999 resultados para Critical election
Resumo:
Ce mémoire s’intéresse au concept de crise, économique et politique, comme source de changement idéologique et politique. Au travers de l’étude de l’austérité économique, il sera possible d’identifier des différences majeures entre deux épisodes de troubles économiques importants, la Grande Dépression et la Grande Récession. Alors que la Grande Dépression est caractérisée par une double crise, économique et politique, la Grande Récession, elle, demeure un choc essentiellement économique. L’absence de contagion dans le système politique explique la ténacité d’une idée comme l’austérité, de retour depuis la révolution néolibérale des années 80. L’austérité économique s’est adaptée et s’aligne maintenant aux intérêts d’une frange importante de la coalition démocrate. La persistance de l’allure des coalitions politiques depuis le dernier grand réalignement témoigne de l’absence de transformation majeure du mode d’action étatique, ce qui constitue une différence importante entre les deux crises.
Resumo:
Ce mémoire s’intéresse au concept de crise, économique et politique, comme source de changement idéologique et politique. Au travers de l’étude de l’austérité économique, il sera possible d’identifier des différences majeures entre deux épisodes de troubles économiques importants, la Grande Dépression et la Grande Récession. Alors que la Grande Dépression est caractérisée par une double crise, économique et politique, la Grande Récession, elle, demeure un choc essentiellement économique. L’absence de contagion dans le système politique explique la ténacité d’une idée comme l’austérité, de retour depuis la révolution néolibérale des années 80. L’austérité économique s’est adaptée et s’aligne maintenant aux intérêts d’une frange importante de la coalition démocrate. La persistance de l’allure des coalitions politiques depuis le dernier grand réalignement témoigne de l’absence de transformation majeure du mode d’action étatique, ce qui constitue une différence importante entre les deux crises.
Resumo:
This paper draws on a larger study of the uses of Australian user-created content and online social networks to examine the relationships between professional journalists and highly engaged Australian users of political media within the wider media ecology, with a particular focus on Twitter. It uses an analysis of topic based conversation networks using the #ausvotes hashtag on Twitter around the 2010 federal election to explore the key themes and issues addressed by this Twitter community during the campaign, and finds that Twitter users were largely commenting on the performance of mainstream media and politicians rather than engaging in direct political discussion. The often critical attitude of Twitter users towards the political establishment mirrors the approach of news and political bloggers to political actors, nearly a decade earlier, but the increasing adoption of Twitter as a communication tool by politicians, journalists, and everyday users alike makes a repetition of the polarisation experienced at that time appear unlikely.
Resumo:
The internet has become important in political communication in Australia. Using Habermas' ideal types, it is argued that political blogs can be viewed as public spheres that might provide scope for the expansion of deliberative democratic discussion. This hypothesis is explored through analysis of the group political blog Pineapple Party Time. It is evident that the bloggers and those who commented on their posts were highly knowledgeable about and interested in politics. Form an examination of these posts and the comments on them, Pineapple Party Time did act as a public sphere to some degree, and did provide for the deliberative discussion essential for a democracy, but it was largely restricted to Crikey readers. For a deliberative public sphere and democratic discussion to function to any extent, the public sphere must be open to all citizens, who need to have the access and knowledge to engage in deliberative discussion.
Resumo:
After the 10th Iranian Presidential election on June 12, 2009, several public opinion polls taken in Iran attracted the attention of policy-makers and journalists around the world because of the political crisis that followed. In this paper I first review critically the polls conducted by the WPO (WorldPublicOpinion.org), PIPA (Program on International Policy Attitudes) at the University of Maryland. I also review an essay by Steven Kull, which is based on the aforementioned poll results and which in my opinion leads to false conclusions concerning Iran’s political prospects. I also discuss “An Analysis of Multiple Polls of the Iranian Public,” published by WPO-PIPA on February 3 2010. The present paper arrives at the overall conclusion that it is impossible to obtain an accurate image of political opinions in societies as complicated as that of Iran by concentrating on only one technique of research and analysis, especially when the political and social situation in the society concerned is in a state of constant flux.
Resumo:
In this article, the author discusses how she applied autoethnography in a study of the design of hypermedia educational resources and shows how she addressed problematic issues related to autoethnographic legitimacy and representation. The study covered a 6-year period during which the practitioner’s perspective on the internal and external factors influencing the creation of three hypermedia CD-ROMs contributed to an emerging theory of design. The author highlights the interrelationship between perception and reality as vital to qualitative approaches and encourages researchers to investigate their reality more fully by practicing the art of autoethnography.
Resumo:
This paper identifies a number of critical infrastructure applications that are reliant on location services from cooperative location technologies such as GPS and GSM. We show that these location technologies can be represented in a general location model, such that the model components can be used for vulnerability analysis. We perform a vulnerability analysis on these components of GSM and GPS location systems as well as a number of augmentations to these systems.