Vanquishing False Idols

Author(s):  
Tahir Abbas

The online world is a space for exploring identities, learning more about the ‘other’ and questions of being and becoming in a much wider space than previously understood. This online world of the far right and Islamist is an alternative reality that enables people to promote their own political views. Unreconstructed patriarchy, in the form of an anti-feminist discourse grounded on selective aspects of conservative Islamic and Christian norms, is finding a new voice on the internet, coupled with hate towards the ‘other’, more generally presented as a common enemy to the collective male ‘self’. The individuals attracted to various forums are often reclusive and difficult to identify. The victims in both cases are young men who are angry, enfeebled and distrustful of one another, now morphed into a cyber-realm where their rage finds a voice online, where their digital tribalism gives them new meaning in an otherwise broken and divided world. A crisis of masculinity is at the heart of the malaise facing young men all over the world. Both radical Islamists and the far-right fringes have galvanized in the online space in resistance to neoliberal globalization, their loss of identity and the increasing prominence of women in society.

Author(s):  
Hind Mohammed Abdul Jabbar Ali

Connecting to the  electronic information network (internet) became the most characteristic that distinguish this era However , the long hours which young men daily spend on the internet On the other hand ,there are many people who are waiting for the chance to talk and convince them with their views This will lead the young people to be part in the project of the “cyber armies “that involved with states and terrorist organizations  This project has been able  to recruitment hundreds of people every day to work in its rank . It is very difficult to control these websites because we can see the terrorist presence in all its forms in the internet   In addition there are many incubation environments that feed in particular the young people minds                                                                                         Because they are suffering from the lack of social justice Also the unemployment, deprivation , social and political repression So , that terrorist organizations can attract young people through the internet by convincing them to their views and ideas . So these organizations will enable to be more  stronger.


Author(s):  
Brian L. Keeley

Where does entertaining (or promoting) conspiracy theories stand with respect to rational inquiry? According to one view, conspiracy theorists are open-minded skeptics, being careful not to accept uncritically common wisdom, exploring alternative explanations of events no matter how unlikely they might seem at first glance. Seen this way, they are akin to scientists attempting to explain the social world. On the other hand, they are also sometimes seen as overly credulous, believing everything they read on the Internet, say. In addition to conspiracy theorists and scientists, another significant form of explanation of the events of the world can be found in religious contexts, such as when a disaster is explained as being an “act of God.” By comparing conspiratorial thinking with scientific and religious forms of explanation, features of all three are brought into clearer focus. For example, anomalies and a commitment to naturalist explanation are seen as important elements of scientific explanation, although the details are less clear. This paper uses conspiracy theories as a lens through which to investigate rational or scientific inquiry. In addition, a better understanding of the scientific method as it might be applied in the study of events of interest to conspiracy theorists can help understand their epistemic virtues and vices.


2004 ◽  
Vol 26 (1) ◽  
Author(s):  
Eric Hilgendorf

AbstractAfter some introductory remarks on the German legal system and German legal politics, the main forms of datanet crime on the Internet are sketched. After that, one of the most important Internet-cases of the last decade, the CompuServe case, is discussed in some detail. One of the main problems of datanet crime is its global reach. The world-spanning nature of the cyberspace significantly enlarges the ability of offenders to commit crimes that will affect people in a variety of other countries. On the other hand, the jurisdiction of national criminal law cannot be expanded at will by any single nation. A transnational criminal law for the Internet is possible but should be restricted to the defence of universally (or nearly universally) accepted interests and values. In effect, it seems that the problems of computer-related crime on the Internet cannot be solved by criminal law alone.


2021 ◽  
pp. 133-146
Author(s):  
Maciej Górny

The aim of the article is to present the opportunities and threats resulting from the implementation of voting via the Internet (i-voting) and to discuss the conditions for effective implementation of this alternative voting procedure on the example of Estonia and Switzerland. Estonia is the only country in the world where i-voting is widely used. In Switzerland, on the other hand, this voting method has been used most often, although its use has been suspended for several years due to legal, infrastructural and political problems. What are the conditions for successfully implementing Internet voting? The attempt to answer this research question was possible thanks to the use of the following research methods: comparative, formal-dogmatic, behavioral and modified historical method. The key conclusion is that the implementation of i-voting must be preceded by many years of political, legal, infrastructural and social activities, and that the created system must be as transparent as possible.


2009 ◽  
Vol 61 (3) ◽  
pp. 109
Author(s):  
Ralph L Scott

An antivirus program continuously monitors your computer to detect a virus, which is automatically deleted and/or quarantined. Firewall programs, on the other hand, block access to your computer from the Internet and prevent hackers from planting a worm or other type of malicious software in your computer. Firewalls protect your data, your computer, and your name from corruption. Stories are legion about the Internet being used to seize control of a computer identity to do things such as send out fake e-mails in your name canceling final exams, insulting your boss, and ordering merchandise such as ten pizzas to be delivered to your office. A good firewall will prevent such aremote seizure of your computer.


Author(s):  
Renan de Souza

Brazil records alarming rates of epidemic violence against women and LGBTQ+. According to statistics, the country ranks as the fifth most violent for women and the deadliest in the world for homosexuals. On the other hand, progressive policies to support both groups have been implemented by different public administrations in the last decades generating remarkable milestones. Despite being considered as cutting-edge, those actions have not necessarily translated into a reduction of violence. One explanation for these paradoxes between progressive policies to protect women, LGBTQ+ and the frequent violence against these groups, might be found in historical, cultural, and religious roots. This article highlights that, notwithstanding that some progress was made in Brazil, the rise of conservative and far-right groups may undermine all the advancement reached in the last decades, which could lead to the aggravation of the gender-based violence in the country


2010 ◽  
Vol 4 (1) ◽  
pp. 3-23
Author(s):  
Hyson Cooper

Using Anthony Trollope’s character Tom Tringle ofAyala’s Angel, I argue that in his portrayal of the hobbledehoy, Trollope is imposing on Victorian boys and young men a code of behavior every bit as restrictive and every bit as unnatural as the “suffer and be still” doctrine imposed on girls and young women. Using critical tools from the fields of Masculinity Studies and studies of literary character, I discuss Trollope’s portrayal of Tom Tringle as emblematic of the restrictions Victorian gender ideology placed on women. What emerges is a new dimension to Victorian gender studies. The admonition addressed to Victorian women of all ages and classes that they should “suffer and be still” in the face of any adversity is well known, and is often accompanied by the assumption that no similar restriction is placed on boys and men. In the world of Anthony Trollope’s novels, however, unlike that of many other Victorian novelists, women seldom need much taming, as obedience is a strong character trait in the majority of his heroines. His young men, on the other hand, tend to be far less morally evolved, and in Trollope’s love plots, if anyone has to undergo profound changes of character before being fit for marriage, it is usually the man. I argue that Trollope’s stern but gentle treatment of the misfit Tom provides further answers to the often debated question of Trollopes relative conservatism.


Author(s):  
Elba del Carmen Valderrama Bahamóndez ◽  
Albrecht Schmidt

The Internet and computers are accessible to only half of the population in the world. For the other half, computers and the Internet are almost alien concepts. This half has no medium for gathering information, and they are computer illiterate. In addition, it is well-known, that the use of computers and the Internet, directly and indirectly, enhance the learning process. Therefore, students from under privileged areas of developing regions of the world are, clearly, at a disadvantage compared to their peers in developed countries. However, mobile phones could change this situation. In developing countries, mobile phones are far more accessible than computers or Internet access. This high accessibility together with the multiple functionalities of mobile phones, allow for the potential to build feasible educational applications that enhance the learning experiences of students in developing countries. Such opportunities enable the students’ experiences to be made proportionate to the other half of the world, with a real mechanism for gathering information.


Author(s):  
James Wierzbicki

This chapter analyzes the two most celebrated American composers of “serious” music, Aaron Copland and Leonard Bernstein, whose music today is still most regularly programmed not just in the United States but around the world. Not widely known during the homophobic Fifties is the now well-documented fact that Copland and Bernstein were closeted gays. Much publicized at the time, on the other hand, was the non-secret that Copland and Bernstein, along with numerous less-stellar composers, held decidedly left-leaning political views. Likely not just by coincidence, then, both Copland and Bernstein in the mid-1950s produced operas that, in a general way, critically comment on anticommunist red-baiting and the Cold War culture of fear. These operas are Copland's 1954 The Tender Land and Bernstein's 1956 Candide.


2016 ◽  
Vol 18 (1) ◽  
pp. 89-115 ◽  
Author(s):  
Umesh Rao Hodeghatta ◽  
Sangeeta Sahney

Purpose – This paper aims to research as to how Twitter is influential as an electronic word-of-mouth (e-WOM) communication tool and thereby affecting movie market. In present days, social media is playing an important role in connecting people around the globe. The technology has provided a platform in the social media space for people to share their experiences through text, photos and videos. Twitter is one such online social networking media that enables its users to send and read text-based messages of up to 140 characters, known as “tweets”. Twitter has nearly 200 million users and billions of such tweets are generated by users every other day. Social media micro-blogging broadcasting networks such as Twitter are transforming the way e-WOM is disseminated and consumed in the digital world. Twitter social behaviour for the Hollywood movies has been assessed across seven countries to validate the two basic blocks of the honeycomb model – sharing and conversation. Twitter behaviour was studied for 27 movies in 22 different cities of seven countries and for six genres with a total tweets of 9.28 million. The difference of Twitter social media behaviour was compared across countries, and “sharing” and “conversation” as two building blocks of the honeycomb model were studied. t-Test results revealed that the behaviour is different across countries and across genres. Design/methodology/approach – The objective of the paper is to analyse Twitter messages on an entertainment product (movies) across different regions of the world. Hollywood movies are released across different parts of the world, and Twitter users are also in different parts of the world. The objective is to hence validate “conversation” and “sharing” building blocks of the honeycomb model. The research is confined to analysing Twitter data related to a few Hollywood movies. The tweets were collected across nine different cities spanning four different countries where English language is prominent. To understand the Twitter social media behaviour, a crawler application using Python and Java was developed to collect tweets of Hollywood movies from the Twitter database. The application has incorporated Twitter application programming interfaces (APIs) to access the Twitter database to extract tweets according to movies search queries across different parts of the world. The searching, collecting and analysing of the tweets is a rather challenging task because of various reasons. The tweets are stored in a Twitter corpus and can be accessed by the public using APIs. To understand whether tweets vary from one country to another, the analysis of variance test was conducted. To assess whether Twitter behaviour is different, and to compare the behaviour across countries, t-tests were conducted taking two countries at a time. The comparisons were made across all the six genres. In this way, an attempt was made to obtain a microscopic view of the Twitter behaviour for each of the seven countries and the six genres. Findings – The findings show that the people use social media across the world. Nearly 9.28 million tweets were from seven countries, namely, USA, UK, Canada, South Africa, Australia, India and New Zealand for 27 Hollywood movies. This is indicative of the fact that today, people are exchanging information across different countries, that people are conversing about a product on social media and people are sharing information about a product on social media and, thus, proving the hypothesis. Further, the results indicate that the users in USA, Canada and UK, tweet more than the other countries, USA and UK being the highest in tweets followed by the Canada. On the other hand, the number of tweets in Australia, India and South Africa are low with New Zealand being the lowest of all the countries. This indicates that different countries’ users have different social media behaviour. Some countries use social media to communicate about their experience more than in some other country. However, consumers from all over the world are using Twitter to express their views openly and freely. Originality/value – This research is useful to scholars and enterprises to understand opinions on Twitter social media and predict their impact. The study can be extended to any products which can lead to better customer relationship management. Companies can use the Internet and social media to promote and get feedback on their products and services across different parts of the world. Governments can inform the public about their new policies, benefits of governmental programmes to people and ways to improve the Internet reach to more people and also for creating awareness about health, hygiene, natural calamities and safety.


Sign in / Sign up

Export Citation Format

Share Document