Family Matters: Trauma and the Legacy of War in James Allen Moad II’s Outside Paducah: The Wars at Home

2021 ◽  
Vol 9 (2) ◽  
pp. 250-262
Author(s):  
Andrea Roxana Bellot

Abstract Outside Paducah: The Wars at Home (2016), a play written and performed solo by James Allen Moad II, a former Air Force pilot, explores the enduring effects of war on American veterans and their families after soldiers return home from the battleground. The play moves beyond the individual representation of a traumatized veteran by addressing two intertwined issues: the collective and transgenerational burden of war, both in the form of physical wounds and/or moral injuries. Outside Paducah contributes to promoting the stage as a dynamic place to think about the war legacy and to question and challenge war itself by stressing the importance of understanding the cost of war on both personal and societal levels. The play shows that the scenes of war fought in foreign lands are brought back to the home territories and families, who become equally demoralised by the perpetuation of war in their homelands. The soldiers return as ghosts of their previous selves and haunt their families and friends from one generation to the next. Therefore, war remains an open wound at the core of the American nation. At the same time, the play sheds some light on the harsh realities of the underprivileged and how joining the military often seems to provide a way out of the world of poverty and lack of resources.

2020 ◽  
Author(s):  
Stephen Garton

War has shaped Australian society profoundly. When we commemorate the sacrifices of the Anzacs, we rightly celebrate their bravery, but we do not always acknowledge the complex aftermath of combat. In The Cost of War, Stephen Garton traces the experiences of Australia’s veterans, and asks what we can learn from their stories. He considers the long-term effects of war on returned servicemen and women, on their families and communities, and on Australian public life. He describes attempts to respond to the physical and psychological wounds of combat, from the first victims of shellshock during WWI to more recent understandings of post-traumatic stress disorder. And he examines the political and social repercussions of war, including debates over how we should commemorate conflict and how society should respond to the needs of veterans. When the first edition of The Cost of War appeared in 1996, it offered a ground-breaking new perspective on the Anzac experience. In this new edition, Garton again makes a compelling case for a more nuanced understanding of the individual and collective costs of war.


2014 ◽  
Vol 43 (1) ◽  
pp. 53-69
Author(s):  
Amyn B. Sajoo

Principlist modes of reasoning in bioethics – with autonomy at the core – resonate strongly with a legalism that dominates Muslim ethics, including the understanding of the shari’a. From abortion and organ donation/transplant to end-of-life decisions, both secular and Muslim bioethics generally apply “cardinal” principles in ways felt to be relatively objective and certain, though they may produce different outcomes. This article builds on recent critiques, notably that of virtue ethics, in drawing attention to the cost in sensitivity to context and the individual. The Aristotelian basis of virtue ethics has a venerable place in Islamic traditions – as does maslaha, the public good, which has long played a critical role in tempering formalism in the shari’a. In conjunction with the agent- and context-centred reasoning of virtue ethics, maslaha can contribute vitally to negotiating competing bioethical claims. It is also more inclusive than principlist legalism, given the latter’s traditionalist and patriarchal moorings. The shift is urgent amid the growing interface of religious and secular approaches to problems raised by biomedical technologies, and to biosocial issues such as female genital mutilation (FGM) and honour killings.


2017 ◽  
Author(s):  
Hari Sivakumar ◽  
João P. Hespanha ◽  
Kyoungmin Roh ◽  
Stephen R. Proulx

We study the evolution of thep53 core regulation network across the taxonomic span of humans to protozoans and nematodes. We introduce a new model for the core regulation network in mammalian cells, and conduct a formal analysis of the different network configurations that emerge in the evolutionary path to complexity. Solving the high dimensional equations associated with this model is typically challenging, and we develop a novel algorithm to overcome this problem. A key technical tool used is the representation of the distinct pathways in the core regulation networks as “modules”, such that the behavior of the composite of two or more modules can be inferred from the characteristics of each of the individual modules. Apart from simplifying the complexity of the algorithm, this modular representation also allows us to qualitatively compare the distinct types of switching behaviors each network can exhibit. This then allows us to demonstrate how our model for the core regulation network in mammalian cells matches experimentally observed phenomena, and contrast this with the plausible behaviors admitted by the network configurations in putative primordial organisms. We show that the complexity of thep53 core regulation network in vertebrates permits a range of behaviors that can bring about distinct cell fate decisions not possible in the putative primordial organisms.Significance StatementThep53 protein has been protecting organisms from tumors for a billion years. We study the link between the evolution of thep53 network structure and its corresponding tumor suppression strategies. We compare the dynamical behaviors in putative primordial organisms with simple networks with the vertebrate network that contains multiple feedback loops. We show that the vertebrate network, but not the ancestral network, can both repair moderate damage and induce apoptosis if too much damage accumulates, balancing the risk of cancer with the cost of too much cell death. Moreover, the complexity of the vertebrate network allows for adaptation, for example to increasep53 network sensitivity, which is consistent with recent research on large mammals.


2021 ◽  
Vol 14 (1) ◽  
pp. 43-61
Author(s):  
Sandor Fabian

How do U.S. International Military Education and Training programs affect the recipient states` behavior in militarized interstate disputes? While the relationship between U.S. military aid in the form of arms and equipment transfer and MID involvement has been studied extensively in international relations literature the effects of U.S. IMET programs on the same phenomena has been largely ignored. This study intends to fill some of this gap. This paper proposes that American educated and trained foreign military personnel return home with a better understanding about the role of the military as an instrument of national power, civil-military relations, and the cost of war. These military personnel advise their political masters against the use of military force during international disputes leading to a decreased probability of both MID initiation and escalation. To test this argument the analysis employs a merged dataset from the Correlates of War Projects and the most prominent U.S. IMET and coups data. Using logistic regression analysis this study finds that more U.S. IMET support a country receives the less likely it initiates MIDs. The analysis also finds that countries that receive U.S. IMET support are less likely to escalate ongoing MIDs to higher levels of hostility.


2019 ◽  
Vol 20 (4) ◽  
pp. e523-e544 ◽  
Author(s):  
Vesa Kanniainen

Abstract Cyber technology represents digital military capability with the purpose of causing damage to the military strength of a potential enemy. War using conventional weapons may be preceded by a strike using cyber technology. This paper introduces such technology into the theory of conflicts. The cost of war relative to the payoff from victory turns out to be crucial for the results on armament decisions. In the war game, two types of Nash equilibria may arise. One is subject to warfare while the other is not (‘equilibrium of terror’), depending on the perceived cost of war. In a symmetric war game, cyber capabilities are neutral with respect to the investments in conventional weapons, but they make wars more likely. Asymmetric access to cyber technology limits the international arms race with conventional weapons. A low success probability in the cyber programme encourages exercising the cyberattack option as the enemy may not have access to cyber capability. Uncertainty of the success of a cyber programme makes countries cautious when allocating resources not only to these programmes but also in conventional armament.


2020 ◽  
Vol 16 (12) ◽  
pp. 2363-2380
Author(s):  
S.B. Zainullin ◽  
O.A. Zainullina

Subject. The military-industrial complex is one of the core industries in any economy. It ensures both the economic and global security of the State. However, the economic security of MIC enterprises strongly depends on the State and other stakeholders. Objectives. We examine key factors of corporate culture in terms of theoretical and practical aspects. The article identifies the best implementation of corporate culture that has a positive effect on the corporate security in the MIC of the USA, the United Kingdom, the European Union, Japan ans China. Methods. The study employs dialectical method of research, combines the historical and logic unity, structural analysis, traditional techniques of economic analysis and synthesis. Results. We performed the comparative analysis of corporate culture models and examined how they are used by the MIC corporations with respect to international distinctions. Conclusions and Relevance. The State is the main stakeholder of the MIC corporations, since it acts as the core customer represented by the military department. It regulates and controls operations. The State is often a major shareholder of such corporations. Employees are also important stakeholders. Hence, trying to satisfy stakeholders' needs by developing the corporate culture, corporations mitigate their key risks and enhance their corporate security.


Author(s):  
Pavlo Rodionov ◽  
◽  
Anna Ploskonos ◽  
Lesya Gavrutenko ◽  
◽  
...  

The paper analyzes the factors that affect the amount of effort required to create a mobile application and its cost. It is established that the main factors of influence are the design of the application, its functionality, the type of mobile platform, the availability and level of testing and support, as well as the individual characteristics of the developer. Based on the analysis of information sources, the main methods and approaches to forecasting the cost of software products are identified, which include the COCOMO model, Price-to-win method, expert evaluation, algorithmic methods and the method of analogies. It is proposed to consider the method of analogies as a tool that allows you to make predictions about the cost of resources required for the successful implementation of IT projects based on the experience of similar projects. It is proved that the advantages of this method are the simplicity of its implementation and the clarity of the results obtained, which follows from the practical orientation of this tool. Among the limitations of the method of analogy is the mandatory need for reliable data relating to similar projects, as well as the difficulty of taking into account unspecified indicators. Taking into account the mentioned limitations of the method of analogies and on the basis of the analysis of scientific sources the possible directions of its optimization are determined. Thus, among the ways to improve the effectiveness of this method are those aimed at optimizing the project selection process, the data for which are used as a basis for forecasting. Attempts to improve the method of analogies by including parameters that were previously ignored by this technique seem promising. This in turn can lead to an expansion of the scope of the method of analogies and increase the accuracy of forecasts. As prospects for further research, the need to continue research in the field of optimization of the method of analogies with the subsequent practical verification of theoretical positions on the data of real projects.


2020 ◽  
Author(s):  
Keith Payne ◽  
Heidi A. Vuletich ◽  
Kristjen B. Lundberg

The Bias of Crowds model (Payne, Vuletich, & Lundberg, 2017) argues that implicit bias varies across individuals and across contexts. It is unreliable and weakly associated with behavior at the individual level. But when aggregated to measure context-level effects, the scores become stable and predictive of group-level outcomes. We concluded that the statistical benefits of aggregation are so powerful that researchers should reconceptualize implicit bias as a feature of contexts, and ask new questions about how implicit biases relate to systemic racism. Connor and Evers (2020) critiqued the model, but their critique simply restates the core claims of the model. They agreed that implicit bias varies across individuals and across contexts; that it is unreliable and weakly associated with behavior at the individual level; and that aggregating scores to measure context-level effects makes them more stable and predictive of group-level outcomes. Connor and Evers concluded that implicit bias should be considered to really be noisily measured individual construct because the effects of aggregation are merely statistical. We respond to their specific arguments and then discuss what it means to really be a feature of persons versus situations, and multilevel measurement and theory in psychological science more broadly.


2018 ◽  
Vol 28 (6) ◽  
pp. 2161-2165
Author(s):  
Hristo Ivanov Popnikolov

From the subject presented in the report it is evident that the pre-trial and the court bodies may, to some extent, be influenced both by the person of the accused and by his competence to participate in the criminal process. In this regard as an expert, the psychologist can offer invaluable assistance. Each expertise would assist all actors involved in the administration of justice on their objective assessment of the offenders, the understanding of their individual protection and the inherent self-justification during procedural actions. The involvement of psychologists in the criminal process is key to establishing the truth in the investigation, because every crime as an act has a subjective side, expressed in the psychic attitude of the perpetrator to the committed act. Establishing these psychological motives is a key point in the criminal process with a view to establishing the truth.Psychological protection stabilizes the personality in the critical conditions of counteraction, related to the elimination of the experiences of tension, anxiety, stress and frustration, leading to maximum mobilization of its resources and at the same time to their overpayment. Thus, the individual who is the subject of the process action is protected against the adverse external influences, but at the cost of a lot of effort and enormous loss of nervous-mental energy, which increases his own vulnerability instead of contributing to its reduction. The appearance and functioning of psychological protection can be significantly impeded by the interaction of the investigator with the accused. Even more complicated is the situation when it breaks the communication contact that may arise in the psychological alienation and self-isolation of the accused due to the desire to protect himself.Protective psychological dominance is a real psychic activity that investigators, investigators, investigators and judges need to take into account in order to effectively deal with their task and to overcome the resistance of the investigated persons and in a time to prove in a lawful and moral way their guilt and participation in the commitment of the crimes.


Sign in / Sign up

Export Citation Format

Share Document