scholarly journals From Archangels to Virtual Pilgrims: A Brief History of Papal Digital Mobilization as Soft Power

Religions ◽  
2021 ◽  
Vol 12 (8) ◽  
pp. 657
Author(s):  
Johannes Ludwig Löffler

The perpetual public display of successful mass mobilization and pilgrimage has become a pillar of papal soft power. During the 20th century, the papacy had repeatedly demonstrated its ability to use new technologies for public communication, media content production and mass mobilization. John Paul II endorsed the establishment of the first Vatican website and an official papal e-mail account, which provided Catholics a new form of communication with the Holy Father. During the pontificate of Benedict XVI, the papacy created several Twitter accounts, which would become the backbone of papal digital mobilization. Francis built on the success of his predecessors as he initiated the modernization of the Holy See’s media department. However, with the growth of the Internet and the stress test of the COVID-19 pandemic, the mechanics of mobilization, pilgrimage and power have considerably changed. With the religious role of the popes taken as a given, the paper looks into the history of papal mobilization, the role of the Internet and why it is not used to its full potential yet.

Author(s):  
Heinz Scheifinger

Technological change is a fundamental element of modernity, and an exploration of modern Hinduism must take seriously the role of technology in religious transformation. While the nineteenth century saw the introduction of the printing press as a new tool for mass mobilization, the Internet has become the technological platform for religious innovation and transformation since the last decade of the twentieth century. This chapter gives an introduction to the topic of Hinduism online. It starts by giving a brief overview of the short history of Hinduism online, with the first movements and temples establishing a presence on the World Wide Web from the mid-1990s. Focusing on the core concept of pūjā, the chapter argues that online Hinduism and the wider Hindu tradition are so closely linked that it makes little sense to see the online and the offline as separate realms. In fact, online Hinduism is an integral part of contemporary Hinduism, and the Internet has already spurred interesting questions and dilemmas of theology and religious authority in the Hindu tradition and will certainly continue to do so.


Author(s):  
Mahesh K. Joshi ◽  
J.R. Klein

New technologies like artificial intelligence, robotics, machine intelligence, and the Internet of Things are seeing repetitive tasks move away from humans to machines. Humans cannot become machines, but machines can become more human-like. The traditional model of educating workers for the workforce is fast becoming irrelevant. There is a massive need for the retooling of human workers. Humans need to be trained to remain focused in a society which is constantly getting bombarded with information. The two basic elements of physical and mental capacity are slowly being taken over by machines and artificial intelligence. This changes the fundamental role of the global workforce.


Sociologija ◽  
2009 ◽  
Vol 51 (1) ◽  
pp. 23-44 ◽  
Author(s):  
Dalibor Petrovic

The aim of the paper is to understand the role of Internet in creating new forms of sociability in the modern society. In the first part the history of social studies of Internet is reviewed, and the conclusion put forward that the anti-social role of the Internet cannot be proved. In the theoretical part of the paper the author presents his idea of two basic roles of Internet as interpersonal interaction tool: transmissional and procreative. These two Internet functions are very important means for reproducing a new form of sociability known as networked individualism.


Author(s):  
Ramesh Palanisamy ◽  
Mohammed Tariq Shaikh ◽  
Senthil Jayapal ◽  
Darla Thomas

Nowadays phishing can be considered one of the simplest and oldest ways to steal important data from users on the internet. And only by collecting a small quantity of data about victim the attacker will be able to produce personalized and plausible e-mail. However, these days more ways that are trying to be found and new technologies are inventive to deal with phishing. In this paper, I will present type, cause, prevention measures and dynamic features for growing phishing attacks.


2013 ◽  
Vol 17 (4) ◽  
pp. 483-500 ◽  
Author(s):  
Teresa Correa ◽  
Joseph D Straubhaar ◽  
Wenhong Chen ◽  
Jeremiah Spence

YouTube is more than cute pet videos and aspiring musicians. Fully understanding YouTube and how it influences, reproduces, and changes our culture begins with accepting the role of media technologies inside and outside of YouTube. The history of the Internet and its core technologies provides one foundational proposition in this book. Two other propositions, regarding YouTube's reliance on Internet-based technology and historically relevant communication theories, specifically Cultural Studies and Medium Theory, are discussed, as well. In consideration of important historical and theoretical perspectives, YouTube is transformed in our minds from a simple user-generated content repository to a cultural change agent. The tools and technology associated with the Internet, richly integrated and manifest in YouTube, allow us to change the world around us. Understanding the function and design of Internet-specific technology and how we experience social networking can contextualize current trends and influences in our daily online experience. Essential to our understanding and ultimately our power over the technology that we create (in this case, YouTube) is informed through understanding the technologies presented as part of our shared history. Finally, grasping the technological concepts and terminology reveals a deeper perspective on our cultural and participatory experience with the Internet and YouTube far beyond cute pet videos.


Author(s):  
Edwin I. Achugbue

The chapter focuses on the history of the internet system of e-mail; e-mail security; threat to e-mail security, usefulness of e-mail address and country codes, how e-mails can be secured by the individual and electronic mail policy. The future of e-mail security is also described.


Author(s):  
Thomas M. Chen

The founding of the Bell Telephone System, the public switched telephone network (PSTN), has evolved into a highly successful global telecommunications system. It is designed specifically for voice communications, and provides a high quality of service and ease of use. It is supported by sophisticated operations systems that ensure extremely high dependability and availability. Over the past 100 years, it has been a showcase for communications engineering and led to groundbreaking new technologies (e.g., transistors, fiber optics). Yet it is remarkable that many public carriers see their future in Internet protocol (IP) networks, namely the Internet. Of course, the Internet has also been highly successful, coinciding with the proliferation of personal computers. It has become ubiquitous for data applications such as the World Wide Web, e-mail, and peer-to-peer file sharing. While it is not surprising that the Internet is the future for data services, even voice services are transitioning to voice over Internet protocol (VoIP). This phenomenon bears closer examination, as a prime example explaining the success of the Internet as a universal communications platform. This chapter gives a historical development of the Internet and an overview of technical and nontechnical reasons for the convergence of services.


Author(s):  
Kristina Heinonen

The service encounter occurs whenever a customer interacts with a company personally or through technology through, for example, the Internet, e-mail, or telephone. Nowadays, customers frequently initiate the encounter as, for example, inquiries, information searches, and complaints are conveniently performed online. This article explores the role of digital service encounters on customer perceptions of companies. Digital service encounters in this article denote remote customer-company interactions via the Internet or e-mail. The focus is on active customers initiating interactions and on customer perceptions of company responses to these interactions. A conceptual framework that captures customer perceived service encounter value on two dimensions (responsiveness and personalization) is proposed. An empirical study exploring the value of company responses to digital contacts indicated that many contacts are responded to promptly and satisfyingly. However, there are also significant differences in the value of the service encounter. Some service encounters are perceived as unpersonalized, and some are even left without response.


In order to understand the never-ending fights between developers of anti-spam detection techniques and the spammers; it is important to have an insight of the history of spam mails. On May 3, 1978, Gary Thuerk, a marketing manager at Digital Equipment Corporation sent his first mass email to more than 400 customers over the Arpanet in order to promote and sell Digital's new T-Series of VAX systems (Streitfeld, 2003). In this regard, he said, “It's too much work to send everyone an e-mail. So we'll send one e-mail to everyone”. He said with pride, “I was the pioneer. I saw a new way of doing things.” As every coin has two sides, any technology too can be utilized for good and bad intention. At that time, Gary Thuerk would have never dreamt of this method of sending mails to emerge as an area of research in future. Gary Thuerk ended up getting crowned as the father of spam mails instead of the father of e-marketing. In the present scenario, the internet receives 2.5 billion pieces of spam a day by spiritual followers of Thuerk.


Sign in / Sign up

Export Citation Format

Share Document