To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Researchers, academic institutions, and journals have an ethical obligation to correct the research record expeditiously and publicly to maintain the integrity of science.
The spread of false and misleading information, hate speech, and harassment on WhatsApp has generated concern about elections, been implicated in ethnic violence, and been linked to other disastrous events across the globe. On WhatsApp, we see the activation of what is known as the phenomenon of hidden virality, which characterizes how unvetted, insular discourse on encrypted, private platforms takes on a character of truth and remains mostly unnoticed until causing real-world harm. In this book chapter, we discuss what factors contribute to the activation of hidden virality on WhatsApp while answering the following questions: 1) To what extent and how do WhatsApp’s sociotechnical affordances encourage the sharing of mis- and disinformation on the platform, and 2) How do WhatsApp’s users perceive and deal with mis- and disinformation daily? Our findings indicate that WhatsApp’s affordance of perceived privacy actively encourages the spread of false and offensive content on the platform, especially when combined with it being impossible for users to report inappropriate content anonymously. Groups in which such content is prominent are tightly controlled by administrators who typically hold dominant cultural positions (e.g., they are senior and male). Users who feel hurt by false and offensive content need to personally ask administrators for its removal. But this is not an easy job, as it requires users to challenge dominant cultural norms, causing them stress and anxiety. Users would rather have WhatsApp take on the burden of moderating problematic content. We close the chapter by situating our findings in relation to cultural and economic power dynamics. We bring attention to the fact that if WhatsApp does not start to take action to reduce and prevent the real-world harm of hidden virality, its affordances of widespread accessibility and encryption will keep promoting its market advantages, leaving the burden of moderating content to fall on minoritized users.
This chapter focuses on how it is possible to develop and retain false beliefs even when the relevant information we receive is not itself misleading or inaccurate. In common usage, the term misinformed refers to someone who holds false beliefs, and the most obvious source of false beliefs is inaccurate information. In some cases, however, false beliefs arise, not from inaccurate or misleading information, but rather from cognitive biases that influence the way that information is interpreted and recalled. Other cognitive biases limit the ability of new and accurate information to correct existing misconceptions. We begin the chapter by examining the role of cognitive biases and heuristics in creating misconceptions, taking as our context misconceptions commonly observed during the COVID-19 pandemic. We then explain why accurate information does not always or necessarily correct misconceptions, and in certain situations can even entrench false beliefs. Throughout the chapter, we outline strategies that information designers can use to reduce the possibility that false beliefs arise from, and persist in the face of, accurate information.
This chapter summarises the key aerodynamic theory of horizontal-axis wind turbine rotors. The actuator disc concept leads to the relationships between induced velocity, axial thrust, and power extraction. The theory is extended to multiple streamtubes, which combined with 2D wing theory establish the basis of blade element momentum (BEM) theory. A straightforward mathematical treatment of BEM theory is included, with an iterative procedure suitable for coding. Measurements from a full-scale rotor illustrate the applicability of BEM theory but also its fundamental limitations: the latter are described, and measures outlined to compensate for them in practical BEM codes. Simple relationships are given for the axial and tangential load distributions on an optimal HAWT blade. The structure of the rotor wake is described, leading into a description of vortex-wake theory, which provides a more physically realistic description of the airflow. Vortex wake codes are described in non-mathematical terms. The chapter includes wake measurements from full-scale wind turbines and small models. Vorticity maps from the latter verify the underlying mathematical model of a helical vortex wake.
Chapter 3 presents a variety of feedback methods that practitioners and researchers alike use to support learners’ linguistic development. Building on the belief that errors are a normal and even beneficial part of language learning, this chapter shares how and why feedback is a critical component of language teaching. Examples of oral corrective feedback are provided, along with a description of when teachers may choose to use what type of feedback over another.
This chapter opens with a review of the dangers of misinformation and conspiracy theory beliefs. We then review the literature on debunking techniques, highlighting why debunking is largely ineffective at combatting QAnon and other conspiracy theories. Although corrections are largely ineffective, repeated corrections, warnings, and alternative accounts for misinformation can improve their effectiveness. In contrast to debunking, another approach is “prebunking”; trying to prevent conspiracies rather than counter them. Based on inoculation theory, Banas and Miller (2013) found that both fact-based and logic-based messages delivered before a conspiracy film helped build up participants’ resistance to that message. Next, this chapter discusses the role of media literacy in the QAnon—and other more general—conspiracies. Research has indicated that greater news media literacy relates negatively to beliefs in conspiracies (Craft et al., 2017). A brief discussion of how QAnon is similar or different from other groups is offered, along with some research questions for future study about QAnon specifically.
In the course of the transmission of the text of the New Testament variants in the text emerged many times and in different ways. This article shows the importance of the study of corrections in the course of building theories about the emergence of specific variants. It presents some exemplary results of the examination of corrections of a few manuscripts of Acts. The article shows that examining all the corrections in a work in an individual manuscript can give important hints on the emergence of specific variants because it allows to make judgement about the character of the copying and the correcting.
Blending skills and strategies. Editing techniques. Getting value from a critical reader. Editing in response to notes. Trouble-shooting. Interpreting and addressing the causes of problems.
‘Identifying the problem isn’t the hard part. The hard part is finding the courage, where necessary, to revise radically. People often assume the editing process is about cutting bad writing, but it’s just as important to be prepared to cut good writing that no longer serves the narrative.’
This chapter reviews the evidence, theories, and treatments for both occupational and traumatic stress commonly experienced by criminal justice service workers (i.e., police, corrections workers, etc). Due to the nature and structure of their work, criminal justice service workers are at a high-risk of experiencing occupational stress and/or traumatic stress, and this chapter reviews the effective treatment options to counter these stress experiences. The chapter identifies the key causes (antecedents) of both occupational and traumatic stress for criminal justice service workers, and the symptoms and consequences these experiences commonly produce. We also discuss the key theoretical explanations of these stress experiences, and issues such as vicarious trauma, moral injury and chronic stress reactions. The final section in this chapter discusses common interventions and treatments to manage these stress experiences, including: Employee Assistance Programs, Critical Incident Stress Management, peer support, psychological first-aid, the first responder toolkit, and acceptance and commitment therapy.
The Conclusion reviews the key themes of the book and relates it to the larger literature and our current context. It reviews the lessons Eastern offers for nineteenth-century prison history, for the analysis of prison administration more generally, and for contemporary punishment. Importantly, this chapter relates the importance of recognition for early nineteenth-century penal reformers and prison administrators to the anxiety of penal reform. The chapter closes by contrasting the Pennsylvania System with the current punitive climate and asking what lessons its failure to spread beyond Pennsylvania provide for those seeking penal change.
This chapter examines two strategies Eastern's administrators used in their annual reports to challenge one of the most effective—and personally detrimental—myths: the Pennsylvania System’s cruelty and inhumanity. To undermine this myth, Eastern's administrators used several techniques of neutralization, characterizing the Pennsylvania System and themselves as a kind, benevolent, and humane, while arguing that the Auburn System’s supporters were the opposite—profit mongers willing to resort to cruel practices. These techniques allowed the administrators to defend themselves against charges that they were engaging in cruel and inhumane behavior. Because of their defensive posture the administrators could sublimate their own self-praise into the prison’s defense. Thus, administrators' statements defending the Pennsylvania System were often as much about the administrators themselves as the system they sought to defend. Indeed, the ability to constantly issue these statements incentivized Eastern's administrators to maintain the Pennsylvania System for as long as they did. These claims were the largest anchor keeping the Pennsylvania System personally institutionalized.
From the very beginning, Eastern’s administrators’ autonomy was challenged directly by occasional incursions from the local penal reformers and indirectly by the state legislature's lackluster patronage. These challenges became more invasive in the 1850s, peaking in the 1860s. In response, Eastern's administrators sought to establish jurisdiction over their prison by proclaiming their own special expertise and insisting on deference in matters affecting Eastern. By the 1870s, however, penal actors on the national stage were likewise proclaiming their own expertise and professional status, while Eastern's administrators felt increasingly irrelevant. In response to these national-level developments, the administrators further developed their claims to professional status. In this context, the administrators' claims to professional status provided them a more promising path to self-aggrandizement than continuing to proclaim the Pennsylvania System's superiority. Consequently, the administrators shifted their focus from the Pennsylvania System to their status as professional penologists. It was this shift from defense to professionalization that deinstitutionalized the Pennsylvania System.
This chapter describes what the Pennsylvania System looked like in practice, focusing on deviations from the Pennsylvania System's idealized regimen that its administrators vehemently defended. Quite at odds with their extensive public proclamations of their system's excellence, the administrators often subverted the Pennsylvania System's ultimate goals or directly broke its most central rules. This chapter explains the administrators' apparently paradoxical behavior by demonstrating that these deviations were part of an effort to reduce the Pennsylvania System's vulnerability to further criticism. Their management decisions at the prison were intensely pragmatic, guided not by a perfect belief in the Pennsylvania System or even penological goals, but by the desire to reduce expenses and prevent insanity—the Pennsylvania System's biggest weaknesses according to its critics. The administrators sought to prevent manifestations of the calumnious myths so they could continue to claim their system's superiority and protect their own status as benevolent, humane gentlemen running a model prison—a status that kept the Pennsylvania System personally institutionalized at Eastern.
America's early prisons—first the proto-prisons built after the American Revolution and the modern prisons built in the 1820s and later—failed repeatedly and dramatically. These failures and the debates they precipitated gave modern prisons a perennial air of uncertainty. Would they solve the problems endemic to the proto-prisons—and serve the prison's original purpose?Moreover, news of penal failures like Auburn often had sudden and unpredictable impacts on the penal imagination and what commentators believed to be acceptable design choices for the new prisons. In the resulting atmosphere, deviations from the norm seemed even more risky and penal actors routinely sought assurance that they were on the right path. Thus, it is only by understanding this tumultuous, unstable beginning—when reformers repeatedly experimented with variations of prison and failed—that we can begin to understand how Eastern became a deviant prison and how the Pennsylvania System could become personally institutionalized at Eastern in the decades to follow.
The annual reports represent the principal medium through which the administrators presented and defended their embattled prison against claims that the Pennsylvania System was expensive, cruel and inhumane, ineffective, and impracticable. These claims defended both the Pennsylvania System and the men who implemented it. In challenging the myths’ veracity, Eastern's administrators relied on what criminologists Gresham Sykes and David Matza call “techniques of neutralization,” a series of accounts of their behavior that challenge the fact of, or mitigate responsibility or blame for, immoral or inappropriate behavior. This chapter explores three such strategies: changing how they described the Pennsylvania System, denying the existence of bad outcomes, and denying the system's responsibility for bad outcomes that did occur by placing the blame on others. Ultimately, these techniques of neutralization enabled Eastern's administrators to neutralize the pains of deviance and sustain the Pennsylvania System despite the criticism. Defending against the myths in this way also created a context for the Pennsylvania System to become personally institutionalized for Eastern's administrators.
Eastern was far from exceptional in the level of prison administrators' autonomy and inexperience, but two factors distinguished the administration at Eastern from that at other prisons. First, Pennsylvania did not employ contractors to run their prisons; consequently, the men in charge at Eastern saw themselves as trusted caretakers of the prison rather than men motivated by the promise of profit. Second, as some commentators recognized, Eastern's administrators were particularly active. More than mere figureheads, they had greater control than at other prisons—and they took advantage of this greater control. It was, in effect, their prison, a feeling of ownership and responsibility that will become clear in the following chapters. This chapter introducesthe administrative and legal framework that provided a group of largely untrained and inexperienced men with tremendous control over Eastern and especially the difficult, and sometimes evasive, task of translating the Pennsylvania System into practice. It was this group of men for whom the Pennsylvania System became personally institutionalized and who would fight to maintain it at Eastern.
The necessity of defending the Pennsylvania System—an omnipresent reality at Eastern throughout the nineteenth century and a major cause of its personal institutionalization—was present from the beginning. By the late 1820s, several groups of Pennsylvanians would furiously debate what Eastern's regime should look like. This debate would be shaped not only by the legacy of past failures, but also by mounting criticism of pure solitary confinement (continuous solitary without distractions) as well as other developments beyond Pennsylvania. The Pennsylvania System that was ultimately authorized at Eastern resulted from this contentious period. Forged in conflict, it was designed to achieve the original goals of the first prisons, but it was also designed reactively to avoid previous failures at Walnut Street Prison, Auburn State Prison, and Western State Penitentiary. Importantly, that this period would end with Pennsylvania deviating from the rest of the country was far from a foregone conclusion. For a while, it seemed that Pennsylvania might abandon its reformers' preference for continuous solitary confinement and copy New York's new approach to incarceration.
This chapter describes the Pennsylvania System’s rapid decline at Eastern in the 1860s and 1870s. Catastrophic levels of post-war overcrowding caused the Pennsylvania System's most central components to break down in ways that the administrators fought hard to prevent or stop. However, the administrators’ verbal commitment to the Pennsylvania System ultimately outlasted its physical presence at Eastern. By the mid-1870s, something changed in the administrators' commitment: increasingly, the administrators abandoned their attempt to save the Pennsylvania System and instead redefined it into something else. This shift occurred after external criticism of the Pennsylvania System had abated. Thus, when Eastern's administrators finally abandoned the Pennsylvania System, they were not acceding to public pressure that they had withstood for nearly five decades. Instead, waning criticism had removed the administrators' opportunity to defend the Pennsylvania System and tout their own excellence, thereby allowing the Pennsylvania System to deinstitutionalize for Eastern's administrators.
This Introduction identifies Eastern’s puzzling position in the landscape of nineteenth-century prisons: one of a few prisons, and then the only prison, to use a system of long-term solitary confinement. This chapter explores the historiography of Eastern and the early prisons looking for answers to the question of why one prison alone would continue to use a highly criticized mode of confinement? Turning to organizational theory, we find an answer in Philip Selznick’s “old” institutional theory. This chapter then identifies some of the ways in which a unique prison’s history helps us better understand the development of nineteenth-century prisons and penal change more generally. It concludes with some methodological notes.
When Eastern opened in 1829 and became the first prison to implement fully the Pennsylvania System, it theoretically could have offered a competitor model to the Auburn System. Instead, soon after it opened, commentators revived earlier criticisms of solitary confinement and took aim at Eastern and its supporters, especially its administrators. During the 1830s and 1840s, Eastern became a deviant prison—both as one of the few American prisons to follow the Pennsylvania System as well as a heavily criticized prison. This chapter traces that process. It introduces the origins and propagators of the most frequent calumnious myths about the Pennsylvania System and their influence on other states and prisons' decisions to avoid or abandon the Pennsylvania System. Finally, it discusses the impact of deviance on Eastern's administrators, who were just as criticized as the system they implemented. This criticism became was in the process by which the Pennsylvania System became personally institutionalized at Eastern.