The Use of Internet by Diasporic Communities for Political Mobilization

2014 ◽  
pp. 893-905
Author(s):  
Maricarmen Sanchez ◽  
Sukumar Ganapati

This chapter analyzes how the Internet enables social and political mobilization of diasporic communities. Two diasporic communities—the Eritreans and the Iranians—form the empirical basis. The Eritrean diasporic community has used the Internet in their fight against Ethiopia and in their efforts to establish Eritrea as an independent country. The Iranian diasporic community used social networking, blogging, and other methods to politically mobilize amongst themselves in the host society and to mobilize their fellow countrymen in their homeland in the recent 2009 elections. The case studies illustrate how the Internet enables political mobilization that transcends time and space. Yet, the success of political mobilization depends on the diaspora's relationship with the homeland's government, their ability to create linkages, and their power relations.

Author(s):  
Maricarmen Sanchez ◽  
Sukumar Ganapati

This chapter analyzes how the Internet enables social and political mobilization of diasporic communities. Two diasporic communities—the Eritreans and the Iranians—form the empirical basis. The Eritrean diasporic community has used the Internet in their fight against Ethiopia and in their efforts to establish Eritrea as an independent country. The Iranian diasporic community used social networking, blogging, and other methods to politically mobilize amongst themselves in the host society and to mobilize their fellow countrymen in their homeland in the recent 2009 elections. The case studies illustrate how the Internet enables political mobilization that transcends time and space. Yet, the success of political mobilization depends on the diaspora’s relationship with the homeland’s government, their ability to create linkages, and their power relations.


Author(s):  
Neha Priya ◽  
Samreen Khan ◽  
Sachin Lal

Background: Internet is a boon and has certainly helped to bring the world closer. It has been a great medium for students to communicate and get information by transforming the academic landscape. However the excessive and undisciplined use of internet by individuals especially in the last decade, has led to the emergence of the concept of internet addiction. Therefore, a cross sectional study has been conducted to investigate the use of internet facility among undergraduate students from Teerthankar Mahaveer University using a validated questionnaire. There were about 42 million active internet users in urban India in 2008 when compared to 5 million in 2000. India now has the world’s third-largest national digital population, with approximately, 159 million Internet users in 2014, which is projected to reach 314 million by 2017 (IMRB 2014). The aim was to study prevalence and pattern of internet usage among undergraduate students in Moradabad. Methods: A cross sectional study was conducted among medical students (n=382) belonging to all the professionals of medical college, to assess the pattern of internet usage. A semi-structured proforma along with Young’s internet addiction scale was used. Results: Of the 382 adolescents who took part in the study, 150 (39.27%) were female and 232 (60.73%) were males. Their mean age was 16.20 years. Using Young’s original criteria, 22 (5.76%) were found to be addicts, 230 (60.21%) were moderately addicted, 45 (11.78%) were average users while in 85 (22.25%) of student’s internet use was less than average. Most of internet use was for social networking 183(47.9%), downloading media files 125 (32.7%), online gaming 45 (11.8%), academic purposes 10 (2.6%) and others 19 (5%). About 275 (72%) of the students were using smart phones to access the internet. Conclusions: Most of the internet usage was for the purpose of social networking (Facebook, Whats App, Mails, etc). Availability of high speed free wi-fi internet on mobile phones as well as more reliance on virtual friendship than real may be the reason for spending more time on social network websites. 


2012 ◽  
pp. 537-549 ◽  
Author(s):  
William Ross ◽  
Ross Slovensky

The development of the Internet affords new opportunities for organizations as they add talent to their workforce. Employers are using third-party job placement websites (e.g., Monster.com), virtual job fairs, social networking websites, and even massively multiplayer online games such as Second Life to recruit job candidates. Organizations are also using their own websites to both attract and to evaluate new applicants. Accompanying these trends is the use of Internet-based testing for evaluating job candidates. Such testing varies based on whether it is proctored or unproctored and whether it incorporates dynamic computer adaptive testing. Finally, many firms are using individual candidate’s social networking websites (e.g., Facebook) as a background screening tool for evaluating job candidates. These trends are described and research questions identified.


JavaFX™ 2.0 is the evolution of the Java programming language as a rich client platform. JavaFX™ platform provides multiple advantages to Java developers and companies that are part of the Java ecosystem, including the ability to leverage existing Java skills and development tools, as well as extending Swing applications, thus providing a migration path towards more modern and flexible User Interface (UI) technologies. This chapter first goes in depth on the JavaFX architecture and describes the benefits of using JavaFX to develop highly interactive Web applications; then, it presents four case studies on the development of JavaFX™-based Rich Internet Applications (RIAs) built on top of popular social networking services. For each case study, reviews of some similar real world implementations publicly available on the Internet are provided.


Author(s):  
Aleksey V. Kutuzov

The article substantiates the need to use Internet monitoring as a priority source of information in countering extremism. Various approaches to understanding the defi nition of the category of «operational search», «law enforcement» monitoring of the Internet are analysed, the theoretical development of the implementation of this category in the science of operational search is investigated. The goals and subjects of law enforcement monitoring are identifi ed. The main attention is paid to the legal basis for the use of Internet monitoring in the detection and investigation of extremist crimes. In the course of the study hermeneutic, formal-logical, logical-legal and comparative-legal methods were employed, which were used both individually and collectively in the analysis of legal norms, achievements of science and practice, and development of proposals to refi ne the conduct of operational-search measures on the Internet when solving extremist crimes. The author’s defi nition of «operational-search monitoring» of the Internet is provided. Proposals have been made to improve the activities of police units when conducting monitoring of the Internet in the context of the search for relevant information to the disclosure and investigation of crimes of that category.


Author(s):  
Keith M. Martin

This chapter considers eight applications of cryptography. These essentially act as case studies relating to all the previous material. For each application, we identify the security requirements, the application constraints, the choice of cryptography used, and the ways that the keys are managed. We begin with the SSL/TLS protocols used to secure Internet communications. We then examine the cryptography used in W-Fi networks, showing that early cryptographic design mistakes have subsequently been corrected. We then examine the evolving cryptography used to secure mobile telecommunications. This is followed by a discussion of the cryptography that underpins the security of payment card transactions. We look at the cryptography of video broadcasting and identity cards. We then examine the cryptography behind the Tor project, which use cryptography to support anonymous communication on the Internet. Finally, we examine the clever cryptographic design of Bitcoin, showing how use of cryptography can facilitate digital currency.


Author(s):  
Marissa Silverman

This chapter asks an important, yet seemingly illusive, question: In what ways does the internet provide (or not) activist—or, for present purposes “artivist”—opportunities and engagements for musicing, music sharing, and music teaching and learning? According to Asante (2008), an “artivist (artist + activist) uses her artistic talents to fight and struggle against injustice and oppression—by any medium necessary. The artivist merges commitment to freedom and justice with the pen, the lens, the brush, the voice, the body, and the imagination. The artivist knows that to make an observation is to have an obligation” (p. 6). Given this view, can (and should) social media be a means to achieve artivism through online musicing and music sharing, and, therefore, music teaching and learning? Taking a feminist perspective, this chapter interrogates the nature of cyber musical artivism as a potential means to a necessary end: positive transformation. In what ways can social media be a conduit (or hindrance) for cyber musical artivism? What might musicing and music sharing gain (or lose) from engaging with online artivist practices? In addition to a philosophical investigation, this chapter will examine select case studies of online artivist music making and music sharing communities with the above concerns in mind, specifically as they relate to music education.


2016 ◽  
Vol 10 (7) ◽  
pp. 141
Author(s):  
Samira Ranaiey ◽  
Mohammad Reza Taghavi ◽  
Mohammad Ali Goodarzi

<p class="zhengwen">Because of increased attention to PIU (Problematic Internet Use), some measure had been made, but they seem to be</p><p class="zhengwen">Inadequate, due to new issue of the internet interactions. Therefore the necessity and importance of</p><p class="zhengwen">Standard, valid and reliable tools to assess PIU and the related behaviors are clear.</p>This paper presents results of a study that develops a measure of Reasons of Using Social Networking Sites (S.N.S). The reasons were based on an article by Morahan – Martin and Schumacher. The reasons were arranged as a questionnaire. This questionnaire was completed by 156 volunteer students of Shiraz University. The results indicated that Reasons of S.N.S Use Scale is both reliable and valid. The result of factor analysis showed that two dimensions (Positive and Negative reasons of S.N.S use) explains total variance acceptably.


Author(s):  
Nurbaiti Nurbaiti ◽  
Nadhrah Al Aflah ◽  
Supardi Supardi

Almost all corners of the world have been affected or affected by this Covid-19 virus disease, even some countries have set a lockdown status and other anticipations for the spread of the Covid-19 virus. The alternative used in this bold learning activity system is to utilize the internet network, namely the Zoom Meeting and Classroom application. This study aims to determine students' perceptions of the use of internet networks such as zoom meetings and classrooms used and how effective learning is during the Covid-19 pandemic. The research conducted here uses descriptive qualitative research methods. And the results of this study indicate that the zoom application is an application that is very effective and preferred by students because it is easier to use and very efficient when the learning process is bold and shows that some students who give their perception of the application used during learning that are brave are the Zoom Meeting application, namely the application. Zoom Meeting. by 66.7%, followed by the Google Meet application at 22.2% and the Classrom application at 11.1%.  


Sign in / Sign up

Export Citation Format

Share Document