215 research outputs found

    Restricting digital sites of dissent: commercial social media and free expression

    Get PDF
    The widespread use of commercial social media platforms by protesters and activists has enhanced protest mobilisation and reporting but it has placed social media providers in the intermediary role as facilitators of dissent and has thereby created new challenges. Companies like Google and Facebook are increasingly restricting content that is published on or distributed through their platforms; they have been subject to obstruction by governments; and their services have been at the core of large-scale data collection and surveillance. This article analyses and categorises forms of infrastructure-based restrictions on free expression and dissent. It shows how private intermediaries have been incorporated into state-led content policies; how they set their own standards for legitimate online communication and intervene accordingly; and how state-based actions and commercial self-regulation intersect in the specific area of online surveillance. Based on a broad review of cases, it situates the role of social media in the wider trend of the privatisation of communications policy and the complex interplay between state-based regulation and commercial rule-making

    ‘Hacking multitude’ and Big Data: Some insights from the Turkish ‘digital coup’

    Get PDF
    The paper presents my first findings and reflections on how ordinary people may opportunistically and unpredictably respond to Internet censorship and tracking. I try to capture this process with the concept of ‘hacking multitude'. Working on a case study of the Turkish government's block of the social media platform Twitter (March 2014), I argue that during systemic data choke-points, a multitude of users might acquire a certain degree of reflexivity over ubiquitous software of advanced techno-capitalism. Resisting naïve parallels between urban streets and virtual global streets, the article draws on Fuller's ‘media ecologies' to make sense of complex and dynamic interactions between processes and materialities, strategies of communication and mundane practices. Such a dense space is mostly invisible to network and traffic analysis, although it comes alive under the magnifying lens of digital ethnography. As the Turkish government tried to stop protesters on both the urban and the Twitter spheres, alternative material configurations and new hybrid formations and practices emerged. I try to bring this process alive following the traces – that is, a combination of digital data and materialities – of a social space between the protest for Twitter access, the ‘digital coup' and the interactions that this situation determined. In the final section, I briefly explore two research trajectories which can further develop my initial formulation of a ‘hacking multitude'. I argue that a generalisation of hacking/multitude is problematic for the political, cultural or economic processes more directly associated with Big Data

    The environmental security debate and its significance for climate change

    Get PDF
    Policymakers, military strategists and academics all increasingly hail climate change as a security issue. This article revisits the (comparatively) long-standing “environmental security debate” and asks what lessons that earlier debate holds for the push towards making climate change a security issue. Two important claims are made. First, the emerging climate security debate is in many ways a re-run of the earlier dispute. It features many of the same proponents and many of the same disagreements. These disagreements concern, amongst other things, the nature of the threat, the referent object of security and the appropriate policy responses. Second, given its many different interpretations, from an environmentalist perspective, securitisation of the climate is not necessarily a positive development

    Phosphodiesterase-5 inhibitors have distinct effects on the hemodynamics of the liver

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>The NO - cGMP system plays a key role in the regulation of sinusoidal tonus and liver blood flow with phosphodiesterase-5 (PDE-5) terminating the dilatory action of cGMP. We, therefore, investigated the effects of PDE-5 inhibitors on hepatic and systemic hemodynamics in rats.</p> <p>Methods</p> <p>Hemodynamic parameters were monitored for 60 min. after intravenous injection of sildenafil and vardenafil [1, 10 and 100 μg/kg (sil1, sil10, sil100, var1, var10, var100)] in anesthetized rats.</p> <p>Results</p> <p>Cardiac output and heart rate remained constant. After a short dip, mean arterial blood pressure again increased. Systemic vascular resistance transiently decreased slightly. Changes in hepatic hemodynamic parameters started after few minutes and continued for at least 60 min. Portal (var10 -31%, sil10 -34%) and hepatic arterial resistance (var10 -30%, sil10 -32%) decreased significantly (p < 0.05). At the same time portal venous (var10 +29%, sil10 +24%), hepatic arterial (var10 +34%, sil10 +48%), and hepatic parenchymal blood flow (var10 +15%, sil10 +15%) increased significantly (p < 0.05). The fractional liver blood flow (total liver flow/cardiac output) increased significantly (var10 26%, sil10 23%). Portal pressure remained constant or tended to decrease. 10 μg/kg was the most effective dose for both PDE-5 inhibitors.</p> <p>Conclusion</p> <p>Low doses of phosphodiesterase-5 inhibitors have distinct effects on hepatic hemodynamic parameters. Their therapeutic use in portal hypertension should therefore be evaluated.</p

    The structure of SgrAI bound to DNA; recognition of an 8 base pair target

    Get PDF
    The three-dimensional X-ray crystal structure of the ‘rare cutting’ type II restriction endonuclease SgrAI bound to cognate DNA is presented. SgrAI forms a dimer bound to one duplex of DNA. Two Ca2+ bind in the enzyme active site, with one ion at the interface between the protein and DNA, and the second bound distal from the DNA. These sites are differentially occupied by Mn2+, with strong binding at the protein–DNA interface, but only partial occupancy of the distal site. The DNA remains uncleaved in the structures from crystals grown in the presence of either divalent cation. The structure of the dimer of SgrAI is similar to those of Cfr10I, Bse634I and NgoMIV, however no tetrameric structure of SgrAI is observed. DNA contacts to the central CCGG base pairs of the SgrAI canonical target sequence (CR|CCGGYG, | marks the site of cleavage) are found to be very similar to those in the NgoMIV/DNA structure (target sequence G|CCGGC). Specificity at the degenerate YR base pairs of the SgrAI sequence may occur via indirect readout using DNA distortion. Recognition of the outer GC base pairs occurs through a single contact to the G from an arginine side chain located in a region unique to SgrAI

    A genealogy of hacking

    Get PDF
    Hacking is now a widely discussed and known phenomenon, but remains difficult to define and empirically identify because it has come to refer to many different, sometimes incompatible, material practices. This paper proposes genealogy as a framework for understanding hacking by briefly revisiting Foucault’s concept of genealogy and interpreting its perspectival stance through the feminist materialist concept of the situated observer. Using genealogy as a theoretical frame a history of hacking will be proposed in four phases. The first phase is the ‘pre-history’ of hacking in which four core practices were developed. The second phase is the ‘golden age of cracking’ in which hacking becomes a self-conscious identity and community and is for many identified with breaking into computers, even while non-cracking practices such as free software mature. The third phase sees hacking divide into a number of new practices even while old practices continue, including the rise of serious cybercrime, hacktivism, the division of Open Source and Free Software and hacking as an ethic of business and work. The final phase sees broad consciousness of state-sponsored hacking, the re-rise of hardware hacking in maker labs and hack spaces and the diffusion of hacking into a broad ‘clever’ practice. In conclusion it will be argued that hacking consists across all the practices surveyed of an interrogation of the rationality of information techno-cultures enacted by each hacker practice situating itself within a particular techno-culture and then using that techno-culture to change itself, both in changing potential actions that can be taken and changing the nature of the techno-culture itself

    Supportive interventions to improve physiological and psychological health outcomes among patients undergoing cystectomy: A systematic review

    Get PDF
    Background Our understanding of effective perioperative supportive interventions for patients undergoing cystectomy procedures and how these may affect short and long-term health outcomes is limited. Methods Randomised controlled trials involving any non-surgical, perioperative interventions designed to support or improve the patient experience for patients undergoing cystectomy procedures were reviewed. Comparison groups included those exposed to usual clinical care or standard procedure. Studies were excluded if they involved surgical procedure only, involved bowel preparation only or involved an alternative therapy such as aromatherapy. Any short and long-term outcomes reflecting the patient experience or related urological health outcomes were considered. Results 19 articles (representing 15 individual studies) were included for review. Heterogeneity in interventions and outcomes across studies meant meta-analyses were not possible. Participants were all patients with bladder cancer and interventions were delivered over different stages of the perioperative period. The overall quality of evidence and reporting was low and outcomes were predominantly measured in the short-term. However, the findings show potential for exercise therapy, pharmaceuticals, ERAS protocols, psychological/educational programmes, chewing gum and nutrition to benefit a broad range of physiological and psychological health outcomes. Conclusions Supportive interventions to date have taken many different forms with a range of potentially meaningful physiological and psychological health outcomes for cystectomy patients. Questions remain as to what magnitude of short-term health improvements would lead to clinically relevant changes in the overall patient experience of surgery and long-term recovery
    corecore