scholarly journals Sources and citizens: An essay in applied epistemology

2020 ◽  
Vol 18 (4) ◽  
pp. 531-544
Author(s):  
Andrew Thomas

How should pupils use the internet to learn? This essay sets up two modes of using online sources, reading for information and reading for evidence, and evaluates their value for schools. The former is well known; pupils decide whether the source is telling the truth or not. The latter is more familiar in advanced historical investigation, namely deciding what this source’s utterance means for the question in hand. One of these simply hands pupils information. The other requires them to understand what they are reading. It is argued that an education that only involves one of these cultivates passive pupils who are unable to adjust their own attention or listen to minority reports in science. Only when pupils also investigate primary sources will they experience developing their own knowledge, and believe in education.

Author(s):  
Hind Mohammed Abdul Jabbar Ali

Connecting to the  electronic information network (internet) became the most characteristic that distinguish this era However , the long hours which young men daily spend on the internet On the other hand ,there are many people who are waiting for the chance to talk and convince them with their views This will lead the young people to be part in the project of the “cyber armies “that involved with states and terrorist organizations  This project has been able  to recruitment hundreds of people every day to work in its rank . It is very difficult to control these websites because we can see the terrorist presence in all its forms in the internet   In addition there are many incubation environments that feed in particular the young people minds                                                                                         Because they are suffering from the lack of social justice Also the unemployment, deprivation , social and political repression So , that terrorist organizations can attract young people through the internet by convincing them to their views and ideas . So these organizations will enable to be more  stronger.


Author(s):  
Lemcia Hutajulu ◽  
Hery Sunandar ◽  
Imam Saputra

Cryptography is used to protect the contents of information from anyone except those who have the authority or secret key to open information that has been encoded. Along with the development of technology and computers, the increase in computer crime has also increased, especially in image manipulation. There are many ways that people use to manipulate images that have a detrimental effect on others. The originality of a digital image is the authenticity of the image in terms of colors, shapes, objects and information without the slightest change from the other party. Nowadays many digital images circulating on the internet have been manipulated and even images have been used for material fraud in the competition, so we need a method that can detect the image is genuine or fake. In this study, the authors used the MD4 and SHA-384 methods to detect the originality of digital images, by using this method an image of doubtful authenticity can be found out that the image is authentic or fake.Keywords: Originality, Image, MD4 and SHA-384


Network ◽  
2021 ◽  
Vol 1 (1) ◽  
pp. 28-49
Author(s):  
Ehsan Ahvar ◽  
Shohreh Ahvar ◽  
Syed Mohsan Raza ◽  
Jose Manuel Sanchez Vilchez ◽  
Gyu Myoung Lee

In recent years, the number of objects connected to the internet have significantly increased. Increasing the number of connected devices to the internet is transforming today’s Internet of Things (IoT) into massive IoT of the future. It is predicted that, in a few years, a high communication and computation capacity will be required to meet the demands of massive IoT devices and applications requiring data sharing and processing. 5G and beyond mobile networks are expected to fulfill a part of these requirements by providing a data rate of up to terabits per second. It will be a key enabler to support massive IoT and emerging mission critical applications with strict delay constraints. On the other hand, the next generation of software-defined networking (SDN) with emerging cloudrelated technologies (e.g., fog and edge computing) can play an important role in supporting and implementing the above-mentioned applications. This paper sets out the potential opportunities and important challenges that must be addressed in considering options for using SDN in hybrid cloud-fog systems to support 5G and beyond-enabled applications.


Daedalus ◽  
2011 ◽  
Vol 140 (4) ◽  
pp. 108-120 ◽  
Author(s):  
R. Kelly Garrett ◽  
Paul Resnick

Must the Internet promote political fragmentation? Although this is a possible outcome of personalized online news, we argue that other futures are possible and that thoughtful design could promote more socially desirable behavior. Research has shown that individuals crave opinion reinforcement more than they avoid exposure to diverse viewpoints and that, in many situations, hearing the other side is desirable. We suggest that, equipped with this knowledge, software designers ought to create tools that encourage and facilitate consumption of diverse news streams, making users, and society, better off. We propose several techniques to help achieve this goal. One approach focuses on making useful or intriguing opinion-challenges more accessible. The other centers on nudging people toward diversity by creating environments that accentuate its benefits. Advancing research in this area is critical in the face of increasingly partisan news media, and we believe these strategies can help.


Target ◽  
2017 ◽  
Vol 29 (2) ◽  
pp. 319-338 ◽  
Author(s):  
Teresa Iribarren

This article explores translational literary Web 2.0 practices and user-generated cultural creations on the Internet, focusing on video poetry that re-creates canonical poets’ bodies of work. It will be argued that the use of for-profit platforms like YouTube and Vimeo by indie creators and translators of video poetry favours the emergence of new translational attitudes, practices and objects that have positive but also contentious effects. One the one hand, these online mediators explore new poetic expressions and tend to make the most of the potential for dissemination of poetic heritage, providing visibility to non-hegemonic literatures. On the other hand, however, these translational digitally-born practices and creations by voluntary and subaltern mediators might reinforce the hegemonic position of large American Internet corporations at the risk of commodifying cultural capital, consolidating English as a lingua franca and perhaps, in the long run, even fostering a potentially monocultural and internationally homogeneous aesthetics.


1981 ◽  
Vol 5 (4) ◽  
pp. 371-392 ◽  
Author(s):  
William O. Aydelotte

There has been over the last several decades an active campaign for the use of systematic methods in historical research, particularly for the verification of contentions by the most rigorous means that our information and our analytical tools, quantitative ones when possible, can provide. It is probably correct to say that by now this battle is largely won, in principle at least. Few historians still object to formal arrangement of the evidence or to counting, even if many of them do not do things quite this way themselves. Methods that a generation ago were regarded as outrageous and on the lunatic fringe of scholarship are no longer controversial. It is true that a few diehards in the profession still protest against these innovations. On the other hand, some at the opposite end of the methodological spectrum contend that we have not gone far enough—that historical projects have not maintained acceptable technical standards and that ventures of historians into formal methods have been elementary and intellectually sloppy (Kousser, 1977). It is proper that these questions should be raised and no doubt there is room for improvement. Yet at least scholars have become aware of the value of systematic research and have begun to discuss in constructive fashion what needs to be done to make it more effective.


2016 ◽  
Vol 11 (6) ◽  
pp. 32 ◽  
Author(s):  
Shwu-Ing Wu ◽  
Rou Jyun Chen

<p class="ArticleTitle">In recent years, the increasingly innovative and diverse mobile devices have significantly promoted the mobile device-based shopping. What factors influence this kind of shopping? Will consumers purchase things with mobile devices? These are two topics that need to be explored. Through the literature analysis and the empirical research, this study aims to analyze the quality of information, system, service and mobile devices on the mobile device-based shopping platform. Moreover, it studies the attitude of consumers towards mobile device-based shopping, their willingness to adopt the shopping method and the behavioral relationship model in the actual mobile device-based shopping as well as compares the groups of different frequencies of the Internet use in terms of the relationship model.</p>  With the convenient sampling, this study made an investigation among some of those who had experienced shopping on such mobile devices as tablets or smart phones. The 765 retrieved valid copies of questionnaire were divided into three groups—“often”, “average” and “seldom” according to the frequency consumers undertook mobile device-based shopping and were then compared. The results showed that there were significant differences among the three groups in four relationship paths, including: 1) the information quality of the mobile device-based shopping platform has more significant positive influence on consumers’ attitude path of mobile device-based shopping in the “average” group than in the other two; 2) the service quality of the mobile device-based shopping platform has more significant positive influence on consumers’ attitude path of mobile device-based shopping in the “seldom” group than in the other two; 3) the preference for mobile device-based shopping has much significant positive influence on the behavior path of mobile device-based shopping in the “often” group. According to the research results, different groups have different behavior models. These results can serve as reference information in the decision-making of those who establish mobile device-based shopping platforms and manufacture mobile devices.


Author(s):  
Konstantin S. Sharov

The paper is concerned with a study of the changing content and style of non-canonical Christian religious preaching in the digital age. Special attention is paid to the analysis of modern rhetoric Christian preachers practice in their Internet channels, forums and blogs. It is shown that the content of the Internet sermon is largely determined by the Internet users themselves and the topics of their appeals. The fundamental characteristics of the content of the Internet sermon are: 1) focus on the individual, their private goals and objectives, not just on theological problems; 2) rethinking the phenomenon of the neighbour; 3) a shift from the Hesychast tradition of preaching the importance of inner spiritual concentration to the preaching of religious interactivity. The observed stylistic features of the digital preaching can be summarised as follows: 1) moving away from simple answers to the rhetoric of new questions addressed to the audience; 2) empathy, co-participation with a person in his/her life conflicts and experiences; 3) desire to share religious information, not to impose it; 4) resorting to various rhetorical techniques to reach different audiences; 5) a tendency to use slang, sometimes even irrespective of the audience’s language preferences and expectations. It should be pointed out that the Orthodox Internet sermon in the Russian Internet space has a dual and contradictory nature. On the one hand, this phenomenon can be regarded as positive for the Orthodox preaching in general, since it is a means of spreading Christian ideas in the social groups that do not constitute a core of parishioners of Orthodox churches, for example, schoolchildren, students, representatives of technical professions, etc. On the other hand, the effectiveness of such preaching is still unclear. Lack of reliable statistics as well as the results of the survey related to the Orthodox Internet preaching gives us no opportunity to judge about effectiveness or ineffectiveness of the phenomenon at this stage of its development.


Author(s):  
Roberts Darģis ◽  
Kristīne Levāne-Petrova ◽  
Ilmārs Poikāns

This paper describes lessons learned from developing the most recent Balanced Corpus of Modern Latvian (LVK2018) from various online sources. Most of the new corpora are created from data obtained from various text holders, which requires cooperation agreements with each of the text holders. Reaching these cooperation agreements is a difficult and time consuming task and may not be necessary if the resource to be created is not of hundred millions of size. Although there are many different resources available on the Internet today for a particular language, finding viable online resources to create a balanced corpus is still a challenging task. Developing a balanced corpus from various online sources does not require agreements with text holders, but it presents many more technical challenges, including text extraction, cleaning and validation.


2021 ◽  
Vol 34 (02) ◽  
pp. 1032-1038
Author(s):  
Arya Majidi

Population growth and urbanization have led to an increase in the rate of waste production, the lack of timely and proper management of which will have adverse effects on human life and the environment. Since most of the waste management costs are spent on waste collection and transportation, it is necessary to find solutions to control the huge costs of this sector. On the other hand, today, intelligent technologies are used globally as solutions to meet challenges in various fields such as agriculture to improve agro-industrial production, transportation, and waste management, which creates a concept called smart cities. One of the categories that has changed the concept of cities and made them have easier and smarter answers to various events and needs is the "Internet of Things", in which many cases and infrastructures with new hardware technologies and Software are integrated. Waste collection is no exception to this rule and efforts have been made to make it smarter. In this research, some of the latest innovations presented globally in order to make trash smarter have been examined.


Sign in / Sign up

Export Citation Format

Share Document