scholarly journals Introduction: Information Technology and Authoritarian Populism

2021 ◽  
pp. 1-14
Author(s):  
Jeremiah Morelock ◽  
Felipe Ziotti Narita

This introduction highlights the meaning of the digital in contemporary capitalism with the pervasive presence of digital interactions and the collapse of the dualism between ‘the real’ and ‘the virtual’. The chapter also discusses the methodological guidelines and the book’s commitment with a critical theory of the society of the selfie.

Thesis Eleven ◽  
2021 ◽  
pp. 072551362110059
Author(s):  
Geoff Boucher

Frankfurt School critical theory is perhaps the most significant theory of society to have developed directly from a research programme focused on the critique of political authoritarianism, as it manifested during the interwar decades of the 20th century. The Frankfurt School’s analysis of the persistent roots – and therefore the perennial nature – of what it describes as the ‘authoritarian personality’ remains influential in the analysis of authoritarian populism in the contemporary world, as evidenced by several recent studies. Yet the tendency in these studies is to reference the final formulation of the category, as expressed in Theodor Adorno and co-thinkers’ The Authoritarian Personality (1950), as if this were a theoretical readymade that can be unproblematically inserted into a measured assessment of the threat to democracy posed by current authoritarian trends. It is high time that the theoretical commitments and political stakes in the category of the authoritarian personality are re-evaluated, in light of the evolution of the Frankfurt School. In this paper, I review the classical theories of the authoritarian personality, arguing that two quite different versions of the theory – one characterological, the other psychodynamic – can be extracted from Frankfurt School research.


2021 ◽  
Author(s):  
Edward Yourdon

A t the beginning of this paper, the decentralized world (DW) and decentralized world economy (DeWe) were defined. And the blockchain industry was pointed out to be at the initial stage of the decentralized world parallel to the real world. Then a set of systematicsolutions, named Electronical Material Information Technology (EMIT), was proposed, after which the development direction and path of the decentralized world economy was put forward, from its limitations, by arguing how to provide sufficient and necessary basic conditions for the decentralized world development. In the end, the EMIT was proved to be an effective reference for building the decentralized world from the basic level to the application level and enabling its sustainable development.


Author(s):  
Kashif Kifayat ◽  
Thar Baker Shamsa ◽  
Michael Mackay ◽  
Madjid Merabti ◽  
Qi Shi

The rise of Cloud Computing represents one of the most significant shifts in Information technology in the last 5 years and promises to revolutionise how we view the availability and consumption of computing storage and processing resources. However, it is well-known that along with the benefits of Cloud Computing, it also presents a number of security issues that have restricted its deployment to date. This chapter reviews the potential vulnerabilities of Cloud-based architectures and uses this as the foundation to define a set of requirements for reassessing risk management in Cloud Computing. To fulfill these requirements, the authors propose a new scheme for the real-time assessment and auditing of risk in cloud-based applications and explore this with the use case of a triage application.


Author(s):  
Xiaotong Li

Many information resource managers have learned to be proactive in today’s highly competitive business environment. However, limited financial resources and many uncertainties require them to maximize their shareholders’ equity while controlling the risks incurred at an acceptable level. As the unprecedented development in information technology continuously produces great opportunities that are usually associated with significant uncertainties, technology adoption and planning become more and more crucial to companies in the information era. In this study, we attempt to evaluate IT investment opportunities from a new perspective, namely, the real options theory. Its advantage over other capital budgeting methods like static discounted cash flow analysis has been widely recognized in analyzing the strategic investment decision under uncertainties (Amram & Kulatilaka, 1999; Luehrman, 1998a, 1998b). Smith and McCardle (1998, 1999) further show that option pricing approach can be integrated into standard decision analysis framework to get the best of the both worlds. In fact, some previous IS researches have recognized the fact that many IT investment projects in the uncertain world possess some option-like characteristics (Clemsons, 1991; Dos Santos, 1991; Kumar, 1996). Recently, Benaroth and Kauffman (1999) and Taudes, Feurstein and Mild (2000) have applied the real options theory to real-world business cases and evaluated this approach’s merits as a tool for IT investment planning. As all real options models inevitably depend on some specific assumptions, their appropriateness should be scrutinized under different scenarios. This study aims to provide a framework that will help IS researchers to better understand the real options models and to apply them more rigorously in IT investment evaluation. As the technology changes, the basic economic principles underlying the real options theory do not change. We do need to integrate the IT dimension into the real options based investment decision-making process. Using electronic brokerage’s investment decision in wireless technology as a real-world example, we show the importance of adopting appropriate real options models in IT investment planning. By specifically focusing on the uncertainties caused by IT innovation and competition, our study also gives some intriguing results about the dynamics between IT adoption and the technology standard setting process.


Author(s):  
Christos Boikos ◽  
Konstantinos Moutsoulas ◽  
Charalambos Tsekeris

Social media, as the heart of Web 2.0, is a relatively novel theoretical notion and social phenomenon, pertaining to a long series of academic subjects, such as digital culture, virtual communication, e-democracy, technological convergence, and online interactivity. Arguably, one of the most useful tools to adequately interpret and analyze this phenomenon is Critical Theory. The present article aims to comprehensively discuss and reflexively elaborate on the complex interrelationship between Critical Theory and Web 2.0 developments. This mainly involves the historicization of the relevant concepts and the identification of crucial sociological, philosophical and interdisciplinary issues that strongly demonstrate the essential ontological complicity between the real and the virtual. In addition, the analytical emphasis on recent social movements, such as the Arab Spring, reflexively depicts the new media as critical media, a characteristic feature that somehow stands in contrast to the participation of the internet in the circulation and accumulation of the Capital. Through contemporary Web’s inherent paradoxes, it is eventually shown that the social potential of the new media can indeed be realised, so that the internet serves the people and the public good.


2014 ◽  
Vol 1 (2) ◽  
pp. 236
Author(s):  
Kulakov ◽  
Smirnov ◽  
Lipatov ◽  
Latipov

2020 ◽  
Vol 11 (4) ◽  
pp. 262-274
Author(s):  
Dan L. Milici ◽  
◽  
Mihaela Paval ◽  

Then involvement is essential. You cannot stand aside as a member of a community. The real involvement presupposes first a connection at the level of understanding the phenomenon, an empathic relationship with the studied phenomena and processes, relationship that generate intuitions, leaps in understanding and knowledge, discoveries, revelations. The paper is based on the idea that information technology and communications today generate a global interaction based on a complex computer network, which forms a sphere that covers the planet, assimilated with a global intelligence, to which we can consciously adhere becoming a synapse. a global neural network.


Author(s):  
Lucy Sri Musmini ◽  
Ni Ketut Kertiasih

AbstrakPerkembangan teknologi informasi dapat mempermudah dan mempercepat kegiatan yang dilakukan oleh sistem administrasi akademik. Tujuan penelitian ini adalah mengembangkan sistem administrasi akademik berbasis teknologi informasi Jurusan D3 Akuntansi Undiksha.Metode yang digunakan pada penelitian ini adalah metode pengembangan, dalam hal ini studi kasus pengembangan sebuah sistem administrasi akademik berbasis teknologi pada Jurusan D3 Akuntansi.Hasil penelitian ini adalah analisis sistem, yang terdiri dari analisis kelemahan dan kebutuhan sistem, dan desain sistem, yang terdiri dari desain konteks, flowchart, dan desain sistem riil. Sistem yang dikembangkan terkait dengan kegiatan akademik mahasiswa, dosen, dan jurusan. Akses input sistem dapat dilakukan oleh mahasiswa, dosen, dan administrasi, sedangkan akses output sistem dapat dilakukan oleh dosen dan administrasi. Administrasi jurusan dalam penelitian ini adalah sekretaris jurusan. Informasi yang diperoleh dari sistem adalah kegiatan akademik mahasiswa, dosen, dan jurusan pada Jurusan D3 Akuntansi. Implikasi penelitian ini adalah sistem adminstrasi akademik jurusan yang semakin efektif dan efisien. Kata kunci: Sistem, Administrasi Akademik, dan Teknologi Informasi AbstractThe purpose of this research is to develop academic administration system based on technology information for D3 Accounting Department, Undiksha.The method used in this research is the development method with case study to develop academic administration system based on technology information at the Department of Accounting D3.The results are the analysis of the system, which consists of the analysis of the weaknesses and needs of the system, and the design of the system, which consists of the design context, flowchart, and the design of the real system. The system developed and obtained information related to academic activities of students, lecturer, and department. Access to system input can be done by students, lecturer, and administration, while access to the system output can be done by the lecturer and administration. Administration majoring in this research is the department secretary. Implication of this research is the major system of academic administration more effective and efficient. Keywords : Systems, Academic Administration, and Information Technology


Sign in / Sign up

Export Citation Format

Share Document