scholarly journals Electronic delivery: opportunity or exclusion?

2021 ◽  
pp. 270-278
Author(s):  
Agnieszka Korzeniowska-Polak

The new regulations come into force in Poland as of 1 July 2021. The delivery by means of electronic communication will become the rule. Will it not limit the rights of people who do not have access to the Internet of who cannot use it? Will the new regulations not contribute to the even greater exclusion of people who are already excluded (seniors, the disabled or people living in poverty)? Will the new solutions make it easier for them to find their place in the modern world?

Author(s):  
Dan Jerker B. Svantesson

Internet jurisdiction has emerged as one of the greatest and most urgent challenges online, severely affecting areas as diverse as e-commerce, data privacy, law enforcement, content take-downs, cloud computing, e-health, Cyber security, intellectual property, freedom of speech, and Cyberwar. In this innovative book, Professor Svantesson presents a vision for a new approach to Internet jurisdiction––for both private international law and public international law––based on sixteen years of research dedicated specifically to the topic. The book demonstrates that our current paradigm remains attached to a territorial thinking that is out of sync with our modern world, especially, but not only, online. Having made the claim that our adherence to the territoriality principle is based more on habit than on any clear and universally accepted legal principles, Professor Svantesson advances a new jurisprudential framework for how we approach jurisdiction. He also proposes several other reform initiatives such as the concept of ‘investigative jurisdiction’ and an approach to geo-blocking, aimed at equipping us to solve the Internet jurisdiction puzzle. In addition, the book provides a history of Internet jurisdiction, and challenges our traditional categorisation of different types of jurisdiction. It places Internet jurisdiction in a broader context and outlines methods for how properly to understand and work with rules of Internet jurisdiction. While Solving the Internet Puzzle paints a clear picture of the concerns involved and the problems that needs to be overcome, this book is distinctly aimed at finding practical solutions anchored in a solid theoretical framework.


2020 ◽  
Vol 45 (4) ◽  
pp. 115-123
Author(s):  
A. Igibayeva ◽  
◽  
D. Erbolatuly ◽  
G. Turarova ◽  
◽  
...  

The development of the modern world is very complex and rapid, and the process is characterized by high rates of development of information and communication technologies. The Internet space is a means of searching and obtaining information, as well as a medium for communication, virtual interaction, and has a significant impact on the formation of stereotypes of behavior of the young generation, as well as ideals, spiritual values, personal and social worldview. The article identifies the positive aspects of the development of cyberspace by young people, and also notes the threats and barriers to cyber socialization for modern youth. The necessity of conducting psychological and pedagogical research on cyber socialization is actualized, a conclusion is made about the use of new technologies for the purpose of positive cyber socialization of the younger generation.


2021 ◽  
Vol 3 ◽  
pp. 50-52
Author(s):  
Natalia Aleksandrovna Tarasova ◽  

The article deals with the new project — the Internet portal Dostoevsky and the World, launched by the Pushkin House for the 200th anniversary of the writer’s birth. The work offers the basic information on the project. The Internet resource that would host the most representative examples of the reception of Dostoevsky’s personality and work in various epochs and in various countries is a great way to familiarize the modern reader with the wide scope of interest in Dostoevsky in the past and present. The project focuses on the non-academic reception, philosophical and aesthetic interpretations, the attitudes of public fi gures, writers, stage and movie directors, publicists, etc. The collection of case studies of Dostoevsky’s reception by today’s cultural fi gures, as well as the publication of the previously unknown writer-related sources of the past years, are of particular importance.


2017 ◽  
pp. 89-94
Author(s):  
Natalia Tsareva

The article is devoted to the study of the economic potential of the Spanish language, language that speak 500 million people in the modern world. The growing economic value of the Spanish language is determined by two main factors: rst, the process of economic, political and cultural globalization, and second, the development of the information society and its main attribute - the Internet.


2012 ◽  
pp. 944-959 ◽  
Author(s):  
Stepan Konecny

Mass media often presents a warped image of the Internet as an unreliable environment in which nobody can be trusted. In this entry, the authors describe lying on the Internet both in the context of lying in the real world and with respect to the special properties of computer-mediated communication (CMC). They deal with the most frequent motives for lying online, such as increasing one’s attractiveness or experimenting with identities. They also take into account the various environments of the Internet and their individual effects on various properties of lying. The current methods for detecting lies and the potential for future computer-linguistic analysis of hints for lying in electronic communication are also considered.


Author(s):  
Wei Liu ◽  
Keng Soon ◽  
Roshan Peiris ◽  
Yongsoon Choi ◽  
Adrian David Cheok ◽  
...  

The advent of Internet technologies since decades ago has propelled distance learning drastically. In this modern world, knowledge develops so fast that the amount of intellectual information that needs to be learnt before it becomes obsolete again is so huge. Distance learning through the use of Internet technologies has the advantage of being able to get across the information to the students remotely and effortlessly. The other advantage, which is the main focus of this paper, is that students are able to learn from their instructors on an entirely new media platform - the Internet-enabled and tangible user interface. This paper discusses how to use two main new media: multi-modal Internet technologies, namely remote physical interface and remote augmented reality technology in distance learning.


2011 ◽  
pp. 1254-1265
Author(s):  
Michael Kyobe

Electronic communication developments have always been associated with many security risks since the ARPANET implementation in 1960s. In 1972, John Draper (Captain Crunch) unlocked the AT&T phone network marking the beginning of the modern technology of hacking. Later in the 1980s, the seminal developments in the U.S. laid the conceptual and practical foundation for future electronic crime tools such as trapdoors, trojans, and viruses. More recently in the Internet environment, electronic attacks have reached an epidemic level (US-CERT, 2004). In South Africa alone, over 500 Web sites were defaced in January 2005 and e-crime losses are estimated at around 40 billion a year.


Energies ◽  
2020 ◽  
Vol 13 (10) ◽  
pp. 2509 ◽  
Author(s):  
Kamran Shaukat ◽  
Suhuai Luo ◽  
Vijay Varadharajan ◽  
Ibrahim A. Hameed ◽  
Shan Chen ◽  
...  

Cyberspace has become an indispensable factor for all areas of the modern world. The world is becoming more and more dependent on the internet for everyday living. The increasing dependency on the internet has also widened the risks of malicious threats. On account of growing cybersecurity risks, cybersecurity has become the most pivotal element in the cyber world to battle against all cyber threats, attacks, and frauds. The expanding cyberspace is highly exposed to the intensifying possibility of being attacked by interminable cyber threats. The objective of this survey is to bestow a brief review of different machine learning (ML) techniques to get to the bottom of all the developments made in detection methods for potential cybersecurity risks. These cybersecurity risk detection methods mainly comprise of fraud detection, intrusion detection, spam detection, and malware detection. In this review paper, we build upon the existing literature of applications of ML models in cybersecurity and provide a comprehensive review of ML techniques in cybersecurity. To the best of our knowledge, we have made the first attempt to give a comparison of the time complexity of commonly used ML models in cybersecurity. We have comprehensively compared each classifier’s performance based on frequently used datasets and sub-domains of cyber threats. This work also provides a brief introduction of machine learning models besides commonly used security datasets. Despite having all the primary precedence, cybersecurity has its constraints compromises, and challenges. This work also expounds on the enormous current challenges and limitations faced during the application of machine learning techniques in cybersecurity.


2008 ◽  
pp. 2704-2723
Author(s):  
Michael Kyobe

Electronic communication developments have always been associated with many security risks since the ARPANET implementation in 1960s. In 1972, John Draper (Captain Crunch) unlocked the AT&T phone network marking the beginning of the modern technology of hacking. Later in the 1980s, the seminal developments in the U.S. laid the conceptual and practical foundation for future electronic crime tools such as trapdoors, trojans, and viruses. More recently in the Internet environment, electronic attacks have reached an epidemic level (US-CERT, 2004). In South Africa alone, over 500 Web sites were defaced in January 2005 and e-crime losses are estimated at around 40 billion a year.


Sign in / Sign up

Export Citation Format

Share Document