Power and Space in Electronic Communications

Author(s):  
Philip E. Steinberg ◽  
Darren Purcell

Electronic communications refer to forms of communication where ideas and information are embedded in spatially mobile electronic signals. These include the internet, telephony, television, and radio. Electronic communications are linked to state power in a complex and, at times, contradictory manner. More specifically, a tension exists between divergent pressures toward constructing electronic communication spaces as spaces of state power, as spaces of escape, and as spaces for contesting state power. On the one hand, states often invest in infrastructure and empower regulatory institutions as they seek to intensify their presence within national territory, for example, or project their influence beyond territorial borders. The widespread use of electronic communication technologies to facilitate governmental power is especially evident in the realm of cyberwarfare. E-government platforms have also been created to foster interaction with the state through electronic means. On the other hand, communication systems thrive through the idealization (and, ideally, the regulatory construction) of a space without borders, whereby individuals might bypass, or even actively work to subvert, state authority. Just as the internet has been seen as a means for state power to monitor the everyday lives and subjectivities of the citizenry, it has also been employed as a tool for democratization. Various institutions have emerged to govern specific electronic communication networks, including those that are focused on reproducing the power of individual states, those that operate in the realm of intergovernmental organizations, those that devolve power to actors in local government, and those that empower corporations or civil society.

2020 ◽  
Vol 8 (6) ◽  
pp. 5643-5646

Since last decade, the exponential growth of the internet users and the size of data over the internet is increasing day by day, which lead to increase the complexity of the systems by implementing policies and security to avoid attacks on systems and networks. It is very important to understand and analyses the real time data traffic of the communication systems. The purpose of this paper to design a customized Java based application which enables analysts to capture the traffic at the bottleneck under the mean field communication environment where a large number of devices are communicating with each other. The sending data for further processing for analysis the trend to overcome vulnerabilities or to manage the effectiveness of the communication systems. The proposed application enables to capture 8 different types of protocol traffic such as HTTP, HTTPS, SMTP, UDP, TCP, ICMP and POP3. The application allows for analysis of the incoming/outgoing traffic in the visual to understand the nature of communication networks which lead to improve the performance of the networks with respect to hardware, software, data storage, security and reliability.


Author(s):  
Pouwan Lei ◽  
Jia Jia Wang

The mobile phone industry has experienced an explosive growth in recent years. The emerging markets such as China, India, and Brazil contribute this growth. In China, the number of mobile subscribers has already surpassed the number of fixed landline phone subscribers. In Korea and Japan, there is an explosion of mobile and wireless services. The United States are joining too and there were 207.9 million subscribers in 2005 (CTIA, 2006). Mobile e-commerce (m-commerce) makes business mobility a reality; mobile users could access the Internet at any time, from anywhere with handheld devices or laptop. A 3G enabled smart phone enables you to access a wide range of services anywhere and anytime. For example, you can send and receive e-mail, make cinema and restaurant reservations and pay for them, check real train time, look at digital maps, download music and games, and also browse the Internet. Mobile and wireless services are ranging from mobile communication networks to wireless local area networks. The service provided by mobile communication systems has achieved huge success as mobile and wireless communication technologies are converging at fast speed. We will study mobile and wireless communication in relation to mobile phones. Hence, m-commerce is defined as electronic commerce carried out in handheld devices such as smart phone through mobile and wireless communication network.


Author(s):  
Riu Hu ◽  
Shuyan Wang

Online learning, which was defined as a learning environment using computer communication systems for learning delivery and interaction (Harasim, 1990), has been involved into all facets of society’s education. Online learning can be considered as a subset of the category of e-learning because it refers specifically to learning that is occurring via the Internet or Intranet. Online learning environment normally refers to learning via electronic communications, coursework, and/or information posted on the Web, and through other instructional activities by using Internet.


Author(s):  
Anastasia V. Zubareva

The development of electronic communication brings to rapid language and speech-communicative changes. These changes make the scientific task of their timely conceptualization urgent. The purpose of this study is to generalize and analyze the research results on the onyms functioning in the electronic environment and Internet communication. The analysis highlights two the main areas of the research that have developed in science to date. The functioning of the proper name in the Internet discourse is the study object of the first group. The Internet environment is mainly a source of language material according to this group research, which is analyzed considering the electronic communications features (its polycode, informality, interactivity). The feature of this group research is that its’ the main object is represented either by specific linguistic phenomena or special types of discourse, while electronic communication is a secondary feature for its highlight. The second research direction involves the study of new onomastic phenomena that owe their existence to the context of the electronic environment and its communicative, pragmatic, and technical features. This research direction implies both the detection of new types of onyms that were generated by Internet communications, and the description of their characteristic semantic, pragmatic, stylistic, and formal grammatical features. A special status among the objects studied in the second direction is given to such a phenomenon as a nickname, which implements a whole set of features that allow us to talk about its principal novelty and uniqueness. A nickname is the result of autonomy in terms of pragmatic and communication. This contributes to its use as a means of self-presentation and expression; also, a nickname has noticeable formal features that represent the ways of its construction (free choice of motivational bases, language play, active use of non-alphabetic characters). There is also noted an impact of new phenomena in Internet onomastics on the onomastic system and emphasized the need for closer attention to this influence.


2021 ◽  
pp. 115-120
Author(s):  
S. КOKIZA ◽  
V. STEPANOV

The article is devoted to the analysis of regulatory and legal acts and normative documents of the EU on information interception in electronic communication networks in the context of preparation of technical regulations of the united system of technical means.


Crisis ◽  
2012 ◽  
Vol 33 (4) ◽  
pp. 239-245 ◽  
Author(s):  
Lindsay Robertson ◽  
Keren Skegg ◽  
Marion Poore ◽  
Sheila Williams ◽  
Barry Taylor

Background: Since the development of Centers for Disease Control’s (CDC) guidelines for the management of suicide clusters, the use of electronic communication technologies has increased dramatically. Aims: To describe an adolescent suicide cluster that drew our attention to the possible role of online social networking and SMS text messaging as sources of contagion after a suicide and obstacles to recognition of a potential cluster. Methods: A public health approach involving a multidisciplinary community response was used to investigate a group of suicides of New Zealand adolescents thought to be a cluster. Difficulties in identifying and managing contagion posed by use of electronic communications were assessed. Results: The probability of observing a time-space cluster such as this by chance alone was p = .009. The cases did not belong to a single school, rather several were linked by social networking sites, including sites created in memory of earlier suicide cases, as well as mobile telephones. These facilitated the rapid spread of information and rumor about the deaths throughout the community. They made the recognition and management of a possible cluster more difficult. Conclusions: Relevant community agencies should proactively develop a strategy to enable the identification and management of suicide contagion. Guidelines to assist communities in managing clusters should be updated to reflect the widespread use of communication technologies in modern society.


2009 ◽  
pp. 1464-1473
Author(s):  
Brian Whitworth

Spam, undesired and usually unsolicited e-mail, has been a growing problem for some time. A 2003 Sunbelt Software poll found spam (or junk mail) has surpassed viruses as the number-one unwanted network intrusion (Townsend & Taphouse, 2003). Time magazine reports that for major e-mail providers, 40 to 70% of all incoming mail is deleted at the server (Taylor, 2003), and AOL reports that 80% of its inbound e-mail, 1.5 to 1.9 billion messages a day, is spam the company blocks. Spam is the e-mail consumer’s number-one complaint (Davidson, 2003). Despite Internet service provider (ISP) filtering, up to 30% of in-box messages are spam. While each of us may only take seconds (or minutes) to deal with such mail, over billions of cases the losses are significant. A Ferris Research report estimates spam 2003 costs for U.S. companies at $10 billion (Bekker, 2003). While improved filters send more spam to trash cans, ever more spam is sent, consuming an increasing proportion of network resources. Users shielded behind spam filters may notice little change, but the Internet transmitted-spam percentage has been steadily growing. It was 8% in 2001, grew from 20% to 40% in 6 months over 2002 to 2003, and continues to grow (Weiss, 2003). In May 2003, the amount of spam e-mail exceeded nonspam for the first time, that is, over 50% of transmitted e-mail is now spam (Vaughan-Nichols, 2003). Informal estimates for 2004 are over 60%, with some as high as 80%. In practical terms, an ISP needing one server for customers must buy another just for spam almost no one reads. This cost passes on to users in increased connection fees. Pretransmission filtering could reduce this waste, but creates another problem: spam false positives, that is, valid e-mail filtered as spam. If you accidentally use spam words, like enlarge, your e-mail may be filtered. Currently, receivers can recover false rejects from their spam filter’s quarantine area, but filtering before transmission means the message never arrives at all, so neither sender nor receiver knows there is an error. Imagine if the postal mail system shredded unwanted mail and lost mail in the process. People could lose confidence that the mail will get through. If a communication environment cannot be trusted, confidence in it can collapse. Electronic communication systems sit on the horns of a dilemma. Reducing spam increases delivery failure rate, while guaranteeing delivery increases spam rates. Either way, by social failure of confidence or technical failure of capability, spam threatens the transmission system itself (Weinstein, 2003). As the percentage of transmitted spam increases, both problems increase. If spam were 99% of sent mail, a small false-positive percentage becomes a much higher percentage of valid e-mail that failed. The growing spam problem is recognized ambivalently by IT writers who espouse new Bayesian spam filters but note, “The problem with spam is that it is almost impossible to define” (Vaughan-Nichols, 2003, p. 142), or who advocate legal solutions but say none have worked so far. The technical community seems to be in a state of denial regarding spam. Despite some successes, transmitted spam is increasing. Moral outrage, spam blockers, spamming the spammers, black and white lists, and legal responses have slowed but not stopped it. Spam blockers, by hiding the problem from users, may be making it worse, as a Band-Aid covers but does not cure a systemic sore. Asking for a technical tool to stop spam may be asking the wrong question. If spam is a social problem, it may require a social solution, which in cyberspace means technical support for social requirements (Whitworth & Whitworth, 2004).


Author(s):  
Brian Whitworth

Spam, undesired and usually unsolicited e-mail, has been a growing problem for some time. A 2003 Sunbelt Software poll found spam (or junk mail) has surpassed viruses as the number-one unwanted network intrusion (Townsend & Taphouse, 2003). Time magazine reports that for major e-mail providers, 40 to 70% of all incoming mail is deleted at the server (Taylor, 2003), and AOL reports that 80% of its inbound e-mail, 1.5 to 1.9 billion messages a day, is spam the company blocks. Spam is the e-mail consumer’s number-one complaint (Davidson, 2003). Despite Internet service provider (ISP) filtering, up to 30% of in-box messages are spam. While each of us may only take seconds (or minutes) to deal with such mail, over billions of cases the losses are significant. A Ferris Research report estimates spam 2003 costs for U.S. companies at $10 billion (Bekker, 2003). While improved filters send more spam to trash cans, ever more spam is sent, consuming an increasing proportion of network resources. Users shielded behind spam filters may notice little change, but the Internet transmitted-spam percentage has been steadily growing. It was 8% in 2001, grew from 20% to 40% in 6 months over 2002 to 2003, and continues to grow (Weiss, 2003). In May 2003, the amount of spam e-mail exceeded nonspam for the first time, that is, over 50% of transmitted e-mail is now spam (Vaughan-Nichols, 2003). Informal estimates for 2004 are over 60%, with some as high as 80%. In practical terms, an ISP needing one server for customers must buy another just for spam almost no one reads. This cost passes on to users in increased connection fees. Pretransmission filtering could reduce this waste, but creates another problem: spam false positives, that is, valid e-mail filtered as spam. If you accidentally use spam words, like enlarge, your e-mail may be filtered. Currently, receivers can recover false rejects from their spam filter’s quarantine area, but filtering before transmission means the message never arrives at all, so neither sender nor receiver knows there is an error. Imagine if the postal mail system shredded unwanted mail and lost mail in the process. People could lose confidence that the mail will get through. If a communication environment cannot be trusted, confidence in it can collapse. Electronic communication systems sit on the horns of a dilemma. Reducing spam increases delivery failure rate, while guaranteeing delivery increases spam rates. Either way, by social failure of confidence or technical failure of capability, spam threatens the transmission system itself (Weinstein, 2003). As the percentage of transmitted spam increases, both problems increase. If spam were 99% of sent mail, a small false-positive percentage becomes a much higher percentage of valid e-mail that failed. The growing spam problem is recognized ambivalently by IT writers who espouse new Bayesian spam filters but note, “The problem with spam is that it is almost impossible to define” (Vaughan-Nichols, 2003, p. 142), or who advocate legal solutions but say none have worked so far. The technical community seems to be in a state of denial regarding spam. Despite some successes, transmitted spam is increasing. Moral outrage, spam blockers, spamming the spammers, black and white lists, and legal responses have slowed but not stopped it. Spam blockers, by hiding the problem from users, may be making it worse, as a Band-Aid covers but does not cure a systemic sore. Asking for a technical tool to stop spam may be asking the wrong question. If spam is a social problem, it may require a social solution, which in cyberspace means technical support for social requirements (Whitworth & Whitworth, 2004).


Author(s):  
Manuel Castells

Cities are a major source of intellectual creativity and political engagement. We have not finished, and we will never finish, understanding the transformation of cities and the impact of this transformation on society and culture at large. The focus for this chapter is what I would call the great twenty-first century urban paradox—an urban world without cities. Let me try to explain first, and then go into the details of the analysis. I would say that cities have been throughout history sources of cultural creativity, technological innovation, material progress and political democratization. By bringing together people of multicultural origins and by establishing communication channels and systems of cooperation, cities have induced synergy from diversity, dynamic stability from competition, order from chaos. However, with the coming of the information age cities as specific social systems seem to be challenged by the related processes of globalization and informationalization. New communication technologies appear to supersede the functional need for spatial proximity as the basis for economic efficiency and personal interaction. The emergence of a global economy and of global communication systems subdue the local to the global, blurring social meaning and hampering political control traditionally exercised from and by localities. Flows seem to overwhelm places as human interaction increasingly relies on electronic communication networks. Therefore, cities as specific forms of social organization and cultural expression, materially rooted in spatially concentrated human settlements, could be made obsolete in the new technological environment. Yet, the paradox is that with the coming of the techno-economic system, urbanization— simply understood as spatial concentration—is in fact accelerated. We are reaching a predominantly urban world, which before 2005 will include for the first time in history at least 50 per cent of the planet’s population in cities. Core activities and a growing proportion of people are and will be concentrated in multimillion metropolitan regions. This pattern of social–spatial evolution could lead to what I call urbanization without cities. As, on the one hand, people concentrate in spatial settlements, at the same time suburban sprawl defuses people and activities in a very wide metropolitan span.


Sign in / Sign up

Export Citation Format

Share Document