The study of social problems using the analysis of the public sphere gained scientific legitimacy with the constructivist approach during the era when television was the predominant medium. The ...advent of social media has transformed the public space, altering the way in which discussions concerning social issues are organized. This article examines the advantages and limitations of constructivism in studying social problems and the elements constituting public discussions on social media. We searched whether analyzing public discourse could reveal the persistence of social issues. To exemplify the use of this method for studying discussions on social media, we analyzed how network users discussed the issue of personnel shortages, from November 2022 to February 2023. During this period, the most pressing issues proved to be shortages of professionals in healthcare, housing and communal services, secondary education, transport, defense industry and IT sectors. The research indicates that a crucial marker of a persistent social problem in people’s daily lives is the involvement of “ordinary” citizens as speakers who draw significant attention to the issue. This finding corroborates the democratizing impact of social media on the structure of the public sphere.
We study the problem of information-theoretically secure secret key agreement under the well-known source model and channel model. In both of these models, multiple terminals wish to create a shared ...secret key that is secure from a passive eavesdropper. The terminals have access to a noiseless public communication channel and an additional resource that depends on the model. In the source model, the resource is an external source that repeatedly beams correlated randomness to the terminals; whereas in the channel model, the resource is a secure but noisy discrete memoryless broadcast channel. We derive new lower and upper bounds on the secret key capacity under both the source model and the channel model. The technique used for deriving our bound for the source model is to find certain properties of functions of joint probability distributions which, applied to the joint distribution of the source, will imply that they dominate the secret key capacity, and then prove the bound by a verification argument. A similar technique is used for the channel model. Finally, we also define a problem of communication for omniscience by a neutral observer and establish the equivalence between this new problem and the problem of secret key agreement. This generalizes an earlier result of Csiszár and Narayan.
The article examines the issue of Russian automobile transport’s dependence on foreign purchases during the First World War and the absence of a developed domestic automotive industry. For the first ...time, this question is explored through the prism of discussions held at public organization meetings, in the State Duma, and in the pages of periodicals. Special attention is paid to the importance of automobiles during the war, criticism of the existing situation in the automotive transport sector, the inadmissibility of its complete dependence on foreign states, and the necessity of import substitution through the creation of domestic automobile plants and related enterprises. New sources are introduced into the scholarly discourse, allowing for a more comprehensive understanding of both the problems that have arisen in the field of automobile transport and their perception by Russian society. It is noted that, despite differences in approaches to organizing the domestic automotive industry, participants in the public discussion unanimously agreed on the need to overcome the situation that existed before the war, the inadmissibility of total dependence on foreign supplies in a matter of great importance to military affairs, and the urgency of developing national production of automobile transport on a state scale.
The problem of the dependence of Russian railway transport on foreign supplies during the First World War is considered. For the first time, this issue is revealed through the prism of a public ...discussion, which was conducted on the pages of the Russian periodical press on the issues of American procurement for railways. Particular attention is paid to criticism of the current situation in the field of railway transport, the danger of dependence of the Russian industry on foreign powers (both hostile, neutral and allied) and the need for import substitution. New sources are introduced into scientific circulation (materials of the periodical press, transcripts of meetings of the State Duma), which make it possible to get a more complete picture of both the problems that have developed in the field of railway transport and their perception in Russian society. It is noted that despite the positive attitude of the press to the establishment of commercial and industrial relations with America, many publicists and politicians noted that the replacement of German capital and industrial goods with American ones posed no less danger for Russia in the future, which could only be avoided through the development of national production.
We derive single-letter characterizations of (strong) secrecy capacities for models with an arbitrary number of terminals, each of which observes a distinct component of a discrete memoryless ...multiple source, with unrestricted and interactive public communication permitted between the terminals. A subset of these terminals can serve as helpers for the remaining terminals in generating secrecy. According to the extent of an eavesdropper's knowledge, three kinds of secrecy capacity are considered: secret key (SK), private key (PK), and wiretap secret key (WSK) capacity. The characterizations of the SK and PK capacities highlight the innate connections between secrecy generation and multiterminal source coding without secrecy requirements. A general upper bound for WSK capacity is derived which is tight in the case when the eavesdropper can wiretap noisy versions of the components of the underlying multiple source, provided randomization is permitted at the terminals. These secrecy capacities are seen to be achievable with noninteractive communication between the terminals. The achievability results are also shown to be universal.
The concept of the public domain is one of the concepts derived from the modern epistemic system, which is closely linked to the fundamental rights and freedoms of citizens, including freedom of ...speech, freedom of opinion, the right to engage citizens in the field of public affairs, and the right to organize, from the point of view of social science experts. The departure and the base for the realization of the people's religion are considered. Studies carried out in the spirit of expert thought, Jürgen Habermas, suggest that the acceptance of the relativity of facts and the ability to critique and change all the propositions are related to the social life, forms the essence of the theory of the public domain and the general discussion. Without any intention to rate the epistemic universe, the approach of writing suggests that the school system and the ideological nature of the political system, which are based on the various principles of the constitution, makes it impossible to fully reconcile the general sphere
The author’s hypothesis investigated in this article is connected with the statement about the imbalance in the practical implementation of the principles and priorities of the concept of open ...government in Russia and the need to study the institutional causes of this imbalance. The purpose of the study is to develop conceptual proposals, the implementation of which will help to smooth out and eliminate the imbalances noted above in development. The article on the one hand, notes the clear achievements in solving many technical and technological problems that have recently hampered the formation of e — government, edemocracy, open government. These include only a partial solution at the state level of the problem of functioning of a convenient and legally signifcant system of identifcation of citizens in the electronic environment, the rating of the functioning of the elements of the electronic democracy and the lack of real interest of citizens to participate in decision-making by public authorities, often narrowing in practice the principles of the concept of “Open Government” to the task of ensuring the openness of data. The identified successes and problems in the formation and development of open government elements allow the authors to offer and justify their vision of promising directions for the practical implementation of the concept of “Open Government” in the Russian Federation. Among them: the need of developing and implementing mechanisms to ensure the mandatory participation of a significant number of the country’s citizens in the public discussion of issues directly affecting their interests, their mandatory direct impact on the adoption of socially significant decisions; the expansion of the use of crowdsourcing as an effective, economic and socially effective tool for involving citizens in socially aware decision-making.
A Reproducible IT-Blog Corpus Barbaresi, Adrien; Pohlmann, Jens
Journal of open humanities data,
07/2021, Letnik:
7
Journal Article
Recenzirano
Odprti dostop
The dataset comprises text and metadata extracted from several hundred IT-blogs and websites, along with a method to duplicate the data by updating its contents and downloading it to the user’s local ...machine. The targets have been hand-picked with the intention to represent the discourse on blogs and websites dedicated to questions at the intersection of technology and society from Germany and the United States of America. The texts have been retrieved by web crawling techniques. The resulting corpus is accessible through a search platform and also reproducible with freely accessible descriptors and software.
This paper investigates generation of a secret key from a reciprocal wireless channel. In particular we consider wireless channels that exhibit sparse structure in the wideband regime and study the ...impact of sparsity on the secret key capacity. We explore this problem in two steps. First, we study key generation from a state-dependent discrete memoryless multiple source. The state of the source captures the effect of channel sparsity. Secondly, we consider a wireless channel model that captures channel sparsity and correlation between the legitimate users' channel and the eavesdropper's channel. Such dependency can significantly reduce the secret key capacity. According to system delay requirements, two performance measures are considered: (i) ergodic secret key capacity and (ii) outage probability. We show that in the wideband regime when a white sounding sequence is adopted, a sparser channel can achieve a higher ergodic secret key rate than a richer channel can. For outage performance, we show that if the users generate secret keys at a fraction of the ergodic capacity, the outage probability will decay exponentially in signal bandwidth. Moreover, a larger exponent is achieved by a richer channel.