Search results

11 – 20 of 487
Article
Publication date: 3 May 2016

Ho Man Chan, Ka Chun Ku, Pak Kei Toma Li, Hiu Kwan Ng and Suet Yi Michelle Ng

This paper aims to examine the development of graffiti in Hong Kong. Based on cultural criminological theories, the study looks at graffiti from the cultural verstehen perspective…

Abstract

Purpose

This paper aims to examine the development of graffiti in Hong Kong. Based on cultural criminological theories, the study looks at graffiti from the cultural verstehen perspective (Ritzer, 1996) – giving voice to graffiti writers, instead of focusing on how the police or the general public react to the graffiti issue. The research also examines the motives of those writers and whether they perceive graffiti as an act of vandalism or an expression of an art form.

Design/methodology/approach

Graffiti is still an underdeveloped research topic in Hong Kong, which is absent not only in the mainstream discourse, but also in mainstream arts. It merely catches the media’s attention when graffiti are associated with political struggles. Thus, this paper aims to bridge the gap between the existing literature reviews and the graffiti development in this cosmopolitan city. In particular, it gives voice to graffiti writers to let readers understand how this hidden group of people perceive the notion of graffiti within their own subcultural discourse – and, at the same time, how the public responds to those graffiti-writings.

Findings

The research project, to a certain extent, manifests similarities to the literature reviews at an international level, especially the graffiti studies in London and New York. There are similarities in the graffiti styles – tags, bombs and pieces – and also in terms of the meanings carried behind graffiti-writing in public spaces, which showcase power through occupying space and its association with commercialization. Nevertheless, graffiti in Hong Kong have certain unique features, particularly as regards the official response to graffiti and the linkage of graffiti with politics. As seen in the Umbrella Movement and the Ai wei-wei incident, the legal responses were rigid and efficient, showing that the government paid great attention to the messages delivered in these cases. When no complaints or reports are made to the police, graffiti work is left undisturbed. Only when strong political messages are carried will prompt action be taken.

Originality/value

Graffiti are an underdeveloped research topic in Hong Kong, which is absent not only in the mainstream discourse but also in the mainstream arts. This paper aims to bridge the gap between the existing literature reviews and the graffiti development in Hong Kong. It gives voice to graffiti writers to let readers understand how this hidden group of people perceives the notion of graffiti within their own subcultural discourse and how city dwellers respond to those graffiti-writings.

Details

Social Transformations in Chinese Societies, vol. 12 no. 1
Type: Research Article
ISSN: 1871-2673

Keywords

Content available
Book part
Publication date: 6 September 2021

Abstract

Details

The Role of Law Enforcement in Emergency Management and Homeland Security
Type: Book
ISBN: 978-1-78769-336-4

Article
Publication date: 1 June 2019

Paola Somma

In 2002, an issue of Open House International had already addressed the subject of war and the city. Scholars with different backgrounds and experiences reported on a number of…

Abstract

In 2002, an issue of Open House International had already addressed the subject of war and the city. Scholars with different backgrounds and experiences reported on a number of cities. They analysed and reflected on the situation before the armed hostilities, both in physical terms and in terms of the conflicts of ethnic and civilian character, and the role of external forces and actors; the war in its different manifestations: a never ending conflict, a succession of battles and precarious truces, bombing, the threat of bombing; and the prospects of reconstruction, with particular reference to the different effects for the various groups and interests.

Details

Open House International, vol. 44 no. 2
Type: Research Article
ISSN: 0168-2601

Abstract

Details

Digital Life on Instagram
Type: Book
ISBN: 978-1-78756-495-4

Book part
Publication date: 14 July 2006

David MacGregor

Pyrotechnic effects and spectacular death belong to the symbolism of terror and political assassination – bizarre techniques of miscommunication through fear practiced on the…

Abstract

Pyrotechnic effects and spectacular death belong to the symbolism of terror and political assassination – bizarre techniques of miscommunication through fear practiced on the innocent and designed to effect social change. While focusing on the use of terror in 9-11, this article deals with both terror and political assassination as closely related communicative practices of death. It outlines a theory of terrorism that suggests September 11 may be an example of expedient terrorist destruction ordered from within the state, a macabre instance of a state protection racket. Commentators on the left tend to see terrorism as a blow extended by the oppressed against exploiters. However, terrorism is much less likely to be a manifestation of a revolt by – or on behalf of – the underprivileged than a demonstration of brute force by the state or its agents. Machiavellian state terrorism is terror/assassination performed for reasons different from the publicized ones; often initiated by persons or groups other than those suspected of the act; and – most important – secretly perpetrated by, or on behalf, of the violated state itself. Machiavellian state terror advances the ruling agenda, while disguising itself as the work of individuals or groups opposed to the state's fundamental principles. As an example, the article reviews a mysterious 1971 assassination in Paris that obliquely foreshadows some critical elements of the official story of 9-11. The article underlines the importance of oppositional theorizing: questioning government and looking for connections between events are critical features of what it means to be vitally active in the political universe.

Details

The Hidden History of 9-11-2001
Type: Book
ISBN: 978-1-84950-408-9

Article
Publication date: 3 October 2016

Angela S.M. Irwin and George Milad

The purpose of this paper is to look at current discourse on the topic of crypto-currencies, more specifically Bitcoins, and their application to funding acts of terror. The paper…

3862

Abstract

Purpose

The purpose of this paper is to look at current discourse on the topic of crypto-currencies, more specifically Bitcoins, and their application to funding acts of terror. The paper clearly establishes the risks posed by this new payment technology and value transfer system to assist in the process of funding, planning and implementing acts of terror.

Design/methodology/approach

Publications, blogs and sites published and administered by terrorists groups and their supporters are examined to determine their interest in leveraging emerging payment and value transfer systems to facilitate the funding, planning and implementation of terror attacks. Press releases and other publications are also examined to determine whether crypto-currencies have been used by these groups in fund raising, fund transfer or recent terror attacks.

Findings

Although it is difficult to find concrete evidence of largescale use of Bitcoins and other crypto-currencies by terrorist groups and their supporters, there is strong evidence to suggest that they have been linked to a number of terror attacks in Europe and Indonesia. Supporters of Islamic State of Iraq and Syria (ISIS), jihadists and terrorist organisations are actively looking to and promoting the use of new and emerging technologies, such as Bitcoin, to mitigate some of the risks associated with traditional fund transfer methods. Some websites associated with terrorist organisations have started to collect donations in Bitcoins. Many Bitcoin ATMs and Bitcoin exchanges are located in countries that have seen significant numbers of foreign fighters join ISIS in the Middle East and are also positioned in countries that have seen increased risk of terror attack. These present a significant risk because they allow for the seamless, anonymous transfer of funds to and from terrorist groups and their supporters. The paper highlights the need for further in-depth research into reliable ways to circumvent the current difficulties experienced in differentiating illicit transactions from legitimate ones and establishing reliable means of attribution.

Originality/value

Using a document published by ISIS, which provides would-be jihadists detailed instructions on how they can get to Syria or Iraq without being detected, a set of models were created showing how this could be achieved using Bitcoins alone. From this scenario, red flag indicators and suspicious behaviour models have been created to determine whether they can be identified during detailed analysis of the Bitcoin blockchain which will be conducted in later stages of research.

Details

Journal of Money Laundering Control, vol. 19 no. 4
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 9 November 2009

Shelly Morris‐King

The longer‐term psychological impact of childhood wartime experiences is an under‐researched area. Davies' (2001) work has been seminal in drawing attention to the challenges that…

Abstract

The longer‐term psychological impact of childhood wartime experiences is an under‐researched area. Davies' (2001) work has been seminal in drawing attention to the challenges that older people face in coming to terms with their early childhood experiences during the Second World War. This project used qualitative research methods to investigate the lived experience of older people who were evacuated during the war or remained in Liverpool, UK and experienced ‘the Blitz’ firsthand. It also investigated older people's understanding of these experiences, the meaning they attributed to them, and how they felt these experiences had affected them across the lifespan. The data collection phase of this project included an initial focus group and four free association narrative (FAN) interviews. Interpretative phenomenological analysis (IPA) was the method used to draw out main themes for each of the participants. Analysis revealed specific psychological issues for each of the participants, along with specific coping strategies. Analysis also suggested that some older people continued to find it challenging to make sense of their early experiences and to assimilate these unusual events into their life narratives. This project has contributed to the limited literature base relating to the longer‐term consequences of early wartime experiences, which may be of use to psychologists working with a range of individuals with past or more recent experiences of war or ‘war‐like’ experiences.

Details

Journal of Aggression, Conflict and Peace Research, vol. 1 no. 3
Type: Research Article
ISSN: 1759-6599

Keywords

Article
Publication date: 20 November 2009

Anne Eyre

On 15 April 1989, Anne Eyre went to Sheffield to watch Liverpool contest an FA Cup semi‐final with Nottingham Forest. She was caught in a crush in which 96 people were killed…

Abstract

On 15 April 1989, Anne Eyre went to Sheffield to watch Liverpool contest an FA Cup semi‐final with Nottingham Forest. She was caught in a crush in which 96 people were killed. Although physically unhurt, she was traumatised by the event. Learning to ‘tell the story’ played an important part in her recovery. She now teaches others to understand and manage the traumatic impact of large‐scale disaster. Here, she tells the story of her recovery and subsequent work as an educator.

Details

Journal of Public Mental Health, vol. 8 no. 3
Type: Research Article
ISSN: 1746-5729

Keywords

Abstract

Details

Digital Activism and Cyberconflicts in Nigeria
Type: Book
ISBN: 978-1-78756-014-7

Article
Publication date: 1 July 2009

Ursula Thomas and Janet Strickland

This lesson integrates social studies, reading, language arts, and technology. Students are involved in reading historical fiction, examining authentic documents, and completing a…

Abstract

This lesson integrates social studies, reading, language arts, and technology. Students are involved in reading historical fiction, examining authentic documents, and completing a WebQuest activity. Ten strategies for reading the Notable Book are explained in detail in the Appendix.

Details

Social Studies Research and Practice, vol. 4 no. 2
Type: Research Article
ISSN: 1933-5415

11 – 20 of 487