The Mirror Has Two Faces

Author(s):  
Shefali Virkar

The Information Revolution has greatly impacted how nation-states and societies relate to one another; particularly wherein new, or hitherto less powerful, actors have emerged to bypass and influence established channels of power, altering the manner in which nation-states define their interests, power bases, security, and increasingly, their innate ability to govern and control flows of information. This book chapter investigates the ‘winner-takes-all' hypothesis relative to how the Internet, its associated platforms, and technologies have been harnessed to enhance the activities of both transnational terrorist networks and the organisations, clusters, and individuals dedicated to researching and combating them. The issues covered by this research raise important questions about the nature and the use of technology by state and non-state actors in an asymmetric ‘information war'; of how ideas of terrorism, surveillance, and censorship are conceptualised, and manner in which the role of the nation-state in countering and pre-empting threats to national security has been redefined.

2016 ◽  
pp. 521-546
Author(s):  
Shefali Virkar

The Information Revolution has greatly impacted how nation-states and societies relate to one another; particularly wherein new, or hitherto less powerful, actors have emerged to bypass and influence established channels of power, altering the manner in which nation-states define their interests, power bases, security, and increasingly, their innate ability to govern and control flows of information. This book chapter investigates the ‘winner-takes-all' hypothesis relative to how the Internet, its associated platforms, and technologies have been harnessed to enhance the activities of both transnational terrorist networks and the organisations, clusters, and individuals dedicated to researching and combating them. The issues covered by this research raise important questions about the nature and the use of technology by state and non-state actors in an asymmetric ‘information war'; of how ideas of terrorism, surveillance, and censorship are conceptualised, and manner in which the role of the nation-state in countering and pre-empting threats to national security has been redefined.


Author(s):  
Sampoornam K. P.

This book chapter presents the role of telecommunications network in voice and data transmission. Switching, signaling and transmission are the technologies used to carry out this process. In landline call establishment, calls are routed from subscriber handset to a remote switching unit (RSU), a main switching unit (MSU), and to the internet protocol trunk automated exchange (IPTAX). Then, it is directed to the National Internet Backbone (NIB). On the receiver side, the IPTAX receives this signal from the NIB and directs to it to the MSU and RSU, respectively. The receiver side RSU delivers the information to the destination subscriber. In order to transmit the information from one place to other, it undergoes various process like modulation, demodulation, line coding, equalization, error control, bit synchronization and multiplexing, digitizing an analog message signal, and compression. This chapter also discusses the various services provided by BSNL and agencies governing the internet. Finally, it focuses on the National Internet Backbone facility of BSNL, India.


2021 ◽  
pp. 423-460
Author(s):  
Nichola Eliza Davies Calvani ◽  
Jan Šlapeta

Abstract This book chapter describes the life cycle of F. gigantica and its differences from F. hepatica, including its economic importance and control options available, with particular emphasis on the importance of the smallholder farmers and the role of rice fields in maintaining the life cycle in Southeast Asia.


Author(s):  
Kenneth C. C. Yang ◽  
Yowei Kang

On February 4, 2015, China announced its new regulations that require all Chinese Internet users to register with their real names. The heightened control of Internet clearly demonstrates Chinese government's concerns over increasing social unrests and the abilities of Chinese Internet users to access information not censored by the government. However, the real-name registration regime has posed the greatest challenge to the anonymity of the Internet that many Chinese users have valued in an authoritarian society. Furthermore, the real-name registration system also impinges on Chinese Internet users' privacy, political freedom, and freedom of speech. This book chapter analyzes microblog discussions to examine existing Chinese censorship and control systems on the Internet, to investigate government's rhetoric to justify its censorship and control systems, and to identify major themes in Chinese netizens' reactions and discourses.


Subject The role of proxy actors on the internet. Significance States have long been the central providers of national security. Yet they are becoming just one of a number of actors that provide security in the cyber domain. A wide range of non-state actors, often acting as proxies, provide a variety of functions that include the provision of security and intelligence; assistance in orchestrating offensive activity; and in-depth training and education. Impacts Proxy actors have their own agenda, making them potentially unreliable government partners in certain instances. Customers across the globe will increasingly scrutinise firms based on their interactions with government actors. Where risk exists in working with proxies, states will look to develop their own capability.


Author(s):  
Kenneth C. C. Yang ◽  
Yowei Kang

On February 4, 2015, China announced its new regulations that require all Chinese Internet users to register with their real names. The heightened control of Internet clearly demonstrates Chinese government's concerns over increasing social unrests and the abilities of Chinese Internet users to access information not censored by the government. However, the real-name registration regime has posed the greatest challenge to the anonymity of the Internet that many Chinese users have valued in an authoritarian society. Furthermore, the real-name registration system also impinges on Chinese Internet users' privacy, political freedom, and freedom of speech. This book chapter analyzes microblog discussions to examine existing Chinese censorship and control systems on the Internet, to investigate government's rhetoric to justify its censorship and control systems, and to identify major themes in Chinese netizens' reactions and discourses.


2021 ◽  
Vol 2 (2) ◽  
pp. 58-66
Author(s):  
Heri Satria Setiawan ◽  
Rudi Hermawan ◽  
Rudi Apriyadi Raharjo

The use of gadgets today has become a major requirement for everyone. In the present, many children are using gadget since childhood especially to watch videos on youtube, play online games, and search for learning materials through the help of the internet.This can be a good step so that children easily adapt to technological developments. But on the other hand, parents must worry if children play gadgets too often and access things that are not age-appropriate, which is not necessarily suitable for their age. It is important for parents to monitor the use of gadgets in children. The role of parents and teachers in dealing with this situation, they must have the ability to monitor and control the use of the internet by parental control applications. It is able to select, limit, and supervise what applications can be accessed by children and adolescents so they can still use gadgets as a learning and entertainment medium without having to be addicted and poisoned by negative content.


Author(s):  
Nono Heryana ◽  
Rini Mayasari ◽  
Rudi Aprianto

In the modern era, the use of technology is growing rapidly to obtain information and various other electronic services, many people who already use technology, especially the internet to facilitate their work. Seeing the rapid development of the internet has given rise to various innovations, especially financial technology to meet the various needs of the community including access to financial services and transaction processing. Fintech (Financial Technology) is an innovation in the financial sector that refers to modern technology used to transact, check deposit rates, transfer funds, and perform various other financial services. The creative industries are an industry that utilizes the creativity and skills of individuals use as goods of value. The purpose of this study is to determine the role of financial technology and its constraints in the creative industry in Indonesia. The existence of innovation and creativity that arises in the community, making the creative industry is an essential role in the development of a regional economy. The research method used in writing this article is descriptive qualitative. Thus, qualitative research only describes responses to situations or events so that it does not explain causality or do hypothesis testing.


1972 ◽  
Vol 6 (3) ◽  
pp. 257-275 ◽  
Author(s):  
P.J. Musgrave

The problem of controlling and taxing the countryside is one which has remained with all governments in Asia, or indeed in the whole developing world, up to 1972. Government has inevitably tended to be essentially urban-based, centred on military power-bases, whether they be ‘Pacified Areas’, towns or mud forts, backed by military power normally concentrated in these centres. Outside the towns, however, lived the great mass of the population, and the great mass of the potentially taxable wealth, and it is upon its ability to control the rural areas that the credibility and survival of any régime must ultimately depend. It is perhaps an indication of our preoccupations with the problems of pacification and control in Asian societies that increasing interest is being shown in the patterns of rural control, in systems of traditional deference, which are usually seen as surviving much longer and much more strongly in the countryside than in the towns, and in problems of income distribution through social structures based on land. In such a situation, then, the role of the ‘estates’—of traditional and institutionalized systems of dependence and of control, of systems which were commonly used and hence studied by governments—is one which demands to be considered.


2004 ◽  
Vol 5 (6) ◽  
pp. 639-668 ◽  
Author(s):  
Thomas Vesting

In the recent discussion on Internet law and regulation it has often been argued that technical standards have a significant impact on the variety and diversity of the Net's communication flows. This Article extends this argument, focusing on the ability to constrain Net communication through “code” and “architecture” imposed by network technology, i.e., by a source of rule-formation and rule-making beyond the traditional law of nation-states. Although I am generally sympathetic to the position that a novel “Lex Informatica” poses new legal and political challenges for nation-states, it should, however, be clear from the outset that the attention for “code” and “architecture” is something different to a paraphrase of the ever-expanding role of technology in modern society. This has to be emphasized because the discourse of “the technological”, which was already a prominent subject in the anti-modernist debate during the Weimar Republic, still casts a shadow on the contemporary legal discussion about the role of technical standards on the Internet. Lawrence Lessig, for example, confronted with a strict anti-governmentalism of cyber-libertarians in the mid-nineties, argues inCode and other Laws of Cyberspacethat the Internet is regulated by “code”, i.e. “the software and hardware that make Cyberspace what it is”. “Code” itself is embedded in an environment of economic power and corresponding political interests. In a nutshellLessigpaints a picture in which the Internet is developing towards an intolerable density of control by powerful coalitions of technical experts and economic enterprises. This view may be convincing in some respects, but with his accent on “code”, Lessig comes very close to the anti-modernist reaction to the growing significance of film and radio in the early 20th century, inasmuch as both strands are based on the misconception of a technological superstructure steering the (media) world and its further evolution.


Sign in / Sign up

Export Citation Format

Share Document