scholarly journals Visualization of the Legend of Mazepa: substance, genesis, evolution, traditional and modern interpretations

Author(s):  
Olga Kovalevska

The omnipresence of modern technologies and free access to information granted to general public facilitated demythologization of our history, refutation of ingrained archaic stereotypes and propagation of historical knowledge and better understanding of intellectual and cultural heritage. However, lack of systemic approach to processing of the information found, partial coverage of disparate topics and blatant ignorance of how the source interpretations evolved, repeated public indoctrination with second-hand interpretations (i.e. referring to previous interpretations) without explanation of the original semantics of text or image, as well as pathological graphorrhea of certain authors promoted by facilities and resources of numerous social networks, all result in profanation of the epistemological process. In certain cases, this situation is aggravated by the controversy embedded in the written or visual source itself, as well as by the intentional or unintentional bias against a certain historical figure described or depicted by the source, that is smothered in the current confrontation between different myth-making systems or information war. This article exposes the core and sources of the so-called "Hippolytus legend" and its visualization in the XVII-XIX paintings. It puts under scrutiny when and under what circumstances this work of ancient literature transformed into "the Legend of Mazepa". It also exposes the evolution in ХІХ - ХХІ centures of the new edition of the romantic legend presented by the literature, works of fine arts and decorative and applied arts. Various versions of traditional visual interpretations have been analysed along with the underlying reasoning and causes for the emergence of contemporised visual presentation of the well-known image of Mazepa tied to the horse’s croup. The semantic modifications of so-called distorted images of "modern Mazepas" have also been exposed. The historical figures had been most often branded as "modern Mazepas" have also been put under scrutiny. Such a detailed analysis of both Mazepa's literary and visual image and the peculiarities of the emergence and subsequent interpretations of the "Mazepa's lore" are crucial for understanding of the ancient texts and images that are not always correctly interpreted nowadays, thus spawning numerous new fabrications and myths.

Mousaion ◽  
2016 ◽  
Vol 34 (1) ◽  
pp. 83-100
Author(s):  
Solomon Bopape

The study of law focuses, among other aspects, on important issues relating to equality, fairness and justice in as far as free access to information and knowledgeis concerned. The launching of the Open Access to Law Movement in 1992, the promulgation of the Durham Statement on Open Access to Legal Scholarshipin 2009, and the formation of national and regional Legal Information Institutes (LIIs) should serve as an indication of how well the legal world is committed to freely publishing and distributing legal information and knowledge through the Internet to legal practitioners, legal scholars and the public at large aroundthe world. In order to establish the amount of legal scholarly content which is accessible through open access publishing innovations and initiatives, this studyanalysed the contents of websites for selected open access resources on the Internet internationally and in South Africa. The results of the study showed that there has been a steady developing trend towards the adoption of open access for legal scholarly literature internationally, while in South Africa legal scholarly literature is under the control of commercial publishers. This should be an issue for the legal scholarship which, among its focus, is to impart knowledge about the right of access to information and knowledge.


Electronics ◽  
2021 ◽  
Vol 10 (15) ◽  
pp. 1819
Author(s):  
Rasa Bruzgiene ◽  
Konstantinas Jurgilas

Information systems of critical infrastructure provide services on which the core functions of a state and its economy depend as well as welfare of society. Such systems are becoming an increasingly common target for crimes and attacks in cyberspace, as their vulnerabilities can be exploited for malicious activities seeking financial or political gain. One of the main reasons that threatens the security of these systems is the weak control of remote access, otherwise defined as management of a system’s user identity. Management of user identity depends on user authentication, authorization and the assignment of certain rights in the digital space. This paper provides the proposed two-factor (2FA) digital authentication method for remote access to an information system of a critical infrastructure. Results of testing the method’s usability and resilience to cyber threats have shown that the system, in which the method was implemented, is protected from dangerous HTTP requests and publicly available system’s endpoints are protected from threatening inputs that could cause malicious activities on the critical infrastructure. Additionally, the implementation of the authentication API application ensures the rapidity of the method for less than 500 ms for 100 users working in parallel with the system at the same time.


2018 ◽  
Vol 12 (2) ◽  
pp. 179-220
Author(s):  
Jozef Andraško ◽  
Matúš Mesarčík

New technologies have irreversibly changed the nature of the traditional way of exercising the right to free access to information. In the current information society, the information available to public authorities is not just a tool for controlling the public administration and increasing its transparency. Information has become an asset that individuals and legal entities also seek to use for business purposes. PSI particularly in form of open data create new opportunities for developing and improving the performance of public administration.In that regard, authors analyze the term open data and its legal framework from the perspective of European Union law, Slovak legal order and Czech legal order. Furthermore, authors focus is on the relation between open data regime, public sector information re-use regime and free access to information regime.New data protection regime represented by General Data Protection Regulation poses several challenges when it comes to processing of public sector information in form of open data. The article highlights the most important challenges of new regime being compliance with purpose specification, selection of legal ground and other important issues.


2012 ◽  
pp. 1148-1164
Author(s):  
Cathrine T. Nengomasha

Governments have turned to the use of information and communication technologies with the aim of improving service delivery, encouraging citizens in the decision making process, and enhancing accountability, transparency, and effectiveness. Effective inclusive participation of citizens in the government of their country requires access to information through modern technologies. Access to information is vital for transparency, accountability, participation, and the rule of law – all hallmarks of democratic governance. This chapter looks at the role of librarians and records managers in promoting e-government. Their traditional role of collecting, organizing, preserving, and disseminating information places them in a very significant position in e-governance implementation. However, in an electronic environment, they face a number of challenges which include economic, technological, and information literacy. The role played by these professionals, and the challenges each meet are discussed. Some recommendations are provided to enhance the role of these professionals in e-government implementation.


Author(s):  
Eve Loh Kazuhara

The name Yokoyama Taikan is synonymous with Nihonga (Japanese-style painting) and the Japan Art Institute [Nihon Bijutsuin, 日本美術院]. Taikan was among the first batch of students enrolled at the Tokyo School of Fine Arts in 1887 and was closely mentored by the school’s founder, Okakura Tenshin. When Tenshin left to establish the Japan Art Institute in 1898, Taikan followed, one member of an exodus of students from the school. His career became closely associated with the Institute, and in 1914, Taikan revitalized and re-organized the Institute, which had become inactive upon Tenshin’s passing. Taikan is well known for his repertoire of works which include paintings of customs and manners [fûzoku-ga, 風俗画], historical figures, and landscapes. He is most well known for his paintings of Mount Fuji and the works Eight Views of the Xiao and Xiang Rivers (1912) and The Wheel of Life (1923), which are classified as Important Cultural Properties. Throughout his life, Taikan continued to exhibit at almost every government-sponsored exhibition, in addition to those held by the Japan Art Institute. In 1937, Taikan was awarded the Order of Culture recognizing his achievement as a Nihonga artist.


Philosophy ◽  
2013 ◽  
Vol 88 (1) ◽  
pp. 101-114
Author(s):  
Simon P. James

AbstractIt is clear that natural entities can be preserved – they can be preserved because they can be harmed or destroyed, or in various other ways adversely affected. I argue that in light of the rise of scientism and other forms of philistinism, the political, religious, mythic, personal and historical meanings that people find in those entities can also be preserved. Against those who impugn disciplines such as fine arts, philosophy and sociology, I contend that this sort of preservation requires the efforts of those whose work exemplifies the core values of the arts, the humanities and the qualitative social sciences.


Author(s):  
Jeanne Brett ◽  
Lauren Pilcher ◽  
Lara-Christina Sell

The first across-the-table negotiation between Google and China concluded successfully in 2006, when Google received a license to establish a local domain (google.cn) targeted at Chinese Internet users and not subject to the “Great Firewall.” During these negotiations both Google and the Chinese government struggled to reach an outcome that would be acceptable to their constituents. Google was caught between pleasing its shareholders and preserving its reputation for free access to information, while China was balancing the desire for cutting-edge search technology and the concern that liberal access to information would undermine its political-economic model. In the end, the negotiation resulted in Google operating two domains in China: Google.com and Google.cn. In early 2010, Google announced that its corporate infrastructure had been the target of a series of China-based cyber attacks and accused the Chinese government of attempting to further limit free speech on the web. These incidents led to a public conflict and private negotiations between Google and the Chinese government, which culminated in July 2010 when the Chinese government renewed the google.cn license knowing that Google was redirecting all Chinese customers search to its google.hk.com site This case concerns the changes in Google and the Chinese government's environment that led to Google withdrawing services from google.cn and the Chinese government saving face by renewing the google.cn license. The case is based on the publicly reported events surrounding two series of negotiations between the U.S. technology giant Google and the Chinese Government regarding Google's license in China.


2018 ◽  
Vol 3 (1) ◽  
pp. 3
Author(s):  
Miles Caudesch

On the layman's level, this Commentary presents the essence of how and why library staff engage with the public while preserving patron privacy. Basic documentation, such as the Library Bill of Rights and the ALA's Intellectual Freedom Manual are referenced, along with an unsettling article about arson. After reading this Commentary, library staff should feel a renewed sense of loyalty to their profession, as well as an uncomfortable realization that every day, someone's life is held in the balance for educational good or for misapplied freedom: it is partially up to the librarian to help each person pursue excellence within the framework of free access to information.


Behaviour ◽  
2014 ◽  
Vol 151 (2-3) ◽  
pp. 147-165 ◽  
Author(s):  
Oren Harman

Many different histories of the altruism–morality debate in biology are possible. Here, I offer one such history, based on the juxtaposition of four pairs of historical figures who have played a central role in the debate. Arranged in chronological order, the four dyads — Huxley and Kropotkin, Fisher and Emerson, Wynne-Edwards and Williams, and Hamilton and Price — help us grasp the core issues that have framed and defined the debate ever since Darwin: the natural origins of morality, the individual versus collective approach, the levels of selection debate, and the Is–Ought distinction. Looking forward, the continued relevance of the core issues is discussed.


Sign in / Sign up

Export Citation Format

Share Document