scholarly journals Sposób kreowania postaci Juliusza Słowackiego w przestrzeni internetowej. Rekonesans

2021 ◽  
Vol 60 ◽  
pp. 27-40
Author(s):  
Elżbieta Szyngiel

The article concerns the ways of creating Juliusz Słowacki’s image online. The problem is discussed based on graphic material (memes, facetiae) and fi lm material (productions in the series“Historia bez cenzury” [History without censorship], “Wielkie konflikty” [Great conflicts]). The authoress briefly discusses the viability of the Romantic paradigm in contemporary Polish cultureand the reminiscence of this presence, which is key in the image of the poet shaped by authors and internet users. Next, the authoress characterises the artist based on the collected research material. In most cases, Słowacki is presented as a negative character — a cowardly, pretentious, conceited man, jealous of the poetic talent of his fellow writers. He is often confronted with AdamMickiewicz, a character depicted much more positively. Summing up, the authoress considers the reasons for this type of simplification of the image of the Polish bard on the internet, and concludes that it is the result of building a schematic image of the world based on stereotypes; this image then begins to function in the collective memory of society.

2019 ◽  
pp. 1818-1839
Author(s):  
Hosnieh Rafiee ◽  
Christoph Meinel

With the increased use of the Internet to share confidential information with other users around the world, the demands to protect this information are also increasing. This is why, today, privacy has found its important place in users' lives. However, Internet users have different interpretations of the meaning of privacy. This fact makes it difficult to find the best way to address the privacy issue. In addition, most of the current standard protocols in use over the Internet do not support the level of privacy that most users expect. The purpose of this chapter is to discuss the best balance between users' expectation and the practical level of privacy to address user privacy needs and evaluate the most important protocols from privacy aspects.


2011 ◽  
pp. 273-285 ◽  
Author(s):  
Alev M. Efendioglu ◽  
Vincent F. Yip

The number of Internet users around the world has been steadily growing and this growth has provided the impetus and the opportunities for global and regional e-commerce. However, as with the Internet, different characteristics (infrastructure and socio-economic) of the local environment have created a significant level of variation in the acceptance and growth of e-commerce in different regions of the world. Our research focuses on the impact of these infrastructure and socio-economic factors on e-commerce development in China and the findings provide insights into the role of culture in e-commerce, and the factors that may impact a broader acceptance and development of e-commerce in China. In this chapter, we present and discuss our findings, and propose some strategies for success for e-commerce in China.


There are very few surveys conducted worldwide regarding internet users' opinions about internet regulation. What's more, the authors have already discussed the importance of measuring public opinion around the world in their endeavour to design and propose a fair IRS that will be accepted by the internet users at a national level. In this chapter, the authors discuss the design of their questionnaire and how it was evolved from the initial 2007 UK questionnaire to the current one that was used for conducting surveys in six different countries. This chapter presents the procedure that was used for collecting responses and what kinds of “safeguard” measures were taken in order to avoid deterioration of the gathered survey data. What's more, the analysis procedure of the gathered data is being presented, and the authors discuss the possibility of biased questionnaires and how the latter can be tackled further in future research.


Author(s):  
Xiaobin Li

A recent report from China Internet Network Information Center indicates that by the end of June 2015, 668 million Chinese have used the internet, which places China as the country with the most internet users in the world. As more Chinese get online, the internet has been integrated into providing education in China, where the age group using the internet the most often is between the ages of 20 and 29. Many of these youth are higher education students. With 34.6 million students the Chinese higher education system is the largest in the world, in which a significant proportion of the students' learning has been impacted by information and communication technology (ICT). The purpose of this article is to provide an overview of how the development of ICT in China has influenced higher education, what opportunities ICT offers for higher education, and what challenges Chinese face in further developing higher education with ICT.


2019 ◽  
Vol 3 (2) ◽  
pp. 125
Author(s):  
Andri Veno ◽  
Tulus Prijanto ◽  
Nurkholis Nurkholis

E-Commerce is an affiliation of E-bisnis in electronic media era, which is fifth industry revolution era (digital era). It is shown by many companies using internet as the most effective means to advertise and promote products produced competing either nationally or globally. Indonesia is one of potential market in Asia even in the world with the fifth largest population in the world in 2017, which the population are more than 263 million people; while the internet users up to 30 June 2017 in Indonesia are more than 132 million people. Of 200 respondents, which the mean of age was 18-24 years old. The respondents consisted of 110 male and 90 female, thus the average gender in Solo was male. The result of analysis showed that Trust was positively and significantly influence Purchase intention, Website Quality was positively significantly influence the Purchase intention, and Percived Risk was positively and significantly influence the Purchase intention, so that each improvement of Percived Risk score would improve Purchase intention.


HortScience ◽  
1994 ◽  
Vol 29 (5) ◽  
pp. 579a-579
Author(s):  
Tim Rhodus

Effective communication of horticultural information over long distances requires the ability to present and receive not only text-based information but also images, sounds, and live-action video. Until recently, the Internet enabled users to communicate in each of these four modes, but not simultaneously. However, as a result of the World-Wide Web (WWW) project and the creation of NCSA Mosaic software, Internet users are able to access and deliver practically any form of communication, as long as it can be digitized. Information from around the world on literally thousands of subjects is now available 24 hours a day. Opportunities to communicate with the general public, primary and secondary science students, or practicing horticulturists are no longer limited by publication delays, travel distances, or media limitations.


2020 ◽  
Vol 13 (4) ◽  
pp. 42
Author(s):  
Austin Liu

The information transfer protocol that supports the modern Internet with its hundreds of thousands of petabytes per month to billions of Internet users across the world was designed in 1981, and it lacks the capacity to properly ensure the security and stability of the Internet today. Features such as the prevention of network attacks, a large address space for the increasing number of devices, verification of the source of an Internet request, and so on are all absent from the current architecture. This paper seeks to review, summarize, and compare six proposals submitted to address the issues IP faces: the Accountable Internet Protocol, the Expressive Internet Architecture, MobilityFirst, Passport, StopIt, and the Traffic Validation Architecture. Finally, the paper details a protocol design that not only is feasible to adopt with the present infrastructure/computing power but also addresses some of the pressing issues of IP, with particular focus on the address space, mitigation of network attacks, and source verification.


2011 ◽  
Vol 16 (1) ◽  
Author(s):  
Gary Saunders

<p class="MsoNormal" style="margin: 0in 0.5in 0pt;"><span style="font-family: &quot;Times New Roman&quot;,&quot;serif&quot;; font-size: 10pt;">The U.S. Department of Defense originally designed the Internet to increase the productivity of government workers and it has now become an enormous opportunity for businesses to advertise, correspond with clients, order from suppliers, and conduct many other business functions at minimal cost.<span style="mso-spacerun: yes;">&nbsp; </span>The Internet has achieved faster acceptance by Americans than any other previous technologies and businesses are already discovering that the Web is having a profound impact on how they conduct business.<span style="mso-spacerun: yes;">&nbsp; </span>Conservative estimates are for Internet retail sales to reach $7 billion by the year 2000, and some respected analysts predict it to grow to $100 billion over the next five to eight years.<span style="mso-spacerun: yes;">&nbsp; </span>As with any new initiative, there are costs, benefits, and risks associated with the undertaking.<span style="mso-spacerun: yes;">&nbsp; </span>Anyone who wishes to maintain a Web site on the Internet can do so at a modest cost, or in some cases at no cost.<span style="mso-spacerun: yes;">&nbsp; </span>One of the many benefits to be gained from placing a company on the Internet such as gaining access to the World Wide Web (WWW).<span style="mso-spacerun: yes;">&nbsp; </span>The WWW gives anyone who is connected the ability to communicate with distant computers all over the world and provides the benefit of being able to send and receive electronic mail (E-mail).<span style="mso-spacerun: yes;">&nbsp;&nbsp; </span>While there are a number of different risks incurred when a company establishes a Web site and goes on the Internet the biggest concern, by far, is security.<span style="mso-spacerun: yes;">&nbsp; </span>When a company installs a Web server at their site, they open a window into their local network that the entire Internet can peer through.<span style="mso-spacerun: yes;">&nbsp; </span>These substantial risks notwithstanding, the Internet provides an opportunity that business cannot afford to pass up.<span style="mso-spacerun: yes;">&nbsp; </span>The number of companies that have already taken advantage of the Internet and the rapid increase in the number of Internet users has fueled a phenomenal growth in electronic commerce.<span style="mso-spacerun: yes;">&nbsp; </span>The Internet provides an excellent opportunity to increase sales at a lower marginal cost than was possible before.<span style="mso-spacerun: yes;">&nbsp; </span>Companies that pass up this tremendous opportunity will probably<span style="mso-spacerun: yes;">&nbsp; </span>not survive in the 21<sup>st</sup> century competitive climate.</span></p>


Author(s):  
Sathiyamoorthi V.

It is generally observed throughout the world that in the last two decades, while the average speed of computers has almost doubled in a span of around eighteen months, the average speed of the network has doubled merely in a span of just eight months! In order to improve the performance, more and more researchers are focusing their research in the field of computers and its related technologies. World Wide Web (WWW) is one of the services provided by the Internet medium for sharing of information. As a result, millions of applications run on the Internet and cause increased network traffic and put a great demand on the available network infrastructure. With the increase in the number of Internet users, it is necessary to enhance the speed. This paper addresses the above issues and proposes a novel integrated approach by reviewing the works related to Web caching and Web pre-fetching.


Author(s):  
Hosnieh Rafiee ◽  
Christoph Meinel

With the increased use of the Internet to share confidential information with other users around the world, the demands to protect this information are also increasing. This is why, today, privacy has found its important place in users' lives. However, Internet users have different interpretations of the meaning of privacy. This fact makes it difficult to find the best way to address the privacy issue. In addition, most of the current standard protocols in use over the Internet do not support the level of privacy that most users expect. The purpose of this chapter is to discuss the best balance between users' expectation and the practical level of privacy to address user privacy needs and evaluate the most important protocols from privacy aspects.


Sign in / Sign up

Export Citation Format

Share Document