Viral Experiences

Author(s):  
Shenja van der Graaf

This chapter signals the implications of a shift in production and distribution practices of online advertising in an age of computer network-facilitated participation. It explores online entertainment forms such as games and films that are increasingly being used as an integral part of online advertising strategies to promote goods and services to potential consumers. These “advertainments,” as they are often referred to, exemplify the linkage of commercial goals with cultural texts through creating engaging experiences, initiated by commercial corporations for solid reasons of promotion and profit, enabled by computer networks, and given form by various members of the public.

Author(s):  
Kamila Gieba

The article examines ways of representing nuclear catastrophe in Kate Brown's Plutopia: Nuclear Families, Atomic Cities, and the Great Soviet and American Plutonium Disasters. In 1957 an explosion in the Mayak works - a plutonium production site - led to massive contamination of the surrounding areas. The event remained a closely kept secret till 1992, absent from the public sphere and cultural texts, despite the fact that the scale of contamination was as big as the Chernobyl explosion. One of the reasons for this was the difficulty of representing nuclear radiation. The author focuses on three contexts of this impossibility: in relation to the cognitive theory of the metaphor, the figure of the sick body as bearer of memory, and the invisibility of the nuclear landscape.


Author(s):  
Sven Stollfuß

This article investigates how platformisation changes the practices of content production and distribution through the case of the web series, Druck (tr. Pressure (2018–), for the public service content network ‘funk’ (ARD and ZDF). An analysis of the German adaptation of the Norwegian television and web series Skam (tr. Shame) (NRK3, 2015–2017) shows how public service broadcasting (PSB) in Germany is changing due to the influence of social media. To reach a younger audience, PSB has to meet them on third-party platforms. Consequently, PSB must provide content that fits the mobile media environment of social media.


2014 ◽  
Vol 5 (1) ◽  
pp. 97-124 ◽  
Author(s):  
Mehdi Behboudi ◽  
Hossein Vazifehdoust ◽  
Kobra Najafi ◽  
Mina Najafi

Purpose – The purpose of this study is to verify the factors affecting the use of emotional and rational appeals in online advertising among Muslim customers in Iran. Design/methodology/approach – By reviewing the literature of advertising appeals and developing a comprehensive theoretical model, the effect of rational and emotional appeals on online advertising was examined. Expert questionnaire was administered to verify the validity of collected features. The Student's t-test was utilized to analyze the data collected from 271 participants. Findings – Five latent variables, namely user type, product involvement, e-lifestyle, advertising strategies, and internet motives were examined to explain factors affecting online advertising appeals among Muslim customers in Iran. It was found that “advertising strategies” and “user type” are the most effective factors influencing Muslims customers in developing an online advertising campaign. Research limitations/implications – The sample of this study was Iranian experts and it is necessary to conduct a survey with a larger sample size. Originality/value – This study provides insights into factors affecting the selection of emotional and rational appeals in Muslims countries. Moreover, it reports the primary columns of online advertising appeals.


2018 ◽  
Vol 7 (2) ◽  
pp. 61-67
Author(s):  
Iga Revva Princiss Jeinever

Computer networks are basically not safe to access freely. Security gaps in the network can be seen by irresponsible people with various techniques. Opening a port for access carries a high risk of being attacked by an attacker. In this connection, network administrators are required to work more to be able to secure the computer network they manage. One form of network security that is often used by network administrators in server management is through remote login such as ports on telnet, SSH, etc. A port that is always open is a network security hole that can be used by people who are not responsible for logging into the server. Focusing on these problems, in this study, Random Port Knocking is the right way and can be used to increase network security. With Random Port Knocking, the port will be opened as needed, the port will automatically change when it fails to log in more than three times and IP will automatically be blocked and access will not continue so that attacks on the network can be avoided and network security stability can be further improved. The final result of this research shows that the method applied in this research makes server safe. Because port randomization and IP block make irresponsible parties try harder to penetrate firewall walls.


Author(s):  
Nur Erma Mohamed Jamel ◽  
Nadiah Abd Hamid ◽  
Sarini Azizan ◽  
Roshayani Arshad ◽  
Rani Diana Othman ◽  
...  

Since the 70s, the focus of the Malaysian government on sustainable development is to improve the economic well-being of its society. In September 2015, Malaysia reaffirmed this commitment with the other United Nations countries by implementing the 2030 Agenda for 17 Sustainable Development Goals (SDGs), focusing on the bottom 40% of households (B40). Unfortunately, the implementation of Goods and Services Tax (GST) on 1st April 2015, followed by Sales and Services Tax (SST) 2.0 on 1st September 2018 impacted all income groups especially B40. The public especially B40 claimed that indirect tax is regressive and burdensome (MIER, 2018). Hence, the present study aims to identify the existence of SST 2.0's tax burden assessing through the relationship between elements of guiding principles of good tax policy. Keywords: Sales and Service Tax, enforcement, regressive, tax burden, fairness.


2016 ◽  
Vol 8 (2) ◽  
pp. 23-35
Author(s):  
Brett Pardy

The Marvel comics film adaptations have been some of the most successful Hollywood products of the post 9/11 period, bringing formerly obscure cultural texts into the mainstream. Through an analysis of the adaptation process of Marvel Entertainment’s superhero franchise from comics to film, I argue that militarization has been used by Hollywood as a discursive formation with which to transform niche properties into mass market products. I consider the locations of narrative ambiguities in two key comics texts, The Ultimates (2002-2007) and The New Avengers (2005-2012), as well as in the film The Avengers (2011), and demonstrate the significant reorientation towards the military of the film franchise. While Marvel had attempted to produce film adaptations for decades, only under the new “militainment” discursive formation was it finally successful. I argue that superheroes are malleable icons, known largely by the public by their image and perhaps general character traits rather than their narratives. Militainment is introduced through a discourse of realism provided by Marvel Studios as an indicator that the property is not just for children. Keywords: militarization, popular film, comic books, adaptation


2021 ◽  
Vol 10 (1) ◽  
pp. 45
Author(s):  
Khairunnisa Musari

Pandemic brings a crisis. This makes world leaders have to work hard and smartly in managing state budgets. During the heyday of Islam, Muslims also faced crises. Given that time the power of Islam mastered many areas of the world, it can be assumed that the crisis that occurred in the past was a global crisis as it is happening today. The difference is the crisis that occurred at the time because of losing the war. This paper tries to describe the historical experience of the esham, one of the fiscal instruments in the Islamic world that helped the Ottoman Empire overcome the crisis. Esham has mobilized low-cost funds from the public in a relatively concise time. Esham served as a better choice than looking for foreign debt. As the origin of sukuk, esham has simpler structure so that can be used as an alternative to sukuk with a lower cost. To deal with a crisis, esham may intervene in the economy. Esham funds to the real sector in turn will help the government drive the economy as well as control prices in the market for goods and services. Therefore, esham has the potential in facing the crisis.


2021 ◽  
Author(s):  
Celia J. Li

This thesis research has successfully completed two developments: an efficient Power-system Role-based Access Control (PRAC) and a secure Power-system Role-based kEy management (PREM). The PRAC significantly increases the security of computer networks for power systems, and surmounts the challenges caused by typical security and reliability concerns due to current technological and political changes faced in the electricity power industry. The PREM is designed to support the efficient operation of the PRAC using one-way hash functions and utilizing their advantages of computationally efficient and irreversibility security. PRAC and PREM are not only developed for handling single local computer network domain, but also extended for supporting multiple computer network domains. A platform for the comprehensive assessment of PREM is established for the fast and economical assessment of the key management developed in this thesis research.


Author(s):  
Bamidele Ola ◽  
Iyobor Egho-Promise

The emergence of ecommerce almost three decades ago has completely transformed the approach to purchasing goods and services across various countries in the world. Almost every country in the globe, now have some form of ecommerce operations, this has further been enhanced by the stay at home COVID-19 induced lockdowns. The value and volume of transactions has also increased in transactions. However, there has been security concerns impacting ecommerce operations, which has in part, led to increasing adoption of hosting ecommerce systems in the public cloud. Threat modelling offer mechanisms to enhance the security of information technology (IT) systems. In this paper, we apply different threat modelling techniques to decompose the migration of an on-premise hosted ecommerce system to the public cloud and also evaluate these threat modelling techniques.


2021 ◽  
Author(s):  
Celia J. Li

This thesis research has successfully completed two developments: an efficient Power-system Role-based Access Control (PRAC) and a secure Power-system Role-based kEy management (PREM). The PRAC significantly increases the security of computer networks for power systems, and surmounts the challenges caused by typical security and reliability concerns due to current technological and political changes faced in the electricity power industry. The PREM is designed to support the efficient operation of the PRAC using one-way hash functions and utilizing their advantages of computationally efficient and irreversibility security. PRAC and PREM are not only developed for handling single local computer network domain, but also extended for supporting multiple computer network domains. A platform for the comprehensive assessment of PREM is established for the fast and economical assessment of the key management developed in this thesis research.


Sign in / Sign up

Export Citation Format

Share Document