scholarly journals Relationship-based social work and electronic communication technologies: anticipation, adaptation and achievement

2019 ◽  
Vol 33 (2) ◽  
pp. 217-232 ◽  
Author(s):  
Julie Byrne ◽  
Gloria Kirwan
Author(s):  
Kosteva Tatiana ◽  
Elena Faichuk

The information competence of modern specialist, its structure and peculiarities of usage by future social worker are analyzed in the article. The author singles out four pedagogical conditions of information competence formation in social work undergraduates and determines their impact in everyday and professional life of future specialists. Expansion of application of informatively-communication technologies, socio-economic changes, process of integration of world community, stipulated the necessity of successive modernisation of the system of professional preparation of future specialists. Expansion of sharp problems of contemporaneity, that inherent to all spheres of public life, including actuality of paying attention to was stipulated social development workers. Authors are consider pedagogical technology of forming of informative competence of master's degrees of social work; innovative methodology of determination of profile of informative competence of master's degrees of social work is offered and entered in the modern measuring of organizational culture of university; essence of concept «informative competence of master's degrees of social work», basic contradictions of process of forming of informative competence, is specified; components, organizationally-pedagogical terms and principles of forming of informative competence of master's degrees of social work, are in an university;


Author(s):  
Carlota Roca Belijar

Las Tecnologías de la Información y Comunicación (TIC), se encuentran totalmente difundidas en nuestra sociedad actual, tanto es así que ya no es extraño ver a cualquier persona llevando y/o utilizando un móvil o un ordenador con observable asiduidad. Por otra parte, tampoco es menos cierto el hecho de que las mismas se constituyen como una de las herramientas de más utilidad hoy en día, muchas son las ventajas que estas presentan, permiten desde facilitar la comunicación o relaciones hasta comprar sin salir de casa, por ejemplo. Sin embargo, no todo en ellas es positivo, en los últimos tiempos se está constatando el nacimiento de un nuevo fenómeno que afecta especialmente a niños/as y/o adolescentes, y es que, son cada vez más frecuentes los casos en los que éstos desarrollan patrones de conducta nocivos o adictivos en relación con el uso de las TIC. Este hecho, hace que todo en la vida de dichos/as niños/as y/o adolescentes cambie de manera radical al verse afectados numerosos aspectos o ámbitos de la misma como por ejemplo, el familiar, uno de los contextos más damnificados al ser el más próximo o cercano. En base a esto, a lo largo de este artículo se realizará un recorrido por alguna de las cuestiones que giran en torno a una adicción a las TIC, haciendo especial mención a la perspectiva del Trabajo Social en relación con este tema.   Information and Communication Technologies (ICT), are fully disseminated in our current society, so much so that it is no longer strange to see anyone carrying and/or using a mobile or a computer with observable assiduity. On the other hand, it is not less true fact that they are constituted as one of the most useful tools today, there are any advantages that they present, they allow from facilitating communication or relationships to buying without leaving home, for example. However, not everything in them is positive, in recent times the birth of a new phenomenon that especially affects children and/or adolescents is being verified, and that is, the cases in which these are increasingly frequent develop harmful or addictive behavior patterns in relation to the use of ICT. This fact, makes everything in the life of such children and/or adolescents change radically as many aspects or areas of it are affected, such as family, one of the most affected contexts to be the closer or closer. Based on this, throughout this article there will be a tour of some of the issues that revolve around an addiction to ICT, making special mention of the perspective of Social Work in relation this issue.


2018 ◽  
Vol 66 (4) ◽  
pp. 93 ◽  
Author(s):  
Valentyna V. Balakhtar

The problem of forming the competence of a specialist in social work has always been a complex issue that needs to be addressed as rapidly as possible. At present there is a growing demand for specialists in the social sphere, characterized by a clearly defined professional focus, high intellectual level, creativity, the ability to constant development and improvement, analyze the problems of vulnerable population groups, plan the work of both social workers and the social service in general, dedication to human, national ideas etc. The provision of quality education for prospective specialists in social work in Ukraine requires the revision of methods and forms, principles and approaches to their training. The article justifies the necessity of using the information and communication technologies in the educational process, as modern social workers should have a competitive advantage in the labor market, be able to respond efficiently to the problems in the human-human system relying on their own ability to communicate and cooperate with various categories of population, and at the same time striving to achieve a holistic development of one's own personality and professional activity, acquire competences, skills, professionalism. Nowadays the human person, with their essential nature and subjectivity is the highest objective of society. The introduction of information and communication technologies into the training promotes the development of professional competences of the future social workers and is an arms-length process of education development. Prospective trends of using information and communication technologies are determined as following: they can be both the object of study and the means of instructions. The results of a survey among specialists in social work on obtaining practical-oriented knowledge and skills have been presented.


Crisis ◽  
2012 ◽  
Vol 33 (4) ◽  
pp. 239-245 ◽  
Author(s):  
Lindsay Robertson ◽  
Keren Skegg ◽  
Marion Poore ◽  
Sheila Williams ◽  
Barry Taylor

Background: Since the development of Centers for Disease Control’s (CDC) guidelines for the management of suicide clusters, the use of electronic communication technologies has increased dramatically. Aims: To describe an adolescent suicide cluster that drew our attention to the possible role of online social networking and SMS text messaging as sources of contagion after a suicide and obstacles to recognition of a potential cluster. Methods: A public health approach involving a multidisciplinary community response was used to investigate a group of suicides of New Zealand adolescents thought to be a cluster. Difficulties in identifying and managing contagion posed by use of electronic communications were assessed. Results: The probability of observing a time-space cluster such as this by chance alone was p = .009. The cases did not belong to a single school, rather several were linked by social networking sites, including sites created in memory of earlier suicide cases, as well as mobile telephones. These facilitated the rapid spread of information and rumor about the deaths throughout the community. They made the recognition and management of a possible cluster more difficult. Conclusions: Relevant community agencies should proactively develop a strategy to enable the identification and management of suicide contagion. Guidelines to assist communities in managing clusters should be updated to reflect the widespread use of communication technologies in modern society.


2009 ◽  
pp. 1464-1473
Author(s):  
Brian Whitworth

Spam, undesired and usually unsolicited e-mail, has been a growing problem for some time. A 2003 Sunbelt Software poll found spam (or junk mail) has surpassed viruses as the number-one unwanted network intrusion (Townsend & Taphouse, 2003). Time magazine reports that for major e-mail providers, 40 to 70% of all incoming mail is deleted at the server (Taylor, 2003), and AOL reports that 80% of its inbound e-mail, 1.5 to 1.9 billion messages a day, is spam the company blocks. Spam is the e-mail consumer’s number-one complaint (Davidson, 2003). Despite Internet service provider (ISP) filtering, up to 30% of in-box messages are spam. While each of us may only take seconds (or minutes) to deal with such mail, over billions of cases the losses are significant. A Ferris Research report estimates spam 2003 costs for U.S. companies at $10 billion (Bekker, 2003). While improved filters send more spam to trash cans, ever more spam is sent, consuming an increasing proportion of network resources. Users shielded behind spam filters may notice little change, but the Internet transmitted-spam percentage has been steadily growing. It was 8% in 2001, grew from 20% to 40% in 6 months over 2002 to 2003, and continues to grow (Weiss, 2003). In May 2003, the amount of spam e-mail exceeded nonspam for the first time, that is, over 50% of transmitted e-mail is now spam (Vaughan-Nichols, 2003). Informal estimates for 2004 are over 60%, with some as high as 80%. In practical terms, an ISP needing one server for customers must buy another just for spam almost no one reads. This cost passes on to users in increased connection fees. Pretransmission filtering could reduce this waste, but creates another problem: spam false positives, that is, valid e-mail filtered as spam. If you accidentally use spam words, like enlarge, your e-mail may be filtered. Currently, receivers can recover false rejects from their spam filter’s quarantine area, but filtering before transmission means the message never arrives at all, so neither sender nor receiver knows there is an error. Imagine if the postal mail system shredded unwanted mail and lost mail in the process. People could lose confidence that the mail will get through. If a communication environment cannot be trusted, confidence in it can collapse. Electronic communication systems sit on the horns of a dilemma. Reducing spam increases delivery failure rate, while guaranteeing delivery increases spam rates. Either way, by social failure of confidence or technical failure of capability, spam threatens the transmission system itself (Weinstein, 2003). As the percentage of transmitted spam increases, both problems increase. If spam were 99% of sent mail, a small false-positive percentage becomes a much higher percentage of valid e-mail that failed. The growing spam problem is recognized ambivalently by IT writers who espouse new Bayesian spam filters but note, “The problem with spam is that it is almost impossible to define” (Vaughan-Nichols, 2003, p. 142), or who advocate legal solutions but say none have worked so far. The technical community seems to be in a state of denial regarding spam. Despite some successes, transmitted spam is increasing. Moral outrage, spam blockers, spamming the spammers, black and white lists, and legal responses have slowed but not stopped it. Spam blockers, by hiding the problem from users, may be making it worse, as a Band-Aid covers but does not cure a systemic sore. Asking for a technical tool to stop spam may be asking the wrong question. If spam is a social problem, it may require a social solution, which in cyberspace means technical support for social requirements (Whitworth & Whitworth, 2004).


Author(s):  
Brian Whitworth

Spam, undesired and usually unsolicited e-mail, has been a growing problem for some time. A 2003 Sunbelt Software poll found spam (or junk mail) has surpassed viruses as the number-one unwanted network intrusion (Townsend & Taphouse, 2003). Time magazine reports that for major e-mail providers, 40 to 70% of all incoming mail is deleted at the server (Taylor, 2003), and AOL reports that 80% of its inbound e-mail, 1.5 to 1.9 billion messages a day, is spam the company blocks. Spam is the e-mail consumer’s number-one complaint (Davidson, 2003). Despite Internet service provider (ISP) filtering, up to 30% of in-box messages are spam. While each of us may only take seconds (or minutes) to deal with such mail, over billions of cases the losses are significant. A Ferris Research report estimates spam 2003 costs for U.S. companies at $10 billion (Bekker, 2003). While improved filters send more spam to trash cans, ever more spam is sent, consuming an increasing proportion of network resources. Users shielded behind spam filters may notice little change, but the Internet transmitted-spam percentage has been steadily growing. It was 8% in 2001, grew from 20% to 40% in 6 months over 2002 to 2003, and continues to grow (Weiss, 2003). In May 2003, the amount of spam e-mail exceeded nonspam for the first time, that is, over 50% of transmitted e-mail is now spam (Vaughan-Nichols, 2003). Informal estimates for 2004 are over 60%, with some as high as 80%. In practical terms, an ISP needing one server for customers must buy another just for spam almost no one reads. This cost passes on to users in increased connection fees. Pretransmission filtering could reduce this waste, but creates another problem: spam false positives, that is, valid e-mail filtered as spam. If you accidentally use spam words, like enlarge, your e-mail may be filtered. Currently, receivers can recover false rejects from their spam filter’s quarantine area, but filtering before transmission means the message never arrives at all, so neither sender nor receiver knows there is an error. Imagine if the postal mail system shredded unwanted mail and lost mail in the process. People could lose confidence that the mail will get through. If a communication environment cannot be trusted, confidence in it can collapse. Electronic communication systems sit on the horns of a dilemma. Reducing spam increases delivery failure rate, while guaranteeing delivery increases spam rates. Either way, by social failure of confidence or technical failure of capability, spam threatens the transmission system itself (Weinstein, 2003). As the percentage of transmitted spam increases, both problems increase. If spam were 99% of sent mail, a small false-positive percentage becomes a much higher percentage of valid e-mail that failed. The growing spam problem is recognized ambivalently by IT writers who espouse new Bayesian spam filters but note, “The problem with spam is that it is almost impossible to define” (Vaughan-Nichols, 2003, p. 142), or who advocate legal solutions but say none have worked so far. The technical community seems to be in a state of denial regarding spam. Despite some successes, transmitted spam is increasing. Moral outrage, spam blockers, spamming the spammers, black and white lists, and legal responses have slowed but not stopped it. Spam blockers, by hiding the problem from users, may be making it worse, as a Band-Aid covers but does not cure a systemic sore. Asking for a technical tool to stop spam may be asking the wrong question. If spam is a social problem, it may require a social solution, which in cyberspace means technical support for social requirements (Whitworth & Whitworth, 2004).


Author(s):  
Yuriko Furuhata

This chapter theorizes an afterlife of Imperial Japan's biological metaphors of lifeworld and circulation in the work of Japanese architect Tange Kenzō and his associates who came to form the internationally renowned movement of Metabolism in the early 1960s. Transposing these imperial metaphors onto postwar Japan's national body politic, Tange and other Metabolist architects frequently used the biological metaphors of blood circulation and the central nervous system to articulate their vision of urban planning. Focusing on the impact of electronic communication technologies on architecture, this chapter will explore how the modern biopolitical idea of maintaining the organic life of the nation persisted into the postwar period, and how this perspective on biopolitics in turn compels us to rethink certain assumptions we make about electronic media and information technologies.


Sign in / Sign up

Export Citation Format

Share Document