The Renaissance of Learning

2005 ◽  
Vol 20 (1) ◽  
pp. 6-14
Author(s):  
Chris Yapp

We are living in an era of rapid and disruptive changes in many aspects of our lives. Rapid developments in Information and Communications Technologies, ICTs give modern society a capacity no previous generation could aspire to. Do we therefore believe that ‘history is bunk?’ Back in the early 1990s when talk of the information superhighway and the Information Society arose, there was much talk about this being the new or next Industrial Revolution I sat through many presentations and read many articles which tried to draw a parallel between the capabilities of ICT and in particular the internet with the steam engine, spinning jenny and the production line amongst others. For me it didn't feel the correct analogy. In truth, part of this is personal. In revolutions, there are many victims and after the revolution, you shoot the revolutionaries. Standing where I was, that felt deeply uncomfortable. My thinking on the Renaissance as a potential model started in 1996.

2013 ◽  
pp. 60-80 ◽  
Author(s):  
Claudia Canongia ◽  
Raphael Mandarino

This chapter introduces the theme of cybersecurity, its importance in the actual scenario, and the challenges of the new Information Society, whose critical development factors are the technological revolution and innovation. The revolution that the information and communications technologies (ICTs) has already brought to modern society is, without doubt, more than visible and concrete, but the great challenge facing us is to harmonize two dimensions, the first relating to the culture of sharing, socialization, and transparency, and the second relating to the issues of security, confidentiality, and privacy. It gives a broad overview in tabular form of the national cybersecurity strategies of the developed countries, United States and United Kingdom, as well as describing a study case, Brazil, is taking its first steps on the path towards cybersecurity. The chapter ends by proposing a model, the key elements for formulating a Brazilian cybersecurity strategy.


Author(s):  
Claudia Canongia ◽  
Raphael Mandarino

This chapter introduces the theme of cybersecurity, its importance in the actual scenario, and the challenges of the new Information Society, whose critical development factors are the technological revolution and innovation. The revolution that the information and communications technologies (ICTs) has already brought to modern society is, without doubt, more than visible and concrete, but the great challenge facing us is to harmonize two dimensions, the first relating to the culture of sharing, socialization, and transparency, and the second relating to the issues of security, confidentiality, and privacy. It gives a broad overview in tabular form of the national cybersecurity strategies of the developed countries, United States and United Kingdom, as well as describing a study case, Brazil, is taking its first steps on the path towards cybersecurity. The chapter ends by proposing a model, the key elements for formulating a Brazilian cybersecurity strategy.


2011 ◽  
pp. 759-772
Author(s):  
Lucas Walsh

This article examines some of the challenges faced by local government during the development and implementation of a relatively new area of e-democratic innovation in Australia: e-consultation. E-consultation is seen as a valuable way through which a two-way relationship can be developed and enhanced between citizens and elected representatives. It involves the use of information and communications technologies (ICTs), such as the Internet, to extend and/or enhance political democracy through access to information, and to facilitate participation in democratic communities, processes, and institutions. Drawing on a case study of the Darebin eForum in Victoria, Australia, this article focuses on the role of public servants as moderators of this local form of e-consultation. The discussion has three parts: online policy consultation is defined within the context of e-democracy; some of the ways that e-consultation challenges the roles of the public service, elected representatives, and citizens are outlined; and the author then argues for an e-consultation strategy that is situated within a continuum of citizen engagement that is ongoing, deliberative, educative, and inclusive.


Author(s):  
Wendy Faulkner ◽  
Merete Lie

Strategies of Inclusion Gender and the Information Society (SIGIS) was a European study exploring initiatives to include more women in the information society.1 This article summarises its main conclusions. The work started from the premise that overall more women than men are excluded from the information society, both as users and as designers of new information and communications technologies (ICTs). Our literature review (Sørensen & Stewart, 2002) confirmed that there is still a gender gap in terms of ownership of some ICT products and, to a lesser extent, in terms of access and use. Gender cuts across other dynamics in the digital divide—income, occupation and age being generally more significant than gender—with other factors (e.g., ethnic minorities, lone parent families) also intervening. Although the trend with respect to the use of ICT products is one of a closing gender gap, it is clear that diffusion alone is not sufficient to close the gap all together; inclusion efforts are still warranted in this area. By contrast, the literature review revealed a persistent and sizeable gender gap within computer specialisms and professions designing ICTs. The proportion of women entering computer science and engineering courses in most countries is static or in decline, in spite of sustained inclusion efforts. So, the overall picture across Europe is a contradictory one: optimistic with respect to what we call women and ICT (users), and pessimistic with respect to women in ICT (professionals).


2009 ◽  
pp. 134-152
Author(s):  
Chin-fu Hung

China has vigorously implemented ICTs to foster ongoing informatization accompanying industrialization as a crucial pillar to drive its future economic development. The institutional and legal reforms involved were initiated and put into practice in order to meet the increasing demand for technological convergence and the negotiations for the expected entry into the World Trade Organization (WTO). The Chinese government has nevertheless long been torn by the ambivalence brought about by the Internet. It regards the Internet as an engine to drive economic growth on the one hand, and as a subversive challenge to undermine the ruling Communist Party on the other hand. As soon as ICTs were introduced and Web sites mushroomed, the Party was so determined to harness the new medium to assure the Internet’s economic and scientific benefits. As a consequence, controls other than stifling ICTs would be critical for the CCP’s agenda to achieve the century-long modernization process and in the meantime, consolidate its power.


Author(s):  
William H. Dutton

This chapter offers a broad overview of Internet Studies. The key challenge of Internet Studies research focuses on the discovery of concepts, models, theories, and related frameworks that give a more empirically valid understanding of the factors influencing the Internet and its societal implications. The Internet can be used in everyday life and work, and in a converging media world. The study of Internet policy and regulation has focused on issues of freedom of expression, privacy, and ‘Internet governance’. Then, the chapter briefly discusses the issue on the definition of the Internet, and how its resolution is connected to how narrowly or broadly people draw the history of the Internet and the boundaries of the field. It is observed that studies of politics, relationships, news, and other phenomena are exploring the Internet within a larger ecology of information and communications technologies (ICTs). Also, the Internet and related ICTs are globally important.


Author(s):  
István Mezgar

Based on the results of the information and communications technologies (ICTs), a new “digital” economy and society are arising. This new computer- and communication-networked environment needs new set of services and technologies besides new rules and values, which determine the behavior of its actors. In the starting phase of information society the Internet, later on the Internet-based technologies (e.g., the Web) have changed the way business was done the world over, and is now changing the way government interacts with citizens and business sector. With the dramatic increase of the Internet as a business tool and the incredible growth of e-technologies have changed not only the economy but the society as well. According to researchers, early e-government was a form of e-commerce as both used Internet-based technology for the benefit of the information society. Today, e-government can be defined as online government services, that is, any interaction one might have with any government body or agency, using the Internet or World Wide Web. As the mobility is an important characteristic of the information society, new e-government solutions apply wireless/mobile networks as well. The insufficient security of many Internet services is an important limitation of using the Internet. Lack of trustworthy security services is a major obstacle to the use of information systems in private, in business as well as in public services. Trust is intimately linked to citizens’ rights, like security, identification, authentication, privacy, and confidentiality. Secure identification, authentication of the users and communication security are main problems in today’s networked systems. These demands for trust and security are valid in an increased extent in case of digital government applications.


2014 ◽  
Vol 1 (1-2) ◽  
pp. 54-77 ◽  
Author(s):  
Chin-fu Hung

AbstractUsing the case of the death of a 24-year old Taiwanese soldier, Hung Chung-chiu (洪仲丘), this article investigates the evolving phenomenon of Taiwan’s new civic movement that is highly mediated and empowered by Information and Communications Technologies (icts). Examining the case of a tragic death of Army Corporal Hung, this article argues that enhanced public engagement and awareness of citizens’ rights in the military will ultimately further strengthen Taiwan’s civil society and will eventual help consolidate Taiwan’s young democracy.


2009 ◽  
Vol 26 (1) ◽  
pp. 89-106 ◽  
Author(s):  
Brett Hutchins ◽  
David Rowe ◽  
Andy Ruddock

MyFootballClub (MFC) is a popular computer game, Web site, online networking experiment, business model, and an actual soccer club. This article uses MFC to address the question of how networked media sport is reshaping the media sports cultural complex (Rowe, 2004). Our aim is to show how the professionalization and mediatization of sport has created a longing to reconstruct a kind of communitas around supporter participation in the ownership and running of their team. We conclude by suggesting that it is now time to think less in terms of the longstanding relationship between sport and media, and more about sport as media given the increasing interpenetration of digital media content, sport, and networked information and communications technologies.


Author(s):  
Lauren Bull

For decades, the gender digital divide has been observed as a concept and a construct throughout countries all over the world. It persists with particular belligerence in areas like Latin America, where myths surrounding its existence have perpetuated disparities in men’s and women’s access to and use of the internet and information and communications technologies (ICTs). In this paper, the author reveals that in order for the gender digital divide to be rectified, it must first be ‘de-myth-tified’, and claims about the divide as nonexistent, unimportant, or due to women’s inherent technophobia systematically discredited. It is then argued that, by exposing the true nature of the divide, spaces are created for libraries to take on a new role in Latin America, as advocates for gender equality in technology and information. Possibilities for improving policy, education, and innovation are explored, with a call for further research in the field. Second Place DJIM Best Article Award.


Sign in / Sign up

Export Citation Format

Share Document