A Forum for People Who Travel to Dangerous Places Victoria Lindsay

Total Page:16

File Type:pdf, Size:1020Kb

A Forum for People Who Travel to Dangerous Places Victoria Lindsay A virtual ethnography of the Black Flag Café: A forum for people who travel to dangerous places Victoria Lindsay-Towner A thesis submitted in partial fulfilment of the requirements of Bournemouth University for the degree of Doctor of Philosophy July 2011 This copy of the thesis has been supplied on the condition that anyone who consults it is understood to recognise that its copyright rests with its author and due acknowledgement must always be made to the use of any material contained in, or derived from, this thesis. 2 Abstract This research explores the followers of the book The World’s Most Dangerous Places. These tourists deliberately travel to dangerous destinations where there is a high level of violence due to civil unrest, conflict or war. The research has focused on the Black Flag Café, an online tourism-based community created by the writer Robert Young Pelton, author of the books Come Back Alive and The World’s Most Dangerous Places. This is a case study that has made use of virtual ethnography and descriptive content analysis to explore the forum and its members. The research has identified four factors which influence the forum members’ decision to travel to a dangerous place: a search for self- actualisation through “it” or peak experiences; a desire to improve self-image and to obtain status from travelling to dangerous places; a search for an “authentic” travel experience; and finally their awareness and perception of danger and acceptance of the residual risks involved in travel to dangerous places. The study shows that the forum members enjoy pushing the boundaries of risk, undertaking a form of edgework. The research also explores the forum members’ sense that travelling to dangerous places can result in other benefits including familiarity with death, gaining arousal from risk taking (flow) and the possibility of repeat travel to increasingly dangerous places. The conceptual framework developed from the research displays the danger tourist’s approach to travelling to dangerous places. This framework identifies five benefits which participants obtain from travelling to dangerous places: flow, self-actualisation, improvement to self-esteem, the achievement and/or maintenance of status and familiarity with death. While this framework has been developed for the tourists who travel to dangerous places, undertaking danger tourism, it could equally be applied to other high-risk activities. 3 List of contents 1 Introduction............................................................................................................... 18 1.1 Research aim................................................................................................... 18 1.2 Identifying a research topic: New Year in Kabul.............................................. 18 1.3 Scoping the literature.......................................................................................19 1.3.1 War tourism............................................................................................. 19 1.3.2 Dark tourism / thanatourism.................................................................... 21 1.3.3 During the war tourism............................................................................ 25 1.3.4 Beyond “during the war”.......................................................................... 27 1.3.5 Danger tourism........................................................................................29 1.3.6 Examples of tourism to dangerous places.............................................. 31 1.3.7 Backpacker travel....................................................................................33 1.3.8 Risk and danger...................................................................................... 36 1.3.9 Contributing literature.............................................................................. 40 1.4 Identifying the gap in the literature .................................................................. 44 1.5 Relevance........................................................................................................45 1.6 Thesis contents................................................................................................ 46 1.7 Conclusion .......................................................................................................47 2 The case study context ............................................................................................48 2.1 Introduction ...................................................................................................... 48 2.2 Robert Young Pelton .......................................................................................48 2.3 The World’s Most Dangerous Places .............................................................. 49 2.4 A virtual community .........................................................................................54 2.5 The websites: comebackalive.com and the Black Flag Café .......................... 56 2.6 Moderation.......................................................................................................64 4 2.7 Uses of images ................................................................................................65 2.8 Editing posts ....................................................................................................65 2.9 Forum members ..............................................................................................66 2.10 The role of RYP within the forum..................................................................... 69 2.11 Behaviour.........................................................................................................74 2.12 Online identity .................................................................................................. 77 2.13 Avatars.............................................................................................................77 2.14 Usernames.......................................................................................................78 2.15 Signatures........................................................................................................78 2.16 Conclusion .......................................................................................................80 3 Identifying a research method..................................................................................81 3.1 Introduction ...................................................................................................... 81 3.2 Finding a method .............................................................................................81 3.3 Undertaking Internet research ......................................................................... 83 3.4 Ethnography ....................................................................................................84 3.5 Virtual ethnography..........................................................................................85 3.6 Gaining access ................................................................................................86 3.7 Participating online .......................................................................................... 88 3.8 Being online ..................................................................................................... 89 3.9 Difficulties.........................................................................................................91 3.10 Obtaining permission.......................................................................................92 3.11 Using informants..............................................................................................93 3.12 Ethical negotiations..........................................................................................94 3.12.1 Regulations / legislation .......................................................................... 95 3.12.2 Informed consent / perceived privacy ..................................................... 95 3.12.3 Use of pseudonyms ................................................................................97 5 3.12.4 Distressing information ........................................................................... 98 3.12.5 Exit strategy ............................................................................................99 3.12.6 Ethical agreement .................................................................................100 3.13 Conclusion .....................................................................................................101 4 Research framework ..............................................................................................102 4.1 Introduction ....................................................................................................102 4.2 Framework.....................................................................................................102 4.3 Content analysis ............................................................................................104 4.4 Types of data .................................................................................................105 4.5 Data collection ...............................................................................................107 4.6 Identifying dangerous places.........................................................................108 4.7 Sampling........................................................................................................109
Recommended publications
  • Kenyan Somali Islamist Radicalisation
    Policy Briefing Africa Briefing N°85 Nairobi/Brussels, 25 January 2012 Kenyan Somali Islamist Radicalisation tant government positions. The coalition government has I. OVERVIEW created a ministry to spearhead development in the region. A modest affirmative action policy is opening opportuni- Somalia’s growing Islamist radicalism is spilling over in- ties in higher education and state employment. To most to Kenya. The militant Al-Shabaab movement has built a Somalis this is improvement, if halting, over past neglect. cross-border presence and a clandestine support network But the deployment of troops to Somalia may jeopardise among Muslim populations in the north east and Nairobi much of this modest progress. Al-Shabaab or sympathisers and on the coast, and is trying to radicalise and recruit have launched small but deadly attacks against government youth from these communities, often capitalising on long- and civilian targets in the province; there is credible fear a standing grievances against the central state. This prob- larger terror attack may be tried elsewhere to undermine lem could grow more severe with the October 2011 deci- Kenyan resolve and trigger a security crackdown that could sion by the Kenyan government to intervene directly in drive more Somalis, and perhaps other Muslims, into the Somalia. Radicalisation is a grave threat to Kenya’s securi- movement’s arms. Accordingly, the government should: ty and stability. Formulating and executing sound counter- radicalisation and de-radicalisation policies before it is too recognise that a blanket or draconian crackdown on late must be a priority. It would be a profound mistake, Kenyan Somalis, or Kenyan Muslims in general, would however, to view the challenge solely through a counter- radicalise more individuals and add to the threat of terrorism lens.
    [Show full text]
  • Kenyan Somali Islamist Radicalisation
    Policy Briefing Africa Briefing N°85 Nairobi/Brussels, 25 January 2012 Kenyan Somali Islamist Radicalisation tant government positions. The coalition government has I. OVERVIEW created a ministry to spearhead development in the region. A modest affirmative action policy is opening opportuni- Somalia’s growing Islamist radicalism is spilling over in- ties in higher education and state employment. To most to Kenya. The militant Al-Shabaab movement has built a Somalis this is improvement, if halting, over past neglect. cross-border presence and a clandestine support network But the deployment of troops to Somalia may jeopardise among Muslim populations in the north east and Nairobi much of this modest progress. Al-Shabaab or sympathisers and on the coast, and is trying to radicalise and recruit have launched small but deadly attacks against government youth from these communities, often capitalising on long- and civilian targets in the province; there is credible fear a standing grievances against the central state. This prob- larger terror attack may be tried elsewhere to undermine lem could grow more severe with the October 2011 deci- Kenyan resolve and trigger a security crackdown that could sion by the Kenyan government to intervene directly in drive more Somalis, and perhaps other Muslims, into the Somalia. Radicalisation is a grave threat to Kenya’s securi- movement’s arms. Accordingly, the government should: ty and stability. Formulating and executing sound counter- radicalisation and de-radicalisation policies before it is too recognise that a blanket or draconian crackdown on late must be a priority. It would be a profound mistake, Kenyan Somalis, or Kenyan Muslims in general, would however, to view the challenge solely through a counter- radicalise more individuals and add to the threat of terrorism lens.
    [Show full text]
  • Explaining Blackwater's Unparalleled Record of Violence in Iraq
    Wheeled Warriors: Explaining Blackwater’s Unparalleled Record of Violence in Iraq by Scott Fitzsimmons Department of Political Science University of British Columbia [email protected] On September 16, 2007, employees of Blackwater, a private security company tasked with protecting U.S. State Department personnel in Iraq, opened fire on pedestrians and motorists in Baghdad’s bustling Nisour Square. This brief but ferocious use of violence against unarmed Iraqi civilians, which came to be known as the “Nisour Square incident,” left 17 civilians dead and two dozen wounded.1 This event was one of the most violent and widely reported on incidents involving Blackwater’s personnel, but it was emblematic of their unparalleled record of violent actions during the Iraq War. In fact, the firm’s personnel fired their weapons during at least 323 incidents in Iraq between January 1, 2005, and December 31, 2007, for an average of two shooting incidents per week. Moreover, despite operating during the same period, performing the same tasks, for the same clients, and facing the same threats in the same general environment, Blackwater’s personnel killed and seriously injured far more people than their counterparts in DynCorp, one of the other major private security companies that provided protective services for the U.S. State Department during this period of the Iraq War. Stunningly, while Blackwater’s personnel inflicted at least 62 deaths and 86 serious injuries during this 1 Blackwater changed its name to Xe in 2009 and to Academi in 2011. However, since the firm is almost invariably referred to by its original name, this study will, whenever possible, do the same.
    [Show full text]
  • The Human Conveyor Belt : Trends in Human Trafficking and Smuggling in Post-Revolution Libya
    The Human Conveyor Belt : trends in human trafficking and smuggling in post-revolution Libya March 2017 A NETWORK TO COUNTER NETWORKS The Human Conveyor Belt : trends in human trafficking and smuggling in post-revolution Libya Mark Micallef March 2017 Cover image: © Robert Young Pelton © 2017 Global Initiative against Transnational Organized Crime. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means without permission in writing from the Global Initiative. Please direct inquiries to: The Global Initiative against Transnational Organized Crime WMO Building, 2nd Floor 7bis, Avenue de la Paix CH-1211 Geneva 1 Switzerland www.GlobalInitiative.net Acknowledgments This report was authored by Mark Micallef for the Global Initiative, edited by Tuesday Reitano and Laura Adal. Graphics and layout were prepared by Sharon Wilson at Emerge Creative. Editorial support was provided by Iris Oustinoff. Both the monitoring and the fieldwork supporting this document would not have been possible without a group of Libyan collaborators who we cannot name for their security, but to whom we would like to offer the most profound thanks. The author is also thankful for comments and feedback from MENA researcher Jalal Harchaoui. The research for this report was carried out in collaboration with Migrant Report and made possible with funding provided by the Ministry of Foreign Affairs of Norway, and benefitted from synergies with projects undertaken by the Global Initiative in partnership with the Institute for Security Studies and the Hanns Seidel Foundation, the United Nations University, and the UK Department for International Development. About the Author Mark Micallef is an investigative journalist and researcher specialised on human smuggling and trafficking.
    [Show full text]
  • Private Security Contractors in the War on Terrorism: Men of Honor Or Dogs of War?
    PRIVATE SECURITY CONTRACTORS IN THE WAR ON TERRORISM: MEN OF HONOR OR DOGS OF WAR? A Thesis Submitted to the Faculty of The School of Continuing Studies And of The Graduate School of Arts and Sciences In partial fulfillment of the requirements for the Degree of Master of Arts In Social and Public Policy By Joseph W. Boler, B.A. Georgetown University Washington, D.C. 15 April 2010 Copyright 2010 by Joseph W. Boler All Rights Reserved ii PRIVATE SECURITY CONTRACTORS IN THE WAR ON TERRORISM: MEN OF HONOR OR DOGS OF WAR? Joseph W. Boler, B.A. Mentor: Professor R. Nicholas Palarino, Ph.D. ABSTRACT The end of the Cold War and ascendance of Globalization were the catalysts that allowed the transformation of mercenaries into Private Security Corporations (PSCs). This transformation of lone rogue warriors into legitimate corporations specializing in the market of force would have a dramatic and long lasting effect on modern warfare. PSCs, being an integral part of the legitimate use of force by sovereign states, must have mechanisms in place to ensure moral and ethic safeguards, and adherence to international law. Likewise, the Global War on Terrorism ushered in a new era of reliance on PSCs to bridge the security gaps created by a smaller military force being stretched too thin. PSCs were the logical stop gap solution. While they were awarded lucrative contracts, iii little thought was given to oversight of actions by PSCs and their employees. This failure and the lack of legislative or executive branch regulation in a dynamic situation has been much more reactive than proactive, and created a “Wild West” perception that the government has taken remedial steps to correct.
    [Show full text]
  • Downloads/Ctrylst.Txt
    [Type the company name] 1 [Type the document title] T HE S O M A L I I NSURGENCY THE GROWING THREAT O F TERROR’S RESURGENC E Master of Arts in Law and Diplomacy Capstone Project Submitted by Joshua Meservey May 2013 © 2013 Joshua Meservey http://fletcher.tufts.edu Josh Meservey 2 EXECUTIVE SUMMARY 3 A BRIEF HISTORY 6 COLONIZATION 7 DEMOCRACY, DICTATORSHIP, DISINTEGRATION 10 THE ROOTS OF AL-SHABAAB 13 TERRORISM TRIUMPHANT 15 STIRRINGS OF HOPE 16 THE KIDS AREN’T ALRIGHT: AN ANALYSIS OF HARAKAT AL-SHABAAB AL- MUJAHIDEEN 18 IDEOLOGY AND STRUCTURE 18 TRANSNATIONAL TERRORIST LINKS 19 FUNDING 20 RECRUITMENT 27 REASONS FOR AL-SHABAAB’S LOSSES 42 SELF-INFLICTED WOUNDS 42 INTERNATIONAL EFFORTS 54 AL-SHABAAB’S RETURN TO INSURGENCY: HOP LIKE A FLEA 61 “DO YOU REALLY THINK THEY CAN CONTINUE LIKE THAT FOREVER?” 62 SOLUTION: COUNTERINSURGENCY 67 WIN THE PEOPLE 67 GEOGRAPHY, CULTURE, AND HISTORY 71 A COUNTERINSURGENCY REPORT CARD 89 TOO MANY MISTAKES 89 PLANNING: TOO LITTLE, TOO LATE 89 TRAINING: “SHOOT AND DUCK” 92 GOVERNMENT LEGITIMACY: “LEGITIMACY-DEFICIT”? 94 SECURITY: “IT IS HARD NOT TO WORRY” 97 COALITION POLITICS: WITH FRIENDS LIKE THESE 100 TREATMENT OF CIVILIANS: DO NO HARM 104 WHO IS WINNING? 108 THE WAY FORWARD 111 FOR THE SOMALI FEDERAL GOVERNMENT 111 FOR AMISOM AND ETHIOPIA 124 FOR THE UNITED STATES 130 CONCLUSION: DANGEROUS TIMES 139 ADDENDUM: THE WESTGATE MALL ATTACK 141 WORKS CITED 145 Josh Meservey 3 Executive Summary Al-Shabaab’s current fortunes appear bleak. It has been pushed from all of its major strongholds by a robust international effort, and its violent Salafism has alienated many Somalis.
    [Show full text]
  • Pearl Abraham's American Taliban And
    Journal of American Studies, (), , – © Cambridge University Press and British Association for American Studies . This is an Open Access article, distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/./), which permits unrestricted re-use, dis- tribution, and reproduction in any medium, provided the original work is properly cited. doi:./S First published online April Reimagining Traitors: Pearl Abraham’s American Taliban and the Case of John Walker Lindh MARIA-IRINA POPESCU Pearl Abraham’s novel American Taliban uses the “true” story of John Walker Lindh, a white US citizen captured fighting for the Taliban in Afghanistan in ,toreflect on the intense mediation of public trauma in the early days of the “War on Terror.” This article dis- cusses the significance of American Taliban as a post-“/” work of literary fiction which, by imagining individual agency and interrogating the relationship between a racialized “Americanness,” treason and sovereignty, invites its readers to be critical of historical, political and media narratives in the so-called “post-truth era.” At the beginning of December , in a segment of Comedy Central’s The Daily Show titled “Operation Enduring Coverage,” American political satirist Jon Stewart challenged his viewers to “try wrapping [their] spinning heads around this one: meet twenty-year-old John Walker [Lindh], an American citizen turned Taliban soldier, recently captured after the prison uprising in Mazar-e-Sharif.” Stewart was joined by American humorist Maurice “Mo” Rocca, who satirized Lindh’s biography as “a recipe for radical Islamic funda- mentalism. An intelligent child, growing up with not one loving parent, but two loving parents, a family that’s making that difficult transition from upper middle class to lower upper class … it’s textbook, Jon.” Both Department of Literature, Film, and Theatre Studies, University of Essex.
    [Show full text]
  • Isis in the West
    NEW INTERNATIONAL AMERICA SECURITY PETER BERGEN, COURTNEY SCHUSTER, AND DAVID STERMAN ISIS IN THE WEST THE NEW FACES OF EXTREMISM NOVEMBER 2015 About New America About the International Security Program New America is dedicated to the renewal of American The International Security Program aims to provide politics, prosperity, and purpose in the Digital Age. We evidence-based analysis of some of the thorniest carry out our mission as a nonprofit civic enterprise: an questions facing American policymakers and the public. intellectual venture capital fund, think tank, technology The program is largely focused on South Asia and the laboratory, public forum, and media platform. Our Middle East, al-Qaeda and allied groups, the rise of hallmarks are big ideas, impartial analysis, pragmatic political Islam, the proliferation of weapons of mass policy solutions, technological innovation, next destruction (WMD), homeland security, and the activities generation politics, and creative engagement with broad of U.S. Special Forces and the CIA. The program is also audiences. Find out more at newamerica.org/our-story. examining how warfare is changing because of emerging technologies, such as drones, cyber threats, and space- based weaponry, and asking how the nature and global About The Authors spread of these technologies is likely to change the very definition of what war is. Peter Bergen is a print, television and web journalist, documentary producer and the The authors would like to thank Emily Schneider and author or editor of six books, three of which Justin Lynch for their assistance with this research. were New York Times bestsellers and three of which were named among the best non- fiction books of the year by The Washington Post.
    [Show full text]
  • Afghanistan Uncovered Trip Notes
    Afghanistan Uncovered Trip notes: EAXU Validity: 01/01/2011 to 31/12/2011 Revel in Afghanistan’s history, beauty and colour on this comprehensive adventure. Journey from Kabul to the fascinating cities of Herat and Mazar-I Sharif and the breathtaking Panjshir Valley. Visit the ruined Buddhas in Bamiyan and marvel at the turquoise coloured water of the Band-I-Amir lakes. This adventure will see you meeting with US and Afghan forces at a Military Air Base, volunteering at a NGO run refugee centre and working with a Provincial Reconstruction Team (PRT). You will also have the opportunity to go on patrol with the Afghan Army, visit Mujahideen's, spend a few nights in a typical Afghan village and watch a game of Buzkashi. Itinerary Disclaimer The information in this dossier has been compiled with care and is provided in good faith. However it is subject to change and does not form part of the contract between the client and Babel Travel. The itinerary featured is correct at time of printing. Occasionally our itineraries change as we make improvements that stem from past travellers, comments and our own research. Sometimes it can be a small change like adding an extra meal in the itinerary. Sometimes the change may result in us altering the trip for the coming year. Ultimately, our goal is to provide you with the most rewarding experience. VERY IMPORTANT: Please ensure that you print a final copy of your dossier to review a couple of days prior to travel, in case there have been changes that affect your plans.
    [Show full text]
  • 32-GA1-Mercenaries.Pdf
    FHSMUN 32 GENERAL ASSEMBLY FIRST COMMITTEE THE ACTIVITIES AND IMPACTS OF MERCENARIES AND PRIVATE SECURITY COMPANIES Abstract: Private military companies (PMCs) have become increasingly ubiquitous and utilized around the world over the past 15 years. States employ PMCs for a wide variety of military/combat and even civilian administration tasks. Regulation of the activities of PMCs to this point has been minimal to non-existent; the General Assembly First Committee needs to formulate appropriate guidelines for private military companies. “The Security Council expresses its profound concern at the impact of…mercenary activities, on peace and security in West Africa. These contribute to serious violations of human rights and international humanitarian law, which the Council condemns.”1 “Mission: To support national and international security policies that protect those who are defenseless and provide a free voice for all with a dedication to providing ethical, efficient, and effective turnkey solutions that positively impact the lives of those still caught in desperate times.”2 “...if one holds his state on the basis of mercenary arms, he will never be firm or secure; because they are disunited, ambitious, without discipline, unfaithful; gallant among friends, vile among enemies; no fear of God, no faith with men; and one defers ruin insofar as one defers the attack; and in peace you are despoiled by them, in war by the enemy.”3 Introduction Within the United Nations System, the ability to effectively mobilize and monopolize the use of coercive violence is often considered to be at the heart of state sovereignty. As politicians and diplomats exalt state sovereignty, they also frequently heap praise on the most visible symbols of state sovereignty: the armed forces of their respective states.
    [Show full text]
  • Report of the Somalia and Eritrea Monitoring Group
    ADVANCED COPY – CONFIDENTIAL Letter dated 27 June 2012 from the members of the Monitoring Group on Somalia and Eritrea addressed to the Chairman of the Security Council Committee pursuant to resolutions 751 (1992) and 1907 (2009) concerning Somalia and Eritrea We have the honour to transmit herewith the report focusing on Somalia of the Monitoring Group on Somalia and Eritrea in accordance with paragraph 6 (m) of Security Council resolution 2002 (2011). (Signed) Matt Bryden Coordinator Monitoring Group on Somalia and Eritrea (Signed) Emmanuel Deisser Arms Expert (Signed) Aurélien Llorca Aviation Expert (Signed) Jörg Roofthooft Maritime Expert (Signed) Ghassan Schbley Finance Expert (Signed) Babatunde Taiwo Armed Groups Expert (Signed) Kristele Younes Humanitarian Expert ADVANCED COPY - CONFIDENTIAL 2 Report of the Monitoring Group on Somalia and Eritrea pursuant to Security Council resolution 2002 (2011) Contents Page Abbreviations 5 Summary 6 I. Introduction 9 A. Mandate 9 B. Methodology 9 II. Acts that threaten the peace, security and stability of Somalia 11 A. Public sector financial mismanagement and corruption 11 B. Harakaat al-Shabaab al-Mujaahidiin 14 C. Al-Shabaab as a regional and international threat 15 D. Piracy and kidnap for ransom (KFR) 16 III. Violations of the general and complete arms embargo 19 A. Foreign military operations in Somalia 20 B. Private Security Companies (PSCs) 21 C. Private Maritime Security Companies/ Floating Armouries 24 D. Non-compliance 24 IV. Obstruction of Humanitarian Assistance 25 A. Denial of access 25 B. Diversion and misappropriation of humanitarian assistance 26 C. Best practices 27 V. Violations of International Humanitarian Law 27 A. Attacks on civilians 28 B.
    [Show full text]
  • Putting 'Mercenary Masculinities' on the Research Agenda
    Putting ‘Mercenary Masculinities’ on the Research Agenda Paul Higate University of Bristol © Paul Higate School of Sociology, Politics, and International Studies, University of Bristol Working Paper No 03-09 Dr Paul Higate is a senior lecturer in the Department of Politics at the University of Bristol. His research interests include the gendered culture of the military and, most recently, U.N peacekeeping operations in regard to security as theorised through the lenses of space, place, and performance. He is co-author of Insecure Spaces: Peacekeeping, Power and Performance in Haiti, Kosovo and Liberia (Zed, 2009). Work in progress: Please do not cite without author’s permission. Putting ‘Mercenary Masculinities’ on the Research Agenda Abstract: Private Military Security Companies (PMSC) have come increasingly to supplant the activities of regular, national militaries - most notably in such contexts as Iraq and Afghanistan. Though a wide scholarship has addressed questions of legitimacy, regulation and control of PMSCs, critical commentators on gender have almost entirely overlooked the masculinised cultures of these private firms, the majority of which employ former military personnel. This is surprising since masculine norms, values and cultures shape private contractors security practices and can be used to explain human rights abuses, as well as the everyday ways in which these men imagine security. In these terms, the key critical issue concerns what is missed when masculinity is ignored in analyses of PMSCs, a question that is taken up in this working paper within the context of a potential research agenda for this topic of research. 2 Putting ‘Mercenary Masculinities’ on the Research Agenda Paul Higate Contractors Creed I am a U.S.
    [Show full text]