Online communication: risks and prospects (on the basis of sociological study of public opinion in the EU countries)

Author(s):  
M. Yenin ◽  
Н. Korzhov

The article analyzes the main approaches to the prospects for the development of network communication practices via the Internet. The influence of the development of digital technologies of social communication on the processes of socio-economic development, expansion of political participation, distribution of power and political mobilization is explored. At the same time, special attention is paid to the challenges and risks posed by Internet technologies for personal rights and freedoms. In particular, the emphasis is on the perception by Internet users of threats they face in the global computer network, on their behavioral responses to cybercrime, including safer patterns of behavior in cyberspace. Over time the level of competence of Internet users, their awareness in the field of cybersecurity is constantly increasing. There is also a growth, sometimes noticeable, in the share of the Internet audience utilizing various types of online services. The research illuminates that despite the growing scale of danger and concern of users themselves, the actual level of cyber-victimization among residents of EU countries remains quite stable. Such a positive trend is explained by both the effectiveness of measures to prevent and combat cybercrime implemented by government and corporate institutions and proactive and conscious position of the users themselves. The latter, being aware of the depth and scale of the risks, make various efforts to ensure network security (they periodically change passwords to access various online services, seek help from relevant organizations – both public and private).

2017 ◽  
Vol 18 (3) ◽  
pp. 12 ◽  
Author(s):  
Robert M. Stonehill ◽  
Lynn Smarte

In recent years, the Educational Resources Information Center (ERIC) system has undergone tremendous changes in the kinds of products and services it offers and the methods by which users can access them. AskERIC, a computer network-based question-answering service and virtual library, exemplifies these changes. This article describes AskERIC, other ERIC gopher sites, the National Parent Information Network, ERIC listserv activity on the Internet, and ERIC 's offerings on commercial online services. It also lists resources for librarians who do training sessions on ERIC and sketches ERIC's future direction. 


2012 ◽  
pp. 1264-1281
Author(s):  
Yurong He ◽  
Yang Wang

While China has the world’s largest Internet population, understanding of this huge group of Internet users still falls short. In this entry, the authors aim to provide an overview of literature on cyber behavior of Chinese Internet users. They focus on characteristics of Chinese Internet users, how they use the Internet and how the Internet influences them. The authors examine different aspects of their cyber behavior: (1) general Internet use, (2) use of specific Internet services such as blogs and social networking sites, (3) online communication and relationships, (4) problematic Internet usage, and (5) cross-cultural comparisons between Internet users in China and in other countries.


2020 ◽  
Vol 8 (4) ◽  
pp. 445
Author(s):  
Desak putu Sekar merta Putri ◽  
I Komang Ari Mogi

The internet is one part that can not be released in human life today. Every year internet users both in Indonesia and in the world have increased. This increase in internet users causes the availability of IP to decrease. That is because users who will use the internet must have an IP. The availability of IPv4 is currently decreasing. To overcome these problems, IPv6 was made which was announced to replace the existence of IPv4. But another solution that can be taken is using subnetting. With subnetting, IP can be used optimally according to the needs of the host or can make efficient use of IP. And subnetting also functions to avoid congestion resulting from too many hosts on the physical network. And to connect between subnets, routing will be done.


2018 ◽  
Vol 43 (04) ◽  
pp. 1427-1457 ◽  
Author(s):  
Bryan Druzin ◽  
Gregory S. Gordon

This article argues that Internet censorship is more fragile than is generally supposed and is, in fact, vulnerable to abrupt collapse. The volume and rapidity of online communication renders perfect policing of the Internet technologically impossible. Authoritarian governments are thus forced to rely on Internet users to police themselves in the form of self-censorship. This strategy has proven largely successful—legal ambiguity regarding what constitutes impermissible speech fosters norms of self-censorship. This reliance on self-censorship, however, renders these censorial systems susceptible to shocks. We set out a model that explains sudden breakdowns in Internet censorship that we term “cyberspeech cascades.” A cyberspeech cascade occurs when small expressions of online dissent produce large shifts in public perception regarding the acceptable limits of online expression that are, in fact, inaccurate. Online bandwagons of progressively more brazen speech proliferate into large-scale torrents of uncensored expression, triggering the temporary collapse of self-censorship norms online.


Discourse ◽  
2020 ◽  
Vol 6 (5) ◽  
pp. 73-86
Author(s):  
L. V. Iskanderova

Introduction. Nowadays medical online services are evolving rapidly and become more and more popular. Telemedicine is developed as a part of the Russian government program “The medical system 4P”. However, doctor-patient online communication has rarely been the subject of research in modern sociology. Nevertheless, online-services are valuable resource for researchers to study and analyze information that is difficult to obtain in other ways.Methodology and sources. The paper is devoted to the research of doctor-patient discursive practices on the internet medical advice forums by the example of “Health.mail.ru”. The general method  of  research  is  critical  discourse  analysis,  based  on the theory and methodology of N. Fairclough, which gives an opportunity to make suggestions about  social practices using text analysis  and  discursive practices analysis. A non-reactive strategy was used in the empirical research. During the research 28 800 messages, which include 14 400 messages from patients and 14 400 messages from doctors, were analyzed. Data analysis was performed in the “R” program.Results and discussion. As a result, some assumptions about social practices and discursive practices on the online forum were formulated. The main patient’s goal on online forums is avoiding face-to-face interaction with doctors in a hospital. One of doctor’s goals is promoting their services. Interaction is carried out in a form of request from the patient and expert assessment from the doctor in response. Usually, patients send their messages anonymously. Doctors, by contrast, emphasize their identity. It helps them to maintain their image and to legitimate their expertise. Doctor’s and patient’s discourses are using special medical terminology, and they are not interpreting it. It demands from the patients being experts.Conclusion. Online communication is a new type of doctor-patient communication, which is more democratic, more complementary and more impersonal than face-to-face communication. Usually doctor-patient online communication on the internet medical advice forums does not involve thorough analysis of individual patient’s situation and maintaining sustainable interpersonal relationships.


2014 ◽  
Vol 2 (1) ◽  
pp. 8
Author(s):  
Winda Marnita ◽  
Riska Ahmad ◽  
Azrul Said

Interpersonal communication through the internet is now becoming a trend among the public, especially students. Online communication is of  interest by students because it is cheap, easy and fast. The Internet as a communication medium between the interpersonal students with parents, teachers and fellow internet users. The use of the internet as a medium of interpersonal communication understood the students well. Aspects that should be understood in communicating interpersonal are students use of the internet, the purpose of the use of the internet, openness, attention, empathy, equality. This research is descriptive research, the population in this study are students of SMP Negeri Padang 25 that become the subject of research is as much as 69 students, data collected by using question form. This study reveals students' interpersonal communication through the internet and the implications for guidance and counselling services. Because most of students have yet to understand and implement the aspects of the accommodation.


Author(s):  
Helena Taubner ◽  
Malin Hallén ◽  
Åsa Wengelin

This study aimed to investigate online strategies for re-negotiating identity, in terms of stigma management, developed by working-age Swedish Internet users with post-stroke aphasia, i.e., acquired language impairment caused by brain injury. Interviews were conducted with nine individuals (aged 26-61, three men and six women) with post-stroke aphasia. In addition, a total of 1,581 screenshots of online posts (e.g., photos, videos, text, emoticons) created by the same participants were collected. Drawing on social semiotics (specifically the three dimensions of online communication mentioned by Kress (2003), i.e., composition, content and context) and Goffman’s theory of stigma (1963, specifically the concepts of stigma management and passing), qualitative thematic analysis was performed. Regarding composition, three themes emerged: Relying on others or technology, Beyond speaking and writing, and Controlling speed and timing. The participants rarely posted content about aphasia, but some of them used the Internet to raise awareness. Different online contexts had different meaning to the participants in terms of identity. Being open about the aphasia in one forum did not imply the same behaviour in another forum (e.g., dating sites). For the participants to pass (Goffman, 1963), should they want to, they needed to control all three dimensions. If the context or the composition revealed the stigma, controlling the content was not enough to pass. The multimodality of the Internet enabled the participants to manage their stigma in a variety of ways and to choose whether to be perceived as persons with aphasia or not.


2018 ◽  
Vol 1 (2) ◽  
pp. 55
Author(s):  
Ahmad Tantoni ◽  
Mohammad Taufan Asri Zaen ◽  
Sofiansyah Fadli

Routers have important functions in the network, especially the internet. Routers can connect several network segments so that they can communicate with other users even though they are separated by a great distance (Sofana, 2013). IPv4 was originally a 32-bit binary number that was used to identify hosts on the network, after successful use by internet users then a new problem arises where IPv4 cannot accommodate Internet users in the future because it runs out of IPv4 addresses. Then IPv6 was created with the aim to provide more addressing than IPv4 (Sugeng, 2015). The problem is seen from the difference in the bit width between IPv4 and IPv6 whether it affects the CPU performance of the computer and the performance of data sent, average speed on the network. Then there will be research on the comparative performance of the CPU load and the performance of the data sent, the average speed of the computer network on the implementation of IPv4 and IPv6 using Passmark Advance Network Test. So that it can provide an overview of the results of the comparison of IPv4 and IPv6 QoS that are better than the 3 parameters tested with TCP and UDP protocols


2019 ◽  
Vol 15 (11) ◽  
pp. 155014771988810
Author(s):  
Sheikh Tahir Bakhsh ◽  
Saleh Alghamdi ◽  
Rayan A Alsemmeari ◽  
Syed Raheel Hassan

The revolution of computer network technologies and telecommunication technologies increases the number of Internet users enormously around the world. Thus, many companies nowadays produce various devices having network chips, each device becomes part of the Internet of Things and can run on the Internet to achieve various services for its users. This led to the increase in security threats and attacks on these devices. Due to the increased number of devices connected to the Internet, the attackers have more opportunities to perform their attacks in such an environment. Therefore, security has become a big challenge more than before. In addition, confidentiality, integrity, and availability are required components to assure the security of Internet of Things. In this article, an adaptive intrusion detection and prevention system is proposed for Internet of Things (IDPIoT) to enhance security along with the growth of the devices connected to the Internet. The proposed IDPIoT enhances the security including host-based and network-based functionality by examining the existing intrusion detection systems. Once the proposed IDPIoT receives the packet, it examines the behavior, the packet is suspected, and it blocks or drops the packet. The main goal is accomplished by implementing one essential part of security, which is intrusion detection and prevention system.


2021 ◽  
Vol 7 (1) ◽  
pp. 58-66
Author(s):  
Aleksandra Urzędowska

Abstract One of the most interesting phenomena observed in the Polish language today is the unquestionable, non-rigorous ability of the language to adapt to the latest social trends like the development. This article provides an overview of the selected most network communication’ important forms of linguistic expression of contemporary Internet Polish language in the communicative aspect. The basic formations and structures used by Internet users are characterized and the current state of the Polish language of online communication is presented, paying attention to the less and less noticeable disproportions between communication in the Internet space and traditional interpersonal communication. The excerpted forms, based on the well-known and completely new abstract units of the dictionary system, allowed a synthetic analysis of an interesting linguistic and communicative phenomenon, which is the marriage of both traditional and new-fangled structures of the Polish language with modern and flexible forms of digital network communication.


Sign in / Sign up

Export Citation Format

Share Document