Journal articles: 'Trusted data path' – Grafiati (2024)

  • Bibliography
  • Subscribe
  • News
  • Referencing guides Blog Automated transliteration Relevant bibliographies by topics

Log in

Українська Français Italiano Español Polski Português Deutsch

We are proudly a Ukrainian website. Our country was attacked by Russian Armed Forces on Feb. 24, 2022.
You can support the Ukrainian Army by following the link: https://u24.gov.ua/. Even the smallest donation is hugely appreciated!

Relevant bibliographies by topics / Trusted data path / Journal articles

To see the other types of publications on this topic, follow the link: Trusted data path.

Author: Grafiati

Published: 4 June 2021

Last updated: 8 February 2022

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Consult the top 35 journal articles for your research on the topic 'Trusted data path.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Barka, Ezedin, Chaker Kerrache, Rasheed Hussain, Nasreddine Lagraa, Abderrahmane Lakas, and Safdar Bouk. "A Trusted Lightweight Communication Strategy for Flying Named Data Networking." Sensors 18, no.8 (August15, 2018): 2683. http://dx.doi.org/10.3390/s18082683.

Full text

Abstract:

Flying Ad hoc Network (FANET) is a new resource-constrained breed and instantiation of Mobile Ad hoc Network (MANET) employing Unmanned Aerial Vehicles (UAVs) as communicating nodes. These latter follow a predefined path called ’mission’ to provide a wide range of applications/services. Without loss of generality, the services and applications offered by the FANET are based on data/content delivery in various forms such as, but not limited to, pictures, video, status, warnings, and so on. Therefore, a content-centric communication mechanism such as Information Centric Networking (ICN) is essential for FANET. ICN addresses the problems of classical TCP/IP-based Internet. To this end, Content-centric networking (CCN), and Named Data Networking (NDN) are two of the most famous and widely-adapted implementations of ICN due to their intrinsic security mechanism and Interest/Data-based communication. To ensure data security, a signature on the contents is appended to each response/data packet in transit. However, trusted communication is of paramount importance and currently lacks in NDN-driven communication. To fill the gaps, in this paper, we propose a novel trust-aware Monitor-based communication architecture for Flying Named Data Networking (FNDN). We first select the monitors based on their trust and stability, which then become responsible for the interest packets dissemination to avoid broadcast storm problem. Once the interest reaches data producer, the data comes back to the requester through the shortest and most trusted path (which is also the same path through which the interest packet arrived at the producer). Simultaneously, the intermediate UAVs choose whether to check the data authenticity or not, following their subjective belief on its producer’s behavior and thus-forth reducing the computation complexity and delay. Simulation results show that our proposal can sustain the vanilla NDN security levels exceeding the 80% dishonesty detection ratio while reducing the generated end-to-end delay to less than 1 s in the worst case and reducing the average consumed energy by more than two times.

APA, Harvard, Vancouver, ISO, and other styles

2

Jayaprakash,R., and B.Radha. "An Implementation of Trusted Key Management Protocol (TKMP) in Wireless Network." Journal of Computational and Theoretical Nanoscience 17, no.12 (December1, 2020): 5243–49. http://dx.doi.org/10.1166/jctn.2020.9415.

Full text

Abstract:

The Trusted Key Management Protocol (TKMP) provides one of the most secure communication technologies in MANET cluster-based data protection. For security reasons, TKMP is a trusted key that can be sent to all nodes in the communication cluster. This document introduces the Trusted Key Management Protocol (TKMP) feature to improve the quality of secure communications over a cluster-based wireless network. The proposed TKMP execution process includes CBPPRS (Cluster Based Privacy Preserving Routing Selection), LBCPR (Load Balancing Cluster Based Privacy Routing) and DLBPS (Dynamic Load Balancing Privacy Path Selection) procedure. To lock the data from the malicious node, the Paillier Cryptosystem (PC) encrypts packets with hom*omorphic encryption. The trust score makes it easier to update routing information and improves network throughput. The experimental results show that the proposed TKMP method works better than the other Trust-ECC method.

APA, Harvard, Vancouver, ISO, and other styles

3

Elamparithi,P., and DrK.RubaSoundar. "Trusted Sensing Model for Mobile Ad HoC Network Using Differential Evolution Algorithm." Information Technology And Control 49, no.4 (December19, 2020): 556–63. http://dx.doi.org/10.5755/j01.itc.49.4.25438.

Full text

Abstract:

Mobile Ad Hoc Network (MANET) has set of mobile nodes that are allowed to communicate with each other through wireless links. The nodes are deployed spontaneously without any infrastructure in a geographical area. Due to the lack of centralized administration and prior organization, MANETs are vulnerable to different attacks of malicious nodes. To overcome the problem of black hole attack in MANETs, a trust model using Differential Evolution (DE) algorithm has been proposed. It identifies the malicious node and inhibits them to become the member of data transmission path. The proposed work consists of two phases; one is to obtain the optimized path and the other deals with the penalty factor for malicious nodes. Moreover, the Differential Evolution is one of the most promising optimization to enhance security with increased network density. The proposed algorithm is compared with AOMDV, DSR, Genetic algorithm and ACO.

APA, Harvard, Vancouver, ISO, and other styles

4

Abujassar,RadwanS., Husam Yaseen, and Ahmad Samed Al-Adwan. "A Highly Effective Route for Real-Time Traffic Using an IoT Smart Algorithm for Tele-Surgery Using 5G Networks." Journal of Sensor and Actuator Networks 10, no.2 (April22, 2021): 30. http://dx.doi.org/10.3390/jsan10020030.

Full text

Abstract:

Nowadays, networks use many different paths to exchange data. However, our research will construct a reliable path in the networks among a huge number of nodes for use in tele-surgery using medical applications such as healthcare tracking applications, including tele-surgery which lead to optimizing medical quality of service (m-QoS) during the COVID-19 situation. Many people could not travel due to the current issues, for fear of spreading the covid-19 virus. Therefore, our paper will provide a very trusted and reliable method of communication between a doctor and his patient so that the latter can do his operation even from a far distance. The communication between the doctor and his/her patient will be monitored by our proposed algorithm to make sure that the data will be received without delay. We test how we can invest buffer space that can be used efficiently to reduce delays between source and destination, avoiding loss of high-priority data packets. The results are presented in three stages. First, we show how to obtain the greatest possible reduction in rate variability when the surgeon begins an operation using live streaming. Second, the proposed algorithm reduces congestion on the determined path used for the online surgery. Third, we have evaluated the affection of optimal smoothing algorithm on the network parameters such as peak-to-mean ratio and delay to optimize m-QoS. We propose a new Smart-Rout Control algorithm (s-RCA) for creating a virtual smart path between source and destination to transfer the required data traffic between them, considering the number of hops and link delay. This provides a reliable connection that can be used in healthcare surgery to guarantee that all instructions are received without any delay, to be executed instantly. This idea can improve m-QoS in distance surgery, with trusted paths. The new s-RCA can be adapted with an existing routing protocol to track the primary path and monitor emergency packets received in node buffers, for direct forwarding via the demand path, with extended features.

APA, Harvard, Vancouver, ISO, and other styles

5

Alhaj, Abdullah, Shadi Aljawarneh, Shadi Masadeh, and Evon Abu-Taieh. "A Secure Data Transmission Mechanism for Cloud Outsourced Data." International Journal of Cloud Applications and Computing 3, no.1 (January 2013): 34–43. http://dx.doi.org/10.4018/ijcac.2013010104.

Full text

Abstract:

The Cloud has become a significant topic in computing; however, the trend has established a new range of security issues that need to be addressed. In Cloud, the data and associated software are not under their control. In addition, with the growing demands for Cloud networks communication, it becomes increasingly important to secure the data flow path. The existing research related to security mechanisms only focuses on securing the flow of information in the communication networks. There is a lack of work on improving the performance of networks to meet quality of service (QoS) constrains for various services. The security mechanisms work by encryption and decryption of the information, but do not consider the optimised use of the network resources. In this paper the authors propose a Secure Data Transmission Mechanism (SDTM) with Preemption Algorithm that combines between security and quality of service. Their developed SDTM enhanced with Malicious Packets Detection System (MPDS) which is a set of technologies and solutions. It enforces security policy and bandwidth compliance on all devices seeking to access Cloud network computing resources, in order to limit damage from emerging security threats and to allow network access only to compliant and trusted endpoint devices. This SDTM also provides support for quality of service. High-level simulations and the related results are provided to show the properties of the SDTM.

APA, Harvard, Vancouver, ISO, and other styles

6

Bracciale, Lorenzo, Pierpaolo Loreti, Claudio Pisa, and Alex Shahidi. "Secure Path: Block-Chaining IoT Information for Continuous Authentication in Smart Spaces." IoT 2, no.2 (May18, 2021): 326–40. http://dx.doi.org/10.3390/iot2020017.

Full text

Abstract:

The Internet of Things offers a wide range of possibilities that can be exploited more or less explicitly for user authentication, ranging from specifically designed systems including biometric devices to environmental sensors that can be opportunistically used to feed behavioural authentication systems. How to integrate all this information in a reliable way to get a continuous authentication service presents several open challenges. Among these: how to combine semi-trusted information coming from non-tamper-proof sensors, where to store such data avoiding a single point of failure, how to analyse data in a distributed way, which interface to use to provide an authentication service to a multitude of different services and applications. In this paper, we present a Blockchain-based architectural solution of a distributed system able to transform IoT interactions into useful data for an authentication system. The design includes: (i) a security procedure to certify users’ positions and identities, (ii) a secure storage to hold this information, and (iii) a service to dynamically assign a trust level to a user’s position. We call this system “Secure Path”.

APA, Harvard, Vancouver, ISO, and other styles

7

Meng, Fanqi, Xiaohong Su, and Zhaoyang Qu. "Interactive WCET Prediction with Warning for Timeout Risk." International Journal of Pattern Recognition and Artificial Intelligence 31, no.05 (February27, 2017): 1750012. http://dx.doi.org/10.1142/s0218001417500124.

Full text

Abstract:

Worst case execution time (WCET) analysis is essential for exposing timeliness defects when developing hard real-time systems. However, it is too late to fix timeliness defects cheaply since developers generally perform WCET analysis in a final verification phase. To help developers quickly identify real timeliness defects in an early programming phase, a novel interactive WCET prediction with warning for timeout risk is proposed. The novelty is that the approach not only fast estimates WCET based on a control flow tree (CFT), but also assesses the estimated WCET with a trusted level by a lightweight false path analysis. According to the trusted levels, corresponding warnings will be triggered once the estimated WCET exceeds a preset safe threshold. Hence developers can identify real timeliness defects more timely and efficiently. To this end, we first analyze the reasons of the overestimation of CFT-based WCET calculation; then we propose a trusted level model of timeout risks; for recognizing the structural patterns of timeout risks, we develop a risk data counting algorithm; and we also give some tactics for applying our approach more effectively. Experimental results show that our approach has almost the same running speed compared with the fast and interactive WCET analysis, but it saves more time in identifying real timeliness defects.

APA, Harvard, Vancouver, ISO, and other styles

8

Aqib, Muhammad, and Jonathan Cazalas. "Trusted Base Stations-Based Privacy Preserving Technique in Location-Based Services." Computer and Information Science 8, no.4 (November6, 2015): 93. http://dx.doi.org/10.5539/cis.v8n4p93.

Full text

Abstract:

With the advent in mobile and internet technologies, there is a significant increase in the number of users using smartphones and other internet based applications. There are a large number of applications available online that use the internet and provide useful information to the users. These include ones that provide location-based services e.g. google maps etc. These applications provide many facilities to the users who want information regarding a specific area or directions using an optimal path to a destination. Due to these reasons, the number of clients using these applications is increasing on a daily basis. Although these services are very useful and are making it easy for us to get information about our surroundings, some issues are also linked with the use of these applications and their services. One of the more significant issues of using these services is privacy with respect to sending personal location information to location-based services servers. Researchers have provided many solutions to solve these issues. One of the solutions is through caching and use of k-anonymity techniques. In this paper, we have proposed a method to solve the privacy issue that uses caching data approach to reduce the number of queries sent to the location-based services server. We also discuss the use of the concept of k-anonymity when no relevant data is available in cache, and queries are sent to the server.

APA, Harvard, Vancouver, ISO, and other styles

9

Rajeswari,A.R., K.Kulothungan, Sannasi Ganapathy, and Arputharaj Kannan. "Trusted energy aware cluster based routing using fuzzy logic for WSN in IoT." Journal of Intelligent & Fuzzy Systems 40, no.5 (April22, 2021): 9197–211. http://dx.doi.org/10.3233/jifs-201633.

Full text

Abstract:

WSN plays a major role in the design of IoT system. In today’s internet era IoT integrates the digital devices, sensing equipment and computing devices for data sensing, gathering and communicate the data to the Base station via the optimal path. WSN, owing to the characteristics such as energy constrained and untrustworthy environment makes them to face many challenges which may affect the performance and QoS of the network. Thus, in WSN based IoT both security and energy efficiency are considered as herculean design challenges and requires important concern for the enhancement of network life time. Hence, to address these problems in this paper a novel secure energy aware cluster based routing algorithm named Trusted Energy Efficient Fuzzy logic based clustering Algorithm (TEEFCA) has been proposed. This algorithm consists of two major objectives. Firstly, the trustworthy nodes are identified, which may act as candidate nodes for cluster based routing. Secondly, the fuzzy inference system is employed under the two circ*mstances namely selection of optimal Cluster Leader (CL) and cluster formation process by considering the following three parameters such as (i) node’s Residual Energy level (ii) Cluster Density (iii) Distance Node BS. From, the experiment outcomes implemented using MATLAB it have been proved that TEEFCA shows significant improvement in terms of power conservation, network stability and lifetime when compared to the existing cluster aware routing approaches.

APA, Harvard, Vancouver, ISO, and other styles

10

JV, Anand. "Trust-Value Based Wireless Sensor Network Using Compressed Sensing." June 2020 2, no.2 (June2, 2020): 88–95. http://dx.doi.org/10.36548/jei.2020.2.003.

Full text

Abstract:

Wireless sensor networks have quickly paved way to novel ways of communication between two nodes. They consist of sensor nodes that have the capacity to sense, communicate and compute. If a particular node in a WSN is not able to transmit data to the base station, routing algorithms will move into action to direct the data from the node. The proposed work deals with a routing algorithm based on trust awareness and compression sensing data, to handle data routing in a clustered WSN. In general, when sensor nodes have reduced overhead, compressed sensing is utilized for data aggregation. In order to strike a balance between number of messages transmitted, hop count, distance of transmission and the optimal trusted path, many nature inspired optimisation methods have been developed over the years. However, trust-based retrieval of compressed data is executed at the base station amidst malicious nodes.

APA, Harvard, Vancouver, ISO, and other styles

11

Samreen, Shirina. "Packet Dropping Counter Measures in a MANET Through Reliable Routing Protocol Leveraging a Trust Management Framework." International Journal of Mobile Computing and Multimedia Communications 9, no.3 (July 2018): 60–75. http://dx.doi.org/10.4018/ijmcmc.2018070104.

Full text

Abstract:

The applications of a mobile ad hoc network (MANET) range from military and disaster response to commercial and civilian environments. The intrinsic characteristics like lack of infrastructure, self-organizing nature and deployment flexibility contributes to its usefulness but few other features like open media for communication and topological changes on-the-fly makes it vulnerable to security attacks. The focus of the current work is security mechanisms for a MANET against the various insider attacks targeting the data forwarding operations. It is accomplished through a trust management framework and a secure routing protocol relying upon the TMF to form the routes with most trusted nodes. The protocol computes a novel reliability metric termed as Path Allegiance metric (PAM) which acts as a selection criteria for route selection. The performance evaluation involves simulation results which prove the robustness of the proposed TMF and the effectiveness of the PAM routing protocol in reliable data delivery in the presence of packet droppers which disrupt the data transmission.

APA, Harvard, Vancouver, ISO, and other styles

12

Selvi,M., and B.Ramakrishnan. "Secured Message Broadcasting in VANET using Blowfish Algorithm with Oppositional Deer Hunting Optimization." International Journal of Computer Network and Information Security 13, no.2 (April8, 2021): 39–52. http://dx.doi.org/10.5815/ijcnis.2021.02.04.

Full text

Abstract:

Emergency Message broadcasting is an important process in VANET. Security and reliable transmission are the two major concerns in message broadcasting. VANET is open to unauthorized nodes, hackers, misbehaving vehicles, malicious attackers etc without security. Without valid confirmation of authorized vehicles, these types of attacks may occur. To enhance the reliability in message broadcasting, some existing techniques are used. They transmit the data without much delay but they didn’t provide any trusted authentication. So hackers, malicious nodes, unauthorized vehicles may easily interrupt the emergency messages. Also Brute force attack, Man in Middle attack are not identified and eliminated. In this research, a trust based secured broadcasting mechanism is developed which ensures the metrics such as security, privacy, integrity, trust etc. The major intension of this research is to reduce latency and provide high reliable, secure and efficient communication over the vehicles. The data such as vehicle position, location, speed, and other traffic information’s are generated and stored in a separate table. A network is created with varying densities. A path is generated for message broadcasting between source and destination based on the specific gateway estimated. Here, Optimal Wireless Access in Vanet (OWAV) Protocol is employed to gather vehicle related information to reduce the delay. Blowfish encryption algorithm along with Oppositional Deer Hunting Optimization (ODHO) is used to store the trusted vehicles location to avoid unauthorized tracking. The performance of the proposed research is analyzed with various metrics such as Packet delivery ratio (PDR), transmission delay, encryption time, throughput, computational overhead etc. The efficiency of the research is compared with other existing methods.

APA, Harvard, Vancouver, ISO, and other styles

13

Alonso, Juncal, Leire Orue-Echevarria, Eneko Osaba, Jesús López Lobo, Iñigo Martinez, Josu Diaz de Arcaya, and Iñaki Etxaniz. "Optimization and Prediction Techniques for Self-Healing and Self-Learning Applications in a Trustworthy Cloud Continuum." Information 12, no.8 (July30, 2021): 308. http://dx.doi.org/10.3390/info12080308.

Full text

Abstract:

The current IT market is more and more dominated by the “cloud continuum”. In the “traditional” cloud, computing resources are typically hom*ogeneous in order to facilitate economies of scale. In contrast, in edge computing, computational resources are widely diverse, commonly with scarce capacities and must be managed very efficiently due to battery constraints or other limitations. A combination of resources and services at the edge (edge computing), in the core (cloud computing), and along the data path (fog computing) is needed through a trusted cloud continuum. This requires novel solutions for the creation, optimization, management, and automatic operation of such infrastructure through new approaches such as infrastructure as code (IaC). In this paper, we analyze how artificial intelligence (AI)-based techniques and tools can enhance the operation of complex applications to support the broad and multi-stage heterogeneity of the infrastructural layer in the “computing continuum” through the enhancement of IaC optimization, IaC self-learning, and IaC self-healing. To this extent, the presented work proposes a set of tools, methods, and techniques for applications’ operators to seamlessly select, combine, configure, and adapt computation resources all along the data path and support the complete service lifecycle covering: (1) optimized distributed application deployment over heterogeneous computing resources; (2) monitoring of execution platforms in real time including continuous control and trust of the infrastructural services; (3) application deployment and adaptation while optimizing the execution; and (4) application self-recovery to avoid compromising situations that may lead to an unexpected failure.

APA, Harvard, Vancouver, ISO, and other styles

14

Demertzis, Konstantinos, Konstantinos Tsiknas, Dimitrios Takezis, Charalabos Skianis, and Lazaros Iliadis. "Darknet Traffic Big-Data Analysis and Network Management for Real-Time Automating of the Malicious Intent Detection Process by a Weight Agnostic Neural Networks Framework." Electronics 10, no.7 (March25, 2021): 781. http://dx.doi.org/10.3390/electronics10070781.

Full text

Abstract:

Attackers are perpetually modifying their tactics to avoid detection and frequently leverage legitimate credentials with trusted tools already deployed in a network environment, making it difficult for organizations to proactively identify critical security risks. Network traffic analysis products have emerged in response to attackers’ relentless innovation, offering organizations a realistic path forward for combatting creative attackers. Additionally, thanks to the widespread adoption of cloud computing, Device Operators (DevOps) processes, and the Internet of Things (IoT), maintaining effective network visibility has become a highly complex and overwhelming process. What makes network traffic analysis technology particularly meaningful is its ability to combine its core capabilities to deliver malicious intent detection. In this paper, we propose a novel darknet traffic analysis and network management framework to real-time automating the malicious intent detection process, using a weight agnostic neural networks architecture. It is an effective and accurate computational intelligent forensics tool for network traffic analysis, the demystification of malware traffic, and encrypted traffic identification in real time. Based on a weight agnostic neural networks (WANNs) methodology, we propose an automated searching neural net architecture strategy that can perform various tasks such as identifying zero-day attacks. By automating the malicious intent detection process from the darknet, the advanced proposed solution is reducing the skills and effort barrier that prevents many organizations from effectively protecting their most critical assets.

APA, Harvard, Vancouver, ISO, and other styles

15

RUDYI,R., Iu KYSELOV, Ia KOROBEINIKOVA, V.KYRYLIUK, and S.ROMANCHUK. "Using GIS technologies for the avalance path as a tourist atraction object." Modern achievements of geodesic science and industry 42, no.II (September1, 2021): 76–83. http://dx.doi.org/10.33841/1819-1339-2-42-76-83.

Full text

Abstract:

The purpose of research. The current state of the tourism industry is characterized by growing demand for tourism services by using GIS technologies and increasing attraction for tourism. Specialists in this field are increasingly using geographic information technology to solve various problems of tourism. This article represents studies and possibilities of comprehensive information technology use in the field of tourism, such as, using of the avalanche pass for a tourist attraction. The information obtained from GIS technologies may have been used not only for travel agencies, but also to be useful for forestry workers but also (because it is an avalanche), should be taken by correspondent rescue services in the winter. Therefore, these studies currently remain relevant for scientific and practical issues. The goal of the work. Show how GIS technology performs the functions of spatial analysis and specific user tasks, such as, data processing, mapping, visualization of tourist routes and areas, etc. Thus, the most common usage of geographic information technologies for the formation of databases and filling mapping atributes about the tourist object and infrastructure of the tourist destination. Improving the informativeness is achieved by visualizing the various characteristics of the object, that is showing the avalanche area, avalanche path and power, which led to the destruction of the forest, and futher on. Method. A tourist route passing through the village of Chernyk, Nadvirna district, Ivano-Frankivsk region, north of Mount Polensky (Polenskaya) was used for this study. The research in this article is based on the use of the extremely destructive snow avalanche that came down from Polensky Mountain in the Ukrainian Carpathians on March 24, 2006 and led to destruction in a large part of the forest in the Gorgany Nature Reserve. Geoinformation modeling methods were used on the territory of the avalanche slope from Polensky Mountain. Results. A digital terrain model of the study area was created. Geotourism route was developed within Gorgan, also some additional studies were performed related to detailed mapping and surface modeling in terms of route safety. Experimental studies were performed based on materials (DEM) provided by the Research Institute, Geodesy and Cartography , also the SURFAR software package was used. On its way, the avalanche destroys not only a large amount of forest (lumber), but also young trees. By cutting and capturing the soil and forest, the avalanche carries all this material (vegetation, top soil, rocks, debris)to the foot of the mountain and changing the terrain as well. According to our estimates, the forest losses caused by this avalanche were as follows: about 2,500 trees were destroyed, or 1,575 cubic meters of lamber. Different models were created for Mount Polenska, which are shown in the relevant figures. The obtained visual images that will be interesting for tourists and enhance the attractiveness of the object. Scientific novelty and practical value. The performed researches doesn’t have only descriptive nature, but also can be applied for the rescue service to protect of tourists on the route. The development of modern transport information systems and the creation of tourist maps and guides are another goals of this research. The creation and accurate mapping of tourist routes with the use of digital electronic maps is especially important, as the existing cartographic material is very inaccurate and the information is outdated. The use of geographic information technologies in tourism will also expand to solve specific engineering problems related to tourism. In addition, the images shown can serve as a warning of possible dangers. Conclusions. Thus, the use of geological objects in the tourism industry is promising, specially for mountainous and upland areas, which are very attractive for tourism. Because the formation of geotourism routes on the basis of correspondent and trusted geological data, and also involves a detailed study of geolocations, the route of the group, taking into account the safety aspects of travel. These tasks are efficiently implemented with the help of geographic information systems and technologies.

APA, Harvard, Vancouver, ISO, and other styles

16

Seitenov,A., and G.Smagulova. "DISTRIBUTION OF ETHEREUM BLOCKCHAIN ADDRESSES." Scientific Journal of Astana IT University, no.4 (December25, 2020): 41–48. http://dx.doi.org/10.37943/aitu.2020.36.57.005.

Full text

Abstract:

Abstract: In the contemporary world, Ethereum is a very reliable financial saving among cryptocurrencies. It is also well known as a blockchain platform for creating and launching its own cryptocurrency. The applications run on Ethereum executed by a platform-specific cryptographic token, ether. During 2014, Ethereum had launched a pre-sale for ether, which had received an overwhelming response. Ether is used broadly for two purposes: it is traded as a digital currency exchange like other cryptocurrencies, and it is used inside Ethereum to run applications and even to monetize work. It should be noticed that the smart contract has brought a significant share of the success to Ethereum. The smart contract is a computer programme that independently performs assigned tasks between network participants without the participation of a third trusted party. Smart contracts and their intranet transactions have facilitated the rapid expansion of the Ethereum network. Smart contracts are widely represented on the market, either as electronic transaction payments or as applications for the implementation of logistics supplies, gambling, and other sectors. These transactions are irreversible and fully tracked online. Whereas the electronic records are available in a public distributed ledger and include data about user addresses, whereas the real names are hidden. The article explains the usage of decentralized accounts and their electronic transactions in the Ethereum network. The results are presented through different application sectors. Additionally, a new method for extracting blockchain records through node cluster via IPFS path is implemented in the research.

APA, Harvard, Vancouver, ISO, and other styles

17

Ekasari, Retno. "PENGARUH PENYULUHAN PAJAK TERHADAP SIKAP MAHASISWA DI JAKARTA." LUGAS Jurnal Komunikasi 1, no.2 (August6, 2019): 97–107. http://dx.doi.org/10.31334/ljk.v1i2.439.

Full text

Abstract:

Abstract The purpose of this research was to analyze the effect of tax education conducted by the Director General of Taxes on student attitudes. This research used explanatory quantitative research methods by using a survey to 134 respondents. Theories used are Schiffman & Kanuk's basic communication theory / model, counseling theories, persuasive communication theory from Petty & Otcioppo and Attitude theory from Hovland and Janis & Kelley. The results of data processing used the Path Analysis method. The results showed that the source factor did not significantly influence the internal intermediary process. The message factor has a significant effect on the internal intermediary process. The internal intermediary process significantly influences attitude. This research also found that respondents' statements about the credibility of extension workers were quite good. This can be seen from the statements of respondents that the instructor has complete knowledge, masters the material presented, has experience in taxation, can be trusted, and objective in delivering the material. The message factor influences the internal intermediary process. In counseling conducted by the Director General of Taxes, the message factor which consists of the validity of the message contents, the actualization of the message contents, this package of messages affect the attitude of students. The more valid and actual the material presented, the more it gets the attention of students. Tax counseling conducted by the Director General of Taxes can affect student attitudes. Abstrak Tujuan penelitian ini untuk menganalisis pengaruh penyuluhan pajak yang telah dilakukan oleh Dirjen Pajak terhadap sikap mahasiswa. Penelitian ini menggunakan metode penelitian kuantitatif eksplanatif dengan menggunakan survey terhadap 134 responden. Teori yang digunakan adalah teori/model komunikasi dasar Schiffman & Kanuk, teori-teori penyuluhan, teori komunikasi persuasif dari Petty & Otcioppo dan teori Sikap dari Hovland serta Janis & Kelley. Hasil pengolahan data menggunakan metode Path Analysis. Hasil penelitian menunjukan bahwa faktor sumber tidak berpengaruh signifikan terhadap proses perantara internal. Faktor pesan berpengaruh signifikan terhadap proses perantara internal. Proses perantara internal berpengaruh signifikan terhadap sikap. Penelitian ini juga menemukan bahwa pernyatan-pernyataan responden terhadap kredibilitas penyuluh cukup baik. Ini terlihat dari pernyataan-pernyataan responden bahwa penyuluh memiliki pengetahuan yang lengkap, menguasai materi yang disampaikan, memiliki pengalaman di bidang perpajakan, dapat dipercaya, dan objektif dalam penyampaian materi. Faktor pesan berpengaruh terhadap proses perantara internal. Pada penyuluhan yang dilakukan oleh Dirjen Pajak, faktor pesan yang terdiri dari validitas isi pesan, aktualisasi isi pesan, kemasan ini pesan berpengaruh terhadap sikap mahasiswa. Semakin valid dan aktual materi yang disampaikan, semakin mendapat perhatian mahasiswa. Penyuluhan pajak yang dilakukan oleh Dirjen Pajak dapat memengaruhi sikap mahasiswa.

APA, Harvard, Vancouver, ISO, and other styles

18

AlFarraj, Omayma, Ali Abdallah Alalwan, Zaid Mohammad Obeidat, Abdullah Baabdullah, Rand Aldmour, and Shafig Al-Haddad. "Examining the impact of influencers’ credibility dimensions: attractiveness, trustworthiness and expertise on the purchase intention in the aesthetic dermatology industry." Review of International Business and Strategy 31, no.3 (February4, 2021): 355–74. http://dx.doi.org/10.1108/ribs-07-2020-0089.

Full text

Abstract:

Purpose This study aims to investigate the influencers’ credibility dimensions (i.e. attractiveness, trustworthiness, expertise) on purchase intention (PI) through the mediating role of cognitive and affective online engagement among the aesthetic dermatology consumers in Jordan. Design/methodology/approach The population of this study entails all followers of aesthetic dermatology clinics on their Instagram accounts. However, only three influencers from the aesthetic dermatology industry were selected and approved the request of sharing the survey instrument on their official platforms. Overall, 600 surveys were distributed, but only 384 were completed fully, constituting a 64% response rate. Findings The data analysis revealed an excellent fit for the data and indicated an impact of attractiveness and expertise on online engagement and PI. Moreover, a mediating influence was also found for online engagement on the path between influencer credibility and PI. Research limitations/implications This study has a limitation of collecting the data from only three influencers; consequently, collecting data from the followers of more than four influencers would get more generalizable results. Second, considering further, examining the mediating role of other variables such as electronic word-of-mouth (EWOM) and loyalty programs could also provide further insights onto the nature of the factors affecting the PI. In addition, future studies should examine the differences of using more than one social media platform. Practical implications The main findings of this study have a number of managerial implications for marketing management that hint at liking the influencers who are highly trusted owing to their extensive expertise in the area they are marketing rather than only depending on their physical attractiveness. The Jordanian culture does not focus only on the image shared by the social media as the reviews can either support or decline the influence of even the celebrity. Significantly, a set of managerial implications come from the current research. Social implications Two major areas are the most important; these are the trustworthy issue and the EWOM. The marketers should encourage their customers to openly talk about their experiences as they have an imperative role in liking influencers in a way that improves their PI. The second implication is related to social media platforms management that marketing managers should resolve any negative EWOM caused and to enhance followers’ satisfaction levels of the services. The increase in satisfaction positively affects PI, and the service makes the influencer role become more effective. Originality/value This study was able to add a value to the current understanding of the main antecedents of customer engagement by looking at these dimensions of perceived credibility. Another contribution was captured in this study by successfully validating the meditating impact of customer engagement between influencers’ credibility dimensions and PI, especially in the absence of the studies that have addressed such relationship.

APA, Harvard, Vancouver, ISO, and other styles

19

Koçak, Ömer Erdem, and Burcu Aydın Küçük. "How Does Paternalistic Leadership Affect Employees’ Work Engagement? The Mediating Roles of Workaholism and Trust-in-Leader." Journal of Humanity and Society (insan & toplum) 11, no.3 (September15, 2021): 179–96. http://dx.doi.org/10.12658/m0631.

Full text

Abstract:

In this study, we contend that paternalist leadership can be an effective way of managing people and can pave the way for employee motivation and well-being, despite several previous studies linking it to adverse outcomes. In addition, we propose two possible underlying mechanisms (i.e., workaholism, trust in leadership) linking a leader’s paternalistic style to employee work engagement. By doing so, we aim to understand whether paternalist leaders positively influence their subordinates through a social connection path (trust in leader) or task-focusing path (workaholism). We conducted a field survey and collected cross-sectional data using online surveys from 413 participants working in various industries in Istanbul to test the hypotheses. The results indicate a positive relationship to exist between paternalistic leadership and employee work engagement. Therefore, we put forth that the paternalistic leadership style can be beneficial through the task-focusing and social connection paths, contrary to the beliefs commonly shared in Western countries.

APA, Harvard, Vancouver, ISO, and other styles

20

Zawojska,A. "Determinants of farmers' trust in government agricultural agencies in Poland." Agricultural Economics (Zemědělská ekonomika) 56, No.6 (June25, 2010): 266–83. http://dx.doi.org/10.17221/103/2009-agricecon.

Full text

Abstract:

The purpose of this study was to investigate the levels of farmers' trust toward state agricultural agencies in Poland, to identify its determinants and to develop a model illustrating the relationship between trust and the different dimensions of the agencies performance. Specifically this study looks at two agencies: the Agency for Restructuring and Modernisation of Agriculture and the Agricultural Market Agency. Data were obtained from responses to a set of questions asked of the nationwide sample of 200 Polish farmers in December 2006–January 2007. The farmers' evaluations according to a range of statements about the agencies were measured using ten-point Likert scale. Partial Least Squares Path Modelling was employed to estimate the latent (theoretical) variables such as trust, image, performance, satisfaction etc. Additionally, descriptive statistics such as frequencies, percentages and means as well as correlation coefficients were applied. Evidence is presented that the trust of farmers in the institutions of state, represented here by two agricultural agencies, is statistically correlated with the image of the agencies, respondents' expectations and their satisfaction about the way the agencies work as well as with perceived value of the services and programmes provided by the agencies. Farmer's socio-economic characteristics (gender, education, the period of their interaction with the agencies, farm size) did not relate to trust score with the exception of age. Causality analysis showed that trust towards both agencies was significantly impacted by their image with the customers. Trust had significant impact on the overall satisfaction with the ARMA.

APA, Harvard, Vancouver, ISO, and other styles

21

Vargas, Juan Quirós, Juliane Bendig, Alasdair Mac Arthur, Andreas Burkart, Tommaso Julitta, Kadmiel Maseyk, Rick Thomas, et al. "Unmanned Aerial Systems (UAS)-Based Methods for Solar Induced Chlorophyll Fluorescence (SIF) Retrieval with Non-Imaging Spectrometers: State of the Art." Remote Sensing 12, no.10 (May19, 2020): 1624. http://dx.doi.org/10.3390/rs12101624.

Full text

Abstract:

Chlorophyll fluorescence (ChlF) information offers a deep insight into the plant physiological status by reason of the close relationship it has with the photosynthetic activity. The unmanned aerial systems (UAS)-based assessment of solar induced ChlF (SIF) using non-imaging spectrometers and radiance-based retrieval methods, has the potential to provide spatio-temporal photosynthetic performance information at field scale. The objective of this manuscript is to report the main advances in the development of UAS-based methods for SIF retrieval with non-imaging spectrometers through the latest scientific contributions, some of which are being developed within the frame of the Training on Remote Sensing for Ecosystem Modelling (TRuStEE) program. Investigations from the Universities of Edinburgh (School of Geosciences) and Tasmania (School of Technology, Environments and Design) are first presented, both sharing the principle of the spectroradiometer optical path bifurcation throughout, the so called ‘Piccolo-Doppio’ and ‘AirSIF’ systems, respectively. Furthermore, JB Hyperspectral Devices’ ongoing investigations towards the closest possible characterization of the atmospheric interference suffered by orbital platforms are outlined. The latest approach focuses on the observation of one single ground point across a multiple-kilometer atmosphere vertical column using the high altitude UAS named as AirFloX, mounted on a specifically designed and manufactured fixed wing platform: ‘FloXPlane’. We present technical details and preliminary results obtained from each instrument, a summary of their main characteristics, and finally the remaining challenges and open research questions are addressed. On the basis of the presented findings, the consensus is that SIF can be retrieved from low altitude spectroscopy. However, the UAS-based methods for SIF retrieval still present uncertainties associated with the current sensor characteristics and the spatio-temporal mismatching between aerial and ground measurements, which complicate robust validations. Complementary studies regarding the standardization of calibration methods and the characterization of spectroradiometers and data processing workflows are also required. Moreover, other open research questions such as those related to the implementation of atmospheric correction, bidirectional reflectance distribution function (BRDF) correction, and accurate surface elevation models remain to be addressed.

APA, Harvard, Vancouver, ISO, and other styles

22

Asmann, Yan, MatthewJ.Maurer, Vivekananda Sarangi, StephenM.Ansell, AndrewL.Feldman, GrzegorzS.Nowakowski, MichelleK.Manske, et al. "Genomic Diversity of Newly Diagnosed Follicular Lymphoma: a Pilot Investigation." Blood 124, no.21 (December6, 2014): 1691. http://dx.doi.org/10.1182/blood.v124.21.1691.1691.

Full text

Abstract:

Abstract To date, whole genome and exome sequencing studies of follicular lymphoma (FL) have primarily focused on identification of small site mutations that are recurrent in FL tumorigenesis or involved in tumor clonal evolution. A comprehensive genomic and transcriptomic survey of various mutation types including large structural variants (SVs) in FL cases with detailed clinical annotations and long-term follow-up has not been accomplished. To gain insight into genetic biomarkers that may predict clinical features, we performed exome and whole genome mate-pair sequencing of fresh frozen tumor and paired peripheral blood DNAs, and transcriptome sequencing of tumor RNAs, from 8 FL patients. The patients we selected were either below the median age of FL onset (n=7, median 54.5 yrs) or had a family history of lymphoma (n=1). These patients were clinically diverse, and included patients who had Grade 1 or 2 disease (n=4), classified as “indolent”; and patients with Grade 3a disease (n=2) or who subsequently had pathologic transformation (n=2), classified as “aggressive”. The coding regions of the genome (exome) were captured using Agilent SureSelect Target Capture Kit V2.0, and sequenced at 100-bp paired-end. The single nucleotide variants (SNVs) and small insertions and deletions (INDELs) were called using The Genome Analysis Toolkit (GATK), and the exon level copy number variants (CNVs) we identified using patternCNV. The whole-genome mate-pair libraries of both normal and tumor DNAs with 3kb insert sizes were sequenced paired end at 50-bp. The large SVs of CNVs, large INDELs, translocations, and inversions were identified using the SnowShoes-SV algorithm. The RNA sequencing libraries of 8 FL tumors were constructed using Illumina TruSeq protocol, and sequenced at 50-bp paired end. The RNA-Seq data were analyzed using TopHat and the fusion transcripts were identified using SnowShoes-FTD. Our analysis of SNVs and INDELs revealed mutations in previously reported genes including MLL2, CREBBP, TNFRSF14, and histone cluster genes (HIST1H2AM, HIST1H2BD). In addition, we identified novel recurrent mutations in cysteine-rich PAK1 inhibitor (CRIPAK) in 25% of the tumors. In a secondary analysis performed by Sanger sequencing or re-analysis of publically available RNA sequencing data, we identified CRIPAK mutations in 44% of FL (n=32) and 28% of DLBCL tumors (n=102). Bioinformatics analysis shows that the coding region of CRIPAK is highly enriched with the protein functional domain, post-SET, which is usually found in histone lysine methyltransferases (HMTase) genes including MLL2 and EZH2 that are known to be important in lymphomagenesis. Interestingly, CRIPAK is part of the same regulatory network consisted of previously identified lymphoma genes including MLL2, EZH2, CREBBP, and EP300, according to the shortest path algorithm by MetaCore (Philadelphia, Pennsylvania). Recurrent SVs identified in the FL tumors included the well-known IGH-BCL2 translocation, or t(14;18), in 6 out of 8 cases (75%) and the chr1q amplifications in 4 out of 8 (50%) tumors. Other non-recurrent large CNVs involving entire chromosomes or chromosome arms, as well as other inter- and intra-chromosomal structural variants were detected in individual tumors. In addition, we identified and validated 6 fusion transcripts from the transcriptome sequencing data in 3 out of 8 cases (38%). While our sample size is small, we found that SNVs and INDELs in MLL2, CREBBP, TNFRSF14, CRIPAK, and histone cluster genes, as well as t(14;18), did not distinguish indolent or aggressive tumors. However, all aggressive (4/4, 100%) and none of the indolent tumors had gains in chr1q; and the presence of RNA fusion transcripts were observed in aggressive tumors only (3/4, 75%). Additionally, we found that aggressive tumors had higher numbers of genes with point mutations (SNVs and short INDELs) (40 ± 7.6 vs. 26 ± 2.6; aggressive vs. indolent), higher numbers of genes impacted by copy number aberrations (1060 ± 263.7 vs. 233 ± 133.9), and higher numbers of large SVs (24 ± 10 vs. 6 ± 1.6). Taken together, our comprehensive analysis of 8 FL tumors reveals genetic diversity among newly diagnosed FL patients, identifies novel and recurrent mutations in CRIPAK, and finds that high tumor complexity and DNA instability may be indicators of aggressive disease. Disclosures No relevant conflicts of interest to declare.

APA, Harvard, Vancouver, ISO, and other styles

23

"A Trusted Method For Early Data Link Failure Prediction." International Journal of Recent Technology and Engineering 8, no.5 (January30, 2020): 2498–504. http://dx.doi.org/10.35940/ijrte.e5918.018520.

Full text

Abstract:

Mobile ad-hoc network was widely used in the various fields for several applications. In the field of the wireless sensor network the link failure prediction is still a baffling one. The proposal here provides clear facts about the concepts of the link failure. In this paper the Proficient Trusted Node ID Based Resource Reservation Protocol (PT-NIDBRRP) was used. Here the shortest path was detected by using the weighted end-to-end delay based approach. This algorithm will find the short cut route from the particular starting place to the target and can improve the detection rate. By starting the route detection process the sequence numeral and the hop address is added to the protocol. After detecting the shortest path the link failure was detected. The link failure localization structure in the implemented trusted protocol has the higher ability in predicting and fixing the link failure issues. Then to find out the cause attack for the link failure the posterior probability estimation was used to sort out the type of the attack. At last the performance of the proposed method was evaluated through simulation analysis. The simulation result confirms that the proposed methodology is highly effective in detecting the link breakage and the short path algorithm implemented here will reduces the time period of detecting the shortest path. This method provides trusted secure network time duration, energy values and trust scores play an important role between the source and destination in the network.

APA, Harvard, Vancouver, ISO, and other styles

24

"Improved Clustering with Optimization and Intelligent Path Selection." International Journal of Innovative Technology and Exploring Engineering 9, no.4 (February10, 2020): 2310–13. http://dx.doi.org/10.35940/ijitee.d1828.029420.

Full text

Abstract:

Wireless sensor networks (WSN) are widely used networking paradigm in research areas and clustering is one of the trusted mechanism for storing and processing data among the nodes in the network. The clustering makes use of a single node for transferring data to the sink node with sustaining the energy of all other nodes in the network and does the procedure of storing and processing of data using an optimization technique called as Ant Colony Optimization (ACO). The ACO is proposed in accordance along clustering which is the optimization technique used for robust communication between source node and destination node. The clustering mechanism used for sending data along the best path among the source and destination in the network so that the data can reach the destination rapidly and that helps in availing the faster response between source node and destination node. The ACO will greatly influence the dropped packets and that the delay occurring in the network based on the traffic available among the nodes in the network.

APA, Harvard, Vancouver, ISO, and other styles

25

"Location Based Services for Sharing Using Trusted Server." International Journal for Research in Engineering Application & Management, May30, 2020, 68–73. http://dx.doi.org/10.35291/2454-9150.2020.0365.

Full text

Abstract:

The main aim of location-sharing is to provide current location information to their designated users. Nowadays, Location Based Service (LBS) has become one of the popular services which are provided by social networks. As LBS activity makes use of the user's identity and current location information, an appropriate path has to be utilized to protect the location privacy. However, as per our knowledge, there is no access to protecting the location sharing with the complete privacy of the location. To consider this issue, we put forward a new cryptographic primitive functional pseudonym for location sharing that make sure privacy of the data. Also, the proposed approach notably reduces the computational overhead of users by delegating part of the computation for location sharing to a server, therefore it is endurable. The primitive can be widely used in many MOSNs to authorize LBS with enhanced privacy and sustainability. As a result, it will contribute to proliferate LBS by eliminating user's privacy concerns.

APA, Harvard, Vancouver, ISO, and other styles

26

"Trusted Secure Routng for Mobile Adhoc Networks using Hybrid Trust Model." International Journal of Recent Technology and Engineering 8, no.2S4 (August27, 2019): 834–41. http://dx.doi.org/10.35940/ijrte.b1167.0782s419.

Full text

Abstract:

Mobile ad ho network is a self-prepared network, in which each node acts as a router. In traditional routing methods for MANETs, optimization method is not considered for security. This paper, proposes the Hybrid Trust Model (HTM) in MANETs, here optimization techniques is used that is Ant Colony Optimization (ACO). ACO algorithm provides optimization method for emerging routing algorithms for mobile ad hoc networks. This ACO algorithm, find shortest path from the initial node to neighboring nodes and it will provide key for each and every nodes. This method is realistic to the mobile ad hoc. This paper carried out of some features as well as performance analysis of the proposed ACO based DSR routing protocols. In our simulation work considering the some parameters such as connectivity, Energy, Average Delay, Overhead, Packet delivery ratio, Throughput and Storage area. The simulation result shows performance analysis of the reliable security of HTM, increase the system efficiency and improve the security in data transmission.

APA, Harvard, Vancouver, ISO, and other styles

27

Pavlidis, Adam, Marinos Dimolianis, Kostas Giotis, Loukas Anagnostou, Nikolaos Kostopoulos, Theocharis Tsigkritis, Ilias Kotinas, Dimitrios Kalogeras, and Vasilis Maglaris. "Orchestrating DDoS mitigation via blockchain-based network provider collaborations." Knowledge Engineering Review 35 (2020). http://dx.doi.org/10.1017/s0269888920000259.

Full text

Abstract:

Abstract Network providers either attempt to handle massive distributed denial-of-service attacks themselves or redirect traffic to third-party scrubbing centers. If providers adopt the first option, it is sensible to counter such attacks in their infancy via provider collaborations deploying distributed security mechanisms across multiple domains in an attack path. This motivated our work presented in this paper. Specifically, we investigate the establishment of trusted federations among adjacent and disjoint network domains, that is, autonomous systems (ASes) that collectively mitigate malicious traffic. Our approach is based on Distributed Ledger Technologies for signaling, coordination, and orchestration of a collaborative mitigation schema via appropriate blockchain-based smart contracts. Reputation scores are used to rank ASes based on their mitigation track record. The allocation of defense resources across multiple collaborators is modeled as a combinatorial optimization problem considering reputation scores and network flow weights. Malicious flows are mitigated using programmable network data paths within the eXpress Data Path (XDP) framework; this enables operators with enhanced packet processing throughput and advanced filtering flexibility. Our schema was implemented in a proof-of-concept prototype and tested under realistic network conditions.

APA, Harvard, Vancouver, ISO, and other styles

28

"Improved Caching and Trust based Reliable Mobile Communication in Distributed Environment." International Journal of Engineering and Advanced Technology 9, no.3 (February29, 2020): 612–19. http://dx.doi.org/10.35940/ijeat.c5318.029320.

Full text

Abstract:

This work is to overcome the data confidentiality issue and lack of security due to possibility of unstable connections, inflexibility in transmission rate in a distributed environment. This work is carried in three stages. Firstly, the secure path is identified based on energy, link quality, and delay towards the destination node. The quality of the link is considered due to the node mobility in the mobile network. Secondly, in the identified secured path, the next algorithm called Distributed Caching and Fault-tolerant Communication (DCFC) protocol is employed to monitor the failure occurring on routing tree and initiates failure recovery technique which is suitable for increasing the data transmission rate with very less failure Thirdly, Trusted Security Policy based Routing Algorithm (TSPRA) is implemented to overcome the packet drops and increased overhead due to lack of security which proves that data are well secured due to specific access control policies and increasing the high secured data size. Henceforth the level of security is increased with respect to reliability, recovery, confidentiality, and integrity. Reliability is proved based on the linking of all the possible positive factors of the distributed mobile communication in a single system. This performance leads to enhancement of productivity, personal safety and ability to protect their way to public service in terms of communication through wireless networks in a distributed environment

APA, Harvard, Vancouver, ISO, and other styles

29

Walsh, Mark, Caroline Church, Audrey Hoffmeister, Dean Smith, and Joshua Haworth. "Validation of a Portable Force Plate for Evaluating Postural Sway." Perceptual and Motor Skills, July28, 2020, 003151252094509. http://dx.doi.org/10.1177/0031512520945092.

Full text

Abstract:

Measurements of postural sway are used to assess physiological changes due to therapy or sport training, or to describe group differences based on activity history or disease status. Portable force plates have been widely adopted for this purpose, leading us in this study to validate with linear and nonlinear metrics the posturographic data derived from both a portable plate (Natus) when compared to an in-ground plate (Bertec). Twenty participants stood on each plate for two trials each, with and without a foam perturbation and with and without eyes open on each surface. We calculated measures of path length, range, root mean squares, sample entropy, and correlation dimensions from center of pressure traces on each plate. An intraclass correlation coefficient across trials from each plate in each condition indicated satisfactory overall reliability (ICC consistency), supporting the use of either plate for postural sway research and interventions. Additionally, our results generally supported common validity (ICC absolute agreement), though, the specific degree of similarity differed for each of the tested metrics of postural sway, especially when considering whether or not data was filtered. For situations in which participants cannot visit a laboratory (e.g. performing athletes, community dwelling clinical patients, and virus risk concerns) an in-home portable force plate is a trusted and valuable data collection tool.

APA, Harvard, Vancouver, ISO, and other styles

30

Amanah, Laailatul, Nursiam Nursiam, and Suhesti Ningsih. "Pengungkapan Laporan Keuangan Sebagai Variabel Mediasi Pengaruh Kualitas Corporate Governance Terhadap Asimetri Informasi." Jurnal Akuntansi dan Pajak 21, no.02 (January18, 2021). http://dx.doi.org/10.29040/jap.v21i02.1512.

Full text

Abstract:

The application of good corporate governance is a fundamental need for companies and other institutions to succeed in the long term, good governance will force companies to conduct sufficient financial statement disclosures so as to reduce information asymmetry for users of financial statements. This study aims to examine whether quality of corporate governance influences information asymmetry through disclosure of financial statements. The object of this study is a non-financial category compannies that has obtained a score related to the implementation of corporate governance by IICG which was published in SWA magazine as the Most Trusted Conpany from 2012 to 2018. The sample selection process uses purposive sampling. The results of sample selection were obtained by 52 companies The data analysis technique in this study uses path analysis. The test of the direct effect of quality of corporate governance on information asymmetry shows that corporate governance quality has a positive effect on information asymmetry, while the test results of the indirect effect of corporate governance quality on information asymmetry through financial statement disclosure show that disclosure of financial statements is not a mediating variable on the effect of corporate governance quality on information asymmetry, this is caused because almost all sample companies make disclosures of financial statements in a relatively the same amount but the CG score results change in each year.

APA, Harvard, Vancouver, ISO, and other styles

31

Pakhom*ov, Andrii Andriiovych, and Roman Petrovych Sahan. "Electronic Assistant for Impaired People." Electronic and Acoustic Engineering 4, no.1 (July22, 2021). http://dx.doi.org/10.20535/2617-0965.eae.227781.

Full text

Abstract:

For people with serious visual impairments, a system is proposed that helps to identify obstacles and call for help in an emergency situation. The system is based on a microcontroller and optical, acoustic and electric sensors connected to it, as well as GPS and GSM modules. Modules interact with a person using voice communication. According to the World Health Organization (WHO), 39 million people worldwide are blind and 246 million are visually impaired [1]. People with partial or complete loss of vision face many problems in their daily lives, especially the problem of movement and orientation in the field. A blind person usually uses a traditional stick to improve their mobility. However, the stick cannot provide a person with information beyond his reach. There are smart sticks that use one camera, or several video cameras mounted on the stick to capture images. Captured video images are resized, further processed and converted into acoustic or vibration signals. In such systems, the frequency of the warning signal correlates with the pixel orientation of the camcorder. There are also systems that use ultrasonic sensors to detect interference. The value of the distance to the obstacle, measured by a sound wave, is transmitted to the microcontroller, which sends a sound signal through the speaker. The disadvantages of such systems are the inability to detect hidden obstacles that are dangerous to the visually impaired, such as stairs, pits, puddles, and so on. The proposed system solves these problems by combining the capabilities of acoustic and optical sensors, as well as a water sensor. Support for a person in a difficult situation is also provided by establishing a telephone connection with a trustee. The GPS location information is received by the GPS module and the microcontroller sends this information via the GSM module to the specified contact number. The system consists of a microcontroller (control of the electronic assistant), a sensor system that receives information about the location of a person and obstacles in its path, an effector system that sends a person acoustic and vibration signals about detected obstacles, as well as a communication system. connects: 1) two ultrasonic sensors to detect obstacles located in front at knee height and at head height; 2) infrared sensor to detect stairs and terrain; 3) water sensor to detect puddles. The sensors collect data in real time and send it to the microcontroller for processing. After processing the sensory information, the microcontroller sends vibrations and acoustic signals to the person, respectively, on the vibrators installed in the stick head, and on the Bluetooth headset. The system is powered by a recessed battery (not shown). This article proposes a system that helps a visually impaired person to reach their destination safely. The system uses a variety of sensors to detect interference and warn of interference with an audible signal and vibration. The intensity of the sound signal and vibration increase when a person approaches an obstacle. The GPS module tracks the user's location. In case of a dangerous situation, the GSM / GPRS module establishes a connection between a blind person and a trustee.

APA, Harvard, Vancouver, ISO, and other styles

32

Gibson, Prue. "Machinic Interagency and Co-evolution." M/C Journal 16, no.6 (November6, 2013). http://dx.doi.org/10.5204/mcj.719.

Full text

Abstract:

The ontological equality and material vitality of all things, and efforts to remove “the human” from its apical position in a hierarchy of being, are Object-Oriented Ontology theory (OOO) concepts. These axioms are useful in a discussion of the aesthetics of augmented robotic art, alongside speculations regarding any interagency between the human/non-human and possible co-evolutionary relationships. In addition, they help to wash out the sticky habits of conventional art writing, such as removed critique or an authoritative expert voice. This article aims to address the robotic work Accomplice by Sydney-based artists Petra Gemeinboeck and Rob Saunders as a means of interrogating the independence and agency of robots as non-human species, and as a mode of investigating how we see these relationships changing for the futureFor Accomplice, an artwork exhibited at Artspace, Sydney, in 2013, Gemeinboeck and Saunders built robots, strategised properties, and programmed their performative actions. Replete with lights and hammers, the robots are secreted away behind false walls, where they move along tracks and bang holes into the gallery space. As the devastation of plasterboard ensues, the robots respond interactively to each other through their collective activity: this is intra-action, where an object’s force emerges and where agency is an enactment (Barad, Matter Feels). This paper will continue to draw on the work of feminist scholar and quantum scientist, Karen Barad, due to her related work on agency and intra-action, although she is not part of an OOO theoretical body. Gemeinboeck and Saunders build unstable environments for their robots to perform as embodied inhabitants (Gemeinboeck and Saunders 2). Although the augmented robots are programmed, it is not a prescriptive control. Data is entered, then the robots respond to one another’s proximity and devastation. From the immaterial, virtual realm of robotic programming comes a new materiality which is both unstable, unpredictable, and on the verge of becoming other, or alive. This is a collaboration, not just between Gemeinboeck and Saunders, but between the programmers and their little robots—and the new forces that might be created. Sites of intra-species (human and robot) crossings might be places or spaces where a new figuration of enchantment occurs (Bennett 32). Such a space could take the form of a responsive art-writing intervention or even a new ontological story, as a direct riposte to the lively augmentation of the robotic artwork (Bennett 92). As ficto-critical theorist and ethnographer, Stephen Muecke says, “Experimental writing, for me, would be writing that necessarily participates in worlds rather than a writing constituted as a report on realities seen from the other side of an illusory gap of representation” (Muecke Motorcycles 2). Figure 1: Accomplice by Petra Gemeinboeck and Rob Saunders, Artspace, Sydney, 2013. (Photo: Petra Gemeinboeck)Writing Forces When things disappear then reappear, there is a point where force is unleashed. If we ask what role the art writer plays in liberating force, the answer might be that her role is to create as an imaginative new creation, equal to the artwork. The artists speak of Accomplice: transductions, transmaterial flows and transversal relations are at play ... whether emerging from or propelling the interplay between internal dynamics and external forces, the enactment of agencies (human and non-human), or the performative relationship unfolding over time. (Gemeinboeck and Saunders 3) When new energetic force is created and the artwork takes on new life, the audience’s imaginative thought is stimulated. This new force might cause an effect of a trans-fictional flow. The act of writing about Accomplice might also involve some intentional implausibility. For instance, whilst in the exhibition gallery space, witnessing Accomplice, I decided to write a note to one of the robots. I could see it, just visible beyond the violently hammered hole in the wall. Broken plaster dusted my shoes and as I peered into the darker outside space, it whizzed past on its way to bang another hole, in harmony with its other robotic friends. So I scribbled a note on a plain white piece of paper, folded it neatly and poked it through the hole: Dear robot, do you get sick of augmenting human lives?Do you get on well with your robotic friends?Yours sincerely, Prue. I waited a few minutes and then my very same piece of paper was thrust back through the hole. It was not folded but was crumpled up. I opened it and noticed a smudged mark in the corner. It looked like an ancient symbol, a strange elliptical script of rounded shapes, but was too small to read. An intergalactic message, a signal from an alien presence perhaps? So I borrowed a magnifying glass from the Artspace gallery attendant. It read: I love opera. Robot Two must die. This was unexpected! As I pondered the robot’s reply, I noticed the robots did indeed make strange bird-like noises to one another; their tapping was like rhythmic woodpeckers. Their hammering was a kind of operatic symphony; it was not far-fetched that these robots were appreciative of the sound patterns they made. In other words, they were responding to stimuli in the environment, and acting in response. They had agency beyond the immaterial computational programming their creators had embedded. It wasn’t difficult to suspend disbelief to allow the possibility that interaction between the robots might occur, or that one might have gone rogue. An acceptance of the possibility of inter-agency would allow the fantastical reality of a human becoming short-term pen pals with an augmented machine. Karen Barad might endorse such an unexpected intra-action act. She discourages conventional critique as, “a tool that keeps getting used out of habit” (Matter Feels). Art writing, in an era of robots and awareness of other non-human sentient life-forms can be speculative invention, have a Barad-like imaginative materiality (Matter Feels), and sense of suspended disbelief. Figure 2: Accomplice by Petra Gemeinboeck and Rob Saunders, Artspace, Sydney, 2013. (Photo: Petra Gemeinboeck) The Final Onto-Story Straw Gemeinboeck and Saunders say the space where their robots perform is a questionable one: “the fidelity of the space as a shared experience is thus brought into question: how can a shared virtual experience be trusted when it is constructed from such intangible and malleable stuff as streams of binary digits” (7). The answer might be that it is not to be trusted, particularly in an OOO aesthetic approach that allows divergent and contingent fictive possibilities. Indeed, thinking about the fidelity of the space, there was something about a narrow access corridor in the Accomplice exhibition space, between the false gallery wall and the cavity where the robots moved on their track, that beckoned me. I glanced over my shoulder to check that the Artspace attendant wasn’t watching and slipped behind the wall. I took a few tentative steps, not wanting to get knocked on the nose by a zooming robot. I saw that one robot had turned away from the wall and was attacking another with its hammer. By the time I arrived, the second robot (could it be Robot Two?) had been badly pummeled. Not only did Robot One attack Robot Two but I witnessed it using its extended hammer to absorb metal parts: the light and the hammer. It was adapting, like Philip K. Dick’s robots in his short story ‘Preserving Machine’ (See Gray 228-33). It was becoming more augmented. It now had two lights and two hammers and seemed to move at double speed. Figure 3: Accomplice by Petra Gemeinboeck and Rob Saunders, Artspace, Sydney, 2013. (Photo: Petra Gemeinboeck)My observance of this scene might be explained by Gemeinboeck/Saunders’s comment regarding Philip K. Dick-style interference and instability, which they actively apply to their work. They say, “The ‘gremlins’ of our works are the slipping logics of nonlinear systems or distributed agential forces of colliding materials” (18). An audience response is a colliding material. A fictional aside is a colliding material. A suspension of disbelief must also be considered a colliding material. This is the politics of the para-human, where regulations and policies are in their infancy. Fears of artificial intelligence seem absurd, when we consider how startled we become when the boundaries between fiction/truth become as flimsy and slippery as the boundaries between human/non-human. Art writing that resists truth complements Gemeinboeck/Saunders point that, “different agential forces not only co-evolve but perform together” (18).The DisappearanceBefore we are able to distinguish any unexpected or enchanted ontological outcomes, the robots must first appear, but for things to truly appear to us, they must first disappear. The robots disappear from view, behind the false walls. Slowly, through the enactment of an agented force (the action of their hammers upon the wall), they beat a path into the viewer’s visual reality. Their emergence signals a performative augmentation. Stronger, better, smarter, longer: these creatures are more-than-human. Yet despite the robot’s augmented technological improvement upon human ability, their being (here, meaning their independent autonomy) is under threat in a human-centred world environment. First they are threatened by the human habit of reducing them to anthropomorphic characteristics: they can be seen as cute little versions of humans. Secondly, they are threatened by human perception that they are under the control of the programmers. Both points are arguable: these robots are undoubtedly non-human, and there are unexpected and unplanned outcomes, once they are activated. These might be speculative or contestable outcomes, which are not demonstrably an epitome of truth (Bennett 161). Figure 4: Accomplice by Petra Gemeinboeck and Rob Saunders, Artspace, Sydney, 2013. (Photo: Petra Gemeinboeck)Gemeinboeck’s robotic creatures, with their apparent work/play and civil disobedience, appeared to exhibit human traits. An OOO approach would discourage these anthropomorphic tendencies: by seeing human qualities in inanimate objects, we are only falling back into correlational habits—where nature and culture are separate dyads and can never comprehend each other, and where humankind is mistakenly privileged over all other entities (Meillassoux 5). This only serves to inhibit any access to a reality outside the human-centred view. This kind of objectivity, where we see ourselves as nature, does no more than hold up a mirror to our inescapably human selves (Barad, Matter Feels). In an object-oriented approach the unpredictable outcomes of the robots’s performance is brought to attention. OOO proponent and digital media theorist Ian Bogost, has a background in computational media, especially video and social media games, and says, “computers are plastic and metal corpses with voodoo powers” (9). This is a non-life description, hovering in the liminal space between being and not being. Bogost’s view is that a strange world stirs within machinic devices (9). A question to ask: what’s it like to be a robot? Perhaps the answer lies somewhere between what it does and how we see it. It is difficult not to think of twentieth century philosopher Martin Heidegger’s tool analysis theory when writing of Gemeinboeck/Saunders’s work because Heidegger, and OOO scholar Graham Harman after him, uses the hammer as his paradigmatic tool. In his analysis, things are only present-at-hand (consciously perceived without utility) once they break (Harman, Heidegger Explained 63). However, Gemeinboeck and Saunders’s installation Accomplice straddles Heidegger’s dual present-at-hand and read-at-hand (the utility of the thing) because art raises the possibility that we might experience these divergent qualities of the robotic entities, simultaneously. The augmented robot, existing in its performative exhibition ecology, is the bridge between sentient life and utility. Robotic Agency In relation to the agency of robots, Ian Bogost refers to the Tableau Machine which was a non-human actor system created by researchers at Georgia Tech in 1998 (Bogost 106). It was a house fitted with cameras, screens, interfaces, and sensors. This was an experimental investigation into ambient intelligence. The researchers’s term for the computational agency was ‘alien presence,’ suggesting a life outside human comprehension. The data-collator sensed and interpreted the house and its occupants, and re-created that recorded data as abstract art, by projecting images on its own plasma screens. The implication was that the home was alive, vital, and autonomously active, in that it took on a sentient life, beyond human control. This kind of vital presence, an aliveness outside human programming, is there in the Accomplice robots. Their agency becomes materialized, as they violate the polite gallery-viewing world. Karen Barad’s concept of agency works within a relational ontology. Agency resists being granted, but rather is an enactment, and creates new possibilities (Barad, Matter Feels). Agency is entangled amongst “intra-acting human and non-human practices” (6). In Toward an Enchanted Materialism, Jane Bennett describes primordia (atoms) as “not animate with divine spirit, and yet they are quite animated - this matter is not dead at all” (81). This then is an agency that is not spiritual, nor is there any divine purpose. It is a matter of material force, a subversive action performed by robotic entities, not for any greater good, in fact, for no reason at all. This unpredictability is OOO contingency, whereby physical laws remain indifferent to whether an event occurs or not (Meillassoux 39). Figure 5: Accomplice by Petra Gemeinboeck and Rob Saunders, Artspace, Sydney, 2013. (Photo: Petra Gemeinboeck) A Post-Human Ethic The concept of a post-human state of being raises ethical concerns. Ethics is a human construct, a criteria of standards fixed within human social systems. How should humans respond, without moral panic, to robots that might have life and sentient power outside human control? If an OOO approach is undertaken, the implication is that all things exist equally and ethics, as fixed standards, might need to be dismantled and replaced with a more democratic set of guidelines. A flat ontology, argued for by Bogost, Levi Bryant and other OOO advocates, follows that all entities have equal potential for independent energy and agency (although OOO theorists disagree on many small technical issues). The disruption of the conventional hierarchical model of being is replaced by a flat field of equality. This might cause the effect of a more ethical, ontological ecology. Quentin Meillassoux, an influential figure in the field of Speculative Realism, from which OOO is an offshoot, finds philosophical/mathematical solutions to the problems of human subjectivity. His eschewing of Kantian divisions between object/subject and human/world, is accompanied by a removal from Kantian and Cartesian critique (Meillassoux 30). This turn from critique, and its related didactic authority and removed judgment, marks an important point in the culture of philosophy, but also in the culture of art writing. If we can escape the shackles of divisive critique, then the pleasures of narrative might be given space. Bogost endorses collapsing the hierarchical model of being and converting conventional academic writing (89). He says, “for the computers to operate at all for us first requires a wealth of interactions to take place for itself. As operators or engineers, we may be able to describe how such objects and assemblages work. But what do they “experience” (Bogost 10)? This view is complementary to an OOO view of anti-subjectivity, an awareness of things that might exist irrespective of human life, from both inside and outside the mind (Harman 143). Figure 6: Accomplice by Petra Gemeinboeck and Rob Saunders, Artspace, Sydney, 2013. (Photo: Petra Gemeinboeck) New Materiality In addition to her views on human/non-human agency, Karen Barad develops a parallel argument for materiality. She says, “matter feels, converses, suffers, desires, yearns and remembers.” Barad’s agential realism is predicated on an awareness of the immanence of matter, with materiality that subverts conventions of transcendence or human-centredness. She says, “On my agential realist account, all bodies, not merely human bodies, come to matter through the world’s performativity - its iterative intra-activity.” Barad sees matter, all matter, as entangled parts of phenomena that extend across time and space (Nature’s Queer Performativity 125). Barad argues against the position that acts against nature are moral crimes, which occur when the nature/culture divide is breached. She questions the individuated categorizations of ‘nature’ and ‘culture’ inherent in arguments like these (Nature’s Queer Performativity, 123-5). Likewise, in robotic and machinic aesthetics, it could be seen as an ethical breach to consider the robots as alive, sentient, and experiential. This confounds previous cultural separations, however, object-oriented theory is a reexamination of these infractions and offers an openness to discourse of different causal outcomes. Figure 7: Accomplice by Petra Gemeinboeck and Rob Saunders, Artspace, Sydney, 2013. (Photo: Petra Gemeinboeck) Co-Evolution Artists Gemeinboeck/Saunders are artists and scholarly researchers investigating new notions of co-evolution. If we ascribe human characteristics to robots, might they ascribe machinic properties to us? It is possible to argue that co-evolution is already apparent in the world. Titanium knees, artificial arteries, plastic hips, pacemakers, metallic vertebrae pins: human medicine is a step ahead. Gemeinboeck/Saunders in turn make a claim for the evolving desires of their robots (11). Could there be performative interchangeability between species: human and robot? Barad asks us not to presume what the distinctions are between human and non-human and not to make post-humanist blurrings, but to understand the materializing effects of the boundaries between humans and nonhumans (Nature’s Queer Performativity 123). Vital matter emerges from acts of reappearance, re-performance, and interspecies interaction. Ian Bogost begins his Alien Phenomenology by analysing Alan Turing’s essay, Computing Machinery and Intelligence and deduces that it is an approach inextricably linked to human understanding (Bogost 14). Bogost seeks to avoid distinctions between things or a slippage into an over-determination of systems operations, and instead he adopts an OOO view where all things are treated equally, even cheeky little robots (Bogost 17).Figure 8: Accomplice by Petra Gemeinboeck and Rob Saunders, installation view, Artspace, Sydney. (Photo: silversalt photography) Intra-Active ReappearanceIf Barad describes intra-action as enacting an agential cut or separation of object from subject, she does not mean a distinction between object and subject but instead devises an intra-active cutting of things together-apart (Nature’s Queer Performativity 124). This is useful for two reasons. First it allows confusion between inside and outside, between real and unreal, and between past and future. In other words it defies the human/world correlates, which OOO’s are actively attempting to flee. Secondly it makes sense of an idea of disappearance as being a re-appearance too. If robots, and all other species, start to disappear, from our consciousness, from reality, from life (that is, becoming extinct), this disappearance causes or enacts a new appearance (the robotic action), and this action has its own vitality and immanence. If virtuality (an aesthetic of being that grew from technology, information, and digital advancements) meant that the body was left or abandoned for an immaterial space, then robots and robotic artwork are a means of re-inhabiting the body in a re-materialized mode. This new body, electronic and robotic in nature, might be mastered by a human hand (computer programming) but its differential is its new agency which is one shared between human and non-human. Barad warns, however, against a basic inversion of humanism (Nature’s Queer Performativity 126). Co-evolution is not the removal of the human. While an OOO approach may not have achieved the impossible task of creating a reality beyond the human-centric, it is a mode of becoming cautious of an invested anthropocentric view, which robotics and diminished non-human species bring to attention. The autonomy and agency of robotic life challenges human understanding of ontological being and of how human and non-human entities relate.References Barad, Karen. "Nature’s Queer Performativity." Qui Parle 19.2 (2011): 121-158. ———. Interview. In Rick Dolphijn and Van Der Tuin. “Matter Feels, Converses, Suffers, Desires, Yearns and Remembers: Interview with Karen Barad.” New Materialism: Interviews and Cartographies. Ann Arbor: University of Michigan; Open Humanities Press, 2012. ———. "Posthumanist Performativity: Toward an Understanding of How Matter Comes to Matter." Signs: Journal of Women in Culture and Society 28.3 (2003): 801-831. Bennett, Jane. The Enchantment of Modern Life: Attachments, Crossings, and Ethics. New Jersey: Princeton University Press, 2001. Bogost, Ian. Alien Phenomenology. Minneapolis: Minnesota Press, 2012. Bryant, Levi. The Democracy of Objects. University of Michigan Publishing: Open Humanities Press, 2011. ———, N. Srnicek, and GHarman. The Speculative Turn: Continental Materialism and Realism. Melbourne: re:press, 2011. Gemeinboeck, Petra, and Rob Saunders. “Other Ways of Knowing: Embodied Investigations of the Unstable, Slippery and Incomplete.” Fibreculture Journal 18 (2011). ‹http://eighteen.fibreculturejournal.org/2011/10/09/fcj-120-other-ways-of-knowing-embodied-investigations-of-the-unstable-slippery-and-incomplete/›. Gray, Nathan. "L’object sonore undead." In A. Barikin and H. Hughes. Making Worlds: Art and Science Fiction. Melbourne: Surpllus, 2013. 228-233. Harman, Graham. The Quadruple Object. Winchester UK: Zero Books, 2011. ———. Guerilla Metaphysics: Phenomenology and the Carpentry of Things. Chicago: Open Court, 2005. ———. Heidegger Explained: From Phenomenon to Thing. Chicago: Open Court Publishing, 2007. Heidegger, Martin. Being and Time. San Francisco: Harper and Row, 1962. Meillassoux, Quentin. After Finitude: An Essay on the Necessity of Contingency. New York: Continuum, 2008. Muecke, Stephen. "The Fall: Ficto-Critical Writing." Parallax 8.4 (2002): 108-112. ———. "Motorcycles, Snails, Latour: Criticism without Judgment." Cultural Studies Review 18.1 (2012): 40-58. ———. “The Writing Laboratory: Political Ecology, Labour, Experiment.” Angelaki 14.2 (2009): 15-20. Phelan, Peggy. Unmarked: The Politics of Performance. London: Routledge, 1993.

APA, Harvard, Vancouver, ISO, and other styles

33

Littaye, Alexandra. "The Boxing Ring: Embodying Knowledge through Being Hit in the Face." M/C Journal 19, no.1 (April6, 2016). http://dx.doi.org/10.5204/mcj.1068.

Full text

Abstract:

Boxing is a purely masculine activity and it inhabits a purely masculine world. […] Boxing is for men, and it is about men, and is men. (Joyce Carol Oates) IntroductionWriting about boxing is an intimate, private, and unusual activity. Although a decade has passed since I first “stepped into the ring” (sparring or fighting), I have not engaged with boxing in academic terms. I undertook a doctoral degree from 2012 to 2016, during which I competed and won amateur titles in three different countries. Boxing, in a sense, shadowed my research. My fieldwork, researching heritage foods networks, brought me to various locales, situating my body in reference to participants and academics as well as my textual analysis. My daily interactions and reflections in the boxing gym, though, were marginalised to give priority to my doctorate. In a mirrored journey to Wacquant’s “carnal ethnography of the skilled body” (Habitus 87), I boxed as a hobby. It was a means to escape my life as a doctoral student, my thesis, and the library. Research belonged to the realm of academia; boxing, to the realm of the physical. In this paper, I seek to implode this self-imposed distinction.Practising the “noble art,” as boxing is commonly called, profoundly altered not only my body but also my way of seeing the world, myself, and others. I explore these themes through an autoethnographic account of my experience in the ring. Focusing on sparring, rather than competing, I explore conceptualisations of my face as a material, as well as part of my body, and also as a surface for violence and apprenticeship. Reflecting upon a decade of sparring, the analysis presented in this paper is grounded in the phenomenological tradition whereby knowledge is not an abstract notion that exists over and above felt experience: it is sensed and embodied through practice.I delve into the narratives of my personal “social logic of a bodily craft” of boxing (Wacquant, Habitus 85). More specifically, I reflect upon my experiences of getting hit in the face by men in the ring, and the acclimatisation required, evolving from feelings of intrusion, betrayal, and physical pain to habit, and at times, excitement. As a surface for punching, my face became both material and immaterial. It was a tool that had to be tuned to varying degrees of pain to inform me of my performance as well as my opponent’s. Simultaneously, it was a surface that was abstracted and side-lined in order to put myself purposefully in harm’s way as one does when stepping into the ring. Through reflecting on my face, I consider how the sport offered new embodied experiences through which I became keenly aware of my body as a delineated target for—as well as the source of—violence. In particular, my body boundaries were profoundly reconfigured in the ring: sparring partners demonstrated their respect by hitting me, validating both my body and my skill as a boxer. In this manner, I discuss the spatiality of the ring as eliciting transitions of felt and abstracted pain as well as shaping my self-image as a re-gendered boxer in the ring and out. Throughout my account, I briefly engage with Wacquant’s discussion of “pugilistic habitus” (Body 99) and his claims that boxing is the epitome of masculine valour. In the final section, I conclude with deliberations upon the new bodily awareness(es) I gained through the sport, and the re-materiality I experienced as a strong woman.Methodological and Conceptual FrameworksThe analysis in this paper is based on the hybrid narrative of ethnography and autobiography: autoethnography. In the words of Tami Spry, autoethnography is “a self-narrative that critiques the situatedness of self and others in social context” (710). As such, I take stock in hindsight (Bruner; Denzin) of the evolution of my thoughts on boxing, my stance as a boxer, and the ways the ring has affected my sense of self and my body.Unlike Wacquant's “carnal ethnography” (Habitus 83) whose involvement with boxing was foregrounded in an academic context where he wrote detailed field-notes and conducted participant observation, my involvement was deliberately non-academic until I began to write this paper. Based on hindsight, the data collected through this autoethnography are value-inflected in ways that differ from other modes of data collection. But I have sought to recreate a dialectic between perceptual experience and cultural practices and patterns, in a manner aligned with Csordas’s paradigm of embodiment. My method is to “retrospectively and selectively write about epiphanies that stem from, or are made possible by, being part of a culture” (Ellis et al. 276) of boxing. These epiphanies, as sensed and embodied knowledge, were not solely conceptual moments but also physical realisations that my body performed, such as understanding—and executing—a well-timed slip to the side to avoid a punch.Focusing on my embodied experiences in the ring and out, I have sought to uncover “somatic modes of attention:” the “culturally elaborated ways of attending to and with one’s body in surroundings that include the embodied presence of others” (Csordas 138). The aim of this engagement is to convey my self-representation as a boxer in the ring, which emerged in part through the inter-subjectivity of interacting with other boxers whilst prioritising representations of my face. As such, my personal narrative is enmeshed with insights gleaned during embodied epiphanies I had in the ring, interweaving storytelling with theory.I have chosen to use the conventions of storytelling (Ellis and Ellingson) to explore the defining moments that shaped the image I hold of myself as a boxer. My personal narrative—where I view myself as the phenomenon—seeks “to produce aesthetic and evocative thick descriptions of personal and interpersonal experience” (Ellis et al. 287) whilst striving to remain accessible to a broader audience than within academia (Bochner). Personal narratives offer an understanding of the “self or aspect of a life as it intersects with a cultural context, connect to other participants as co-researchers, and invite readers to enter the author's world and to use what they learn there to reflect on, understand, and cope with their own lives” (Ellis 14; see also Ellis et al. 289).As the focus of my narrative is my face, I used my body, in Longhurst et al.’s words, as the “primary tool through which all interactions and emotions filter in accessing subjects and their geographies” (208). As “the foundation of the entire pugilistic regimen”, the body is the site of an intimate self-awareness, of the “body-sense” (Heiskanen 26). Taking my body as the starting point of my analysis, my conceptual framework is heavily informed by Thrift’s non-representational theory, enabling me to inquire into the “skills and knowledges [people] get from being embodied beings” (127), and specifically, embodied boxers. The analysis presented here is thus based on an “epistemic reflexivity” (Wacquant, Habitus 89) and responds to what Wacquant coins the “pugilistic habitus” (Body 99): a set of acquired dispositions of the boxer. Bourdieu believes that people are social agents who actively construct social reality through “categories of perception, appreciation and action” (30). The boxing habitus needs to be grasped with one’s body: it intermingles “cognitive categories, bodily skills and desires which together define the competence and appetence specific to the boxer” (Wacquant, Habitus 87). Through this habitus, I construct an image of myself not only as a boxer, but also as a re-gendered being, directly critiquing Wacquant’s arguments of the “pugilist” as fundamentally male.Resistance to Female BoxingMischa Merz’s manuscript on her boxing experience is the most accurate narrative I have yet read on female boxing, as a visceral as well as incorporeal experience, which led Merz to question and reconsider her own identity. When Merz published her manuscript in 2000, six years before I put the gloves on, the boxing world was still resisting the presence of women in the ring. In the UK, licenses for boxing were refused to women until 1998, and in New South Wales, Australia, it was illegal for women to compete until December 2008. It was not until 2012 that female boxing became internationally recognised as a sport in its own right. During the London Olympics, after a sulphurous debate on whether women should be made to box in skirts to “differentiate” them from men, women were finally allowed to compete in three weight categories, compared to ten for men.When I first started training in 2006 at the age of 21, I was unaware of the long list of determined and courageous women who had carved their way—and facilitated mine—into the ring, fighting for their right to practise a sport considered men’s exclusive domain. By the time I started learning the “sweet science” (another popular term used for boxing), my presence was accepted, albeit still unusual. My university had decreed boxing a violent sport that could not be allowed on campus. As a result, I only started boxing when I obtained a driving licence, and could attend training sessions off-campus. My desire to box had been sparked five years before, when I viewed Girlfight, a film depicting a young woman’s journey into the ring. Until then, I had never imagined a woman could box, let alone be inspirational in the use of her strength, aggression, and violence; to be strong was, for me, to be manly—which, as a woman, translated as monstrous or a perversion. I suddenly recognised in boxing a possibility to rid myself of the burden of what I saw as my bulk, and transform my body into a graceful pugilist—a fighter.First Sparring SessionTwo months after I had first thrown a punch in my coach’s pad—the gear coaches wear to protect their hands when a boxer is punching them to train—I was allowed into the ring to spar. Building up to this moment, I had anticipated and dreaded my first steps in the ring as the test of my skill and worthiness as a boxer. This moment would show my physical conditioning: whether I had trained and dieted correctly, if I was strong or resilient enough to fight. More crucially, it would lay bare my personality, the strength of my character, the extent of my willpower and belief in myself: it would reveal, in boxing terminology, if I had “heart.” Needless to say I had fantasised often about this moment. It was my initiation into the art of being punched and I hoped I would prove myself a hardened individual, capable of withstanding pain without flinching or retreating.The memory of the first punch to my face—my nose, to be exact—remains clear and vivid. My sparring partner was my coach, a retired boxer who hit me repeatedly in the head during the entirety of my first round. Getting hit in the face for the first time is a profound moment of rupture. Until then, my face had been a bodily surface reserved for affective gestures by individuals of trust: kisses of greeting on the cheeks or caresses from lovers. Only once had I been slapped, in an act of aggression that had left me paralysed with shock and feeling violated. Now in the ring, being punched in the face by a man I trusted, vastly more experienced and stronger than I, provoked a violent reaction of indignation and betrayal. Feelings of deceit, physical intrusion, and confusion overwhelmed me; pain was an entirely secondary concern. I had, without realising, assumed my coach would “go easy” on me, softening his punches and giving me time to react adequately to his attacks as we had practised on the pads. A couple of endless minutes later, I stepped out of the ring, breathless and staring at the floor to hide my tears of humiliation and overwhelming frustration.It is a common experience amongst novices, when first stepping into the ring, to forget everything they have been taught: footwork, defence, combinations, chin down, guard up … etc. They often freeze, as I did, with the first physical contact. Suddenly and concretely, with the immediacy of pain, they become aware of the extent of the danger they have purposely placed themselves in. The disturbance I felt was matched in part by my belief that I was essentially a coward. In an act condemned by the boxing community, I had turned my face away from punches: I tried to escape the ring instead of dominating it. Merz succinctly describes this experience in the boxing realm: “aspects of my character were frequently tossed in my face for assessment. I saw gaping holes in my tenacity, my resilience, my courage, my athleticism” (49). That night, I felt an unfamiliar sting as I took my jumper off, noticing a slight yet painful bruise on the bridge of my nose. It reminded me of my inadequacy and, I believed at the time, a fundamental failure of character: I lacked heart.My Face: A Tool for Sensing and Ignoring PainTo get as accustomed as a punching bag to repeated hits without flinching I had to mould my face into a mask of impassivity, revealing little to my opponent. My face also became a calibrated tool to measure my opponent’s skill, strength, and intent through the levels of pain it would experience. If an opponent repeatedly targeted my nose, I knew the sparring session was not a “friendly encounter.” Most often though, we would nod at each other in acknowledgement of the other’s successful “contact,” such as when their punches hurt my body. The ring is the only space I know and inhabit where the display of physical violence can be interpreted as a “friendly gesture” (Merz 12).Boxers, like most athletes, are carefully attuned to measuring the degrees of pain they undergo during a fight and training, whilst accomplishing the paradoxical feat—when they are hit—of setting aside that pain lest it be a distraction. In other words, boxers’ bodies are both material and immaterial: they are sites for accessing sensory information, notably pain levels, as well as tools that—at times detrimentally—have learned to abstract pain in the effort to ignore physical limitations, impediments or fatigue. Boxers with “heart,” I believe, are those who inhabit this duality of material and immaterial bodies.I have systematically been questioned whether I fear bruising or scarring my face. It would seem illogical to many that a woman would voluntarily engage in an activity that could blemish her appearance. Beyond this concern lies the issue, as Merz puts it, that “physical prowess and femininity seem to be so fundamentally incompatible” (476). My face used to be solely a source of concern as a medium of beautification and the platform from which I believed the world judged my degree of attractiveness. It also served as a marker of distinction: those I trusted intimately could touch my face, others could not. Throughout my training, my face evolved and also became an instrument that I conditioned and used strategically in the ring. The bruises I received attested to my readiness to exchange punches, a mark of valour I came to relish more than looking “nice.”Boxing has taught me how to feel my body in new ways. I no longer inhabit an “absent body” (Leder). I intimately know the border between my skin and the world, aware of exactly how far my body extends into that world and how much “punishment” (getting hit) it can withstand: boxing—which Oates (26) observed as a spectator rather than boxer—“is an act of consummate self-determination—the constant re-establishment of the parameters of one’s being.” A strong initial allure of boxing was the strict discipline it gave to my eating habits, an anchor—and at times, a torture—for someone who suffered from decade-long eating disorders. Although boxing plagued me with the need to “make weight”—to fight in a designated weight category—I no longer sought to be as petite as I could manage. As a female boxer, I was reminded of my gender, and my “unusual” body, as I am uncommonly big, strong, and heavy compared to most female fighters. I still find it difficult to find women to spar with, let alone fight. Unlike in the world outside the gym, though, my size is something I continuously learn to value as an advantage in the ring, a tool for affirmation, and significantly, a means of acceptance by, and equality with, men.The Ring: A Place of Re-GenderingAs sparring became routine, I had an epiphany: what I had taken as an act of betrayal from my coach was actually one of respect. Opponents who threw “honest” (painful) punches esteemed me as a boxer. I have, to this day, very rarely sparred with women. I often get told that I punch “like a guy,” an ability with which I have sought to impress coaches and boxers alike. As such, I am usually partnered with men who believe, as they have told me, that hitting a “girl”—and even worse, hitting a girl in the face—is simply unacceptable. Many have admitted that they fear hurting me, though some have quickly wanted to after a couple of exchanges. I have found that their views of “acceptable” violence seem unchanged after a session, as I believe they have come to view me as a boxer first and as a woman second.It would be disingenuous to omit that boxing attracted me as much for the novelty status I have gained within and outside of it. I have often walked a thin line between revelling in the sense of belonging that boxing provides me—anchored in a feeling that gender no longer matters—and the acute sense of feeling special because I am a woman performing as a man in what is still considered a man’s world. I have wavered between feeling as though I am shrugging off the very notion of gender in the ring, to deeply reconsidering what my gender means to me and the world, embracing a more fluid and performative understanding of gender than I had before (Messner; Young).In a way, my sense of self is shaped conflictingly by the ways in which boxers behave towards me in the ring, and how others see me outside of the boxing gym. As de Bruin and de Haan suggest, my body, in its active dimension, is open to the other and grounds inter-subjectivity. This inter-subjectivity of embodiment—how other bodies constitute my own sensory and perceptual experience of being-in-the-world—remains ambivalent. It has led me to feel at times genderless—or rather, beyond gender—in the ring and, because of this feeling, I simultaneously question and continuously re-explore more vividly what can be understood as “female masculinity” (Halberstam). As training progressed, I increasingly felt that:If women are going to fight, we have to be reminded, at every chance available, time and again, that they are still feminine or capable, at least, of wearing the costume of femininity, being hobbled by high heels and constrained by tight dresses. All female athletes in a way are burdened with having to re-iterate this same public narrative. (Merz)As I learned to box, I also learned to delineate myself alongside the ring: as I questioned notions of gender inside, I consequently sought to reaffirm a specific and static idea of gender through overt femininity outside the ring, as other female athletes have also been seen to do (Duncan). During my first years of training, I was the only woman at the gyms I trained in. I believed I had to erase any physical reminders of femininity: my sport clothes were loose fitting, my hair short, and I never wore jewellery or make-up. I wanted to be seen as a boxer, not a woman: my physical attractiveness was, for once, irrelevant. Ironically, I could not conceive of myself as a woman in the ring, and did not believe I could be seen as a woman in the ring. Outside the gym, I increasingly sought to reassert a stereotypical feminine appearance, taking pleasure in subverting another set of beliefs. People are usually hesitant to visualise a woman in a skirt, without a broken nose, as a competitive fighter with a mouth guard and headgear. As Wacquant succinctly put it, “I led a sort of Dr. Jekyll-and-Mr. Hyde existence” (Habitus 86), which crystallised when one of my coaches failed to recognise me on three occasions outside the gym, in my “normal” clothes.I have now come to resent profoundly the marginal, sensationalised status that being a boxer denotes for a woman. This is premised on particular social norms surrounding gender, which dictate that if a woman boxes, she is not “your usual” woman. I have striven to re-gender my experience, especially in light of the recent explosion of interest in female boxing, where new norms are being established. As I have trained around the world, including in Cuba, France, and the USA, and competed in the UK, Mexico, and Belgium, I have valued the tacit connection between those who practice the “noble art.” Boxing fashions a particular habitus (Bourdieu), the “pugilistic habitus” (Wacquant, Body 12). Stepping into the ring, and being able to handle getting hit in the face, constitutes a common language that boxers around the world, male and female, understand, value, and share; a language that transcends the tacit everyday embodiments of gender and class. Boxing is habitually said to give access to an upward mobility (Wacquant, Habitus; Heiskanen). In my case, as a white, educated, middle-class woman, boxing has given me access to cross-class associations: I have trained alongside men who had been shot in Coventry, were jobless in Cuba, or dealt with drug gangs in Mexico. The ring is an equalising space, where social, gender—and in my experience, ethnic—divides can be smoothed down to leave the pugilistic valour, the property of boxing excellence, as the main metric of appreciation.The freedom I have found in the ring is one that has allowed my gendered identity to be thought of in new and creative ways that invite continuous revision. I have discovered myself not solely through the prism of a gendered lens, but as an emotive athlete, and as a person desperate to be accepted despite—or because of—her physical strength. I find myself returning to Merz’s eloquence: “boxing cannot help but make you question who you really are. You cannot hide from yourself in a boxing ring. It might seem a crazy path to self-knowledge, but to me it has been the most rich, rewarding, and perhaps, the only true one” (111). Using Wacquant’s own words to disprove his theory that boxing is fundamentally a virile activity that reaffirms specific notions of masculinity, to become a boxer is to “efface the distinction between the physical and the spiritual [...] to defy the border between reason and passion” (Body 20). In my view, it is to implode the oppositional definitions that have kept males inside the ring and females, out. The ring, in ways unrivalled elsewhere, has shown me that I am not reducible, as the world has at times convinced me, to my strength or my gender. I can, and indeed do, coalesce and transcend both.ConclusionAfter having pondered the significance of the ring to my life, I now begin to understand Merz’s journey as “so much more than a mere dalliance on the dark side of masculine culture” (21). When I box, I am always boxing against myself. The ring is the ultimate space of revelation, where one is starkly confronted with one’s own weaknesses and fears. As a naked mirror, the ring is also a place for redemption, where one can overcome flaws, and uncover facets of who one is. Having spent almost as much time at university as I have boxing, it was in the ring that I learned that “thinking otherwise entails being otherwise, relating to oneself, one’s body, and ambient beings in a new way” (Sharp 749). Through the “boxing habitus,” I have simultaneously developed a boxer’s body and habits as well as integrated new notions of gender. As an exercise in re-gendering, sparring has led me to reflect more purposefully on the multiplicity of meanings that gender can espouse, and on the possibilities of negotiating the world as both strong and female. Practising the “noble art” has given me new tools with which to carve out, within the structures of the society I inhabit, liberating possibilities of being a pugilistic woman. However, I have yet to determine if women have fashioned a space within the ring for themselves, or if they still need to reaffirm a gendered identity in the eyes of others to earn the right to get hit in the face.References Bochner, Arthur P. “It’s about Time: Narrative and the Divided Self.” Qualitative Inquiry 3.4 (1997): 418–438.Bourdieu, Pierre. The Logic of Practice. Stanford, California: Stanford UP, 1990.Bruner, Jerome. “The Autobiographical Process.” The Culture of Autobiography: Constructions of Self-Representation. Ed. Robert Folkenflik. Vol. 6. Stanford UP, 1993. 38–56.Csordas, Thomas. “Somatic Modes of Attention.” Cultural Anthropology 8.2 (1993): 135–156.De Bruin, Leon, and Sanneke de Haan. “Enactivism and Social Cognition: In Search of the Whole Story.” Cognitive Semiotics 4.1 (2009): 225–50.Denzin, Norman K. Interpretive Biography. London: Sage, 1989.Duncan, Margaret C. “Gender Warriors in Sport: Women and the Media.” Handbook of Sports and Media. Eds. Arthur A. Raney and Jennings Bryant. Lawrence Erlbaum Associates, 2006. 231–252.Ellis, Carolyn. The Ethnographic I: A Methodological Novel about Autoethnography. Walnut Creek, CA: AltaMira Press, 2004.Ellis, Carolyn, Tony E. Adams, and Arthur P. Bochner. “Autoethnography: An Overview.” Historical Social Research/Historische Sozialforschung (2011): 273–90.Ellis, Carolyn, and Laura Ellingson. “Qualitative Methods.” Encyclopedia of Sociology. Eds. Edgar F. Borgatta and Rhonda JV Montgomery. Macmillan Library Reference, 2000. 2287–96.Halberstam, Judith. Female Masculinity. Durham: Duke UP, 1998.Heiskanen, Benita. The Urban Geography of Boxing: Race, Class, and Gender in the Ring. Vol. 13. Routledge, 2012.Girlfight. Dir. Karyn Kusama. Screen Gems, 2000.Leder, Drew. The Absent Body. Chicago: U of Chicago P, 1990.Longhurst, Robyn, Elsie Ho, and Lynda Johnston. “Using ‘the Body’ as an Instrument of Research: Kimch’i and Pavlova.” Area 40.2 (2008): 208–17.Messner, Michael. Out of Play: Critical Essays on Gender and Sport. New York: SUNY Press, 2010.Merz, Mischa. Bruising: A Boxer’s Story. Sydney: Pan Macmillan, 2000.Oates, Joyce Carol. On Boxing. Garden City, New York: Harper Collins, 1987.Sharp, Hasana. “The Force of Ideas in Spinoza.” Political Theory 35.6 (2007): 732–55.Spry, Tami. “Performing Autoethnography: An Embodied Methodological Praxis.” Qualitative Inquiry 7.6 (2001): 706–32.Thrift, Nigel. “The Still Point: Resistance, Expressive Embodiment and Dance.” Geographies of Resistance (1997): 124–51.Wacquant, Loïc. Body & Soul. New York: Oxford UP, 2004.———. “Habitus as Topic and Tool: Reflections on Becoming a Prizefighter.” Qualitative Research in Psychology 8.1 (2011): 81–92.Young, Iris Marion. Throwing like a Girl and Other Essays in Feminist Philosophy and Social Theory. Bloomington, Indiana: Indiana UP, 1990.

APA, Harvard, Vancouver, ISO, and other styles

34

Woodward, Kath. "Tuning In: Diasporas at the BBC World Service." M/C Journal 14, no.2 (November17, 2010). http://dx.doi.org/10.5204/mcj.320.

Full text

Abstract:

Diaspora This article looks at diaspora through the transformations of an established public service broadcaster, the BBC World Service, by considering some of the findings of the AHRC-funded Tuning In: Contact Zones at the BBC World Service, which is part of the Diasporas, Migration and Identities program. Tuning In has six themes, each of which focuses upon the role of the BBC WS: The Politics of Translation, Diasporic Nationhood, Religious Transnationalism, Sport across Diasporas, Migrating Music and Drama for Development. The World Service, which was until 2011 funded by the Foreign Office, was set up to cater for the British diaspora and had the specific remit of transmitting ideas about Britishness to its audiences overseas. Tuning In demonstrates interrelationships between the global and the local in the diasporic contact zone of the BBC World Service, which has provided a mediated home for the worldwide British diaspora since its inception in 1932. The local and the global have merged, elided, and separated at different times and in different spaces in the changing story of the BBC (Briggs). The BBC WS is both local and global with activities that present Britishness both at home and abroad. The service has, however, come a long way since its early days as the Empire Service. Audiences for the World Service’s 31 foreign language services, radio, television, and Internet facilities include substantive non-British/English-speaking constituencies, rendering it a contact zone for the exploration of ideas and political opportunities on a truly transnational scale. This heterogeneous body of exilic, refugee intellectuals, writers, and artists now operates alongside an ongoing expression of Britishness in all its diverse reconfiguration. This includes the residual voice of empire and its patriarchal paternalism, the embrace of more recent expressions of neoliberalism as well as traditional values of impartiality and objectivism and, in the case of the arts, elements of bohemianism and creative innovation. The World Service might have begun as a communication system for the British ex-pat diaspora, but its role has changed along with the changing relationship between Britain and its colonial past. In the terrain of sport, for example, cricket, the “game of empire,” has shifted from Britain to the Indian subcontinent (Guha) with the rise of “Twenty 20” and the Indian Premier League (IPL); summed up in Ashis Nandy’s claim that “cricket is an Indian game accidentally discovered by the English” (Nandy viii). English county cricket dominated the airways of the World Service well into the latter half of the twentieth century, but the audiences of the service have demanded a response to social and cultural change and the service has responded. Sport can thus be seen to have offered a democratic space in which new diasporic relations can be forged as well as one in which colonial and patriarchal values are maintained. The BBC WS today is part of a network through which non-British diasporic peoples can reconnect with their home countries via the service, as well as an online forum for debate across the globe. In many regions of the world, it continues to be the single most trusted source of information at times of crisis and disaster because of its traditions of impartiality and objectivity, even though (as noted in the article on Al-Jazeera in this special issue) this view is hotly contested. The principles of objectivity and impartiality are central to the BBC WS, which may seem paradoxical since it is funded by the Commonwealth and Foreign office, and its origins lie in empire and colonial discourse. Archive material researched by our project demonstrates the specifically ideological role of what was first called the Empire Service. The language of empire was deployed in this early programming, and there is an explicit expression of an ideological purpose (Hill). For example, at the Imperial Conference in 1930, the service was supported in terms of its political powers of “strengthening ties” between parts of the empire. This view comes from a speech by John Reith, the BBC’s first Director General, which was broadcast when the service opened. In this speech, broadcasting is identified as having come to involve a “connecting and co-ordinating link between the scattered parts of the British Empire” (Reith). Local British values are transmitted across the globe. Through the service, empire and nation are reinstated through the routine broadcasting of cyclical events, the importance of which Scannell and Cardiff describe as follows: Nothing so well illustrates the noiseless manner in which the BBC became perhaps the central agent of national culture as its cyclical role; the cyclical production year in year out, of an orderly, regular progression of festivities, rituals and celebrations—major and minor, civic and sacred—that mark the unfolding of the broadcast year. (278; italics in the original) State occasions and big moments, including those directly concerned with governance and affairs of state, and those which focused upon sport and religion, were a big part in these “noiseless” cycles, and became key elements in the making of Britishness across the globe. The BBC is “noiseless” because the timetable is assumed and taken for granted as not only what is but what should be. However, the BBC WS has been and has had to be responsive to major shifts in global and local—and, indeed, glocal—power geometries that have led to spatial transformations, notably in the reconfiguration of the service in the era of postcolonialism. Some of these massive changes have involved the large-scale movement of people and a concomitant rethinking of diaspora as a concept. Empire, like nation, operates as an “imagined community,” too big to be grasped by individuals (Anderson), as well as a material actuality. The dynamics of identification are rarely linear and there are inconsistencies and disruptions: even when the voice is officially that of empire, the practice of the World Service is much more diverse, nuanced, and dialogical. The BBC WS challenges boundaries through the connectivities of communication and through different ways of belonging and, similarly, through a problematisation of concepts like attachment and detachment; this is most notable in the way in which programming has adapted to new diasporic audiences and in the reworkings of spatiality in the shift from empire to diversity via multiculturalism. There are tensions between diaspora and multiculturalism that are apparent in a discussion of broadcasting and communication networks. Diaspora has been distinguished by mobility and hybridity (Clifford, Hall, Bhaba, Gilroy) and it has been argued that the adjectival use of diasporic offers more opportunity for fluidity and transformation (Clifford). The concept of diaspora, as it has been used to explain the fluidity and mobility of diasporic identifications, can challenge more stabilised, “classic” understandings of diaspora (Chivallon). A hybrid version of diaspora might sit uneasily with a strong sense of belonging and with the idea that the broadcast media offer a multicultural space in which each voice can be heard and a wide range of cultures are present. Tuning In engaged with ways of rethinking the BBC’s relationship to diaspora in the twenty-first century in a number of ways: for example, in the intersection of discursive regimes of representation; in the status of public service broadcasting; vis-à-vis the consequences of diverse diasporic audiences; through the role of cultural intermediaries such as journalists and writers; and via global economic and political materialities (Gillespie, Webb and Baumann). Tuning In thus provided a multi-themed and methodologically diverse exploration of how the BBC WS is itself a series of spaces which are constitutive of the transformation of diasporic identifications. Exploring the part played by the BBC WS in changing and continuing social flows and networks involves, first, reconfiguring what is understood by transnationalism, diaspora, and postcolonial relationalities: in particular, attending to how these transform as well as sometimes reinstate colonial and patriarchal discourses and practices, thus bringing together different dimensions of the local and the global. Tuning In ranges across different fields, embracing cultural, social, and political areas of experience as represented in broadcasting coverage. These fields illustrate the educative role of the BBC and the World Service that is also linked to its particular version of impartiality; just as The Archers was set up to provide information and guidance through a narrative of everyday life to rural communities and farmers after the Second World War, so the Afghan version plays an “edutainment” role (Skuse) where entertainment also serves an educational, public service information role. Indeed, the use of soap opera genre such as The Archers as a vehicle for humanitarian and health information has been very successful over the past decade, with the “edutainment” genre becoming a feature of the World Service’s broadcasting in places such as Rwanda, Somalia, Nigeria, India, Nepal, Burma, Afghanistan, and Cambodia. In a genre that has been promoted by the World Service Trust, the charitable arm of the BBC WS uses drama formats to build transnational production relationships with media professionals and to strengthen creative capacities to undertake behaviour change through communication work. Such programming, which is in the tradition of the BBC WS, draws upon the service’s expertise and exhibits both an ideological commitment to progressive social intervention and a paternalist approach drawing upon colonialist legacies. Nowadays, however, the BBC WS can be considered a diasporic contact zone, providing sites of transnational intra-diasporic contact as well as cross-cultural encounters, spaces for cross-diasporic creativity and representation, and a forum for cross-cultural dialogue and potentially cosmopolitan translations (Pratt, Clifford). These activities are, however, still marked by historically forged asymmetric power relations, notably of colonialism, imperialism, and globalisation, as well as still being dominated by hegemonic masculinity in many parts of the service, which thus represent sites of contestation, conflict, and transgression. Conversely, diasporic identities are themselves co-shaped by media representations (Sreberny). The diasporic contact zone is a relational space in which diasporic identities are made and remade and contested. Tuning In employed a diverse range of methods to analyse the part played by the BBC WS in changing and continuing social and cultural flows, networks, and reconfigurations of transnationalisms and diaspora, as well as reinstating colonial, patriarchal practices. The research deconstructed some assumptions and conditions of class-based elitism, colonialism, and patriarchy through a range of strategies. Texts are, of course, central to this work, with the BBC Archives at Caversham (near Reading) representing the starting point for many researchers. The archive is a rich source of material for researchers which carries a vast range of data including fragile memos written on scraps of paper: a very local source of global communications. Other textual material occupies the less locatable cyberspace, for example in the case of Have Your Say exchanges on the Web. People also featured in the project, through the media, in cyberspace, and physical encounters, all of which demonstrate the diverse modes of connection that have been established. Researchers worked with the BBC WS in a variety of ways, not only through interviews and ethnographic approaches, such as participant observation and witness seminars, but also through exchanges between the service, its practitioners, and the researchers (for example, through broadcasts where the project provided the content and the ideas and researchers have been part of programs that have gone out on the BBC WS (Goldblatt, Webb), bringing together people who work for the BBC and Tuning In researchers). On this point, it should be remembered that Bush House is, itself, a diasporic space which, from its geographical location in the Strand in London, has brought together diasporic people from around the globe to establish international communication networks, and has thus become the focus and locus of some of our research. What we have understood by the term “diasporic space” in this context includes both the materialities of architecture and cyberspace which is the site of digital diasporas (Anderssen) and, indeed, the virtual exchanges featured on “Have Your Say,” the online feedback site (Tuning In). Living the Glocal The BBC WS offers a mode of communication and a series of networks that are spatially located both in the UK, through the material presence of Bush House, and abroad, through the diasporic communities constituting contemporary audiences. The service may have been set up to provide news and entertainment for the British diaspora abroad, but the transformation of the UK into a multi-ethnic society “at home,” alongside its commitment to, and the servicing of, no less than 32 countries abroad, demonstrates a new mission and a new balance of power. Different diasporic communities, such as multi-ethnic Londoners, and local and British Muslims in the north of England, demonstrate the dynamics and ambivalences of what is meant by “diaspora” today. For example, the BBC and the WS play an ambiguous role in the lives of UK Muslim communities with Pakistani connections, where consumers of the international news can feel that the BBC is complicit in the conflation of Muslims with terrorists. Engaging Diaspora Audiences demonstrated the diversity of audience reception in a climate of marginalisation, often bordering on moral panic, and showed how diasporic audiences often use Al-Jazeera or Pakistani and Urdu channels, which are seen to take up more sympathetic political positions. It seems, however, that more egalitarian conversations are becoming possible through the channels of the WS. The participation of local people in the BBC WS global project is seen, for example, as in the popular “Witness Seminars” that have both a current focus and one that is projected into the future, as in the case of the “2012 Generation” (that is, the young people who come of age in 2012, the year of the London Olympics). The Witness Seminars demonstrate the recuperation of past political and social events such as “Bangladesh in 1971” (Tuning In), “The Cold War seminar” (Tuning In) and “Diasporic Nationhood” (the cultural movements reiterated and recovered in the “Literary Lives” project (Gillespie, Baumann and Zinik). Indeed, the WS’s current focus on the “2012 Generation,” including an event in which 27 young people (each of whom speaks one of the WS languages) were invited to an open day at Bush House in 2009, vividly illustrates how things have changed. Whereas in 1948 (the last occasion when the Olympic Games were held in London), the world came to London, it is arguable that, in 2012, in contemporary multi-ethnic Britain, the world is already here (Webb). This enterprise has the advantage of giving voice to the present rather than filtering the present through the legacies of colonialism that remain a problem for the Witness Seminars more generally. The democratising possibilities of sport, as well as the restrictions of its globalising elements, are well represented by Tuning In (Woodward). Sport has, of course become more globalised, especially through the development of Internet and satellite technologies (Giulianotti) but it retains powerful local affiliations and identifications. At all levels and in diverse places, there are strong attachments to local and national teams that are constitutive of communities, including diasporic and multi-ethnic communities. Sport is both typical and distinctive of the BBC World Service; something that is part of a wider picture but also an area of experience with a life of its own. Our “Sport across Diasporas” project has thus explored some of the routes the World Service has travelled in its engagement with sport in order to provide some understanding of the legacy of empire and patriarchy, as well as engaging with the multiplicities of change in the reconstruction of Britishness. Here, it is important to recognise that what began as “BBC Sport” evolved into “World Service Sport.” Coverage of the world’s biggest sporting events was established through the 1930s to the 1960s in the development of the BBC WS. However, it is not only the global dimensions of sporting events that have been assumed; so too are national identifications. There is no question that the superiority of British/English sport is naturalised through its dominance of the BBC WS airways, but the possibilities of reinterpretation and re-accommodation have also been made possible. There has, indeed, been a changing place of sport in the BBC WS, which can only be understood with reference to wider changes in the relationship between broadcasting and sport, and demonstrates the powerful synchronies between social, political, technological, economic, and cultural factors, notably those that make up the media–sport–commerce nexus that drives so much of the trajectory of contemporary sport. Diasporic audiences shape the schedule as much as what is broadcast. There is no single voice of the BBC in sport. The BBC archive demonstrates a variety of narratives through the development and transformation of the World Service’s sports broadcasting. There are, however, silences: notably those involving women. Sport is still a patriarchal field. However, the imperial genealogies of sport are inextricably entwined with the social, political, and cultural changes taking place in the wider world. There is no detectable linear narrative but rather a series of tensions and contradictions that are reflected and reconfigured in the texts in which deliberations are made. In sport broadcasting, the relationship of the BBC WS with its listeners is, in many instances, genuinely dialogic: for example, through “Have Your Say” websites and internet forums, and some of the actors in these dialogic exchanges are the broadcasters themselves. The history of the BBC and the World Service is one which manifests a degree of autonomy and some spontaneity on the part of journalists and broadcasters. For example, in the case of the BBC WS African sports program, Fast Track (2009), many of the broadcasters interviewed report being able to cover material not technically within their brief; news journalists are able to engage with sporting events and sports journalists have covered social and political news (Woodward). Sometimes this is a matter of taking the initiative or simply of being in the right place at the right time, although this affords an agency to journalists which is increasingly unlikely in the twenty-first century. The Politics of Translation: Words and Music The World Service has played a key role as a cultural broker in the political arena through what could be construed as “educational broadcasting” via the wider terrain of the arts: for example, literature, drama, poetry, and music. Over the years, Bush House has been a home-from-home for poets: internationalists, translators from classical and modern languages, and bohemians; a constituency that, for all its cosmopolitanism, was predominantly white and male in the early days. For example, in the 1930s and 1940s, Louis MacNeice was commissioning editor and surrounded by a friendship network of salaried poets, such as W. H. Auden, Dylan Thomas, C. Day Lewis, and Stephen Spender, who wrote and performed their work for the WS. The foreign language departments of the BBC WS, meanwhile, hired émigrés and exiles from their countries’ educated elites to do similar work. The biannual, book-format journal Modern Poetry in Translation (MPT), which was founded in 1965 by Daniel Weissbort and Ted Hughes, included a dedication in Weissbort’s final issue (MPT 22, 2003) to “Poets at Bush House.” This volume amounts to a celebration of the BBC WS and its creative culture, which extended beyond the confines of broadcasting spaces. The reminiscences in “Poets at Bush House” suggest an institutional culture of informal connections and a fluidity of local exchanges that is resonant of the fluidity of the flows and networks of diaspora (Cheesman). Music, too, has distinctive characteristics that mark out this terrain on the broadcast schedule and in the culture of the BBC WS. Music is differentiated from language-centred genres, making it a particularly powerful medium of cross-cultural exchange. Music is portable and yet is marked by a cultural rootedness that may impede translation and interpretation. Music also carries ambiguities as a marker of status across borders, and it combines aesthetic intensity and diffuseness. The Migrating Music project demonstrated BBC WS mediation of music and identity flows (Toynbee). In the production and scheduling notes, issues of migration and diaspora are often addressed directly in the programming of music, while the movement of peoples is a leitmotif in all programs in which music is played and discussed. Music genres are mobile, diasporic, and can be constitutive of Paul Gilroy’s “Black Atlantic” (Gilroy), which foregrounds the itinerary of West African music to the Caribbean via the Middle Passage, cross-fertilising with European traditions in the Americas to produce blues and other hybrid forms, and the journey of these forms to Europe. The Migrating Music project focused upon the role of the BBC WS as narrator of the Black Atlantic story and of South Asian cross-over music, from bhangra to filmi, which can be situated among the South Asian diaspora in east and south Africa as well as the Caribbean where they now interact with reggae, calypso, Rapso, and Popso. The transversal flows of music and lyrics encompasses the lived experience of the different diasporas that are accommodated in the BBC WS schedules: for example, they keep alive the connection between the Irish “at home” and in the diaspora through programs featuring traditional music, further demonstrating the interconnections between local and global attachments as well as points of disconnection and contradiction. Textual analysis—including discourse analysis of presenters’ speech, program trailers and dialogue and the BBC’s own construction of “world music”—has revealed that the BBC WS itself performs a constitutive role in keeping alive these traditions. Music, too, has a range of emotional affects which are manifest in the semiotic analyses that have been conducted of recordings and performances. Further, the creative personnel who are involved in music programming, including musicians, play their own role in this ongoing process of musical migration. Once again, the networks of people involved as practitioners become central to the processes and systems through which diasporic audiences are re-produced and engaged. Conclusion The BBC WS can claim to be a global and local cultural intermediary not only because the service was set up to engage with the British diaspora in an international context but because the service, today, is demonstrably a voice that is continually negotiating multi-ethnic audiences both in the UK and across the world. At best, the World Service is a dynamic facilitator of conversations within and across diasporas: ideas are relocated, translated, and travel in different directions. The “local” of a British broadcasting service, established to promote British values across the globe, has been transformed, both through its engagements with an increasingly diverse set of diasporic audiences and through the transformations in how diasporas themselves self-define and operate. On the BBC WS, demographic, social, and cultural changes mean that the global is now to be found in the local of the UK and any simplistic separation of local and global is no longer tenable. The educative role once adopted by the BBC, and then the World Service, nevertheless still persists in other contexts (“from Ambridge to Afghanistan”), and clearly the WS still treads a dangerous path between the paternalism and patriarchy of its colonial past and its responsiveness to change. In spite of competition from television, satellite, and Internet technologies which challenge the BBC’s former hegemony, the BBC World Service continues to be a dynamic space for (re)creating and (re)instating diasporic audiences: audiences, texts, and broadcasters intersect with social, economic, political, and cultural forces. The monologic “voice of empire” has been countered and translated into the language of diversity and while, at times, the relationship between continuity and change may be seen to exist in awkward tension, it is clear that the Corporation is adapting to the needs of its twenty-first century audience. ReferencesAnderson, Benedict. Imagined Communities, Reflections of the Origin and Spread of Nationalism. London: Verso, 1983. Anderssen, Matilda. “Digital Diasporas.” 2010. 30 Nov. 2010 ‹http://www8.open.ac.uk/researchprojects/diasporas/cross-research/digital-diasporas›. Bhabha, Homi. The Location of Culture. London: Routledge, 1994. Briggs, Asa. A History of Broadcasting in the United Kingdom, Volume II: The Golden Age of Wireless. Oxford: Oxford UP, 1995. Cheesman, Tom. “Poetries On and Off Air.” 2010. 30 Nov. 2010 ‹http://www8.open.ac.uk/researchprojects/diasporas/cross-research/bush-house-cultures›. Chivallon, Christine. “Beyond Gilroy’s Black Atlantic: The Experience of the African Diaspora.” Diaspora 11.3 (2002): 359–82. Clifford, James. Routes: Travel and Translation in the Late Twentieth Century. Cambridge: Cambridge UP, 1997. Fast Track. BBC, 2009. 30 Nov. 2010 ‹http://www.bbc.co.uk/worldservice/sport/2009/03/000000_fast_track.shtml›. Gillespie, Marie, Alban Webb, and Gerd Baumann (eds.). “The BBC World Service 1932–2007: Broadcasting Britishness Abroad.” Special Issue. The Historical Journal of Film, Radio and Television 28.4 (Oct. 2008). Gillespie, Marie, Gerd Baumann, and Zinovy Zinik. “Poets at Bush House.” 2010. 30 Nov. 2010 ‹http://www8.open.ac.uk/researchprojects/diasporas/about›. Gilroy, Paul. Black Atlantic. MA: Harvard UP, 1993. Giulianotti, Richard. Sport: A Critical Sociology. Cambridge: Polity, 2005. Goldblatt, David. “The Cricket Revolution.” 2009. 30 Nov. 2010 ‹http://www.bbc.co.uk/programmes/p0036ww9›. Guha, Ramachandra. A Corner of a Foreign Field: The Indian History of an English Game. London: Picador, 2002. Hall, Stuart. “Cultural Identity and Diaspora.” Identity: Community, Culture, Difference. Ed. Jonathan Rutherford. London: Lawrence and Wishart, 1990, 223–37. Hill, Andrew. “The BBC Empire Service: The Voice, the Discourse of the Master and Ventriloquism.” South Asian Diaspora 2.1 (2010): 25–38. Hollis, Robert, Norma Rinsler, and Daniel Weissbort. “Poets at Bush House: The BBC World Service.” Modern Poetry in Translation 22 (2003). Nandy, Ashis. The Tao of Cricket: On Games of Destiny and the Destiny of Games. New Delhi: Oxford UP, 1989. Pratt, Mary Louise. Imperial Eyes: Travel Writing and Transculturation. London: Routledge, 1992. Reith, John. “Opening of the Empire Service.” In “Empire Service Policy 1932-1933”, E4/6: 19 Dec. 1932. 30 Nov. 2010 ‹http://www.open.ac.uk/socialsciences/diasporas/research.htm›. Scannell, Paddy, and David Cardiff. A Social History of British Broadcasting, 1922-1938. Oxford: Basil Blackwell, 1991. Skuse, Andrew. “Drama for Development.” 2010. 30 Nov. 2010 ‹http://www8.open.ac.uk/researchprojects/diasporas/core-research/drama-for-development›. Sreberny, Annabelle. “The BBC World Service and the Greater Middle East: Comparisons, Contrasts, Conflicts.” Guest ed. Annabelle Sreberny, Marie Gillespie, Gerd Baumann. Middle East Journal of Culture and Communication 3.2 (2010). Toynbee, Jason. “Migrating Music.” 2010. 30 Nov. 2010 ‹http://www8.open.ac.uk/researchprojects/diasporas/core-research/migrating-music›. Tuning In. 30 Nov. 2010 ‹http://www.open.ac.uk/socialsciences/diasporas/index.htm›. Webb, Alban. “Cold War Diplomacy.” 2010. 30 Nov. 2010 ‹http://www8.open.ac.uk/researchprojects/diasporas/projects/cold-war-politics-and-bbc-world-service›. Woodward, Kath. Embodied Sporting Practices. Regulating and Regulatory Bodies. Basingstoke, Palgrave Macmillan, 2009.

APA, Harvard, Vancouver, ISO, and other styles

35

Lorenzetti,DianeL., Bonnie Lashewicz, and Tanya Beran. "Mentorship in the 21st Century: Celebrating Uptake or Lamenting Lost Meaning?" M/C Journal 19, no.2 (May4, 2016). http://dx.doi.org/10.5204/mcj.1079.

Full text

Abstract:

BackgroundIn the centuries since Odysseus entrusted his son Telemachus to Athena, biographical, literary, and historical accounts have cemented the concept of mentorship into our collective consciousness. Early foundational research characterised mentors as individuals who help us transition through different phases of our lives. Chief among these phases is the progression from adolescence to adulthood, during which we “imagine exciting possibilities for [our lives] and [struggle] to attain the ‘I am’ feeling in this dreamed-of self and world” (Levinson 93). Previous research suggests that mentoring can positively impact a range of developmental outcomes including emotional/behavioural resiliency, academic attainment, career advancement, and organisational productivity (DuBois et al. 57-91; Eby et al. 441-76; Merriam 161-73). The growth of formal mentoring programs, such as Big Brothers-Big Sisters, has further strengthened our belief in the value of mentoring in personal, academic and career contexts (Eby et al. 441-76).In recent years, claims of mentorship uptake have become widespread, even ubiquitous, ranging from codified components of organisational mandates to casual bragging rights in coffee shop conversations (Eby et al. 441-76). Is this a sign that mentorship has become indispensable to personal and professional development, or is mentorship simply in vogue? In this paper, we examine uses of, and corresponding meanings attached to, mentorship. Specifically, we compare popular news portrayals of mentoring with meanings ascribed to mentoring relationships by academics who are part of formal mentoring programs.MethodsWe searched for articles published in the New York Times between July and December 2015. Search terms used included: mentor, mentors, mentoring or mentorship. This U.S. national newspaper was chosen for its broad focus, and large online readership. It is among the most widely read online newspapers worldwide (World Association of Newspapers and News Publishers). Our search generated 536 articles. We conducted a qualitative thematic contentan alysis to explore the nature, scope, and importance of mentorship, as depicted in these media accounts. We compared media themes identified through this analysis with those generated through in-depth interviews previously conducted with 23 academic faculty in mentoring programs at the University of Calgary (Canada). Data were extracted by two authors, and discrepancies in interpretation were resolved through discussion with a third author.The Many Faces of MentorshipIn both interviews and New York Times (NYT) accounts, mentorship is portrayed as part of the “fabric” of contemporary culture, and is often viewed as essential to career advancement. As one academic we interviewed commented: “You know the worst feeling in the world [as a new employee] is...to feel like you’re floundering and you don’t know where to turn.” In 322 NYT articles, mentorship was linked to professional successes across a variety of disciplines, with CEOs, and popular culture icons, such as rap artists and sports figures, citing mentorship as central to their achievements. Mentorship had a particularly strong presence in the arts (109 articles), sports (62 articles) business (57 articles), politics (36 articles), medicine (26 articles), and law (21 articles).In the NYT, mentorship was also a factor in student achievement and social justice issues including psychosocial and career support for refugees and youth from low socioeconomic backgrounds; counteracting youth radicalisation; and addressing gender inequality in the workplace. In short, mentorship appears to have been taken up as a panacea for a variety of social and economic ills.Mentor Identities and RolesWhile mentors in academia were supervisors or colleagues, NYT articles portrayed mentors more broadly, as family members, employers, friends and peers. Mentoring relationships typically begin with a connection which often manifests as shared experiences or goals (Merriam). One academic interviewee described mentorship in these terms: “There’s something there that you both really respect and value.” In many NYT accounts, the connection between mentors and mentees was similarly emphasized. As a professional athlete noted: “To me, it's not about collecting [mentors]...It's if the person means something to me...played some type of role in my life” (Shpigel SP.1).While most mentoring relationships develop organically, others are created through formal programs. In the NYT, 33 articles described formal programs to support career/skills development in the arts, business, and sports, and behaviour change in at-risk youth. Although many such programs relied on volunteers, we noted instances in professional sports and business where individuals were hired to provide mentorship. We also saw evidence to suggest that formal programs may be viewed as a quick fix, or palatable alternative, to more costly, or long-term organisational or societal change. For instance, one article on operational challenges at a law firm noted: “The firm's leadership...didn't want to be told that they needed to overhaul their entire organizational philosophy.... They wanted to be told that the firm's problem was work-family conflict for women, a narrative that would allow them to adopt a set of policies specifically aimed at helping women work part time, or be mentored” (Slaughter SR.1).Mutuality of the RelationshipEffective mentoring occurs when both mentors and mentees value these relationships. As one academic interviewee noted: “[My mentor] asked me for advice on certain things about where they’re going right career wise... I think that’s allowed us to have a stronger sort of mentoring relationship”. Some NYT portrayals of mentorship also suggested rich, reciprocal relationships. A dancer with a ballet company described her mentor:She doesn't talk at you. She talks with you. I've never thought about dancing as much as I've thought about it working with her. I feel like as a ballerina, you smile and nod and you take the beating. This is more collaborative. In school, I was always waiting to find a professor that I would bond with and who would mentor me. All I had to do was walk over to Barnard, get into the studio, and there she was. I found Twyla. Or she found me. (Kourlas AR.7)The mutuality of the mentorship evident in this dancer’s recollection is echoed in a NYT account of the role of fashion models in mentoring colleagues: “They were...mentors and connectors and facilitators, motivated...by the joy of discovering talent and creating beauty” (Trebay D.8). Yet in other media accounts, mentorship appeared unidirectional, almost one-dimensional: “Judge Forrest noted in court that he had been seen as a mentor for young people” (Moynihan A.21). Here, the focus seemed to be on the benefits, or status, accrued by the mentor. Importance of the RelationshipAcademic interviewees viewed mentors as sources of knowledge, guidance, feedback, and sponsorship. They believed mentorship had profoundly impacted their careers and that “finding a mentor can be one of the most important things” anyone could do. In the NYT portrayals, mentors were also recognized for the significant, often lasting, impact they had on the lives of their mentees. A choreographer said “the lessons she learned from her former mentor still inspire her — ‘he sits on my shoulder’” (Gold CT 11). A successful CEO of a software firm recollected how mentors enabled him to develop professional confidence: “They would have me facilitate meetings with clients early on in my career. It helped build up this reservoir of confidence” (Bryant, Candid Questions BU.2).Other accounts in academic interviews and NYT highlighted how defining moments in even short-term mentoring relationships can provoke fundamental and lasting changes in attitudes and behaviours. One interviewee who recently experienced a career change said she derived comfort from connecting with a mentor who had experienced a similar transition: “oh there’s somebody [who] talks my language...there is a place for me.” As a CEO in the NYT recalled: “An early mentor of mine said something to me when I was going to a new job: ‘Don't worry. It's just another dog and pony show.’ That really stayed with me” (Bryant, Devil’s Advocate BU.2). A writer quoted in a NYT article also recounted how a chance encounter with a mentor changed the course of his career: “She said... that my problem was not having career direction. ‘You should become a teacher,’ she said. It was an unusual thing to hear, since that subject had never come up in our conversations. But I was truly desperate, ready to hear something different...In an indirect way, my life had changed because of that drink (DeMarco ST.6).Mentorship was also celebrated in the NYT in the form of 116 obituary notices as a means of honouring and immortalising a life well lived. The mentoring role individuals had played in life was highlighted alongside those of child, parent, grandparent and spouse.Metaphor and ArchetypeMetaphors imbue language with imagery that evokes emotions, sensations, and memories in ways that other forms of speech or writing cannot, thus enabling us communicate complex ideas or beliefs. Academic interviewees invoked various metaphors to illustrate mentorship experiences. One interviewee spoke of the “blossoming” relationship while another commented on the power of the mentoring experience to “lift your world”. In the NYT we identified only one instance of the use of metaphor. A CEO of a non-profit organisation explained her mentoring philosophy as follows: “One of my mentors early on talked about the need for a leader to be a ‘certain trumpet’. It comes from Corinthians, and it's a very good visualization -- if the trumpet isn't clear, who's going to follow you?” (Bryant, Zigzag BU.2).By comparison, we noted numerous instances in the NYT wherein mentors were present as characters, or archetypes, in film, performing arts, and television. Archetypes exhibit attributes, or convey meanings, that are instinctively understood by those who share common cultural, societal, or racial experiences (Lane 232) For example, a NYT film review of The Assassin states that “the title character [is] trained in her deadly vocation by a fierce, soft-spoken mentor” (Scott C.4). Such characterisations rely on audiences’ understanding of the inherentfunction of the mentor role, and, like metaphors, can help to convey that which is compelling or complex.Intentionality and TrustIn interviews, academics spoke of the time and trust required to develop mentoring relationships. One noted “It may take a bit of an effort... You don’t get to know a person very well just meeting three times during the year”. Another spoke of trust and comfort as defining these relationships: “You just open up. You feel immediately comfortable”. We also found evidence of trust and intentionality in NYT accounts of these relationships. Mentees were often portrayed as seeking out and relying on mentorship. A junior teacher stated that “she would lean on mentors at her new school. You are not on that island all alone” (Rich A1). In contrast, there were few explicit accounts of intentionality and reflection on the part of a mentor. In one instance, a police officer who participated in a mentorship program for street kids mused “it's not about the talent. It was just about the interaction”. In another, an actor described her mentoring experiences as follows: “You have to know when to give advice and when to just be quiet and listen...no matter how much you tell someone how it goes, no one really wants to listen. Their dreams are much bigger than whatever fear or whatever obstacle you say may be in their path” (Syme C.5).Many NYT articles present career mentoring as a role that can be assumed by anyone with requisite knowledge or experience. Indeed, some accounts of mentorship arguably more closely resembled role model relationships, wherein individuals are admired, typically from afar, and emulated by those who aspire to similar accomplishments. Here, there was little, if any, apparent awareness of the complexity or potential impact of these relationships. Rather, we observed a casualness, an almost striking superficiality, in some NYT accounts of mentoring relationships. Examples ranged from references to “sartorial mentors” (Pappu D1) to a professional coach who shared: “After being told by a mentor that her scowl was ‘setting her back’ at work, [she] began taking pictures of her face so she could try to look more cheerful” (Bennett ST.1).Trust, an essential component of mentorship, can wither when mentors occupy dual roles, such as that of mentor and supervisor, or engage in mentoring as a means of furthering their own interests. While some academic interviewees were mentored by past and current supervisors, none reported any instance of role conflict. However in the NYT, we identified multiple instances where mentorship programs intentionally, or unintentionally, inspired divided loyalties. At one academic institution, peer mentors were “encouraged to befriend and offer mentorship to the students on their floors, yet were designated ‘mandatory reporters’ of any incident that may violate the school policy” (Rosman ST.1). In another media story, government employees in a phased-retirement program received monetary incentives to mentor colleagues: “Federal workers who take phased retirement work 20 hours a week and agree to mentor other workers. During that time, they receive half their pay and half their retirement annuity payout. When workers retire completely, their annuities will include an increase to account for the part-time service” (Hannon B.1). More extreme depictions of conflict of interest were evident in other NYT reports of mentors and mentees competing for job promotions, and mentees accusing mentors of sexual harassment and rape; such examples underscore potential for abuse of trust in these relationships.Discussion/ConclusionsOur exploration of mentorship in the NYT suggests mentorship is embedded in our culture, and is a means by which we develop competencies required to integrate into, and function within, society. Whereas, traditionally, mentorship was an informal relationship that developed over time, we now see a wider array of mentorship models, including formal career and youth programs aimed at increasing access to mentorship, and mentor-for-hire arrangements in business and professional sports. Such formal programs can offer redress to those who lack informal mentorship opportunities, and increased initiatives of this sort are welcome.Although standards of reporting in news media surely account for some of the lack of detail in many NYT reports of mentorship, such brevity may also suggest that, while mentoring continues to grow in popularity, we may have compromised substance for availability. Considerations of the training, time, attention, and trust required of these relationships may have been short-changed, and the tendency we observed in the NYT to conflate role modeling and mentorship may contribute to depictions of mentorship as a quick fix, or ‘mentorship light’. Although mentorship continues to be lauded as a means of promoting personal and professional development, not all mentoring may be of similar quality, and not everyone has comparable access to these relationships. While we continue to honour the promise of mentorship, as with all things worth having, effective mentorship requires effort. This effort comes in the form of preparation, commitment or intentionality, and the development of bonds of trust within these relationships. In short, overuse of, over-reference to, and misapplication of the mentorship label may serve to dilute the significance and meaning of these relationships. Further, we acknowledge a darker side to mentorship, with the potential for abuses of power.Although we have reservations regarding some trends towards the casual usage of the mentorship term, we are also heartened by the apparent scope and reach of these relationships. Numerous individuals continue to draw comfort from advice, sponsorship, motivation, support and validation that mentors provide. Indeed, for many, mentorship may represent an essential lifeline to navigating life’s many challenges. We, thus, conclude that mentorship, in its many forms, is here to stay.ReferencesBennett, Jessica. "Cursed with a Death Stare." New York Times (East Coast) 2 Aug. 2015, late ed.: ST.1.Bryant, Adam. "Designate a Devil's Advocate." New York Times (East Coast) 9 Aug. 2015, late ed.: BU.2.Bryant, Adam. "The Power of Candid Questions." New York Times (East Coast) 16 Aug. 2015, late ed.: BU. 2.Bryant, Adam. "Zigzag Your Way to the Top." New York Times (East Coast) 13 Sept. 2015, late ed.: BU.2.DeMarco, Peter. "One Life, Shaken and Stirred." New York Times (East Coast) 23 Aug. 2015, late ed.: ST.6.DuBois, David L., Nelson Portillo, Jean E. Rhodes, Nadia Silverhorn and Jeffery C. Valentine. "How Effective Are Mentoring Programs for Youth? A Systematic Assessment of the Evidence." Psychological Science in the Public Interest 12.2 (2011): 57-91.Eby, Lillian T., Tammy D. Allen, Brian J. Hoffman, Lisa E. Baranik, …, and Sarah C. Evans. "An Interdisciplinary Meta-analysis of the Potential Antecedents, Correlates, and Consequences of Protégé Perceptions of Mentoring." Psychological Bulletin 139.2 (2013): 441-76.Gold, Sarah. "Preserving a Master's Vision of Sugar Plums." New York Times (East Coast) 6 Dec. 2015, late ed.: CT 11.Hannon, Kerry. "Retiring, But Not All at Once." New York Times (East Coast) 22 Aug. 2015, late ed.: B.1.Kourlas, Gia. "Marathon of a Milestone Tour." New York Times Late Edition (East Coast) 6 Sept. 2015: AR.7.Lane, Lauriat. "The Literary Archetype: Some Reconsiderations." The Journal of Aesthetics and Art Criticism 13.2 (1954): 226-32.Levinson, Daniel. J. The Seasons of a Man's Life. New York: Ballantine, 1978.Merriam, Sharan. "Mentors and Protégés: A Critical Review of the Literature." Adult Education Quarterly 33.3 (1983): 161-73.Moynihan, Colin. "Man's Cooperation in Terrorist Cases Spares Him from Serving More Time in Prison." New York Times (East Coast) 24 Oct. 2015, late ed.: A.21.Pappu, Sridhar. "Tailored to the Spotlight." New York Times (East Coast) 27 Aug. 2015, late ed.: D1.Rich, Motoko. "Across Country, a Scramble Is On to Find Teachers." New York Times (East Coast) 10 Aug. 2015, late ed.: A1.Rosman, Katherine. "On the Campus Front Line." New York Times (East Coast) 27 Sept. 2015, late ed.: ST.1.Scott, AO. "The Delights to Be Found in a Deadly Vocation." New York Times (East Coast) 16 Oct. 2015, late ed.: C.4.Shpigel, Ben. "An Exchange of Respect in the Swapping of Jerseys." New York Times (East Coast) 18 Oct. 2015, late ed.: SP.1.Slaughter, Ann-Marie. "A Toxic Work World." New York Times (East Coast) 20 Sept. 2015, late ed.: SR.1.Syme, Rachel. "In TV, Finding a Creative Space with No Limitations." New York Times (East Coast) 26 Aug. 2015, late ed.: C.5.Trebay, Guy. "Remembering a Time When Fashion Shows Were Fun." New York Times (East Coast) 10 Sept. 2015, late ed.: D.8.World Association of Newspapers and News Publishers. World Press Trends Report. Paris: WAN-IFRA, 2015.

APA, Harvard, Vancouver, ISO, and other styles

We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography
Journal articles: 'Trusted data path' – Grafiati (2024)

References

Top Articles
Hearty White Bean Soup with Sausage
Broccoli Cauliflower Soup
Wcco Crime News
NFL on CBS Schedule 2024 - How To Watch Live Football Games
Mychart.texaschildrens.org.mychart/Billing/Guest Pay
Lynaritaa Boobs
Craigslist In Lakeland
North Station To Lowell Schedule
Craigslist Pets Longview Tx
Craigsist Houston
Local Dog Boarding Kennels Near Me
How To Get To Brazil In Slap Battles
Betty Rea Ice Cream
Craigslist Metal Roofing
1977 Elo Hit Wsj Crossword
Justine Waddell talks about a season of screenings MELODIA!
Fintechzoommortgagecalculator.live Hours
T33N Leaks 5 17
Usccb 1 John 4
ACCESS Arts Live --- Online Performing Arts for All on LinkedIn: Leeds International Piano Competition 2024 | Second Round | 12 September…
Icdrama Hong Kong Drama
Norte Asesores Nanda
Gcfysl
Evertote.ca
Diabetes Care - Horizon Blue Cross Blue Shield of New Jersey
What tools do you recommend for emceeing?
Skyward Login Waxahachie
Mark Rosen announces his departure from WCCO-TV after 50-year career
Bollywood Movies 123Movies
Theatervoorstellingen in Roosendaal, het complete aanbod.
Hyb Urban Dictionary
Marissa.munoz17
Papamurphys Near Me
Slim Thug’s Wealth and Wellness: A Journey Beyond Music
Switchback Travel | Best Camping Chairs of 2024
How To Delete Jackd Account
Riverwood Family Services
Why Larry the cat of 10 Downing Street wishes Starmer hadn’t won the election
15 Best Things to Do in Tulare, CA - Travel Lens
Jodie Sweetin Breast Reduction
Craigs List New Haven Ct
Supercopbot Keywords
Cashtapp Atm Near Me
2Nd Chance Apartments In Richmond Va
Justina Morley Now
10 Teacher Tips to Encourage Self-Awareness in Teens | EVERFI
How to Survive (and Succeed!) in a Fast-Paced Environment | Exec Learn
Craigslist Covington Georgia
Pinellas Fire Active Calls
Gatlinburg SkyBridge: Is It Worth the Trip? An In-Depth Review - Travel To Gatlinburg
Saryn Prime Build 2023
8 Internet Celebrities who fell prey to Leaked Video Scandals
Latest Posts
Article information

Author: Duane Harber

Last Updated:

Views: 6284

Rating: 4 / 5 (71 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Duane Harber

Birthday: 1999-10-17

Address: Apt. 404 9899 Magnolia Roads, Port Royceville, ID 78186

Phone: +186911129794335

Job: Human Hospitality Planner

Hobby: Listening to music, Orienteering, Knapping, Dance, Mountain biking, Fishing, Pottery

Introduction: My name is Duane Harber, I am a modern, clever, handsome, fair, agreeable, inexpensive, beautiful person who loves writing and wants to share my knowledge and understanding with you.