2018
DOI: 10.1108/k-04-2017-0145
|View full text |Cite
|
Sign up to set email alerts
|

A system-cybernetic approach to the study of political power. Introductory remarks

Abstract: Purpose This paper aims to provide introductory conceptual tools for studying political power in a complex multi-level environment. In particular, it is intended to answer the question of how concepts provided by cybernetics and general systems theory (GST) could serve to foster the study of political power. Design/methodology/approach The objective is realized through a reconsideration of a set of the basic concepts of cybernetics, GST and political science. Two system identification models – black box and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 31 publications
0
2
0
Order By: Relevance
“…It is critical to give annotators clear instructions based on the characteristics that define cyberbullying (i.e., intentionality, repetition, aggression, and peer conduct), as well as to guarantee that the annotators are specialists in the area of cyberbullying [51][52][53][54]. Furthermore, data extraction from users should be acquired through peers, and users' privacy should be prioritized during this process [55]. In addition, methods should be created to try to capture the context and nature of the players' relationships in a cyberbullying incident, since this is a critical component in identifying deliberate damage and repeated aggressions among peers [56].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…It is critical to give annotators clear instructions based on the characteristics that define cyberbullying (i.e., intentionality, repetition, aggression, and peer conduct), as well as to guarantee that the annotators are specialists in the area of cyberbullying [51][52][53][54]. Furthermore, data extraction from users should be acquired through peers, and users' privacy should be prioritized during this process [55]. In addition, methods should be created to try to capture the context and nature of the players' relationships in a cyberbullying incident, since this is a critical component in identifying deliberate damage and repeated aggressions among peers [56].…”
Section: Discussionmentioning
confidence: 99%
“…The definition of the emotional component of the text is used to study various forms and manifestations of online aggressiveness: trolling [38,45], verbal hostility [39,[46][47][48], cyberbullying through mobile applications [34,41,49], various types of manipulation [50][51][52], inciting discord [53], etc. The network component of such a form of offline aggression as mass protest is the subject of a complex method of cybermetry, or cybermetric analysis [54][55][56]. Cybermetry is used for segmenting information flows based on search queries and marker dictionaries; in total, the study includes dictionaries of markers of 14 types of social media documents according to the degree of the radicalism of protest attitudes and message objects expressed in them.…”
Section: Machine Learningmentioning
confidence: 99%
“…An operational definition consists of a set of instructions regarding how to measure variables that have been defined conceptually. Variables must be defined operationally so that it is easier to find the relationship between one variable and other variables (Kasianiuk, 2018). Without operational variables, researchers will experience difficulties in determining relationships between variables that are still conceptual (Mery & Pedreschi, 2005).…”
Section: E Operational Definitionmentioning
confidence: 99%