scholarly journals "Hey, check it out, there's actually fans": (Dis)empowerment and (mis)representation of cult fandom in Supernatural

Author(s):  
Laura E. Felschow

As Supernatural enters season 5, its status as a cult hit is becoming more evident both in the press and within the text of the series itself. The open acknowledgment of the show's fandom within 4.18 "The Monster at the End of This Book" has altered the power relationship between the product and its fans and brought on controversy regarding the creative team's attitude toward fandom in general. To investigate this relationship between Supernatural and its devoted fans, I will first develop a working definition of the cult fan and illustrate the many ways in which Supernatural is an ideal cult text, despite not having been marketed by its producers and network as such. Having set forth this framework, I will outline the dynamic that existed between Supernatural and its cult fans prior to "The Monster at the End of This Book." I will then demonstrate how "The Monster at the End of This Book" simultaneously empowers and disempowers Supernatural's cult fans by representing them within the show's diegesis and what the consequences of these (mis)representations might be.

2016 ◽  
pp. 1723-1738
Author(s):  
Iheanyi Chuku Egbuta ◽  
Brychan Thomas ◽  
Said Al-Hasan

The aims of the chapter are to consider the strategic green issues of teleworking in terms of the environment, transport, location, office space, and resource use for modern organisations and business sectors and to formulate a conceptual model of the processes involved. In fact, teleworking technologies are variously implemented for green computing initiatives, and the many advantages include lower greenhouse gas emissions related to travel, greater worker satisfaction, and as a result of lower overhead office costs, increased profit margins. The chapter initially investigates the appropriateness of a working definition of teleworking with regard to green computing, and following this, explores the benefits and barriers of teleworking in a green computing environment. The theoretical frameworks and models of teleworking are then considered, and a conceptual model of the contribution of teleworking to green computing is formulated. It is the intention of the chapter to identify and articulate those teleworking concepts that will be useful to academicians, scientists, business entrepreneurs, practitioners, managers, and policy makers, and to indicate future research directions for research scholars and students with similar interests.


Author(s):  
G. Giacomello

Computers have always caused psychological uneasiness in the human brain. That a computer is the closet thing to a thinking machine can be discomforting. That average users have little understanding of the complexity and intricacies of how computers and software operate only add to the distress. Networked computers further increased the puzzlement of human beings. The media (suffering from the same poverty of information as the public) have picked up catchwords like cyberwar, netwars, cyberterrorism, and cybercrime. Speaking of Electronic Pearl Harbors and comparing modems to bombs have only contributed to increasing the level of media hysteria and confusion in public opinion. Schwartau (1994) is a classic example. Imagine that poorly informed journalists start telling the general public that ruthless hackers (hired by terrorists) could take over the power grid and shut it down, or cause patients’ death after their medical records have been compromised. The mere suspicion that terrorists could perform such acts would be enough to fueling the fear factor, which regularly happens as a result of this crying wolf. Under these circumstances, cyberterrorism seems like a nightmare come true. As Embar-Seddon (2002) noted, the word terrorism brings together two significant modern fears: the fear of technology and the fear of terrorism. Both technology and terrorism are significant unknowns and unknown threats are generally perceived as more threatening than known threats. To some extent, cyberterrorism does not need to be manifested itself in any significant way because many already believe it to be real. This article will try to dispel some of the myths of cyberterrorism, such as the contention that terrorists could remotely take control of critical infrastructure and thus bring a country to its knees. In fact, today, cybercrime and economic damage caused by hackers are far more real and serious threats than terrorists. Misdeeds are more likely to be committed by disgruntled insiders than skilled outsiders (Randazzo et al., 2004). There is no commonly accepted definition of terrorism, hence cyberterrorism has been variously interpreted. For example, Sofaer et al. (2000) defines it as “intentional use or threat of use, without legally recognized authority, of violence, disruption or interference against cyber systems” (p. 26), resulting in death or injury of people, damage to physical property, civil disorder, or economic harm. The probability, however, that cyberattacks may actually cause victims is extremely low. Furthermore, Sofaer et al. tends to exclude states from committing terrorist acts, which is also debatable. Hughes (2004) observes cyberterrorism as a diverse set of technologies whose purpose is to scare people, but scaring people without getting anything in return is simply useless. Paraphrasing a working definition of terrorism, I would identify cyberterrorism as the use of digital means to threat or undertake acts of organized violence against civilians to achieve political advantages. Perpetrators then could be nonstate groups or sovereign states. Terrorists spreading scary stories to terrify the populace via the Internet would also qualify. Finally, because of cost efficiency, information and communication technologies have blurred the distinction that long existed between the noncombatant and the combatant spheres. The technology on which the military now rely is exactly the same commercial off-the-shelf hardware and software products that civilians have in their homes and offices (Department of the Army, 2003). Military and civilians alike use largely the same computer networks, which were designed for ease of use and not for hardened communications. During the Cold War, dual use technology (civilian hardware and software) was considered “dangerous” because it could help the Soviets close the gap with the West. Paradoxically, dual-use technologies are now “good.” One of the many downsides of such a situation is that if terrorists hit computer networks, in theory, they could hit multiple targets: the economy, law enforcement agencies, emergency services, and (albeit to a lesser extent) even the military. For terrorists this scenario would be a dream come true. Reality, however, is substantially different.


Author(s):  
Iheanyi Chuku Egbuta ◽  
Brychan Thomas ◽  
Said Al-Hasan

The aims of the chapter are to consider the strategic green issues of teleworking in terms of the environment, transport, location, office space, and resource use for modern organisations and business sectors and to formulate a conceptual model of the processes involved. In fact, teleworking technologies are variously implemented for green computing initiatives, and the many advantages include lower greenhouse gas emissions related to travel, greater worker satisfaction, and as a result of lower overhead office costs, increased profit margins. The chapter initially investigates the appropriateness of a working definition of teleworking with regard to green computing, and following this, explores the benefits and barriers of teleworking in a green computing environment. The theoretical frameworks and models of teleworking are then considered, and a conceptual model of the contribution of teleworking to green computing is formulated. It is the intention of the chapter to identify and articulate those teleworking concepts that will be useful to academicians, scientists, business entrepreneurs, practitioners, managers, and policy makers, and to indicate future research directions for research scholars and students with similar interests.


2017 ◽  
Author(s):  
David Yamane

American gun culture has undergone a profound change over the past half century, from a culture rooted in hunting and recreational shooting to one centered on armed citizenship and personal defense. As shorthand, I describe this as an evolution from Gun Culture 1.0 to Gun Culture 2.0. In this paper, I begin by giving a brief history of the rise of Gun Culture 2.0. I then propose a cultural approach to studying gun culture, based on a working definition of culture that emphasizes the ways in which culture helps us to understand the world by defining problems and prospects and helps us to act in the world by suggesting recipes and providing tools for action in relation to those problems and prospects. Here, objects of material culture like guns and gun-related accessories play an important role. Far from being static entities, in addressing the problems associated with carrying concealed weapons in everyday life, these technologies respond to and facilitate the cultural practice of gun carrying which is central to Gun Culture 2.0. I apply this cultural approach to studying gun culture using ethnographic observation of a Concealed Carry Expo to explore some of the many technologies that have been developed to help those who want to be armed citizens reconcile the competing demands of carrying a concealed handgun in public. These material culture technologies include guns and holsters, as well as products designed to address women’s specific carry needs.


2021 ◽  
pp. 73-100
Author(s):  
Neal M. Krause

Many researchers focus primarily on the frequency of church attendance when they study the religion-and-health relationship. The many shortcomings of this strategy are discussed in this chapter. A plea is made for focusing on communities of faith instead. Four issues involving communities of faith are examined: (1) a preliminary working definition of communities of faith is provided; (2) because communities of faith constitute a vast conceptual domain, a good deal of this chapter is spent on identifying the key characteristics of communities of faith and explaining how they arise and are maintained; (3) in an effort to move the literature forward, a detailed research plan for devising measures of communities of faith is presented; and (4) a submodel is provided that further illuminates the relationship between religious identities and communities of faith.


PsycCRITIQUES ◽  
2013 ◽  
Vol 58 (25) ◽  
Author(s):  
Robert Farr

2013 ◽  
Vol 42 (4) ◽  
pp. 3-9
Author(s):  
Armin Geertz

This introduction to the special issue on narrative discusses various ways of approaching religious narrative. It looks at various evolutionary hypotheses and distinguishes between three fundamental aspects of narrative: 1. the neurobiological, psychological, social and cultural mechanisms and processes, 2. the many media and methods used in human communication, and 3. the variety of expressive genres. The introduction ends with a definition of narrative.


2020 ◽  
Author(s):  
Amanda S Newton ◽  
Sonja March ◽  
Nicole D Gehring ◽  
Arlen K Rowe ◽  
Ashley D Radomski

BACKGROUND Across eHealth intervention studies involving children, adolescents, and their parents, researchers have measured users’ experiences to assist with intervention development, refinement, and evaluation. To date, there are no widely agreed-on definitions or measures of ‘user experience’ to support a standardized approach for evaluation and comparison within or across interventions. OBJECTIVE We conducted a scoping review with subsequent Delphi consultation to (1) identify how user experience is defined and measured in eHealth research studies, (2) characterize the measurement tools used, and (3) establish working definitions for domains of user experience that could be used in future eHealth evaluations. METHODS We systematically searched electronic databases for published and gray literature available from January 1, 2005 to April 11, 2019. Studies assessing an eHealth intervention that targeted any health condition and was designed for use by children, adolescents, and their parents were eligible for inclusion. eHealth interventions needed to be web-, computer-, or mobile-based, mediated by the internet with some degree of interactivity. Studies were also required to report the measurement of ‘user experience’ as first-person experiences, involving cognitive and behavioural factors, reported by intervention users. Two reviewers independently screened studies for relevance and appraised the quality of user experience measures using published criteria: ‘well-established’, ‘approaching well-established’, ‘promising’, or ‘not yet established’. We conducted a descriptive analysis of how user experience was defined and measured in each study. Review findings subsequently informed the survey questions used in the Delphi consultations with eHealth researchers and adolescent users for how user experience should be defined and measured. RESULTS Of the 8,634 articles screened for eligibility, 129 and one erratum were included in the review. Thirty eHealth researchers and 27 adolescents participated in the Delphi consultations. Based on the literature and consultations, we proposed working definitions for six main user experience domains: acceptability, satisfaction, credibility, usability, user-reported adherence, and perceived impact. While most studies incorporated a study-specific measure, we identified ten well-established measures to quantify five of the six domains of user experience (all except for self-reported adherence). Our adolescent and researcher participants ranked perceived impact as one of the most important domains of user experience and usability as one of the least important domains. Rankings between adolescents and researchers diverged for other domains. CONCLUSIONS Findings highlight the various ways user experience has been defined and measured across studies and what aspects are most valued by researchers and adolescent users. We propose incorporating the working definitions and available measures of user experience to support consistent evaluation and reporting of outcomes across studies. Future studies can refine the definitions and measurement of user experience, explore how user experience relates to other eHealth outcomes, and inform the design and use of human-centred eHealth interventions.


2021 ◽  
Vol 7 ◽  
pp. 237802312110244
Author(s):  
Katrin Auspurg ◽  
Josef Brüderl

In 2018, Silberzahn, Uhlmann, Nosek, and colleagues published an article in which 29 teams analyzed the same research question with the same data: Are soccer referees more likely to give red cards to players with dark skin tone than light skin tone? The results obtained by the teams differed extensively. Many concluded from this widely noted exercise that the social sciences are not rigorous enough to provide definitive answers. In this article, we investigate why results diverged so much. We argue that the main reason was an unclear research question: Teams differed in their interpretation of the research question and therefore used diverse research designs and model specifications. We show by reanalyzing the data that with a clear research question, a precise definition of the parameter of interest, and theory-guided causal reasoning, results vary only within a narrow range. The broad conclusion of our reanalysis is that social science research needs to be more precise in its “estimands” to become credible.


2020 ◽  
Vol 6 (1) ◽  
pp. 713-722
Author(s):  
Vincent Boswijk ◽  
Matt Coler

AbstractA commonly used concept in linguistics is salience. Oftentimes it is used without definition, and the meaning of the concept is repeatedly assumed to be self-explanatory. The definitions that are provided may vary greatly from one operationalization of salience to the next. In order to find out whether it is possible to postulate an overarching working definition of linguistic salience that subsumes usage across linguistic subdomains, we review these different operationalizations of linguistic salience. This article focuses on salience in sociolinguistics, cognitive linguistics, second-language acquisition (SLA), and semantics. In this article, we give an overview of how these fields operationalize salience. Finally, we discuss correlations and contradictions between the different operationalizations.


Sign in / Sign up

Export Citation Format

Share Document