scholarly journals Managing boundary turbulence through the use of information manipulation strategies: A report on two studies

2016 ◽  
Vol 2 (1) ◽  
pp. 1195937 ◽  
Author(s):  
Richard S. Bello ◽  
Frances E. Brandau-Brown ◽  
J. Donald Ragsdale ◽  
Claudia Alvares
Author(s):  
Sandip Tiwari

Information is physical, so its manipulation through devices is subject to its own mechanics: the science and engineering of behavioral description, which is intermingled with classical, quantum and statistical mechanics principles. This chapter is a unification of these principles and physical laws with their implications for nanoscale. Ideas of state machines, Church-Turing thesis and its embodiment in various state machines, probabilities, Bayesian principles and entropy in its various forms (Shannon, Boltzmann, von Neumann, algorithmic) with an eye on the principle of maximum entropy as an information manipulation tool. Notions of conservation and non-conservation are applied to example circuit forms folding in adiabatic, isothermal, reversible and irreversible processes. This brings out implications of fluctuation and transitions, the interplay of errors and stability and the energy cost of determinism. It concludes discussing networks as tools to understand information flow and decision making and with an introduction to entanglement in quantum computing.


2019 ◽  
Vol 8 (10) ◽  
pp. 280 ◽  
Author(s):  
Aznar

Over the past decade, the problems arising from social communication have yet again become burning issues on social and political agendas. Information disorder, hate speeches, information manipulation, social networking sites, etc., have obliged the most important European institutions to reflect on how to meet the collective challenges that social communication currently poses in the new millennium. These European Institutions have made a clear commitment to self-regulation. The article reviews some recent European initiatives to deal with information disorder that has given a fundamental role to self-regulation. To then carry out a theoretical review of the normative notion of self-regulation that distinguishes it from the neo-liberal economicist conception. To this end, (1) a distinction is drawn between the (purportedly) self-regulating market and (2) a broader conception of self-regulation inherent not to media companies or corporations, but to the social subsystem of social communication, is proposed. This involves increasing the number of self-regulatory mechanisms that may contribute to improve social communication, and reinforcing the commitment of those who should exercise such self-regulation, including not only media companies but also the professionals working at them and the public at large.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Haithem Zourrig ◽  
Mengxia Zhang ◽  
Kamel El Hedhli ◽  
Imene Becheur

Purpose This study aims to apply McCornack’s (1992) information manipulation theory to the context of fraud and investigates the effects of culture on perceived deceptiveness. Design/methodology/approach In total, 400 Chinese consumers and an equal-size sample of Canadian consumers were recruited to fill an online survey. The survey integrates four scenarios of insurance fraud and measures of perceived deceptiveness, cultural tightness and horizontal-vertical idiocentrism allocentrism, in addition to some control variables. Findings Results show that at the societal level of culture, perceived deceptiveness is higher in individualistic than in collectivistic cultures. When accounting for the level of situational constraint, cultural tightness was found to magnify the perceived deceptiveness. At the individual level of culture, vertical-allocentrism and vertical-idiocentrism were found to weigh against the perception of deceptiveness. Originality/value Understanding cultural differences in perceived deceptiveness is helpful to spot sources of consumers’ vulnerability to fraud tolerance among a culturally diverse public.


2017 ◽  
Vol 1 (2) ◽  
pp. 111 ◽  
Author(s):  
Ismail Darimi

Adapting to the technological era, learning activities are required to reduce the use of lecture methods and can be enriched in the use of instructional media, the role of learning media becomes increasingly important. ICT is a program, for tools, manipulation and convey information. The learning process of PAI can further facilitate the search for information, manipulation, management and transfer of science or transfer of information, so that the integration of ICT in the learning process becomes an important role in developing students' thinking ability, developing skills in the field of ICT to smooth the learning process, ICT especially in PAI lessons, and transforming schools into creative and dynamic learning institutions so that students are motivated, always curious in PAI learning. Broadly speaking media can be classified into graphics, audio, silent projections, games and simulations. Effective learning requires good planning of one of the media that will be used in the learning process. ICT is a very effective medium in learning PAI in the era of technology


2021 ◽  
Vol 12 ◽  
Author(s):  
Hyunjin Kang ◽  
Wonsun Shin

This study examines how three different motivations for using an SNS (i.e., self-expression, belonging, and memory archiving) influence multi-facets of privacy boundary management on the platform mediated by self-extension to it. In recognition of the fact that information management on SNSs often goes beyond the “disclosure-withdrawal” dichotomy, the study investigates the relationships between the three SNS motives and privacy boundary management strategies (i.e., collective boundary and boundary turbulence management). An online survey with Facebook users (N = 305) finds that the three Facebook motivations are positively correlated to users’ self-extension to Facebook. The motivations for using Facebook are positively associated with the management of different layers of privacy boundaries (i.e., basic, sensitive, and highly sensitive), when Facebook self-extension is mediated. In addition, the three motives have indirect associations with potential boundary turbulence management mediated by Facebook self-extension. Extending the classic idea that privacy is deeply rooted in the self, the study demonstrates that perceiving an SNS as part of the self-system constitutes a significant underlying psychological factor that explains the linkage between motives for using SNSs and privacy management.


This chapter suggests how individual netizens or companies can uncover “pushing hand” operations. It is vitally important that Internet users, either corporations or individuals should acquire some knowledge and skills in identifying Internet mercenary marketing schemes since unrestricted information manipulation has grown to such a large scale that it led to a media claim that 70% of visits to the Chinese Internet derived from pushing hand operations. Evaluating information and deciding whether it is in fact a genuine recommendation from netizens or managed information from pushing hands is not an easy task. Several clues of online information evaluation are provided.


The present chapter deals with the issue of information manipulation detection from an algorithmic point of view, examining a variety of authentication methods, which target assisting average users and media professionals to secure themselves from forged content. The specific domain forms a very interesting, highly interdisciplinary research field, where remarkable progress has been conducted during the last years. The chapter outlines the current state of the art, providing an overview of the different modalities, aiming at evaluating the various types of digital data (text, image, audio, video), in conjunction with the associated falsification attacks and the available forensic investigation tools. In the coming years, the problem of fake news is expected to become even more complicated, as journalism is heading towards an era of heightened automation. Overall, it is anticipated that machine-driven verification assistance means can speed up the required validation processes, reducing the spread of unverified reports.


2019 ◽  
pp. 1-18
Author(s):  
Ambisisi Ambituuni ◽  
Chibuzo Ejiogu ◽  
Amanze Ejiogu ◽  
Maktoba Omar

AbstractOrganizations involved in safety-critical operations often deal with operational tensions, especially when involved in safety-critical incidents that is likely to violate safety. In this paper, we set out to understand how the disclosures of safety-critical incidents take place in the face of reputational tension. Based on the case of the Nigerian National Petroleum Corporation (NNPC), we draw on image repair theory and information manipulation theory and adopt discourse analysis as a method of analyzing safety-critical incident press releases and reports from the NNPC. We found NNPC deploying image repair as part of incident disclosures to deflect attention, evade blame and avoid issuing apologies. This is supported by the violation of the conversational maxims. The paper provides a theoretical model for discursively assessing the practices of incident information disclosure by an organization in the face of reputational tension, and further assesses the risk communication implications of such practices.


Sign in / Sign up

Export Citation Format

Share Document