Authoritarian Counterstrategy to Cope with Western Democracy Promotion: the China Model

Total Page:16

File Type:pdf, Size:1020Kb

Authoritarian Counterstrategy to Cope with Western Democracy Promotion: the China Model AUTHORITARIAN COUNTERSTRATEGY TO COPE WITH WESTERN DEMOCRACY PROMOTION: THE CHINA MODEL A Dissertation submitted to the Faculty of the Graduate School of Arts and Sciences of Georgetown University in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Government By Sungmin Cho, B.A. Washington, DC February 5, 2018 Copyright 2018 by Sungmin Cho All Rights Reserved ii AUTHORITARIAN COUNTERSTRATEGY TO COPE WITH WESTERN DEMOCRACY PROMOTION: THE CHINA MODEL Sungmin Cho, B.A. Thesis Advisor: Victor Cha, Ph.D. ABSTRACT China is distinct for its openness to the programs of Western democracy promotion. The Chinese government has cooperated with a number of Western NGOs for the last thirty years to improve rule of law, village election, administrative reform, and civil society in China. Also, it has openly engaged in human rights dialogues with Western governments, allowed Chinese students to be exposed to Western ideas while they live and study in Western democracies, and partially allowed people to watch the West’s political broadcastings like Voice of America. Why has the Chinese state deliberately opened the society to the influence of the Western democracy promotion programs, despite its concern over the impacts of Western ideas and norms on the legitimacy of Chinese Communist Party (CCP)’s authoritarianism? I argue that the Chinese state intends to make use of Western democracy promotion to its advantage; the Western democracy aids can be useful to promote China’s own governance reform programs while the Western criticism can trigger Chinese people’s defensive nationalism. This dissertation traces the process of how Chinese government’s strategic intention translates into the policies of openness, based on first-hand interviews, extensive examination of propaganda materials, official statements and research by Chinese academics. I find that Chinese officials indeed positively assess the contributions of Western democracy aid organizations to the progress of governance reform in China. However, the Chinese state aims iii to utilize the Western assistances for the purpose of strengthening regime legitimacy, not for the democratization of China. I also find that the Chinese state neither tries to entirely prevent the society from learning Western logic of criticisms on CCP’s non-democratic nature, nor is afraid of the majority of Chinese population being exposed to the Western ideas on liberal democracy. In fact, the Western criticisms tend to stimulate Chinese nationalism, which in turn strengthen the popular support of the authoritarian regime in China. These counterintuitive findings challenge the popular assumption that authoritarian regimes would invariably resist Western democracy promotion. Prior studies have focused on explaining the needs, methods, and success or failure cases of democracy promotion, which represent the supply-side of democracy promotion. This dissertation contributes to the literature by exploring the demand-side of democracy promotion, especially when authoritarian regime opens itself to the influence of Western democracy promotion. iv Table of Contents Chapter 1: The Puzzle and its Importance ...................................................................................... 1 1.1. Introduction ...................................................................................................................... 1 1.2. The Puzzle ........................................................................................................................ 3 1.3. The Supply-side Theory of Democracy Promotion: A Critique .................................... 12 1.4. Importance ..................................................................................................................... 21 1.5. Research Design and Method ........................................................................................ 24 1.6. Organization of the Dissertation .................................................................................... 27 Chapter 2. The Argument: Strategy of Selective Openness ......................................................... 31 2.1. Introduction .................................................................................................................... 31 2.2. Defining of Democracy Promotion and Authoritarian Openness .................................. 32 2.2.1 What is Democracy Promotion? .......................................................................... 32 2.2.2. What is Authoritarian Openness? ....................................................................... 36 2.3. Model: Strategy of Selective Openness ......................................................................... 38 2.3.1. The Settings ........................................................................................................ 39 2.3.2 Governance Reform and Democracy Assistance Programs ................................ 42 2.3.3 Performance Legitimacy and Democracy Transmission Programs ..................... 47 2.3.4 Metaphor of Vaccinating Effects and Causal Mechanism ................................... 53 2.3.5 Cycle of Opening and Closing-off ....................................................................... 56 2.4. Refining the Theory: From Static to Dynamic .............................................................. 58 2.5. Operationalization .......................................................................................................... 62 2.5.1. Observable Implications ..................................................................................... 62 2.5.2. Measuring Variables and Data Collection .......................................................... 67 2.6. Falsification .................................................................................................................... 70 2.7. Conclusion ..................................................................................................................... 71 v Chapter 3. China’s Counterstrategy against Western Democracy Assistance Programs inside China ............................................................................................................................................. 72 3.1. Introduction ................................................................................................................... 72 3.2. Governance Reform in China ....................................................................................... 73 3.3. Pattern of Selective Openness ....................................................................................... 77 3.4. Practice of Selective Openness ...................................................................................... 82 3.4.1. Control Mechanism ............................................................................................ 82 3.4.2. Rule of Law ........................................................................................................ 86 3.4.3. Election .............................................................................................................. 94 3.4.4 Good Governance .............................................................................................. 103 3.4.5. Civil Society...................................................................................................... 110 3.5. Supportive Effects of Western Democracy Aids for the Legitimation of Chinese Communist Party ................................................................................................................ 117 3.5.1. Progress of Governance Effectiveness .............................................................. 119 3.5.2. Strengthened Performance Legitimacy ............................................................. 122 3.6. Counterarguments ........................................................................................................ 124 3.7. Conclusion ................................................................................................................... 128 Chapter 4: China’s Counterstrategy against Western Democracy Transmission Programs outside China ........................................................................................................................................... 130 4.1. Introduction .................................................................................................................. 130 4.2. Understanding the Performance Legitimacy in China ................................................. 131 4.2.1. Sources of Performance Legitimacy ................................................................. 131 4.2.2 Patriotic Education Campaign ........................................................................... 134 4.2.3. Counter-narrative against Western Liberal Democracy ................................... 137 4.3. China’s Selective Openness ......................................................................................... 142 4.3.1 Voice of America ............................................................................................... 142 4.3.2. Western Human Rights Diplomacy .................................................................. 150 4.3.3. Educational Exchange ....................................................................................... 159 4.4. Framing Effects and Identity Politics .......................................................................... 168 4.4.1. Public Perception of the Western Democracy Promotion ...............................
Recommended publications
  • Secure and Privacy-Preserving Proxy Voting System
    Secure and Privacy-Preserving Proxy Voting System Bernd Zwattendorfer, Christoph Hillebold, and Peter Teufl Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria {bernd.zwattendorfer, peter.teufl}@iaik.tugraz.at, [email protected] Abstract— Voting is a frequent and popular decision making Proxy: A proxy is a voter that wants to get delegations process in many diverse areas, targeting the fields of e- from other voters. Delegations are kept secretly and are not Government, e-Participation, e-Business, etc. In e-Business, public. Like a user, also a proxy could either vote directly or voting processes may be carried out e.g. in order management, delegate her voting power to another proxy. A proxy can be inventory management, or production management. In this compared with a politician whose opinion must be public. field, voting processes are typically based on direct voting. Therefore a proxy cannot vote secretly and has to publish her While direct voting enables each eligible voter to express her vote. opinion about a given subject, representative voting shifts this Proxy voting allows voters either to vote directly or to power to elected representatives. Declarative or proxy voting delegate their voting power to a proxy. Delegations could be (based on liquid democracy) is a voting process situated in solved in two ways: between these two approaches and allows a voter to delegate her voting power to a so called proxy, who actually casts the 1. Either the voter copies the published vote of the votes for all the represented voters. The most interesting aspect chosen proxy (client-based) or of this approach is that voters have the opportunity to skip the 2.
    [Show full text]
  • Proxy Voting Guidelines Benchmark Policy Recommendations TITLE
    UNITED STATES Proxy Voting Guidelines Benchmark Policy Recommendations TITLE Effective for Meetings on or after February 1, 2021 Published November 19, 2020 ISS GOVERNANCE .COM © 2020 | Institutional Shareholder Services and/or its affiliates UNITED STATES PROXY VOTING GUIDELINES TABLE OF CONTENTS Coverage ................................................................................................................................................................ 7 1. Board of Directors ......................................................................................................................................... 8 Voting on Director Nominees in Uncontested Elections ........................................................................................... 8 Independence ....................................................................................................................................................... 8 ISS Classification of Directors – U.S. ................................................................................................................. 9 Composition ........................................................................................................................................................ 11 Responsiveness ................................................................................................................................................... 12 Accountability ....................................................................................................................................................
    [Show full text]
  • Proxy Voting Policy and Procedures
    Proxy Voting Policy and Procedures SEPTEMBER 2020 I. POLICY STATEMENT • For other pooled investment vehicles (e.g., UCITS), each MSIM Affiliate will vote proxies under this Policy pursuant Morgan Stanley Investment Management’s (“MSIM”) policy and to authority granted under its applicable investment advisory procedures for voting proxies, the Equity Proxy Voting Policy and agreement or, in the absence of such authority, as authorized by Procedures (the “Policy”) with respect to securities held in the the relevant governing board. accounts of clients applies to those MSIM entities that provide discretionary investment management services and for which • For separately managed accounts (including ERISA and an MSIM entity has authority to vote proxies. For purposes of ERISA-equivalent clients), each MSIM Affiliate will vote this Policy, clients shall include: Morgan Stanley U.S. registered proxies under this Policy pursuant to authority granted investment companies, other Morgan Stanley pooled investment under the applicable investment advisory agreement or vehicles, and MSIM separately managed accounts (including investment management agreement. Where a MSIM Affiliate accounts for Employee Retirement Income Security (“ERISA”) has the authority to vote proxies on behalf of ERISA and clients and ERISA-equivalent clients). This Policy is reviewed and ERISA-equivalent clients, the MSIM Affiliate must do so in updated as necessary to address new and evolving proxy voting accordance with its fiduciary duties under ERISA (and the issues and standards. Internal Revenue Code). The MSIM entities covered by this Policy currently include • In certain situations, a client or its fiduciary may reserve the the following: Morgan Stanley AIP GP LP, Morgan Stanley authority to vote proxies for itself or an outside party or may Investment Management Inc., Morgan Stanley Investment provide a MSIM Affiliate with a statement of proxy voting Management Limited, Morgan Stanley Investment policy.
    [Show full text]
  • Irrevocable Proxy and Voting Control of Small Business Corporations
    1950] NOTES The Irrevocable Proxy and Voting Control of Small Business Corporations Voting control of business corporations is prized because, through selection of a majority of directors, it is the power to determine the use of group assets. Since directors are chosen by vote at annual shareholder meetings, those who have the legal right to vote a majority of enfranchised shares retain the potential power of control. In the case of large cor- porations with widely scattered ownership, factual control, by the avail- ability of the proxy machinery, may reside in a group owning only a small percentage of outstanding voting shares. In more closely held cor- porations, attempts are made to achieve the same result by divorcing the legal right to vote a majority of shares from ownership through the use of legal devices such as non-voting shares, voting trusts, voting and pool- ing contracts, and irrevocable proxies. This Note is concerned with the problem of voting control of the closely held, usually small, corporation. Since voting trusts, whereby owners transfer rights to trustees, are now largely legislative creatures, the discussion will be confined to an exami- nation of the irrevocable proxy, and the voting or pooling contract, two relationships whose judicial enforceability is still subject to doubt. Ju- dicial confusion over the validity of these voting agreements is more readily understood in the light of the general theory of the business corpora- tion evolving in a democratic society, and against the background of traditional agency doctrine. THE STRUCTURE OF CORPORATE DEMOCRACY In the early law of business corporations, each shareholder was ac- corded the same number of votes, regardless of his proportionate share ownership.
    [Show full text]
  • The Globalization of Chinese Food ANTHROPOLOGY of ASIA SERIES Series Editor: Grant Evans, University Ofhong Kong
    The Globalization of Chinese Food ANTHROPOLOGY OF ASIA SERIES Series Editor: Grant Evans, University ofHong Kong Asia today is one ofthe most dynamic regions ofthe world. The previously predominant image of 'timeless peasants' has given way to the image of fast-paced business people, mass consumerism and high-rise urban conglomerations. Yet much discourse remains entrenched in the polarities of 'East vs. West', 'Tradition vs. Change'. This series hopes to provide a forum for anthropological studies which break with such polarities. It will publish titles dealing with cosmopolitanism, cultural identity, representa­ tions, arts and performance. The complexities of urban Asia, its elites, its political rituals, and its families will also be explored. Dangerous Blood, Refined Souls Death Rituals among the Chinese in Singapore Tong Chee Kiong Folk Art Potters ofJapan Beyond an Anthropology of Aesthetics Brian Moeran Hong Kong The Anthropology of a Chinese Metropolis Edited by Grant Evans and Maria Tam Anthropology and Colonialism in Asia and Oceania Jan van Bremen and Akitoshi Shimizu Japanese Bosses, Chinese Workers Power and Control in a Hong Kong Megastore WOng Heung wah The Legend ofthe Golden Boat Regulation, Trade and Traders in the Borderlands of Laos, Thailand, China and Burma Andrew walker Cultural Crisis and Social Memory Politics of the Past in the Thai World Edited by Shigeharu Tanabe and Charles R Keyes The Globalization of Chinese Food Edited by David Y. H. Wu and Sidney C. H. Cheung The Globalization of Chinese Food Edited by David Y. H. Wu and Sidney C. H. Cheung UNIVERSITY OF HAWAI'I PRESS HONOLULU Editorial Matter © 2002 David Y.
    [Show full text]
  • Governance in Decentralized Networks
    Governance in decentralized networks Risto Karjalainen* May 21, 2020 Abstract. Effective, legitimate and transparent governance is paramount for the long-term viability of decentralized networks. If the aim is to design such a governance model, it is useful to be aware of the history of decision making paradigms and the relevant previous research. Towards such ends, this paper is a survey of different governance models, the thinking behind such models, and new tools and structures which are made possible by decentralized blockchain technology. Governance mechanisms in the wider civil society are reviewed, including structures and processes in private and non-profit governance, open-source development, and self-managed organisations. The alternative ways to aggregate preferences, resolve conflicts, and manage resources in the decentralized space are explored, including the possibility of encoding governance rules as automatically executed computer programs where humans or other entities interact via a protocol. Keywords: Blockchain technology, decentralization, decentralized autonomous organizations, distributed ledger technology, governance, peer-to-peer networks, smart contracts. 1. Introduction This paper is a survey of governance models in decentralized networks, and specifically in networks which make use of blockchain technology. There are good reasons why governance in decentralized networks is a topic of considerable interest at present. Some of these reasons are ideological. We live in an era where detailed information about private individuals is being collected and traded, in many cases without the knowledge or consent of the individuals involved. Decentralized technology is seen as a tool which can help protect people against invasions of privacy. Decentralization can also be viewed as a reaction against the overreach by state and industry.
    [Show full text]
  • Proxy Voting Policies and Procedures February 2020
    BOSTON PARTNERS GLOBAL INVESTORS, INC. Proxy Voting Policies and Procedures February 2020 Boston Partners 60 E 42nd St – Suite 1550 New York, NY 10165—www.boston-partners.com PROXY VOTING POLICIES AND PROCEDURES Boston Partners Global Investors, Inc. (“Boston Partners”) is an Investment Adviser comprised of two divisions, Boston Partners and Weiss, Peck & Greer Partners (“WPG”). Boston Partners’ Governance Committee (the “Committee”) is comprised of representatives from portfolio management, securities analyst, product specialist, relationship management, sustainability and engagement, and compliance teams. The Committee is responsible for administering and overseeing Boston Partners’ proxy voting process. The Committee makes decisions on proxy policy, establishes formal Boston Partners’ Proxy Voting Policies (the “Proxy Voting Policies”) and updates the Proxy Voting Policies as necessary, but no less frequently than annually. In addition, the Committee, in its sole discretion, delegates certain functions to internal departments and/or engages third-party vendors to assist in the proxy voting process. Finally, members of the Committee are responsible for evaluating and resolving conflicts of interest relating to Boston Partners’ proxy voting process. To assist Boston Partners in carrying out our responsibilities with respect to proxy activities, Boston Partners has engaged Institutional Shareholder Services Inc. (“ISS”), a third-party corporate governance research service, which is registered as an investment adviser. ISS receives all proxy-related materials for securities held in client accounts and votes the proposals in accordance with Boston Partners’ Proxy Voting Policies. While Boston Partners may consider ISS’s recommendations on proxy issues, Boston Partners bears ultimate responsibility for proxy voting decisions. ISS also provides recordkeeping and vote-reporting services.
    [Show full text]
  • Chinese Cuisine from Wikipedia, the Free Encyclopedia "Chinese Food
    Chinese cuisine From Wikipedia, the free encyclopedia "Chinese food" redirects here. For Chinese food in America, see American Chinese cuisine. For other uses, see Chinese food (disambiguation). Chao fan or Chinese fried rice ChineseDishLogo.png This article is part of the series Chinese cuisine Regional cuisines[show] Overseas cuisine[show] Religious cuisines[show] Ingredients and types of food[show] Preparation and cooking[show] See also[show] Portal icon China portal v t e Part of a series on the Culture of China Red disc centered on a white rectangle History People Languages Traditions[show] Mythology and folklore[show] Cuisine Festivals Religion[show] Art[show] Literature[show] Music and performing arts[show] Media[show] Sport[show] Monuments[show] Symbols[show] Organisations[show] Portal icon China portal v t e Chinese cuisine includes styles originating from the diverse regions of China, as well as from Chinese people in other parts of the world including most Asia nations. The history of Chinese cuisine in China stretches back for thousands of years and has changed from period to period and in each region according to climate, imperial fashions, and local preferences. Over time, techniques and ingredients from the cuisines of other cultures were integrated into the cuisine of the Chinese people due both to imperial expansion and from the trade with nearby regions in pre-modern times, and from Europe and the New World in the modern period. In addition, dairy is rarely—if ever—used in any recipes in the style. The "Eight Culinary Cuisines" of China[1] are Anhui, Cantonese, Fujian, Hunan, Jiangsu, Shandong, Sichuan, and Zhejiang cuisines.[2] The staple foods of Chinese cooking include rice, noodles, vegetables, and sauces and seasonings.
    [Show full text]
  • Irresistible Chinese Cuisine
    1 Irresistible Chinese Cuisine By: Yidi Wang Online: <https://legacy.cnx.org/content/col29267/1.4> This selection and arrangement of content as a collection is copyrighted by Yidi Wang. Creative Commons Attribution License 4.0 http://creativecommons.org/licenses/by/4.0/ Collection structure revised: 2019/05/21 PDF Generated: 2019/05/21 21:33:04 For copyright and attribution information for the modules contained in this collection, see the "Attributions" section at the end of the collection. 2 This OpenStax book is available for free at https://legacy.cnx.org/content/col29267/1.4 TABLE OF CONTENTS 1 Brief introduction 5 1.1 Introduction 5 1.2 Eight Regional Cuisine 6 1.3 Culinary Culture 13 Index 19 This OpenStax book is available for free at https://legacy.cnx.org/content/col29267/1.4 1.1 Introduction 1 Brief introduction Exhibit 1.1 Chinese Eight Regional Cuisines. Introduction to Chinese Cuisinology If I need to choose what kind of food I will be fed for the rest of my life, I will choose Chinese cuisine without any hesitation. - Yidi Wang Learning Objectives: • Capacity to integrate knowledge and to analyse and evaluate a Chinese cuisine at a local and global levels, even when limited information is available. • Capacity to identify the general type of a Chinese dish. • Capacity to appreciate the differences between Western and Chinese culinary cultures. • Capacity to comprehend basic principles of Anhui Cuisine. • Capacity to recognize some unorthodox Chinese dishes. Links and contents 1.1 Eight Regional Cuisines 1.2 Culinary Culture 6 Chapter 1 Brief introduction Introduction Chinese cuisine is an important part of Chinese culture, which includes cuisine originating from the diverse regions of China, as well as from Chinese people in other parts of the world.
    [Show full text]
  • Feeding the Passion
    Cutting Edge FEEDING TRADITIONAL Putien has constantly refreshed profit between 2014 and WITH A its operations in accordance to 2016,” says Mr Xiao. “2016 industry standards. In early 2010, was the most glorious year MODERN TWIST THE PASSION its founder Fong Chi Chung spent for Putien. Our Causeway Qi Ji has an eye on using new technology and about S$10,000 on each Putien Bay outlet in Hong Kong outlet in Singapore to implement the was recommended by Michelin HOME-GROWN food and beverage (F&B) brand Qi Ji prides methods to prepare traditional dishes while 5S, a structured programme introduced by the Guide Hong Kong and Macau, and itself on bringing local comfort food to the average Singaporean. Putien is firmly focused on authenticity and fresh, Restaurant Association of Singapore (RAS). our Kitchener Road outlet in Singapore was Just don’t be too surprised when you walk into one of its stores The 5S system, which is still in place at crowned as a Michelin one-star restaurant.” and find that the otah in your nasi lemak is coin shaped and seasonal ingredients. Both are doing something Putien outlets today, is designed to systematically Mr Fong told IE Singapore last year that comes sans coconut leaf. right to succeed in a nation of foodies. achieve cleanliness and standardisation in a he hopes to take Putien to other major Chinese Qi Ji’s recent coin-shaped otah (grilled fish cake) is workplace in order to drive productivity. It refers cities, as well as Japan, South Korea, the Middle yet another example of innovation in an industry that is to: sort, systemise, sanitise, standardise and East and Europe.
    [Show full text]
  • Is Academic Freedom Threatened by China's
    IS ACADEMIC FREEDOM THREATENED BY CHINA’S INFLUENCE ON U.S. UNIVERSITIES? HEARING BEFORE THE SUBCOMMITTEE ON AFRICA, GLOBAL HEALTH, GLOBAL HUMAN RIGHTS, AND INTERNATIONAL ORGANIZATIONS OF THE COMMITTEE ON FOREIGN AFFAIRS HOUSE OF REPRESENTATIVES ONE HUNDRED THIRTEENTH CONGRESS SECOND SESSION DECEMBER 4, 2014 Serial No. 113–230 Printed for the use of the Committee on Foreign Affairs ( Available via the World Wide Web: http://www.foreignaffairs.house.gov/ or http://www.gpo.gov/fdsys/ U.S. GOVERNMENT PRINTING OFFICE 91–663PDF WASHINGTON : 2014 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 VerDate 0ct 09 2002 14:01 Jan 09, 2015 Jkt 000000 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 Z:\WORK\_AGH\120414\91663 SHIRL COMMITTEE ON FOREIGN AFFAIRS EDWARD R. ROYCE, California, Chairman CHRISTOPHER H. SMITH, New Jersey ELIOT L. ENGEL, New York ILEANA ROS-LEHTINEN, Florida ENI F.H. FALEOMAVAEGA, American DANA ROHRABACHER, California Samoa STEVE CHABOT, Ohio BRAD SHERMAN, California JOE WILSON, South Carolina GREGORY W. MEEKS, New York MICHAEL T. MCCAUL, Texas ALBIO SIRES, New Jersey TED POE, Texas GERALD E. CONNOLLY, Virginia MATT SALMON, Arizona THEODORE E. DEUTCH, Florida TOM MARINO, Pennsylvania BRIAN HIGGINS, New York JEFF DUNCAN, South Carolina KAREN BASS, California ADAM KINZINGER, Illinois WILLIAM KEATING, Massachusetts MO BROOKS, Alabama DAVID CICILLINE, Rhode Island TOM COTTON, Arkansas ALAN GRAYSON, Florida PAUL COOK, California JUAN VARGAS, California GEORGE HOLDING, North Carolina BRADLEY S.
    [Show full text]
  • China Story Yearbook 2014: Shared Destiny
    SHARED DESTINY 共同命运 EDITED BY Geremie R Barmé WITH Linda Jaivin AND Jeremy Goldkorn C HINA S TORY YEARBOOK 2 0 14 © The Australian National Univeristy (as represented by the Australian Centre on China in the World) First published October 2015 by ANU Press The Australian National University Acton ACT 2601, Australia Email: [email protected] This title is also available online at press.anu.edu.au National Library of Australia Cataloguing-in-Publication entry Title: Shared destiny / Geremie R Barmé, Linda Jaivin, Jeremy Goldkorn, editors. ISBN: 9781925022933 (paperback) 9781925022940 (ebook) Series: China story yearbook ; 2014. Subjects: China--Politics and government--2002- | China--Foreign relations--2002- China--Relations--Asia | Asia--Relations--China | China--Relations--Pacific Area Pacific Area--Relations--China. Other Creators/Contributors: Barmé, Geremie, editor. Jaivin, Linda, editor. | Goldkorn, Jeremy, editor. Dewey Number: 915.1156 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying or otherwise, without the prior permission of the publisher. This publication is made available as an Open Educational Resource through licensing under a Creative Commons Attribution Non-Commercial Share Alike 3.0 Australia Licence: http://creativecommons.org/licensese/by-nc-sa/3.0/au/deed.en Note on Visual Material All images in this publication have been fully accredited. As this is a non-commercial publication, certain images have been used under a Creative Commons licence. These images have been sourced from flickr, Wikipedia Commons and the copyright owner of each original picture is acknowledged and indicated in the source information.
    [Show full text]