94 research outputs found

    Theory, 'truthers', and transparency: Reflecting on knowledge in the twenty-first century

    Get PDF
    The current era is often described in epistemic terms, as an ‘information age’ or ‘knowledge society’. Such claims reflect ideals that are deeply ingrained in modern societies. There is a widespread assumption that successful social and political interaction involves access to information and that political power is gained when knowledge replaces obscurity. Such assumptions reflect contemporary ‘epistemic folkways’, which are manifested in two widespread epistemic phenomena – faith in ‘transparency’ and conspiracy theorising International Relations (IR) theorists should be well-equipped to understand such developments. However, reflection concerning epistemic matters in IR is in under attack, increasingly presented as a distraction from the formulation of empirically grounded accounts of international politics. This article argues that reflexive theory can in fact play an important role in helping IR scholars to understand contemporary epistemic folkways. Drawing on the Critical Theory of Theodor Adorno, it is argued that the transparency ideal and conspiracy theorising reflect the efforts of individuals to increase their influence in a world in which they are both objects of technical knowledge and, in principle, epistemically empowered subjects. Reflection on the subject-object relationship suggests that the pursuit of increasingly unmediated access to information is in fact a key source of reification and disempowerment

    Security that matters: critical infrastructure and objects of protection

    Get PDF
    Critical infrastructure protection is prominently concerned with objects that appear indispensable for the functioning of social and political life. However, the analysis of material objects in discussions of critical infrastructure protection has remained largely within the remit of managerial responses, which see matter as simply passive, a blank slate. In security studies, critical approaches have focused on social and cultural values, forms of life, technologies of risk or structures of neoliberal globalization. This article engages with the role of "things" or of materiality for theories of securitization. Drawing on the materialist feminism of Karen Barad, it shows how critical infrastructure in Europe neither is an empty receptacle of discourse nor has "essential" characteristics; rather, it emerges out of material-discursive practices. Understanding the securitization of critical infrastructure protection as a process of materialization allows for a reconceptualization of how security matters and its effects

    Generating forms of media capital inside and outside a field: the strange case of David Cameron in the UK political field

    Get PDF
    As societies become more ‘mediated’ so the elevation of public figures is increasingly linked to their ability to generate a positive public profile through the mass media. Politicians, artists, film stars, authors and others each gain professional status, in part, based on how consumer-citizens actively respond to media representations of themselves. The linking of media to individual celebrity and symbolic power is now implicit in much writing. Individuals succeed because of their personal charisma (Weber, 1948) and an innate ability to present a media personality that directly engages with large publics (Ankersmit, 1997; Horton and Wohl, 1993; Pels, 2003; Street, 2003). Alternatively, one’s symbolic image is primarily manufactured by promotional professionals (Boorstin, 1962; Evans, 2005; Franklin, 2004; Hall Jamieson, 1996; Lilleker and LeesMarshment, 2006) and parts of themedia industry itself (Evans and Hesmondhalgh, 2005; Turner, 2004). However one’s public image develops, media exposure then bestows a ‘primary definer’ status on those placed in positions of power thus drawing additional media coverage (Bennett, 1990; Champagne, 2005; Hall et al., 1978, Herman and Chomsky, 2002)

    Belief in Conspiracy Theories and Susceptibility to the Conjunction Fallacy

    Get PDF
    People who believe in the paranormal have been found to be particularly susceptible to the conjunction fallacy. The present research examines whether the same is true of people who endorse conspiracy theories. Two studies examined the association between conspiracist ideation and the number of conjunction violations made in a variety of contexts (neutral, paranormal and conspiracy). Study 1 found that participants who endorsed a range of popular conspiracy theories more strongly also made more conjunction errors than participants with weaker conspiracism, regardless of the contextual framing of the conjunction. Study 2, using an independent sample and a generic measure of conspiracist ideation, replicated the finding that conspiracy belief is associated with domain-general susceptibility to the conjunction fallacy. The findings are discussed in relation to the association between conspiracism and other anomalous beliefs, the representativeness heuristic and the tendency to infer underlying causal relationships connecting ostensibly unrelated events

    Block-Based Discrete Wavelet Transform-Singular Value Decomposition Image Watermarking Scheme Using Human Visual System Characteristics

    Get PDF
    Digital watermarking has been suggested as a way to achieve digital protection. The aim of digital watermarking is to insert the secret data into the image without significantly affecting the visual quality. This study presents a robust block-based image watermarking scheme based on the singular value decomposition (SVD) and human visual system in the discrete wavelet transform (DWT) domain. The proposed method is considered to be a block-based scheme that utilises the entropy and edge entropy as HVS characteristics for the selection of significant blocks to embed the watermark, which is a binary watermark logo. The blocks of the lowest entropy values and edge entropy values are selected as the best regions to insert the watermark. After the first level of DWT decomposition, the SVD is performed on the low-low sub-band to modify several elements in its U matrix according to predefined conditions. The experimental results of the proposed scheme showed high imperceptibility and high robustness against all image processing attacks and several geometrical attacks using examples of standard and real images. Furthermore, the proposed scheme outperformed several previous schemes in terms of imperceptibility and robustness. The security issue is improved by encrypting a portion of the important information using Advanced Standard Encryption a key size of 192-bits (AES-192)

    Conspiracy theory and cognitive style: a worldview.

    Get PDF
    This paper assessed whether belief in conspiracy theories was associated with a particularly cognitive style (worldview). The sample comprised 223 volunteers recruited via convenience sampling and included undergraduates, postgraduates, university employees, and alumni. Respondents completed measures assessing a range of cognitive-perceptual factors (schizotypy, delusional ideation, and hallucination proneness) and conspiratorial beliefs (general attitudes toward conspiracist thinking and endorsement of individual conspiracies). Positive symptoms of schizotypy, particularly the cognitive-perceptual factor, correlated positively with conspiracist beliefs. The best predictor of belief in conspiracies was delusional ideation. Consistent with the notion of a coherent conspiratorial mindset, scores across conspiracy measures correlated strongly. Whilst findings supported the view that belief in conspiracies, within the sub-clinical population, was associated with a delusional thinking style, cognitive-perceptual factors in combination accounted for only 32% of the variance

    Understanding conspiracy theories

    Get PDF
    Scholarly efforts to understand conspiracy theories have grown significantly in recent years, and there is now a broad and interdisciplinary literature that we review in this article. We ask three specific questions. First, what are the factors that are associated with conspiracy theorizing? Our review of the literature shows that conspiracy beliefs result from a range of psychological, political and social factors. Next, how are conspiracy theories communicated? Here, we explain how conspiracy theories are shared among individuals and spread through traditional and social media platforms. Next, what are the risks and rewards associated with conspiracy theories? By focusing on politics and science, we argue that conspiracy theories do more harm than good. Finally, because this is a growing literature and many open questions remain, we conclude by suggesting several promising avenues for future research
    • 

    corecore