Information manipulation and competition

2022 ◽  
Vol 131 ◽  
pp. 245-263
Author(s):  
Andreas Grunewald ◽  
Matthias Kräkel
Author(s):  
Sandip Tiwari

Information is physical, so its manipulation through devices is subject to its own mechanics: the science and engineering of behavioral description, which is intermingled with classical, quantum and statistical mechanics principles. This chapter is a unification of these principles and physical laws with their implications for nanoscale. Ideas of state machines, Church-Turing thesis and its embodiment in various state machines, probabilities, Bayesian principles and entropy in its various forms (Shannon, Boltzmann, von Neumann, algorithmic) with an eye on the principle of maximum entropy as an information manipulation tool. Notions of conservation and non-conservation are applied to example circuit forms folding in adiabatic, isothermal, reversible and irreversible processes. This brings out implications of fluctuation and transitions, the interplay of errors and stability and the energy cost of determinism. It concludes discussing networks as tools to understand information flow and decision making and with an introduction to entanglement in quantum computing.


2019 ◽  
Vol 8 (10) ◽  
pp. 280 ◽  
Author(s):  
Aznar

Over the past decade, the problems arising from social communication have yet again become burning issues on social and political agendas. Information disorder, hate speeches, information manipulation, social networking sites, etc., have obliged the most important European institutions to reflect on how to meet the collective challenges that social communication currently poses in the new millennium. These European Institutions have made a clear commitment to self-regulation. The article reviews some recent European initiatives to deal with information disorder that has given a fundamental role to self-regulation. To then carry out a theoretical review of the normative notion of self-regulation that distinguishes it from the neo-liberal economicist conception. To this end, (1) a distinction is drawn between the (purportedly) self-regulating market and (2) a broader conception of self-regulation inherent not to media companies or corporations, but to the social subsystem of social communication, is proposed. This involves increasing the number of self-regulatory mechanisms that may contribute to improve social communication, and reinforcing the commitment of those who should exercise such self-regulation, including not only media companies but also the professionals working at them and the public at large.


2016 ◽  
Vol 2 (1) ◽  
pp. 1195937 ◽  
Author(s):  
Richard S. Bello ◽  
Frances E. Brandau-Brown ◽  
J. Donald Ragsdale ◽  
Claudia Alvares

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Haithem Zourrig ◽  
Mengxia Zhang ◽  
Kamel El Hedhli ◽  
Imene Becheur

Purpose This study aims to apply McCornack’s (1992) information manipulation theory to the context of fraud and investigates the effects of culture on perceived deceptiveness. Design/methodology/approach In total, 400 Chinese consumers and an equal-size sample of Canadian consumers were recruited to fill an online survey. The survey integrates four scenarios of insurance fraud and measures of perceived deceptiveness, cultural tightness and horizontal-vertical idiocentrism allocentrism, in addition to some control variables. Findings Results show that at the societal level of culture, perceived deceptiveness is higher in individualistic than in collectivistic cultures. When accounting for the level of situational constraint, cultural tightness was found to magnify the perceived deceptiveness. At the individual level of culture, vertical-allocentrism and vertical-idiocentrism were found to weigh against the perception of deceptiveness. Originality/value Understanding cultural differences in perceived deceptiveness is helpful to spot sources of consumers’ vulnerability to fraud tolerance among a culturally diverse public.


2017 ◽  
Vol 1 (2) ◽  
pp. 111 ◽  
Author(s):  
Ismail Darimi

Adapting to the technological era, learning activities are required to reduce the use of lecture methods and can be enriched in the use of instructional media, the role of learning media becomes increasingly important. ICT is a program, for tools, manipulation and convey information. The learning process of PAI can further facilitate the search for information, manipulation, management and transfer of science or transfer of information, so that the integration of ICT in the learning process becomes an important role in developing students' thinking ability, developing skills in the field of ICT to smooth the learning process, ICT especially in PAI lessons, and transforming schools into creative and dynamic learning institutions so that students are motivated, always curious in PAI learning. Broadly speaking media can be classified into graphics, audio, silent projections, games and simulations. Effective learning requires good planning of one of the media that will be used in the learning process. ICT is a very effective medium in learning PAI in the era of technology


This chapter suggests how individual netizens or companies can uncover “pushing hand” operations. It is vitally important that Internet users, either corporations or individuals should acquire some knowledge and skills in identifying Internet mercenary marketing schemes since unrestricted information manipulation has grown to such a large scale that it led to a media claim that 70% of visits to the Chinese Internet derived from pushing hand operations. Evaluating information and deciding whether it is in fact a genuine recommendation from netizens or managed information from pushing hands is not an easy task. Several clues of online information evaluation are provided.


The present chapter deals with the issue of information manipulation detection from an algorithmic point of view, examining a variety of authentication methods, which target assisting average users and media professionals to secure themselves from forged content. The specific domain forms a very interesting, highly interdisciplinary research field, where remarkable progress has been conducted during the last years. The chapter outlines the current state of the art, providing an overview of the different modalities, aiming at evaluating the various types of digital data (text, image, audio, video), in conjunction with the associated falsification attacks and the available forensic investigation tools. In the coming years, the problem of fake news is expected to become even more complicated, as journalism is heading towards an era of heightened automation. Overall, it is anticipated that machine-driven verification assistance means can speed up the required validation processes, reducing the spread of unverified reports.


2019 ◽  
pp. 1-18
Author(s):  
Ambisisi Ambituuni ◽  
Chibuzo Ejiogu ◽  
Amanze Ejiogu ◽  
Maktoba Omar

AbstractOrganizations involved in safety-critical operations often deal with operational tensions, especially when involved in safety-critical incidents that is likely to violate safety. In this paper, we set out to understand how the disclosures of safety-critical incidents take place in the face of reputational tension. Based on the case of the Nigerian National Petroleum Corporation (NNPC), we draw on image repair theory and information manipulation theory and adopt discourse analysis as a method of analyzing safety-critical incident press releases and reports from the NNPC. We found NNPC deploying image repair as part of incident disclosures to deflect attention, evade blame and avoid issuing apologies. This is supported by the violation of the conversational maxims. The paper provides a theoretical model for discursively assessing the practices of incident information disclosure by an organization in the face of reputational tension, and further assesses the risk communication implications of such practices.


Sign in / Sign up

Export Citation Format

Share Document