Md. Wasiul Islam, Md. Mahfuz Ur Rahman and Shakil Ahmed
Visits to locations connected to historical atrocities, tragedy, suffering, or presumably dreadful events are referred to as “dark tourism”. While Bangladesh may not be widely…
Abstract
Visits to locations connected to historical atrocities, tragedy, suffering, or presumably dreadful events are referred to as “dark tourism”. While Bangladesh may not be widely known for dark tourism, several unexplored avenues may be of interest to those who engage in this type of unique and unconventional tourism experience. In addition to creating job opportunities and income generation in Bangladesh, it can achieve educational objectives, communicate with a broad audience, raise awareness of events of the past, and quench people's thirst for information, which can help them to comprehend a society. Though Bangladesh has several somber locations connected to tragic events including World War II, liberation war sites, mass killing sites, shipbreaking yards, Rohingya refugee camps, riots, and the mother language movement, traditional tourism predominates there. If managed responsibly, these varied resources, somber locations, and histories, some of which date back to 1800, could make Bangladesh a dark tourism destination. Although dark tourism in Bangladesh has the potential to contribute to historical awareness, preservation, educational opportunities, and socioeconomic development, it is yet unexplored due to a lack of knowledge, experience, policy, effective marketing, and some controversies. By approaching responsibly, Bangladesh can leverage its history to attract visitors' interests in exploring the darker aspects of the country's past. Hence, this chapter is designed to explore the status and potential significance, prospects, and challenges of dark tourism in Bangladesh. The findings will help policymakers, tourists, and other stakeholders to explore and enjoy enormous benefits from Bangladesh's untapped dark tourism opportunities.
Details
Keywords
The present book chapter deals with the problem of dark tourism as well as the resilience forms of consumption in post-disaster context.
Abstract
Purpose
The present book chapter deals with the problem of dark tourism as well as the resilience forms of consumption in post-disaster context.
Design/Methodology/Approach
The turn of the century characterised a radical change in the forms of tourism consumption. New forms of tourism as dark or thana tourism have captivated the attention of scholars and journalists. This book chapter centres efforts in dillucidating what are the key factors that determine the formation of a dark site. The text is inspired in my own ethnographies in Cromañon, Argentina and the Ground Zero, US.
Findings
As Phillip Stone puts it, not all dark shrines or sites welcome tourists. While some sites are reluctant to mass tourism, others are mainly organised around the figure of the tourist. La Republica de Cromañón is a night club where in a fire died 194 young. The site is today refurbished as a sanctuary to remind the victims. At a closer look, there is a tension between stakeholders at the time of promoting dark tourism in Cromañón. In the opposite the ground zero is fully designed to be visited by thousands tourists.
Originality/Value
The originality of this research consists in the contraposition of two study cases which answer the question to what extent dark tourism is desired by locals. The findings lay the foundations towards the specialised literature in dark tourism studies. We discuss critically the nature of thanatopsis.
Details
Keywords
Lwazi Apleni, Jaqueline Mangwane, Petrus Mfanampela Maphanga and Unathi Sonwabile Henama
Terrorism is the new normal for tourism destinations, as the acts of terror that are performed in tourism zones ensure maximum international media coverage for such acts of…
Abstract
Terrorism is the new normal for tourism destinations, as the acts of terror that are performed in tourism zones ensure maximum international media coverage for such acts of terror. The frequency of acts of terror has led to the development of crisis resistant tourists, a segment of tourists that continue tourism consumption even when acts of terrorism occur. The tourism industry is negatively impacted by crises, but it has proved to be resilient, bouncing back from a temporary decline. Crisis resistant tourists have increased the robustness of tourist destinations, as almost all destinations have jumped on the tourism bandwagon. Increasingly, countries depend on the tourism industry for economic growth, economic diversification, labour-intensive jobs and attracting foreign exchange, and therefore acts of terrorism can be regarded as economic espionage. African countries still receive less than 10% of international tourism receipts, as the majority of tourism occurs between developed countries in the West. As a consequence, developing countries benefit disproportionally less from tourism. The growth rate for African tourism has exceeded global growth averages and has been included in economic development policies in many African countries.
Terrorism in Kenya's tourism industry has had an adverse impact on tourism numbers and perception about destination Kenya. Several acts of terrorism have capacitated Kenya with institutional memory on how to handle acts of terrorism on Kenya's tourism industry. Kenya is arguably one of the leading countries in tourism in the African continent alongside South Africa, Egypt and Mauritius. In addition, Kenya Airways has used the national airport in Nairobi as a growing aviation hub connecting Africa with the world. As one of Africa's top tourist destinations, Kenya has to address the issue of terrorism. The perceptions of foreign tourists, including Kenyans, are that the country is not safe anymore. As recent as early 2019, another terrorism attack took place in Kenya. This continued to strain an industry that is already under siege. It needs to be borne in mind that a country of Kenya's calibre cannot afford to lose tourists. This is because tourism plays a significant role in enhancing the livelihood of ordinary Kenyans. Additionally, it plays a pivotal role in the country's economy. Kenya provides an example of a destination country which has been able to mitigate the effects of terrorism in the tourism industry. The Atlantic Island of St. Helena, a British Overseas territory, recently constructed an airport in Jamestown to boost trade and specifically tourism to the island, to alleviate financial support from Britain to the island. The island is an unexploited dark tourism destination, as the site of freed slaves after the abolition of the Atlantic Slave trade, the exile site for Napoleon and Zulu Royalty Dinuzulu kaCetshwayo and an overseas concentration camp for the Boers after the Anglo-Boer War. The opening of the airport has created the necessary infrastructure to attract tourists to the island, and the unique selling point of the island is that it is the last outpost of British Imperialism. The island would need to exploit its dark tourism potential by appealing to the British, the South Africans and specifically heritage tourists, due to its unique offering.
Details
Keywords
R.C. Young, P.T. Stone, J.S. Pickles, S.R. Lee and P.J. Lambert
The Sussex Geac system went live in June 1981, taking over from (and absorbing features of) the various batch systems which had been developed in‐house during the previous ten…
Abstract
The Sussex Geac system went live in June 1981, taking over from (and absorbing features of) the various batch systems which had been developed in‐house during the previous ten years. Geac Computers Ltd's circulation module has been extensively modified and extended by the Library's own systems staff: beside real‐time circulation, it now incorporates most acquisitions and cataloguing functions and some of the functions associated with serials. Forty‐six library system terminals are online to the Geac 8000 computer. The system operates from a single database and is thus highly integrated: a description of the acquisition and cataloguing process illustrates this. An online public access catalogue (eighteen terminals) was inaugurated in 1983: through it, library patrons are offered a unified picture of stock locations and availability, including real‐time loan status of copies. A locally developed report generator is used to produce various listings (including COM microfiche back‐up catalogues) from the online database. Book usage data is accumulated and processed by the system, and the results are fed back into stock management and basic acquisitions policies. The Geac hardware has proved to be highly reliable — the availability of the system has averaged 98.3 per cent over four years. The system has enabled substantial and direct improvements to be made in the Library's service to its users.
Francisco Guzmán, Diego Alvarado-Karste, Fayez Ahmad, David Strutton and Eric L. Kennedy
Obesity imposes myriad negative consequences upon society, the economy and personal well-being. This study aims to investigate the effectiveness of using political correctness…
Abstract
Purpose
Obesity imposes myriad negative consequences upon society, the economy and personal well-being. This study aims to investigate the effectiveness of using political correctness (PC) in social marketing messages to persuade consumers to change their unhealthy behavior. It also explores various underlying mechanisms that drive this effect. Specifically, this research studies that messaging approach – politically correct vs politically incorrect and gain vs loss message framing – generates higher consumer intentions to change their behavior.
Design/methodology/approach
Four experiments were conducted with nationally representative samples to examine the effect of PC and gain vs loss message framing on consumers’ behavior changing intentions.
Findings
Politically correct prosocial marketing messages displayed higher persuasiveness than politically incorrect messages. Each relationship was mediated by the perceived manipulative capacity of the message and consumers’ attitudes toward the message. Message framing performed as a boundary condition for these effects.
Research limitations/implications
This paper sought to contribute to the literature that investigates the effectiveness of social marketing efforts. Three specific contributions related to the effects of message frames on politically correct and incorrect social marketing messages were developed.
Practical implications
The strategies presented in this paper benefit firms wishing to create a more prosocial approach to their business. A firm can present a prosocial message to their target market in a frame focusing on what will be gained instead of lost. Likewise, firms should welcome this type of messaging that embraces politically correct terminology instead of shying away from it.
Originality/value
This paper generates actionable insights for marketers and policymakers regarding how best to communicate with targeted segments about culturally- and personally sensitive topics related to obesity and weight loss. This paper also contributes to the literature that explores the effectiveness of social marketing initiatives. The findings suggest policymakers and social marketers should be cautious and, regardless of today’s sociopolitical environment, avoid falling into the temptation of developing politically incorrect and loss-framed messages.
Details
Keywords
R.C. Young, P.T. Stone and G.J. Clark
The current state (January 1972) of the off‐line computer‐based circulation control system is described. The complete system is outlined, but with emphasis on those aspects where…
Abstract
The current state (January 1972) of the off‐line computer‐based circulation control system is described. The complete system is outlined, but with emphasis on those aspects where it differs from other documented systems: the use of an on‐line trapping store at the data collection stage and its effect on reservations and the control of borrowers;and the stock control applications of the system.
The purpose of this article is to present an overview of the history and development of transaction log analysis (TLA) in library and information science research. Organizing a…
Abstract
The purpose of this article is to present an overview of the history and development of transaction log analysis (TLA) in library and information science research. Organizing a literature review of the first twenty‐five years of TLA poses some challenges and requires some decisions. The primary organizing principle could be a strict chronology of the published research, the research questions addressed, the automated information retrieval (IR) systems that generated the data, the results gained, or even the researchers themselves. The group of active transaction log analyzers remains fairly small in number, and researchers who use transaction logs tend to use this method more than once, so tracing the development and refinement of individuals' uses of the methodology could provide insight into the progress of the method as a whole. For example, if we examine how researchers like W. David Penniman, John Tolle, Christine Borgman, Ray Larson, and Micheline Hancock‐Beaulieu have modified their own understandings and applications of the method over time, we may get an accurate sense of the development of all applications.
R.C. Young and S.R. Lee
The Sussex OPAC is based on the Public Query software of Geac Computers Ltd's circulation module, but with substantial local modification. Coverage of loanable items in stock has…
Abstract
The Sussex OPAC is based on the Public Query software of Geac Computers Ltd's circulation module, but with substantial local modification. Coverage of loanable items in stock has reached 75 per cent, and the OPAC is now considered as the library's major catalogue. The OPAC displays very detailed copy availability information, including real‐time loan status and information about copies which are missing or on order: this is greatly valued by the library's users. Eighteen public terminals handle between 6,000 and 7,000 searches a day in term. Searches may be made by an author/title derived search key (‘Quick’ search), by author or other name, by title, by keyword/keyphrase, or by classmark; 70 per cent of searches are by routes which were not available in the card catalogues. The main stages in the development of the OPAC are described and a search is illustrated. Usage logs have been used to analyse user behaviour and to improve the design of the OPAC. User education methods, the campus‐wide extension of the service, and possibilities for future development are described.
Joan Carles Mico, Salvador Amigó, Antonio Caselles and Pantaleón D. Romero
The purpose of this paper is to investigate the body-mind problem from a mathematical invariance principle in relation to personality dynamics in the psychological and the…
Abstract
Purpose
The purpose of this paper is to investigate the body-mind problem from a mathematical invariance principle in relation to personality dynamics in the psychological and the biological levels of description.
Design/methodology/approach
The relationship between the two mentioned levels of description is provided by two mathematical models as follows: the response model and the bridge model. The response model (an integro-differential equation) is capable to reproduce the personality dynamics as a consequence of a determined stimulus. The invariance principle asserts that the response model can reproduce personality dynamics at the two levels of description. The bridge model (a second-order partial differential equation) can be deduced as a consequence of this principle: it provides the co-evolution of the general factor of personality (GFP) (mind), the it is an immediate early gene (c-fos) and D3 dopamine receptor gene (DRD3) gens and the glutamate neurotransmitter (body).
Findings
An application case is presented by setting up two experimental designs: a previous pilot AB pseudo-experimental design (AB) pseudo-experimental design with one subject and a subsequent ABC experimental design (ABC) experimental design with another subject. The stimulus used is the stimulant drug methylphenidate. The response and bridge models are validated with the outcomes of these experiments.
Originality/value
The mathematical approach here presented is based on a holistic personality model developed in the past few years: the unique trait personality theory, which claims for a single personality trait to understand the overall human personality: the GFP.
Details
Keywords
Chitresh Kumar, Neha Garg, Asim Talukdar and Anirban Ganguly
This paper aims to study the adverse effects of performance motivation and goal setting. The study investigates the unethical behavior of knowledge hiding that requires moral…
Abstract
Purpose
This paper aims to study the adverse effects of performance motivation and goal setting. The study investigates the unethical behavior of knowledge hiding that requires moral disengagement. The research further investigates the influence of performance motivation on knowledge hiding, along with investigating the mediating effect of moral disengagement.
Design/methodology/approach
Structural equation modeling has been adopted to understand the relationships. Data was collected from 288 students from Indian higher education institutions to understand how social cognitive aspects of performance influenced knowledge hiding.
Findings
The findings revealed that students hide knowledge from peers and rationalize the hiding process through social cognition of moral disengagement to justify the hiding process. It was further observed that performance motivation has a stronger relationship with rationalized knowledge hiding as compared to evasive knowledge hiding or playing dumb.
Research limitations/implications
By exploring the potential unintended yet detrimental consequences of performance motivation, this study adds to the scant literature on the drawbacks of ambitious goal setting. It also advances the performance motivation and knowledge hiding literature by exploring these constructs through the behavioral ethics lens of moral disengagement.
Practical implications
Awareness about the ill-effects of performance motivation of students and understanding the role of moral disengagement in the same will help administrators and policymakers to cautiously promote performance-driven culture within academia as well as in designing effective interventions for curbing the same.
Originality/value
The current study advances the extant literature on the negative side of ambitious goal setting and provides new insights into how it can encourage moral disengagement and knowledge-hiding behavior. Further, academic research on moral disengagement among students has been scarce. This study thus investigates how moral disengagement among students can promote detrimental behavior(s) of knowledge hiding. The study is one of the early studies to uncover moral disengagement as an antecedent to knowledge hiding.