J. K. Rowling and the Auteur Who Lived

Author(s):  
Anastasia Salter ◽  
Mel Stanfill
Keyword(s):  

Chapter 3 begins with a history of Rowling’s interactions with fandom; not only was Harry Potter one of the first truly massive internet-based fandoms, but she has been famously open to engaging with her fans on the internet from JKRowling.com to Pottermore to Twitter. Rowling’s auteur persona demonstrates a drive to be at the center of the fan experience, between providing a never-ending drip-feed of canon, moving fans into her proprietary Pottermore space, and actively seeking fan attention. In fact, by telling her fans how to interpret and continually re-centering herself, this chapter contends, Rowling models “proper” fandom as obedient to the author, one vital sense in which she is a fangirl auteur.

Author(s):  
Dan Jerker B. Svantesson

Internet jurisdiction has emerged as one of the greatest and most urgent challenges online, severely affecting areas as diverse as e-commerce, data privacy, law enforcement, content take-downs, cloud computing, e-health, Cyber security, intellectual property, freedom of speech, and Cyberwar. In this innovative book, Professor Svantesson presents a vision for a new approach to Internet jurisdiction––for both private international law and public international law––based on sixteen years of research dedicated specifically to the topic. The book demonstrates that our current paradigm remains attached to a territorial thinking that is out of sync with our modern world, especially, but not only, online. Having made the claim that our adherence to the territoriality principle is based more on habit than on any clear and universally accepted legal principles, Professor Svantesson advances a new jurisprudential framework for how we approach jurisdiction. He also proposes several other reform initiatives such as the concept of ‘investigative jurisdiction’ and an approach to geo-blocking, aimed at equipping us to solve the Internet jurisdiction puzzle. In addition, the book provides a history of Internet jurisdiction, and challenges our traditional categorisation of different types of jurisdiction. It places Internet jurisdiction in a broader context and outlines methods for how properly to understand and work with rules of Internet jurisdiction. While Solving the Internet Puzzle paints a clear picture of the concerns involved and the problems that needs to be overcome, this book is distinctly aimed at finding practical solutions anchored in a solid theoretical framework.


Cryptography ◽  
2021 ◽  
Vol 5 (2) ◽  
pp. 14
Author(s):  
Xavier Boyen ◽  
Udyani Herath ◽  
Matthew McKague ◽  
Douglas Stebila

The conventional public key infrastructure (PKI) model, which powers most of the Internet, suffers from an excess of trust into certificate authorities (CAs), compounded by a lack of transparency which makes it vulnerable to hard-to-detect targeted stealth impersonation attacks. Existing approaches to make certificate issuance more transparent, including ones based on blockchains, are still somewhat centralized. We present decentralized PKI transparency (DPKIT): a decentralized client-based approach to enforcing transparency in certificate issuance and revocation while eliminating single points of failure. DPKIT efficiently leverages an existing blockchain to realize an append-only, distributed associative array, which allows anyone (or their browser) to audit and update the history of all publicly issued certificates and revocations for any domain. Our technical contributions include definitions for append-only associative ledgers, a security model for certificate transparency, and a formal analysis of our DPKIT construction with respect to the same. Intended as a client-side browser extension, DPKIT will be effective at fraud detection and prosecution, even under fledgling user adoption, and with better coverage and privacy than federated observatories, such as Google’s or the Electronic Frontier Foundation’s.


2003 ◽  
Vol 28 (1) ◽  
pp. 10-14 ◽  
Author(s):  
Christian David ◽  
Catherine Granger ◽  
Nicole Picot

The French national museum libraries service comprises 21 libraries specialising in the history of western art and archaeology. The central library, which is at the head of the network, was automated first and has completed its retrospective conversion. At first this library catalogued the material acquired for all the others; then a number of them were able in their turn to computerise and thus contribute directly to the union catalogue of the national museum libraries. This can now be consulted on the internet site of the Ministry of Culture.


2016 ◽  
Vol 39 (3) ◽  
pp. 341-356 ◽  
Author(s):  
Olivia Rose Marcus ◽  
Merrill Singer

In this article, the authors provide a layered analysis of Ebola-chan, a visual cultural artifact of the 2014–2015 Ebola outbreak. Rather than considering her as a two-dimensional anime character (i.e. as a simple iconic coping mechanism and/or a fear response), this recent Internet meme is analyzed using an integrated semiotic and structural approach that involves discussion of the genesis of disaster humor in light of the changing world of the Internet, the history of anthropomorphism of disease, and the biosocial nature of an infectious disease epidemic. Our analysis is designed to advance both the anthropology of the Internet and the anthropology of infectious disease. As a multi-vocal symbol with different meanings for different audiences, Ebola-chan represents a social response to a lethal epidemic in the digital age.


Author(s):  
Dave Headlam

The information age has pushed music performance into the era of music informance, in which information and performance are combined in an integrated way. The types of presentation formats and analytical information found in public music theory are ideal for music informance, and present-day explorations of informance on the Internet have a history of noted musical informants including Leonard Bernstein and Glenn Gould. In order to continue to be relevant and to thrive in our connected world, live and recorded music scenarios need to develop ever more innovative ways to enhance music performance with information effectively presented in music informance.


2014 ◽  
Vol 55 (4) ◽  
pp. 1034-1035
Author(s):  
Jonathan Coopersmith
Keyword(s):  

2008 ◽  
Vol 2 (2) ◽  
Author(s):  
Alan Sondheim

The Internet Text is an extended analysis of the environment of Internet communication, an extended meditation on the psychology and philosophy of Net exchange. As such, it is concerned primarily with virtual or electronic subjectivity – the simultaneous presence and absence of the user, the sorts of libidinal projections that result, the nature of flamewars, and the ontological or epistemological issues that underlie these processes. Internet Text begins with a brief, almost corrosive, account of the subject – an account based on the concepts of Address, Protocol, and Recognition. This section “reduces” virtual subjectivity to packets of information, Internet sputterings, and an ontology of the self based on Otherness – your recognition of me is responsible for my Net-presence. The reduction then begins to break down through a series of further texts detailing the nature of this presence; a nature which is both sexualized/gendered, and absenting, the result of an imaginary site. Eventually, it has become clear that everything revolves around issues of the virtual subject, who is only virtual on the Net, but who has a very real body elsewhere. So Internet Text has evolved more and more in a meditation on this subject – a subject which will perhaps be one of the dominant modes of being within the next millennium. Finally, it should be noted that there are no conclusions to be drawn in Internet Text, no series of protocol statements or declarations creating any sort of ultimate defining or explanatory position. The entire history of philosophy mitigates against this; instead, I side with the Schlegels, with Nietzsche, Bataille, Jabes, and others, for whom the fragment is crucial to an understanding of contemporary life... It is dedicated to Michael Current and Clara Hielo.


Author(s):  
AnasGhassan Kanaan ◽  
Shahizan Bin Hassan

This paper presents a study which examines several e-government success factors in Jordan. Due to the pace of globalization and rapid global growth of technology and the Internet information, many governments around the world have turned their services from traditional services into e-government services. Were the citizens, business organizations and other stakeholders are served via the internet. Jordan is one of the rare countries in the Middle East with a history of commitment to good governance and ICT-related initiatives. In recent years, Jordan’s efforts to provide e-government services to the public have been recognized. But still Jordan faces the problem of low usage levels of these electronic services, plus several scholars addressed that several studies were conducted from citizen perspective but few for businesses perspective. For a better understanding of e-government and its influence on the society as all and on the business society in particular the researchers carried out this study to identify the success factors which affect e-government adoption in Jordan, also to investigate the factors that determine business organization satisfaction towards e-government in Jordan. In this paper the researcher will discuss four factors that affect the success of e-government services from businesses perspective in Jordan as followed: e-service quality, perceived usefulness, trust, personalization.


JOURNAL ASRO ◽  
2019 ◽  
Vol 10 (2) ◽  
pp. 105
Author(s):  
Khairul Huda ◽  
Zaenal Syahlan ◽  
M Syaifi ◽  
Edy Widodo

The development of information technology also developed in line with thedevelopment of human civilization. The development of information technology is veryhelpful, one of which is the internet. The use of the internet has developed into anappropriate means to convey information that is fast, effective and accurate. Submissionof information is not limited to all soldiers and the general public by utilizing technologicalfacilities, namely websites. In conveying the history of Indonesia Warship Raden EddyMartadinata 331 and Indonesia Warship I Gusti Ngurah Rai 332 are still stored in the formof documents on a computer and are still printed in the form of sheets of paper. Inconveying the history of Indonesia Warship, it must be developed further to conveyinformation in the current era. Historical research that executive focuses on the past. Sofar, information on the Indonesia Warship Indonesia Warship's historical informationsystem Raden Eddy Martadinata - 331 and Indonesia Warship I Gusti Ngurah Rai - 332on the web-based Indonesian Armed Forces fleet are still in print. besides usinginformation books, then try to make other alternatives by creating a website, besides thatmembers are expected to access information easily and efficiently. With theineffectiveness in managing Indonesia Warship Indonesia Warship historical data RadenEddy Martadinata - 331 and Indonesia Warship I Gusti Ngurah Rai - 332, a design of theIndonesia Warship historical information system was built in the web-based IndonesianArmada fleet which aims to facilitate the process of Indonesia Warship history search.PHP as a programmer and MySQL as the database.Keywords: Website-Based Indonesia Warship History Information System. PHP MySQL.


Sociologija ◽  
2009 ◽  
Vol 51 (1) ◽  
pp. 23-44 ◽  
Author(s):  
Dalibor Petrovic

The aim of the paper is to understand the role of Internet in creating new forms of sociability in the modern society. In the first part the history of social studies of Internet is reviewed, and the conclusion put forward that the anti-social role of the Internet cannot be proved. In the theoretical part of the paper the author presents his idea of two basic roles of Internet as interpersonal interaction tool: transmissional and procreative. These two Internet functions are very important means for reproducing a new form of sociability known as networked individualism.


Sign in / Sign up

Export Citation Format

Share Document