scholarly journals “This is not how we imagined it”: Technological affordances, economic drivers, and the Internet architecture imaginary

2021 ◽  
Vol 23 (2) ◽  
pp. 344-362
Author(s):  
Niels ten Oever

The Internet architecture is widely perceived as engine for innovation by providing the equal opportunity to deploy new protocols and applications. This view reflects an imaginary that guides the co-production of policy and technology that can be traced back to the early days of the Internet, which is still prominent among the engineers in one of the main governance bodies of the Internet, the Internet Engineering Taskforce (IETF). After the privatization of the Internet architecture in the 1990s, the interplay between the architectural principles of end-to-end, permissionless innovation, and openness subverted equality among Internet users and hampered their ability to redesign the Internet. I draw on media studies, science and technology studies and international political economy, and use a combination of qualitative and quantitative methods to show how the Internet architecture’s affordance structure got reconfigured, and how this facilitated the prioritization of corporate interests over the interests of end users.

Author(s):  
Diana Elizabeth Moreno Carrillo ◽  
Gustavo Adolfo León Duarte ◽  
Carlos René Contreras Cázarez

ABSTRACTSociety has been transforming throughout the last years. The easy access to Internet has made two important institutions, family and school, cope to new challenges. Teenagers in different countries have access to Internet. However, understanding how these changes affect them, their families, their education, their community and the risks they cope help us get to empiric research. The main inquiry is to identify the use and the role parents have around the Internet and technological devices. The research is based in a mixed approach, combining qualitative and quantitative methods, using a questionnaire and a focus group to collect data.RESUMENLa sociedad ha venido transformándose durante las últimas décadas. El fácil acceso al Internet ha hecho que dos importantes instituciones, la familia y la escuela, se enfrenten a nuevos retos. En distintos países alrededor del mundo, los adolescentes tienen acceso al Internet. Sin embargo, para entender como estos cambios los afecta a ellos, a sus familias, a su educación, a su comunidad y los riesgos que enfrentan, es posible llevar a cabo la investigación empírica. La pregunta central es conocer el uso y el rol que tienen los padres en torno al Internet y a los dispositivos tecnológicos. Como parte de la metodología, la construcción del objeto de estudio se basa en la implementación de un enfoque mixto. La combinación de enfoques cualitativos y cuantitativos conlleva al diseño de dos fases en las que se utilizarán dos herramientas, la encuesta y el grupo focal. Contacto principal: [email protected]


2020 ◽  
pp. 016224392097408
Author(s):  
Britt Paris

The Internet was conceptualized as a technology that would be capable of bringing about a better future, but recent literature in science and technology studies and adjacent fields provides numerous examples of how this pervasive sociotechnical system has been shaped and used to dystopic ends. This article examines different future imaginaries present in Future Internet Architecture (FIA) projects funded by the National Science Foundation (NSF) from 2006 to 2016, whose goal was to incorporate social values while building new protocols to replace Transmission Control Protocol and Internet Protocol to transfer and route information across the ever-expanding Internet. I examine the findings from two of the NSF’s FIA projects—Mobility First (MF) and eXpressive Internet Architecture—to understand the projects’ trajectories and values directives through their funding cycle and their projections into the future. I discuss how project documentation and participant articulations fall into the following three distinct themes about past experience and speculation: understanding the public, negotiating resources, and carrying project values into the future. I conclude that if the future Internet is to promote positive sociotechnical relationships, its architects must recognize that complex social and political decisions pervade each step of technical work and do more to honor this fact.


Author(s):  
Samuel Sinambela ◽  
Aditya Robbi Pangestu ◽  
Rangga Feriyanto

Abstrak: Terkadang pengguna android tidak hati-hati saat berselancar diinternet dan tanpa sadar sebuah malware telah terinstal di perangkat mereka. Malware inilah yang nantinya akan menjadi jalan bagi penyerang untuk mengambil sesuatu di perangkat korban. Maka dari itu, diperlukannya analisis untuk mengetahui apa saja akses yang dibutuhkan ketika sebuah Malware terunduh di perangkat korban. Tujuan Penelitian adalah untuk menganalisis mendapatkan informasi malware yang terdapat pada aplikasi. Metode yang dipakai dalam penelitian ini menggunakan metode kuantitatif. Sample malware akan diambil melalui iklan dan menganalisis malware tersebut menggunakan metode analisis static yang hanya membaca informasi malware tanpa harus menginstalnya. Hasil dari analisis, terdeteksi Malware dan memiliki perizinan yang tidak pada tempatnya. Seperti yang terlihat, aplikasi game tidak memerlukan izin untuk melihat panggilan yang berlangsung. Maka dari itu, diperlukannya kejelian pengguna agar tidak sembarangan mengunduh atau mengklik sesuatu ketika berinternet. User juga harus update pada keamanan perangkat yang dimiliki.Kata kunci: Malware, Analisis Statik, AndroidAbstract: Sometimes Android users are not careful when surfing the internet and unknowingly have malware installed on their devices. This malware is what will later become a way for attackers to take something on the victim's device. Therefore, analysis is needed to see what access is needed when malware is downloaded on the victim's device. The research objective is to analyze the malware information contained in the application. The method used in this research is quantitative methods. Malware samples will be taken through advertisements and analyze the malware using a static analysis method that only reads malware information without having to install it. As a result of the analysis, the malware was detected and had inappropriate permissions. As you can see, the game application is not allowed to see the ongoing calls. Therefore, users need carefulness, so they do not download or click something when surfing the internet. Users also have to update on their own devicesKeywords: Malware, Static Analysis, Android  


2020 ◽  
Vol 13 (4) ◽  
pp. 42
Author(s):  
Austin Liu

The information transfer protocol that supports the modern Internet with its hundreds of thousands of petabytes per month to billions of Internet users across the world was designed in 1981, and it lacks the capacity to properly ensure the security and stability of the Internet today. Features such as the prevention of network attacks, a large address space for the increasing number of devices, verification of the source of an Internet request, and so on are all absent from the current architecture. This paper seeks to review, summarize, and compare six proposals submitted to address the issues IP faces: the Accountable Internet Protocol, the Expressive Internet Architecture, MobilityFirst, Passport, StopIt, and the Traffic Validation Architecture. Finally, the paper details a protocol design that not only is feasible to adopt with the present infrastructure/computing power but also addresses some of the pressing issues of IP, with particular focus on the address space, mitigation of network attacks, and source verification.


2021 ◽  
Vol 26 (1) ◽  
pp. 49
Author(s):  
Tauvik Muhamad ◽  
Hirania Wiryasti ◽  
Eka Novitasari

<p>Despite growing of internet users and digitalizing economy as result of Industry Revolution 4.0, Indonesia experiences with digital divide in which young women are still left behind in the digital economy. To address the issue, affirmative action in accessing skills development and labour market are crucial. The aim of the study is observing whether affirmative action for women exist and it helps to address the issue. The paper uses mixed qualitative and quantitative methods in which primary and secondary data collected respectively through interview, and online survey as well as literature review. The study argues that the affirmative action will not be adequate to address gender inequality in the digital economy, unless integrated approaches through capacity building and women engagement are in place. The paper concludes that the affirmative action is only effective if the intervention integrated with skills development and women engagement at various level of process for policy formulation and its implementation.  </p>


Author(s):  
Michael Latzer ◽  
Natascha Just

Internet-based services that build on automated algorithmic selection processes, for example search engines, computational advertising, and recommender systems, are booming and platform companies that provide such services are among the most valuable corporations worldwide. Algorithms on and beyond the Internet are increasingly influencing, aiding, or replacing human decision-making in many life domains. Their far-reaching, multifaceted economic and social impact, which results from the governance by algorithms, is widely acknowledged. However, suitable policy reactions, that is, the governance of algorithms, are the subject of controversy in academia, politics, industry, and civil society. This governance by and of algorithms is to be understood in the wider context of current technical and societal change, and in connection with other emerging trends. In particular, expanding algorithmizing of life domains is closely interrelated with and dependent on growing datafication and big data on the one hand, and rising automation and artificial intelligence in modern, digitized societies on the other. Consequently, the assessments and debates of these central developmental trends in digitized societies overlap extensively. Research on the governance by and of algorithms is highly interdisciplinary. Communication studies contributes to the formation of so-called “critical algorithms studies” with its wide set of sub-fields and approaches and by applying qualitative and quantitative methods. Its contributions focus both on the impact of algorithmic systems on traditional media, journalism, and the public sphere, and also cover effect analyses and risk assessments of algorithmic-selection applications in many domains of everyday life. The latter includes the whole range of public and private governance options to counter or reduce these risks or to safeguard ethical standards and human rights, including communication rights in a digital age.


2018 ◽  
Vol 36 (1) ◽  
pp. 126-146 ◽  
Author(s):  
Mark Tucker ◽  
Christine Jubb

Purpose The purpose of this paper is to investigate and comment on the factors used by Australian students to select their bank and the products and services they utilise, based on responses to an online questionnaire. Design/methodology/approach A mixed-methods approach, incorporating both qualitative and quantitative methods, was used to investigate this research issue. Convenience sampling resulted in 276 completed online responses. Mean ranking and factor analysis methods were employed to identify the key factors used in selecting a bank and frequency analysis used to examine the products and services utilised by students. Findings The key factors used by students to select a bank in Australia were bank competence, recommendations and outside influences, bank costs, returns and services, and finally location. The main bank products and services used by students were automated teller machines (ATMs), savings accounts, internet and telephone banking, and debit cards. Research limitations/implications The use of an online survey which limits the pool of respondents to internet users and, the sample size limits generalisability of the findings. Practical implications Banks can better target and understand the key determinants used by students in selecting a bank and the products and services this group values. This will allow Australian banks to develop programs to better attract and retain student customers. Originality/value Provides insight to and understanding of the determinants used by students to select their bank and the products and services they utilise. Furthermore, this study fills a gap in the literature by focusing on the banking behaviour of Australian students, an important segment of bank customers previously under-researched.


Author(s):  
Camille Monderin ◽  
Mildred B. Go

The emergence of the Internet gave birth to a new form of language that is unique to the users of the network. Netspeak is the language of the Internet and has adapted the features of both speaking and writing, however, Netspeak has its own unique characteristics as well. This study aimed to find the emerging lexical patterns of Netspeak as used by Filipinos, the extent of use of Netspeak in three most popular social media platforms (Facebook, Instagram and Twitter) as well as various domains of pop culture (entertainment, politics, fashion and sports) and its implications to the language studies in the Philippines. Both qualitative and quantitative methods were used in this study. The corpora of the study were gathered from two months’ worth of social media activities focusing on the comments in the Facebook, Instagram and Twitter of selected public figures. The findings showed that the emerging lexical patterns of Netspeak were abbreviations and homophones and that social media platforms and pop culture domains affect the use of Netspeak features. The platform and domain that got the highest extent of usage of Netspeak lexical features were Twitter and Politics respectively. The results of this study will help in understanding the language that is used in the Internet as well as raise awareness that this kind of language exists.


2013 ◽  
Vol 3 (2) ◽  
pp. 51-58 ◽  
Author(s):  
Ziauddin Ahmed ◽  
Suptendra Nath Sarbadhikari ◽  
Karimon Nesha ◽  
Karishma Sharmin Haque ◽  
Khurshida Khanom ◽  
...  

A descriptive study was conducted among the members of Oral Health group on a social media network (Facebook) through the Internet. The objective of this study was to explore online interactions on oral health among the Internet users. The study was divided into two parts. First part included content analysis of Oral Health group interactions during the period of July 2011 to April 2012 and second part included online survey findings. All the postings and their discussions in “Oral Health” group were collected and analyzed by using both qualitative and quantitative methods. Total 427 group members were included, 65.84% members were recruited by administrator (admin) and 34.16% by other members of Oral Health group. Among the group members 110 (23%) members were actively participating in group interactions. A total 384 interactive messages were exchanged between the members on 194 discrete topics were discussed (in average 2 messages exchanged per topic). The flow of group interactions mostly occurred between dental professional to dental professional 78%, followed by general to general 3%, dental professional to general 9%, general to dental professional 10%. Opinion of survey respondents about the oral health group online interactions were found as appreciative (52%), “modern technology of learning is useful”(34%), “improves clinical knowledge of professionals”(26%), “improves oral hygiene knowledge and practice”(22%), and “helps to solve oral health problems”(38%). Online oral health group appears to be an effective platform for sharing information, experiences and advice on oral health among the Internet users.


Sign in / Sign up

Export Citation Format

Share Document