5 resultados para Crowd Formations
em WestminsterResearch - UK
Resumo:
This article presents a critical discussion of Jodi Dean’s (2016) book “Crowds and Party”. I pay particular attention to her discussion of crowds and the Communist Party that is influenced by psychoanalysis. Dean has put forward an important argument for the affectivity within crowds that may be transformed into a Communist Party that is characterised by a similar affective infrastructure. I suggest that Dean’s discussion of affect is slightly vague at times and may be supplemented with Sigmund Freud’s work on affect. In contrast to Dean, who stresses the collectivity and deindividuation of the crowd, I argue that the crowd needs to be thought of as a place where individuality and collectivity come together and remain in tension. Such a tension may then be managed by the Party, as Dean illustrates.
Resumo:
Cappadocian Greek is reported to display agglutinative inflection in its nominal system, namely, mono-exponential formatives for the marking of case and number, and NOM.SG-looking forms as the morphemic units to which inflection applies. Previous scholarship has interpreted these developments as indicating a shift in morphological type from fusion to agglutination, brought about by contact with Turkish. This study takes issue with these conclusions. By casting a wider net over the inflectional system of the language, it shows that, of the two types of agglutinative formations identified, only one evidences a radical departure from the inherited structural properties of Cappadocian noun inflection. The other, on the contrary, represents a typologically more conservative innovation. The study presents evidence that a combination of system-internal and -external motivations triggered the development of both types, it describes the mechanisms through which the innovation was implemented, and discusses the factors that favoured change.
Resumo:
The recent sacking of the eminent scientist Tim Hunt from one of the UK’s leading research institutions is only the latest in a series of cases where public individuals have been derided for comments made in jest on social media, with serious consequences for their professional and personal lives. This article discusses the case of Tim Hunt as an example of the extent to which the privileging of the correct over the true which has long pervaded media discourse is taken to the extreme by the instant-response culture of social media. It points to the emergence of a new form of instantaneity enabled by these networked forms of communication that serves to reinforce systemic inaction rather than the change widely associated with these technologies. It draws on philosophy and Critical Theory as useful conceptual frameworks for highlighting the ways in which Twitter & co. increasingly call us to action but crowd out thought, thereby passing over opportunities for real social change.
Resumo:
The broad capabilities of current mobile devices have paved the way for Mobile Crowd Sensing (MCS) applications. The success of this emerging paradigm strongly depends on the quality of received data which, in turn, is contingent to mass user participation; the broader the participation, the more useful these systems become. However, there is an ongoing trend that tries to integrate MCS applications with emerging computing paradigms such as cloud computing. The intuition is that such a transition can significantly improve the overall efficiency while at the same time it offers stronger security and privacy-preserving mechanisms for the end-user. In this position paper, we dwell on the underpinnings of incorporating cloud computing techniques to facilitate the vast amount of data collected in MCS applications. That is, we present a list of core system, security and privacy requirements that must be met if such a transition is to be successful. To this end, we first address several competing challenges not previously considered in the literature such as the scarce energy resources of battery-powered mobile devices as well as their limited computational resources that they often prevent the use of computationally heavy cryptographic operations and thus offering limited security services to the end-user. Finally, we present a use case scenario as a comprehensive example. Based on our findings, we posit open issues and challenges, and discuss possible ways to address them, so that security and privacy do not hinder the migration of MCS systems to the cloud.