The Power of Large-Scale Interactions Through Information Technologies and Changes in Cultural Identity Politics

Author(s):  
J. P. Singh
Author(s):  
Oli Wilson

This chapter explores how the New Zealand popular music artist Tiki Taane subverts dominant representational practices concerning New Zealand cultural identity by juxtaposing musical ensembles, one a ‘colonial’ orchestra, the other a distinctively Māori (indigenous New Zealand) kapa haka performance group, in his With Strings Attached: Alive & Orchestrated album and television documentary, released in 2014. Through this collaboration, Tiki reframes the colonial experience as an amalgam of reappropriated cultural signifiers that enraptures those that identify with colonization and colonizing experiences, and in doing so, expresses a form of authorial agency. The context of Tiki’s subversive approach is contextualized by examining postcolonial representational practices surrounding Māori culture and orchestral hybrids in the western art music tradition, and through a discussion about the ways the performance practice called kapa haka is represented through existing scholarly studies of Māori music.


Author(s):  
Giampaolo Bonomi ◽  
Nicola Gennaioli ◽  
Guido Tabellini

Abstract We present a theory of identity politics that builds on two ideas. First, when policy conflict renders a certain social divide—economic or cultural—salient, a voter identifies with her economic or cultural group. Second, the voter slants her beliefs toward the stereotype of the group she identifies with. We obtain three implications. First, voters’ beliefs are polarized along the distinctive features of salient groups. Second, if the salience of cultural policies increases, cultural conflict rises, redistributive conflict falls, and polarization becomes more correlated across issues. Third, economic shocks hurting conservative voters may trigger a switch to cultural identity, causing these voters to demand less redistribution. We discuss U.S. survey evidence in light of these implications.


2017 ◽  
Vol 14 (3) ◽  
pp. 456-471 ◽  
Author(s):  
Sang-hoon Jang

The exhibition Masterpieces of Korean Art, which toured 8 cities in the US from December 1957 to June 1959, was the first large-scale overseas exhibition of Korean cultural objects that the South Korean government organized. This overseas exhibition in the US was designed to secure a cultural identity for South Korea on the world stage by explaining to US citizens that Korean culture has peculiar characteristics and independence from Chinese or Japanese culture. It was in the same context that the South Korean government was trying to secure a place within the world order controlled by the US. This touring exhibition shows that, through this exhibition, the National Museum of Korea was engaged in a dual mission to both gain cultural citizenship on the world stage and, reflexively, to internalize this for internal consumption so as to consolidate a sense of Korean cultural identity at home.


Author(s):  
Mykola Ryzhkov ◽  
Anastasiia Siabro

Achievements in the sphere of automatization and telecommunication are an essential component of transformation of the international peace and security system. This article presents, that consequences of changes are of a dual character. On the one hand, new technologies are becoming an important component of society modernization strategies in developing countries, on the other hand, they can be used for armament modernization or creation of new means of confrontation in modern international relations. APR countries face the most relevant issue of information technologies usage. The article deals with the process of discussion of new challenges and threats to international security, emerging as a result of development and large-scale implementation of information-communication technologies. Positions of states regarding the adoption of resolution in the sphere of international information security were studied through examples of Japan, India, and China. It is proved in the article, that information technologies have become an important component of the security system in the world. Technologies usage may lead to steady international development as well as to information arms race. That is why working out a common position on international information security issues is of crucial importance. It is within the framework of the UN, that different states of the world are given an opportunity to express their visions of the problem of international information security and work out common approaches to its solution. The article shows, that states’ positions have similar as well as different features. For instance, all states express concern regarding possible limitation of technology transfer for the establishment of a more controlled international political environment. But states’ positions have major differences as to mechanisms of information security provision. Thus, Japan and India strive to achieve a balanced system of international information security, which should at the same time have preventive mechanisms against the emergence of threats in the information and science and technology spheres and guarantee continuation of scientific-technological development, which is a crucial component of development and modernization strategies in many countries of the world. China came forward with position of strong regulation of international information security issues and suggested framing of corresponding regulations of the states’ conduct in the cyberspace.


Author(s):  
Do Lin'

This article examines the basis of legal regulation and Internet censorship in China. The genesis, development and relevant regulatory basis of legal regulation of Internet in China is examined. The author comes to the conclusion that on the one hand, Internet in China is subject to tight control due to the rapid development of technologies of observation and increase of police access to user data. Currently, China is one of the leaders in engineering and export of automated instruments for monitoring social networks. The citizens face restrictions based on the control of login accounts that give access to the Internet; blockchain apps and their developers are also subject to control and must provide registration of real names of the users; international corporations, such as Apple, Microsoft, Linkedin, are forced to bend to the demands of Chinese authorities and help to determine and punish the users who do not adhere to the censorship requirements in China. On the other hand, Chinese government makes everything possible for the large scale implementation of information technologies into socioeconomic life of the country, namely industrial and commercial sectors. Usage of internet in the sphere of sociopolitical life restricted, since China justifiably sees a threat to political stability and social security of the country.


2018 ◽  
Vol 50 ◽  
pp. 01186
Author(s):  
Ivan Evdokimov ◽  
Halina Danilava ◽  
Tatiana Yamskikh ◽  
Roman Tsarev

The purpose of this research in educational environment is to improve the quality of the educational process with the help of new information technologies. The paper examines practical issues of digital ecosystems implementation in education on the basis of relational databases, as, from the authors’ point of view, in the organization data are less subject to change in time than business processes. Therefore the strategy of information systems development where the database functions as a cornerstone provides the result, that is more stable than, for example, a functional approach in software development. Within the frames of this research information technologies of quality control in education are being created. They are intended for the exact and full representation of teaching materials as a system used as a source of information for the assessment of learning and teaching materials and creation of electronic resources on this platform. The structure of the created database, operation practices and topical issues of its introduction in more large-scale digital ecosystems are considered. As a result the database ready for use as a management solution for higher education institutions is created. This is important as information technologies provide additional opportunities for the development in the sphere of higher education, quality improvement of the educational process. The authors conclude that introduction of innovative information technologies in management system of higher education institution is relevant and perspective.


2016 ◽  
Vol 23 (3) ◽  
pp. 328-354
Author(s):  
Flávia Saldanha Kroetz

Rwanda and Bosnia and Herzegovina were scenarios of large-scale violence throughout the 1990s, substantiated by the manipulation of public and private discourses that denied diversity. After the conflicts, the states were faced with the challenge of addressing not only the consequences of the conflicts but also the constructed narratives behind them. In the two cases, public policies were implemented to elude further violence and strengthen a peaceful and long-term coexistence. Whether based on the rejection of ethnic identity or on the preservation of ethnic and national divides, both countries adopted policies that undermine basic rights and ignore sections of society excluded from official versions of history. Victimization is still a tool for political interests and remains present in public discourses. Irrespective of governmental policies that intend to surpass ancient animosities, divisionism is still present and underpins politics, religion, and social life in Rwanda and in Bosnia.


2003 ◽  
Vol 46 (2) ◽  
pp. 223-237 ◽  
Author(s):  
Ann Travers

The historically exclusive nature of public spaces and discourses is beyond dispute. While feminist and “other” counterpublics have provided alternative ways of organizing public interaction and dialogue, these have remained largely invisible to nonparticipants. New information technologies afford new possibilities for feminist counterpublics to influence the norms of participation and boundaries between insiders and outsiders in mainstream public spaces. In this article I argue that feminist counterpublics in cyberspace are evidence of a new development in social discourse: The creation of subaltern parallel counterpublics distinguishable from oppositional/separatist counterpublics based, to differing degrees, on identity politics.


Sign in / Sign up

Export Citation Format

Share Document