This chapter explores the role of postmodern intertextuality in Neil Jordan’s 2012 vampire film Byzantium. This intertextuality serves to place the film in dialogue with…
This chapter explores the role of postmodern intertextuality in Neil Jordan’s 2012 vampire film Byzantium. This intertextuality serves to place the film in dialogue with earlier vampire fiction, in particular the 1970s cycle of British and European erotic vampire films such as Daughters of Darkness and The Vampire Lovers from Hammer Films. Byzantium recalls these earlier texts structurally and thematically, both through direct reference and more oblique allusions.
While Fredric Jameson characterizes postmodern intertextuality as mere nostalgia and the imitation of ‘dead styles’, feminist postmodern theorists such as Linda Hutcheon contend argue for the political potential of postmodernism. This chapter proposes that the postmodern intertextuality of Byzantium is a critical intertextuality, and that the foregrounding of storytelling, writing, and rewriting in the film draws attention to the ways in which the intertextuality of Byzantium is not merely a return to past forms but also a reworking of them.
Taking up the work of Linda Hutcheon and Catherine Constable, this chapter demonstrates the ways in which Byzantium critically reworks aspects of earlier vampire fiction in order to critique and expand the representation of the female vampire and through this explore issues relating to female subjectivity and community.
Facing budgetary challenges, successive Australian Governments have chosen to proportionally reduce public expenditure on universities relative to levels of activity in both teaching and research. The question asked in this paper is whether Australia’s universities increased their efficiency in a manner consistent with the demands of government to provide productivity “dividends” or efficiencies?
Using archival data for 37 Australian universities from 2007 to 2013, this paper examines changes in productivity of university groups and individual institutions using the data envelopment analysis technique.
Results show a statistically significant system-wide (or technological) productivity improvement of 15.2 per cent from 2007 to 2013, but there was little average individual institutional change in efficiency. Productivity improvements were clearly observable for the Group of 8 institutions with an improvement of 25.1 per cent.
Universities, like other public sector bodies, can both improve individually and as an overall system. The system has improved greatly in terms of productivity at higher levels than may be anticipated.
Using data contemporaneous with a period of great change in university funding and sector competition, this study reveals how some universities benefited, whereas others struggled to maintain their relative position.
The purpose of this paper is to show how different approaches to information literacy, such as are mediated through web‐based tutorials, are used as tools in negotiating…
The purpose of this paper is to show how different approaches to information literacy, such as are mediated through web‐based tutorials, are used as tools in negotiating the information‐seeking expertise of university librarians.
A textual analysis of 31 web‐based Scandinavian tutorials for information literacy has been conducted. The similarities and differences identified are analysed as linguistic expressions of different approaches to information literacy. The approaches are seen as constructions based on a dialogue between the empirical data and the theoretical departure points.
Four approaches to information literacy emerge in the results: a source approach, a behaviour approach, a process approach, and a communication approach. The approaches entail different perspectives on information literacy. They impart diverging understandings of key concepts such as “information”, “information seeking” and the “user”.
A reflective awareness of different approaches to information literacy is important for both researchers and LIS practitioners, since the approaches that come into play have practical consequences for the operation of user education.
The present study supplements the information literacy research field by combining empirical findings with theoretical reflections.
We examine the emergence of an organizational form, charter schools, in Oakland, California. We link field-level logics to organizational founding identities using topic…
We examine the emergence of an organizational form, charter schools, in Oakland, California. We link field-level logics to organizational founding identities using topic modeling. We find corporate and community founding actors create distinct and consistent identities, whereas more peripheral founders indulge in more unique identity construction. We see the settlement of the form into a stable ecosystem with multiple identity codes rather than driving toward a single organizational identity. The variety of identities that emerge do not always map onto field-level logics. This has implications for the conditions under which organizational innovation and experimentation within a new form may develop.
The Ludwig report concerning currency trading losses at AIB plc was issued in March 2002. This paper reviews the Ludwig report and assesses possible implications of the…
The Ludwig report concerning currency trading losses at AIB plc was issued in March 2002. This paper reviews the Ludwig report and assesses possible implications of the report for internal control and corporate governance procedures in treasury departments.
Post-9/11 a first order terrorism narrative has been widely asserted. In this chapter, I explore the development of second order terrorism narrative or ideal-type.
The chapter begins by providing a brief synopsis of three highly mediated Australian counter-terrorism operations and of shortcomings in incident counting. It also relies on some U.S. research on counter-terrorism prosecutions in support.
In first order terrorism, crime appears as a spectacular irruption or original sin on a tabula rasa of innocence and there is a clean division between us and them, non-state and state, victim and offender. In the second order terrorism narrative there is a contrasting claim that 9/11 is blowback, in kind, for U.S.-led interventions and does not offer a clean division between how we and they behave, blurs non-state and state culpability in big crimes, and sees victims and offenders trading places over time. As we adjust our perspective from the presumptive first order to second order event-acts, terrorism and counter-terrorism, event-act and interdiction, is merged as one.
The concept may be useful in accounting for assumptions pertaining to this category of crime, including its relation with precaution and security.
Federal judges can execute at will—execute U.S. corporations, that is. Buried in the 1991 sentencing‐guidelines is a clause that gives courts the power to put any business out of business—permanently.
This chapter addresses research on worker skill, technology, and control over the labor process by focusing on routine immaterial labor or knowledge work. Based on…
This chapter addresses research on worker skill, technology, and control over the labor process by focusing on routine immaterial labor or knowledge work. Based on participant observation conducted among analytics workers at a digital publishing network, I find that analytics workers appear paradoxically autonomous and empowered by management while being bound by ever-evolving, calculative cloud-based information and communication technologies (ICTs). Workers appear free to “be creative,” while ever-evolving ICTs exert unpredictable control over work. Based on this finding, I argue that sociology’s tendency to take organizational boundaries and technological stability for granted hampers analyses of contemporary forms of work. Thus, sociologists of work must extend outward – beyond communities of practice, labor markets, and the state – to include the ever-evolving, infrastructural, socio-technical networks in which work and organizations are embedded. Additionally, research on the experience of immaterial labor suggests that ICTs afford pleasurably immersive experiences that bind workers to organizations and their fields. Complicating this emerging body of research, I find workers acutely frustrated by these unpredictable, ever-evolving, cloud-based ICTs.
The Rowett Research Institute, the largest centre for nutrition research in Europe, was the venue recently for two seminars aimed at up‐dating and providing continuing education for practising dietitians.