14 research outputs found

    Occupy: in theory and practice

    Get PDF
    This paper situates the discourse of the Occupy movement within the context of radical political philosophy. Our analysis takes place on two levels. First, we conduct an empirical analysis of the ‘official’ publications of Occupy Wall Street (OWS) and Occupy London (OL). Operationalising core concepts from the framing perspective within social movement theory, we provide a descriptive-comparative analysis of the ‘collective action frames’ of OWS and OL. Second, we consider the extent to which radical political philosophy speaks to the discourse of Occupy. Our empirical analysis reveals that both movements share diagnostic frames, but there were notable differences in terms of prognostic framing. The philosophical discussion suggests that there are alignments between anarchist, post-anarchist and post-Marxist ideologies at the level of both identity and strategy. Indeed, the absence of totalising anti-capitalist or anti-statist positions in Occupy suggests that – particularly with Occupy London – alignments are perhaps not so distant from typically social democratic demands

    Simple Nudges for Better Password Creation

    Get PDF
    Recent security breaches have highlighted the consequences of reusing passwords across online accounts. Recent guidance on password policies by the UK government recommend an emphasis on password length over an extended character set for generating secure but memorable passwords without cognitive overload. This paper explores the role of three nudges in creating website-specific passwords: financial incentive (present vs absent), length instruction (long password vs no instruction) and stimulus (picture present vs not present). Mechanical Turk workers were asked to create a password in one of these conditions and the resulting passwords were evaluated based on character length, resistance to automated guessing attacks, and time taken to create the password. We found that users created longer passwords when asked to do so or when given a financial incentive and these longer passwords were harder to guess than passwords created with no instruction. Using a picture nudge to support password creation did not lead to passwords that were either longer or more resistant to attacks but did lead to account-specific passwords

    The Global Justice Movement

    Full text link

    Tipping point analysis of ocean acoustic noise

    Full text link
    We apply tipping point analysis to a large record of ocean acoustic data to identify the main components of the acoustic dynamical system and study possible bifurcations and transitions of the system. The analysis is based on a statistical physics framework with stochastic modelling, where we represent the observed data as a composition of deterministic and stochastic components estimated from the data using time-series techniques. We analyse long-term and seasonal trends, system states and acoustic fluctuations to reconstruct a one-dimensional stochastic equation to approximate the acoustic dynamical system. We apply potential analysis to acoustic fluctuations and detect several changes in the system states in the past 14 years. These are most likely caused by climatic phenomena. We analyse trends in sound pressure level within different frequency bands and hypothesize a possible anthropogenic impact on the acoustic environment. The tipping point analysis framework provides insight into the structure of the acoustic data and helps identify its dynamic phenomena, correctly reproducing the probability distribution and scaling properties (power-law correlations) of the time series
    corecore