15,152 research outputs found
Code, space and everyday life
In this paper we examine the role of code (software) in the spatial formation of
collective life. Taking the view that human life and coded technology are folded into
one another, we theorise space as ontogenesis. Space, we posit, is constantly being
bought into being through a process of transduction – the constant making anew of a
domain in reiterative and transformative practices - as an incomplete solution to a
relational problem. The relational problem we examine is the ongoing encounter
between individuals and environment where the solution, to a greater or lesser extent,
is code. Code, we posit, is diversely embedded in collectives as coded objects, coded
infrastructure, coded processes and coded assemblages. These objects, infrastructure,
processes and assemblages possess technicity, that is, unfolding or evolutive power to
make things happen; the ability to mediate, supplement, augment, monitor, regulate,
operate, facilitate, produce collective life. We contend that when the technicity of
code is operationalised it transduces one of three forms of hybrid spatial formations:
code/space, coded space and backgrounded coded space. These formations are
contingent, relational, extensible and scaleless, often stretched out across networks of
greater or shorter length. We demonstrate the coded transduction of space through
three vignettes – each a day in the life of three people living in London, UK, tracing
the technical mediation of their interactions, transactions and mobilities. We then
discuss how code becomes the relational solution to five different classes of problems
– domestic living, travelling, working, communicating, and consuming
The role of metaphor in shaping the identity and agenda of the United Nations: the imagining of an international community and international threat
This article examines the representation of the United Nations in speeches delivered by its Secretary General. It focuses on the role of metaphor in constructing a common ‘imagining’ of international diplomacy and legitimising an international organisational identity. The SG legitimises the organisation, in part, through the delegitimisation of agents/actions/events constructed as threatening to the international community and to the well-being of mankind. It is a desire to combat the forces of menace or evil which are argued to motivate and determine the organisational agenda. This is predicated upon an international ideology of humanity in which difference is silenced and ‘working towards the common good’ is emphasised. This is exploited to rouse emotions and legitimise institutional power. Polarisation and antithesis are achieved through the employment of metaphors designed to enhance positive and negative evaluations. The article further points to the constitutive, persuasive and edifying power of topic and situationally-motivated metaphors in speech-making
Recommended from our members
E-learning for Networked Living
Networked Living is a Level 1 course in Information and Communication Technologies (ICT) offered by the UK Open University. The first two presentation of the course, in 2005 and 2006, attracted over 3000 students between them. Networked Living introduces students to ICT concepts and issues in a range of contexts. The course adopts a blended learning approach, using printed texts, web resources, DVD and computer conferencing.
All the above media are used where appropriate to support students' learning. About 60% of the material is print-based – teaching texts, together with selected third-party articles. About 20% is web-based – using a comprehensive course web site, but also requiring students to find and use third-party sites. The remaining 20% is based on offline computer resources (e.g. spreadsheets) and collaborative activities using computer conferencing.
The course web site contains short animations, quizzes and several interactive activities where students contribute information and commentaries, and can then see the collated contributions of other students. The DVD contains longer animations, simulations and software. Computer conferencing is used for tutor-group and whole-cohort conferences, and for online tutorials, with both asynchronous and synchronous discussion. The course web site provides a new, shareable 'online journal' facility, where students can record their work for the course.
This paper discusses the various e-learning elements of Networked Living, based on the first two presentations of the course. The paper considers how e-learning can be combined with printed resources to create a successful blended learning experience for students
Visual analytics: The role of design and art in the emerging field of big data
Driven by the increasing complexity of data sets the need for sophisticated analytics algorithms coupled with visualization of both data and information is growing exponentially in every discipline and industry. Artists, designers and visual thinkers have an important role to play in the presentation and interpretation of data. The Visual Analytics Lab (VAL) at OCAD University is a preeminent research lab for innovation and training in information and scientific visualization and visual analytics. As well as its perspective on the field, two brief case studies are provided, one for health care and the second for media navigation and analysi
Exploring narrativity in data visualization in journalism
Many news stories are based on data visualization, and storytelling with data has become a buzzword in journalism. But what exactly does storytelling with data mean? When does a data visualization tell a story? And what are narrative constituents in data visualization? This chapter first defines the key terms in this context: story, narrative, narrativity, showing and telling. Then, it sheds light on the various forms of narrativity in data visualization and, based on a corpus analysis of 73 data visualizations, describes the basic visual elements that constitute narrativity: the instance of a narrator, sequentiality, temporal dimension, and tellability. The paper concludes that understanding how data are transformed into visual stories is key to understanding how facts are shaped and communicated in society
Engagement markers in research project websites: Promoting interactivity and dialogicity
Scholars are currently not only required to produce primary output, i.e. peer-reviewed research articles, chapters or books, which constitutes certified and legitimised knowledge (Puschmann 2015), but also to disseminate such output, which is frequently carried out digitally and in English. In this context it is the aim of this paper to gain insights into scholars'' digital discursive practices by analysing academic websites of research projects funded under the European H2020 programme. More specifically, it explores the ways in which a potentially wide, blurred audience is addressed by means of engagement markers, particularly, reader pronouns, questions, and directives, including imperatives, obligation modals and adjectival phrases expressing necessity. Results indicate that the frequency of use of engagement markers varies across websites and that it may affect their degree of potential interactivity. They further show that some engagement markers are more common than others and that they tend to display specific rhetorical purposes. Differences on their use and function when compared to their use in RA writing are also shown. It is concluded that these interpersonality features have an important role in the potential promotion of dialogicity in this digital medium, and crafting an effective professional identity of the research teams
Recommended from our members
Proceedings ICPW'07: 2nd International Conference on the Pragmatic Web, 22-23 Oct. 2007, Tilburg: NL
Proceedings ICPW'07: 2nd International Conference on the Pragmatic Web, 22-23 Oct. 2007, Tilburg: N
Time well spent”: the ideology of temporal disconnection as a means for digital wellbeing
After facing an intense negative reaction to their accumulation of social, political, and economic power and influence, several tech and social media companies rolled out “digital wellbeing” tools during the second half of 2018. This article examines the technological and discursive construction of “digital wellbeing” as enacted through operating system-based tools (Screen Time and Do Not Disturb— iOS, Digital Wellbeing—Android, My Analytics—Microsoft), and social media platforms application functions (Your Time—Facebook, Time Watched—YouTube, Your Activity—Instagram). While the companies’ discourse deploys an imaginary centered around ethics and a normative experience accentuating the willfulness and empowerment of the user, the socio-material analysis of the interfaces and features shows that they envisage simple, familiar, and limited possibilities of disconnecting. Therefore, agency is limited, and the wellbeing outcomes are indeterminate, restricted to quantifying time or controlling the intentionality of connectivity
Cyber-Democracy or Cyber-Hegemony? Exploring the Political and Economic Structures of the Internet as an Alternative Source of Information
Although government regulation of the Internet has been decried as undercutting
free speech, the control of Internet content through capitalist
gateways???namely, profit-driven software companies???has gone largely
uncriticized. The author argues that this discursive trend manufactures
consent through a hegemonic force neglecting to confront the invasion of
online advertising or marketing strategies directed at children. This study
suggests that ???inappropriate content??? (that is, nudity, pornography, obscenities)
constitutes a cultural currency through which concerns and responses
to the Internet have been articulated within the mainstream. By examining
the rhetorical and financial investments of the telecommunications
business sector, the author contends that the rhetorical elements creating
???cyber-safety??? concerns within the mainstream attempt to reach the consent
of parents and educators by asking them to see some Internet content as
value laden (sexuality, trigger words, or adult content), while disguising
the interests and authority of profitable computer software and hardware
industries (advertising and marketing). Although most online ???safety measures???
neglect to confront the emerging invasion of advertising/marketing
directed at children and youth, the author argues that media literacy in
cyberspace demands such scrutiny. Unlike measures to block or filter online
information, students need an empowerment approach that will enable
them to analyze, evaluate, and judge the information they receive.published or submitted for publicatio
- …