Ten Myths of Internet Art

Leonardo ◽  
2002 ◽  
Vol 35 (5) ◽  
pp. 485-498 ◽  
Author(s):  
Jon Ippolito

This article identifies ten myths about Internet Art, and explains the difficulties museums and others have understanding what it means to make art for the Internet. In identifying these common misconceptions, the author offers insight on successful online works, provides inspiration to Internet artists, and explains that geographical location does not measure success when making art for the Internet. The article also mentions that the World Wide Web is only one of the many parts that make up the Internet. Other online protocols include e-mail, peer-to-peer instant messaging, video-conferencing software, MP3 audio files, and text-only environments like MUDs and MOOs. The author concludes his list of myths with the idea that surfing the Internet is not a solitary experience. Online communities and listservers, along with interactive Internet artworks that trace viewers and integrate their actions into respective interfaces, prove that the Internet is a social mechanism.

2016 ◽  
Vol 44 (4) ◽  
pp. 290-302 ◽  
Author(s):  
Veronica Regueiro ◽  
Jason Mcmartin ◽  
Charles Schaefer ◽  
James M. Woody

Computers and the Internet ushered humanity into a new era in the late 1900s—information on a variety of topics became widely available to the general public, and it became suddenly possible for individuals to communicate with one another instantaneously regardless of each person's geographical location. According to some, the evolution of technology has outpaced humanity's ability to learn how to manage technology properly, and this appears particularly true in the field of psychology. Instant messaging, social media sites, and video conferencing have all influenced the ways in which counselors and clients can interact. Questions remain, however, about the use of this technology. This paper addresses some of those questions by considering whether or not telepsychology is effective when it is used to conduct therapy and the circumstances under which a counselor might use a technological medium to provide such services. A review of some ethical considerations related to the use of technology in the service of providing therapeutic services is also included, as well as a discussion regarding the specific applicability of telepsychology services to international workers, specifically missionaries, serving abroad.


Author(s):  
Vanessa Garza

The collaboration of individuals across large geographic distances began some time ago, perhaps as far back as the 19th century, with the invention of the telegraph, due to its significant impact on communication (Teresko, 2000). Today, with the increased use of computers, the Internet, and the World Wide Web, electronic communication (e-communication), as well as electronic collaboration (e-collaboration) offer individuals around the world the possibility of working together. The wide use of tools such as e-mail and instant messaging, among others, captured the attention of scholars, who began searching for theories that could explain the behavior surrounding the use of electronic media (Kock, 2005b; Simon, 2006).


Author(s):  
Nestor J. Zaluzec

The Information SuperHighway, Email, The Internet, FTP, BBS, Modems, : all buzz words which are becoming more and more routine in our daily life. Confusing terminology? Hopefully it won't be in a few minutes, all you need is to have a handle on a few basic concepts and terms and you will be on-line with the rest of the "telecommunication experts". These terms all refer to some type or aspect of tools associated with a range of computer-based communication software and hardware. They are in fact far less complex than the instruments we use on a day to day basis as microscopist's and microanalyst's. The key is for each of us to know what each is and how to make use of the wealth of information which they can make available to us for the asking. Basically all of these items relate to mechanisms and protocols by which we as scientists can easily exchange information rapidly and efficiently to colleagues in the office down the hall, or half-way around the world using computers and various communications media. The purpose of this tutorial/paper is to outline and demonstrate the basic ideas of some of the major information systems available to all of us today. For the sake of simplicity we will break this presentation down into two distinct (but as we shall see later connected) areas: telecommunications over conventional phone lines, and telecommunications by computer networks. Live tutorial/demonstrations of both procedures will be presented in the Computer Workshop/Software Exchange during the course of the meeting.


Author(s):  
Vaishnavi Bhagwat Savant ◽  
Rupali D. Kasar ◽  
Priti B. Savant

The explosive growth of the Internet has brought many good things such as E-commercebanking, E-mail, cloud computing, but there is also a dark side such as Hacking, Backdoors, Trapdoors etc. Hacking is the first big problem faced by Governments, companies, and private citizens around the world. Hacking means reading email’s of someone, stealing passwords, stealing credit card numbers etc. An ethical hacker is one who can help the people who are suffered by this hackings. This paper describes about Ethical hackers, it’s types and phases of hacking


Author(s):  
Pieter Blignaut ◽  
Theo Mcdonald

For historical reasons, English is the language of the internet. Currently, e-commerce attracts customers from all over the world. In order to do good business, websites must be accessible to clients from a variety of cultures and languages. To achieve usability for a global audience, websites must be internationalized as well as localized. Given the many cultures and idiosyncrasies of those cultures, both of these tasks are extremely complex and it is virtually impossible to do both at the same time. It could be helpful if some cultures do not object to the fact that the language of the internet is not the same as their home language. In this study the preferred language of reading and writing of various groupings of African users was determined. It was found that, whereas the Afrikaans-speaking subjects preferred to have written material in their home language, speakers of other African languages preferred English. This has enormous implications for website development as developers can focus on the usability and functionality of a site without having to spend time translating the content into a variety of languages.


Author(s):  
David Paper ◽  
Kenneth B. Tingey

Access to the world enabled by the Internet facilitates internationalization as never before. However, lack of a coherent global Internet strategy can relegate any company to a strictly provincial “neighborhood” status. Globalization strategies and tactics should therefore be of central concern to all enterprises. To research the strategic issues involved in Internet-based globalization, we embarked on a case study. Our goal is to explore how the Internet and its related technologies can serve to help organizations better deal with the challenges of conducting global business. Our research enabled us to identify a set of heuristic “rules of thumb” that might be used to support Internet-based globalization efforts. In our study we discuss the many challenges to establishing successful global enterprises. We then introduce a model for understanding global business requirements in the e-commerce age. We conclude by analyzing a case study to initially validate our theoretical model and summarize our findings.


2009 ◽  
Vol 60 (1) ◽  
pp. 30
Author(s):  
Ralph L Scott

We have all become increasingly aware that, for commercial and perhaps other reasons, our use of the Internet can and is being tracked. For most of us this tracking has become a major concern as unwanted e-mail (commonly called SPAM) has begun to clog our incoming mailboxes.  There are a variety of ways to combat both the tracking and the receipt of unwanted e-mail. One of the ways of dealing with this problem is the use of an anonymiser service, many of which are available over the Web.


2011 ◽  
Vol 16 (1) ◽  
Author(s):  
Gary Saunders

<p class="MsoNormal" style="margin: 0in 0.5in 0pt;"><span style="font-family: &quot;Times New Roman&quot;,&quot;serif&quot;; font-size: 10pt;">The U.S. Department of Defense originally designed the Internet to increase the productivity of government workers and it has now become an enormous opportunity for businesses to advertise, correspond with clients, order from suppliers, and conduct many other business functions at minimal cost.<span style="mso-spacerun: yes;">&nbsp; </span>The Internet has achieved faster acceptance by Americans than any other previous technologies and businesses are already discovering that the Web is having a profound impact on how they conduct business.<span style="mso-spacerun: yes;">&nbsp; </span>Conservative estimates are for Internet retail sales to reach $7 billion by the year 2000, and some respected analysts predict it to grow to $100 billion over the next five to eight years.<span style="mso-spacerun: yes;">&nbsp; </span>As with any new initiative, there are costs, benefits, and risks associated with the undertaking.<span style="mso-spacerun: yes;">&nbsp; </span>Anyone who wishes to maintain a Web site on the Internet can do so at a modest cost, or in some cases at no cost.<span style="mso-spacerun: yes;">&nbsp; </span>One of the many benefits to be gained from placing a company on the Internet such as gaining access to the World Wide Web (WWW).<span style="mso-spacerun: yes;">&nbsp; </span>The WWW gives anyone who is connected the ability to communicate with distant computers all over the world and provides the benefit of being able to send and receive electronic mail (E-mail).<span style="mso-spacerun: yes;">&nbsp;&nbsp; </span>While there are a number of different risks incurred when a company establishes a Web site and goes on the Internet the biggest concern, by far, is security.<span style="mso-spacerun: yes;">&nbsp; </span>When a company installs a Web server at their site, they open a window into their local network that the entire Internet can peer through.<span style="mso-spacerun: yes;">&nbsp; </span>These substantial risks notwithstanding, the Internet provides an opportunity that business cannot afford to pass up.<span style="mso-spacerun: yes;">&nbsp; </span>The number of companies that have already taken advantage of the Internet and the rapid increase in the number of Internet users has fueled a phenomenal growth in electronic commerce.<span style="mso-spacerun: yes;">&nbsp; </span>The Internet provides an excellent opportunity to increase sales at a lower marginal cost than was possible before.<span style="mso-spacerun: yes;">&nbsp; </span>Companies that pass up this tremendous opportunity will probably<span style="mso-spacerun: yes;">&nbsp; </span>not survive in the 21<sup>st</sup> century competitive climate.</span></p>


Author(s):  
Louis Leung

The advent of new media technologies, such as e-mail, blogs, MSN, online games, mobile phones, iPods, MP3, PS3, NDS, video on demand (VOD), and DVDs, to name a few, has dramatically changed both the nature and number of social compensation and mood management devices available to most youngsters. Although previous research has examined how the Internet has become an important resource for information and entertainment, little research has focused on the ways in which individuals use the Internet for social communication and support. In particular, how personality traits, such as perception of aloneness and age identity gratifications, together with motives for Internet use impact Internet habits and perceived social support are much-neglected areas of research. This chapter investigates how differences in these constructs among adolescents and children influence their online social behavior (such as use of instant messaging, online games, and participating in forums).


Author(s):  
Ben Tran

In the nature of research methodologies, quantitative research and quantitative research data are static through time, compared to qualitative research and qualitative research data. Across the globe, the Internet and mobile technologies are providing unprecedented access to markets and individuals. Such technologies ranges from high-definition video conferencing and instant communication around the world to the ability to reach participants on their mobile devices and access to demographics that are traditionally hard to reach, the Internet is providing technology based research methods like blogs, webinars, virtual intercepts, and virtual reality. The nature of the problem then plays the major role in determining what approaches are suitable. The purpose of this chapter is to cover the three types (trends) of research methodologies: the traditional (quantitative, qualitative), the universal (mixed-methods), and the trends (blogs, webinars, virtual intercepts, and virtual reality).


Sign in / Sign up

Export Citation Format

Share Document