SlideShare a Scribd company logo
1 of 62
Fordham University
Chapter Title: Transpacific Entanglements
Chapter Author(s): Yên Lê Espiritu, Lisa Lowe and Lisa
Yoneyama
Book Title: Flashpoints for Asian American Studies
Book Editor(s): Cathy J. Schlund-Vials
Published by: Fordham University. (2018)
Stable URL: https://www.jstor.org/stable/j.ctt1xhr6h7.13
JSTOR is a not-for-profit service that helps scholars,
researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information
technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about
JSTOR, please contact [email protected]
Your use of the JSTOR archive indicates your acceptance of the
Terms & Conditions of Use, available at
https://about.jstor.org/terms
Fordham University is collaborating with JSTOR to digitize,
preserve and extend access to
Flashpoints for Asian American Studies
This content downloaded from 169.237.45.17 on Fri, 20 Dec
2019 23:01:49 UTC
All use subject to https://about.jstor.org/terms
P a r t I I I
Remapping Asia, Recalibrating Asian Amer i ca
This content downloaded from 169.237.45.17 on Fri, 20 Dec
2019 23:01:49 UTC
All use subject to https://about.jstor.org/terms
This content downloaded from 169.237.45.17 on Fri, 20 Dec
2019 23:01:49 UTC
All use subject to https://about.jstor.org/terms
175
In our collaborative contribution, we examine the geopo liti cal,
military,
and epistemological entanglements between U.S. wars in Asia,
U.S. racial
capitalism, and U.S. empire and argue that U.S. empire and
militarism in
Asia and the Pacific Islands have been critical, yet
underrecognized, parts
of the genealogy of the con temporary condition of U.S.
neoliberalism. We
emphasize that U.S. neoliberalism mediates itself through the
U.S. national
security state, which is si mul ta neously a racial state and a
settler state; this
is expressed not merely in the racialization of Asian and Pacific
Islander
peoples but significantly in the erasure of historical and
ongoing settler
colonialism and, furthermore, in a racial social order that si mul
ta neously
pronounces antiblackness and Islamophobia. In our elaboration
of “trans-
pacific entanglements,” historical and ongoing settler logics of
invasion, re-
moval, and seizure continuously articulate with other forms of
appropriation
and subjugation: This U.S. settler logic intersects with
racialized capitalism
and overseas empire asserts itself— often through the
collaborative networks
of the U.S.- backed, patriarchally or ga nized, subimperial
Asian “client-
states”—in transpacific arrangements such as: export pro
cessing zones in
the Philippines, U.S. military bases in Okinawa and Guam,
nuclear test sites
C h a p t e r 1 0
Transpacific Entanglements
Yên Lê Espiritu, Lisa Lowe, and Lisa Yoneyama
This content downloaded from 169.237.45.17 on Fri, 20 Dec
2019 23:01:49 UTC
All use subject to https://about.jstor.org/terms
176 Yên Lê Espiritu, Lisa Lowe, and Lisa Yoneyama
in the Marshall Islands, the exportation of nuclear power plants
through-
out Asia, the partition of Korea, and the joint military
operations that
demonstrate and secure the empire’s reach. In this way, we
conceptualize
U.S. empire in Asia and the Pacific Islands as at once a settler-
colonial
formation, a racial and sexualized cap i tal ist formation, and a
military proj-
ect that permits overseas dominance, appropriation, and
exploitation. Em-
pire works si mul ta neously, yet differentially, to naturalize
U.S. presence
and possession in Asia and the Pacific Islands through the
imperatives of
national security and war time necessity, to racialize the
peoples it captures,
occupies, kills, and governs, and to disavow the historical and
ongoing
dispossessions of Indigenous peoples.
In Immigrant Acts: On Asian American Cultural Politics, Lisa
Lowe situated
racialized Asian immigrant labor within the history of U.S.
capitalism,
expanding its global reach through wars in Asia; she noted that
U.S. im-
migration exclusion acts and naturalization laws managed and
produced
Asian American racial formation through both exclusion and
inclusion in
relation to the history of U.S. wars in Asia. As Yên Lê Espiritu
has argued
in her recent book Body Counts: The Vietnam War and
Militarized Refuge(es),
and Lisa Yoneyama makes evident in Cold War Ruins:
Transpacific Critique
of American Justice and Japa nese War Crimes, American
exceptionalism has
rationalized U.S. military and cap i tal ist interventions in Asia
and the Pa-
cific Islands as necessary for the “national security” of the
United States
and for the humanitarian “rescue” of Asian peoples. The global
portrait
of the United States as triumphant and humanitarian liberator of
Asia, and
to a similar extent the Pacific Islands, has buttressed the
military buildup
against a broad range of Amer i ca’s “enemies,” variously
named in twentieth-
century history as “fascists” during the Second World War,
“underdevel-
opment” in the U.S.- modeled modernization proj ects of
postcolonial third
world countries, “communists” in the Cold War, and “terrorists”
in the
War on Terror. These links indicate that U.S. militarism and
empire in
Asia and the Pacific Islands displaces and racializes Asian and
Pacific mi-
grants and refugees and that the discourse of the United States
as libera-
tor of Asia is employed in turn to explain the necessary
expansion of
militarism in the Philippines, Guam, Hawaii, Okinawa, Korea,
and Viet-
nam and to justify the current wars in Iraq, Af ghan i stan,
Syria, and else-
where. In that pro cess, moreover, the settler logic of U.S.
imperial nation
and its “military- security- academic” regime si mul ta neously
discipline and
regulate the class, race, sexual, and other uneven social
relations and iden-
tities within and along the national border of the U.S. mainland.
It is im-
perative, therefore, that any attempts at transforming the
American pres ent
This content downloaded from 169.237.45.17 on Fri, 20 Dec
2019 23:01:49 UTC
All use subject to https://about.jstor.org/terms
Transpacific Entanglements 177
must take into account the geohistorical ramifications of U.S.
settler colo-
nialism and its ties to specific transpacific conditions in Asia
and the Pacific
Islands.
At this moment of reinvigorated U.S. imperialism and
globalized mili-
tarization, we suggest it is impor tant to interrogate anew the
public recol-
lections of the U.S. war in Vietnam. By most accounts, Vietnam
was the
site of one of the most brutal and destructive wars between
Western im-
perial powers and the people of Asia, Africa, and Latin Amer i
ca. U.S. mil-
itary policies cost Vietnam at least three million lives, the
maiming of
countless bodies, the poisoning of its water, land, and air, the
razing of its
countryside, and the devastation of most of its infrastructure.
Indeed, more
explosives were dropped on Vietnam, a country two- thirds the
size of
California, than in all of World War II. Yet post-1975 public
discussions of
the Vietnam War in the United States often skip over this
devastating his-
tory. This “skipping over” of the Vietnam War constitutes an or
ga nized
and strategic forgetting of a controversial and unsuccessful war,
enabling
Americans to continue to push military intervention as key in
Amer i ca’s
self- appointed role as liberators— protectors of democracy,
liberty, and
equality, both at home and abroad.
As a controversial and unsuccessful war, the Vietnam War has
the po-
tential to unsettle the master narratives of “rescue and
liberation” and re-
focus attention on the troubling rec ord of U.S. military
aggression. And
yet, as demonstrated by the recent wars in West and South Asia,
the U.S.
loss in Vietnam has not curbed the United States’ crusade to
remake the
world by military force. Instead, the United States appears to
have been
able to fold the Vietnam War into its list of “good wars.” The
narrative of
the “good refugee,” deployed by the larger U.S. society and by
Viet nam-
ese Americans themselves, has been crucial in enabling the
United States
to turn the Vietnam War into a good war. Other wise absent in
U.S. pub-
lic discussions of Vietnam, Viet nam ese refugees become most
vis i ble and
intelligible to Americans as successful, assimilated, and
anticommunist
newcomers to the American “melting pot.” Represented as the
grateful
beneficiary of U.S.- style freedom, Viet nam ese in the United
States be-
come the featured evidence of the appropriateness of the U.S.
war in
Vietnam: that the war, no matter the cost, was ultimately
necessary, just,
and successful. Having been deployed to “rescue” the Vietnam
War for
Americans, Viet nam ese refugees thus constitute a solution
rather than a
prob lem for the United States, as often argued.
The good war narrative requires the production not only of the
good
refugee but also of the United States as the good refuge. The
making of
This content downloaded from 169.237.45.17 on Fri, 20 Dec
2019 23:01:49 UTC
All use subject to https://about.jstor.org/terms
178 Yên Lê Espiritu, Lisa Lowe, and Lisa Yoneyama
the “good refuge” was launched in April 1975 as U.S. media
and officials
extolled and sensationalized the U.S. airlifting of approximately
130,000
Viet nam ese out of the city in the final days before the Fall of
Saigon and
subsequently encamping the refugees at military bases
throughout the
Pacific archipelago. With the Defense Department coordinating
transpor-
tation and the Joint Chiefs of Staff- Pacific Command in charge
of the
military moves necessary for the evacuation, Viet nam ese were
airlifted
from Saigon on U.S. military aircrafts, transferred to U.S.
military bases
on (neo)colonized spaces such as the Philippines, Guam, Wake
Island, and
Hawaii, and delivered to yet another set of military bases
throughout the
United States: Camp Pendleton in California, Fort Chaffee in
Arkansas,
Eglin Air Force Base in Florida, or Fort Indiantown Gap in
Pennsylvania.
While these efforts have been widely covered by the media and
scholars
alike as “rescuing missions,” we need to expose them instead as
colonial
and militarized ventures.
Moving from one U.S. military base to another, Viet nam ese
refugees
witnessed firsthand the reach of the U.S. empire in the Asia-
Pacific region.
Far from confirming U.S. benevolence, the U.S. evacuation of
Viet nam ese
refugees made vis i ble the legacy of U.S. colonial and military
expansion
into the Asia Pacific region. The fact that the majority of the
first- wave
refugees were routed through the Philippines and Guam
revealed the lay-
ering of U.S. past colonial and ongoing militarization practices
on these
islands. It was the region’s (neo)colonial dependence on the
United States
that turned the Philippines and Guam, U.S. former and current
colonial
territories respectively, into the “ideal” receiving centers of the
U.S. res-
cuing proj ect; and it was the enormity of the U.S. military
buildup in the
Pacific that uniquely equipped U.S. bases there to handle the
large- scale
refugee rescue operation. As such, U.S. evacuation efforts were
not a slap-
dash response to an emergency situation that arose in Vietnam
in 1975 but
rather part and parcel of the long- standing militarized histories
and cir-
cuits that connected Vietnam, the Philippines, and Guam, dating
back
to 1898.
The U.S. initial designation of Clark Air Force Base as a
refugee stag-
ing point was intimately linked to, and a direct outcome of, U.S.
colonial
subordination and militarization of the Philippines. Soon after,
when
President Ferdinand Marcos refused to accept any more Viet
nam ese refu-
gees, U.S. officials moved the premier refugee staging area
from the Phil-
ippines to Guam. As an unincorporated or ga nized territory of
the United
States under the jurisdiction of the Department of the Interior,
Guam—
specifically, its U.S. air and naval bases, which took up one-
third of the
This content downloaded from 169.237.45.17 on Fri, 20 Dec
2019 23:01:49 UTC
All use subject to https://about.jstor.org/terms
Transpacific Entanglements 179
island— became the “logical” transit camps for the pro cessing
of evacuees.
With total land area of about two hundred square miles, and
meager local
resources, Guam was hardly an ideal location for the large-
scale refugee
operation. That it became the major refugee staging point in the
Pacific
had more to do with the U.S. militarization of Guam than with
U.S. hu-
manitarianism. The U.S. decision to designate Guam the
primary staging
ground for refugees, even when the island’s resources were
severely
stretched and its inhabitants adversely affected, repeats the
long- standing
belief that indigenous land is essentially “empty land”— that is,
land empty
of its Indigenous population. The refugee situation on Guam
thus bespeaks
the intertwined histories of U.S. settler colonialism and U.S.
military co-
lonialism on Guam and its war in Vietnam: It was the
militarization of the
colonized island and its Indigenous inhabitants that turned
Guam into an
“ideal” dumping ground for the unwanted Viet nam ese
refugees, the dis-
cards of U.S. war in Vietnam. At the same time, as Jana Lipman
argues,
the refugee presence bore witness not only to the tenacity but
also to the
limits of U.S. empire, critically juxtaposing “the United States’
nineteenth-
century imperial proj ect with its failed Cold War objectives in
Southeast
Asia.”1
From Guam, many Viet nam ese refugees journeyed to Marine
Corps
Base Camp Pendleton, a 125,000- acre amphibious training base
on the
Southern California coast, in San Diego County. It was here, at
a military
base, that the largest Viet nam ese population outside of
Vietnam got its
start in the United States. Like Clark and Andersen Air Force
Bases, Camp
Pendleton emerged out of a history of conquest: It is located in
the tradi-
tional territory of the Juaneño, Luiseño, and Kumeyaay Tribes,
which had
been “discovered” by Spanish padres and voyagers who traveled
to South-
ern California in the late eigh teenth century, “owned” by
unscrupulous
Anglo- American settlers for about a century as the California
state legis-
lature repeatedly blocked federal ratification of treaties with
Native com-
munities, and ultimately “acquired” by the U.S. Marine Corps in
1942 in
order to establish a West Coast base for combat training of
Marines. Camp
Pendleton’s prized land— its varied topography, which
combines a breath-
takingly beautiful seventeen- mile shoreline and diverse
maneuver areas,
making it ideal for combat training environment—is thus what
Richard
Carrico called “stolen land,” an occupied territory like Guam.2
The material and ideological conversion of U.S. military bases
into a
place of refuge— a place that resolves the refugee crisis,
promising peace and
protection— discursively transformed the United States from
violent
aggressors in Vietnam to benevolent rescuers of its people.
This “make over”
This content downloaded from 169.237.45.17 on Fri, 20 Dec
2019 23:01:49 UTC
All use subject to https://about.jstor.org/terms
180 Yên Lê Espiritu, Lisa Lowe, and Lisa Yoneyama
obscures the violent roles that these military bases— these
purported places
of refuge— played in the Vietnam War, which spurred the
refugee exodus
in the first place; the construction of military bases as “refuges”
also ob-
scures the historical and ongoing settler- colonial occupation of
indigenous
land, as well as the dispossession and displacement of
Indigenous peoples.
In the Philippines, from 1965 to 1975, Clark Air Force Base, as
the largest
overseas U.S. military base in the world, became the major
staging base
for U.S. involvement in Southeast Asia, providing crucial
logistical sup-
port for the Vietnam War. In Guam, Andersen Air Force Base
played a
“legendary” role in the Vietnam War, launching devastating
bombing mis-
sions over North and South Vietnam for close to a de cade. As
Robert
Rogers documents, Andersen rapidly became the United States’
largest
base for B-52 bombers. In 1972, Andersen was the site of the
most massive
buildup of airpower in history, with more than fifteen thousand
crews and
over 150 B-52s lining all available flight line space— about
five miles long.
At its peak, Andersen housed about 165 B-52s.3 The U.S. air
war, launched
from Guam, decisively disrupted life on the island,
underscoring once
again the total disregard for the island’s Indigenous inhabitants.
Fi nally,
as the Department of Defense’s busiest training installation,
California’s
Camp Pendleton, the refugees’ first home in the United States,
trains more
than 40,000 active- duty and 26,000 reserve military personnel
each year
for combat. Camp Pendleton is also the home base of the
illustrious 1st Ma-
rine Regiment, whose battalions participated in some of the
most fero-
cious battles of the war. As such, the Pacific military bases,
Clark and
Andersen Air Force Bases, and California’s Marine Corps Base
Camp
Pendleton, credited and valorized for resettling Viet nam ese
refugees in
1975, were the very ones responsible for inducing the refugee
displacement.
The massive tonnage of bombs, along with the ground fighting
provided
by Marine units like the Camp Pendleton’s 1st Marines,
displaced some
twelve million people in South Vietnam— almost half the
country’s total
population at the time— from their homes.
The transvaluation of U.S. military and colonial vio lence into a
benev-
olent act of rescue, liberation, and rehabilitation finds even
deeper geneal-
ogy in the racialized constitution of U.S. modernity, humanism,
and
liberalism, all of which continue to shore up what Richard H.
Immerman
called the “empire for liberty,” or what Oscar V. Campomanes,
following
William Appleman Williams, in a similar sense called the
“anticolonial
empire.”4 Williams famously characterized the United States’
Open Door
Policy since the nineteenth century as “Amer i ca’s version of
the liberal pol-
icy of informal empire or free trade imperialism,” which was at
the same
This content downloaded from 169.237.45.17 on Fri, 20 Dec
2019 23:01:49 UTC
All use subject to https://about.jstor.org/terms
Transpacific Entanglements 181
time driven by “the benevolent American desire to reform the
world in its
own image.”5 In other words, the United States developed as a
colonizing
empire even as it disavowed its histories of colonialism and
military take-
over through the liberal tenets of freedom, consensus, private
property, and
self- determination. After the Second World War, the
genealogy of liberal
empire culminated in the Cold War ascendancy of the United
States as a
leader of the free world who claimed to have replaced the
nineteenth-
century colonial order in Asia and the Pacific Islands.
The American image of itself as the benevolent liberator and
reformer
of the people and land it subjugates is sustained by the
discursive force of
liberal humanism and humanitarianism for which the notion of
“debt” is
the operative term. In tracking the emergence of new relations
of subju-
gation around the idea of freedom in the U.S. post-
Reconstruction era,
Saidiya V. Hartman argues that the trope of debt was deployed
to bind the
newly emancipated enslaved peoples to a new system of
bondage and in-
dentureship. Hartman writes: “Emancipation instituted
indebtedness. . . .
The emancipated were introduced to the cir cuits of exchange
through the
figurative deployment of debt. . . . The transition from slavery
to freedom
introduced the free agent to the cir cuits of exchange through
this construc-
tion of already accrued debt, an abstinent pres ent, and a
mortgaged
future. In short, to be free was to be a debtor— that is, obliged
and duty-
bound to others.”6 Though firmly situated in the specific
geohistorical con-
text of the failure of American Reconstruction, Hartman’s
observation of
the “figurative deployment of debt” lays out the constitutive
contradiction
of post- Enlightenment humanism, helping us understand how
the Ameri-
can notions of freedom, emancipation, liberty, and property
owner ship
have developed by producing as well as disciplining
modernity’s others.
This contradiction fundamental to the modern ideals of liberty
and freed
subjects underpins what we also consider to function as the
American myth
of rescue, liberation, and rehabilitation, a discursive economy
of geopoli-
tics that consolidated the racialized and heterosexualized logic
of subjuga-
tion and bondage in the U.S. relationship to Asia throughout the
twentieth
century.
The American myth of rescue, liberation, and rehabilitation then
leaves
the indelible marks on the liberated of inferiority,
subordination, and be-
latedness (to freedom, democracy, and property) but also of
indebtedness.
It assigns “the already accrued debt” to the liberated. Once
marked as “the
liberated” and therefore “the indebted,” one cannot easily enter
into a re-
ciprocal relationship with the liberators. This myth, which pres
ents both
vio lence and liberation as “gifts for the liberated,” has serious
implications
This content downloaded from 169.237.45.17 on Fri, 20 Dec
2019 23:01:49 UTC
All use subject to https://about.jstor.org/terms
182 Yên Lê Espiritu, Lisa Lowe, and Lisa Yoneyama
for the redressability of U.S. military vio lence, as Yoneyama
observes of
the American aggression in the Iraq War.7 According to this
myth, the
losses and damages brought on by U.S. military vio lence are
deemed “pre-
paid debts” incurred by those liberated by American
intervention. The
injured and violated bodies of the liberated do not seem to
require redress
according to this discourse of indebtedness, for their liberation
has already
served as the payment/reparation that supposedly precedes the
vio lence
inflicted upon them. Furthermore, American myths of rescue,
liberation,
and rehabilitation have seriously threatened the way that
postcolonial sov-
ereignty might be conceived. As Chungmoo Choi notes, the
dominant
historiography of U.S.- Korea relations posits the post– World
War II
“liberation as a gift of the allied forces, especially of U.S.A.”8
This dele-
gitimized the agency of Koreans in nation- building in the
aftermath
of Japa nese colonial rule, which was followed immediately by
the Korean
War— the “forgotten” war that consolidated the military-
securit y-
industrial- academic complex— and the ongoing Cold War
partition. Mimi
Nguyen similarly discusses how the U.S. “gift of freedom” to
refugees of
the war in Vietnam, imposes indebtedness while binding them to
the
colonial histories that deemed them “unfree.”9
The predicament of U.S. bases in Okinawa urgently
demonstrates the
intersection of the settler logic of invasion, removal, and
seizure and the
American imperialist myth of rescue, liberation, and
rehabilitation. As a
number of critics remind us, there is not one piece of land in
Okinawa’s
main island that was willingly offered to the U.S. military for
use. And yet,
under the U.S.- Japan Security Treaty, 75 percent of the entire
U.S. base
facilities in Japan is accommodated in Okinawa prefecture,
which consti-
tutes less than 1 percent of Japa nese soil. Okinawa’s
subjection to Japan
began in the seventeenth century when the Ryukyu kingdom
came under
the rule of the Shimazu domain, followed by its integration as a
prefecture
into the modern Meiji state that was then emerging into the
nineteenth
century international and interimperial order. After the Second
World
War, the United States “liberated” Okinawa from the many
centuries of
Japa nese rule. At the same time, the United States insisted on
the posses-
sion of Okinawa in exchange for the heavy American military
sacrifice in
the Pacific battlefronts. Okinawa thus remained under U.S.
military oc-
cupation for nearly three de cades, until its “reversion” to
Japan (1945–
1972). During the occupation, the United States formally
recognized
Japan’s “residual sovereignty” over Okinawa, thereby pre-
empting any
Okinawan Indigenous claim to local sovereignty. It also insisted
that the
United States would maintain control over Okinawa until its
eventual
This content downloaded from 169.237.45.17 on Fri, 20 Dec
2019 23:01:49 UTC
All use subject to https://about.jstor.org/terms
Transpacific Entanglements 183
approval as a U.N. trusteeship under U.S. authority. As
Toriyama Atsushi
points out, the two concepts, “residual sovereignty” and
“pending” trustee-
ship, allowed the United States’ exclusive management of
Okinawa while
at the same time helped to contain the Indigenous demands for
self-
determination and Okinawa’s in de pen dence. What is impor
tant to our
discussion is that the American recognition of Japan’s “residual
sover-
eignty” rationalized the United States’ de facto control over the
Okinawan
land, the ocean, and the airspace, without contradicting its
claims to be the
supreme leader of freedom and liberty in the postcolonial
world.10 The on-
going settler logics of invasion, removal, and seizure thus
sustains and is in
turn secured by the historically rooted and still power ful
exceptionalist
discourse of the U.S. liberal empire. Yet, it is equally impor
tant to remem-
ber that this pro cess is far from complete. As Yoneyama argues
in her ear-
lier work on the politics of memory inspired by Walter
Benjamin, what we
hope to offer below is a method of unlearning the “universal
history”—
Marxist, liberal, or other wise—in such a way that would enable
us to dis-
cern and connect the “missed opportunities and unfulfilled
promises in
history, as well as unrealized events that might have led to a dif
fer ent pres-
ent.”11 Such a method calls upon us to link apparently separate
subjects, con-
texts, and issues whose connections have been rendered
unavailable by
existing geo graph i cal, po liti cal, and disciplinary bound
aries.
Although American exceptionalism, humanitarianism, and
national se-
curity with re spect to Asia are more often understood as
discourses that
address international relations, we wish to emphasize that they
are critical
parts of a neoliberal racial social ordering within the United
States as
well, which naturalizes white settlement and perpetuates
assaults on Black,
Muslim, and poor communities of color. In the nineteenth
century until
World War II, Chinese, Japa nese, Filipino, and South Asians
were re-
cruited as racialized noncitizen labor and barred from the po
liti cal and
cultural spheres in the development of the national economy;
today, the
racialization of Asian immigrants within the United States is no
longer ex-
clusively that of noncitizen immigrant labor. The U.S. state
responded to
challenges by radical social movements of the 1960s and
decolonization
movements worldwide with aggressive incorporative mea sures,
from the
1964 Civil Rights Acts and the 1965 Immigration and
Nationality Act, to
the large- scale capital investment in the development and rapid
“integra-
tion” of Asia into global capitalism. Within these conditions,
the racial-
ization of Asian Americans as the model minority has been
crucial to the
pernicious fictions of multiculturalism and “postracial”
inclusion, just as
modernization discourse has in an analogous fashion
“racialized” the newly
This content downloaded from 169.237.45.17 on Fri, 20 Dec
2019 23:01:49 UTC
All use subject to https://about.jstor.org/terms
184 Yên Lê Espiritu, Lisa Lowe, and Lisa Yoneyama
industrialized Asian nations to be what Takashi Fujitani calls
“model” mo-
dernity nations.12 Sociologist Hijin Park discusses this
neoliberal position-
ing of the “East Asian miracle” as the discourse of “rising
Asia.”13 The
“rising Asia” discourse opposes newly industrialized Asia to
less “devel-
oped” countries in Africa, Latin Amer i ca, Central Asia; it is
comple-
mented by the fiction of Asian “culture” as traditionally
patriarchal and
heteronormative, a fiction employed, as Chandan Reddy argues,
to disci-
pline black, brown, and queer of color communities, as
“backward” and
threatening.14
These new racial formations signal forms of governance that
represent
“Asians” as included in both the U.S. nation and in global
capitalism, even
as Asian and Pacific Islander peoples are forcibly dislocated
from sites in
which the United States has occupied, interned, and conducted
imperial
war. In other words, violent exclusion from national belonging
has char-
acterized the historical emergence of the United States from its
beginnings:
justifying the dispossession of Indigenous peoples, the
enslavement of
Africans and Jim Crow segregation, the stolen labors of
indentured and
immigrant workers, and the losses of life as the United States
waged wars
in Latin Amer i ca, East, Northeast, and Southeast Asia, Central
Asia,
and West Asia. Yet within the formation we call
“neoliberalism,” vio lence
accompanies not only exclusion from the nation but also
inclusion into it: as
“emancipated” slave, indebted poor, grateful immigrant, or
rehabilitated
inmate. The vio lence of inclusion, an operation that proposes to
convert
subjugated others into normative humanity and multicultural
citizenship,
is clearly also a pro cess of racial governance. Yên Espiritu
elaborates this
concept as “differential inclusion,” to counter the myth of
“voluntary” im-
migration and to emphasize the pro cesses through which dif fer
ent groups
are “included” yet si mul ta neously legally subordinated, eco
nom ically ex-
ploited, or culturally degraded, often in relation to one
another.15 The rela-
tive inclusions of Asians and Pacific Islander peoples by
postwar racial
liberalism, which appeared to legitimize an official antiracism,
provided
the United States moral legitimacy as it sought to gain Cold
War hege-
mony against the Soviet Union.16 It built upon the fiction of the
U.S. state
as the guarantor of civil rights and suppressed radical
challenges— from
Black Power to third world decolonization movements— even
as it ex-
tended U.S. militarism and neoliberal capitalism globally.
Con temporary neoliberalism naturalizes the market, buttresses
the pri-
macy of the deserving individual, and instantiates the
superiority of the
private over the public; it moreover affirms “colorblindness”
that disavows
the per sis tence of antiblackness, promotes a discourse of
“rising Asia” that
This content downloaded from 169.237.45.17 on Fri, 20 Dec
2019 23:01:49 UTC
All use subject to https://about.jstor.org/terms
Transpacific Entanglements 185
masks the longer history of North Atlantic empires, and it
denies ongoing
settler colonialism while justifying imperial war and military
basing that
occupies, dispossesses, and displaces Indigenous communities.
Neoliber-
alism erases the longer history in which “emancipation,” “ free
wage labor,”
and “ free trade” have enabled the development of what Cedric
Robinson calls
“racial capitalism”— built upon settler colonialism, slavery,
indenture, and
unfree immigrant labor.17 Grace Hong characterizes the
current mo-
ment of neoliberal restructuring as an epistemological structure
of dis-
avowal, a means of claiming that racial and gendered vio lence
has been
overcome, while disavowing the continuing assaults on
inassimilable poor
communities of color.18 We suggest that where many theorists
of neolib-
eralism, whether inspired by Marx, Weber, or Foucault,
observe the de-
fining feature of neoliberalism to be the generalization of the
market logic
of exchange to all spheres of human life, this definition of
neoliberalism of-
ten leaves unchallenged such disavowal, and we argue that the
critique
of neoliberalism must be nuanced in relation to the much longer
histories
of racial capitalism, colonialism, and militarism.19 In light of
the commod-
ification of human life within slavery, colonialism, as well as
in con temporary
global capitalism, we insist that what is currently theorized as a
“new” fi-
nancialization of human life under neoliberalism occurred
brutally and
routinely and continues to occur throughout the course of
modern em-
pires. Indeed, what Lowe discusses elsewhere as the “colonial
division of
humanity” is a signature feature of long- standing liberal modes
of distinc-
tion that privilege par tic u lar lives as “ human” and treat other
lives as the
laboring, replaceable, or disposable contexts that constitute that
“human-
ity.”20 In their recent work on neoliberal forms of “surrogate
humanity”—
whether gestational surrogacy in India, life extension through
medical
technologies, or the advanced automation of labor by Amazon
robotics—
Neda Atanasoski and Kalindi Vora argue that even “post-
human” con-
cepts and practices continue to reproduce racial, gender, and
geopo liti cal
hierarchies of social difference.21
The national security imperatives developed during the Cold
War have
been critical to the neoliberal reor ga ni za tion of the state and
economy, with
consequences for the domestic racial order, which involves the
withdrawal
of the state from its traditional purpose of social welfare to
investment in
the repressive arms of the U.S. state: policing, drug
enforcement, immi-
gration and border patrol, and prisons— all of which racialize
and divide
in the distribution of punishments. The privatization of
traditional public
“goods,” such as schooling, health care, and social securities
further con-
tributes to the precarity of poor communities of color, while the
buildup
This content downloaded from 169.237.45.17 on Fri, 20 Dec
2019 23:01:49 UTC
All use subject to https://about.jstor.org/terms
186 Yên Lê Espiritu, Lisa Lowe, and Lisa Yoneyama
of policing, detention, and prisons targets and suppresses U.S.
black, brown,
and Muslim communities. The links between U.S. militarism
abroad and
policing at home is nowhere more evident than in the Israeli
training of
police serving in Ferguson, Missouri, who suppressed the
community pro-
testing Michael Brown’s death with military surplus equipment
such as
aircraft, armored vehicles, assault rifles, grenades, vests, and
tear gas.22 Re-
becca Bohrman and Naomi Murakawa ironically term this
refortification
of the repressive arms of the state the “remaking big
government,” while
Ruth Wilson Gilmore calls this a transformation from the
“welfare state”
to the “warfare state.”23 The national security discourse
exonerates the
neoliberal state for its violent antiblackness and Islamophobia.
The “Asian American” has often been made to serve as the sign
that me-
diates this disavowal of the racial ordering called
“postraciality” or “col-
orblindness,” the deployment of which governs this neoliberal
restructuring
of culture, society, economy, and politics. Whether expressed
through
Asian immigrant exclusion or inclusion, the U.S. state has
produced itself
as a global power through the formation of the “Asian
American” as a
means to resolve the contradictions of the U.S. racial capitalism
and its im-
perial military proj ect. Yet we wish to emphasize that for this
reason, now, as
before, the “Asian American” is a critical mediating figure for
diagnosing
racial power and geopo liti cal ordering. Rather than stabilizing
binary
categories of white/nonwhite, settler/native, or
developed/underdeveloped,
the “Asian American” continues still to mediate racial
relationality or to
triangulate these terms. Asian racial formation continues to
shed light
on how race is not fixed or essential but a shifting designation
within
what Stuart Hall terms society “structured- in- dominance.”24
Asian racial
formations—as noncitizen labor, as model minority, as
threatening cap i-
tal ist rival— devalue Asians and mea sure and mediate geopo
liti cal and na-
tional transformations. In our current moment, Asianness as
“model
minority/model modernity” is an index of the pres ent U.S.
settler racial
order that reduces and dehumanizes blackness as surplus
population, con-
structs Indigenous peoples as extinct or vanishing, and frames
Muslims as
threatening vio lence.
In conclusion, we conceive U.S. racial empire as an open pro
cess, an
unfolding of dynamic, multiple relations of rule and re sis
tance. Alyosha
Goldstein discusses U.S. colonialism as “a continuously failing,
perpetu-
ally incomplete, proj ect that labors to find a workable means
of resolution
to sustain its logic of possession by disavowing ongoing
contestation.”25
Like Goldstein, we understand U.S. racial empire to be
continuously fail-
ing and incomplete, which suggests that its destruction,
exploitation, and
This content downloaded from 169.237.45.17 on Fri, 20 Dec
2019 23:01:49 UTC
All use subject to https://about.jstor.org/terms
Transpacific Entanglements 187
administration is never total, that its cruelty and cunning
produces con-
tingency and excess that we cannot entirely know or anticipate.
In Body
Counts, Espiritu frames the possibility of anti- imperial
collaborations
through critical juxtaposition, which she elaborates by
interpreting the ge-
ography of Viet nam ese refugee flight in 1975: The refugees
were taken by
military aircraft and routed through U.S. bases, from Vietnam to
the Phil-
ippines to Guam and then to California. This itinerary connects
Viet-
nam ese postwar displacement to that of settler colonialism and
militarism
that has dispossessed Filipino, Chamorro, and Native American
peoples
and gives rise to an antimilitarist association of
incommensurable yet linked
groups. This is what Yoneyama describes, in Cold War Ruins,
as transpa-
cific cultures of reckoning and redress in the face of
unredressable war
and vio lence. The related, yet often illegible, strug gles against
these inter-
locking formations are the pos si ble po liti cal itineraries that
Lowe evokes
in Intimacies as “connections that could have been, but were
lost, and are
thus, not yet.”26 Thus, in our piece, we take a comparative
relational ap-
proach and employ the method of critical juxtaposition— the
deliberate
bringing together of seemingly dif fer ent historical events in an
effort to
reveal what would other wise remain invisible—in this case, to
examine
the contours, contents, and limits of U.S. imperialism, wars, and
genocide
in the Asia- Pacific region and racialization on the U.S.
mainland. We
gesture toward, and call into being, what Yoneyama calls the
competing
“yearnings” for “justice beyond judicialization” across unlike,
asymmetri-
cal, yet linked terrains.27 We can and must always make “Asia”
and “Asian
American” signify more than American exceptionalism.
Not es
1. Jana K. Lipman, “ ‘Give Us a Ship’: The Viet nam ese
Repatriate Move-
ment on Guam, 1975,” American Quarterly 64 (2012): 3–4
(emphasis added).
2. Richard Carrico, Strangers in a Stolen Land: Indians of San
Diego
County from Prehistory to the New Deal (Newcastle, Calif.:
Sierra Oaks, 1987).
3. Robert F. Rogers, Destiny’s Landfall: A History of Guam
(Honolulu:
University of Hawaii Press, 1995).
4. Oscar V. Campomanes, “1898 and the Nature of the New
Empire,”
Radical History Review 73 (Winter 1999): 130–46. See also
Richard H.
Immerman, Empire for Liberty: A History of American
Imperialism from
Benjamin Franklin to Paul Wol fo witz (Prince ton, N.J.: Prince
ton University
Press, 2010).
5. William Appleman Williams, The Tragedy of American
Diplomacy
(Cleveland, Ohio: World Publishing, 1959), 67, 47.
This content downloaded from 169.237.45.17 on Fri, 20 Dec
2019 23:01:49 UTC
All use subject to https://about.jstor.org/terms
188 Yên Lê Espiritu, Lisa Lowe, and Lisa Yoneyama
6. Saidiya V. Hartman, Scenes of Subjection: Terror, Slavery,
and Self-
Making in Nineteenth- Century Amer i ca (Oxford: Oxford
University Press,
1997), 131.
7. Lisa Yoneyama, “Traveling Memories, Contagious Justice:
Ameri-
canization of Japa nese War Crimes at the End of the Post- Cold
War,”
Journal of Asian American Studies (February 2003): 57–63.
8. Chungmoo Choi, “The Discourse of Decolonization and Popu
lar
Memory: South Korea,” Positions: East Asia Cultures Critique
1, no. 1 (1993): 80.
9. Mimi Nguyen, The Gift of Freedom: War, Debt, and Other
Refugee
Passages (Durham, N.C.: Duke University Press, 2014).
10. Atsushi Toriyama, “Okinawa’s ‘Postwar’: Some
Observations on the
Formation of American Military Bases in the Aftermath of
Terrestrial
Warfare,” trans. David Buist, in The Inter- Asia Cultural
Studies Reader, ed.
Kuan Hsing Chen and Beng H. Chua, 267–88 (London:
Routledge, 2007),
273.
11. Lisa Yoneyama, Hiroshima Traces: Time, Space and the
Dialectics of
Memory (Berkeley: University of California Press, 1999), 19.
12. Takashi Fujitani, Race for Empire: Koreans as Japa nese
and Japa nese as
Americans during World War II (Berkeley: University of
California Press,
2011).
13. Hijin Park, “Neoliberalizing Differential Racialization:
Asian Uplift,
Indigenous Death, and Blackness as Surplus,” pre sen ta tion,
McMaster
University, October 2012.
14. Chandan Reddy, “Asian Diasporas, Neoliberalism, and
Family:
Reviewing the Case for Homosexual Asylum in the Context of
Family
Rights,” Social Text 84–85, vol. 23, nos. 3–4 (Fall– Winter
2005): 101–19.
15. Yên Lê Espiritu, Home Bound: Filipino Lives across
Cultures (Berkeley:
University of California Press, 2003), 47–48.
16. On “racial liberalism” and the postwar incorporation of
racialized
minorities, see especially Jodi Melamed, Represent and
Destroy: Rationalizing
Vio lence in the New Racial Capitalism (Minneapolis:
University of Minnesota
Press, 2011).
17. Cedric Robinson, Black Marxism: The Making of the Black
Radical
Tradition (Chapel Hill: University of North Carolina Press,
1983).
18. Grace Kyungwon Hong, Death beyond Disavowal: The
Impossible
Politics of Difference (Minneapolis: University of Minnesota
Press, 2015).
19. See for example, Thomas Lemke (“The Birth of Bio-
politics: Michel
Foucault’s Lectures at the Collège de France on Neo- liberal
Governmental-
ity,” Economy and Society 30, no. 2 [May 2001]: 190–207),
who argues that
neoliberalism is characterized by the collapse of the distinction
between
liberal economy and liberal governance and the withdrawal of
the state in
favor of the apotheosis of the economy such that neoliberal
subjects are
This content downloaded from 169.237.45.17 on Fri, 20 Dec
2019 23:01:49 UTC
All use subject to https://about.jstor.org/terms
Transpacific Entanglements 189
controlled precisely through their “freedom.” Wendy Brown
explains that
neoliberalism involves “extending and disseminating market
values to all
institutions and social action”; “all dimensions of human life
are cast in
terms of a market rationality”; and the state ceases to be “the
Hegelian
constitutional state conceived as the universal repre sen ta tion
of the people.”
Wendy Brown, “Neo- liberalism and the End of Liberal
Democracy,” in
Edgework: Critical Essays on Knowledge and Politics (Prince
ton, N.J.: Prince ton
University Press, 2005), 40–41. See also David Harvey, A Brief
History of
Neoliberalism (Oxford: Oxford University Press, 2005).
20. Lisa Lowe, The Intimacies of Four Continents (Durham,
N.C.: Duke
University Press, 2015), 107.
21. Kalindi Vora and Neda Atanasoski, “Surrogate Humanity:
Posthu-
man Networks and the (Racialized) Obsolescence of Labor,”
Catalyst:
Feminism, Theory, Technoscience 1, no. 1 (2015): 1–40.
22. Kristian Davis Bailey, “The Ferguson/Palestine
Connection,” Ebony,
August 19, 2014, http:// www . ebony . com / news - views / the
- fergusonpalestine
- connection - 403; Tom Giratikanon, Alicia Parlapiano, and
Jeremy White,
“Mapping the Spread of the Military’s Surplus Gear,” New York
Times,
August 15, 2014, http:// www . nytimes . com / interactive /
2014 / 08 / 15 / us / surplus
- military - equipment - map . html.
23. Rebecca Bohrman and Naomi Murakawa, “Remaking Big
Govern-
ment,” in Global Lockdown: Race, Gender, and the Prison-
Industrial Complex, ed.
Julia Sudbury (New York: Routledge, 2005); Ruth Wilson
Gilmore, “Global-
ization and U.S. Prison Growth: From Military Keynesianism to
Post-
Keynesian Militarism,” Race & Class 40, nos. 2–3 (1998–1999):
171–88.
24. Stuart Hall, “Race, Articulation, and Socie ties Structured
in Domi-
nance,” in Black British Cultural Studies, ed. Houston A. Baker
and Manthia
Diawara (Chicago: University of Chicago Press, 1996).
25. Alyosha Goldstein, ed., Formations of United States
Colonialism
(Durham, N.C.: Duke University Press, 2013), 3.
26. Lowe, Intimacies of Four Continents, 174.
27. Yoneyama, Cold War Ruins, 205.
This content downloaded from 169.237.45.17 on Fri, 20 Dec
2019 23:01:49 UTC
All use subject to https://about.jstor.org/terms
http://www.ebony.com/news-views/the-fergusonpalestine-
connection-403
http://www.ebony.com/news-views/the-fergusonpalestine-
connection-403
http://www.nytimes.com/interactive/2014/08/15/us/surplus-
military-equipment-map.html
http://www.nytimes.com/interactive/2014/08/15/us/surplus-
military-equipment-map.html
MBA 5401, Management Information Systems 1
Course Learning Outcomes for Unit II
Upon completion of this unit, students should be able to:
3. Explain how information technology systems influence
organizational strategies.
3.1 Explain an organization’s ability to use information
technology to achieve strategic goals.
4. Evaluate the prevailing ethical issues of information systems.
4.1 Describe how new technology trends may cause ethical
dilemmas.
Course/Unit
Learning Outcomes
Learning Activity
3.1
Unit Lesson
Chapter 3, pp. 78–111, 116–118
Unit II Case Study
4.1
Unit Lesson
Video: How Does Internet Surveillance Program PRISM Work?
Video: FBI Director, Apple CEO Talk Privacy and Security
Chapter 4, pp. 120–152, 157–159
Unit II Case Study
Required Unit Resources
Chapter 3: Information Systems, Organizations, and Strategy,
pp. 78–111, 116–118
Chapter 4: Ethical and Social Issues in Information Systems, pp.
120–152, 157–159
In order to access the following resources, click the links
below.
CBS Evening News. (2016, February 17). FBI director, Apple
CEO talk privacy and security [Video file].
Retrieved from https://www.youtube.com/watch?v=VhaRR22s-
bY
Transcript for FBI Director, Apple CEO Talk Privacy and
Security video
CBS News. (2013, June 7). How Does Internet Surveillance
Program PRISM Work? [Video file]. Retrieved
from https://www.youtube.com/watch?v=JR6YyYdF8ho
Transcript for How Does Internet Surveillance Program PRISM
Work? video
Unit Lesson
Information Systems: What This Means to Your Organization
For most of us, it is not that difficult to understand certain
information technology (IT) concepts. Most of us
use our hardware and equipment fairly well. We know how to
download apps on our smartphones. We know
about the systems and applications that we use at work. We may
not know all of the details or inner workings
of what information flows where, but we have a good idea of
how things work. If we were clueless, we would
not be of much value to our organizations, would we?
UNIT II STUDY GUIDE
Organizations, Strategy, Ethics, and
Social Issues in Information Systems
https://www.youtube.com/watch?v=VhaRR22s-bY
https://online.columbiasouthern.edu/bbcswebdav/xid-
119408487_1
https://www.youtube.com/watch?v=JR6YyYdF8ho
https://online.columbiasouthern.edu/bbcswebdav/xid-
119408489_1
MBA 5401, Management Information Systems 2
UNIT x STUDY GUIDE
Title
Organizations and Strategy
Let’s take this to a more abstract level. How would you answer
this question: How is IT used toward the
success of your organization? You might rattle off some reasons
relating to the availability of the Internet,
which allows e-mails to flow so that there is connectivity
between customers and service representatives. You
might say that your organization has several servers and
databases that house data and a security team with
security tools that ensure the safety of the data. You might
mention that all the applications allow you to
service your customers in faster, more efficient ways. If you are
a little more tech savvy at your organization,
you might even bring up more advanced topics or newer
innovations, such as the ones listed below:
-commerce;
, Applications, and Products (SAP);
Are the items described here IT tools? Yes, they are used to
help make everyone’s lives and jobs easier,
faster, more efficient, and more effective, but let’s ask the
question again: How is IT used toward the success
of your organization?
Organizations must deal with a lot of information about every
aspect of the business—from customers to
vendors, employees, invoices, payments, inventory, and
services. Our information systems make it possible
to organize this information and keep up with it all. Business
processes deal with the work that is performed in
our organizations so that we can produce something of value.
The performance of our business depends on
how well our business processes work. Our business processes
can add extreme value to our organization
because they can be a competitive strength. They can also drag
our value down if they are not working well
for the organization. Thus, IT can work in many ways to
improve our business processes by introducing
better, faster, and more efficient methods of performing tasks in
our business processes.
Imagine how much time and money is saved if a thousand
invoices are e-mailed to customers rather than
being mailed via the postal mail. How much time does it take a
person to stuff and stamp 1,000 envelopes?
Now, if you look at how technology supports not only business
processes but also management groups and
functional groups, you can start to see that they link together in
a way that serves to improve organizational
performance.
Value in improved performance: Organizations search every day
for ways to improve their performance,
production output, and transaction processing. In recent years,
technology has advanced to the point that it
supports enterprise-level systems, applications, networks,
collaboration, and so on. There are even enterprise
social networking tools now.
Influence of IT on business-level strategy: Basically, a strategy
addresses what needs to be accomplished.
With any organization, the strategic objectives will be similar.
The organizational leaders will want to be
number one in their market, increase sales revenue, decrease
costs, or strengthen their customer base. It is
certainly not a stretch to understand that a business wants to be
the best, the fastest, the most profitable, the
most efficient, the most customer-friendly, and so on.
You must also have a good understanding of what influences
organizations. Organizations have a culture.
They have politics, social structure, rules, values, norms, and
people. The reality is that technology affects all
aspects of organizations. For example, information systems can
have a huge economic impact on an
organization. IT is very costly, but the benefits can influence
big increases in revenue or substantial
decreases in costs.
MBA 5401, Management Information Systems 3
UNIT x STUDY GUIDE
Title
IT can have cultural and social impacts on organizations as
well. A large technology implementation can
mean a change in the mindset for many employees who are
resistant to change. Imagine that you know
technology implementation will increase the efficiency of
operations by 50%, but this may also mean that
fewer employees will be needed. Imagine that you are one of the
employees whose job is at risk due to a new
automation. This realization may cause a lot of doubt,
uncertainty, and anxiety for employees. All of these
factors play an important part in understanding the role that IT
plays in organizations. For IT to be beneficial
and for organizations to be successful, organizations have to
have clear strategies. Organizations have to
take full advantage of any competitive advantages and
understand models such as Porter’s competitive
forces model. Once organizational leaders understand where the
business needs to be, they can set clear,
actionable steps to get there. Those steps will involve
technology because organizations need to have IT
resources and IT capabilities. It will also involve an
organization’s ability to utilize its IT resources and create
value in conjunction with its other assets and resources.
Finally, it is important to note that organizations have to be able
to align their technologies with their business
strategies and goals. It does the organization no good to have a
well-defined strategy if it does not have the IT
resources and capabilities to meet its goals. On the other hand,
if the organization does not have a well-
defined strategy that is appropriate for the business, IT tools
will be of little help to reach meaningless goals.
The following videos display the challenges to individual
privacy.
View the video How Does Internet Surveillance Program
PRISM Work? (Transcript for How Does Internet
Surveillance Program PRISM Work? video).
View the video FBI Director, Apple CEO Talk Privacy and
Security (Transcript for FBI Director, Apple CEO
Talk Privacy and Security video).
Ethical and Social Issues in Information Systems
As Laudon and Laudon (2020) note, “ethics refers to the
principles of right and wrong that individuals, acting
as free moral agents, use to make choices to guide their
behavior” (p. 124). The fact is that information
systems open the door for many opportunities to make ethical
choices—probably as many, if not more, than
any other area in business.
Why is this statement true? Think about it. IT professionals will
likely have access to information more than
anyone else in the organization. Information such as employee
information, customer information, and sales
transactions are stored in database tables. A human resources
(HR) representative will have access to
employee information. A salesperson or customer service
representative will have access to sales information
or basic customer information. An accounts receivable person
will have access to customers’ financial
information.
Some IT professionals will have access to all information.
Additionally, many organizations have personal
usage rules regarding the personal use of company website,
Internet, and e-mail assets. This usually means
that organizations will have applications that log usage into
databases. Most of the time, employees’ actual e-
mail text is stored as well. Managers can request reports if they
feel an employee is abusing the usage rules,
but who has access to the data at any given time? Some IT
professionals will.
Who should have access to this information? Can you imagine
what would happen if anyone could access all
of this information? Imagine the unethical, disgruntled
employee who was passed over for a promotion
accessing the web logs and seeing that the newly promoted
coworker who is married has been researching
dating websites.
There is a lot of trust placed in IT professionals to house and
manage all kinds of sensitive information and
not abuse it themselves. This is where the basics of ethics for IT
professionals starts. Even within IT, there
are access controls that limit what can be done to the data. In
other words, most IT professionals could not
delete their web logs. This is all a part of having good security
policies, which we will discuss later.
https://www.youtube.com/watch?v=JR6YyYdF8ho
https://online.columbiasouthern.edu/bbcswebdav/xid-
119408489_1
https://online.columbiasouthern.edu/bbcswebdav/xid-
119408489_1
https://www.youtube.com/watch?v=VhaRR22s-bY
https://online.columbiasouthern.edu/bbcswebdav/xid-
119408487_1
https://online.columbiasouthern.edu/bbcswebdav/xid-
119408487_1
MBA 5401, Management Information Systems 4
UNIT x STUDY GUIDE
Title
Even if you, as an IT professional, accidentally view
confidential or sensitive information, you have to know
what your ethical responsibility is with regard to that
information. Should you inform management that you
saw that information? Another example might be knowing the
company’s financial information. It is unethical
and potentially illegal to use that information for your own
financial gain.
Ethical Challenges
Let’s examine how technology has advantages and
disadvantages by examining the opening case in Chapter
4, “Are Cars Becoming Big Brother on Wheels?”. Technology
can create new opportunities to enhance
people’s lives, but it can also be a detriment to improving lives.
Technology, such as the Internet, has
challenged our understanding of ethical and privacy issues.
Improvements in communications technology,
such as high-speed broadband and globalization, have brought
the topic of ethics and privacy to the forefront.
As the scenario demonstrates, data collected by smart cars can
be used by auto insurance companies to
monitor the insured’s driving habits and use the data to justify
increasing insurance rates. This software can
monitor driver activities such as texting while driving, traveling
speeds, alertness, and other driving patterns.
This information can then be used by law enforcement against
offenders to support traffic violation charges,
especially if the driver was involved in an accident.
Your driving habits can become a valuable commodity, just like
your individual shopping profile is on your
favorite online shopping website. Your trips to a theater,
grocery store, or shopping center reveal your
shopping habits and associations that are valuable to
corporations, government agencies, or other entities
that use the data to advertise. For example, frequent visits to a
movie theater reveal information about your
entertainment habits. However, frequent visits to a hospital or
care facility would also reveal information about
private medical data that you would not want to share with the
rest of the world.
Summary
This unit does a great job of covering many of the ethical
considerations that you may face at home and in the
workplace. In the workplace, there is always more to consider,
so most organizations have ethics training for
this purpose. At home, individuals will need to be
knowledgeable about how information is gathered and to
whom that information is given.
Reference
Laudon, K. C., & Laudon, J. L. (2020). Management
information systems: Managing the digital firm (16th ed.).
Upper Saddle River, NJ: Pearson.
Suggested Unit Resources
In order to access the following resources, click the links
below.
To reinforce the concepts from this unit, view the Chapter 3
Presentation (PDF for Chapter 3 Presentation).
To reinforce the concepts from this unit, view the Chapter 4
Presentation (PDF for Chapter 4 Presentation).
The following article brings some interesting reading about
ethical issues in information systems, which
correlates to issues discussed in the textbook and the unit
lesson.
Mason, R. O. (1986). Four ethical issues of the information age.
MIS Quarterly, 10(1), 5–12. Retrieved from
https://libraryresources.columbiasouthern.edu/login?url=http://s
earch.ebscohost.com/login.aspx?direc
t=true&db=bsu&AN=4679471&site=ehost-live&scope=site
https://online.columbiasouthern.edu/bbcswebdav/xid-
119408484_1
https://online.columbiasouthern.edu/bbcswebdav/xid-
119408483_1
https://online.columbiasouthern.edu/bbcswebdav/xid-
119408486_1
https://online.columbiasouthern.edu/bbcswebdav/xid-
119408485_1
https://libraryresources.columbiasouthern.edu/login?url=http://s
earch.ebscohost.com/login.aspx?direct=true&db=bsu&AN=4679
471&site=ehost-live&scope=site
MBA 5401, Management Information Systems 5
UNIT x STUDY GUIDE
Title
The following article also brings some interesting reading about
how organizational value is created through
IT governance mechanisms.
Wu, S. P.-J., Straub, D. W., & Liang, T.-P. (2015). How
information technology governance mechanisms and
strategic alignment influence organizational performance:
Insights from a matched survey of business
and IT managers. MIS Quarterly, 39(2), 497–519. Retrieved
from
https://libraryresources.columbiasouthern.edu/login?url=http://s
earch.ebscohost.com/login.aspx?direc
t=true&db=bsu&AN=102375761&site=ehost-live&scope=site
Your textbook has video cases that correlate with the
information being presented in the assigned chapter
readings. You are encouraged to review the video cases relating
to Chapter 3 below.
Akamai Technologies. (2012, November 16). Akamai customer
testimonial: NBA [Video file]. Retrieved from
http://www.youtube.com/watch?v=OZkyz-gChnI
Transcript for Akamai Customer Testimonial: NBA video
CNET. (2015, February 25). What the FCC net neutrality rules
will mean for Internet users [Video file].
Retrieved from
https://www.youtube.com/watch?v=84r3qd19tZU
Transcript for What the FCC Net Neutrality Rules Will Mean
for Internet Users video
Vox. (2015, February 26). The FCC’s new net neutrality rules,
explained in 172 seconds [Video file].
Retrieved from
https://www.youtube.com/watch?v=sBKPacCuXsw
Transcript for The FCC’s New Net Neutrality Rules, Explained
in 172 Seconds video
You are encouraged to review the video cases relating to
Chapter 4 below
Consumer Reports. (2013, June 6). Setting Facebook privacy
controls [Video file]. Retrieved from
https://www.youtube.com/watch?v=IWlyut4zsko
Transcript for Setting Facebook Privacy Controls video
Wall Street Journal. (2012, January 25). Google, privacy and
what it means for you [Video file]. Retrieved
from https://www.youtube.com/watch?v=V7M_FOhXXKM
Transcript for Google, Privacy and What It Means for You
video
https://libraryresources.columbiasouthern.edu/login?url=http://s
earch.ebscohost.com/login.aspx?direct=true&db=bsu&AN=1023
75761&site=ehost-live&scope=site
https://libraryresources.columbiasouthern.edu/login?url=http://s
earch.ebscohost.com/login.aspx?direct=true&db=bsu&AN=1023
75761&site=ehost-live&scope=site
https://libraryresources.columbiasouthern.edu/login?url=http://s
earch.ebscohost.com/login.aspx?direct=true&db=bsu&AN=1023
75761&site=ehost-live&scope=site
http://www.youtube.com/watch?v=OZkyz-gChnI
https://online.columbiasouthern.edu/bbcswebdav/xid-
119408482_1
https://www.youtube.com/watch?v=84r3qd19tZU
https://online.columbiasouthern.edu/bbcswebdav/xid-
119408492_1
https://www.youtube.com/watch?v=sBKPacCuXsw
https://online.columbiasouthern.edu/bbcswebdav/xid-
119408491_1
https://www.youtube.com/watch?v=IWlyut4zsko
https://online.columbiasouthern.edu/bbcswebdav/xid-
119408490_1
https://www.youtube.com/watch?v=V7M_FOhXXKM
https://online.columbiasouthern.edu/bbcswebdav/xid-
119408488_1
Instructions
It is important to understand what information systems are and
why they are essential for running and managing a business. It
is also important to understand the different systems that
support different groups or levels of management. In addition,
digital technology and the Internet play a key role in executing
major business processes in the enterprise. Also, it is important
to understand the ethical, social, and political issues raised by
information systems.
The case studies below provide you with an opportunity to
critically analyze events that are taking place in real-life
businesses. This helps to develop your critical thinking and
research skills as you research each of these scenarios.
For this assignment, review four case studies—two from
Chapter 1 and two from Chapter 2. Then, in an essay, evaluate
the studies and respond to each of the questions below, using
both critical thinking and theory as well as supporting
documentation.
In Chapter 1, read the case study “UPS Competes Globally with
Information Technology” on pages 23–24 of the textbook. Then,
answer the questions below.
· How does UPS use information systems technology to achieve
its strategic goals of being more efficient and customer
oriented?
· What would happen if the automated package tracking system
was not available?
· Discuss how globalization has “flattened” the world.
In Chapter 2, read the case study “Data Changes How NFL
Teams Play the Game and How Fans See It” on pages 52–53 of
the textbook. The, address the prompts below.
· Analyze how information systems are transforming business.
· What types of systems does the NFL and its teams use?
· What is the role that these systems play in improving both
operations and decision-making?
In Chapter 3, read the case study “Smart Products—Coming
Your Way” on pages 102–103 of the textbook. Then, address the
prompts below.
· Explain the importance of collaboration and information
sharing for businesses.
· Explain what a “smart” product is, and use an example.
· How do smart products increase rivalry among firms?
In Chapter 4, read the case study “Are Cars Becoming Big
Brother on Wheels?” on pages 121–122 of the textbook. Then,
address the prompts below.
· Describe how new technology trends may cause ethical
dilemmas.
· Discuss at least one ethical, social, and political issue raised
by embedded cyber connections in cars.
· Discuss how big data analytics are being applied to all of the
data generated by motor vehicles.
In formatting your case analysis, do not use the question-and-
answer format; instead, use an essay format with subheadings.
Your APA-formatted case study must be at least four pages in
length (not counting the title and reference pages).
You are required to use a minimum of three peer-reviewed,
academic sources that are no more than 5 years old (one may be
your textbook). All sources used, including the textbook, must
be referenced; all paraphrased material must have
accompanying in-text citations.
Chapter 3 Case study
Smart Products—Coming Your Way
If you don’t use a smart product yet, you soon will. Your shoes,
your clothing, your watch, your water bottle, and even your
toothbrush are being redesigned to incorporate sensors and
metering devices connected to the Internet so that their
performance can be monitored and analyzed. Your home will
increasingly use smart devices such as smart thermostats, smart
electrical meters, smart security systems, and smart lighting
systems.
Under Armour, noted for performance clothing, spent $710
million to scoop up mobile apps such as MyFitnessPal, Map My
Fitness, and Endomondo, which enable it to tap into the world’s
largest digital health and fitness community, with more than
225 million registered users. According to company data, Under
Armour’s connected fitness users have logged more than 500
million workouts and taken 7 trillion steps since the company
started tracking the data. Analyzing these data has provided
insights such as 3.1 miles being the average distance for a run
and that May is the most active month for exercise.
Under Armour is trying to enhance its performance clothing
with digital technology. The company now sells connected
running shoes. The shoes come in several models and feature a
built-in wireless Bluetooth sensor that tracks cadence, distance,
pace, stride length, and steps, even if the runner does not bring
a smartphone along. The data are stored on the shoe until they
can sync wirelessly to Under Armour’s Map My Run app for
iPhone, iPad, and Android devices. Users can also connect to
the app on third-party devices such as AppleWatch, Garmin, or
Fitbit, to incorporate metrics such as heart rate that can’t be
tracked by the shoes. The shoe’s analytics will let users know
when it’s time to purchase new shoes and sensor batteries have
to be charged.
Under Armour has recently added a digital coaching feature for
the connected running shoes and Map My Run app. Runners will
be able to monitor their gait and stride length mile after mile,
and see how that impacts their pace and cadence. By analyzing
these data, along with data about the runner’s gender, age,
weight, and height, Map My Run will be able to provide a
runner with tips on how to improve his or her pace and splits,
by taking shorter or longer strides while running, for instance.
Under Armour can generate revenue from in-app ads, including
ads from other companies, and purchases from app users
referred to its products. The platform delivers unprecedented
depth of information and insight about fitness- and health-
oriented consumers, creating numerous opportunities for Under
Armour and other brands to engage with potential and existing
customers. For example, Map My Fitness collects data about a
user’s name, e-mail address, birth date, location, performance,
and profile if the user connects to the app using social media.
Under Armour does not sell identifiable personal data about
individuals to third parties but does provide advertisers with
aggregate information about app users. Under Armour is hoping
that daily use of its smartphone apps will build stronger ties to
customers that will lead to stronger sales of its own apparel,
footwear, and other athletic gear. The company is clearly
benefiting from bringing the power of software to its physical
products.
Smart products are also finding their way into people’s homes.
Between 2017 and 2022, Con Edison, which supplies electrical
power and natural gas to the New York City metropolitan area,
is installing 3.6 million new electric smart meters and 1.2
million new gas smart meters in all its customers’ homes and
businesses. A smart meter is a digital meter that communicates
between a residence or business and Con Edison through a
secure wireless communication network. The smart meter
records and transmits each customer’s energy consumption
regularly throughout the day. The smart meter transmits data to
a system of access points on utility poles, which send the usage
information to Con Edison.
The smart meter will let the company know when a customer
loses service, resulting in faster repairs, and will also provide
real-time billing information to customers based on energy
usage, enabling them to pinpoint areas for energy savings. They
will also permit more definitive voltage regulation, enhancing
electric distribution-system efficiency, reducing costs, and
providing savings that ultimately get reflected in lower
customer bills. Data from the new meters will let Con Ed set
prices based on customers’ time and level of use. Rates might
jump during summer hours when hot weather makes people turn
on their air conditioners, or drop overnight when power use is
lowest.
Con Ed customers can use an online My Account dashboard
with tools to track their daily energy consumption down to 15-
minute increments. They can analyze their usage by comparing
hour to hour, weekday versus weekend, or day versus evening
use to see where they can save, and they can receive high bill
alerts if they are using more energy than usual. Con Ed also
offers a mobile app for iPhone and Android smartphone users so
that they can track their detailed energy usage while they are on
the go.
Sources: Jen Booton, “Under Armour’s New HOVR Smart Shoe
Will Automatically Track Your Run,” SportTechie, January 26,
2018; Edgar Alvarez, “Under Armour’s HOVR smart running
shoes are more than just a gimmick,” Engadget, February 9,
2018; www.coned.com, accessed March 28, 2018; Edward C.
Baig, “Under Armour and HTC Team Up on Connected
Fitness,” USA Today, January 5, 2016; www.underarmour.com,
accessed April 20, 2018; and John Kell, “Why Under Armour Is
Making a Costly Bet on Connected Fitness,” Fortune, April 21,
2016.
Chapter 4 Case study
Cars today have become sophisticated listening posts on wheels.
They can track phone calls and texts, record what radio stations
you listen to, monitor the speed at which you drive and your
braking actions, and even tell when you are breaking the speed
limit, often without your knowledge.
Tens of millions of drivers in the United States are currently
being monitored, with that number rising every time a new
vehicle is sold or leased. There are 78 million cars on the road
with an embedded cyber connection that can be used for
monitoring drivers. According to research firm Gartner Inc., 98
percent of new cars sold in the United States and Europe will be
connected by 2021.
Since 2014, every new car in the United States comes with an
event data recorder (EDR), which records and stores over a
dozen data points, including vehicle speed, seat belt use, and
braking activation. EDR data are available to any auto maker as
well as to insurance companies, which use these stored EDR
data to help establish responsibility for an accident or to detect
fraud.
EDRs are mandated and regulated by the U.S. government, but
other data-gathering software in today’s cars is not. Such
software underlies numerous sensors, diagnostic systems, in-
dash navigation systems, and built-in cellular connections, as
well as driver-assistance systems to help drivers park, stay in
their lane, avoid rear-ending another car, and steer for short
time periods. All of this software keeps track of what drivers
are doing. Newer cars may record driver eye movements, the
weight of people in the front seats, and whether the driver’s
hands are on the wheel. Smartphones, whether connected to the
car or not, can also track your activities, including any texting
while driving. Auto makers are able to mine all this
information, as are app developers and companies such as
Google or Spotify.
With the exception of medical information, the United States
has few regulations governing what data companies can gather
and how they can use the data. Companies generally are not
required to conceal names or other personal details. In most
cases the driver must consent to allowing his or her personal
information to be tracked or monitored. Many people
unwittingly provide this consent when they check off a box on
one of the lengthy service agreement forms required to register
a car’s in-dash system or navigation app.
Collecting such large amounts of personal data generated by
drivers has raised concerns about whether automakers and
others are doing enough to protect people’s privacy. Drivers
may welcome the use of information to relay helpful diagnostic
information or updates on nearby traffic jams. But they do not
necessarily endorse other uses, and automakers have refrained
from commenting on future data collection plans and policies.
Automakers argue that the data are valuable for improving
vehicle performance and vehicle safety and soon will be able to
reduce traffic accidents and fatalities. Amassing detailed data
about human driving behavior is also essential for the
development of self-driving cars. But privacy experts believe
the practice is dangerous. With enough data about driver
behavior, individual profiles as unique as fingerprints could be
developed. Trips to businesses reveal buying habits and
relationships that could be valuable to corporations, government
agencies, or law enforcement. For example, frequent visits to a
liquor store or mental health clinic could reveal information
about someone’s drinking habits or health problems. People
obviously would not want such confidential data shared with
others.
Sources: Peter Holley, “Big Brother on Wheels: Why Your Car
Company May Know More About You Than Your Spouse.”
Washington Post, January 15, 2018; Christina Rogers, “What
Your Car Knows about You,” Wall Street Journal, August 18,
2018; John R. Quain, “Cars Suck Up Data About You. Where
Does It All Go?” New York Times, July 27, 2017; and Russ
Heaps, “Data Collection for Self-Driving Cars Could Be
Risking Your Privacy,” Autotrader, September 2016.
The challenges that connected vehicles and big data pose to
privacy, described in the chapter-opening case, show that
technology can be a double-edged sword. It can be the source of
many benefits, including the capability to make driving safer
and more efficient. At the same time, digital technology creates
new opportunities for invading privacy and using information
that could cause harm.
The chapter-opening diagram calls attention to important points
this case and this chapter raise. Developments in data
management technology, the Internet of Things (IoT), and
analytics have created opportunities for organizations to use big
data to improve operations and decision making. Big data
analytics are now being applied to all the data generated by
motor vehicles, especially those with Internet connections. The
auto makers and other organizations described here are
benefiting from using big data to monitor vehicle performance
and driver behavior and to provide drivers with helpful tools for
driving safely and caring for their cars. However, the use of big
data from motor vehicles is also taking benefits away from
individuals. Individuals might be subject to job discrimination
or higher insurance rates because organizations have new tools
to assemble and analyze huge quantities of data about their
driving behavior. There are very few privacy protections for all
the personal data gathered from car driving. New privacy
protection laws and policies need to be developed to keep up
with the technologies for assembling and analyzing big data.
This case illustrates an ethical dilemma because it shows two
sets of interests at work, the interests of organizations that have
raised profits or even helped many people with the data
generated by connected vehicles and those who fervently
believe that businesses and public organizations should not use
big data analysis to invade privacy or harm individuals. As a
manager, you will need to be sensitive to both the positive and
negative impacts of information systems for your firm,
employees, and customers. You will need to learn how to
resolve ethical dilemmas involving information systems.
Chapter 2
Data Changes How NFL Teams Play the Game and How Fans
See It
All professional sports teams today collect detailed data on
player and team performance, fan behavior, and sales, and
increasingly use these data to drive decisions about every aspect
of the business—marketing, ticketing, player evaluation, and
TV and digital media deals. This includes the National Football
League (NFL), which is increasingly turning to data to improve
how its players and teams perform and how fans experience the
game.
Since 2014 the NFL has been capturing player movement data
on the field by putting nickel-sized radio frequency
identification (RFID) tags beneath players’ shoulder pads to
track every move they make. The information the sensors gather
is used by NFL teams to improve their training and strategy, by
commentators on live game broadcasts, and by fans attending
games or using the NFL app on the Xbox One.
The NFL’s player tracking system is based on the Zebra Sports
Solution
developed by Zebra Technologies, a Chicago-based firm
specializing in tracking technology that includes the bar codes
on groceries and other consumer goods and radio frequency
identification (RFID) technology. The Zebra Sports

More Related Content

More from shericehewat

You have been asked to explain the differences between certain categ.docx
You have been asked to explain the differences between certain categ.docxYou have been asked to explain the differences between certain categ.docx
You have been asked to explain the differences between certain categ.docxshericehewat
 
You have been asked to help secure the information system and users .docx
You have been asked to help secure the information system and users .docxYou have been asked to help secure the information system and users .docx
You have been asked to help secure the information system and users .docxshericehewat
 
You have been asked to participate in a local radio program to add.docx
You have been asked to participate in a local radio program to add.docxYou have been asked to participate in a local radio program to add.docx
You have been asked to participate in a local radio program to add.docxshericehewat
 
You have been hired asa cons.docx
You have been hired asa cons.docxYou have been hired asa cons.docx
You have been hired asa cons.docxshericehewat
 
You have been appointed as a system analyst in the IT department of .docx
You have been appointed as a system analyst in the IT department of .docxYou have been appointed as a system analyst in the IT department of .docx
You have been appointed as a system analyst in the IT department of .docxshericehewat
 
You choose one and I will upload the materials for u.Choose 1 of.docx
You choose one and I will upload the materials for u.Choose 1 of.docxYou choose one and I will upload the materials for u.Choose 1 of.docx
You choose one and I will upload the materials for u.Choose 1 of.docxshericehewat
 
You are Incident Commander and principal planner for the DRNC even.docx
You are Incident Commander and principal planner for the DRNC even.docxYou are Incident Commander and principal planner for the DRNC even.docx
You are Incident Commander and principal planner for the DRNC even.docxshericehewat
 
You DecideCryptographic Tunneling and the OSI ModelWrite a p.docx
You DecideCryptographic Tunneling and the OSI ModelWrite a p.docxYou DecideCryptographic Tunneling and the OSI ModelWrite a p.docx
You DecideCryptographic Tunneling and the OSI ModelWrite a p.docxshericehewat
 
You are working as a behavioral health specialist in a neurological .docx
You are working as a behavioral health specialist in a neurological .docxYou are working as a behavioral health specialist in a neurological .docx
You are working as a behavioral health specialist in a neurological .docxshericehewat
 
You are to write up a reflection (longer than 2 pages) that discusse.docx
You are to write up a reflection (longer than 2 pages) that discusse.docxYou are to write up a reflection (longer than 2 pages) that discusse.docx
You are to write up a reflection (longer than 2 pages) that discusse.docxshericehewat
 
You can only take this assignment if you have the book Discovering t.docx
You can only take this assignment if you have the book Discovering t.docxYou can only take this assignment if you have the book Discovering t.docx
You can only take this assignment if you have the book Discovering t.docxshericehewat
 
You are to interview a woman 50 and older and write up the interview.docx
You are to interview a woman 50 and older and write up the interview.docxYou are to interview a woman 50 and older and write up the interview.docx
You are to interview a woman 50 and older and write up the interview.docxshericehewat
 
You are to complete TWO essays and answer the following questions.  .docx
You are to complete TWO essays and answer the following questions.  .docxYou are to complete TWO essays and answer the following questions.  .docx
You are to complete TWO essays and answer the following questions.  .docxshericehewat
 
You are the vice president of a human resources department and Susan.docx
You are the vice president of a human resources department and Susan.docxYou are the vice president of a human resources department and Susan.docx
You are the vice president of a human resources department and Susan.docxshericehewat
 
You are the purchasing manager of a company that has relationships w.docx
You are the purchasing manager of a company that has relationships w.docxYou are the purchasing manager of a company that has relationships w.docx
You are the purchasing manager of a company that has relationships w.docxshericehewat
 
You are to briefly describe how the Bible is related to the topics c.docx
You are to briefly describe how the Bible is related to the topics c.docxYou are to briefly describe how the Bible is related to the topics c.docx
You are to briefly describe how the Bible is related to the topics c.docxshericehewat
 
You are the manager of an accounting department and would like to hi.docx
You are the manager of an accounting department and would like to hi.docxYou are the manager of an accounting department and would like to hi.docx
You are the manager of an accounting department and would like to hi.docxshericehewat
 
You are the new chief financial officer (CFO) hired by a company. .docx
You are the new chief financial officer (CFO) hired by a company. .docxYou are the new chief financial officer (CFO) hired by a company. .docx
You are the new chief financial officer (CFO) hired by a company. .docxshericehewat
 
You are the manager of a team of six proposal-writing professionals..docx
You are the manager of a team of six proposal-writing professionals..docxYou are the manager of a team of six proposal-writing professionals..docx
You are the manager of a team of six proposal-writing professionals..docxshericehewat
 
You are the environmental compliance officer at a company that is .docx
You are the environmental compliance officer at a company that is .docxYou are the environmental compliance officer at a company that is .docx
You are the environmental compliance officer at a company that is .docxshericehewat
 

More from shericehewat (20)

You have been asked to explain the differences between certain categ.docx
You have been asked to explain the differences between certain categ.docxYou have been asked to explain the differences between certain categ.docx
You have been asked to explain the differences between certain categ.docx
 
You have been asked to help secure the information system and users .docx
You have been asked to help secure the information system and users .docxYou have been asked to help secure the information system and users .docx
You have been asked to help secure the information system and users .docx
 
You have been asked to participate in a local radio program to add.docx
You have been asked to participate in a local radio program to add.docxYou have been asked to participate in a local radio program to add.docx
You have been asked to participate in a local radio program to add.docx
 
You have been hired asa cons.docx
You have been hired asa cons.docxYou have been hired asa cons.docx
You have been hired asa cons.docx
 
You have been appointed as a system analyst in the IT department of .docx
You have been appointed as a system analyst in the IT department of .docxYou have been appointed as a system analyst in the IT department of .docx
You have been appointed as a system analyst in the IT department of .docx
 
You choose one and I will upload the materials for u.Choose 1 of.docx
You choose one and I will upload the materials for u.Choose 1 of.docxYou choose one and I will upload the materials for u.Choose 1 of.docx
You choose one and I will upload the materials for u.Choose 1 of.docx
 
You are Incident Commander and principal planner for the DRNC even.docx
You are Incident Commander and principal planner for the DRNC even.docxYou are Incident Commander and principal planner for the DRNC even.docx
You are Incident Commander and principal planner for the DRNC even.docx
 
You DecideCryptographic Tunneling and the OSI ModelWrite a p.docx
You DecideCryptographic Tunneling and the OSI ModelWrite a p.docxYou DecideCryptographic Tunneling and the OSI ModelWrite a p.docx
You DecideCryptographic Tunneling and the OSI ModelWrite a p.docx
 
You are working as a behavioral health specialist in a neurological .docx
You are working as a behavioral health specialist in a neurological .docxYou are working as a behavioral health specialist in a neurological .docx
You are working as a behavioral health specialist in a neurological .docx
 
You are to write up a reflection (longer than 2 pages) that discusse.docx
You are to write up a reflection (longer than 2 pages) that discusse.docxYou are to write up a reflection (longer than 2 pages) that discusse.docx
You are to write up a reflection (longer than 2 pages) that discusse.docx
 
You can only take this assignment if you have the book Discovering t.docx
You can only take this assignment if you have the book Discovering t.docxYou can only take this assignment if you have the book Discovering t.docx
You can only take this assignment if you have the book Discovering t.docx
 
You are to interview a woman 50 and older and write up the interview.docx
You are to interview a woman 50 and older and write up the interview.docxYou are to interview a woman 50 and older and write up the interview.docx
You are to interview a woman 50 and older and write up the interview.docx
 
You are to complete TWO essays and answer the following questions.  .docx
You are to complete TWO essays and answer the following questions.  .docxYou are to complete TWO essays and answer the following questions.  .docx
You are to complete TWO essays and answer the following questions.  .docx
 
You are the vice president of a human resources department and Susan.docx
You are the vice president of a human resources department and Susan.docxYou are the vice president of a human resources department and Susan.docx
You are the vice president of a human resources department and Susan.docx
 
You are the purchasing manager of a company that has relationships w.docx
You are the purchasing manager of a company that has relationships w.docxYou are the purchasing manager of a company that has relationships w.docx
You are the purchasing manager of a company that has relationships w.docx
 
You are to briefly describe how the Bible is related to the topics c.docx
You are to briefly describe how the Bible is related to the topics c.docxYou are to briefly describe how the Bible is related to the topics c.docx
You are to briefly describe how the Bible is related to the topics c.docx
 
You are the manager of an accounting department and would like to hi.docx
You are the manager of an accounting department and would like to hi.docxYou are the manager of an accounting department and would like to hi.docx
You are the manager of an accounting department and would like to hi.docx
 
You are the new chief financial officer (CFO) hired by a company. .docx
You are the new chief financial officer (CFO) hired by a company. .docxYou are the new chief financial officer (CFO) hired by a company. .docx
You are the new chief financial officer (CFO) hired by a company. .docx
 
You are the manager of a team of six proposal-writing professionals..docx
You are the manager of a team of six proposal-writing professionals..docxYou are the manager of a team of six proposal-writing professionals..docx
You are the manager of a team of six proposal-writing professionals..docx
 
You are the environmental compliance officer at a company that is .docx
You are the environmental compliance officer at a company that is .docxYou are the environmental compliance officer at a company that is .docx
You are the environmental compliance officer at a company that is .docx
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 

Recently uploaded (20)

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 

Fordham University Chapter Title Transpacific Entang.docx

  • 1. Fordham University Chapter Title: Transpacific Entanglements Chapter Author(s): Yên Lê Espiritu, Lisa Lowe and Lisa Yoneyama Book Title: Flashpoints for Asian American Studies Book Editor(s): Cathy J. Schlund-Vials Published by: Fordham University. (2018) Stable URL: https://www.jstor.org/stable/j.ctt1xhr6h7.13 JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms of scholarship. For more information about JSTOR, please contact [email protected] Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at https://about.jstor.org/terms Fordham University is collaborating with JSTOR to digitize, preserve and extend access to Flashpoints for Asian American Studies
  • 2. This content downloaded from 169.237.45.17 on Fri, 20 Dec 2019 23:01:49 UTC All use subject to https://about.jstor.org/terms P a r t I I I Remapping Asia, Recalibrating Asian Amer i ca This content downloaded from 169.237.45.17 on Fri, 20 Dec 2019 23:01:49 UTC All use subject to https://about.jstor.org/terms This content downloaded from 169.237.45.17 on Fri, 20 Dec 2019 23:01:49 UTC All use subject to https://about.jstor.org/terms 175 In our collaborative contribution, we examine the geopo liti cal, military, and epistemological entanglements between U.S. wars in Asia, U.S. racial capitalism, and U.S. empire and argue that U.S. empire and militarism in Asia and the Pacific Islands have been critical, yet underrecognized, parts of the genealogy of the con temporary condition of U.S. neoliberalism. We emphasize that U.S. neoliberalism mediates itself through the
  • 3. U.S. national security state, which is si mul ta neously a racial state and a settler state; this is expressed not merely in the racialization of Asian and Pacific Islander peoples but significantly in the erasure of historical and ongoing settler colonialism and, furthermore, in a racial social order that si mul ta neously pronounces antiblackness and Islamophobia. In our elaboration of “trans- pacific entanglements,” historical and ongoing settler logics of invasion, re- moval, and seizure continuously articulate with other forms of appropriation and subjugation: This U.S. settler logic intersects with racialized capitalism and overseas empire asserts itself— often through the collaborative networks of the U.S.- backed, patriarchally or ga nized, subimperial Asian “client- states”—in transpacific arrangements such as: export pro cessing zones in the Philippines, U.S. military bases in Okinawa and Guam, nuclear test sites C h a p t e r 1 0 Transpacific Entanglements Yên Lê Espiritu, Lisa Lowe, and Lisa Yoneyama This content downloaded from 169.237.45.17 on Fri, 20 Dec 2019 23:01:49 UTC All use subject to https://about.jstor.org/terms
  • 4. 176 Yên Lê Espiritu, Lisa Lowe, and Lisa Yoneyama in the Marshall Islands, the exportation of nuclear power plants through- out Asia, the partition of Korea, and the joint military operations that demonstrate and secure the empire’s reach. In this way, we conceptualize U.S. empire in Asia and the Pacific Islands as at once a settler- colonial formation, a racial and sexualized cap i tal ist formation, and a military proj- ect that permits overseas dominance, appropriation, and exploitation. Em- pire works si mul ta neously, yet differentially, to naturalize U.S. presence and possession in Asia and the Pacific Islands through the imperatives of national security and war time necessity, to racialize the peoples it captures, occupies, kills, and governs, and to disavow the historical and ongoing dispossessions of Indigenous peoples. In Immigrant Acts: On Asian American Cultural Politics, Lisa Lowe situated racialized Asian immigrant labor within the history of U.S. capitalism, expanding its global reach through wars in Asia; she noted that U.S. im- migration exclusion acts and naturalization laws managed and produced Asian American racial formation through both exclusion and inclusion in
  • 5. relation to the history of U.S. wars in Asia. As Yên Lê Espiritu has argued in her recent book Body Counts: The Vietnam War and Militarized Refuge(es), and Lisa Yoneyama makes evident in Cold War Ruins: Transpacific Critique of American Justice and Japa nese War Crimes, American exceptionalism has rationalized U.S. military and cap i tal ist interventions in Asia and the Pa- cific Islands as necessary for the “national security” of the United States and for the humanitarian “rescue” of Asian peoples. The global portrait of the United States as triumphant and humanitarian liberator of Asia, and to a similar extent the Pacific Islands, has buttressed the military buildup against a broad range of Amer i ca’s “enemies,” variously named in twentieth- century history as “fascists” during the Second World War, “underdevel- opment” in the U.S.- modeled modernization proj ects of postcolonial third world countries, “communists” in the Cold War, and “terrorists” in the War on Terror. These links indicate that U.S. militarism and empire in Asia and the Pacific Islands displaces and racializes Asian and Pacific mi- grants and refugees and that the discourse of the United States as libera- tor of Asia is employed in turn to explain the necessary expansion of militarism in the Philippines, Guam, Hawaii, Okinawa, Korea, and Viet-
  • 6. nam and to justify the current wars in Iraq, Af ghan i stan, Syria, and else- where. In that pro cess, moreover, the settler logic of U.S. imperial nation and its “military- security- academic” regime si mul ta neously discipline and regulate the class, race, sexual, and other uneven social relations and iden- tities within and along the national border of the U.S. mainland. It is im- perative, therefore, that any attempts at transforming the American pres ent This content downloaded from 169.237.45.17 on Fri, 20 Dec 2019 23:01:49 UTC All use subject to https://about.jstor.org/terms Transpacific Entanglements 177 must take into account the geohistorical ramifications of U.S. settler colo- nialism and its ties to specific transpacific conditions in Asia and the Pacific Islands. At this moment of reinvigorated U.S. imperialism and globalized mili- tarization, we suggest it is impor tant to interrogate anew the public recol- lections of the U.S. war in Vietnam. By most accounts, Vietnam was the site of one of the most brutal and destructive wars between Western im- perial powers and the people of Asia, Africa, and Latin Amer i
  • 7. ca. U.S. mil- itary policies cost Vietnam at least three million lives, the maiming of countless bodies, the poisoning of its water, land, and air, the razing of its countryside, and the devastation of most of its infrastructure. Indeed, more explosives were dropped on Vietnam, a country two- thirds the size of California, than in all of World War II. Yet post-1975 public discussions of the Vietnam War in the United States often skip over this devastating his- tory. This “skipping over” of the Vietnam War constitutes an or ga nized and strategic forgetting of a controversial and unsuccessful war, enabling Americans to continue to push military intervention as key in Amer i ca’s self- appointed role as liberators— protectors of democracy, liberty, and equality, both at home and abroad. As a controversial and unsuccessful war, the Vietnam War has the po- tential to unsettle the master narratives of “rescue and liberation” and re- focus attention on the troubling rec ord of U.S. military aggression. And yet, as demonstrated by the recent wars in West and South Asia, the U.S. loss in Vietnam has not curbed the United States’ crusade to remake the world by military force. Instead, the United States appears to have been able to fold the Vietnam War into its list of “good wars.” The
  • 8. narrative of the “good refugee,” deployed by the larger U.S. society and by Viet nam- ese Americans themselves, has been crucial in enabling the United States to turn the Vietnam War into a good war. Other wise absent in U.S. pub- lic discussions of Vietnam, Viet nam ese refugees become most vis i ble and intelligible to Americans as successful, assimilated, and anticommunist newcomers to the American “melting pot.” Represented as the grateful beneficiary of U.S.- style freedom, Viet nam ese in the United States be- come the featured evidence of the appropriateness of the U.S. war in Vietnam: that the war, no matter the cost, was ultimately necessary, just, and successful. Having been deployed to “rescue” the Vietnam War for Americans, Viet nam ese refugees thus constitute a solution rather than a prob lem for the United States, as often argued. The good war narrative requires the production not only of the good refugee but also of the United States as the good refuge. The making of This content downloaded from 169.237.45.17 on Fri, 20 Dec 2019 23:01:49 UTC All use subject to https://about.jstor.org/terms
  • 9. 178 Yên Lê Espiritu, Lisa Lowe, and Lisa Yoneyama the “good refuge” was launched in April 1975 as U.S. media and officials extolled and sensationalized the U.S. airlifting of approximately 130,000 Viet nam ese out of the city in the final days before the Fall of Saigon and subsequently encamping the refugees at military bases throughout the Pacific archipelago. With the Defense Department coordinating transpor- tation and the Joint Chiefs of Staff- Pacific Command in charge of the military moves necessary for the evacuation, Viet nam ese were airlifted from Saigon on U.S. military aircrafts, transferred to U.S. military bases on (neo)colonized spaces such as the Philippines, Guam, Wake Island, and Hawaii, and delivered to yet another set of military bases throughout the United States: Camp Pendleton in California, Fort Chaffee in Arkansas, Eglin Air Force Base in Florida, or Fort Indiantown Gap in Pennsylvania. While these efforts have been widely covered by the media and scholars alike as “rescuing missions,” we need to expose them instead as colonial and militarized ventures. Moving from one U.S. military base to another, Viet nam ese refugees witnessed firsthand the reach of the U.S. empire in the Asia- Pacific region.
  • 10. Far from confirming U.S. benevolence, the U.S. evacuation of Viet nam ese refugees made vis i ble the legacy of U.S. colonial and military expansion into the Asia Pacific region. The fact that the majority of the first- wave refugees were routed through the Philippines and Guam revealed the lay- ering of U.S. past colonial and ongoing militarization practices on these islands. It was the region’s (neo)colonial dependence on the United States that turned the Philippines and Guam, U.S. former and current colonial territories respectively, into the “ideal” receiving centers of the U.S. res- cuing proj ect; and it was the enormity of the U.S. military buildup in the Pacific that uniquely equipped U.S. bases there to handle the large- scale refugee rescue operation. As such, U.S. evacuation efforts were not a slap- dash response to an emergency situation that arose in Vietnam in 1975 but rather part and parcel of the long- standing militarized histories and cir- cuits that connected Vietnam, the Philippines, and Guam, dating back to 1898. The U.S. initial designation of Clark Air Force Base as a refugee stag- ing point was intimately linked to, and a direct outcome of, U.S. colonial subordination and militarization of the Philippines. Soon after, when
  • 11. President Ferdinand Marcos refused to accept any more Viet nam ese refu- gees, U.S. officials moved the premier refugee staging area from the Phil- ippines to Guam. As an unincorporated or ga nized territory of the United States under the jurisdiction of the Department of the Interior, Guam— specifically, its U.S. air and naval bases, which took up one- third of the This content downloaded from 169.237.45.17 on Fri, 20 Dec 2019 23:01:49 UTC All use subject to https://about.jstor.org/terms Transpacific Entanglements 179 island— became the “logical” transit camps for the pro cessing of evacuees. With total land area of about two hundred square miles, and meager local resources, Guam was hardly an ideal location for the large- scale refugee operation. That it became the major refugee staging point in the Pacific had more to do with the U.S. militarization of Guam than with U.S. hu- manitarianism. The U.S. decision to designate Guam the primary staging ground for refugees, even when the island’s resources were severely stretched and its inhabitants adversely affected, repeats the long- standing belief that indigenous land is essentially “empty land”— that is,
  • 12. land empty of its Indigenous population. The refugee situation on Guam thus bespeaks the intertwined histories of U.S. settler colonialism and U.S. military co- lonialism on Guam and its war in Vietnam: It was the militarization of the colonized island and its Indigenous inhabitants that turned Guam into an “ideal” dumping ground for the unwanted Viet nam ese refugees, the dis- cards of U.S. war in Vietnam. At the same time, as Jana Lipman argues, the refugee presence bore witness not only to the tenacity but also to the limits of U.S. empire, critically juxtaposing “the United States’ nineteenth- century imperial proj ect with its failed Cold War objectives in Southeast Asia.”1 From Guam, many Viet nam ese refugees journeyed to Marine Corps Base Camp Pendleton, a 125,000- acre amphibious training base on the Southern California coast, in San Diego County. It was here, at a military base, that the largest Viet nam ese population outside of Vietnam got its start in the United States. Like Clark and Andersen Air Force Bases, Camp Pendleton emerged out of a history of conquest: It is located in the tradi- tional territory of the Juaneño, Luiseño, and Kumeyaay Tribes, which had been “discovered” by Spanish padres and voyagers who traveled
  • 13. to South- ern California in the late eigh teenth century, “owned” by unscrupulous Anglo- American settlers for about a century as the California state legis- lature repeatedly blocked federal ratification of treaties with Native com- munities, and ultimately “acquired” by the U.S. Marine Corps in 1942 in order to establish a West Coast base for combat training of Marines. Camp Pendleton’s prized land— its varied topography, which combines a breath- takingly beautiful seventeen- mile shoreline and diverse maneuver areas, making it ideal for combat training environment—is thus what Richard Carrico called “stolen land,” an occupied territory like Guam.2 The material and ideological conversion of U.S. military bases into a place of refuge— a place that resolves the refugee crisis, promising peace and protection— discursively transformed the United States from violent aggressors in Vietnam to benevolent rescuers of its people. This “make over” This content downloaded from 169.237.45.17 on Fri, 20 Dec 2019 23:01:49 UTC All use subject to https://about.jstor.org/terms 180 Yên Lê Espiritu, Lisa Lowe, and Lisa Yoneyama
  • 14. obscures the violent roles that these military bases— these purported places of refuge— played in the Vietnam War, which spurred the refugee exodus in the first place; the construction of military bases as “refuges” also ob- scures the historical and ongoing settler- colonial occupation of indigenous land, as well as the dispossession and displacement of Indigenous peoples. In the Philippines, from 1965 to 1975, Clark Air Force Base, as the largest overseas U.S. military base in the world, became the major staging base for U.S. involvement in Southeast Asia, providing crucial logistical sup- port for the Vietnam War. In Guam, Andersen Air Force Base played a “legendary” role in the Vietnam War, launching devastating bombing mis- sions over North and South Vietnam for close to a de cade. As Robert Rogers documents, Andersen rapidly became the United States’ largest base for B-52 bombers. In 1972, Andersen was the site of the most massive buildup of airpower in history, with more than fifteen thousand crews and over 150 B-52s lining all available flight line space— about five miles long. At its peak, Andersen housed about 165 B-52s.3 The U.S. air war, launched from Guam, decisively disrupted life on the island, underscoring once again the total disregard for the island’s Indigenous inhabitants. Fi nally,
  • 15. as the Department of Defense’s busiest training installation, California’s Camp Pendleton, the refugees’ first home in the United States, trains more than 40,000 active- duty and 26,000 reserve military personnel each year for combat. Camp Pendleton is also the home base of the illustrious 1st Ma- rine Regiment, whose battalions participated in some of the most fero- cious battles of the war. As such, the Pacific military bases, Clark and Andersen Air Force Bases, and California’s Marine Corps Base Camp Pendleton, credited and valorized for resettling Viet nam ese refugees in 1975, were the very ones responsible for inducing the refugee displacement. The massive tonnage of bombs, along with the ground fighting provided by Marine units like the Camp Pendleton’s 1st Marines, displaced some twelve million people in South Vietnam— almost half the country’s total population at the time— from their homes. The transvaluation of U.S. military and colonial vio lence into a benev- olent act of rescue, liberation, and rehabilitation finds even deeper geneal- ogy in the racialized constitution of U.S. modernity, humanism, and liberalism, all of which continue to shore up what Richard H. Immerman called the “empire for liberty,” or what Oscar V. Campomanes, following
  • 16. William Appleman Williams, in a similar sense called the “anticolonial empire.”4 Williams famously characterized the United States’ Open Door Policy since the nineteenth century as “Amer i ca’s version of the liberal pol- icy of informal empire or free trade imperialism,” which was at the same This content downloaded from 169.237.45.17 on Fri, 20 Dec 2019 23:01:49 UTC All use subject to https://about.jstor.org/terms Transpacific Entanglements 181 time driven by “the benevolent American desire to reform the world in its own image.”5 In other words, the United States developed as a colonizing empire even as it disavowed its histories of colonialism and military take- over through the liberal tenets of freedom, consensus, private property, and self- determination. After the Second World War, the genealogy of liberal empire culminated in the Cold War ascendancy of the United States as a leader of the free world who claimed to have replaced the nineteenth- century colonial order in Asia and the Pacific Islands. The American image of itself as the benevolent liberator and reformer of the people and land it subjugates is sustained by the
  • 17. discursive force of liberal humanism and humanitarianism for which the notion of “debt” is the operative term. In tracking the emergence of new relations of subju- gation around the idea of freedom in the U.S. post- Reconstruction era, Saidiya V. Hartman argues that the trope of debt was deployed to bind the newly emancipated enslaved peoples to a new system of bondage and in- dentureship. Hartman writes: “Emancipation instituted indebtedness. . . . The emancipated were introduced to the cir cuits of exchange through the figurative deployment of debt. . . . The transition from slavery to freedom introduced the free agent to the cir cuits of exchange through this construc- tion of already accrued debt, an abstinent pres ent, and a mortgaged future. In short, to be free was to be a debtor— that is, obliged and duty- bound to others.”6 Though firmly situated in the specific geohistorical con- text of the failure of American Reconstruction, Hartman’s observation of the “figurative deployment of debt” lays out the constitutive contradiction of post- Enlightenment humanism, helping us understand how the Ameri- can notions of freedom, emancipation, liberty, and property owner ship have developed by producing as well as disciplining modernity’s others. This contradiction fundamental to the modern ideals of liberty
  • 18. and freed subjects underpins what we also consider to function as the American myth of rescue, liberation, and rehabilitation, a discursive economy of geopoli- tics that consolidated the racialized and heterosexualized logic of subjuga- tion and bondage in the U.S. relationship to Asia throughout the twentieth century. The American myth of rescue, liberation, and rehabilitation then leaves the indelible marks on the liberated of inferiority, subordination, and be- latedness (to freedom, democracy, and property) but also of indebtedness. It assigns “the already accrued debt” to the liberated. Once marked as “the liberated” and therefore “the indebted,” one cannot easily enter into a re- ciprocal relationship with the liberators. This myth, which pres ents both vio lence and liberation as “gifts for the liberated,” has serious implications This content downloaded from 169.237.45.17 on Fri, 20 Dec 2019 23:01:49 UTC All use subject to https://about.jstor.org/terms 182 Yên Lê Espiritu, Lisa Lowe, and Lisa Yoneyama for the redressability of U.S. military vio lence, as Yoneyama observes of
  • 19. the American aggression in the Iraq War.7 According to this myth, the losses and damages brought on by U.S. military vio lence are deemed “pre- paid debts” incurred by those liberated by American intervention. The injured and violated bodies of the liberated do not seem to require redress according to this discourse of indebtedness, for their liberation has already served as the payment/reparation that supposedly precedes the vio lence inflicted upon them. Furthermore, American myths of rescue, liberation, and rehabilitation have seriously threatened the way that postcolonial sov- ereignty might be conceived. As Chungmoo Choi notes, the dominant historiography of U.S.- Korea relations posits the post– World War II “liberation as a gift of the allied forces, especially of U.S.A.”8 This dele- gitimized the agency of Koreans in nation- building in the aftermath of Japa nese colonial rule, which was followed immediately by the Korean War— the “forgotten” war that consolidated the military- securit y- industrial- academic complex— and the ongoing Cold War partition. Mimi Nguyen similarly discusses how the U.S. “gift of freedom” to refugees of the war in Vietnam, imposes indebtedness while binding them to the colonial histories that deemed them “unfree.”9
  • 20. The predicament of U.S. bases in Okinawa urgently demonstrates the intersection of the settler logic of invasion, removal, and seizure and the American imperialist myth of rescue, liberation, and rehabilitation. As a number of critics remind us, there is not one piece of land in Okinawa’s main island that was willingly offered to the U.S. military for use. And yet, under the U.S.- Japan Security Treaty, 75 percent of the entire U.S. base facilities in Japan is accommodated in Okinawa prefecture, which consti- tutes less than 1 percent of Japa nese soil. Okinawa’s subjection to Japan began in the seventeenth century when the Ryukyu kingdom came under the rule of the Shimazu domain, followed by its integration as a prefecture into the modern Meiji state that was then emerging into the nineteenth century international and interimperial order. After the Second World War, the United States “liberated” Okinawa from the many centuries of Japa nese rule. At the same time, the United States insisted on the posses- sion of Okinawa in exchange for the heavy American military sacrifice in the Pacific battlefronts. Okinawa thus remained under U.S. military oc- cupation for nearly three de cades, until its “reversion” to Japan (1945– 1972). During the occupation, the United States formally recognized
  • 21. Japan’s “residual sovereignty” over Okinawa, thereby pre- empting any Okinawan Indigenous claim to local sovereignty. It also insisted that the United States would maintain control over Okinawa until its eventual This content downloaded from 169.237.45.17 on Fri, 20 Dec 2019 23:01:49 UTC All use subject to https://about.jstor.org/terms Transpacific Entanglements 183 approval as a U.N. trusteeship under U.S. authority. As Toriyama Atsushi points out, the two concepts, “residual sovereignty” and “pending” trustee- ship, allowed the United States’ exclusive management of Okinawa while at the same time helped to contain the Indigenous demands for self- determination and Okinawa’s in de pen dence. What is impor tant to our discussion is that the American recognition of Japan’s “residual sover- eignty” rationalized the United States’ de facto control over the Okinawan land, the ocean, and the airspace, without contradicting its claims to be the supreme leader of freedom and liberty in the postcolonial world.10 The on- going settler logics of invasion, removal, and seizure thus sustains and is in turn secured by the historically rooted and still power ful
  • 22. exceptionalist discourse of the U.S. liberal empire. Yet, it is equally impor tant to remem- ber that this pro cess is far from complete. As Yoneyama argues in her ear- lier work on the politics of memory inspired by Walter Benjamin, what we hope to offer below is a method of unlearning the “universal history”— Marxist, liberal, or other wise—in such a way that would enable us to dis- cern and connect the “missed opportunities and unfulfilled promises in history, as well as unrealized events that might have led to a dif fer ent pres- ent.”11 Such a method calls upon us to link apparently separate subjects, con- texts, and issues whose connections have been rendered unavailable by existing geo graph i cal, po liti cal, and disciplinary bound aries. Although American exceptionalism, humanitarianism, and national se- curity with re spect to Asia are more often understood as discourses that address international relations, we wish to emphasize that they are critical parts of a neoliberal racial social ordering within the United States as well, which naturalizes white settlement and perpetuates assaults on Black, Muslim, and poor communities of color. In the nineteenth century until World War II, Chinese, Japa nese, Filipino, and South Asians were re-
  • 23. cruited as racialized noncitizen labor and barred from the po liti cal and cultural spheres in the development of the national economy; today, the racialization of Asian immigrants within the United States is no longer ex- clusively that of noncitizen immigrant labor. The U.S. state responded to challenges by radical social movements of the 1960s and decolonization movements worldwide with aggressive incorporative mea sures, from the 1964 Civil Rights Acts and the 1965 Immigration and Nationality Act, to the large- scale capital investment in the development and rapid “integra- tion” of Asia into global capitalism. Within these conditions, the racial- ization of Asian Americans as the model minority has been crucial to the pernicious fictions of multiculturalism and “postracial” inclusion, just as modernization discourse has in an analogous fashion “racialized” the newly This content downloaded from 169.237.45.17 on Fri, 20 Dec 2019 23:01:49 UTC All use subject to https://about.jstor.org/terms 184 Yên Lê Espiritu, Lisa Lowe, and Lisa Yoneyama industrialized Asian nations to be what Takashi Fujitani calls “model” mo- dernity nations.12 Sociologist Hijin Park discusses this
  • 24. neoliberal position- ing of the “East Asian miracle” as the discourse of “rising Asia.”13 The “rising Asia” discourse opposes newly industrialized Asia to less “devel- oped” countries in Africa, Latin Amer i ca, Central Asia; it is comple- mented by the fiction of Asian “culture” as traditionally patriarchal and heteronormative, a fiction employed, as Chandan Reddy argues, to disci- pline black, brown, and queer of color communities, as “backward” and threatening.14 These new racial formations signal forms of governance that represent “Asians” as included in both the U.S. nation and in global capitalism, even as Asian and Pacific Islander peoples are forcibly dislocated from sites in which the United States has occupied, interned, and conducted imperial war. In other words, violent exclusion from national belonging has char- acterized the historical emergence of the United States from its beginnings: justifying the dispossession of Indigenous peoples, the enslavement of Africans and Jim Crow segregation, the stolen labors of indentured and immigrant workers, and the losses of life as the United States waged wars in Latin Amer i ca, East, Northeast, and Southeast Asia, Central Asia, and West Asia. Yet within the formation we call
  • 25. “neoliberalism,” vio lence accompanies not only exclusion from the nation but also inclusion into it: as “emancipated” slave, indebted poor, grateful immigrant, or rehabilitated inmate. The vio lence of inclusion, an operation that proposes to convert subjugated others into normative humanity and multicultural citizenship, is clearly also a pro cess of racial governance. Yên Espiritu elaborates this concept as “differential inclusion,” to counter the myth of “voluntary” im- migration and to emphasize the pro cesses through which dif fer ent groups are “included” yet si mul ta neously legally subordinated, eco nom ically ex- ploited, or culturally degraded, often in relation to one another.15 The rela- tive inclusions of Asians and Pacific Islander peoples by postwar racial liberalism, which appeared to legitimize an official antiracism, provided the United States moral legitimacy as it sought to gain Cold War hege- mony against the Soviet Union.16 It built upon the fiction of the U.S. state as the guarantor of civil rights and suppressed radical challenges— from Black Power to third world decolonization movements— even as it ex- tended U.S. militarism and neoliberal capitalism globally. Con temporary neoliberalism naturalizes the market, buttresses the pri- macy of the deserving individual, and instantiates the
  • 26. superiority of the private over the public; it moreover affirms “colorblindness” that disavows the per sis tence of antiblackness, promotes a discourse of “rising Asia” that This content downloaded from 169.237.45.17 on Fri, 20 Dec 2019 23:01:49 UTC All use subject to https://about.jstor.org/terms Transpacific Entanglements 185 masks the longer history of North Atlantic empires, and it denies ongoing settler colonialism while justifying imperial war and military basing that occupies, dispossesses, and displaces Indigenous communities. Neoliber- alism erases the longer history in which “emancipation,” “ free wage labor,” and “ free trade” have enabled the development of what Cedric Robinson calls “racial capitalism”— built upon settler colonialism, slavery, indenture, and unfree immigrant labor.17 Grace Hong characterizes the current mo- ment of neoliberal restructuring as an epistemological structure of dis- avowal, a means of claiming that racial and gendered vio lence has been overcome, while disavowing the continuing assaults on inassimilable poor communities of color.18 We suggest that where many theorists of neolib-
  • 27. eralism, whether inspired by Marx, Weber, or Foucault, observe the de- fining feature of neoliberalism to be the generalization of the market logic of exchange to all spheres of human life, this definition of neoliberalism of- ten leaves unchallenged such disavowal, and we argue that the critique of neoliberalism must be nuanced in relation to the much longer histories of racial capitalism, colonialism, and militarism.19 In light of the commod- ification of human life within slavery, colonialism, as well as in con temporary global capitalism, we insist that what is currently theorized as a “new” fi- nancialization of human life under neoliberalism occurred brutally and routinely and continues to occur throughout the course of modern em- pires. Indeed, what Lowe discusses elsewhere as the “colonial division of humanity” is a signature feature of long- standing liberal modes of distinc- tion that privilege par tic u lar lives as “ human” and treat other lives as the laboring, replaceable, or disposable contexts that constitute that “human- ity.”20 In their recent work on neoliberal forms of “surrogate humanity”— whether gestational surrogacy in India, life extension through medical technologies, or the advanced automation of labor by Amazon robotics— Neda Atanasoski and Kalindi Vora argue that even “post- human” con-
  • 28. cepts and practices continue to reproduce racial, gender, and geopo liti cal hierarchies of social difference.21 The national security imperatives developed during the Cold War have been critical to the neoliberal reor ga ni za tion of the state and economy, with consequences for the domestic racial order, which involves the withdrawal of the state from its traditional purpose of social welfare to investment in the repressive arms of the U.S. state: policing, drug enforcement, immi- gration and border patrol, and prisons— all of which racialize and divide in the distribution of punishments. The privatization of traditional public “goods,” such as schooling, health care, and social securities further con- tributes to the precarity of poor communities of color, while the buildup This content downloaded from 169.237.45.17 on Fri, 20 Dec 2019 23:01:49 UTC All use subject to https://about.jstor.org/terms 186 Yên Lê Espiritu, Lisa Lowe, and Lisa Yoneyama of policing, detention, and prisons targets and suppresses U.S. black, brown, and Muslim communities. The links between U.S. militarism abroad and policing at home is nowhere more evident than in the Israeli
  • 29. training of police serving in Ferguson, Missouri, who suppressed the community pro- testing Michael Brown’s death with military surplus equipment such as aircraft, armored vehicles, assault rifles, grenades, vests, and tear gas.22 Re- becca Bohrman and Naomi Murakawa ironically term this refortification of the repressive arms of the state the “remaking big government,” while Ruth Wilson Gilmore calls this a transformation from the “welfare state” to the “warfare state.”23 The national security discourse exonerates the neoliberal state for its violent antiblackness and Islamophobia. The “Asian American” has often been made to serve as the sign that me- diates this disavowal of the racial ordering called “postraciality” or “col- orblindness,” the deployment of which governs this neoliberal restructuring of culture, society, economy, and politics. Whether expressed through Asian immigrant exclusion or inclusion, the U.S. state has produced itself as a global power through the formation of the “Asian American” as a means to resolve the contradictions of the U.S. racial capitalism and its im- perial military proj ect. Yet we wish to emphasize that for this reason, now, as before, the “Asian American” is a critical mediating figure for diagnosing racial power and geopo liti cal ordering. Rather than stabilizing
  • 30. binary categories of white/nonwhite, settler/native, or developed/underdeveloped, the “Asian American” continues still to mediate racial relationality or to triangulate these terms. Asian racial formation continues to shed light on how race is not fixed or essential but a shifting designation within what Stuart Hall terms society “structured- in- dominance.”24 Asian racial formations—as noncitizen labor, as model minority, as threatening cap i- tal ist rival— devalue Asians and mea sure and mediate geopo liti cal and na- tional transformations. In our current moment, Asianness as “model minority/model modernity” is an index of the pres ent U.S. settler racial order that reduces and dehumanizes blackness as surplus population, con- structs Indigenous peoples as extinct or vanishing, and frames Muslims as threatening vio lence. In conclusion, we conceive U.S. racial empire as an open pro cess, an unfolding of dynamic, multiple relations of rule and re sis tance. Alyosha Goldstein discusses U.S. colonialism as “a continuously failing, perpetu- ally incomplete, proj ect that labors to find a workable means of resolution to sustain its logic of possession by disavowing ongoing contestation.”25 Like Goldstein, we understand U.S. racial empire to be
  • 31. continuously fail- ing and incomplete, which suggests that its destruction, exploitation, and This content downloaded from 169.237.45.17 on Fri, 20 Dec 2019 23:01:49 UTC All use subject to https://about.jstor.org/terms Transpacific Entanglements 187 administration is never total, that its cruelty and cunning produces con- tingency and excess that we cannot entirely know or anticipate. In Body Counts, Espiritu frames the possibility of anti- imperial collaborations through critical juxtaposition, which she elaborates by interpreting the ge- ography of Viet nam ese refugee flight in 1975: The refugees were taken by military aircraft and routed through U.S. bases, from Vietnam to the Phil- ippines to Guam and then to California. This itinerary connects Viet- nam ese postwar displacement to that of settler colonialism and militarism that has dispossessed Filipino, Chamorro, and Native American peoples and gives rise to an antimilitarist association of incommensurable yet linked groups. This is what Yoneyama describes, in Cold War Ruins, as transpa- cific cultures of reckoning and redress in the face of unredressable war
  • 32. and vio lence. The related, yet often illegible, strug gles against these inter- locking formations are the pos si ble po liti cal itineraries that Lowe evokes in Intimacies as “connections that could have been, but were lost, and are thus, not yet.”26 Thus, in our piece, we take a comparative relational ap- proach and employ the method of critical juxtaposition— the deliberate bringing together of seemingly dif fer ent historical events in an effort to reveal what would other wise remain invisible—in this case, to examine the contours, contents, and limits of U.S. imperialism, wars, and genocide in the Asia- Pacific region and racialization on the U.S. mainland. We gesture toward, and call into being, what Yoneyama calls the competing “yearnings” for “justice beyond judicialization” across unlike, asymmetri- cal, yet linked terrains.27 We can and must always make “Asia” and “Asian American” signify more than American exceptionalism. Not es 1. Jana K. Lipman, “ ‘Give Us a Ship’: The Viet nam ese Repatriate Move- ment on Guam, 1975,” American Quarterly 64 (2012): 3–4 (emphasis added). 2. Richard Carrico, Strangers in a Stolen Land: Indians of San Diego County from Prehistory to the New Deal (Newcastle, Calif.: Sierra Oaks, 1987).
  • 33. 3. Robert F. Rogers, Destiny’s Landfall: A History of Guam (Honolulu: University of Hawaii Press, 1995). 4. Oscar V. Campomanes, “1898 and the Nature of the New Empire,” Radical History Review 73 (Winter 1999): 130–46. See also Richard H. Immerman, Empire for Liberty: A History of American Imperialism from Benjamin Franklin to Paul Wol fo witz (Prince ton, N.J.: Prince ton University Press, 2010). 5. William Appleman Williams, The Tragedy of American Diplomacy (Cleveland, Ohio: World Publishing, 1959), 67, 47. This content downloaded from 169.237.45.17 on Fri, 20 Dec 2019 23:01:49 UTC All use subject to https://about.jstor.org/terms 188 Yên Lê Espiritu, Lisa Lowe, and Lisa Yoneyama 6. Saidiya V. Hartman, Scenes of Subjection: Terror, Slavery, and Self- Making in Nineteenth- Century Amer i ca (Oxford: Oxford University Press, 1997), 131. 7. Lisa Yoneyama, “Traveling Memories, Contagious Justice: Ameri- canization of Japa nese War Crimes at the End of the Post- Cold War,” Journal of Asian American Studies (February 2003): 57–63. 8. Chungmoo Choi, “The Discourse of Decolonization and Popu lar
  • 34. Memory: South Korea,” Positions: East Asia Cultures Critique 1, no. 1 (1993): 80. 9. Mimi Nguyen, The Gift of Freedom: War, Debt, and Other Refugee Passages (Durham, N.C.: Duke University Press, 2014). 10. Atsushi Toriyama, “Okinawa’s ‘Postwar’: Some Observations on the Formation of American Military Bases in the Aftermath of Terrestrial Warfare,” trans. David Buist, in The Inter- Asia Cultural Studies Reader, ed. Kuan Hsing Chen and Beng H. Chua, 267–88 (London: Routledge, 2007), 273. 11. Lisa Yoneyama, Hiroshima Traces: Time, Space and the Dialectics of Memory (Berkeley: University of California Press, 1999), 19. 12. Takashi Fujitani, Race for Empire: Koreans as Japa nese and Japa nese as Americans during World War II (Berkeley: University of California Press, 2011). 13. Hijin Park, “Neoliberalizing Differential Racialization: Asian Uplift, Indigenous Death, and Blackness as Surplus,” pre sen ta tion, McMaster University, October 2012. 14. Chandan Reddy, “Asian Diasporas, Neoliberalism, and Family: Reviewing the Case for Homosexual Asylum in the Context of Family Rights,” Social Text 84–85, vol. 23, nos. 3–4 (Fall– Winter 2005): 101–19. 15. Yên Lê Espiritu, Home Bound: Filipino Lives across Cultures (Berkeley: University of California Press, 2003), 47–48.
  • 35. 16. On “racial liberalism” and the postwar incorporation of racialized minorities, see especially Jodi Melamed, Represent and Destroy: Rationalizing Vio lence in the New Racial Capitalism (Minneapolis: University of Minnesota Press, 2011). 17. Cedric Robinson, Black Marxism: The Making of the Black Radical Tradition (Chapel Hill: University of North Carolina Press, 1983). 18. Grace Kyungwon Hong, Death beyond Disavowal: The Impossible Politics of Difference (Minneapolis: University of Minnesota Press, 2015). 19. See for example, Thomas Lemke (“The Birth of Bio- politics: Michel Foucault’s Lectures at the Collège de France on Neo- liberal Governmental- ity,” Economy and Society 30, no. 2 [May 2001]: 190–207), who argues that neoliberalism is characterized by the collapse of the distinction between liberal economy and liberal governance and the withdrawal of the state in favor of the apotheosis of the economy such that neoliberal subjects are This content downloaded from 169.237.45.17 on Fri, 20 Dec 2019 23:01:49 UTC All use subject to https://about.jstor.org/terms Transpacific Entanglements 189
  • 36. controlled precisely through their “freedom.” Wendy Brown explains that neoliberalism involves “extending and disseminating market values to all institutions and social action”; “all dimensions of human life are cast in terms of a market rationality”; and the state ceases to be “the Hegelian constitutional state conceived as the universal repre sen ta tion of the people.” Wendy Brown, “Neo- liberalism and the End of Liberal Democracy,” in Edgework: Critical Essays on Knowledge and Politics (Prince ton, N.J.: Prince ton University Press, 2005), 40–41. See also David Harvey, A Brief History of Neoliberalism (Oxford: Oxford University Press, 2005). 20. Lisa Lowe, The Intimacies of Four Continents (Durham, N.C.: Duke University Press, 2015), 107. 21. Kalindi Vora and Neda Atanasoski, “Surrogate Humanity: Posthu- man Networks and the (Racialized) Obsolescence of Labor,” Catalyst: Feminism, Theory, Technoscience 1, no. 1 (2015): 1–40. 22. Kristian Davis Bailey, “The Ferguson/Palestine Connection,” Ebony, August 19, 2014, http:// www . ebony . com / news - views / the - fergusonpalestine - connection - 403; Tom Giratikanon, Alicia Parlapiano, and Jeremy White, “Mapping the Spread of the Military’s Surplus Gear,” New York Times, August 15, 2014, http:// www . nytimes . com / interactive / 2014 / 08 / 15 / us / surplus - military - equipment - map . html.
  • 37. 23. Rebecca Bohrman and Naomi Murakawa, “Remaking Big Govern- ment,” in Global Lockdown: Race, Gender, and the Prison- Industrial Complex, ed. Julia Sudbury (New York: Routledge, 2005); Ruth Wilson Gilmore, “Global- ization and U.S. Prison Growth: From Military Keynesianism to Post- Keynesian Militarism,” Race & Class 40, nos. 2–3 (1998–1999): 171–88. 24. Stuart Hall, “Race, Articulation, and Socie ties Structured in Domi- nance,” in Black British Cultural Studies, ed. Houston A. Baker and Manthia Diawara (Chicago: University of Chicago Press, 1996). 25. Alyosha Goldstein, ed., Formations of United States Colonialism (Durham, N.C.: Duke University Press, 2013), 3. 26. Lowe, Intimacies of Four Continents, 174. 27. Yoneyama, Cold War Ruins, 205. This content downloaded from 169.237.45.17 on Fri, 20 Dec 2019 23:01:49 UTC All use subject to https://about.jstor.org/terms http://www.ebony.com/news-views/the-fergusonpalestine- connection-403 http://www.ebony.com/news-views/the-fergusonpalestine- connection-403 http://www.nytimes.com/interactive/2014/08/15/us/surplus- military-equipment-map.html http://www.nytimes.com/interactive/2014/08/15/us/surplus- military-equipment-map.html
  • 38. MBA 5401, Management Information Systems 1 Course Learning Outcomes for Unit II Upon completion of this unit, students should be able to: 3. Explain how information technology systems influence organizational strategies. 3.1 Explain an organization’s ability to use information technology to achieve strategic goals. 4. Evaluate the prevailing ethical issues of information systems. 4.1 Describe how new technology trends may cause ethical dilemmas. Course/Unit Learning Outcomes Learning Activity 3.1 Unit Lesson Chapter 3, pp. 78–111, 116–118 Unit II Case Study 4.1 Unit Lesson Video: How Does Internet Surveillance Program PRISM Work?
  • 39. Video: FBI Director, Apple CEO Talk Privacy and Security Chapter 4, pp. 120–152, 157–159 Unit II Case Study Required Unit Resources Chapter 3: Information Systems, Organizations, and Strategy, pp. 78–111, 116–118 Chapter 4: Ethical and Social Issues in Information Systems, pp. 120–152, 157–159 In order to access the following resources, click the links below. CBS Evening News. (2016, February 17). FBI director, Apple CEO talk privacy and security [Video file]. Retrieved from https://www.youtube.com/watch?v=VhaRR22s- bY Transcript for FBI Director, Apple CEO Talk Privacy and Security video CBS News. (2013, June 7). How Does Internet Surveillance Program PRISM Work? [Video file]. Retrieved from https://www.youtube.com/watch?v=JR6YyYdF8ho Transcript for How Does Internet Surveillance Program PRISM Work? video Unit Lesson
  • 40. Information Systems: What This Means to Your Organization For most of us, it is not that difficult to understand certain information technology (IT) concepts. Most of us use our hardware and equipment fairly well. We know how to download apps on our smartphones. We know about the systems and applications that we use at work. We may not know all of the details or inner workings of what information flows where, but we have a good idea of how things work. If we were clueless, we would not be of much value to our organizations, would we? UNIT II STUDY GUIDE Organizations, Strategy, Ethics, and Social Issues in Information Systems https://www.youtube.com/watch?v=VhaRR22s-bY https://online.columbiasouthern.edu/bbcswebdav/xid- 119408487_1 https://www.youtube.com/watch?v=JR6YyYdF8ho https://online.columbiasouthern.edu/bbcswebdav/xid- 119408489_1 MBA 5401, Management Information Systems 2 UNIT x STUDY GUIDE Title
  • 41. Organizations and Strategy Let’s take this to a more abstract level. How would you answer this question: How is IT used toward the success of your organization? You might rattle off some reasons relating to the availability of the Internet, which allows e-mails to flow so that there is connectivity between customers and service representatives. You might say that your organization has several servers and databases that house data and a security team with security tools that ensure the safety of the data. You might mention that all the applications allow you to service your customers in faster, more efficient ways. If you are a little more tech savvy at your organization, you might even bring up more advanced topics or newer innovations, such as the ones listed below: -commerce; , Applications, and Products (SAP);
  • 42. Are the items described here IT tools? Yes, they are used to help make everyone’s lives and jobs easier, faster, more efficient, and more effective, but let’s ask the question again: How is IT used toward the success of your organization? Organizations must deal with a lot of information about every aspect of the business—from customers to vendors, employees, invoices, payments, inventory, and services. Our information systems make it possible to organize this information and keep up with it all. Business processes deal with the work that is performed in our organizations so that we can produce something of value. The performance of our business depends on how well our business processes work. Our business processes can add extreme value to our organization because they can be a competitive strength. They can also drag our value down if they are not working well for the organization. Thus, IT can work in many ways to improve our business processes by introducing better, faster, and more efficient methods of performing tasks in our business processes. Imagine how much time and money is saved if a thousand invoices are e-mailed to customers rather than being mailed via the postal mail. How much time does it take a person to stuff and stamp 1,000 envelopes? Now, if you look at how technology supports not only business processes but also management groups and functional groups, you can start to see that they link together in a way that serves to improve organizational performance.
  • 43. Value in improved performance: Organizations search every day for ways to improve their performance, production output, and transaction processing. In recent years, technology has advanced to the point that it supports enterprise-level systems, applications, networks, collaboration, and so on. There are even enterprise social networking tools now. Influence of IT on business-level strategy: Basically, a strategy addresses what needs to be accomplished. With any organization, the strategic objectives will be similar. The organizational leaders will want to be number one in their market, increase sales revenue, decrease costs, or strengthen their customer base. It is certainly not a stretch to understand that a business wants to be the best, the fastest, the most profitable, the most efficient, the most customer-friendly, and so on. You must also have a good understanding of what influences organizations. Organizations have a culture. They have politics, social structure, rules, values, norms, and people. The reality is that technology affects all aspects of organizations. For example, information systems can have a huge economic impact on an organization. IT is very costly, but the benefits can influence big increases in revenue or substantial decreases in costs. MBA 5401, Management Information Systems 3
  • 44. UNIT x STUDY GUIDE Title IT can have cultural and social impacts on organizations as well. A large technology implementation can mean a change in the mindset for many employees who are resistant to change. Imagine that you know technology implementation will increase the efficiency of operations by 50%, but this may also mean that fewer employees will be needed. Imagine that you are one of the employees whose job is at risk due to a new automation. This realization may cause a lot of doubt, uncertainty, and anxiety for employees. All of these factors play an important part in understanding the role that IT plays in organizations. For IT to be beneficial and for organizations to be successful, organizations have to have clear strategies. Organizations have to take full advantage of any competitive advantages and understand models such as Porter’s competitive forces model. Once organizational leaders understand where the business needs to be, they can set clear, actionable steps to get there. Those steps will involve technology because organizations need to have IT resources and IT capabilities. It will also involve an organization’s ability to utilize its IT resources and create value in conjunction with its other assets and resources. Finally, it is important to note that organizations have to be able to align their technologies with their business strategies and goals. It does the organization no good to have a well-defined strategy if it does not have the IT resources and capabilities to meet its goals. On the other hand, if the organization does not have a well-
  • 45. defined strategy that is appropriate for the business, IT tools will be of little help to reach meaningless goals. The following videos display the challenges to individual privacy. View the video How Does Internet Surveillance Program PRISM Work? (Transcript for How Does Internet Surveillance Program PRISM Work? video). View the video FBI Director, Apple CEO Talk Privacy and Security (Transcript for FBI Director, Apple CEO Talk Privacy and Security video). Ethical and Social Issues in Information Systems As Laudon and Laudon (2020) note, “ethics refers to the principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behavior” (p. 124). The fact is that information systems open the door for many opportunities to make ethical choices—probably as many, if not more, than any other area in business. Why is this statement true? Think about it. IT professionals will likely have access to information more than anyone else in the organization. Information such as employee information, customer information, and sales transactions are stored in database tables. A human resources (HR) representative will have access to employee information. A salesperson or customer service representative will have access to sales information or basic customer information. An accounts receivable person will have access to customers’ financial information.
  • 46. Some IT professionals will have access to all information. Additionally, many organizations have personal usage rules regarding the personal use of company website, Internet, and e-mail assets. This usually means that organizations will have applications that log usage into databases. Most of the time, employees’ actual e- mail text is stored as well. Managers can request reports if they feel an employee is abusing the usage rules, but who has access to the data at any given time? Some IT professionals will. Who should have access to this information? Can you imagine what would happen if anyone could access all of this information? Imagine the unethical, disgruntled employee who was passed over for a promotion accessing the web logs and seeing that the newly promoted coworker who is married has been researching dating websites. There is a lot of trust placed in IT professionals to house and manage all kinds of sensitive information and not abuse it themselves. This is where the basics of ethics for IT professionals starts. Even within IT, there are access controls that limit what can be done to the data. In other words, most IT professionals could not delete their web logs. This is all a part of having good security policies, which we will discuss later. https://www.youtube.com/watch?v=JR6YyYdF8ho https://online.columbiasouthern.edu/bbcswebdav/xid- 119408489_1 https://online.columbiasouthern.edu/bbcswebdav/xid- 119408489_1 https://www.youtube.com/watch?v=VhaRR22s-bY https://online.columbiasouthern.edu/bbcswebdav/xid-
  • 47. 119408487_1 https://online.columbiasouthern.edu/bbcswebdav/xid- 119408487_1 MBA 5401, Management Information Systems 4 UNIT x STUDY GUIDE Title Even if you, as an IT professional, accidentally view confidential or sensitive information, you have to know what your ethical responsibility is with regard to that information. Should you inform management that you saw that information? Another example might be knowing the company’s financial information. It is unethical and potentially illegal to use that information for your own financial gain. Ethical Challenges Let’s examine how technology has advantages and disadvantages by examining the opening case in Chapter 4, “Are Cars Becoming Big Brother on Wheels?”. Technology can create new opportunities to enhance people’s lives, but it can also be a detriment to improving lives. Technology, such as the Internet, has challenged our understanding of ethical and privacy issues. Improvements in communications technology, such as high-speed broadband and globalization, have brought the topic of ethics and privacy to the forefront.
  • 48. As the scenario demonstrates, data collected by smart cars can be used by auto insurance companies to monitor the insured’s driving habits and use the data to justify increasing insurance rates. This software can monitor driver activities such as texting while driving, traveling speeds, alertness, and other driving patterns. This information can then be used by law enforcement against offenders to support traffic violation charges, especially if the driver was involved in an accident. Your driving habits can become a valuable commodity, just like your individual shopping profile is on your favorite online shopping website. Your trips to a theater, grocery store, or shopping center reveal your shopping habits and associations that are valuable to corporations, government agencies, or other entities that use the data to advertise. For example, frequent visits to a movie theater reveal information about your entertainment habits. However, frequent visits to a hospital or care facility would also reveal information about private medical data that you would not want to share with the rest of the world. Summary This unit does a great job of covering many of the ethical considerations that you may face at home and in the workplace. In the workplace, there is always more to consider, so most organizations have ethics training for this purpose. At home, individuals will need to be knowledgeable about how information is gathered and to whom that information is given.
  • 49. Reference Laudon, K. C., & Laudon, J. L. (2020). Management information systems: Managing the digital firm (16th ed.). Upper Saddle River, NJ: Pearson. Suggested Unit Resources In order to access the following resources, click the links below. To reinforce the concepts from this unit, view the Chapter 3 Presentation (PDF for Chapter 3 Presentation). To reinforce the concepts from this unit, view the Chapter 4 Presentation (PDF for Chapter 4 Presentation). The following article brings some interesting reading about ethical issues in information systems, which correlates to issues discussed in the textbook and the unit lesson. Mason, R. O. (1986). Four ethical issues of the information age. MIS Quarterly, 10(1), 5–12. Retrieved from https://libraryresources.columbiasouthern.edu/login?url=http://s earch.ebscohost.com/login.aspx?direc t=true&db=bsu&AN=4679471&site=ehost-live&scope=site https://online.columbiasouthern.edu/bbcswebdav/xid- 119408484_1
  • 50. https://online.columbiasouthern.edu/bbcswebdav/xid- 119408483_1 https://online.columbiasouthern.edu/bbcswebdav/xid- 119408486_1 https://online.columbiasouthern.edu/bbcswebdav/xid- 119408485_1 https://libraryresources.columbiasouthern.edu/login?url=http://s earch.ebscohost.com/login.aspx?direct=true&db=bsu&AN=4679 471&site=ehost-live&scope=site MBA 5401, Management Information Systems 5 UNIT x STUDY GUIDE Title The following article also brings some interesting reading about how organizational value is created through IT governance mechanisms. Wu, S. P.-J., Straub, D. W., & Liang, T.-P. (2015). How information technology governance mechanisms and strategic alignment influence organizational performance: Insights from a matched survey of business and IT managers. MIS Quarterly, 39(2), 497–519. Retrieved from https://libraryresources.columbiasouthern.edu/login?url=http://s earch.ebscohost.com/login.aspx?direc t=true&db=bsu&AN=102375761&site=ehost-live&scope=site
  • 51. Your textbook has video cases that correlate with the information being presented in the assigned chapter readings. You are encouraged to review the video cases relating to Chapter 3 below. Akamai Technologies. (2012, November 16). Akamai customer testimonial: NBA [Video file]. Retrieved from http://www.youtube.com/watch?v=OZkyz-gChnI Transcript for Akamai Customer Testimonial: NBA video CNET. (2015, February 25). What the FCC net neutrality rules will mean for Internet users [Video file]. Retrieved from https://www.youtube.com/watch?v=84r3qd19tZU Transcript for What the FCC Net Neutrality Rules Will Mean for Internet Users video Vox. (2015, February 26). The FCC’s new net neutrality rules, explained in 172 seconds [Video file]. Retrieved from https://www.youtube.com/watch?v=sBKPacCuXsw Transcript for The FCC’s New Net Neutrality Rules, Explained in 172 Seconds video You are encouraged to review the video cases relating to Chapter 4 below Consumer Reports. (2013, June 6). Setting Facebook privacy controls [Video file]. Retrieved from
  • 52. https://www.youtube.com/watch?v=IWlyut4zsko Transcript for Setting Facebook Privacy Controls video Wall Street Journal. (2012, January 25). Google, privacy and what it means for you [Video file]. Retrieved from https://www.youtube.com/watch?v=V7M_FOhXXKM Transcript for Google, Privacy and What It Means for You video https://libraryresources.columbiasouthern.edu/login?url=http://s earch.ebscohost.com/login.aspx?direct=true&db=bsu&AN=1023 75761&site=ehost-live&scope=site https://libraryresources.columbiasouthern.edu/login?url=http://s earch.ebscohost.com/login.aspx?direct=true&db=bsu&AN=1023 75761&site=ehost-live&scope=site https://libraryresources.columbiasouthern.edu/login?url=http://s earch.ebscohost.com/login.aspx?direct=true&db=bsu&AN=1023 75761&site=ehost-live&scope=site http://www.youtube.com/watch?v=OZkyz-gChnI https://online.columbiasouthern.edu/bbcswebdav/xid- 119408482_1 https://www.youtube.com/watch?v=84r3qd19tZU https://online.columbiasouthern.edu/bbcswebdav/xid- 119408492_1 https://www.youtube.com/watch?v=sBKPacCuXsw https://online.columbiasouthern.edu/bbcswebdav/xid- 119408491_1 https://www.youtube.com/watch?v=IWlyut4zsko https://online.columbiasouthern.edu/bbcswebdav/xid- 119408490_1
  • 53. https://www.youtube.com/watch?v=V7M_FOhXXKM https://online.columbiasouthern.edu/bbcswebdav/xid- 119408488_1 Instructions It is important to understand what information systems are and why they are essential for running and managing a business. It is also important to understand the different systems that support different groups or levels of management. In addition, digital technology and the Internet play a key role in executing major business processes in the enterprise. Also, it is important to understand the ethical, social, and political issues raised by information systems. The case studies below provide you with an opportunity to critically analyze events that are taking place in real-life businesses. This helps to develop your critical thinking and research skills as you research each of these scenarios. For this assignment, review four case studies—two from Chapter 1 and two from Chapter 2. Then, in an essay, evaluate the studies and respond to each of the questions below, using both critical thinking and theory as well as supporting documentation. In Chapter 1, read the case study “UPS Competes Globally with Information Technology” on pages 23–24 of the textbook. Then, answer the questions below. · How does UPS use information systems technology to achieve its strategic goals of being more efficient and customer oriented? · What would happen if the automated package tracking system was not available? · Discuss how globalization has “flattened” the world. In Chapter 2, read the case study “Data Changes How NFL
  • 54. Teams Play the Game and How Fans See It” on pages 52–53 of the textbook. The, address the prompts below. · Analyze how information systems are transforming business. · What types of systems does the NFL and its teams use? · What is the role that these systems play in improving both operations and decision-making? In Chapter 3, read the case study “Smart Products—Coming Your Way” on pages 102–103 of the textbook. Then, address the prompts below. · Explain the importance of collaboration and information sharing for businesses. · Explain what a “smart” product is, and use an example. · How do smart products increase rivalry among firms? In Chapter 4, read the case study “Are Cars Becoming Big Brother on Wheels?” on pages 121–122 of the textbook. Then, address the prompts below. · Describe how new technology trends may cause ethical dilemmas. · Discuss at least one ethical, social, and political issue raised by embedded cyber connections in cars. · Discuss how big data analytics are being applied to all of the data generated by motor vehicles. In formatting your case analysis, do not use the question-and- answer format; instead, use an essay format with subheadings. Your APA-formatted case study must be at least four pages in length (not counting the title and reference pages). You are required to use a minimum of three peer-reviewed, academic sources that are no more than 5 years old (one may be your textbook). All sources used, including the textbook, must be referenced; all paraphrased material must have accompanying in-text citations.
  • 55. Chapter 3 Case study Smart Products—Coming Your Way If you don’t use a smart product yet, you soon will. Your shoes, your clothing, your watch, your water bottle, and even your toothbrush are being redesigned to incorporate sensors and metering devices connected to the Internet so that their performance can be monitored and analyzed. Your home will increasingly use smart devices such as smart thermostats, smart electrical meters, smart security systems, and smart lighting systems. Under Armour, noted for performance clothing, spent $710 million to scoop up mobile apps such as MyFitnessPal, Map My Fitness, and Endomondo, which enable it to tap into the world’s largest digital health and fitness community, with more than 225 million registered users. According to company data, Under Armour’s connected fitness users have logged more than 500 million workouts and taken 7 trillion steps since the company started tracking the data. Analyzing these data has provided insights such as 3.1 miles being the average distance for a run and that May is the most active month for exercise. Under Armour is trying to enhance its performance clothing with digital technology. The company now sells connected running shoes. The shoes come in several models and feature a built-in wireless Bluetooth sensor that tracks cadence, distance, pace, stride length, and steps, even if the runner does not bring a smartphone along. The data are stored on the shoe until they can sync wirelessly to Under Armour’s Map My Run app for iPhone, iPad, and Android devices. Users can also connect to the app on third-party devices such as AppleWatch, Garmin, or Fitbit, to incorporate metrics such as heart rate that can’t be tracked by the shoes. The shoe’s analytics will let users know when it’s time to purchase new shoes and sensor batteries have
  • 56. to be charged. Under Armour has recently added a digital coaching feature for the connected running shoes and Map My Run app. Runners will be able to monitor their gait and stride length mile after mile, and see how that impacts their pace and cadence. By analyzing these data, along with data about the runner’s gender, age, weight, and height, Map My Run will be able to provide a runner with tips on how to improve his or her pace and splits, by taking shorter or longer strides while running, for instance. Under Armour can generate revenue from in-app ads, including ads from other companies, and purchases from app users referred to its products. The platform delivers unprecedented depth of information and insight about fitness- and health- oriented consumers, creating numerous opportunities for Under Armour and other brands to engage with potential and existing customers. For example, Map My Fitness collects data about a user’s name, e-mail address, birth date, location, performance, and profile if the user connects to the app using social media. Under Armour does not sell identifiable personal data about individuals to third parties but does provide advertisers with aggregate information about app users. Under Armour is hoping that daily use of its smartphone apps will build stronger ties to customers that will lead to stronger sales of its own apparel, footwear, and other athletic gear. The company is clearly benefiting from bringing the power of software to its physical products. Smart products are also finding their way into people’s homes. Between 2017 and 2022, Con Edison, which supplies electrical power and natural gas to the New York City metropolitan area, is installing 3.6 million new electric smart meters and 1.2 million new gas smart meters in all its customers’ homes and businesses. A smart meter is a digital meter that communicates between a residence or business and Con Edison through a
  • 57. secure wireless communication network. The smart meter records and transmits each customer’s energy consumption regularly throughout the day. The smart meter transmits data to a system of access points on utility poles, which send the usage information to Con Edison. The smart meter will let the company know when a customer loses service, resulting in faster repairs, and will also provide real-time billing information to customers based on energy usage, enabling them to pinpoint areas for energy savings. They will also permit more definitive voltage regulation, enhancing electric distribution-system efficiency, reducing costs, and providing savings that ultimately get reflected in lower customer bills. Data from the new meters will let Con Ed set prices based on customers’ time and level of use. Rates might jump during summer hours when hot weather makes people turn on their air conditioners, or drop overnight when power use is lowest. Con Ed customers can use an online My Account dashboard with tools to track their daily energy consumption down to 15- minute increments. They can analyze their usage by comparing hour to hour, weekday versus weekend, or day versus evening use to see where they can save, and they can receive high bill alerts if they are using more energy than usual. Con Ed also offers a mobile app for iPhone and Android smartphone users so that they can track their detailed energy usage while they are on the go. Sources: Jen Booton, “Under Armour’s New HOVR Smart Shoe Will Automatically Track Your Run,” SportTechie, January 26, 2018; Edgar Alvarez, “Under Armour’s HOVR smart running shoes are more than just a gimmick,” Engadget, February 9, 2018; www.coned.com, accessed March 28, 2018; Edward C. Baig, “Under Armour and HTC Team Up on Connected Fitness,” USA Today, January 5, 2016; www.underarmour.com,
  • 58. accessed April 20, 2018; and John Kell, “Why Under Armour Is Making a Costly Bet on Connected Fitness,” Fortune, April 21, 2016. Chapter 4 Case study Cars today have become sophisticated listening posts on wheels. They can track phone calls and texts, record what radio stations you listen to, monitor the speed at which you drive and your braking actions, and even tell when you are breaking the speed limit, often without your knowledge. Tens of millions of drivers in the United States are currently being monitored, with that number rising every time a new vehicle is sold or leased. There are 78 million cars on the road with an embedded cyber connection that can be used for monitoring drivers. According to research firm Gartner Inc., 98 percent of new cars sold in the United States and Europe will be connected by 2021. Since 2014, every new car in the United States comes with an event data recorder (EDR), which records and stores over a dozen data points, including vehicle speed, seat belt use, and braking activation. EDR data are available to any auto maker as well as to insurance companies, which use these stored EDR data to help establish responsibility for an accident or to detect fraud. EDRs are mandated and regulated by the U.S. government, but other data-gathering software in today’s cars is not. Such software underlies numerous sensors, diagnostic systems, in- dash navigation systems, and built-in cellular connections, as well as driver-assistance systems to help drivers park, stay in their lane, avoid rear-ending another car, and steer for short time periods. All of this software keeps track of what drivers are doing. Newer cars may record driver eye movements, the
  • 59. weight of people in the front seats, and whether the driver’s hands are on the wheel. Smartphones, whether connected to the car or not, can also track your activities, including any texting while driving. Auto makers are able to mine all this information, as are app developers and companies such as Google or Spotify. With the exception of medical information, the United States has few regulations governing what data companies can gather and how they can use the data. Companies generally are not required to conceal names or other personal details. In most cases the driver must consent to allowing his or her personal information to be tracked or monitored. Many people unwittingly provide this consent when they check off a box on one of the lengthy service agreement forms required to register a car’s in-dash system or navigation app. Collecting such large amounts of personal data generated by drivers has raised concerns about whether automakers and others are doing enough to protect people’s privacy. Drivers may welcome the use of information to relay helpful diagnostic information or updates on nearby traffic jams. But they do not necessarily endorse other uses, and automakers have refrained from commenting on future data collection plans and policies. Automakers argue that the data are valuable for improving vehicle performance and vehicle safety and soon will be able to reduce traffic accidents and fatalities. Amassing detailed data about human driving behavior is also essential for the development of self-driving cars. But privacy experts believe the practice is dangerous. With enough data about driver behavior, individual profiles as unique as fingerprints could be developed. Trips to businesses reveal buying habits and relationships that could be valuable to corporations, government agencies, or law enforcement. For example, frequent visits to a liquor store or mental health clinic could reveal information
  • 60. about someone’s drinking habits or health problems. People obviously would not want such confidential data shared with others. Sources: Peter Holley, “Big Brother on Wheels: Why Your Car Company May Know More About You Than Your Spouse.” Washington Post, January 15, 2018; Christina Rogers, “What Your Car Knows about You,” Wall Street Journal, August 18, 2018; John R. Quain, “Cars Suck Up Data About You. Where Does It All Go?” New York Times, July 27, 2017; and Russ Heaps, “Data Collection for Self-Driving Cars Could Be Risking Your Privacy,” Autotrader, September 2016. The challenges that connected vehicles and big data pose to privacy, described in the chapter-opening case, show that technology can be a double-edged sword. It can be the source of many benefits, including the capability to make driving safer and more efficient. At the same time, digital technology creates new opportunities for invading privacy and using information that could cause harm. The chapter-opening diagram calls attention to important points this case and this chapter raise. Developments in data management technology, the Internet of Things (IoT), and analytics have created opportunities for organizations to use big data to improve operations and decision making. Big data analytics are now being applied to all the data generated by motor vehicles, especially those with Internet connections. The auto makers and other organizations described here are benefiting from using big data to monitor vehicle performance and driver behavior and to provide drivers with helpful tools for driving safely and caring for their cars. However, the use of big data from motor vehicles is also taking benefits away from individuals. Individuals might be subject to job discrimination or higher insurance rates because organizations have new tools to assemble and analyze huge quantities of data about their
  • 61. driving behavior. There are very few privacy protections for all the personal data gathered from car driving. New privacy protection laws and policies need to be developed to keep up with the technologies for assembling and analyzing big data. This case illustrates an ethical dilemma because it shows two sets of interests at work, the interests of organizations that have raised profits or even helped many people with the data generated by connected vehicles and those who fervently believe that businesses and public organizations should not use big data analysis to invade privacy or harm individuals. As a manager, you will need to be sensitive to both the positive and negative impacts of information systems for your firm, employees, and customers. You will need to learn how to resolve ethical dilemmas involving information systems. Chapter 2 Data Changes How NFL Teams Play the Game and How Fans See It All professional sports teams today collect detailed data on player and team performance, fan behavior, and sales, and increasingly use these data to drive decisions about every aspect of the business—marketing, ticketing, player evaluation, and TV and digital media deals. This includes the National Football League (NFL), which is increasingly turning to data to improve how its players and teams perform and how fans experience the game. Since 2014 the NFL has been capturing player movement data on the field by putting nickel-sized radio frequency identification (RFID) tags beneath players’ shoulder pads to track every move they make. The information the sensors gather is used by NFL teams to improve their training and strategy, by commentators on live game broadcasts, and by fans attending games or using the NFL app on the Xbox One.
  • 62. The NFL’s player tracking system is based on the Zebra Sports Solution developed by Zebra Technologies, a Chicago-based firm specializing in tracking technology that includes the bar codes on groceries and other consumer goods and radio frequency identification (RFID) technology. The Zebra Sports