Skepticism and the Digital Information Environment

SATS ◽  
2021 ◽  
Vol 0 (0) ◽  
Author(s):  
Matthew Carlson

Abstract Deepfakes are audio, video, or still-image digital artifacts created by the use of artificial intelligence technology, as opposed to traditional means of recording. Because deepfakes can look and sound much like genuine digital recordings, they have entered the popular imagination as sources of serious epistemic problems for us, as we attempt to navigate the increasingly treacherous digital information environment of the internet. In this paper, I attempt to clarify what epistemic problems deepfakes pose and why they pose these problems, by drawing parallels between recordings and our own senses as sources of evidence. I show that deepfakes threaten to undermine the status of digital recordings as evidence. The existence of deepfakes thus encourages a kind of skepticism about digital recordings that bears important similarities to classic philosophical skepticism concerning the senses. However, the skepticism concerning digital recordings that deepfakes motivate is also importantly different from classical skepticism concerning the senses, and I argue that these differences illuminate some possible strategies for solving the epistemic problems posed by deepfakes.

2017 ◽  
Vol 1 (1) ◽  
Author(s):  
Sherly Gina Supratman

AbstrakJaringan Komunikasi seperti Internet� merupakan jaringan yang tidak aman untuk mentransmisi data, seperti teks, audio,video dan citra digital. Salah satu cara untuk pengamanan data dapat dilakukan dengan menggunakan proses kriptografi dan �steganografi. Penggunaan ini dengan tujuan untuk merahasiakan pesan yang dikirim dan sekaligus menghindarkan pesan tersebut dari kecurigaan pihak lain yang tidak berkepentingan.Pesan yang digunakan dalam makalah ini adalah berupa text dengan menyisipkannya pada gambar. Pada proses kriptografi, pesan yang berupa text akan dienkrip dengan algoritma Hill Chiper, dan kemudian pesan yang telah dienkrip akan dilakukan proses steganografi pada citra digital� 8 bit dengan skala 0 � 255, dengan metode Least Significant Bit ( LSB ).�Kata kunci: Kriptografi, Hill Chiper, Steganografi, Least Significant Bit�AbstractCommunication Networks such as the Internet are unsafe networks for transmitting data, such as text, audio, video and digital imagery. One way to secure data can be done by using cryptography and steganography process. This use is for the purpose of concealing messages being transmitted and avoiding such messages from the suspicion by others who are not interested.The message used in this paper is text by inserting it in the image. In the cryptographic process, text messages will be encrypted with the Hill Chiper algorithm, and then the encrypted message will be steganographed on 8-bit digital images on a scale of 0-255, using the Least Significant Bit (LSB) method.�Keywords: Cryptography, Hill Chiper, Steganography, Least Significant Bit


Author(s):  
Tetyana Jezhyzhanska

In the information society the status of information is changing: this main value of global civilization becomes an important resource of socio- economic, technological and cultural development. The rapid development of virtual technologies and the growing number of Internet users in Ukraine and in the world causes the new challenges to communication of each organization. The book publishers are also obliged to respond to these processes. However, the works devoted directly to publishers’ communication in the modern media space are still lacking in Ukraine. The objective of the article is to clarify peculiarities and conditions of the activities of Ukrainian book publishers in today’s media space which is an important issue today. It is analyzed the literature and sources on this issue and it is ascertained the theoretical and practical possibilities to take into account the trends in the world of modern media in the PR-activity of book publishers. Also the prospects for further scientific study and practical use of PR-communications in the activity of publishers are determined. The analysis of current changes in the modern information space allows us to trace the general tendencies: the new subject and object areas are formed; the number of subjects is expanded; the new formats of interaction within the system of communications of the organization and in society as a whole are created. That means that publishing house’s PR-communications are complicated by the emergence of new elements, such as active audience, social networks as communication channels, promotions on the Internet and others. PR communication in the Internet space is the most effective and inexpensive tool for interaction of publishers with active audiences. Thus, the activation of PR communication in the modern media space is associated with the emergence of the latest information technologies, online media as well as development of Internet. The use of online channels of Internet for communication with the target audience of publishing organizations has certain advantages over traditional media. At the same time, it is necessary to take into account the information saturation of media space, which complicates the way of PR-messages of book publishers to the reader.


Screen Bodies ◽  
2018 ◽  
Vol 3 (1) ◽  
pp. 23-36
Author(s):  
Daisuke Miyao

The process of modernization in Japan appeared as a separation of the senses and remapping of the body, particularly privileging the sense of vision. How did the filmmakers, critics, and novelists in the 1920s and 1930s respond to such a reorganization of the body and the elevation of vision in the context of film culture? How did they formulate a cinematic discourse on remapping the body when the status of cinema was still in flux and its definition was debated? Focusing on cinematic commentary made by different writers, this article tackles these questions. Sato Haruo, Ozu Yasujiro, and Iwasaki Akira questioned the separation of the senses, which was often enforced by state. Inspired by German cinema released in Japan at that time, they explored the notion of the haptic in cinema and problematized the privileged sense of vision in this new visual medium.


2018 ◽  
Vol 1 (2) ◽  
pp. 12
Author(s):  
Pedro Vitor de Sousa Guimarães ◽  
Sandro César Silveira Jucá ◽  
Renata Imaculada Soares Pereira ◽  
Ayrton Alexsander Monteiro Monteiro

This paper describes the use of a Linux embedded system for use in digital information and communication technology in order to generate image warnings using Internet of Things (IoT) prin- ciples. The proposed project generated a product, developed using concepts of project-based learning (ABP), called SECI (electronic internal communication system) that is accessed by students to view online warnings by distributed monitors and also by mobile devices connected to the Internet.


2021 ◽  
Vol 7 (3) ◽  
pp. 166
Author(s):  
Dmitriy Rodionov ◽  
Andrey Zaytsev ◽  
Evgeniy Konnikov ◽  
Nikolay Dmitriev ◽  
Yulia Dubolazova

The global COVID-19 pandemic has led to the self-isolation of people and the transformation of many economic and social processes into an electronic version thus contributing to the digitalization of all spheres. Being part of this environment, enterprises generate information resources to develop their desired image, which may vary according to the factors characterizing the information environment. Information capital is a comprehensive characteristic of an enterprise and determines its effectiveness and sustainability. The purpose of this study is to develop a toolkit that allows one to assess the information capital of an enterprise, reflecting its perception within the digital information environment. It is necessary to develop the methodology for the formation of such tools. As a result, a fuzzy-plural approach has been developed to evaluate the index of external information capital. This model allows us to assess the external information capital and to simulate its changes caused by various kinds of information events. The study of key elements, for example, the stability and tonality indices, index of target perception made it possible to systematize chaotic changes in the external environment and describe them using the Chen–Lee attractor model. The results of this study can be useful for researchers in the field of digital information analysis, in particular for the comparative analysis of enterprises and the assessment of their information capital.


2021 ◽  
Vol 54 (4) ◽  
pp. 243-245
Author(s):  
Fabíola Macruz

Abstract There is great optimism that artificial intelligence (AI), as it disrupts the medical world, will provide considerable improvements in all areas of health care, from diagnosis to treatment. In addition, there is considerable evidence that AI algorithms have surpassed human performance in various tasks, such as analyzing medical images, as well as correlating symptoms and biomarkers with the diagnosis and prognosis of diseases. However, the mismatch between the performance of AI-based software and its clinical usefulness is still a major obstacle to its widespread acceptance and use by the medical community. In this article, three fundamental concepts observed in the health technology industry are highlighted as possible causative factors for this gap and might serve as a starting point for further evaluation of the structure of AI companies and of the status quo.


2021 ◽  
Vol 10 (1) ◽  
pp. 493-500
Author(s):  
Roshidi Din ◽  
Reema Ahmed Thabit ◽  
Nur Izura Udzir ◽  
Sunariya Utama

The enormous development in the utilization of the Internet has driven by a continuous improvement in the region of security. The enhancement of the security embedded techniques is applied to save the intellectual property. There are numerous types of security mechanisms. Steganography is the art and science of concealing secret information inside a cover media such as image, audio, video and text, without drawing any suspicion to the eavesdropper. The text is ideal for steganography due to its ubiquity. There are many steganography embedded techniques used Arabic language to embed the hidden message in the cover text. Kashida, Shifting Point and Sharp-edges are the three Arabic steganography embedded techniques with high capacity. However, these three techniques have lack of performance to embed the hidden message into the cover text. This paper present about traid-bit method by integrating these three Arabic text steganography embedded techniques. It is an effective way to evaluate many embedded techniques at the same time, and introduced one solution for various cases.


2020 ◽  
Vol 6 ◽  
pp. 47-75
Author(s):  
Wioletta Pawska

The Right of Minors to Freedom from Gambling and Internet andGaming Addition The aim of the article is to highlight the dangers of gambling and Internet and gaming addiction of minors and young persons. The author is convinced that in the absence of positive legislative changes and if creators of games engaging young persons in gaming are not punished, children will not be safe in the online environment. There will not have any other lives than those in the games they play. Additionally, the most important thing is the role of the parents, guardians and teachers. They should talk to children about the problem, show them the dangers and organise better their free time – in an educational and carefree way. In accordance with the obligatory rules of custody, they should ensure them suitable development, safety and a sense of belonging. The teachers ought to support these activities. Summarising, if the status quo continues to be tolerated, minors and young person’s will be deprived of carefree life and suffer from harm and even sudden deaths. The author is sure that parents and children do not give enough attention to that and we should not take away from young person’s the joy of simple things letting them play in the Internet instead.


2019 ◽  
Vol 2 (1) ◽  
pp. 90 ◽  
Author(s):  
Annisa Dwi Kurniawati

Abstract: The development of technology flows is increasing. The internet, which was initially used by several groups as a medium for the transformation of scientific and academic data, has now been used in almost all aspects of people's lives, including e-commerce transactions. E-commerce transactions are transactions carried out without meetings between parties. By using e-commerce, many reservations are obtained from the seller or buyer. The convenience offered doesn't mean it doesn’t rise the problems. For Muslims, understanding the status of e-commerce transactions is important. E-commerce accepts payments with bai’s-salam, which is about non-related transactions and the suspension of goods for payments that have been hastened. It's just that if on Bai 's-Salam a face-to-face meeting is held for the implementation of sighat, it is different with e-commerce that communicate only through chat. E-commerce is permitted in Islam with a note that there is no riba ',gharar, maisir, etc. Therefore, if it is approved by the payment system on e-commerce, it is asked not to use a credit card to avoid riba’.الملخص: يشهد تطوير تدفقات التكنولوجيا زيادة هائلة. يستخدم الإنترنت في جميع جوانب حياة الناس تقريبًا ، بما في ذلك معاملات التجارة الإلكترونية، معاملات التجارة الإلكترونية هي معاملات تتم بدون اجتماع بين الطرفين .باستخدام التجارة الإلكترونية، الكثير من السهولة حصلت من البائع أو المشتري. يتم تقديم التسهيلات المقدمة. التسهيلات المقدمة لايمكن تسبب مشاك. معلومات المسلمين عن حالة المعاملة التجارة الإلكترونية شيء مهمة. التجارة الإلكترونية مثل بيع السلام هي عن العناصر فى المعاملات وتأخير القبض دفعت مقدما. إذا كان بيع السلام يتم عقد اجتماع وجها لوجه في تنفيذ سيغات تختلف عن التجارة الإلكترونية استخدام التواصل مع الدردشة. التجارة الإلكترونية مباحات في الإسلام مع ملاحظة عدم وجود عناصر الربا والغرار والميسر وغيرها لذلك ، إذا كانت مرتبطة بنظام دفع في التجارة الإلكترونية المستحسن عدم استخدام بطاقة الائتمان لتجنب الربا.. Abstrak: Perkembangan arus teknologi mengalami peningkatan yang masif. Internet yang pada awalnya digunakan oleh beberapa kalangan sebagai media transformasi data ilmiah dan akademik, kini telah digunakan di hampir seluruh aspek kehidupan masyarakat, termasuk transaksi jual beli (e-commerce). Transaksi e-commerce merupakan transaksi yang dilakukan tanpa adanya pertemuan antar para pihak. Dengan menggunakan e-commerce, banyak kemudahan yang diperoleh baik dari pihak penjual maupun pembeli. Kemudahan yang ditawarkan bukan berarti tidak menimbulkan masalah. Bagi kaum muslim, mengetahui status dari transaksi e-commerce merupakan hal yang penting. E-commerce  memiliki kesamaan dengan bai’ as-salam yaitu mengenai unsur-unsur terjadinya transaksi serta adanya penangguhan barang untuk pembayaran yang telah disegerakan. Hanya saja, jika pada bai’ as-salam dilakukan pertemuan face to face untuk pelaksanaan sighat, berbeda halnya dengan e-commerce yang melakukan komunikasi via chatting. E-commerce diperbolehkan dalam Islam dengan catatan tidak adanya unsur riba’, gharar, maisir, dsb. Oleh karena itu, jika dihubungkan dengan sistem pembayaran pada e-commerce, maka dianjurkan tidak menggunakan kartu kredit guna menghindari terjadinya riba’.


Sign in / Sign up

Export Citation Format

Share Document