Relational process in a learning group

2019 ◽  
Vol 52 (3) ◽  
pp. 330-338
Author(s):  
Richard M Billow

I describe my efforts as an invited presenter to connect an ongoing educational group conducted over the Internet. To illuminate relational theory and technique, I had to forget about being an ‘expert’, and help the other participants to forget about their respective roles as students and staff members. Three frames of psychotherapy came into play that spurred group process: CBT, interpersonal-group-analytic, and relational. More important still were the play of personalities and the particular characteristics of the electronic setting, which included sudden blank spaces and frozen and speechless visuals on our screens. In an hour and a half we were able to strike the chords of human existence. Relational matrices prevail, no matter human or Internet provider.

Author(s):  
Hind Mohammed Abdul Jabbar Ali

Connecting to the  electronic information network (internet) became the most characteristic that distinguish this era However , the long hours which young men daily spend on the internet On the other hand ,there are many people who are waiting for the chance to talk and convince them with their views This will lead the young people to be part in the project of the “cyber armies “that involved with states and terrorist organizations  This project has been able  to recruitment hundreds of people every day to work in its rank . It is very difficult to control these websites because we can see the terrorist presence in all its forms in the internet   In addition there are many incubation environments that feed in particular the young people minds                                                                                         Because they are suffering from the lack of social justice Also the unemployment, deprivation , social and political repression So , that terrorist organizations can attract young people through the internet by convincing them to their views and ideas . So these organizations will enable to be more  stronger.


Author(s):  
Lemcia Hutajulu ◽  
Hery Sunandar ◽  
Imam Saputra

Cryptography is used to protect the contents of information from anyone except those who have the authority or secret key to open information that has been encoded. Along with the development of technology and computers, the increase in computer crime has also increased, especially in image manipulation. There are many ways that people use to manipulate images that have a detrimental effect on others. The originality of a digital image is the authenticity of the image in terms of colors, shapes, objects and information without the slightest change from the other party. Nowadays many digital images circulating on the internet have been manipulated and even images have been used for material fraud in the competition, so we need a method that can detect the image is genuine or fake. In this study, the authors used the MD4 and SHA-384 methods to detect the originality of digital images, by using this method an image of doubtful authenticity can be found out that the image is authentic or fake.Keywords: Originality, Image, MD4 and SHA-384


2020 ◽  
pp. 182-197
Author(s):  
Agnieszka Goral

The aim of the article is to analyse the elements of folk poetics in the novel Pleasant things. Utopia by T. Bołdak-Janowska. The category of folklore is understood in a rather narrow way, and at the same time it is most often used in critical and literary works as meaning a set of cultural features (customs and rituals, beliefs and rituals, symbols, beliefs and stereotypes) whose carrier is the rural folk. The analysis covers such elements of the work as place, plot, heroes, folk system of values, folk rituals, customs, and symbols. The description is conducted based on the analysis of source material as well as selected works in the field of literary text analysis and ethnolinguistics. The analysis shows that folk poetics was creatively associated with the elements of fairy tales and fantasy in the studied work, and its role consists of – on the one hand – presenting the folk world represented and – on the other – presenting a message about the meaning of human existence.


1999 ◽  
Vol 74 (4) ◽  
pp. 493-508 ◽  
Author(s):  
Stephen E. Rau ◽  
Donald V. Moser

This study examines whether personally performing other audit tasks can bias supervising seniors' going-concern judgments. During an audit, the senior performs some audit tasks him/herself and delegates other tasks to staff members. When personally performing an audit task, the senior would focus on the evidence related to that task. We predict that such evidence will have greater influence on the senior's subsequent going-concern judgment. The results of our experiment are consistent with our predictions. When provided with an identical set of information, seniors who performed another audit task for which the underlying facts of the case reflected positively (negatively) on the company's viability, subsequently made going-concern judgments that were relatively more positive (negative). Our results also demonstrate that the well-documented tendency of auditors to attend more to negative information does not always dominate auditors' information processing. Subjects who performed the task for which the underlying facts reflected positively on the company's viability directed their attention to such positive information and, consequently, both their memory and judgments were more positive than those of subjects in the other conditions. Recent findings indicating that biases in seniors' going-concern judgments may not be fully offset in the review process are discussed along with other potential implications of our results.


Network ◽  
2021 ◽  
Vol 1 (1) ◽  
pp. 28-49
Author(s):  
Ehsan Ahvar ◽  
Shohreh Ahvar ◽  
Syed Mohsan Raza ◽  
Jose Manuel Sanchez Vilchez ◽  
Gyu Myoung Lee

In recent years, the number of objects connected to the internet have significantly increased. Increasing the number of connected devices to the internet is transforming today’s Internet of Things (IoT) into massive IoT of the future. It is predicted that, in a few years, a high communication and computation capacity will be required to meet the demands of massive IoT devices and applications requiring data sharing and processing. 5G and beyond mobile networks are expected to fulfill a part of these requirements by providing a data rate of up to terabits per second. It will be a key enabler to support massive IoT and emerging mission critical applications with strict delay constraints. On the other hand, the next generation of software-defined networking (SDN) with emerging cloudrelated technologies (e.g., fog and edge computing) can play an important role in supporting and implementing the above-mentioned applications. This paper sets out the potential opportunities and important challenges that must be addressed in considering options for using SDN in hybrid cloud-fog systems to support 5G and beyond-enabled applications.


Daedalus ◽  
2011 ◽  
Vol 140 (4) ◽  
pp. 108-120 ◽  
Author(s):  
R. Kelly Garrett ◽  
Paul Resnick

Must the Internet promote political fragmentation? Although this is a possible outcome of personalized online news, we argue that other futures are possible and that thoughtful design could promote more socially desirable behavior. Research has shown that individuals crave opinion reinforcement more than they avoid exposure to diverse viewpoints and that, in many situations, hearing the other side is desirable. We suggest that, equipped with this knowledge, software designers ought to create tools that encourage and facilitate consumption of diverse news streams, making users, and society, better off. We propose several techniques to help achieve this goal. One approach focuses on making useful or intriguing opinion-challenges more accessible. The other centers on nudging people toward diversity by creating environments that accentuate its benefits. Advancing research in this area is critical in the face of increasingly partisan news media, and we believe these strategies can help.


Target ◽  
2017 ◽  
Vol 29 (2) ◽  
pp. 319-338 ◽  
Author(s):  
Teresa Iribarren

This article explores translational literary Web 2.0 practices and user-generated cultural creations on the Internet, focusing on video poetry that re-creates canonical poets’ bodies of work. It will be argued that the use of for-profit platforms like YouTube and Vimeo by indie creators and translators of video poetry favours the emergence of new translational attitudes, practices and objects that have positive but also contentious effects. One the one hand, these online mediators explore new poetic expressions and tend to make the most of the potential for dissemination of poetic heritage, providing visibility to non-hegemonic literatures. On the other hand, however, these translational digitally-born practices and creations by voluntary and subaltern mediators might reinforce the hegemonic position of large American Internet corporations at the risk of commodifying cultural capital, consolidating English as a lingua franca and perhaps, in the long run, even fostering a potentially monocultural and internationally homogeneous aesthetics.


2021 ◽  
Vol 2 (4) ◽  
pp. 91-101
Author(s):  
Saleha Ilhaam

The term strategic essentialism, coined by Spivak, is generally understood as “a political strategy whereby differences (within Group) are temporarily downplayed, and unity assumed for the sake of achieving political goals.” On the other hand, essentialism focuses that everything in this world has an intrinsic and immutable essence of its own. The adaption of a particular “nature” of one group of people by way of sexism, culturalization, and ethnification is strongly linked to the idea of essentialism. Mulk Raj Anand’s Bakha is dictated as an outcast by the institutionalized hierarchy of caste practice. He is essentialized as an untouchable by attributing to him the characteristic of dirt and filth. However, unlike other untouchables, Bakha can apprehend the difference between the cultured and uncultured, dirt and cleanliness. Via an analysis of Anand’s “Untouchable,” the present article aims to bring to the forefront the horrid destruction of the individual self that stems from misrepresentations of personality. Through strategic essentialism, it unravels Bakha’s contrasting nature as opposed to his pariah class, defied by his remarkable inner character and etiquette. The term condemns the essentialist categories of human existence. It has been applied to decontextualize and deconstruct the inaccurately essentialized identity of Bakha, which has made him a part of the group he does not actually belong to.


2016 ◽  
Vol 11 (6) ◽  
pp. 32 ◽  
Author(s):  
Shwu-Ing Wu ◽  
Rou Jyun Chen

<p class="ArticleTitle">In recent years, the increasingly innovative and diverse mobile devices have significantly promoted the mobile device-based shopping. What factors influence this kind of shopping? Will consumers purchase things with mobile devices? These are two topics that need to be explored. Through the literature analysis and the empirical research, this study aims to analyze the quality of information, system, service and mobile devices on the mobile device-based shopping platform. Moreover, it studies the attitude of consumers towards mobile device-based shopping, their willingness to adopt the shopping method and the behavioral relationship model in the actual mobile device-based shopping as well as compares the groups of different frequencies of the Internet use in terms of the relationship model.</p>  With the convenient sampling, this study made an investigation among some of those who had experienced shopping on such mobile devices as tablets or smart phones. The 765 retrieved valid copies of questionnaire were divided into three groups—“often”, “average” and “seldom” according to the frequency consumers undertook mobile device-based shopping and were then compared. The results showed that there were significant differences among the three groups in four relationship paths, including: 1) the information quality of the mobile device-based shopping platform has more significant positive influence on consumers’ attitude path of mobile device-based shopping in the “average” group than in the other two; 2) the service quality of the mobile device-based shopping platform has more significant positive influence on consumers’ attitude path of mobile device-based shopping in the “seldom” group than in the other two; 3) the preference for mobile device-based shopping has much significant positive influence on the behavior path of mobile device-based shopping in the “often” group. According to the research results, different groups have different behavior models. These results can serve as reference information in the decision-making of those who establish mobile device-based shopping platforms and manufacture mobile devices.


Author(s):  
Konstantin S. Sharov

The paper is concerned with a study of the changing content and style of non-canonical Christian religious preaching in the digital age. Special attention is paid to the analysis of modern rhetoric Christian preachers practice in their Internet channels, forums and blogs. It is shown that the content of the Internet sermon is largely determined by the Internet users themselves and the topics of their appeals. The fundamental characteristics of the content of the Internet sermon are: 1) focus on the individual, their private goals and objectives, not just on theological problems; 2) rethinking the phenomenon of the neighbour; 3) a shift from the Hesychast tradition of preaching the importance of inner spiritual concentration to the preaching of religious interactivity. The observed stylistic features of the digital preaching can be summarised as follows: 1) moving away from simple answers to the rhetoric of new questions addressed to the audience; 2) empathy, co-participation with a person in his/her life conflicts and experiences; 3) desire to share religious information, not to impose it; 4) resorting to various rhetorical techniques to reach different audiences; 5) a tendency to use slang, sometimes even irrespective of the audience’s language preferences and expectations. It should be pointed out that the Orthodox Internet sermon in the Russian Internet space has a dual and contradictory nature. On the one hand, this phenomenon can be regarded as positive for the Orthodox preaching in general, since it is a means of spreading Christian ideas in the social groups that do not constitute a core of parishioners of Orthodox churches, for example, schoolchildren, students, representatives of technical professions, etc. On the other hand, the effectiveness of such preaching is still unclear. Lack of reliable statistics as well as the results of the survey related to the Orthodox Internet preaching gives us no opportunity to judge about effectiveness or ineffectiveness of the phenomenon at this stage of its development.


Sign in / Sign up

Export Citation Format

Share Document