 Universitas ‘Aisyiyah Yogyakarta, 64–77. Salleh, S., Hanefah, M. M., & Shafii, Z. (2019). Shariah audit practices in Malaysian Islamic Banks: An Audit Expectation. Shariah Governance and Assurance in Islamic Financial Sectors, 113-145. Shafii, Z., Salleh, S., Zakaria, N., Hanefah, M. M., Mohd Ali, N. A., & Yunanda, R. A. (2014). Shariah audit certification contents: Views of regulators, shariah committee, shariah reviewers and undergraduate students. International Journal of Economics and Finance, 6(5). https://doi.org/10.5539/ijef.v6n5p210 Shafii, Z., Supiah, S., & Syahidawati, S. (2010). Management of shariah non-compliance audit risk in the Islamic financial institutions via the development of shariah compliance audit framework and shariah audit programme. Kyoto Bulletin of Islamic Area Studies, March, 14. Shah, S. A., Azhar, S. M., & Bhutto, N. A. (2019). Halal marketing: a marketing strategy perspective. Journal of Islamic Marketing, 11(6), 1641–1655. https://doi.org/10.1108/JIMA-11-2018-0211 Shahzad, M. A., Saeed, S. K., & Ehsan, A. (2017). Governance framework: Exploratory study of Islamic banks in Pakistan. Business & Economic Review, 9(1), 103–118. Sidiq, M. (2019). Panduan analisis bibliometrik sederhana. Journal Article, June. https://doi.org/10.13140/RG.2.2.15688.37125 Siswadi, I. (2013). Mengenal konsep penetapan kata kunci. Jurnal Pustakawan Indonesia, 12(2), 53–55. Syed Alwi Mohammed Sultan. (2007). A mini guide to shari’ah audit for Islamic financial institutions: A primer. Kuala Lumpur: CERT Publications Sdn. Bhd. Tanudjaja, I., & Kow, G. Y. (2018). Exploring bibliometric mapping in NUS using BibExcel and VOSviewer. IFLA WLIC Kuala Lumpur, 1–9. Widialoka, W., Hidayat, A. R., & Azib. (2016). Analisis pengaruh kepatuhan syariah (shariah compliance) terhadap dana pihak ketiga pada bank umum syariah di Indonesia periode tahun 2010-2015. Prosiding Keuangan Dan Perbankan Syariah, 2(2), 672–678. Wuttichindanon, S., & Issarawornrawanich, P. (2020). Determining factors of key audit matter disclosure in Thailand. Pacific Accounting Review, 32(4), 563–584. https://doi.org/10.1108/PAR-01-2020-0004 Yaacob, H., & Donglah, N. K. (2012). Shari’ah audit in Islamic financial institutions: The postgraduates’ perspective. International Journal of Economics and Finance, 4(12), 224–239. https://doi.org/10.5539/ijef.v4n12p224 Yahya, Y., & Mahzan, N. (2012). The role of internal auditing in ensuring governance in Islamic financial institution (IFI). 3rd International Conference on Business and Economic Research, March, 1634–1661. Yasoa’, M. R., Abdullah, W. A. W., & Endut, W. A. (2020). A comparative analysis between shariah audit and shariah review in Islamic banks in Malaysia: Practitioners’ perspective. Environment-Behaviour Proceedings Journal, 5(14), 195–200. https://doi.org/10.21834/ebpj.v5i14.2208 Yasoa, M. R., Amalina, W., Abdullah, W., Sultan, U., Abidin, Z., Endut, W. A., Sultan, U., & Abidin, Z. (2018). Shariah audit effectiveness in Islamic banks: A conceptual framework. Journal of Humanities, Language, Culture and Business (HLCB), 2(10), 12–19. Yazkhiruni, Y., Nurmazilah, M., & Haslida, A. H. (2018). A review of shariah auditing practices in ensuring governance in Islamic financial institutions (IFIs): A preliminary study. Advances in Social Sciences Research Journal, 5(7), 196–210. Yunas Ali, M., & Hassan, F. (2019). The study of potential shariah non-compliance risks in murabahah along with their risk management. Journal of Finance & Economics Research, 4(1), 44–58. https://doi.org/10.20547/jfer1904104 Yussof, S. A. (2013). Prospects of a shari’ah audit framework for Islamic financial institution in Malaysia. ICR Journal, 4(1), 80–102. https://doi.org/10.52282/icr.v4i1.493 Zahrah, M. A. (1997). Ushul fiqh. Darul Fikr. Zuhaili, W. (1997). Al-Fiqh al-islamy wa adilatuhu. Daar el-Fikr.

23

KOPYLOVA, Ekaterina, and Yaroslavna MULYK. "THE ORGANIZATION OF CONTROL OVER THE ACTIVITIES OF MATERIALLY RESPONSIBLE PERSONS IN THE SCIENTIFIC INSTITUTIONS." "EСONOMY. FINANСES. MANAGEMENT: Topical issues of science and practical activity", no.1 (41) (January 2019): 160–72. http://dx.doi.org/10.37128/2411-4413-2019-1-13.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

The methodical tools of organization the control over the activities of materially responsible persons in scientific institutions are researched. The functioning of the Institute of Food Resources of the National Academy of Sciences of Ukraine as a co-founder of the Educational, Scientific and Production Complex of "All-Ukrainian Scientific and Educational Consortium" is considered. It is determined that the institute is the leading agency on scientific ensuring of technical and technological progress of food processing industry of Ukraine. The methodical recommendations for organizing the internal control of budget funds managers in their institutions and subordinated budget institutions are considered. It is defined that the basis for the internal control is the responsibility of the manager for control and development of the institution in general. His main tasks are planning and organization of activities; formation of an adequate internal control structure; supervision of implementation of internal control and risk management to make sure that the goal and objectives of the institution are achieved and decisions, including financial ones, will be executed taking into account the principles of legality economy, efficiency, effectiveness and transparency. The concept of the term "responsibility" is considered and the different types of legal responsibility are described. Legal responsibility should be understood as the duty of a person to undergo certain restrictions of state power, provided by law, for the committed offense. The essence of the legal responsibility is as follows: a person, who hasn't executed the responsibility imposed on his/her by law, the new duty is assigned to certain restrictions, negative personal or property consequences. The scientific approaches to the interpretation of the term "material responsibility" are investigated. It is established that the material responsibility can be imposed on any employee who has entered into an employment contract with the owner or the authorized owner of the body. The implementation of labor activities under the civil law contracts is not covered by the sphere of the labor law. Therefore, persons who perform work on the basis of the civil law agreements (for example, under a contract), are responsible for property under the norms of the civil law. The types of material responsibility such as: limited, full, collective (brigade) and increased are considered. The list of grounds for bringing the employee to material responsibility (the presence of the direct harm, violation of the employee or owner of labor duties, causal link between violation and harm, the employee's fault) is studied. The procedure of signing the contract on full material responsibility and indemnity are investigated. The essence of the control over the activities of materially responsible persons is defined. It should be understood as the whole process, which is carried out by the management and employees of the institution, which directed to revealing of deviations and deficiencies in the work of materially responsible persons and bringing the perpetrators to responsibility. The basic directions of improvement of the control over the activity of materially responsible persons in scientific institutions are determined. These can be: the implementation in the institution of the materially responsible people’s instruction, regarding their rights and duties and determining these positions in the job descriptions; the implementation in the institution of the analytical information, where to record the information about the guilty persons, the reasons for the deviations, actions or inactivity of the persons that led to deviations; the formation of a separate subdivision of internal control, which will perform control functions including control over materially responsible persons, or introduction of the position of the internal controller; the computerization of the audit of goods, which will solve such problems as: observance of objectivity, accuracy of results, timing, reduction of labor costs; the development and implementation of a system of internal regulation of the control of the scientific institution, where it is necessary to provide general control questions at the level of the institution, the clearer provisions of internal control which are connected with concrete subjects of its realization, the definition of the rights and duties of persons connected with control activity.

24

Qi, Junjian, Kai Sun, and Wei Kang. "Adaptive Optimal PMU Placement Based on Empirical Observability Gramian**This work was supported in part by U.S. Department of Energy, Office of Electricity Delivery and Energy Reliability under contract DE-AC02-06CHff357, the CURENT engineering research center, and Naval Research Laboratory and Defense Advanced Research Projects Agency." IFAC-PapersOnLine 49, no.18 (2016): 482–87. http://dx.doi.org/10.1016/j.ifacol.2016.10.211.

Full text

APA, Harvard, Vancouver, ISO, and other styles

25

Zlatnik, Elena Yu, AleksandrB.Sagakyants, OlegI.Kit, OksanaG.Shulgina, ElenaA.Kalabanova, MariaA.Teplyakova, Liubov Yu Vladimirova, et al. "Spectrum of adipokines, batokines, myokines, and growth factors in blood serum of patients with various stages of lung cancer and with immunotherapy with PD-1/PD-L1 inhibitors." Journal of Clinical Oncology 39, no.15_suppl (May20, 2021): e21069-e21069. http://dx.doi.org/10.1200/jco.2021.39.15_suppl.e21069.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

e21069 Background: Metabolites of the intestinal microbiota, including adipokines, batokins, and myokines, are involved in carcinogenesis, antitumor immune defense and ensuring the effectiveness of antitumor treatment, including chemotherapy and immunotherapy. Methods: The study included 100 patients with lung cancer (LC), 70% males and 30% females: stage I – 10%, II - 14%, III – 50%, IV – 26%. 21 patients (12 males and 9 females) received treatment with PD-1/PD-L1 inhibitors: stage I - 2 (9%), II - 1 (5%), III - 5 (24%), IV - 12 (62%). Therapy included atezolizumab and pembrolizumab – 9 patients each (43%), nivolumab – 3 (14%). Complete response was registered in 2 (9%), partial response in 5 (24%), stabilization - 4 (19%), progression - 8 (38%). One patient developed an immune-mediated adverse event (Guillain-Barré syndrome), so checkpoint inhibitors (CPI) were canceled. Serum levels of adipokines, myokines, batokines, and growth factors were determined by ELISA before and during treatment. The control group included 100 healthy donors. Results: Levels of VEGF and NGF were statistically significantly higher in patients with lung cancer than in donors, without differences in other parameters. Differences were revealed depending on the LC stage: leptin was higher in stages I and IV (Me 52.8 and 46.3 ng/ml, respectively) compared with stages II and III (Me 27.4 and 16.4 ng/ml, respectively) and with donors (Me 12.5 ng/ml). In stages III and IV, levels of VEGF increased (Me 504 and 473 pg/ml, respectively; in donors Me 239 pg/ml), while BDNF decreased (Me 2.7 and 0.4, respectively, in donors Me 12.6 μg/ml); NGF in stages I and II was not detected, unlike stages III and IV. Immunotherapy with CPI elevated levels of adiponectin (Me 12.5 and 16 μg/ml, respectively), and reduced levels of myostatin (Me 26.4 and 2.8 μg/ml, respectively) and NGF (Me 130 and 53 pg/ml, respectively). Only NGF could be regarded as a predictive factor of the response to CPI, since it was detected in high amounts only in patients with subsequent LC progression, while in patients with a positive response to treatment or stabilization, it was absent both before and after immunotherapy. Conclusions: Serum levels of some adipokines, myokines, batokins, and growth factors in LC patients differ depending on the cancer stage and the result of CPI immunotherapy; thus, NGF can be used as a predictor of the immunotherapy effectiveness. The study was performed with financial support from the Federal Medical and Biological Agency of Russia under contract No. 0373100122120000017 dated 20.05.2020.

26

Ehrlich, Justin, Justin Perline, Joel Potter, and Shane Sanders. "Does a salary premium exist for offensive output in Major League Baseball?" Managerial Finance ahead-of-print, ahead-of-print (September22, 2020). http://dx.doi.org/10.1108/mf-04-2020-0186.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

PurposeIn baseball, a run scored on offense carries the same on-field (win) value as does a run prevented on defense. Both outcomes bear the same score margin implication. This presumption of unit equality is implicit in the Wins Above Replacement (WAR) measure, which treats units of offensive WAR (oWAR) and units of defensive WAR (dWAR) as perfectly substitutable toward win production. The purpose of this paper is to ask whether the salaries of Major League Baseball (MLB) players reveal such an equal valuation among MLB teams.Design/methodology/approachThe authors examine the relationship between offensive output, defensive output and subsequent salary from free agency in MLB using a set of log-linear OLS, fixed effects regression specifications.FindingsIn general, estimated annual salary from free agency increases significantly and substantially with unit increases in a player's (prior season) wins above replacement WAR. Across specifications, the authors estimate a 42.5–43.4% increase in salary for year t for each additional unit of WAR in year t−1. The authors disaggregate WAR into offensive and defensive components (oWAR and dWAR) and estimate a 52.4–53.3 (4.8–7.2)% increase in salary for each additional unit of oWAR (dWAR).Originality/valueThe efficiency of the baseball labor market has been studied previously with mixed results. The novelty of the present study is its treatment of inputs not as positions or individual players but as the underlying offensive and defensive win production of players. The authors estimate free agency salary returns to (contract season) oWAR and dWAR in MLB to establish whether (to what extent) a salary premium for offensive output exists within MLB.

27

Hall,SusanE., DennisL.Carter, and CarlL.Weber. "Long Endurance Materials for Aluminum Fuel Cell Systems." MRS Proceedings 393 (1995). http://dx.doi.org/10.1557/proc-393-277.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

ABSTRACTAppropriate selection of long endurance materials is critical to the cost effective use of fuel cell technology for near-term commercial and defense applications. To effectively transition this technology from laboratory prototype to fielded system, the durability of all fuel cell subsystems must be addressed. Material selection based upon a thorough understanding of system performance requirements, operational environments, and user interfaces not only provides high reliability and enhanced safety, but also lowers life cycle costs.This paper discusses the development of an Aluminum Fuel Cell Power System (FCPS) for the Advanced Research Projects Agency (ARPA) Unmanned Underwater Vehicle (UUV) program, focusing on the operational endurance testing that was conducted to evaluate candidate materials for cell stack, electrolyte, and coolant subsystems.The FCPS is a 15 kW closed aluminum-oxygen fuel cell system that provides up to 1.1 MWh energy. Loral has completed small-scale bench tests and is currently fabricating a full-scale system to be demonstrated in 1995. Requirements that strongly influenced material selection included: chemical compatibility - 4M KOH electrolyte pumped at 50°C, with dissolved aluminum and hydrargillite; system operational objectives - time between refueling and maintenance ranging from daily startup / shutdown to three weeks continuous; ARPA program objectives - commercial components, rapid prototyping, low life cycle costs.A materials / component endurance test program was established and conducted early in the design phase of the FCPS program. To date, Loral has completed over 3000 operational test hours, with nearly 8000 hours of accumulated exposure to KOH. Results of these tests have been incorporated into the FCPS detailed design, and are expected to significantly enhance the performance of the fielded system. This program is sponsored by ARPA Maritime Systems Technology Office under NASA contract NAS3-26715.

28

Seaton, Beth. "Feeling the Heat." M/C Journal 8, no.6 (December1, 2005). http://dx.doi.org/10.5204/mcj.2457.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Was it seven or eight summers ago, when the sun first became our enemy and set our skin on fire? We find it now in the normality of strange weather and the telescoping of the seasons; wherein it’s 27 degrees and there are no leaves yet on the trees, a hot August day in April. We watch the media spectacles of monster storms and mud slides that arrive with increasing force and frequency. And we despair over the death of the Polar bears, starving because the Arctic sea-ice upon which they catch seals can no longer bear their weight. Up there, we hear, the permafrost is melting, and the Inuit of Baffin Island are witnessing thunder and lightning for the first time in their lives. Down here, along the southern border of Canada, we are just beginning to feel the fear in our guts. The ambivalence and discomfort which we may feel about these changes – whose effects are as intimate as they are remote – speak to a more subtle perception that everything has now come undone: realigned and re-made by forces beyond our control, and yet, of our own making. That significant futurity which was once the sine qua non of a rational modernity – the self-confident assurance that things can only get better and never worse – has fallen to the wayside of our collective memory, useful now only for the purposes of Hallmark greeting cards. As usual, we suffer from a failure of imagination, wherein the only facts worth knowing become unspeakable, verboten vulgarities never to be uttered out-loud in polite company. What accounts for this silence? While we may increasingly feel that something is amiss in the world, this experience is not authorised or legitimated by the propositions of commercial media or conventional thought. What are the social consequences of this gap between the corporeal experience of global warming and its public representation? Can such affectual experience be mined as a means to advocate social change? In Canadian and American commercial media, discussion of “global warming” is still largely absent (Ungar; Weingart, Engels and Pansegrau). When the hurricanes Katrina and Rita whirled into Level 5 status across the very hot waters of the Gulf of Mexico this Fall, mention of global warming was quickly flicked away as a minor irritant. Such omissions are not surprising, given the political economy of American media. The automobile industry spends US$3 billion out of a total of US$9 billion annual expenditures of all advertising on network television. Not one of these ads is for hybrid cars. It is also our idea of nature that allows us to relegate matters of the environment to the periphery of our concerns. In its more piously Wordsworthian vestiges, nature is deemed as self-evident and unaltered by the ravages of time. It’s this temporal stasis attributed to nature that allows us to absolve ourselves from its fate. Nature, after all, is the non-human. And while the argument that only humans make history – that only humans transform and innovate themselves and their environment and manipulate the dimensions of time – can be recognised as a neat piece of social construction built in the interests of human conquest, we are still reticent to acknowledge nature on its own terms. Val Plumwood has argued that, “if the category of ‘nature’ is seen as phony, if it can only appear when suitably surrounded by scare quotes, [then] we are less likely to be inspired by appeals to nature’s integrity in [it’s defence]” (3). Somehow, believing in nature slides into an unseemly essentialism or a fetishistic form of love. Perhaps it’s not surprising then that so many people do not feel compelled to come to nature’s defense. Survey research from the United States, published in 2000 and 2003, shows that while 90% of Americans have now heard of global warming and believe it’s an important issue, a much smaller percentage are actually concerned about it (Stamm, Clark and Eblacas; Leiserowitz). Other matters such as employment, the economy and the rising costs of housing take priority over environmental issues. Furthermore, the research finds that while espousing environmental values, only a small percentage of respondents would self-identify as “environmentalist”. While being pro-environment is perceived as “having good character”, having too much of this good character is a bad thing. Still, can’t they feel what’s going on? Certainly here on the coast of British Columbia, where rainforests still run along the ocean’s edge, something has changed. Nothing is quite as ‘temperate’ as it once was. The weather shifts unexpectedly and dramatically, and the summers have become too hot and too dry. Global warming has brought a new atmosphere to the forests, as if under all this unfamiliar dryness and dust a latent extinction is beginning to stir. This current prospect – the death of not just a million species of plant and animal life (Kirby), but of countless human lives – may be redirecting our attention now to the interdependent relation, the fluid interchanges, between human and non-human worlds. This deadly probability may engender a new vitality, new ways of feeling life. “Nature”, as Michel Serres puts it, “is reminding us of its existence” (29). The challenge posed by this recognition prohibits the perception of nature in static terms, as a commodity or as handy oubliette for societal debris. In so doing, feeling the life of nature allows consideration of the ways in which nature and human culture have long been wedded to one another, not just in terms of the semiotic operations of a binarism, but as a complex and reciprocal project of interdependent life. Recognition of the interdependence of human and non-human life may also entail a particular affectual sensibility – a means of feeling life as it resonates against our skin and fills our senses. In this moment, “everything that is, resounds”. Here, “the sense and recognisability of things … do not lie in conceptual categories in which we mentally place them, but in their positions and orientations which our postures address” (Lingus 59). It’s not a question then of what nature means to us, but does nature do with us? How does it make us feel? Emotion has remained discursively submerged in discussions of climate change, not only because the stakes are such that only the scientists, with their particular authority and legitimacy, are afforded a voice, but also because it threatens the legitimacy of a formal rationalist representation of nature which excludes the non-human from the purview of ethical consideration. An affectual relationship to the natural world does have its difficulties. “Feeling nature” is based upon some sort of understanding with it, a form of competency, of ‘knowing your way around’. Such knowledges are often bound by class: the privileged remit of the romantic individual in search of an authentic experience, or the uncomfortable locale of hard and often violent labour. Still, it is in feeling the shrinking of life into the shadows of an uncommon heat that we may use this sentience to good effect. In his book The Natural Contract, Michel Serres argues that, “through exclusively social contracts, we have abandoned the bond that connects us to the world. … What language do the things of the world speak that we might come to an understanding of them contractually? … In fact, the Earth speaks to us in terms of forces, bonds and interactions … each of the partners in symbiosis thus owes … life to the other, on pain of death” (39). Long ago, when we were young, many of us made good money working in the coastal forest of British Columbia – either cutting it or milling it or planting it. I was alone there once for 6 weeks and was haunted daily by a raven who would track my movements through the trees, muttering incantations and clicks. By the time I walked out of the woods I was nearly speechless and it took me weeks to recover the easy cultural behaviour that came so naturally before. A friend of mine once had the job of getting rid of the young poplar and alder trees that colonise the logging slash. His task was to “cut and squirt”: to slash the trees with a machete and squirt poison inside the cut. Maybe it was a bad case of anthropomorphism, or maybe it was the drugs, but to this day, he swears he could hear the trees scream. References Kirby, Alex. “Climate Risk to Million Species.” BBC News Online, U.K. Edition, 7 Jan. 2004. Leiserowitz, A. American Opinions on Global Warming: Project Results. Eugene: U of Oregon, 2003. Lingus, Alphonso. The Imperitive. Bloomington: Indiana UP, 1998. Plumwood, Val. “Nature as Agency and the Prospects for a Progressive Naturalism.” Capitalism, Nature, Socialism 4 (2001): 3-32. Serres, Michel. The Natural Contract. (Trans. E. MacArthur and W. Paulson), Ann Arbor: Michigan UP, 1995. Stamm, K.R., F. Clark and P.R. Eblacas. “Mass Communication and Public Understanding of Environmental Problems: The Case of Global Warming.” Public Understanding of Science 9 (2000): 219-37. Ungar, S. “Is Strange Weather in the Air?: A Study of U.S. National News Coverage of Extreme Weather Events.” Climatic Change 41 (1999): 133-50. Weingart, P.A., A. Engels and P. Pansegrau. “Risks of Communication: Discourses on Climate Change in Science, Politics and the Mass Media.” Public Understanding of Science 9 (2000): 261-83. Citation reference for this article MLA Style Seaton, Beth. "Feeling the Heat." M/C Journal 8.6 (2005). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0512/08-seaton.php>. APA Style Seaton, B. (Dec. 2005) "Feeling the Heat," M/C Journal, 8(6). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0512/08-seaton.php>.

29

Parker, Megan Jean, and Mary Dodge. "An exploratory study of deferred prosecution agreements and the adjudication of corporate crime." Journal of Financial Crime, July13, 2022. http://dx.doi.org/10.1108/jfc-06-2022-0122.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Purpose Deferred prosecution agreements (DPAs) are the tool of choice for federal prosecutors when adjudicating corporate misconduct. A DPA is a negotiation that permits the allegedly guilty party from undergoing a criminal trial if they avoid committing further wrongdoing for a specified period. This paper aims to examine whether DPAs are a beneficial mechanism for the criminal justice system to use while adjudicating corporate misconduct. By conducting in-depth semi-structured qualitative interviews with 24 practitioners in the legal field and white-collar crime experts, this study identifies the shortcomings and advantages of DPAs and highlights what policy enactments might enhance their application. The study contributes to the existing literature by expanding the narratives used by judicial officials, legal practitioners and white-collar crime scholars on the role of DPAs. Design/methodology/approach The current study is an in-depth qualitative analysis that explores judicial actors’ and white-collar crime scholars’ opinions on the adoption of DPAs to adjudicate corporate misconduct. The literature on DPAs is currently derived primarily from law and literature reviews published by legal scholars. Clandestine negotiations are not accessible to the public and are frequently kept in sealed files unless a breach of contract occurs, resulting in the case proceeding to trial. Hence, a qualitative analysis is the best approach to evaluate the effectiveness of DPAs. Further, little evidence is available that focuses on the opinions of professionals who have participated in these agreements. The interviews were conducted over Zoom and lasted an average of 43 min, with the longest interview spanning 1 h and 45 min and the shortest interview being 14 minutes. A non-probability sampling method – specifically, snowball sampling – was used to generate a total sample of 24 legal professionals and white-collar crime scholars. Initial participants were found by contacting law offices specializing in white-collar crime litigation and using current networks to attain access to a broader range of participants. Then, 19 participants provided referrals throughout the study. The final sample consisted of nine government officials, eight legal practitioners and seven white-collar crime academics experts. One of the government official interviews was excluded from the final research project due to a lack of expertise in the field of white-collar crime. The interview questions were designed to promote in-depth conversation and insight into personal opinions on the adoption of DPAs. Several inquiries highlighted whether DPAs are an appropriate response to corporate misconduct and whether they reduced recidivism through their intended deterrent effect. Furthermore, several descriptive questions sought to understand which criminal justice actors support the adoption of DPAs in white-collar crime cases and why. Coding of the data was first conducted individually by each author. The researchers then compared thematic findings that reflected consensus. Findings An immediate theme identifiable in the research is the intrinsic value that DPAs offer in adjudicating corporate wrongdoing. As indicated by a participant, corporate misconduct is not “black or white,” stressing the importance of prosecutors having a middle ground between criminal prosecution and the dismissal of charges. A judicial official indicated that “DPAs are another essential arrow in a prosecutor’s quiver – and something a defense attorney can bargain for” (Respondent 5). Seven government officials and legal practitioners noted that you are unable to send a corporation to jail, and you do not simply want to put them out of business; thus, a DPA is the only tool in which the government can mandate structural change in a company without dismantling the entire entity. Only three academics concurred with the government officials and legal practitioners that DPAs are beneficial and offer prosecutors a vital middle ground. One academic, for example, stated that “DPAs have given U.S Attorney offices that ability to be involved for a considerable amount of time in a company's business, while simultaneously promoting change within the entity” (Respondent 14). Additionally, DPAs ensure that corporations are held criminally liable without triggering an endless cycle of collateral consequences for innocent third parties. One legal practitioner, for example, stated: “Just look at the Enron case; they charged Arthur Andersen with obstruction of justice and dismantled the entire entity they made it where the business was never going to come back. A small subset of individuals, in this case, should have been held responsible but instead, hundreds and if not thousands of people were harmed. With this in mind, DPAs are extremely important, in that it limits collateral consequences because DPAs take a more holistic view that criminal prosecution does not consider” (Respondent 21). Another respondent highlighted that “DPAs are the only tool available that can be employed to change an entire organization structurally” (Respondent 20). Ultimately, the findings suggest that there is a consensus among respondents that DPAs are an appropriate response to corporate misconduct, particularly when the agreement stipulates that a company must hire an external compliance monitor and update their current compliance system. Overall, participants emphasized that these stipulations promote a sense of corporate accountability, provide for the dismissal of guilty employees and mandate structural change. The majority of the respondents (n = 20) insisted that DPAs are advantageous, yet a subset of participants were skeptical of their use in white-collar crime prosecutions. One legal practitioner, for example, noted that “DPAs are political creatures that are awarded as political favors to the largest of corporations that our economy relies upon” (Respondent 17). Another government official confirmed this statement, indicating that “DPAs are a mere slap on the wrist for large corporations – they simply see it as doing business” (Respondent 6). Four academic participants emphasized that DPAs are typically negotiated with multi-level corporations and are not extended to the small businesses that suffer the dire consequences of criminal prosecution. One academic, for instance, stressed that “the question becomes is it fairly applied and being implemented properly. Larger companies are more likely to receive and benefit from a DPA, thus, raising the question of fairness” (Respondent 12). Another academic who was previously a government official stated: “DPAs risk abuse – there have been several instances where prosecutors have forced companies to donate money to favored charities and overstepped their powers. Sometimes DPAs also come with monitors. For example, banks typically have to pay for the auditor, and it becomes extremely intrusive, and it it not clear that they are efficient.” Research limitations/implications Several limitations exist in this research. First, it is not a comprehensive study that is representative of the larger population, which limits generalizability. Given the contention of research on DPAs, this qualitative research contributes to the literature, and its findings are likely transferable to multiple settings in which DPAs are used. Second, DPAs are processed and drafted differently across jurisdictions; thus, comparing DPAs across state levels and among departments in the federal government would be equivalent to comparing apples to oranges. This comparison is yet another limitation to the study because criminal justice practitioners operate in both the state and federal jurisdictions. Another challenge in the current study and something that likely will be a problem for future researchers is the difficulty of gaining access to experts in an exclusive field of criminal justice, such as federal prosecutors, Department of Justice officials, federal judges and elite corporate defense attorneys. Ultimately, several obstacles arose during the study, particularly when recruiting participants to gain a large enough sample size to conduct meaningful analysis. This resulted in smaller sample size but rich, in-depth data that achieved saturation among participants. Practical implications Several policy implications are identifiable. First, it appears that DPAs are a mainstay of white-collar crime prosecution. No participants advocate for their complete removal from the prosecution process. Participants highlight that DPAs occupy an essential middle-ground between dismissal and criminal charges. Without this mechanism, prosecution would be impeded, and holding corporate criminal actors liable would increasingly become formidable. Although it appears that the system cannot function without DPAs, several respondents emphasize that we must begin to hold individuals accountable alongside corporations. Another policy implication that a minority of participants mentioned within the study involves ensuring that our compliance monitoring system operates appropriately. A majority of participants note that the overarching stipulation that promotes structural change within an organization is adopting a functioning compliance monitoring system, thus, emphasizing the importance of this process operating smoothly and ethically. The selection of an independent compliance monitor may be problematic. For example, a former government compliance monitor notes that not all monitors are experts in the field they are overseeing. A pharmaceutical expert, for example, may be attempting to regulate an automotive organization, which may present unique challenges. An agency of federal professionals dedicated to supervising specific industries such as automotive, pharmaceutical and financial would ensure that organizations are actually implementing the terms of the DPA. Originality/value Ultimately, the current research highlights the necessity of empirically studying the benefits and drawbacks of such agreements. Future research on the topic remains onerous due to the scarcity of a centralized database that contains extensive details of DPAs. The present study suggests that the verdict on DPAs is undecided, with more than half of the study's criminal justice professionals advocating for their continued and even increased use. However, about half of the participants, particularly academics, called attention to the agreements’ potential bias. The disagreement among participants is most contentious in the consideration of a DPA centralized database which would immensely aid future research and policy advancements.

30

Colvin, Neroli. "Resettlement as Rebirth: How Effective Are the Midwives?" M/C Journal 16, no.5 (August21, 2013). http://dx.doi.org/10.5204/mcj.706.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

“Human beings are not born once and for all on the day their mothers give birth to them [...] life obliges them over and over again to give birth to themselves.” (Garcia Marquez 165) Introduction The refugee experience is, at heart, one of rebirth. Just as becoming a new, distinctive being—biological birth—necessarily involves the physical separation of mother and infant, so becoming a refugee entails separation from a "mother country." This mother country may or may not be a recognised nation state; the point is that the refugee transitions from physical connectedness to separation, from insider to outsider, from endemic to alien. Like babies, refugees may have little control over the timing and conditions of their expulsion. Successful resettlement requires not one rebirth but multiple rebirths—resettlement is a lifelong process (Layton)—which in turn require hope, imagination, and energy. In rebirthing themselves over and over again, people who have fled or been forced from their homelands become both mother and child. They do not go through this rebirthing alone. A range of agencies and individuals may be there to assist, including immigration officials, settlement services, schools and teachers, employment agencies and employers, English as a Second Language (ESL) resources and instructors, health-care providers, counsellors, diasporic networks, neighbours, church groups, and other community organisations. The nature, intensity, and duration of these “midwives’” interventions—and when they occur and in what combinations—vary hugely from place to place and from person to person, but there is clear evidence that post-migration experiences have a significant impact on settlement outcomes (Fozdar and Hartley). This paper draws on qualitative research I did in 2012 in a regional town in New South Wales to illuminate some of the ways in which settlement aides ease, or impede, refugees’ rebirth as fully recognised and participating Australians. I begin by considering what it means to be resilient before tracing some of the dimensions of the resettlement process. In doing so, I draw on data from interviews and focus groups with former refugees, service providers, and other residents of the town I shall call Easthaven. First, though, a word about Easthaven. As is the case in many rural and regional parts of Australia, Easthaven’s population is strongly dominated by Anglo Celtic and Saxon ancestries: 2011 Census data show that more than 80 per cent of residents were born in Australia (compared with a national figure of 69.8 per cent) and about 90 per cent speak only English at home (76.8 per cent). Almost twice as many people identify as Aboriginal or Torres Strait Islander as the national figure of 2.5 per cent (Australian Bureau of Statistics). For several years Easthaven has been an official “Refugee Welcome Zone”, welcoming hundreds of refugees from diverse countries in Africa and the Middle East as well as from Myanmar. This reflects the Department of Immigration and Citizenship’s drive to settle a fifth of Australia’s 13,750 humanitarian entrants a year directly in regional areas. In Easthaven’s schools—which is where I focused my research—almost all of the ESL students are from refugee backgrounds. Defining Resilience Much of the research on human resilience is grounded in psychology, with a capacity to “bounce back” from adverse experiences cited in many definitions of resilience (e.g. American Psychological Association). Bouncing back implies a relatively quick process, and a return to a state or form similar to that which existed before the encounter with adversity. Yet resilience often requires sustained effort and significant changes in identity. As Jerome Rugaruza, a former UNHCR refugee, says of his journey from the Democratic Republic of Congo to Australia: All the steps begin in the burning village: you run with nothing to eat, no clothes. You just go. Then you get to the refugee camp […] You have a little bread and you thank god you are safe. Then after a few years in the camp, you think about a future for your children. You arrive in Australia and then you learn a new language, you learn to drive. There are so many steps and not everyone can do it. (Milsom) Not everyone can do it, but a large majority do. Research by Graeme Hugo, for example, shows that although humanitarian settlers in Australia face substantial barriers to employment and initially have much higher unemployment rates than other immigrants, for most nationality groups this difference has disappeared by the second generation: “This is consistent with the sacrifice (or investment) of the first generation and the efforts extended to attain higher levels of education and English proficiency, thereby reducing the barriers over time.” (Hugo 35). Ingrid Poulson writes that “resilience is not just about bouncing. Bouncing […] is only a reaction. Resilience is about rising—you rise above it, you rise to the occasion, you rise to the challenge. Rising is an active choice” (47; my emphasis) I see resilience as involving mental and physical grit, coupled with creativity, aspiration and, crucially, agency. Dimensions of Resettlement To return to the story of 41-year-old Jerome Rugaruza, as related in a recent newspaper article: He [Mr Rugaruza] describes the experience of being a newly arrived refugee as being like that of a newborn baby. “You need special care; you have to learn to speak [English], eat the different food, create relationships, connections”. (Milsom) This is a key dimension of resettlement: the adult becomes like an infant again, shifting from someone who knows how things work and how to get by to someone who is likely to be, for a while, dependent on others for even the most basic things—communication, food, shelter, clothing, and social contact. The “special care” that most refugee arrivals need initially (and sometimes for a long time) often results in their being seen as deficient—in knowledge, skills, dispositions, and capacities as well as material goods (Keddie; Uptin, Wright and Harwood). As Fozdar and Hartley note: “The tendency to use a deficit model in refugee resettlement devalues people and reinforces the view of the mainstream population that refugees are a liability” (27). Yet unlike newborns, humanitarian settlers come to their new countries with rich social networks and extensive histories of experience and learning—resources that are in fact vital to their rebirth. Sisay (all names are pseudonyms), a year 11 student of Ethiopian heritage who was born in Kenya, told me with feeling: I had a life back in Africa [her emphasis]. It was good. Well, I would go back there if there’s no problems, which—is a fact. And I came here for a better life—yeah, I have a better life, there’s good health care, free school, and good environment and all that. But what’s that without friends? A fellow student, Celine, who came to Australia five years ago from Burundi via Uganda, told me in a focus group: Some teachers are really good but I think some other teachers could be a little bit more encouraging and understanding of what we’ve gone through, because [they] just look at you like “You’re year 11 now, you should know this” […] It’s really discouraging when [the teachers say] in front of the class, “Oh, you shouldn’t do this subject because you haven’t done this this this this” […] It’s like they’re on purpose to tell you “you don’t have what it takes; just give up and do something else.” As Uptin, Wright and Harwood note, “schools not only have the power to position who is included in schooling (in culture and pedagogy) but also have the power to determine whether there is room and appreciation for diversity” (126). Both Sisay and Celine were disheartened by the fact they felt some of their teachers, and many of their peers, had little interest in or understanding of their lives before they came to Australia. The teachers’ low expectations of refugee-background students (Keddie, Uptin, Wright and Harwood) contrasted with the students’ and their families’ high expectations of themselves (Brown, Miller and Mitchell; Harris and Marlowe). When I asked Sisay about her post-school ambitions, she said: “I have a good idea of my future […] write a documentary. And I’m working on it.” Celine’s response was: “I know I’m gonna do medicine, be a doctor.” A third girl, Lily, who came to Australia from Myanmar three years ago, told me she wanted to be an accountant and had studied accounting at the local TAFE last year. Joseph, a father of three who resettled from South Sudan seven years ago, stressed how important getting a job was to successful settlement: [But] you have to get a certificate first to get a job. Even the job of cleaning—when I came here I was told that somebody has to go to have training in cleaning, to use the different chemicals to clean the ground and all that. But that is just sweeping and cleaning with water—you don’t need the [higher-level] skills. Simple jobs like this, we are not able to get them. In regional Australia, employment opportunities tend to be limited (Fozdar and Hartley); the unemployment rate in Easthaven is twice the national average. Opportunities to study are also more limited than in urban centres, and would-be students are not always eligible for financial assistance to gain or upgrade qualifications. Even when people do have appropriate qualifications, work experience, and language proficiency, the colour of their skin may still mean they miss out on a job. Tilbury and Colic-Peisker have documented the various ways in which employers deflect responsibility for racial discrimination, including the “common” strategy (658) of arguing that while the employer or organisation is not prejudiced, they have to discriminate because of their clients’ needs or expectations. I heard this strategy deployed in an interview with a local businesswoman, Catriona: We were advertising for a new technician. And one of the African refugees came to us and he’d had a lot of IT experience. And this is awful, but we felt we couldn't give him the job, because we send our technicians into people's houses, and we knew that if a black African guy rocked up at someone’s house to try and fix their computer, they would not always be welcomed in all—look, it would not be something that [Easthaven] was ready for yet. Colic-Peisker and Tilbury (Refugees and Employment) note that while Australia has strict anti-discrimination legislation, this legislation may be of little use to the people who, because of the way they look and sound (skin colour, dress, accent), are most likely to face prejudice and discrimination. The researchers found that perceived discrimination in the labour market affected humanitarian settlers’ sense of satisfaction with their new lives far more than, for example, racist remarks, which were generally shrugged off; the students I interviewed spoke of racism as “expected,” but “quite rare.” Most of the people Colic-Peisker and Tilbury surveyed reported finding Australians “friendly and accepting” (33). Even if there is no active discrimination on the basis of skin colour in employment, education, or housing, or overt racism in social situations, visible difference can still affect a person’s sense of belonging, as Joseph recounts: I think of myself as Australian, but my colour doesn’t [laughs] […] Unfortunately many, many Australians are expecting that Australia is a country of Europeans … There is no need for somebody to ask “Where do you come from?” and “Do you find Australia here safe?” and “Do you enjoy it?” Those kind of questions doesn’t encourage that we are together. This highlights another dimension of resettlement: the journey from feeling “at home” to feeling “foreign” to, eventually, feeling at home again in the host country (Colic-Peisker and Tilbury, Refugees and Employment). In the case of visibly different settlers, however, this last stage may never be completed. Whether the questions asked of Joseph are well intentioned or not, their effect may be the same: they position him as a “forever foreigner” (Park). A further dimension of resettlement—one already touched on—is the degree to which humanitarian settlers actively manage their “rebirth,” and are allowed and encouraged to do so. A key factor will be their mastery of English, and Easthaven’s ESL teachers are thus pivotal in the resettlement process. There is little doubt that many of these teachers have gone to great lengths to help this cohort of students, not only in terms of language acquisition but also social inclusion. However, in some cases what is initially supportive can, with time, begin to undermine refugees’ maturity into independent citizens. Sharon, an ESL teacher at one of the schools, told me how she and her colleagues would give their refugee-background students lifts to social events: But then maybe three years down the track they have a car and their dad can drive, but they still won’t take them […] We arrive to pick them up and they’re not ready, or there’s five fantastic cars in the driveway, and you pick up the student and they say “My dad’s car’s much bigger and better than yours” [laughs]. So there’s an expectation that we’ll do stuff for them, but we’ve created that [my emphasis]. Other support services may have more complex interests in keeping refugee settlers dependent. The more clients an agency has, the more services it provides, and the longer clients stay on its books, the more lucrative the contract for the agency. Thus financial and employment imperatives promote competition rather than collaboration between service providers (Fozdar and Hartley; Sidhu and Taylor) and may encourage assumptions about what sorts of services different individuals and groups want and need. Colic-Peisker and Tilbury (“‘Active’ and ‘Passive’ Resettlement”) have developed a typology of resettlement styles—“achievers,” “consumers,” “endurers,” and “victims”—but stress that a person’s style, while influenced by personality and pre-migration factors, is also shaped by the institutions and individuals they come into contact with: “The structure of settlement and welfare services may produce a victim mentality, leaving members of refugee communities inert and unable to see themselves as agents of change” (76). The prevailing narrative of “the traumatised refugee” is a key aspect of this dynamic (Colic-Peisker and Tilbury, “‘Active’ and ‘Passive’ Resettlement”; Fozdar and Hartley; Keddie). Service providers may make assumptions about what humanitarian settlers have gone through before arriving in Australia, how they have been affected by their experiences, and what must be done to “fix” them. Norah, a long-time caseworker, told me: I think you get some [providers] who go, “How could you have gone through something like that and not suffered? There must be—you must have to talk about this stuff” […] Where some [refugees] just come with the [attitude] “We’re all born into a situation; that was my situation, but I’m here now and now my focus is this.” She cited failure to consider cultural sensitivities around mental illness and to recognise that stress and anxiety during early resettlement are normal (Tilbury) as other problems in the sector: [Newly arrived refugees] go through the “happy to be here” [phase] and now “hang on, I’ve thumped to the bottom and I’m missing my own foods and smells and cultures and experiences”. I think sometimes we’re just too quick to try and slot people into a box. One factor that appears to be vital in fostering and sustaining resilience is social connection. Norah said her clients were “very good on the mobile phone” and had links “everywhere,” including to family and friends in their countries of birth, transition countries, and other parts of Australia. A 2011 report for DIAC, Settlement Outcomes of New Arrivals, found that humanitarian entrants to Australia were significantly more likely to be members of cultural and/or religious groups than other categories of immigrants (Australian Survey Research). I found many examples of efforts to build both bonding and bridging capital (Putnam) in Easthaven, and I offer two examples below. Several people told me about a dinner-dance that had been held a few weeks before one of my visits. The event was organised by an African women’s group, which had been formed—with funding assistance—several years before. The dinner-dance was advertised in the local newspaper and attracted strong interest from a broad cross-section of Easthaveners. To Debbie, a counsellor, the response signified a “real turnaround” in community relations and was a big boon to the women’s sense of belonging. Erica, a teacher, told me about a cultural exchange day she had organised between her bush school—where almost all of the children are Anglo Australian—and ESL students from one of the town schools: At the start of the day, my kids were looking at [the refugee-background students] and they were scared, they were saying to me, "I feel scared." And we shoved them all into this tiny little room […] and they had no choice but to sit practically on top of each other. And by the end of the day, they were hugging each other and braiding their hair and jumping and playing together. Like Uptin, Wright and Harwood, I found that the refugee-background students placed great importance on the social aspects of school. Sisay, the girl I introduced earlier in this paper, said: “It’s just all about friendship and someone to be there for you […] We try to be friends with them [the non-refugee students] sometimes but sometimes it just seems they don’t want it.” Conclusion A 2012 report on refugee settlement services in NSW concludes that the state “is not meeting its responsibility to humanitarian entrants as well as it could” (Audit Office of New South Wales 2); moreover, humanitarian settlers in NSW are doing less well on indicators such as housing and health than humanitarian settlers in other states (3). Evaluating the effectiveness of formal refugee-centred programs was not part of my research and is beyond the scope of this paper. Rather, I have sought to reveal some of the ways in which the attitudes, assumptions, and everyday practices of service providers and members of the broader community impact on refugees' settlement experience. What I heard repeatedly in the interviews I conducted was that it was emotional and practical support (Matthews; Tilbury), and being asked as well as told (about their hopes, needs, desires), that helped Easthaven’s refugee settlers bear themselves into fulfilling new lives. References Audit Office of New South Wales. Settling Humanitarian Entrants in New South Wales—Executive Summary. May 2012. 15 Aug. 2013 ‹http://www.audit.nsw.gov.au/ArticleDocuments/245/02_Humanitarian_Entrants_2012_Executive_Summary.pdf.aspx?Embed=Y>. Australian Bureau of Statistics. 2011 Census QuickStats. Mar. 2013. 11 Aug. 2013 ‹http://www.censusdata.abs.gov.au/census_services/getproduct/census/2011/quickstat/0>. Australian Survey Research. Settlement Outcomes of New Arrivals—Report of Findings. Apr. 2011. 15 Aug. 2013 ‹http://www.immi.gov.au/media/publications/research/_pdf/settlement-outcomes-new-arrivals.pdf>. Brown, Jill, Jenny Miller, and Jane Mitchell. “Interrupted Schooling and the Acquisition of Literacy: Experiences of Sudanese Refugees in Victorian Secondary Schools.” Australian Journal of Language and Literacy 29.2 (2006): 150-62. Colic-Peisker, Val, and Farida Tilbury. “‘Active’ and ‘Passive’ Resettlement: The Influence of Supporting Services and Refugees’ Own Resources on Resettlement Style.” International Migration 41.5 (2004): 61-91. ———. Refugees and Employment: The Effect of Visible Difference on Discrimination—Final Report. Perth: Centre for Social and Community Research, Murdoch University, 2007. Fozdar, Farida, and Lisa Hartley. “Refugee Resettlement in Australia: What We Know and Need To Know.” Refugee Survey Quarterly 4 Jun. 2013. 12 Aug. 2013 ‹http://rsq.oxfordjournals.org/search?fulltext=fozdar&submit=yes&x=0&y=0>. Garcia Marquez, Gabriel. Love in the Time of Cholera. London: Penguin Books, 1989. Harris, Vandra, and Jay Marlowe. “Hard Yards and High Hopes: The Educational Challenges of African Refugee University Students in Australia.” International Journal of Teaching and Learning in Higher Education 23.2 (2011): 186-96. Hugo, Graeme. A Significant Contribution: The Economic, Social and Civic Contributions of First and Second Generation Humanitarian Entrants—Summary of Findings. Canberra: Department of Immigration and Citizenship, 2011. Keddie, Amanda. “Pursuing Justice for Refugee Students: Addressing Issues of Cultural (Mis)recognition.” International Journal of Inclusive Education 16.12 (2012): 1295-1310. Layton, Robyn. "Building Capacity to Ensure the Inclusion of Vulnerable Groups." Creating Our Future conference, Adelaide, 28 Jul. 2012. Milsom, Rosemarie. “From Hard Luck Life to the Lucky Country.” Sydney Morning Herald 20 Jun. 2013. 12 Aug. 2013 ‹http://www.smh.com.au/national/from-hard-luck-life-to-the-lucky-country-20130619-2oixl.html>. Park, Gilbert C. “’Are We Real Americans?’: Cultural Production of Forever Foreigners at a Diversity Event.” Education and Urban Society 43.4 (2011): 451-67. Poulson, Ingrid. Rise. Sydney: Pan Macmillan Australia, 2008. Putnam, Robert D. Bowling Alone: The Collapse and Revival of American Community. New York: Simon & Schuster, 2000. Sidhu, Ravinder K., and Sandra Taylor. “The Trials and Tribulations of Partnerships in Refugee Settlement Services in Australia.” Journal of Education Policy 24.6 (2009): 655-72. Tilbury, Farida. “‘I Feel I Am a Bird without Wings’: Discourses of Sadness and Loss among East Africans in Western Australia.” Identities: Global Studies in Culture and Power 14.4 (2007): 433-58. ———, and Val Colic-Peisker. “Deflecting Responsibility in Employer Talk about Race Discrimination.” Discourse & Society 17.5 (2006): 651-76. Uptin, Jonnell, Jan Wright, and Valerie Harwood. “It Felt Like I Was a Black Dot on White Paper: Examining Young Former Refugees’ Experience of Entering Australian High Schools.” The Australian Educational Researcher 40.1 (2013): 125-37.

31

Losh, Elizabeth. "Artificial Intelligence." M/C Journal 10, no.5 (October1, 2007). http://dx.doi.org/10.5204/mcj.2710.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

On the morning of Thursday, 4 May 2006, the United States House Permanent Select Committee on Intelligence held an open hearing entitled “Terrorist Use of the Internet.” The Intelligence committee meeting was scheduled to take place in Room 1302 of the Longworth Office Building, a Depression-era structure with a neoclassical façade. Because of a dysfunctional elevator, some of the congressional representatives were late to the meeting. During the testimony about the newest political applications for cutting-edge digital technology, the microphones periodically malfunctioned, and witnesses complained of “technical problems” several times. By the end of the day it seemed that what was to be remembered about the hearing was the shocking revelation that terrorists were using videogames to recruit young jihadists. The Associated Press wrote a short, restrained article about the hearing that only mentioned “computer games and recruitment videos” in passing. Eager to have their version of the news item picked up, Reuters made videogames the focus of their coverage with a headline that announced, “Islamists Using US Videogames in Youth Appeal.” Like a game of telephone, as the Reuters videogame story was quickly re-run by several Internet news services, each iteration of the title seemed less true to the exact language of the original. One Internet news service changed the headline to “Islamic militants recruit using U.S. video games.” Fox News re-titled the story again to emphasise that this alert about technological manipulation was coming from recognised specialists in the anti-terrorism surveillance field: “Experts: Islamic Militants Customizing Violent Video Games.” As the story circulated, the body of the article remained largely unchanged, in which the Reuters reporter described the digital materials from Islamic extremists that were shown at the congressional hearing. During the segment that apparently most captured the attention of the wire service reporters, eerie music played as an English-speaking narrator condemned the “infidel” and declared that he had “put a jihad” on them, as aerial shots moved over 3D computer-generated images of flaming oil facilities and mosques covered with geometric designs. Suddenly, this menacing voice-over was interrupted by an explosion, as a virtual rocket was launched into a simulated military helicopter. The Reuters reporter shared this dystopian vision from cyberspace with Western audiences by quoting directly from the chilling commentary and describing a dissonant montage of images and remixed sound. “I was just a boy when the infidels came to my village in Blackhawk helicopters,” a narrator’s voice said as the screen flashed between images of street-level gunfights, explosions and helicopter assaults. Then came a recording of President George W. Bush’s September 16, 2001, statement: “This crusade, this war on terrorism, is going to take a while.” It was edited to repeat the word “crusade,” which Muslims often define as an attack on Islam by Christianity. According to the news reports, the key piece of evidence before Congress seemed to be a film by “SonicJihad” of recorded videogame play, which – according to the experts – was widely distributed online. Much of the clip takes place from the point of view of a first-person shooter, seen as if through the eyes of an armed insurgent, but the viewer also periodically sees third-person action in which the player appears as a running figure wearing a red-and-white checked keffiyeh, who dashes toward the screen with a rocket launcher balanced on his shoulder. Significantly, another of the player’s hand-held weapons is a detonator that triggers remote blasts. As jaunty music plays, helicopters, tanks, and armoured vehicles burst into smoke and flame. Finally, at the triumphant ending of the video, a green and white flag bearing a crescent is hoisted aloft into the sky to signify victory by Islamic forces. To explain the existence of this digital alternative history in which jihadists could be conquerors, the Reuters story described the deviousness of the country’s terrorist opponents, who were now apparently modifying popular videogames through their wizardry and inserting anti-American, pro-insurgency content into U.S.-made consumer technology. One of the latest video games modified by militants is the popular “Battlefield 2” from leading video game publisher, Electronic Arts Inc of Redwood City, California. Jeff Brown, a spokesman for Electronic Arts, said enthusiasts often write software modifications, known as “mods,” to video games. “Millions of people create mods on games around the world,” he said. “We have absolutely no control over them. It’s like drawing a mustache on a picture.” Although the Electronic Arts executive dismissed the activities of modders as a “mustache on a picture” that could only be considered little more than childish vandalism of their off-the-shelf corporate product, others saw a more serious form of criminality at work. Testifying experts and the legislators listening on the committee used the video to call for greater Internet surveillance efforts and electronic counter-measures. Within twenty-four hours of the sensationalistic news breaking, however, a group of Battlefield 2 fans was crowing about the idiocy of reporters. The game play footage wasn’t from a high-tech modification of the software by Islamic extremists; it had been posted on a Planet Battlefield forum the previous December of 2005 by a game fan who had cut together regular game play with a Bush remix and a parody snippet of the soundtrack from the 2004 hit comedy film Team America. The voice describing the Black Hawk helicopters was the voice of Trey Parker of South Park cartoon fame, and – much to Parker’s amusem*nt – even the mention of “goats screaming” did not clue spectators in to the fact of a comic source. Ironically, the moment in the movie from which the sound clip is excerpted is one about intelligence gathering. As an agent of Team America, a fictional elite U.S. commando squad, the hero of the film’s all-puppet cast, Gary Johnston, is impersonating a jihadist radical inside a hostile Egyptian tavern that is modelled on the cantina scene from Star Wars. Additional laughs come from the fact that agent Johnston is accepted by the menacing terrorist cell as “Hakmed,” despite the fact that he utters a series of improbable clichés made up of incoherent stereotypes about life in the Middle East while dressed up in a disguise made up of shoe polish and a turban from a bathroom towel. The man behind the “SonicJihad” pseudonym turned out to be a twenty-five-year-old hospital administrator named Samir, and what reporters and representatives saw was nothing more exotic than game play from an add-on expansion pack of Battlefield 2, which – like other versions of the game – allows first-person shooter play from the position of the opponent as a standard feature. While SonicJihad initially joined his fellow gamers in ridiculing the mainstream media, he also expressed astonishment and outrage about a larger politics of reception. In one interview he argued that the media illiteracy of Reuters potentially enabled a whole series of category errors, in which harmless gamers could be demonised as terrorists. It wasn’t intended for the purpose what it was portrayed to be by the media. So no I don’t regret making a funny video . . . why should I? The only thing I regret is thinking that news from Reuters was objective and always right. The least they could do is some online research before publishing this. If they label me al-Qaeda just for making this silly video, that makes you think, what is this al-Qaeda? And is everything al-Qaeda? Although Sonic Jihad dismissed his own work as “silly” or “funny,” he expected considerably more from a credible news agency like Reuters: “objective” reporting, “online research,” and fact-checking before “publishing.” Within the week, almost all of the salient details in the Reuters story were revealed to be incorrect. SonicJihad’s film was not made by terrorists or for terrorists: it was not created by “Islamic militants” for “Muslim youths.” The videogame it depicted had not been modified by a “tech-savvy militant” with advanced programming skills. Of course, what is most extraordinary about this story isn’t just that Reuters merely got its facts wrong; it is that a self-identified “parody” video was shown to the august House Intelligence Committee by a team of well-paid “experts” from the Science Applications International Corporation (SAIC), a major contractor with the federal government, as key evidence of terrorist recruitment techniques and abuse of digital networks. Moreover, this story of media illiteracy unfolded in the context of a fundamental Constitutional debate about domestic surveillance via communications technology and the further regulation of digital content by lawmakers. Furthermore, the transcripts of the actual hearing showed that much more than simple gullibility or technological ignorance was in play. Based on their exchanges in the public record, elected representatives and government experts appear to be keenly aware that the digital discourses of an emerging information culture might be challenging their authority and that of the longstanding institutions of knowledge and power with which they are affiliated. These hearings can be seen as representative of a larger historical moment in which emphatic declarations about prohibiting specific practices in digital culture have come to occupy a prominent place at the podium, news desk, or official Web portal. This environment of cultural reaction can be used to explain why policy makers’ reaction to terrorists’ use of networked communication and digital media actually tells us more about our own American ideologies about technology and rhetoric in a contemporary information environment. When the experts come forward at the Sonic Jihad hearing to “walk us through the media and some of the products,” they present digital artefacts of an information economy that mirrors many of the features of our own consumption of objects of electronic discourse, which seem dangerously easy to copy and distribute and thus also create confusion about their intended meanings, audiences, and purposes. From this one hearing we can see how the reception of many new digital genres plays out in the public sphere of legislative discourse. Web pages, videogames, and Weblogs are mentioned specifically in the transcript. The main architecture of the witnesses’ presentation to the committee is organised according to the rhetorical conventions of a PowerPoint presentation. Moreover, the arguments made by expert witnesses about the relationship of orality to literacy or of public to private communications in new media are highly relevant to how we might understand other important digital genres, such as electronic mail or text messaging. The hearing also invites consideration of privacy, intellectual property, and digital “rights,” because moral values about freedom and ownership are alluded to by many of the elected representatives present, albeit often through the looking glass of user behaviours imagined as radically Other. For example, terrorists are described as “modders” and “hackers” who subvert those who properly create, own, legitimate, and regulate intellectual property. To explain embarrassing leaks of infinitely replicable digital files, witness Ron Roughead says, “We’re not even sure that they don’t even hack into the kinds of spaces that hold photographs in order to get pictures that our forces have taken.” Another witness, Undersecretary of Defense for Policy and International Affairs, Peter Rodman claims that “any video game that comes out, as soon as the code is released, they will modify it and change the game for their needs.” Thus, the implication of these witnesses’ testimony is that the release of code into the public domain can contribute to political subversion, much as covert intrusion into computer networks by stealthy hackers can. However, the witnesses from the Pentagon and from the government contractor SAIC often present a contradictory image of the supposed terrorists in the hearing transcripts. Sometimes the enemy is depicted as an organisation of technological masterminds, capable of manipulating the computer code of unwitting Americans and snatching their rightful intellectual property away; sometimes those from the opposing forces are depicted as pre-modern and even sub-literate political innocents. In contrast, the congressional representatives seem to focus on similarities when comparing the work of “terrorists” to the everyday digital practices of their constituents and even of themselves. According to the transcripts of this open hearing, legislators on both sides of the aisle express anxiety about domestic patterns of Internet reception. Even the legislators’ own Web pages are potentially disruptive electronic artefacts, particularly when the demands of digital labour interfere with their duties as lawmakers. Although the subject of the hearing is ostensibly terrorist Websites, Representative Anna Eshoo (D-California) bemoans the difficulty of maintaining her own official congressional site. As she observes, “So we are – as members, I think we’re very sensitive about what’s on our Website, and if I retained what I had on my Website three years ago, I’d be out of business. So we know that they have to be renewed. They go up, they go down, they’re rebuilt, they’re – you know, the message is targeted to the future.” In their questions, lawmakers identify Weblogs (blogs) as a particular area of concern as a destabilising alternative to authoritative print sources of information from established institutions. Representative Alcee Hastings (D-Florida) compares the polluting power of insurgent bloggers to that of influential online muckrakers from the American political Right. Hastings complains of “garbage on our regular mainstream news that comes from blog sites.” Representative Heather Wilson (R-New Mexico) attempts to project a media-savvy persona by bringing up the “phenomenon of blogging” in conjunction with her questions about jihadist Websites in which she notes how Internet traffic can be magnified by cooperative ventures among groups of ideologically like-minded content-providers: “These Websites, and particularly the most active ones, are they cross-linked? And do they have kind of hot links to your other favorite sites on them?” At one point Representative Wilson asks witness Rodman if he knows “of your 100 hottest sites where the Webmasters are educated? What nationality they are? Where they’re getting their money from?” In her questions, Wilson implicitly acknowledges that Web work reflects influences from pedagogical communities, economic networks of the exchange of capital, and even potentially the specific ideologies of nation-states. It is perhaps indicative of the government contractors’ anachronistic worldview that the witness is unable to answer Wilson’s question. He explains that his agency focuses on the physical location of the server or ISP rather than the social backgrounds of the individuals who might be manufacturing objectionable digital texts. The premise behind the contractors’ working method – surveilling the technical apparatus not the social network – may be related to other beliefs expressed by government witnesses, such as the supposition that jihadist Websites are collectively produced and spontaneously emerge from the indigenous, traditional, tribal culture, instead of assuming that Iraqi insurgents have analogous beliefs, practices, and technological awareness to those in first-world countries. The residual subtexts in the witnesses’ conjectures about competing cultures of orality and literacy may tell us something about a reactionary rhetoric around videogames and digital culture more generally. According to the experts before Congress, the Middle Eastern audience for these videogames and Websites is limited by its membership in a pre-literate society that is only capable of abortive cultural production without access to knowledge that is archived in printed codices. Sometimes the witnesses before Congress seem to be unintentionally channelling the ideas of the late literacy theorist Walter Ong about the “secondary orality” associated with talky electronic media such as television, radio, audio recording, or telephone communication. Later followers of Ong extend this concept of secondary orality to hypertext, hypermedia, e-mail, and blogs, because they similarly share features of both speech and written discourse. Although Ong’s disciples celebrate this vibrant reconnection to a mythic, communal past of what Kathleen Welch calls “electric rhetoric,” the defence industry consultants express their profound state of alarm at the potentially dangerous and subversive character of this hybrid form of communication. The concept of an “oral tradition” is first introduced by the expert witnesses in the context of modern marketing and product distribution: “The Internet is used for a variety of things – command and control,” one witness states. “One of the things that’s missed frequently is how and – how effective the adversary is at using the Internet to distribute product. They’re using that distribution network as a modern form of oral tradition, if you will.” Thus, although the Internet can be deployed for hierarchical “command and control” activities, it also functions as a highly efficient peer-to-peer distributed network for disseminating the commodity of information. Throughout the hearings, the witnesses imply that unregulated lateral communication among social actors who are not authorised to speak for nation-states or to produce legitimated expert discourses is potentially destabilising to political order. Witness Eric Michael describes the “oral tradition” and the conventions of communal life in the Middle East to emphasise the primacy of speech in the collective discursive practices of this alien population: “I’d like to point your attention to the media types and the fact that the oral tradition is listed as most important. The other media listed support that. And the significance of the oral tradition is more than just – it’s the medium by which, once it comes off the Internet, it is transferred.” The experts go on to claim that this “oral tradition” can contaminate other media because it functions as “rumor,” the traditional bane of the stately discourse of military leaders since the classical era. The oral tradition now also has an aspect of rumor. A[n] event takes place. There is an explosion in a city. Rumor is that the United States Air Force dropped a bomb and is doing indiscriminate killing. This ends up being discussed on the street. It ends up showing up in a Friday sermon in a mosque or in another religious institution. It then gets recycled into written materials. Media picks up the story and broadcasts it, at which point it’s now a fact. In this particular case that we were telling you about, it showed up on a network television, and their propaganda continues to go back to this false initial report on network television and continue to reiterate that it’s a fact, even though the United States government has proven that it was not a fact, even though the network has since recanted the broadcast. In this example, many-to-many discussion on the “street” is formalised into a one-to many “sermon” and then further stylised using technology in a one-to-many broadcast on “network television” in which “propaganda” that is “false” can no longer be disputed. This “oral tradition” is like digital media, because elements of discourse can be infinitely copied or “recycled,” and it is designed to “reiterate” content. In this hearing, the word “rhetoric” is associated with destructive counter-cultural forces by the witnesses who reiterate cultural truisms dating back to Plato and the Gorgias. For example, witness Eric Michael initially presents “rhetoric” as the use of culturally specific and hence untranslatable figures of speech, but he quickly moves to an outright castigation of the entire communicative mode. “Rhetoric,” he tells us, is designed to “distort the truth,” because it is a “selective” assembly or a “distortion.” Rhetoric is also at odds with reason, because it appeals to “emotion” and a romanticised Weltanschauung oriented around discourses of “struggle.” The film by SonicJihad is chosen as the final clip by the witnesses before Congress, because it allegedly combines many different types of emotional appeal, and thus it conveniently ties together all of the themes that the witnesses present to the legislators about unreliable oral or rhetorical sources in the Middle East: And there you see how all these products are linked together. And you can see where the games are set to psychologically condition you to go kill coalition forces. You can see how they use humor. You can see how the entire campaign is carefully crafted to first evoke an emotion and then to evoke a response and to direct that response in the direction that they want. Jihadist digital products, especially videogames, are effective means of manipulation, the witnesses argue, because they employ multiple channels of persuasion and carefully sequenced and integrated subliminal messages. To understand the larger cultural conversation of the hearing, it is important to keep in mind that the related argument that “games” can “psychologically condition” players to be predisposed to violence is one that was important in other congressional hearings of the period, as well one that played a role in bills and resolutions that were passed by the full body of the legislative branch. In the witness’s testimony an appeal to anti-game sympathies at home is combined with a critique of a closed anti-democratic system abroad in which the circuits of rhetorical production and their composite metonymic chains are described as those that command specific, unvarying, robotic responses. This sharp criticism of the artful use of a presentation style that is “crafted” is ironic, given that the witnesses’ “compilation” of jihadist digital material is staged in the form of a carefully structured PowerPoint presentation, one that is paced to a well-rehearsed rhythm of “slide, please” or “next slide” in the transcript. The transcript also reveals that the members of the House Intelligence Committee were not the original audience for the witnesses’ PowerPoint presentation. Rather, when it was first created by SAIC, this “expert” presentation was designed for training purposes for the troops on the ground, who would be facing the challenges of deployment in hostile terrain. According to the witnesses, having the slide show showcased before Congress was something of an afterthought. Nonetheless, Congressman Tiahrt (R-KN) is so impressed with the rhetorical mastery of the consultants that he tries to appropriate it. As Tiarht puts it, “I’d like to get a copy of that slide sometime.” From the hearing we also learn that the terrorists’ Websites are threatening precisely because they manifest a polymorphously perverse geometry of expansion. For example, one SAIC witness before the House Committee compares the replication and elaboration of digital material online to a “spiderweb.” Like Representative Eshoo’s site, he also notes that the terrorists’ sites go “up” and “down,” but the consultant is left to speculate about whether or not there is any “central coordination” to serve as an organising principle and to explain the persistence and consistency of messages despite the apparent lack of a single authorial ethos to offer a stable, humanised, point of reference. In the hearing, the oft-cited solution to the problem created by the hybridity and iterability of digital rhetoric appears to be “public diplomacy.” Both consultants and lawmakers seem to agree that the damaging messages of the insurgents must be countered with U.S. sanctioned information, and thus the phrase “public diplomacy” appears in the hearing seven times. However, witness Roughhead complains that the protean “oral tradition” and what Henry Jenkins has called the “transmedia” character of digital culture, which often crosses several platforms of traditional print, projection, or broadcast media, stymies their best rhetorical efforts: “I think the point that we’ve tried to make in the briefing is that wherever there’s Internet availability at all, they can then download these – these programs and put them onto compact discs, DVDs, or post them into posters, and provide them to a greater range of people in the oral tradition that they’ve grown up in. And so they only need a few Internet sites in order to distribute and disseminate the message.” Of course, to maintain their share of the government market, the Science Applications International Corporation also employs practices of publicity and promotion through the Internet and digital media. They use HTML Web pages for these purposes, as well as PowerPoint presentations and online video. The rhetoric of the Website of SAIC emphasises their motto “From Science to Solutions.” After a short Flash film about how SAIC scientists and engineers solve “complex technical problems,” the visitor is taken to the home page of the firm that re-emphasises their central message about expertise. The maps, uniforms, and specialised tools and equipment that are depicted in these opening Web pages reinforce an ethos of professional specialisation that is able to respond to multiple threats posed by the “global war on terror.” By 26 June 2006, the incident finally was being described as a “Pentagon Snafu” by ABC News. From the opening of reporter Jake Tapper’s investigative Webcast, established government institutions were put on the spot: “So, how much does the Pentagon know about videogames? Well, when it came to a recent appearance before Congress, apparently not enough.” Indeed, the very language about “experts” that was highlighted in the earlier coverage is repeated by Tapper in mockery, with the significant exception of “independent expert” Ian Bogost of the Georgia Institute of Technology. If the Pentagon and SAIC deride the legitimacy of rhetoric as a cultural practice, Bogost occupies himself with its defence. In his recent book Persuasive Games: The Expressive Power of Videogames, Bogost draws upon the authority of the “2,500 year history of rhetoric” to argue that videogames represent a significant development in that cultural narrative. Given that Bogost and his Watercooler Games Weblog co-editor Gonzalo Frasca were actively involved in the detective work that exposed the depth of professional incompetence involved in the government’s line-up of witnesses, it is appropriate that Bogost is given the final words in the ABC exposé. As Bogost says, “We should be deeply bothered by this. We should really be questioning the kind of advice that Congress is getting.” Bogost may be right that Congress received terrible counsel on that day, but a close reading of the transcript reveals that elected officials were much more than passive listeners: in fact they were lively participants in a cultural conversation about regulating digital media. After looking at the actual language of these exchanges, it seems that the persuasiveness of the misinformation from the Pentagon and SAIC had as much to do with lawmakers’ preconceived anxieties about practices of computer-mediated communication close to home as it did with the contradictory stereotypes that were presented to them about Internet practices abroad. In other words, lawmakers found themselves looking into a fun house mirror that distorted what should have been familiar artefacts of American popular culture because it was precisely what they wanted to see. References ABC News. “Terrorist Videogame?” Nightline Online. 21 June 2006. 22 June 2006 http://abcnews.go.com/Video/playerIndex?id=2105341>. Bogost, Ian. Persuasive Games: Videogames and Procedural Rhetoric. Cambridge, MA: MIT Press, 2007. Game Politics. “Was Congress Misled by ‘Terrorist’ Game Video? We Talk to Gamer Who Created the Footage.” 11 May 2006. http://gamepolitics.livejournal.com/285129.html#cutid1>. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York UP, 2006. julieb. “David Morgan Is a Horrible Writer and Should Be Fired.” Online posting. 5 May 2006. Dvorak Uncensored Cage Match Forums. http://cagematch.dvorak.org/index.php/topic,130.0.html>. Mahmood. “Terrorists Don’t Recruit with Battlefield 2.” GGL Global Gaming. 16 May 2006 http://www.ggl.com/news.php?NewsId=3090>. Morgan, David. “Islamists Using U.S. Video Games in Youth Appeal.” Reuters online news service. 4 May 2006 http://today.reuters.com/news/ArticleNews.aspx?type=topNews &storyID=2006-05-04T215543Z_01_N04305973_RTRUKOC_0_US-SECURITY- VIDEOGAMES.xml&pageNumber=0&imageid=&cap=&sz=13&WTModLoc= NewsArt-C1-ArticlePage2>. Ong, Walter J. Orality and Literacy: The Technologizing of the Word. London/New York: Methuen, 1982. Parker, Trey. Online posting. 7 May 2006. 9 May 2006 http://www.treyparker.com>. Plato. “Gorgias.” Plato: Collected Dialogues. Princeton: Princeton UP, 1961. Shrader, Katherine. “Pentagon Surfing Thousands of Jihad Sites.” Associated Press 4 May 2006. SonicJihad. “SonicJihad: A Day in the Life of a Resistance Fighter.” Online posting. 26 Dec. 2005. Planet Battlefield Forums. 9 May 2006 http://www.forumplanet.com/planetbattlefield/topic.asp?fid=13670&tid=1806909&p=1>. Tapper, Jake, and Audery Taylor. “Terrorist Video Game or Pentagon Snafu?” ABC News Nightline 21 June 2006. 30 June 2006 http://abcnews.go.com/Nightline/Technology/story?id=2105128&page=1>. U.S. Congressional Record. Panel I of the Hearing of the House Select Intelligence Committee, Subject: “Terrorist Use of the Internet for Communications.” Federal News Service. 4 May 2006. Welch, Kathleen E. Electric Rhetoric: Classical Rhetoric, Oralism, and the New Literacy. Cambridge, MA: MIT Press, 1999. Citation reference for this article MLA Style Losh, Elizabeth. "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/08-losh.php>. APA Style Losh, E. (Oct. 2007) "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/08-losh.php>.

32

Wagman, Ira. "Wasteaminute.com: Notes on Office Work and Digital Distraction." M/C Journal 13, no.4 (August18, 2010). http://dx.doi.org/10.5204/mcj.243.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

For those seeking a diversion from the drudgery of work there are a number of websites offering to take you away. Consider the case of wasteaminute.com. On the site there is everything from flash video games, soft-core p*rnography and animated nudity, to puzzles and parlour games like poker. In addition, the site offers links to video clips grouped in categories such as “funny,” “accidents,” or “strange.” With its bright yellow bubble letters and elementary design, wasteaminute will never win any Webby awards. It is also unlikely to be part of a lucrative initial public offering for its owner, a web marketing company based in Lexington, Kentucky. The internet ratings company Alexa gives wasteaminute a ranking of 5,880,401 when it comes to the most popular sites online over the last three months, quite some way behind sites like Wikipedia, Facebook, and Windows Live.Wasteaminute is not unique. There exists a group of websites, a micro-genre of sorts, that go out of their way to offer momentary escape from the more serious work at hand, with a similar menu of offerings. These include sites with names such as ishouldbeworking.com, i-am-bored.com, boredatwork.com, and drivenbyboredom.com. These web destinations represent only the most overtly named time-wasting opportunities. Video sharing sites like YouTube or France’s DailyMotion, personalised home pages like iGoogle, and the range of applications available on mobile devices offer similar opportunities for escape. Wasteaminute inspired me to think about the relationship between digital media technologies and waste. In one sense, the site’s offerings remind us of the Internet’s capacity to re-purpose old media forms from earlier phases in the digital revolution, like the retro video game PacMan, or from aspects of print culture, like crosswords (Bolter and Grusin; Straw). For my purposes, though, wasteaminute permits the opportunity to meditate, albeit briefly, on the ways media facilitate wasting time at work, particularly for those working in white- and no-collar work environments. In contemporary work environments work activity and wasteful activity exist on the same platform. With a click of a mouse or a keyboard shortcut, work and diversion can be easily interchanged on the screen, an experience of computing I know intimately from first-hand experience. The blurring of lines between work and waste has accompanied the extension of the ‘working day,’ a concept once tethered to the standardised work-week associated with modernity. Now people working in a range of professions take work out of the office and find themselves working in cafes, on public transportation, and at times once reserved for leisure, like weekends (Basso). In response to the indeterminate nature of when and where we are at work, the mainstream media routinely report about the wasteful use of computer technology for non-work purposes. Stories such as a recent one in the Washington Post which claimed that increased employee use of social media sites like Facebook and Twitter led to decreased productivity at work have become quite common in traditional media outlets (Casciato). Media technologies have always offered the prospect of making office work more efficient or the means for management to exercise control over employees. However, those same technologies have also served as the platforms on which one can engage in dilatory acts, stealing time from behind the boss’s back. I suggest stealing time at work may well be a “tactic,” in the sense used by Michel de Certeau, as a means to resist the rules and regulations that structure work and the working life. However, I also consider it to be a tactic in a different sense: websites and other digital applications offer users the means to take time back, in the form of ‘quick hits,’ providing immediate visual or narrative pleasures, or through interfaces which make the time-wasting look like work (Wagman). Reading sites like wasteaminute as examples of ‘office entertainment,’ reminds us of the importance of workers as audiences for web content. An analysis of a few case studies also reveals how the forms of address of these sites themselves recognise and capitalise on an understanding of the rhythms of the working day, as well as those elements of contemporary office culture characterised by interruption, monotony and surveillance. Work, Media, Waste A mass of literature documents the transformations of work brought on by industrialisation and urbanisation. A recent biography of Franz Kafka outlines the rigors imposed upon the writer while working as an insurance agent: his first contract stipulated that “no employee has the right to keep any objects other than those belonging to the office under lock in the desk and files assigned for its use” (Murray 66). Siegfried Kracauer’s collection of writings on salaried workers in Germany in the 1930s argues that mass entertainment offers distractions that inhibit social change. Such restrictions and inducements are exemplary of the attempts to make work succumb to managerial regimes which are intended to maximise productivity and minimise waste, and to establish a division between ‘company time’ and ‘free time’. One does not have to be an industrial sociologist to know the efforts of Frederick W. Taylor, and the disciplines of “scientific management” in the early twentieth century which were based on the idea of making work more efficient, or of the workplace sociology scholarship from the 1950s that drew attention to the ways that office work can be monotonous or de-personalising (Friedmann; Mills; Whyte). Historian JoAnne Yates has documented the ways those transformations, and what she calls an accompanying “philosophy of system and efficiency,” have been made possible through information and communication technologies, from the typewriter to carbon paper (107). Yates evokes the work of James Carey in identifying these developments, for example, the locating of workers in orderly locations such as offices, as spatial in nature. The changing meaning of work, particularly white-collar or bureaucratic labour in an age of precarious employment and neo-liberal economic regimes, and aggressive administrative “auditing technologies,” has subjected employees to more strenuous regimes of surveillance to ensure employee compliance and to protect against waste of company resources (Power). As Andrew Ross notes, after a deep period of self-criticism over the drudgery of work in North American settings in the 1960s, the subsequent years saw a re-thinking of the meaning of work, one that gradually traded greater work flexibility and self-management for more assertive forms of workplace control (9). As Ross notes, this too has changed, an after-effect of “the shareholder revolution,” which forced companies to deliver short-term profitability to its investors at any social cost. With so much at stake, Ross explains, the freedom of employees assumed a lower priority within corporate cultures, and “the introduction of information technologies in the workplace of the new capitalism resulted in the intensified surveillance of employees” (12). Others, like Dale Bradley, have drawn attention to the ways that the design of the office itself has always concerned itself with the bureaucratic and disciplinary control of bodies in space (77). The move away from physical workspaces such as ‘the pen’ to the cubicle and now from the cubicle to the virtual office is for Bradley a move from “construction” to “connection.” This spatial shift in the way in which control over employees is exercised is symbolic of the liquid forms in which bodies are now “integrated with flows of money, culture, knowledge, and power” in the post-industrial global economies of the twenty-first century. As Christena Nippert-Eng points out, receiving office space was seen as a marker of trust, since it provided employees with a sense of privacy to carry out affairs—both of a professional or of a personal matter—out of earshot of others. Privacy means a lot of things, she points out, including “a relative lack of accountability for our immediate whereabouts and actions” (163). Yet those same modalities of control which characterise communication technologies in workspaces may also serve as the platforms for people to waste time while working. In other words, wasteful practices utilize the same technology that is used to regulate and manage time spent in the workplace. The telephone has permitted efficient communication between units in an office building or between the office and outside, but ‘personal business’ can also be conducted on the same line. Radio stations offer ‘easy listening’ formats, providing unobtrusive music so as not to disturb work settings. However, they can easily be tuned to other stations for breaking news, live sports events, or other matters having to do with the outside world. Photocopiers and fax machines facilitate the reproduction and dissemination of communication regardless of whether it is it work or non-work related. The same, of course, is true for computerised applications. Companies may encourage their employees to use Facebook or Twitter to reach out to potential clients or customers, but those same applications may be used for personal social networking as well. Since the activities of work and play can now be found on the same platform, employers routinely remind their employees that their surfing activities, along with their e-mails and company documents, will be recorded on the company server, itself subject to auditing and review whenever the company sees fit. Employees must be careful to practice image management, in order to ensure that contradictory evidence does not appear online when they call in sick to the office. Over time the dynamics of e-mail and Internet etiquette have changed in response to such developments. Those most aware of the distractive and professionally destructive features of downloading a funny or comedic e-mail attachment have come to adopt the acronym “NSFW” (Not Safe for Work). Even those of us who don’t worry about those things are well aware that the cache and “history” function of web browsers threaten to reveal the extent to which our time online is spent in unproductive ways. Many companies and public institutions, for example libraries, have taken things one step further by filtering out access to websites that may be peripheral to the primary work at hand.At the same time contemporary workplace settings have sought to mix both work and play, or better yet to use play in the service of work, to make “work” more enjoyable for its workers. Professional development seminars, team-building exercises, company softball games, or group outings are examples intended to build morale and loyalty to the company among workers. Some companies offer their employees access to gyms, to game rooms, and to big screen TVs, in return for long and arduous—indeed, punishing—hours of time at the office (Dyer-Witheford and Sherman; Ross). In this manner, acts of not working are reconfigured as a form of work, or at least as a productive experience for the company at large. Such perks are offered with an assumption of personal self-discipline, a feature of what Nippert-Eng characterises as the “discretionary workplace” (154). Of course, this also comes with an expectation that workers will stay close to the office, and to their work. As Sarah Sharma recently argued in this journal, such thinking is part of the way that late capitalism constructs “innovative ways to control people’s time and regulate their movement in space.” At the same time, however, there are plenty of moments of gentle resistance, in which the same machines of control and depersonalisation can be customised, and where individual expressions find their own platforms. A photo essay by Anna McCarthy in the Journal of Visual Culture records the inspirational messages and other personalised objects with which workers adorn their computers and work stations. McCarthy’s photographs represent the way people express themselves in relation to their work, making it a “place where workplace politics and power relations play out, often quite visibly” (McCarthy 214). Screen SecretsIf McCarthy’s photo essay illustrates the overt ways in which people bring personal expression or gentle resistance to anodyne workplaces, there are also a series of other ‘screen acts’ that create opportunities to waste time in ways that are disguised as work. During the Olympics and US college basketball playoffs, both American broadcast networks CBS and NBC offered a “boss button,” a graphic link that a user could immediately click “if the boss was coming by” that transformed the screen to something was associated with the culture of work, such as a spreadsheet. Other purveyors of networked time-wasting make use of the spreadsheet to mask distraction. The website cantyouseeimbored turns a spreadsheet into a game of “Breakout!” while other sites, like Spreadtweet, convert your Twitter updates into the form of a spreadsheet. Such boss buttons and screen interfaces that mimic work are the presentday avatars of the “panic button,” a graphic image found at the bottom of websites back in the days of Web 1.0. A click of the panic button transported users away from an offending website and towards something more legitimate, like Yahoo! Even if it is unlikely that boss keys actually convince one’s superiors that one is really working—clicking to a spreadsheet only makes sense for a worker who might be expected to be working on those kinds of documents—they are an index of how notions of personal space and privacy play out in the digitalised workplace. David Kiely, an employee at an Australian investment bank, experienced this first hand when he opened an e-mail attachment sent to him by his co-workers featuring a scantily-clad model (Cuneo and Barrett). Unfortunately for Kiely, at the time he opened the attachment his computer screen was visible in the background of a network television interview with another of the bank’s employees. Kiely’s inauspicious click (which made his the subject of an investigation by his employees) continues to circulate on the Internet, and it spawned a number of articles highlighting the precarious nature of work in a digitalised environment where what might seem to be private can suddenly become very public, and thus able to be disseminated without restraint. At the same time, the public appetite for Kiely’s story indicates that not working at work, and using the Internet to do it, represents a mode of media consumption that is familiar to many of us, even if it is only the servers on the company computer that can account for how much time we spend doing it. Community attitudes towards time spent unproductively online reminds us that waste carries with it a range of negative signifiers. We talk about wasting time in terms of theft, “stealing time,” or even more dramatically as “killing time.” The popular construction of television as the “boob tube” distinguishes it from more ‘productive’ activities, like spending time with family, or exercise, or involvement in one’s community. The message is simple: life is too short to be “wasted” on such ephemera. If this kind of language is less familiar in the digital age, the discourse of ‘distraction’ is more prevalent. Yet, instead of judging distraction a negative symptom of the digital age, perhaps we should reinterpret wasting time as the worker’s attempt to assert some agency in an increasingly controlled workplace. ReferencesBasso, Pietro. Modern Times, Ancient Hours: Working Lives in the Twenty-First Century. London: Verso, 2003. Bolter, Jay David, and Richard Grusin. Remediation: Understanding New Media. Cambridge: MIT Press, 2000.Bradley, Dale. “Dimensions Vary: Technology, Space, and Power in the 20th Century Office”. Topia 11 (2004): 67-82.Casciato, Paul. “Facebook and Other Social Media Cost UK Billions”. Washington Post, 5 Aug. 2010. 11 Aug. 2010 ‹http://www.washingtonpost.com/wp-dyn/content/article/2010/08/05/AR2010080503951.html›.Cuneo, Clementine, and David Barrett. “Was Banker Set Up Over Saucy Miranda”. The Daily Telegraph 4 Feb. 2010. 21 May 2010 ‹http://www.dailytelegraph.com.au/entertainment/sydney-confidential/was-banker-set-up-over-saucy-miranda/story-e6frewz0-1225826576571›.De Certeau, Michel. The Practice of Everyday Life. Vol. 1. Berkeley: U of California P. 1988.Dyer-Witheford, Nick, and Zena Sharman. "The Political Economy of Canada's Video and Computer Game Industry”. Canadian Journal of Communication 30.2 (2005). 1 May 2010 ‹http://www.cjc-online.ca/index.php/journal/article/view/1575/1728›.Friedmann, Georges. Industrial Society. Glencoe, Ill.: Free Press, 1955.Kracauer, Siegfried. The Salaried Masses. London: Verso, 1998.McCarthy, Anna. Ambient Television. Durham: Duke UP, 2001. ———. “Geekospheres: Visual Culture and Material Culture at Work”. Journal of Visual Culture 3 (2004): 213-21.Mills, C. Wright. White Collar. Oxford: Oxford UP, 1951. Murray, Nicholas. Kafka: A Biography. New Haven: Yale UP, 2004.Newman, Michael. “Ze Frank and the Poetics of Web Video”. First Monday 13.5 (2008). 1 Aug. 2010 ‹http://www.uic.edu/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/2102/1962›.Nippert-Eng, Christena. Home and Work: Negotiating Boundaries through Everyday Life. Chicago: U. of Chicago P, 1996.Power, Michael. The Audit Society. Oxford: Oxford UP, 1997. Ross, Andrew. No Collar: The Humane Workplace and Its Hidden Costs. Philadelphia: Temple UP, 2004. Sharma, Sarah. “The Great American Staycation and the Risk of Stillness”. M/C Journal 12.1 (2009). 11 May 2010 ‹http://journal.media-culture.org.au/index.php/mcjournal/article/viewArticle/122›. Straw, Will. “Embedded Memories”. Residual Media Ed. Charles Acland. U. of Minnesota P., 2007. 3-15.Whyte, William. The Organisation Man. New York: Simon and Schuster, 1957. Wagman, Ira. “Log On, Goof Off, Look Up: Facebook and the Rhythms of Canadian Internet Use”. How Canadians Communicate III: Contexts for Popular Culture. Eds. Bart Beaty, Derek, Gloria Filax Briton, and Rebecca Sullivan. Athabasca: Athabasca UP 2009. 55-77. ‹http://www2.carleton.ca/jc/ccms/wp-content/ccms-files/02_Beaty_et_al-How_Canadians_Communicate.pdf›Yates, JoAnne. “Business Use of Information Technology during the Industrial Age”. A Nation Transformed by Information. Eds. Alfred D. Chandler & James W. Cortada. Oxford: Oxford UP., 2000. 107-36.

33

Carroll, Richard. "The Trouble with History and Fiction." M/C Journal 14, no.3 (May20, 2011). http://dx.doi.org/10.5204/mcj.372.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Historical fiction, a widely-read genre, continues to engender contradiction and controversy within the fields of literature and historiography. This paper begins with a discussion of the differences and similarities between historical writing and the historical novel, focusing on the way these forms interpret and represent the past. It then examines the dilemma facing historians as they try to come to terms with the modern era and the growing competition from other modes of presenting history. Finally, it considers claims by Australian historians that so-called “fictive history” has been bestowed with historical authority to the detriment of traditional historiography. The Fact/Fiction Dichotomy Hayden White, a leading critic in the field of historiography, claims that the surge in popularity of historical fiction and the novel form in the nineteenth century caused historians to seek recognition of their field as a serious “science” (149). Historians believed that, to be scientific, historical studies had to cut ties with any form of artistic writing or imaginative literature, especially the romantic novel. German historian Leopold von Ranke “anathematized” the historical novel virtually from its first appearance in Scott’s Waverley in 1814. Hayden White argues that Ranke and others after him wrote history as narrative while eschewing the use of imagination and invention that were “exiled into the domain of ‘fiction’ ” (149-150). Early critics in the nineteenth century questioned the value of historical fiction. Famous Cuban poet Jose Maria Heredia believed that history was opposite and superior to fiction; he accused the historical novel of degrading history to the level of fiction which, he argued, is lies (cited in de Piérola 152). Alessandro Manzoni, though partially agreeing with Heredia, argued that fiction had value in its “poetic truth” as opposed to the “positive truth” of history (153). He eventually decided that the historical novel fails through the mixing of the incompatible elements of history and fiction, which can lead to deception (ibid). More than a hundred years after Heredia, Georg Lukács, in his much-cited The Historical Novel, first published in 1937, was more concerned with the social aspect of the historical novel and its capacity to portray the lives of its protagonists. This form of writing, through its attention to the detail of minor events, was better at highlighting the social aspects than the greater moments of history. Lukács argues that the historical novel should focus on the “poetic awakening” of those who participated in great historical events rather than the events themselves (42). The reader should be able to experience first-hand “the social and human motives which led men to think, feel and act just as they did in historical reality” (ibid). Through historical fiction, the reader is thus able to gain a greater understanding of a specific period and why people acted as they did. In contrast to these early critics, historian and author of three books on history and three novels, Richard Slotkin, argues that the historical novel can recount the past as accurately as history, because it should involve similar research methods and critical interpretation of the data (225). Kent den Heyer and Alexandra Fidyk go even further, suggesting that “historical fiction may offer a more plausible representation of the past than those sources typically accepted as more factual” (144). In its search for “poetic truth,” the novel tries to create a sense of what the past was, without necessarily adhering to all the factual details and by eliminating facts not essential to the story (Slotkin 225). For Hayden White, the difference between factual and fictional discourse, is that one is occupied by what is “true” and the other by what is “real” (147). Historical documents may provide a basis for a “true account of the world” in a certain time and place, but they are limited in their capacity to act as a foundation for the exploration of all aspects of “reality.” In White’s words: The rest of the real, after we have said what we can assert to be true about it, would not be everything and anything we could imagine about it. The real would consist of everything that can be truthfully said about its actuality plus everything that can be truthfully said about what it could possibly be. (ibid) White’s main point is that both history and fiction are interpretative by nature. Historians, for their part, interpret given evidence from a subjective viewpoint; this means that it cannot be unbiased. In the words of Beverley Southgate, “factual history is revealed as subjectively chosen, subjectively interpreted, subjectively constructed and incorporated within a narrative” (45). Both fiction and history are narratives, and “anyone who writes a narrative is fictionalising,” according to Keith Jenkins (cited in Southgate 32). The novelist and historian find meaning through their own interpretation of the known record (Brown) to produce stories that are entertaining and structured. Moreover, historians often reach conflicting conclusions in their translations of the same archival documents, which, in the extreme, can spark a wider dispute such as the so-called history wars, the debate about the representation of the Indigenous peoples in Australian history that has polarised both historians and politicians. The historian’s purpose differs from that of the novelist. Historians examine the historical record in fine detail in an attempt to understand its complexities, and then use digressions and footnotes to explain and lend authority to their findings. The novelist on the other hand, uses their imagination to create personalities and plot and can leave out important details; the novelist achieves authenticity through detailed description of setting, customs, culture, buildings and so on (Brown). Nevertheless, the main task of both history and historical fiction is to represent the past to a reader in the present; this “shared concern with the construction of meaning through narrative” is a major component in the long-lasting, close relationship between fiction and history (Southgate 19). However, unlike history, the historical novel mixes fiction and fact, and is therefore “a hybrid of two genres” (de Piérola 152); this mixture of supposed opposites of fact and fiction creates a dilemma for the theorist, because historical fiction cannot necessarily be read as belonging to either category. Attitudes towards the line drawn between fiction and history are changing as more and more critics and theorists explore the area where the two genres intersect. Historian John Demos argues that with the passing of time, this distinction “seems less a boundary than a borderland of surprising width and variegated topography” (329). While some historians are now willing to investigate the wide area where the two genres overlap, this approach remains a concern for traditionalists. History’s Dilemma Historians face a crisis as they try to come to terms with the postmodern era which has seen unprecedented questioning of the validity of history’s claim to accuracy in recounting the past. In the words of Jenkins et al., “ ‘history’ per se wobbles” as it experiences a period of uncertainty and challenge; the field is “much changed and deeply contested,” as historians seek to understand the meaning of history itself (6). But is postmodernism the cause of the problem? Writing in 1986 Linda Hutcheon, well known for her work on postmodernism, attempted to clarify the term as it is applied in modern times in reference to fiction, where, she states, it is usually taken to mean “metafiction, or texts which are in some dominant and constitutive way self-referential and auto-representational” (301). To eliminate any confusion with regard to concept or terminology, Hutcheon coined the phrase “historiographic metafiction," which includes “the presence of the past” in “historical, social, and ideological” form (302). As examples, she cites contemporary novels The French Lieutenant’s Woman, The White Hotel, Midnight’s Children and Famous Last Words. Hutcheon explains that all these works “self-consciously focus on the processes of producing and receiving paradoxically fictive historical writing” (ibid). In the Australian context, Peter Carey’s True History of the Kelly Gang and Richard Flanagan’s Gould’s Book of Fish could be added to the list. Like the others, they question how historical sources maintain their status as authentic historical documents in the context of a fictional work (302). However, White argues that the crisis in historical studies is not due to postmodernism but has materialised because historians have failed to live up to their nineteenth century expectations of history being recognised as a science (149). Postmodernists are not against history, White avows; what they do not accept “is a professional historiography” that serves self-seeking governing bodies with its outdated and severely limited approach to objectivity (152). This kind of historiography has denied itself access to aesthetic writing and the imaginary, while it has also cut any links it had “to what was most creative in the real sciences it sought half-heartedly to emulate” (ibid). Furthering White’s argument, historian Robert Rosenstone states that past certitude in the claims of historians to be the sole guardians of historical truth now seem outdated in the light of our accumulated knowledge. The once impregnable position of the historian is no longer tenable because: We know too much about framing images and stories, too much about narrative, too much about the problematics of causality, too much about the subjectivity of perception, too much about our own cultural imperatives and biases, too much about the disjuncture between language and the world it purports to describe to believe we can actually capture the world of the past on the page. (Rosenstone 12) While the archive confers credibility on history, it does not confer the right to historians to claim it as the truth (Southgate 6); there are many possible versions of the past, which can be presented to us in any number of ways as history (Jenkins et al. 1). And this is a major challenge for historians as other modes of representing the past cater to public demand in place of traditional approaches. Public interest in history has grown over the last 20 years (Harlan 109). Historical novels fill the shelves of bookstores and libraries, while films, television series and documentaries about the past attract large audiences. In the words of Rosenstone, “people are hungry for the past, as various studies tell us and the responses to certain films, TV series and museums indicate” (17). Rosenstone laments the fact that historians, despite this attraction to the past, have failed to stir public interest in their own writings. While works of history have their strengths, they target a specific, extremely limited audience in an outdated format (17). They have forgotten the fact that, in the words of White, “the conjuring up of the past requires art as well as information” (149). This may be true of some historians, but there are many writers of non-fiction, including historians, who use the narrative voice and other fictional techniques in their writings (Ricketson). Matthew Ricketson accuses White of confusing “fiction with literariness,” while other scholars take fiction and narrative to be the same thing. He argues that “the use of a wide range of modes of writing usually associated with fiction are not the sole province of fiction” and that narrative theorists have concentrated their attention on fictional narrative, thereby excluding factual forms of writing (ibid). One of the defining elements of creative non-fiction is its use of literary techniques in writing about factual events and people. At the same time, this does not make it fiction, which by definition, relies on invention (ibid). However, those historians who do write outside the limits of traditional history can attract criticism. Historian Richard Current argues that if writers of history and biography try to be more effective through literary considerations, they sometimes lose their objectivity and authenticity. While it is acceptable to seek to write with clarity and force, it is out of the question to present “occasional scenes in lifelike detail” in the manner of a novelist. Current contends that if only one source is used, this violates “the historiographical requirement of two or more independent and competent witnesses.” This requirement is important because it explains why much of the writing by academic historians is perceived as “dry-as-dust” (Current 87). Modern-day historians are contesting this viewpoint as they analyse the nature and role of their writings, with some turning to historical fiction as an alternative mode of expression. Perhaps one of the more well-known cases in recent times was that of historian Simon Schama, who, in writing Dead Certainties (Unwarranted Speculations), was criticised for creating dramatic scenes based on dubious historical sources without informing the reader of his fabrications (Nelson). In this work, Schama questions notions of factual history and the limitations of historians. The title is suggestive in itself, while the afterword to the book is explicit, as “historians are left forever chasing shadows, painfully aware of their inability ever to reconstruct a dead world in its completeness however thorough or revealing their documentation . . . We are doomed to be forever hailing someone who has just gone around the corner and out of earshot” (320). Another example is Rosenstone’s Mirror in the Shrine, which was considered to be “postmodern” and not acceptable to publishers and agents as the correct way to present history, despite the author’s reassurance that nothing was invented, “it just tells the story a different way” ("Space for the Birds to Fly" 16). Schama is not the only author to draw fire from critics for neglecting to inform the reader of the veracity or not of their writing. Richard Current accused Gore Vidal of getting his facts wrong and of inaccurately portraying Lincoln in his work, Lincoln: A Novel (81). Despite the title, which is a form of disclaimer itself, Current argued that Vidal could have avoided criticism if he had not asserted that his work was authentic history, or had used a disclaimer in a preface to deny any connection between the novel’s characters and known persons (82). Current is concerned about this form of writing, known as “fictional history," which, unlike historical fiction, “pretends to deal with real persons and events but actually reshapes them—and thus rewrites the past” (77). This concern is shared by historians in Australia. Fictive History Historian Mark McKenna, in his essay, Writing the Past, argues that “fictive history” has become a new trend in Australia; he is unhappy with the historical authority bestowed on this form of writing and would like to see history restored to its rightful place. He argues that with the decline of academic history, novelists have taken over the historian’s role and fiction has become history (3). In sympathy with McKenna, author, historian and anthropologist Inga Clendinnen claims that “novelists have been doing their best to bump historians off the track” (16). McKenna accuses writers W.G. Sebald and David Malouf of supporting “the core myth of historical fiction: the belief that being there is what makes historical understanding possible.” Malouf argues, in a conversation with Helen Daniel in 1996, that: Our only way of grasping our history—and by history I really mean what has happened to us, and what determines what we are now and where we are now—the only way of really coming to terms with that is by people's entering into it in their imagination, not by the world of facts, but by being there. And the only thing really which puts you there in that kind of way is fiction. Poetry may do so, drama may do so, but it's mostly going to be fiction. It's when you have actually been there and become a character again in that world. (3) From this point of view, the historical novel plays an important role in our culture because it allows people to interact with the past in a meaningful way, something factual writing struggles to do. McKenna recognises that history is present in fiction and that history can contain fiction, but they should not be confused. Writers and critics have a responsibility towards their readers and must be clear that fiction is not history and should not be presented as such (10). He takes writer Kate Grenville to task for not respecting this difference. McKenna argues that Grenville has asserted in public that her historical novel The Secret River is history: “If ever there was a case of a novelist wanting her work to be taken seriously as history, it is Grenville” (5). The Secret River tells the story of early settlement along the Hawkesbury River in New South Wales. Grenville’s inspiration for the story emanated from her ancestor Solomon Wiseman’s life. The main protagonist, William Thornhill (loosely based on Wiseman), is convicted of theft in 1806 and transported to Australia. The novel depicts the poverty and despair in England at the time, and describes life in the new colony where Grenville explores the collision between the colonists and the Aborigines. McKenna knows that Grenville insists elsewhere that her book is not history, but he argues that this conflicts with what she said in interviews and he worries that “with such comments, it is little wonder that many people might begin to read fiction as history” (5). In an article on her website, Grenville refutes McKenna’s arguments, and those of Clendinnen: “Here it is in plain words: I don’t think The Secret River is history…Nor did I ever say that I thought my novel was history.” Furthermore, the acknowledgements in the back of the book state clearly that it is a work of fiction. She accuses the two above-mentioned historians of using quotes that “have been narrowly selected, taken out of context, and truncated” ("History and Fiction"). McKenna then goes on to say how shocked he was on hearing Grenville, in an interview with Ramona Koval on Radio National, make her now infamous comments about standing on a stepladder looking down at the history wars, and that he “felt like ringing the ABC and leaping to the defence of historians.” He accuses Grenville of elevating fiction above history as an “interpretive power” (6). Koval asked Grenville where her book stood in regard to the history wars; she answered: Mine would be up on a ladder, looking down at the history wars. . . I think the historians, and rightly so, have battled away about the details of exactly when and where and how many and how much, and they’ve got themselves into these polarised positions, and that’s fine, I think that’s what historians ought to be doing; constantly questioning the evidence and perhaps even each other. But a novelist can stand up on a stepladder and look down at this, outside the fray, [emphasis in original audio] and say there is another way to understand it. ("Interview") Grenville claims that she did not use the stepladder image to imply that her work was superior to history, but rather to convey a sense of being outside the battle raging between historians as an uninvolved observer, “an interested onlooker who made the mistake of climbing a stepladder rather than a couple of fruit-boxes to get a good view.” She goes on to argue that McKenna’s only sources in his essay, Writing the Past, are interviews and newspaper articles, which in themselves are fine, but she disagrees with how they have been used “uncritically, at face value, as authoritative evidence” ("History and Fiction"), much in contrast to the historian’s desire for authenticity in all sources. It appears that the troubles between history and fiction will continue for some time yet as traditional historians are bent on keeping faith with the tenets of their nineteenth century predecessors by defending history from the insurgence of fiction at all costs. While history and historical fiction share a common purpose in presenting the past, the novel deals with what is “real” and can tell the past as accurately or even in a more plausible way than history, which deals with what is “true”. However, the “dry-as-dust” historical approach to writing, and postmodernism’s questioning of historiography’s role in presenting the past, has contributed to a reassessment of the nature of history. Many historians recognise the need for change in the way they present their work, but as they have often doubted the worth of historical fiction, they are wary of the genre and the narrative techniques it employs. Those historians who do make an attempt to write differently have often been criticised by traditionalists. In Australia, historians such as McKenna and Clendinnen are worried by the incursion of historical fiction into their territory and are highly critical of novelists who claim their works are history. The overall picture that emerges is of two fields that are still struggling to clarify a number of core issues concerning the nature of both the historical novel and historiographical writing, and the role they play in portraying the past. References Brown, Joanne. "Historical Fiction or Fictionalized History? Problems for Writers of Historical Novels for Young Adults." ALAN Review 26.1 (1998). 1 March 2010 ‹http://scholar.lib.vt.edu/ejournals/ALAN/fall98/brown.html›. Carey, Peter. True History of the Kelly Gang. St Lucia, Qld: U of Queensland P, 2000. Clendinnen, Inga. "The History Question: Who Owns the Past?" Quarterly Essay 23 (2006): 1-72. Current, Richard. "Fiction as History: A Review Essay." Journal of Southern History 52.1 (1986): 77-90. De Piérola, José. "At the Edge of History: Notes for a Theory for the Historical Novel in Latin America." Romance Studies 26.2 (2008): 151-62. Demos, John. "Afterword: Notes from, and About, the History/Fiction Borderland." Rethinking History 9.2/3 (2005): 329-35. Den Heyer, Kent, and Alexandra Fidyk. "Configuring Historical Facts through Historical Fiction: Agency, Art-in-Fact, and Imagination as Stepping Stones between Then and Now." Educational Theory 57.2 (2007): 141-57. Flanagan, Richard. Gould’s Book of Fish: A Novel in Twelve Fish. Sydney: Picador, 2002. Grenville, Kate. “History and Fiction.” 2007. 19 July 2010 ‹http://kategrenville.com/The_Secret_River_History%20and%20Fiction›. ———. “Interview with Ramona Koval.” 17 July 2005. 26 July 2010 ‹http://www.abc.net.au/rn/arts/bwriting/stories/s1414510.htm›. ———. The Secret River. Melbourne: Text Publishing, 2006. Harlan, David. “Historical Fiction and the Future of Academic History.” Manifestos for History. Ed. Keith Jenkins, Sue Morgan and Alun Munslow. Abingdon, Oxon; N.Y.: Routledge, 2007. Hutcheon, Linda. A Poetics of Postmodernism: History, Theory Fiction. New York: Routledge, 1988. Jenkins, Keith, Sue Morgan, and Alun Munslow. Manifestos for History. Abingdon, Oxon; N.Y.: Routledge, 2007. Lukács, György. The Historical Novel. Lincoln: University of Nebraska Press, 1983. Malouf, David. "Interview with Helen Daniel." Australian Humanities Review (Sep. 1996). McKenna, Mark. “Writing the Past: History, Literature & the Public Sphere in Australia.” Australian Financial Review (2005). 13 May 2010 ‹http://www.afraccess.com.ezp01.library.qut.edu.au/search›. Nelson, Camilla. “Faking It: History and Creative Writing.” TEXT: Journal of Writing and Writing Courses 11.2 (2007). 5 June 2010 ‹http://www.textjournal.com.au›. Ricketson, Matthew. “Not Muddying, Clarifying: Towards Understanding the Boundaries between Fiction and Nonfiction.” TEXT: Journal of Writing and Writing Courses 14.2 (2010). 6 June 2011 ‹http://www.textjournal.com.au/oct10/ricketson.htm›. Rosenstone, Robert A. “Space for the Bird to Fly.” Manifestos for History. Eds. Keith Jenkins, Sue Morgan and Alun Munslow. Abingdon, Oxon; N.Y.: Routledge, 2007. 11-18. ———. Mirror in the Shrine: American Encounters with Meiji Japan. Cambridge: Harvard UP, 1988. Schama, Simon. Dead Certainties: (Unwarranted Speculations). 1st Vintage Books ed. New York: Vintage Books, 1992. Slotkin, Richard. “Fiction for the Purposes of History.” Rethinking History 9.2/3 (2005): 221-36. Southgate, Beverley C. History Meets Fiction. New York: Longman, Harlow, England, 2009. White, Hayden. “Introduction: Historical Fiction, Fictional History, and Historical Reality.” Rethinking History 9.2/3 (2005): 147-57.

34

Murphy, Ffion, and Richard Nile. "The Many Transformations of Albert Facey." M/C Journal 19, no.4 (August31, 2016). http://dx.doi.org/10.5204/mcj.1132.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

In the last months of his life, 86-year-old Albert Facey became a best-selling author and revered cultural figure following the publication of his autobiography, A Fortunate Life. Released on Anzac Day 1981, it was praised for its “plain, unembellished, utterly sincere and un-self-pitying account of the privations of childhood and youth” (Semmler) and “extremely powerful description of Gallipoli” (Dutton 16). Within weeks, critic Nancy Keesing declared it an “Enduring Classic.” Within six months, it was announced as the winner of two prestigious non-fiction awards, with judges acknowledging Facey’s “extraordinary memory” and “ability to describe scenes and characters with great precision” (“NBC” 4). A Fortunate Life also transformed the fortunes of its publisher. Founded in 1976 as an independent, not-for-profit publishing house, Fremantle Arts Centre Press (FACP) might have been expected, given the Australian average, to survive for just a few years. Former managing editor Ray Coffey attributes the Press’s ongoing viability, in no small measure, to Facey’s success (King 29). Along with Wendy Jenkins, Coffey edited Facey’s manuscript through to publication; only five months after its release, with demand outstripping the capabilities, FACP licensed Penguin to take over the book’s production and distribution. Adaptations soon followed. In 1984, Kerry Packer’s PBL launched a prospectus for a mini-series, which raised a record $6.3 million (PBL 7–8). Aired in 1986 with a high-rating documentary called The Facey Phenomenon, the series became the most watched television event of the year (Lucas). Syndication of chapters to national and regional newspapers, stage and radio productions, audio- and e-books, abridged editions for young readers, and inclusion on secondary school curricula extended the range and influence of Facey’s life writing. Recently, an option was taken out for a new television series (Fraser).A hundred reprints and two million readers on from initial publication, A Fortunate Life continues to rate among the most appreciated Australian books of all time. Commenting on a reader survey in 2012, writer and critic Marieke Hardy enthused, “I really loved it [. . .] I felt like I was seeing a part of my country and my country’s history through a very human voice . . .” (First Tuesday Book Club). Registering a transformed reading, Hardy’s reference to Australian “history” is unproblematically juxtaposed with amused delight in an autobiography that invents and embellishes: not believing “half” of what Facey wrote, she insists he was foremost a yarn spinner. While the work’s status as a witness account has become less authoritative over time, it seems appreciation of the author’s imagination and literary skill has increased (Williamson). A Fortunate Life has been read more commonly as an uncomplicated, first-hand account, such that editor Wendy Jenkins felt it necessary to refute as an “utter mirage” that memoir is “transferred to the page by an act of perfect dictation.” Sidonie Smith and Julia Watson argue of life narratives that some “autobiographical claims [. . .] can be verified or discounted by recourse to documentation outside the text. But autobiographical truth is a different matter” (16). With increased access to archives, especially digitised personnel records, historians have asserted that key elements of Facey’s autobiography are incorrect or “fabricated” (Roberts), including his enlistment in 1914 and participation in the Gallipoli Landing on 25 April 1915. We have researched various sources relevant to Facey’s early years and war service, including hard-copy medical and repatriation records released in 2012, and find A Fortunate Life in a range of ways deviates from “documentation outside of the text,” revealing intriguing, layered storytelling. We agree with Smith and Watson that “autobiographical acts” are “anything but simple or transparent” (63). As “symbolic interactions in the world,” they are “culturally and historically specific” and “engaged in an argument about identity” (63). Inevitably, they are also “fractured by the play of meaning” (63). Our approach, therefore, includes textual analysis of Facey’s drafts alongside the published narrative and his medical records. We do not privilege institutional records as impartial but rather interpret them in terms of their hierarchies and organisation of knowledge. This leads us to speculate on alternative readings of A Fortunate Life as an illness narrative that variously resists and subscribes to dominant cultural plots, tropes, and attitudes. Facey set about writing in earnest in the 1970s and generated (at least) three handwritten drafts, along with a typescript based on the third draft. FACP produced its own working copy from the typescript. Our comparison of the drafts offers insights into the production of Facey’s final text and the otherwise “hidden” roles of editors as transformers and enablers (Munro 1). The notion that a working man with basic literacy could produce a highly readable book in part explains Facey’s enduring appeal. His grandson and literary executor, John Rose, observed in early interviews that Facey was a “natural storyteller” who had related details of his life at every opportunity over a period of more than six decades (McLeod). Jenkins points out that Facey belonged to a vivid oral culture within which he “told and retold stories to himself and others,” so that they eventually “rubbed down into the lines and shapes that would so memorably underpin the extended memoir that became A Fortunate Life.” A mystique was thereby established that “time” was Albert Facey’s “first editor” (Jenkins). The publisher expressly aimed to retain Facey’s voice, content, and meaning, though editing included much correcting of grammar and punctuation, eradication of internal inconsistencies and anomalies, and structural reorganisation into six sections and 68 chapters. We find across Facey’s drafts a broadly similar chronology detailing childhood abandonment, life-threatening incidents, youthful resourcefulness, physical prowess, and participation in the Gallipoli Landing. However, there are also shifts and changed details, including varying descriptions of childhood abuse at a place called Cave Rock; the introduction of (incompatible accounts of) interstate boxing tours in drafts two and three which replace shearing activities in Draft One; divergent tales of Facey as a world-standard athlete, league footballer, expert marksman, and powerful swimmer; and changing stories of enlistment and war service (see Murphy and Nile, “Wounded”; “Naked”).Jenkins edited those sections concerned with childhood and youth, while Coffey attended to Facey’s war and post-war life. Drawing on C.E.W. Bean’s official war history, Coffey introduced specificity to the draft’s otherwise vague descriptions of battle and amended errors, such as Facey’s claim to have witnessed Lord Kitchener on the beach at Gallipoli. Importantly, Coffey suggested the now famous title, “A Fortunate Life,” and encouraged the author to alter the ending. When asked to suggest a title, Facey offered “Cave Rock” (Interview)—the site of his violent abuse and humiliation as a boy. Draft One concluded with Facey’s repatriation from the war and marriage in 1916 (106); Draft Two with a brief account of continuing post-war illness and ultimate defeat: “My war injuries caught up with me again” (107). The submitted typescript concludes: “I have often thought that going to War has caused my life to be wasted” (Typescript 206). This ending differs dramatically from the redemptive vision of the published narrative: “I have lived a very good life, it has been very rich and full. I have been very fortunate and I am thrilled by it when I look back” (412).In The Wounded Storyteller, Arthur Frank argues that literary markets exist for stories of “narrative wreckage” (196) that are redeemed by reconciliation, resistance, recovery, or rehabilitation, which is precisely the shape of Facey’s published life story and a source of its popularity. Musing on his post-war experiences in A Fortunate Life, Facey focuses on his ability to transform the material world around him: “I liked the challenge of building up a place from nothing and making a success where another fellow had failed” (409). If Facey’s challenge was building up something from nothing, something he could set to work on and improve, his life-writing might reasonably be regarded as a part of this broader project and desire for transformation, so that editorial interventions helped him realise this purpose. Facey’s narrative was produced within a specific zeitgeist, which historian Joy Damousi notes was signalled by publication in 1974 of Bill Gammage’s influential, multiply-reprinted study of front-line soldiers, The Broken Years, which drew on the letters and diaries of a thousand Great War veterans, and also the release in 1981 of Peter Weir’s film Gallipoli, for which Gammage was the historical advisor. The story of Australia’s war now conceptualised fallen soldiers as “innocent victims” (Damousi 101), while survivors were left to “compose” memories consistent with their sacrifice (Thomson 237–54). Viewing Facey’s drafts reminds us that life narratives are works of imagination, that the past is not fixed and memory is created in the present. Facey’s autobiographical efforts and those of his publisher to improve the work’s intelligibility and relevance together constitute an attempt to “objectify the self—to present it as a knowable object—through a narrative that re-structures [. . .] the self as history and conclusions” (Foster 10). Yet, such histories almost invariably leave “a crucial gap” or “censored chapter.” Dennis Foster argues that conceiving of narration as confession, rather than expression, “allows us to see the pathos of the simultaneous pursuit and evasion of meaning” (10); we believe a significant lacuna in Facey’s life writing is intimated by its various transformations.In a defining episode, A Fortunate Life proposes that Facey was taken from Gallipoli on 19 August 1915 due to wounding that day from a shell blast that caused sandbags to fall on him, crush his leg, and hurt him “badly inside,” and a bullet to the shoulder (348). The typescript, however, includes an additional but narratively irreconcilable date of 28 June for the same wounding. The later date, 19 August, was settled on for publication despite the author’s compelling claim for the earlier one: “I had been blown up by a shell and some 7 or 8 sandbags had fallen on top of me, the day was the 28th of June 1915, how I remembered this date, it was the day my brother Roy had been killed by a shell burst.” He adds: “I was very ill for about six weeks after the incident but never reported it to our Battalion doctor because I was afraid he would send me away” (Typescript 205). This account accords with Facey’s first draft and his medical records but is inconsistent with other parts of the typescript that depict an uninjured Facey taking a leading role in fierce fighting throughout July and August. It appears, furthermore, that Facey was not badly wounded at any time. His war service record indicates that he was removed from Gallipoli due to “heart troubles” (Repatriation), which he also claims in his first draft. Facey’s editors did not have ready access to military files in Canberra, while medical files were not released until 2012. There existed, therefore, virtually no opportunity to corroborate the author’s version of events, while the official war history and the records of the State Library of Western Australia, which were consulted, contain no reference to Facey or his war service (Interview). As a consequence, the editors were almost entirely dependent on narrative logic and clarifications by an author whose eyesight and memory had deteriorated to such an extent he was unable to read his amended text. A Fortunate Life depicts men with “nerve sickness” who were not permitted to “stay at the Front because they would be upsetting to the others, especially those who were inclined that way themselves” (350). By cross referencing the draft manuscripts against medical records, we can now perceive that Facey was regarded as one of those nerve cases. According to Facey’s published account, his wounds “baffled” doctors in Egypt and Fremantle (353). His medical records reveal that in September 1915, while hospitalised in Egypt, his “palpitations” were diagnosed as “Tachycardia” triggered by war-induced neuroses that began on 28 June. This suggests that Facey endured seven weeks in the field in this condition, with the implication being that his debility worsened, resulting in his hospitalisation. A diagnosis of “debility,” “nerves,” and “strain” placed Facey in a medical category of “Special Invalids” (Butler 541). Major A.W. Campbell noted in the Medical Journal of Australia in 1916 that the war was creating “many cases of little understood nervous and mental affections, not only where a definite wound has been received, but in many cases where nothing of the sort appears” (323). Enlisted doctors were either physicians or surgeons and sometimes both. None had any experience of trauma on the scale of the First World War. In 1915, Campbell was one of only two Australian doctors with any pre-war experience of “mental diseases” (Lindstrom 30). On staff at the Australian Base Hospital at Heliopolis throughout the Gallipoli campaign, he claimed that at times nerve cases “almost monopolised” the wards under his charge (319). Bearing out Facey’s description, Campbell also reported that affected men “received no sympathy” and, as “carriers of psychic contagion,” were treated as a “source of danger” to themselves and others (323). Credentialed by royal colleges in London and coming under British command, Australian medical teams followed the practice of classifying men presenting “nervous or mental symptoms” as “battle casualties” only if they had also been wounded by “enemy action” (Loughran 106). By contrast, functional disability, with no accompanying physical wounds, was treated as unmanly and a “hysterical” reaction to the pressures of war. Mental debility was something to be feared in the trenches and diagnosis almost invariably invoked charges of predisposition or malingering (Tyquin 148–49). This shifted responsibility (and blame) from the war to the individual. Even as late as the 1950s, medical notes referred to Facey’s condition as being “constitutional” (Repatriation).Facey’s narrative demonstrates awareness of how harshly sufferers were treated. We believe that he defended himself against this with stories of physical injury that his doctors never fully accepted and that he may have experienced conversion disorder, where irreconcilable experience finds somatic expression. His medical diagnosis in 1915 and later life writing establish a causal link with the explosion and his partial burial on 28 June, consistent with opinion at the time that linked concussive blasts with destabilisation of the nervous system (Eager 422). Facey was also badly shaken by exposure to the violence and abjection of war, including hand-to-hand combat and retrieving for burial shattered and often decomposed bodies, and, in particular, by the death of his brother Roy, whose body was blown to pieces on 28 June. (A second brother, Joseph, was killed by multiple bayonet wounds while Facey was convalescing in Egypt.) Such experiences cast a different light on Facey’s observation of men suffering nerves on board the hospital ship: “I have seen men doze off into a light sleep and suddenly jump up shouting, ‘Here they come! Quick! Thousands of them. We’re doomed!’” (350). Facey had escaped the danger of death by explosion or bayonet but at a cost, and the war haunted him for the rest of his days. On disembarkation at Fremantle on 20 November 1915, he was admitted to hospital where he remained on and off for several months. Forty-one other sick and wounded disembarked with him (HMAT). Around one third, experiencing nerve-related illness, had been sent home for rest; while none returned to the war, some of the physically wounded did (War Service Records). During this time, Facey continued to present with “frequent attacks of palpitation and giddiness,” was often “short winded,” and had “heart trouble” (Repatriation). He was discharged from the army in June 1916 but, his drafts suggest, his war never really ended. He began a new life as a wounded Anzac. His dependent and often fractious relationship with the Repatriation Department ended only with his death 66 years later. Historian Marina Larsson persuasively argues that repatriated sick and wounded servicemen from the First World War represented a displaced presence at home. Many led liminal lives of “disenfranchised grief” (80). Stephen Garton observes a distinctive Australian use of repatriation to describe “all policies involved in returning, discharging, pensioning, assisting and training returned men and women, and continuing to assist them throughout their lives” (74). Its primary definition invokes coming home but to repatriate also implies banishment from a place that is not home, so that Facey was in this sense expelled from Gallipoli and, by extension, excluded from the myth of Anzac. Unlike his two brothers, he would not join history as one of the glorious dead; his name would appear on no roll of honour. Return home is not equivalent to restoration of his prior state and identity, for baggage from the other place perpetually weighs. Furthermore, failure to regain health and independence strains hospitality and gratitude for the soldier’s service to King and country. This might be exacerbated where there is no evident or visible injury, creating suspicion of resistance, cowardice, or malingering. Over 26 assessments between 1916 and 1958, when Facey was granted a full war pension, the Repatriation Department observed him as a “neuropathic personality” exhibiting “paroxysmal tachycardia” and “neurocirculatory asthenia.” In 1954, doctors wrote, “We consider the condition is a real handicap and hindrance to his getting employment.” They noted that after “attacks,” Facey had a “busted depressed feeling,” but continued to find “no underlying myocardial disease” (Repatriation) and no validity in Facey’s claims that he had been seriously physically wounded in the war (though A Fortunate Life suggests a happier outcome, where an independent medical panel finally locates the cause of his ongoing illness—rupture of his spleen in the war—which results in an increased war pension). Facey’s condition was, at times, a source of frustration for the doctors and, we suspect, disappointment and shame to him, though this appeared to reduce on both sides when the Repatriation Department began easing proof of disability from the 1950s (Thomson 287), and the Department of Veteran’s Affairs was created in 1976. This had the effect of shifting public and media scrutiny back onto a system that had until then deprived some “innocent victims of the compensation that was their due” (Garton 249). Such changes anticipated the introduction of Post-Traumatic Shock Disorder (PTSD) to the Diagnostic and Statistical Manual of Mental Disorders (DSM) in 1980. Revisions to the DSM established a “genealogy of trauma” and “panic disorders” (100, 33), so that diagnoses such as “neuropathic personality” (Echterling, Field, and Stewart 192) and “soldier’s heart,” that is, disorders considered “neurotic,” were “retrospectively reinterpreted” as a form of PTSD. However, Alberti points out that, despite such developments, war-related trauma continues to be contested (80). We propose that Albert Facey spent his adult life troubled by a sense of regret and failure because of his removal from Gallipoli and that he attempted to compensate through storytelling, which included his being an original Anzac and seriously wounded in action. By writing, Facey could shore up his rectitude, work ethic, and sense of loyalty to other servicemen, which became necessary, we believe, because repatriation doctors (and probably others) had doubted him. In 1927 and again in 1933, an examining doctor concluded: “The existence of a disability depends entirely on his own unsupported statements” (Repatriation). We argue that Facey’s Gallipoli experiences transformed his life. By his own account, he enlisted for war as a physically robust and supremely athletic young man and returned nine months later to life-long anxiety and ill-health. Publication transformed him into a national sage, earning him, in his final months, the credibility, empathy, and affirmation he had long sought. Exploring different accounts of Facey, in the shape of his drafts and institutional records, gives rise to new interpretations. In this context, we believe it is time for a new edition of A Fortunate Life that recognises it as a complex testimonial narrative and theorises Facey’s deployment of national legends and motifs in relation to his “wounded storytelling” as well as to shifting cultural and medical conceptualisations and treatments of shame and trauma. ReferencesAlberti, Fay Bound. Matters of the Heart: History, Medicine, and Emotions. Oxford: Oxford UP, 2010. Butler, A.G. Official History of the Australian Medical Services 1814-1918: Vol I Gallipoli, Palestine and New Guinea. Canberra: Australian War Memorial, 1930.Campbell, A.W. “Remarks on Some Neuroses and Psychoses in War.” Medical Journal of Australia 15 April (1916): 319–23.Damousi, Joy. “Why Do We Get So Emotional about Anzac.” What’s Wrong with Anzac. Ed. Marilyn Lake and Henry Reynolds. Sydney: UNSWP, 2015. 94–109.Dutton, Geoffrey. “Fremantle Arts Centre Press Publicity.” Australian Book Review May (1981): 16.Eager, R. “War Neuroses Occurring in Cases with a Definitive History of Shell Shock.” British Medical Journal 13 Apr. 1918): 422–25.Echterling, L.G., Thomas A. Field, and Anne L. Stewart. “Evolution of PTSD in the DSM.” Future Directions in Post-Traumatic Stress Disorder: Prevention, Diagnosis, and Treatment. Ed. Marilyn P. Safir and Helene S. Wallach. New York: Springer, 2015. 189–212.Facey, A.B. A Fortunate Life. 1981. Ringwood: Penguin, 2005.———. Drafts 1–3. University of Western Australia, Special Collections.———. Transcript. University of Western Australia, Special Collections.First Tuesday Book Club. ABC Splash. 4 Dec. 2012. <http://splash.abc.net.au/home#!/media/1454096/http&>.Foster, Dennis. Confession and Complicity in Narrative. Cambridge: Cambridge UP, 1987.Frank, Arthur. The Wounded Storyteller. London: U of Chicago P, 1995.Fraser, Jane. “CEO Says.” Fremantle Press. 7 July 2015. <https://www.fremantlepress.com.au/c/news/3747-ceo-says-9>.Garton, Stephen. The Cost of War: Australians Return. Melbourne: Oxford UP, 1994.HMAT Aeneas. “Report of Passengers for the Port of Fremantle from Ports Beyond the Commonwealth.” 20 Nov. 1915. <http://recordsearch.naa.gov.au/SearchNRetrieve/Interface/ViewImage.aspx?B=9870708&S=1>.“Interview with Ray Coffey.” Personal interview. 6 May 2016. Follow-up correspondence. 12 May 2016.Jenkins, Wendy. “Tales from the Backlist: A Fortunate Life Turns 30.” Fremantle Press, 14 April 2011. <https://www.fremantlepress.com.au/c/bookclubs/574-tales-from-the-backlist-a-fortunate-life-turns-30>.Keesing, Nancy. ‘An Enduring Classic.’ Australian Book Review (May 1981). FACP Press Clippings. Fremantle. n. pag.King, Noel. “‘I Can’t Go On … I’ll Go On’: Interview with Ray Coffey, Fremantle Arts Centre Press, 22 Dec. 2004; 24 May 2006.” Westerly 51 (2006): 31–54.Larsson, Marina. “A Disenfranchised Grief: Post War Death and Memorialisation in Australia after the First World War.” Australian Historical Studies 40.1 (2009): 79–95.Lindstrom, Richard. “The Australian Experience of Psychological Casualties in War: 1915-1939.” PhD dissertation. Victoria University, Feb. 1997.Loughran, Tracey. “Shell Shock, Trauma, and the First World War: The Making of a Diagnosis and its Histories.” Journal of the History of Medical and Allied Sciences 67.1 (2012): 99–119.Lucas, Anne. “Curator’s Notes.” A Fortunate Life. Australian Screen. <http://aso.gov.au/titles/tv/a-fortunate-life/notes/>.McLeod, Steve. “My Fortunate Life with Grandad.” Western Magazine Dec. (1983): 8.Munro, Craig. Under Cover: Adventures in the Art of Editing. Brunswick: Scribe, 2015.Murphy, Ffion, and Richard Nile. “The Naked Anzac: Exposure and Concealment in A.B. Facey’s A Fortunate Life.” Southerly 75.3 (2015): 219–37.———. “Wounded Storyteller: Revisiting Albert Facey’s Fortunate Life.” Westerly 60.2 (2015): 87–100.“NBC Book Awards.” Australian Book Review Oct. (1981): 1–4.PBL. Prospectus: A Fortunate Life, the Extraordinary Life of an Ordinary Bloke. 1–8.Repatriation Records. Albert Facey. National Archives of Australia.Roberts, Chris. “Turkish Machine Guns at the Landing.” Wartime: Official Magazine of the Australian War Memorial 50 (2010). <https://www.awm.gov.au/wartime/50/roberts_machinegun/>.Semmler, Clement. “The Way We Were before the Good Life.” Courier Mail 10 Oct. 1981. FACP Press Clippings. Fremantle. n. pag.Smith, Sidonie, and Julia Watson. Reading Autobiography: A Guide for Interpreting Life Narratives. 2001. 2nd ed. U of Minnesota P, 2010.Thomson, Alistair. Anzac Memories: Living with the Legend. 1994. 2nd ed. Melbourne: Monash UP, 2013. Tyquin, Michael. Gallipoli, the Medical War: The Australian Army Services in the Dardanelles Campaign of 1915. Kensington: UNSWP, 1993.War Service Records. National Archives of Australia. <http://recordsearch.naa.gov.au/NameSearch/Interface/NameSearchForm.aspx>.Williamson, Geordie. “A Fortunate Life.” Copyright Agency. <http://readingaustralia.com.au/essays/a-fortunate-life/>.

35

Adey, Peter. "Holding Still: The Private Life of an Air Raid." M/C Journal 12, no.1 (January19, 2009). http://dx.doi.org/10.5204/mcj.112.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

In PilsenTwenty-six Station Road,She climbed to the third floorUp stairs which were all that was leftOf the whole house,She opened her doorFull on to the sky,Stood gaping over the edge.For this was the placeThe world ended.Thenshe locked up carefullylest someone stealSiriusor Aldebaranfrom her kitchen,went back downstairsand settled herselfto waitfor the house to rise againand for her husband to rise from the ashesand for her children’s hands and feet to be stuck back in placeIn the morning they found herstill as stone, sparrows pecking her hands.Five Minutes after the Air Raidby Miroslav Holub(Calder 287) Holding Still Detonation. Affect. During the Second World War, London and other European cities were subjected to the terrors of aerial bombardment, rendered through nightmarish anticipations of the bomber (Gollin 7) and the material storm of the real air-raid. The fall of bombs plagued cities and their citizens with the terrible rain of explosives and incendiary weapons. A volatile landscape was formed as the urban environment was ‘unmade’ and urged into violent motion. Flying projectiles of shrapnel, debris and people; avalanches of collapsing factories and houses; the inhale and exhale of compressed air and firestorms; the scream of the explosion. All these composed an incredibly fluid urban traumatic, as atmospheres fell over the cities that was thick with smoke, dust, and ventilated only by terror (see for instance Sebald 10 and Mendieta’s 3 recent commentary). Vast craters were imprinted onto the charred morphologies of London and Berlin as well as Coventry, Hamburg and Dresden. Just as the punctuations of the bombing saw the psychic as well as the material give way, writers portraying Britain as an ‘volcano island’ (Spaight 5) witnessed eruptive projections – the volleys of the material air-war; the emotional signature of charged and bitter reprisals; pain, anguish and vengeance - counter-strikes of affect. In the midst of all of this molten violence and emotion it seems impossible that a simultaneous sense of quiescence could be at all possible. More than mere physical fixity or geographical stasis, a rather different sort of experience could take place. Preceding, during and following the excessive mobilisation of an air raid, ‘stillness’ was often used to describe certain plateuing stretches of time-space which were slowed and even stopped (Anderson 740). Between the eruptions appeared hollows of calm and even boredom. People’s nervous flinching under the reverberation of high-explosive blasts formed part of what Jordan Crandall might call a ‘bodily-inclination’ position. Slackened and taut feelings condensed around people listening out for the oncoming bomber. People found that they prepared for the dreadful wail of the siren, or relaxed in the aftermath of the attack. In these instances, states of tension and apprehension as well as calm and relief formed though stillness. The peculiar experiences of ‘stillness’ articulated in these events open out, I suggest, distinctive ways-of-being which undo our assumptions of perpetually fluid subjectivities and the primacy of the ‘body in motion’ even within the context of unparalleled movement and uncertainty (see Harrison 423 and also Rose and Wylie 477 for theoretical critique). The sorts of “musics of stillness and silence able to be discovered in a world of movement” (Thrift, Still 50), add to our understandings of the material geographies of war and terror (see for instance Graham 63; Gregory and Pred 3), whilst they gesture towards complex material-affective experiences of bodies and spaces. Stillness in this sense, denotes apprehending and anticipating spaces and events in ways that sees the body enveloped within the movement of the environment around it; bobbing along intensities that course their way through it; positioned towards pasts and futures that make themselves felt, and becoming capable of intense forms of experience and thought. These examples illustrate not a shutting down of the body to an inwardly focused position – albeit composed by complex relations and connections – but bodies finely attuned to their exteriors (see Bissell, Animating 277 and Conradson 33). In this paper I draw from a range of oral and written testimony archived at the Imperial War Museum and the Mass Observation wartime regular reports. Edited publications from these collections were also consulted. Detailing the experience of aerial bombing during the Blitz, particularly on London between September 1940 to May 1941, forms part of a wider project concerning the calculative and affective dimensions of the aeroplane’s relationship with the human body, especially through the spaces it has worked to construct (infrastructures such as airports) and destroy. While appearing extraordinary, the examples I use are actually fairly typical of the patternings of experience and the depth and clarity with which they are told. They could be taken to be representative of the population as a whole or coincidentally similar testimonials. Either way, they are couched within a specific cultural historical context of urgency, threat and unparalleled violence.Anticipations The complex material geographies of an air raid reveal the ecological interdependencies of populations and their often urban environments and metabolisms (Coward 419; Davis 3; Graham 63; Gregory The Colonial 19; Hewitt Place 257). Aerial warfare was an address of populations conceived at the register of their bio-rhythmical and metabolic relationship to their milieu (Adey). The Blitz and the subsequent Allied bombing campaign constituted Churchill’s ‘great experiment’ for governments attempting to assess the damage an air raid could inflict upon a population’s nerves and morale (Brittain 77; Gregory In Another 88). An anxious and uncertain landscape constructed before the war, perpetuated by public officials, commentators and members of parliament, saw background affects (Ngai 5) of urgency creating an atmosphere that pressurised and squeezed the population to prepare for the ‘gathering storm’. Attacks upon the atmosphere itself had been readily predicted in the form of threatening gas attacks ready to poison the medium upon which human and animal life depended (Haldane 111; Sloterdijk 41-57). One of the most talked of moments of the Blitz is not necessarily the action but the times of stillness that preceded it. Before and in-between an air raid stillness appears to describe a state rendered somewhere between the lulls and silences of the action and the warnings and the anticipatory feelings of what might happen. In the awaiting bodies, the materialites of silence could be felt as a kind-of-sound and as an atmospheric sense of imminence. At the onset of the first air-raids sound became a signifier of what was on the way (MO 408). Waiting – as both practice and sensation – imparted considerable inertia that went back and forth through time (Jeffrey 956; Massumi, Parables 3). For Geographer Kenneth Hewitt, sound “told of the coming raiders, the nearness of bombs, the plight of loved ones” (When the 16). The enormous social survey of Mass Observation concluded that “fear seems to be linked above all with noise” (original emphasis). As one report found, “It is the siren or the whistle or the explosion or the drone – these are the things that terrify. Fear seems to come to us most of all through our sense of hearing” (MO 378). Yet the power of the siren came not only from its capacity to propagate sound and to alert, but the warning held in its voice of ‘keeping silent’. “Prefacing in a dire prolepsis the post-apocalyptic event before the event”, as Bishop and Phillips (97) put it, the stillness of silence was incredibly virtual in its affects, disclosing - in its lack of life – the lives that would be later taken. Devastation was expected and rehearsed by civilians. Stillness formed a space and body ready to spring into movement – an ‘imminent mobility’ as John Armitage (204) has described it. Perched on the edge of devastation, space-times were felt through a sense of impending doom. Fatalistic yet composed expectations of a bomb heading straight down pervaded the thoughts and feelings of shelter dwellers (MO 253; MO 217). Waves of sound disrupted fragile tempers as they passed through the waiting bodies in the physical language of tensed muscles and gritted teeth (Gaskin 36). Silence helped form bodies inclined-to-attention, particularly sensitive to aural disturbances and vibrations from all around. Walls, floors and objects carried an urban bass-line of warning (Goodman). Stillness was forged through a body readied in advance of the violence these materialities signified. A calm and composed body was not necessarily an immobile body. Civilians who had prepared for the attacks were ready to snap into action - to dutifully wear their gas-mask or escape to shelter. ‘Backgrounds of expectation’ (Thrift, Still 36) were forged through non-too-subtle procedural and sequential movements which opened-out new modes of thinking and feeling. Folding one’s clothes and placing them on the dresser in-readiness; pillows and sheets prepared for a spell in the shelter, these were some of many orderly examples (IWM 14595). In the event of a gas attack air raid precautions instructions advised how to put on a gas mask (ARPD 90-92),i) Hold the breath. ii) Remove headgear and place between the knees. iii) Lift the flap of the haversack [ …] iv) Bring the face-piece towards the face’[…](v) Breathe out and continue to breathe in a normal manner The rational technologies of drill, dressage and operational research enabled poise in the face of an eventual air-raid. Through this ‘logistical-life’ (Reid 17), thought was directed towards simple tasks by minutely described instructions. Stilled LifeThe end of stillness was usually marked by a reactionary ‘flinch’, ‘start’ or ‘jump’. Such reactionary ‘urgent analogs’ (Ngai 94; Tomkins 96) often occurred as a response to sounds and movements that merely broke the tension rather than accurately mimicking an air raid. These atmospheres were brittle and easily disrupted. Cars back-firing and changing gear were often complained about (MO 371), just as bringing people out of the quiescence of sleep was a common effect of air-raids (Kraftl and Horton 509). Disorientation was usually fostered in this process while people found it very difficult to carry out the most simple of tasks. Putting one’s clothes on or even making their way out of the bedroom door became enormously problematic. Sirens awoke a ‘conditioned reflex’ to take cover (MO 364). Long periods of sleep deprivation brought on considerable fatigue and anxiety. ‘Sleep we Must’ wrote journalist Ritchie Calder (252) noticing the invigorating powers of sleep for both urban morale and the bare existence of survival. For other more traumatized members of the population, psychological studies found that the sustained concentration of shelling caused what was named ‘apathy-retreat’ (Harrisson, Living 65). This extreme form of acquiescence saw especially susceptible and vulnerable civilians suffer an overwhelming urge to sleep and to be cared-for ‘as if chronically ill’ (Janis 90). A class and racial politics of quiescent affect was enacted as several members of the population were believed far more liable to ‘give way’ to defeat and dangerous emotions (Brittain 77; Committee of Imperial Defence).In other cases it was only once an air-raid had started that sleep could be found (MO 253). The boredom of waiting could gather in its intensity deforming bodies with “the doom of depression” (Anderson 749). The stopped time-spaces in advance of a raid could be soaked with so much tension that the commencement of sirens, vibrations and explosions would allow a person overwhelming relief (MO 253). Quoting from a boy recalling his experiences in Hannover during 1943, Hewitt illustrates:I lie in bed. I am afraid. I strain my ears to hear something but still all is quiet. I hardly dare breathe, as if something horrible is knocking at the door, at the windows. Is it the beating of my heart? ... Suddenly there seems relief, the sirens howl into the night ... (Heimatbund Niedersachsen 1953: 185). (Cited in Hewitt, When 16)Once a state of still was lost getting it back required some effort (Bissell, Comfortable 1697). Cautious of preventing mass panic and public hysteria by allowing the body to erupt outwards into dangerous vectors of mobility, the British government’s schooling in the theories of panicology (Orr 12) and contagious affect (Le Bon 17; Tarde 278; Thrift, Intensities 57; Trotter 140), made air raid precautions (ARP) officers, police and civil defence teams enforce ‘stay put’ and ‘hold firm’ orders to protect the population (Jones et al, Civilian Morale 463, Public Panic 63-64; Thomas 16). Such orders were meant to shield against precisely the kinds of volatile bodies they were trying to compel with their own bombing strategies. Reactions to the Blitz were moralised and racialised. Becoming stilled required self-conscious work by a public anxious not to be seen to ‘panic’. This took the form of self-disciplination. People exhausted considerable energy to ‘settle’ themselves down. It required ‘holding’ themselves still and ‘together’ in order to accomplish this state, and to avoid going the same way as the buildings falling apart around them, as some people observed (MO 408). In Britain a cup of tea was often made as a spontaneous response in the event of the conclusion of a raid (Brown 686). As well as destroying bombing created spaces too – making space for stillness (Conradson 33). Many people found that they could recall their experiences in vivid detail, allocating a significant proportion of their memories to the recollection of the self and an awareness of their surroundings (IWM 19103). In this mode of stillness, contemplation did not turn-inwards but unfolded out towards the environment. The material processual movement of the shell-blast literally evacuated all sound and materials from its centre to leave a vacuum of negative pressure. Diaries and oral testimonies stretch out these millisecond events into discernable times and spaces of sensation, thought and the experience of experience (Massumi, Parables 2). Extraordinarily, survivors mention serene feelings of quiet within the eye of the blast (see Mortimer 239); they had, literally, ‘no time to be frightened’ (Crighton-Miller 6150). A shell explosion could create such intensities of stillness that a sudden and distinctive lessening of the person and world are expressed, constituting ‘stilling-slowing diminishments’ (Anderson 744). As if the blast-vacuum had sucked all the animation from their agency, recollections convey passivity and, paradoxically, a much more heightened and contemplative sense of the moment (Bourke 121; Thrift, Still 41). More lucid accounts describe a multitude of thoughts and an attention to minute detail. Alternatively, the enormous peaking of a waking blast subdued all later activities to relative obsolescence. The hurricane of sounds and air appear to overload into the flatness of an extended and calmed instantaneous present.Then the whistling stopped, then a terrific thump as it hit the ground, and everything seem to expand, then contract with deliberation and stillness seemed to be all around. (As recollected by Bill and Vi Reagan in Gaskin 17)On the other hand, as Schivelbusch (7) shows us in his exploration of defeat, the cessation of war could be met with an outburst of feeling. In these micro-moments a close encounter with death was often experienced with elation, a feeling of peace and well-being drawn through a much more heightened sense of the now (MO 253). These are not pre-formed or contemplative techniques of attunement as Thrift has tracked, but are the consequence of significant trauma and the primal reaction to extreme danger.TracesSusan Griffin’s haunting A Chorus of Stones documents what she describes as a private life of war (1). For Griffin, and as shown in these brief examples, stillness and being-stilled describe a series of diverse experiences endured during aerial bombing. Yet, as Griffin narrates, these are not-so private lives. A common representation of air war can be found in Henry Moore’s tube shelter sketches which convey sleeping tube-dwellers harboured in the London underground during the Blitz. The bodies are represented as much more than individuals being connected by Moore’s wave-like shapes into the turbulent aggregation of a choppy ocean. What we see in Moore’s portrayal and the examples discussed already are experiences with definite relations to both inner and outer worlds. They refer to more-than individuals who bear intimate relations to their outsides and the atmospheric and material environments enveloping and searing through them. Stillness was an unlikely state composed through these circulations just as it was formed as a means of address. It was required in order to apprehend sounds and possible events through techniques of listening or waiting. Alternatively being stilled could refer to pauses between air-strikes and the corresponding breaks of tension in the aftermath of a raid. Stillness was composed through a series of distributed yet interconnecting bodies, feelings, materials and atmospheres oriented towards the future and the past. The ruins of bombed-out building forms stand as traces even today. Just as Massumi (Sensing 16) describes in the context of architecture, the now static remainder of the explosion “envelops in its stillness a deformational field of which it stands as the trace”. The ruined forms left after the attack stand as a “monument” of the passing of the raid to be what it once was – house, factory, shop, restaurant, library - and to become something else. The experience of those ‘from below’ (Hewitt 2) suffering contemporary forms of air-warfare share many parallels with those of the Blitz. Air power continues to target, apparently more precisely, the affective tones of the body. Accessed by kinetic and non-kinetic forces, the signs of air-war are generated by the shelling of Kosovo, ‘shock and awe’ in Iraq, air-strikes in Afghanistan and by the simulated air-raids of IDF aircraft producing sonic-booms over sleeping Palestinian civilians, now becoming far more real as I write in the final days of 2008. Achieving stillness in the wake of aerial trauma remains, even now, a way to survive the (private) life of air war. AcknowledgementsI’d like to thank the editors and particularly the referees for such a close reading of the article; time did not permit the attention their suggestions demanded. Grateful acknowledgement is also made to the AHRC whose funding allowed me to research and write this paper. ReferencesAdey, Peter. Aerial Geographies: Mobilities, Bodies and Subjects. Oxford: Wiley-Blackwell, 2010 (forthcoming). Anderson, Ben. “Time-Stilled Space-Slowed: How Boredom Matters.” Geoforum 35 (2004): 739-754Armitage, John. “On Ernst Jünger’s ‘Total Mobilization’: A Re-evaluation in the Era of the War on Terrorism.” Body and Society 9 (2001): 191-213.A.R.P.D. “Air Raid Precautions Handbook No.2 (1st Edition) Anti-Gas Precautions and First Aid for Air Raid Casualties.” Home Office Air Raid Precautions Department, London: HMSO, 1935. Bialer, Uri. The Shadow of the Bomber: The Fear of Air Attack and British Oolitics, 1932-1939. London: Royal Historical Society, 1980.Bishop, Ryan. and John Phillips. “Manufacturing Emergencies.” Theory, Culture and Society 19 (2002): 91-102.Bissell, David. “Animating Suspension: Waiting for Mobilities.” Mobilities 2 (2007): 277-298.———. “Comfortable Bodies: Sedentary Affects.” Environment and Planning A 40 (2008): 1697-1712.Bourke, Johanna. Fear: A Cultural History. London: Virago Press, 2005.Brittain, Vera. One Voice: Pacifist Writing from the Second World War. London: Continuum 2006.Brown, Felix. “Civilian Psychiatric Air-Raid Casualties.” The Lancet (31 May 1941): 686-691.Calder, Angus. The People's War: Britain, 1939-45. London: Panther, 1971.Calder, Ritchie. “Sleep We Must.” New Statesman and Nation (14 Sep. 1940): 252-253.Committee of Imperial Defence. Minute book. HO 45/17636. The National Archives, 1936.Conradson, David. “The Experiential Economy of Stillness: Places of Retreat in Contemporary Britain.” In Alison Williams, ed. Therapeutic Landscapes: Advances and Applications. Aldershot: Ashgate, 2008. 33-48.Coward, Martin. “Against Anthropocentrism: The Destruction of the Built Environment as a Distinct Form of Political Violence.” Review of International Studies 32 (2006): 419-437. Crandall, Jordan. “Precision + Guided + Seeing.” CTheory (1 Oct. 2006). 8 Mar. 2009 ‹http://www.ctheory.net/articles.aspx?id=502›.Crighton-Miller, H. “Somatic Factors Conditioning Air-Raid Reactions.” The Lancet (12 July 1941): 31-34.Davis, Mike. Dead Cities, and Other Tales. New York: New P, 2002. Davis, Tracy. Stages of Emergency: Cold War Nuclear Civil Defence. Durham: Duke U P, 2007Gaskin, Martin. Blitz: The Story of December 29, 1940. London: Faber and Faber, 2006.Graham, Stephen. “Lessons in Urbicide.” New Left Review (2003): 63-78.Gregory, Derek. The Colonial Present: Afghanistan, Palestine, Iraq. London: Routledge, 2004.———. “‘In Another Time-Zone, the Bombs Fall Unsafely…’: Targets, Civilians and Late Modern War.” Arab World Geographer 9 (2007): 88-112.Gregory, Derek, and Allan Pred. Violent Geographies: Fear, Terror and Political Violence. London: Routledge, 2007.Grosscup, Beau. Strategic Terror: The Politics and Ethics of Aerial Bombardment. London: Zed Books, 2006.Griffin, Susan. A Chorus of Stones: The Private Life of War. London: Anchor Books, 1993.Goodman, Steve. Sonic Warfare: Sound, Affect and the Ecology of Fear. Cambridge: MIT P, 2009 (forthcoming).Haldane, Jack. A.R.P. London: Victor Gollancz, 1938.Harrisson, Tom. Living through the Blitz. Harmondsworth: Penguin Books, 1979.Harrison, Paul. “Corporeal Remains: Vulnerability, Proximity, and Living On after the End of the World.” Environment and Planning A 40 (2008): 423-445.Hewitt, Kenneth. “Place Annihilation - Area Bombing and the Fate of Urban Places.” Annals of the Association of American Geographers 73 (1983): 257-284.———. “When the Great Planes Came and Made Ashes of Our City - Towards an Oral Geography of the Disasters of War.” Antipode 26 (1994): 1-34.IWM 14595. Imperial War Museum Sound Archive. Oral Interview.IWM 19103. Imperial War Museum Sound Archive. Oral Interview.Janis, Irving. Air War and Emotional Stress. Psychological Studies of Bombing and Civilian Defense. New York: McGraw-Hill, 1951.Jones, Edgar, Robert Woolven, Bill Durodie, and Simon Wesselly. “Civilian Morale during the Second World War: Responses to Air Raids Re-Examined.” Social History of Medicine 17 (2004): 463-479.———. “Public Panic and Morale: Second World War Civilian Responses Reexamined in the Light of the Current Anti-Terrorist Campaign.” Journal of Risk Research 9 (2006): 57-73.Kraftl, Peter, and John Horton. “Sleepy Geographies and the Spaces of Every-Night Life.” Progress in Human Geography 32 (2008): 509-532.Le Bon, Gustav. The Crowd. London: T. F. Unwin, 1925.Massumi, Brian. Parables for the Virtual: Movement, Affect, Sensation. Durham and London: Duke U P, 2002.———. “Sensing the Virtual: Building the Insensible.” Architectural Design 68.5/6 (1998): 16-24Mendieta, Edwardo. “The Literature of Urbicide: Friedrich, Nossack, Sebald, and Vonnegut.” Theory and Event 10 (2007):MO 371. “Cars and Sirens.” Mass Observation Report. 27 Aug. 1940.MO 408. “Human Adjustments to Air Raids.” Mass Observation Report. 8 Sep. 1940.MO 253. “Air Raids.” Mass Observation Report. 5 July 1940.MO 217. “Air Raids.” Mass Observation Report. 21 June 1940.MO A14. “Shelters.” Mass Observation Report. [date unknown] 1940.MO 364. “Metropolitan Air Raids.” Mass Observation Report. 23 Aug. 1940.Mortimer, Gavin. The Longest Night. London: Orion, 2005.Ngai, Sianne. Ugly Feelings. Harvard: Harvard U P, 2005.Orr, Pauline. Panic Diaries. Durham and London: Duke U P, 2006.Reid, Julian. The Biopolitics of the War on Terror. London: Palgrave McMillan, 2006.Rose, Mitch, and John Wylie. “Animating Landscape: Editorial Introduction.” Environment and Planning D: Society and Space 24 (2007): 475-479.Schivelbusch, Wolfgang. The Culture of Defeat. New York: Henry Holt, 1994.Sebald, W. G. On the Natural History of Destruction. New York: Random House, 2003.Sloterdijk, Peter. "Airquake." Environment and Planning D: Society and Space 27.1 (2009): 41-57.Thomas, S. Evelyn. The Wardens Manual. London: St Albans Press, 1942.Thrift, Nigel. “Still Life in Nearly Present Time: The Object of Nature.” Body and Society 6 (2000): 34-57.———. “Intensities of Feeling: Towards a Spatial Politics of Affect.” Geografiska Annaler Series B 86 (2005): 57-78.Tomkins, Sylvan. Exploring Affect: The Selected Writings of Silvan S. Tomkins. Cambridge: Cambridge U P, 1995.Trotter, Wilfred. Instincts of the Herd in Peace and War. London: T. Fisher Unwin, 1924.

You might also be interested in the bibliographies on the topic 'Defense Contract Audit Agency' for other source types:

Books

To the bibliography
Journal articles: 'Defense Contract Audit Agency' – Grafiati (2024)

References

Top Articles
Latest Posts
Article information

Author: Trent Wehner

Last Updated:

Views: 6127

Rating: 4.6 / 5 (56 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Trent Wehner

Birthday: 1993-03-14

Address: 872 Kevin Squares, New Codyville, AK 01785-0416

Phone: +18698800304764

Job: Senior Farming Developer

Hobby: Paintball, Calligraphy, Hunting, Flying disc, Lapidary, Rafting, Inline skating

Introduction: My name is Trent Wehner, I am a talented, brainy, zealous, light, funny, gleaming, attractive person who loves writing and wants to share my knowledge and understanding with you.