Media naturalness theory: human evolution and behaviour towards electronic communication technologies

Author(s):  
Ned Kock
Crisis ◽  
2012 ◽  
Vol 33 (4) ◽  
pp. 239-245 ◽  
Author(s):  
Lindsay Robertson ◽  
Keren Skegg ◽  
Marion Poore ◽  
Sheila Williams ◽  
Barry Taylor

Background: Since the development of Centers for Disease Control’s (CDC) guidelines for the management of suicide clusters, the use of electronic communication technologies has increased dramatically. Aims: To describe an adolescent suicide cluster that drew our attention to the possible role of online social networking and SMS text messaging as sources of contagion after a suicide and obstacles to recognition of a potential cluster. Methods: A public health approach involving a multidisciplinary community response was used to investigate a group of suicides of New Zealand adolescents thought to be a cluster. Difficulties in identifying and managing contagion posed by use of electronic communications were assessed. Results: The probability of observing a time-space cluster such as this by chance alone was p = .009. The cases did not belong to a single school, rather several were linked by social networking sites, including sites created in memory of earlier suicide cases, as well as mobile telephones. These facilitated the rapid spread of information and rumor about the deaths throughout the community. They made the recognition and management of a possible cluster more difficult. Conclusions: Relevant community agencies should proactively develop a strategy to enable the identification and management of suicide contagion. Guidelines to assist communities in managing clusters should be updated to reflect the widespread use of communication technologies in modern society.


2009 ◽  
pp. 1464-1473
Author(s):  
Brian Whitworth

Spam, undesired and usually unsolicited e-mail, has been a growing problem for some time. A 2003 Sunbelt Software poll found spam (or junk mail) has surpassed viruses as the number-one unwanted network intrusion (Townsend & Taphouse, 2003). Time magazine reports that for major e-mail providers, 40 to 70% of all incoming mail is deleted at the server (Taylor, 2003), and AOL reports that 80% of its inbound e-mail, 1.5 to 1.9 billion messages a day, is spam the company blocks. Spam is the e-mail consumer’s number-one complaint (Davidson, 2003). Despite Internet service provider (ISP) filtering, up to 30% of in-box messages are spam. While each of us may only take seconds (or minutes) to deal with such mail, over billions of cases the losses are significant. A Ferris Research report estimates spam 2003 costs for U.S. companies at $10 billion (Bekker, 2003). While improved filters send more spam to trash cans, ever more spam is sent, consuming an increasing proportion of network resources. Users shielded behind spam filters may notice little change, but the Internet transmitted-spam percentage has been steadily growing. It was 8% in 2001, grew from 20% to 40% in 6 months over 2002 to 2003, and continues to grow (Weiss, 2003). In May 2003, the amount of spam e-mail exceeded nonspam for the first time, that is, over 50% of transmitted e-mail is now spam (Vaughan-Nichols, 2003). Informal estimates for 2004 are over 60%, with some as high as 80%. In practical terms, an ISP needing one server for customers must buy another just for spam almost no one reads. This cost passes on to users in increased connection fees. Pretransmission filtering could reduce this waste, but creates another problem: spam false positives, that is, valid e-mail filtered as spam. If you accidentally use spam words, like enlarge, your e-mail may be filtered. Currently, receivers can recover false rejects from their spam filter’s quarantine area, but filtering before transmission means the message never arrives at all, so neither sender nor receiver knows there is an error. Imagine if the postal mail system shredded unwanted mail and lost mail in the process. People could lose confidence that the mail will get through. If a communication environment cannot be trusted, confidence in it can collapse. Electronic communication systems sit on the horns of a dilemma. Reducing spam increases delivery failure rate, while guaranteeing delivery increases spam rates. Either way, by social failure of confidence or technical failure of capability, spam threatens the transmission system itself (Weinstein, 2003). As the percentage of transmitted spam increases, both problems increase. If spam were 99% of sent mail, a small false-positive percentage becomes a much higher percentage of valid e-mail that failed. The growing spam problem is recognized ambivalently by IT writers who espouse new Bayesian spam filters but note, “The problem with spam is that it is almost impossible to define” (Vaughan-Nichols, 2003, p. 142), or who advocate legal solutions but say none have worked so far. The technical community seems to be in a state of denial regarding spam. Despite some successes, transmitted spam is increasing. Moral outrage, spam blockers, spamming the spammers, black and white lists, and legal responses have slowed but not stopped it. Spam blockers, by hiding the problem from users, may be making it worse, as a Band-Aid covers but does not cure a systemic sore. Asking for a technical tool to stop spam may be asking the wrong question. If spam is a social problem, it may require a social solution, which in cyberspace means technical support for social requirements (Whitworth & Whitworth, 2004).


Author(s):  
Brian Whitworth

Spam, undesired and usually unsolicited e-mail, has been a growing problem for some time. A 2003 Sunbelt Software poll found spam (or junk mail) has surpassed viruses as the number-one unwanted network intrusion (Townsend & Taphouse, 2003). Time magazine reports that for major e-mail providers, 40 to 70% of all incoming mail is deleted at the server (Taylor, 2003), and AOL reports that 80% of its inbound e-mail, 1.5 to 1.9 billion messages a day, is spam the company blocks. Spam is the e-mail consumer’s number-one complaint (Davidson, 2003). Despite Internet service provider (ISP) filtering, up to 30% of in-box messages are spam. While each of us may only take seconds (or minutes) to deal with such mail, over billions of cases the losses are significant. A Ferris Research report estimates spam 2003 costs for U.S. companies at $10 billion (Bekker, 2003). While improved filters send more spam to trash cans, ever more spam is sent, consuming an increasing proportion of network resources. Users shielded behind spam filters may notice little change, but the Internet transmitted-spam percentage has been steadily growing. It was 8% in 2001, grew from 20% to 40% in 6 months over 2002 to 2003, and continues to grow (Weiss, 2003). In May 2003, the amount of spam e-mail exceeded nonspam for the first time, that is, over 50% of transmitted e-mail is now spam (Vaughan-Nichols, 2003). Informal estimates for 2004 are over 60%, with some as high as 80%. In practical terms, an ISP needing one server for customers must buy another just for spam almost no one reads. This cost passes on to users in increased connection fees. Pretransmission filtering could reduce this waste, but creates another problem: spam false positives, that is, valid e-mail filtered as spam. If you accidentally use spam words, like enlarge, your e-mail may be filtered. Currently, receivers can recover false rejects from their spam filter’s quarantine area, but filtering before transmission means the message never arrives at all, so neither sender nor receiver knows there is an error. Imagine if the postal mail system shredded unwanted mail and lost mail in the process. People could lose confidence that the mail will get through. If a communication environment cannot be trusted, confidence in it can collapse. Electronic communication systems sit on the horns of a dilemma. Reducing spam increases delivery failure rate, while guaranteeing delivery increases spam rates. Either way, by social failure of confidence or technical failure of capability, spam threatens the transmission system itself (Weinstein, 2003). As the percentage of transmitted spam increases, both problems increase. If spam were 99% of sent mail, a small false-positive percentage becomes a much higher percentage of valid e-mail that failed. The growing spam problem is recognized ambivalently by IT writers who espouse new Bayesian spam filters but note, “The problem with spam is that it is almost impossible to define” (Vaughan-Nichols, 2003, p. 142), or who advocate legal solutions but say none have worked so far. The technical community seems to be in a state of denial regarding spam. Despite some successes, transmitted spam is increasing. Moral outrage, spam blockers, spamming the spammers, black and white lists, and legal responses have slowed but not stopped it. Spam blockers, by hiding the problem from users, may be making it worse, as a Band-Aid covers but does not cure a systemic sore. Asking for a technical tool to stop spam may be asking the wrong question. If spam is a social problem, it may require a social solution, which in cyberspace means technical support for social requirements (Whitworth & Whitworth, 2004).


Author(s):  
Yuriko Furuhata

This chapter theorizes an afterlife of Imperial Japan's biological metaphors of lifeworld and circulation in the work of Japanese architect Tange Kenzō and his associates who came to form the internationally renowned movement of Metabolism in the early 1960s. Transposing these imperial metaphors onto postwar Japan's national body politic, Tange and other Metabolist architects frequently used the biological metaphors of blood circulation and the central nervous system to articulate their vision of urban planning. Focusing on the impact of electronic communication technologies on architecture, this chapter will explore how the modern biopolitical idea of maintaining the organic life of the nation persisted into the postwar period, and how this perspective on biopolitics in turn compels us to rethink certain assumptions we make about electronic media and information technologies.


2012 ◽  
Vol 2 (1) ◽  
pp. 43-46 ◽  
Author(s):  
Gábor Szécsi

AbstractThe age of electronic communication is the age of opening categorical and classification boundaries. In the new media space the traditional distinctions between children and adult experiences collapse and disappear. The aim of this essay is to show that the use of electronic technologies has abolished the traditional pedagogical thinking, and brings in new conventions. As a result of evolving new practices which rely on electronic communication devices, communication has become an essential activity among children, helping them acquire and share everyday information and knowledge with intensity and efficiency that can even change the traditional pedagogical thinking. The use of new communication technologies and forms of learning support gain particular importance especially in a system of lifelong learning, which provides identical frameworks for children and adults.


Author(s):  
Rashid Yusifbayli

The purpose of the article is a comprehensive analysis of communication technologies of interaction between society and public administration and administration. It is emphasized that one of the functions of public authorities is communicative. The importance of establishing a communicative process in the system of public administration and administration as a dialogue and interaction between equal actors, where the use of direct information channels and feedback channels should be balanced and manifested through various electronic forms of participation. There are three main models of electronic participation: management model; consultative model; participation model. It is substantiated that the availability of a developed information infrastructure is a condition and indicator of the effective-ness of public administration and the use of information and com- munication technologies is associated primarily with the implementation of the e-government project. It has been proven that in order to increase the efficiency of public administration and administration by transforming the existing bureaucratic system, it helps to make it more flexible and adapted, less hierarchical and regulated, and to make the transition to post-bureaucratic organizations. Transferring the service to electronic form eliminates the negative, dysfunctional practices inherent in modern bureaucracy. The study found that the reforms taking place in the system of electronic communication of public administration and society are to some extent ambivalent and contradictory. It has been proven that without broad administrative reforms aimed at improving the functioning of the state apparatus, the introduction of e-government technologies will not be effective and will be reduced to long and unsuccessful attempts. One way out of this situation is to adopt a new theoretical paradigm of administrative reform, in which e-government will cease to be a complement to bureaucratic structures, and systematic management of all administrative processes to achieve the end results will become a central part of public administration.


Author(s):  
Philip E. Steinberg ◽  
Darren Purcell

Electronic communications refer to forms of communication where ideas and information are embedded in spatially mobile electronic signals. These include the internet, telephony, television, and radio. Electronic communications are linked to state power in a complex and, at times, contradictory manner. More specifically, a tension exists between divergent pressures toward constructing electronic communication spaces as spaces of state power, as spaces of escape, and as spaces for contesting state power. On the one hand, states often invest in infrastructure and empower regulatory institutions as they seek to intensify their presence within national territory, for example, or project their influence beyond territorial borders. The widespread use of electronic communication technologies to facilitate governmental power is especially evident in the realm of cyberwarfare. E-government platforms have also been created to foster interaction with the state through electronic means. On the other hand, communication systems thrive through the idealization (and, ideally, the regulatory construction) of a space without borders, whereby individuals might bypass, or even actively work to subvert, state authority. Just as the internet has been seen as a means for state power to monitor the everyday lives and subjectivities of the citizenry, it has also been employed as a tool for democratization. Various institutions have emerged to govern specific electronic communication networks, including those that are focused on reproducing the power of individual states, those that operate in the realm of intergovernmental organizations, those that devolve power to actors in local government, and those that empower corporations or civil society.


Sign in / Sign up

Export Citation Format

Share Document