FACTUAL AND MODAL TYPES OF IMPLICIT MEANINGS IN POLITICAL INTERNET COMMUNICATION

Author(s):  
Tat'yana Viktorovna Dubrovskaya
2020 ◽  
pp. 102-109
Author(s):  
Svetlana Alekseevna Raschetina ◽  

Relevance and problem statement. Modern unstable society is characterized by narrowing the boundaries of controlled socialization and expanding the boundaries of spontaneous socialization of a teenager based on his immersion in the question arises about the importance of the family in the process of socialization of a teenager in the conditions of expanding the space of socialization. There is a need to study the role of the family in this process, to search, develop and test research methods that allow us to reveal the phenomenon of socialization from the side of its value characteristics. The purpose and methodology of the study: to identify the possibilities of a systematic and anthropological methodology for studying the role of the family in the process of socialization of adolescents in modern conditions, testing research methods: photo research on the topic “Ego – I” (author of the German sociologist H. Abels), profile update reflexive processes (by S. A. Raschetina). Materials and results of the study. The study showed that for all the problems that exist in the family of the perestroika era and in the modern family, it acts for a teenager as a value and the first (main) support in the processes of socialization. The positions well known in psychology about the importance of interpersonal relations in adolescence for the formation of attitudes towards oneself as the basis of socialization are confirmed. Today, the frontiers of making friends have expanded enormously on the basis of Internet communication. The types of activities of interest to a teenager (traditional and new ones related to digitalization) are the third pillar of socialization. Conclusion. The “Ego – I” method of photo research has a wide range of possibilities for quantitative and qualitative analysis of the socialization process to identify the value Pillars of this process.


2020 ◽  
Vol 8 (1) ◽  
pp. 91-103
Author(s):  
O.S. Andreeva ◽  
◽  
K.A. Volodina ◽  
E.B. Shurakova ◽  
◽  
...  

Author(s):  
Dominic Orchard ◽  
Vilem-Benjamin Liepelt ◽  
Harley Eades III

2021 ◽  
Vol 54 (3) ◽  
pp. 1-35
Author(s):  
Boubakr Nour ◽  
Hakima Khelifi ◽  
Rasheed Hussain ◽  
Spyridon Mastorakis ◽  
Hassine Moungla

Information-Centric Networking (ICN) has recently emerged as a prominent candidate for the Future Internet Architecture (FIA) that addresses existing issues with the host-centric communication model of the current TCP/IP-based Internet. Named Data Networking (NDN) is one of the most recent and active ICN architectures that provides a clean-slate approach for Internet communication. NDN provides intrinsic content security where security is directly provided to the content instead of communication channel. Among other security aspects, Access Control (AC) rules specify the privileges for the entities that can access the content. In TCP/IP-based AC systems, due to the client-server communication model, the servers control which client can access a particular content. In contrast, ICN-based networks use content names to drive communication and decouple the content from its original location. This phenomenon leads to the loss of control over the content, causing different challenges for the realization of efficient AC mechanisms. To date, considerable efforts have been made to develop various AC mechanisms in NDN. In this article, we provide a detailed and comprehensive survey of the AC mechanisms in NDN. We follow a holistic approach towards AC in NDN where we first summarize the ICN paradigm, describe the changes from channel-based security to content-based security, and highlight different cryptographic algorithms and security protocols in NDN. We then classify the existing AC mechanisms into two main categories: Encryption-based AC and Encryption-independent AC . Each category has different classes based on the working principle of AC (e.g., Attribute-based AC, Name-based AC, Identity-based AC). Finally, we present the lessons learned from the existing AC mechanisms and identify the challenges of NDN-based AC at large, highlighting future research directions for the community.


Author(s):  
Matthias Geihs ◽  
Oleg Nikiforov ◽  
Denise Demirel ◽  
Alexander Sauer ◽  
Denis Butin ◽  
...  

2013 ◽  
Vol 50 (7-8) ◽  
pp. 359-380
Author(s):  
Jeongbong Seo ◽  
Sungwoo Park

2011 ◽  
Vol 52-54 ◽  
pp. 2151-2156
Author(s):  
Yuan Li Yang

By analysis on the realization for RFID (Radio Frequency Identification) technology, TC35i module of CTI (Computer Telecommunication Integration) technology, this article provided a solution and technology realization method for Logistic Information Perception Interactive System. The Logistic Information Perception Interactive System is a combinational application of Internet Of Things (IOT)) RFID, CTI and internet technology, the system consists of three levels system structure of perception level, network level and interaction level, which is supported by RFID reader, RFID logistic tag, TC35i module and other software and hardware as well as interface technologies, integrates and build logistic business flow and information perception interactive section link for supply chain, forms interactive system of RFID logistic, TC35i equipments, user mobile communication, internet communication and other sections. In the Logistic Information Perception Interactive System, it uses AT signal, API (Application Programming Interface) interface program to design short message logistic business interactive program based on TC35i and RFID, realizes isomerism application of communication, technology in terms of logistic information application means, realizes the ubiquitous links and distribution management of perception logistic.


2020 ◽  
Vol 10 (6) ◽  
pp. 71-79
Author(s):  
RAISA BARASH ◽  

Analyzing the spread of information technologies on social consolidation the author pays special attention to the study of the Russian situation when the wide spreading of the new media does not result into intensive political consolidation. The author notes that Internet and social networks have an undeniable potential for social influence because of intensive social interaction of numerous stakeholders. At the same time, the nominal potential of social networks as a mechanism of political communication and consolidation is low today. Wide online access does not lead to an increase of the interest to politics or social activity, awareness or subjectivity. The themes of Internet communication is extremely diverse and, most importantly, is rarely focused on a practical result or a long-term plan of socio-political reform of public policy.


Sign in / Sign up

Export Citation Format

Share Document