Constructing the Internet Panoptic-Fortification

Author(s):  
Juan Du

This chapter investigates China's Internet regulatory mechanism through the systematical analysis on Internet law in China. It argues that China has developed a hybrid Internet regulatory model, which values both external defense and internal control of in pursuit of the cybersecurity, and which combines hierarchical regulation with horizontal monitoring to address challenges brought by contemporary network society. Based on Michel Foucault's governmentality theory, the Internet panoptic-fortification model is developed to illuminate China's Internet regulatory mechanism. The model is featured by the centralized control, the establishment of Chinese sovereign cyberspace, the implementation of the network real-name system and the Internet-surfing record backup system, and the tight ideological control. This chapter suggests that China's Internet law has become a state instrument to promote the social discipline in the sovereign cyberspace, and the Internet regulatory mechanism serves for the national security and social stability in a broader context.

Author(s):  
Laura DeNardis

The Internet has leapt from human-facing display screens into the material objects all around us. In this so-called Internet of Things—connecting everything from cars to cardiac monitors to home appliances—there is no longer a meaningful distinction between physical and virtual worlds. Everything is connected. The social and economic benefits are tremendous, but there is a downside: an outage in cyberspace can result not only in a loss of communication but also potentially a loss of life. Control of this infrastructure has become a proxy for political power, since countries can easily reach across borders to disrupt real-world systems. This book argues that this diffusion of the Internet into the physical world radically escalates governance concerns around privacy, discrimination, human safety, democracy, and national security, and it offers new cyber-policy solutions. The book makes visible the sinews of power already embedded in our technology and explores how hidden technical governance arrangements will become the constitution of our future.


2010 ◽  
Vol 69 (3) ◽  
pp. 173-179 ◽  
Author(s):  
Samantha Perrin ◽  
Benoît Testé

Research into the norm of internality ( Beauvois & Dubois, 1988 ) has shown that the expression of internal causal explanations is socially valued in social judgment. However, the value attributed to different types of internal explanations (e.g., efforts vs. traits) is far from homogeneous. This study used the Weiner (1979 ) tridimensional model to clarify the factors explaining the social utility attached to internal versus external explanations. Three dimensions were manipulated: locus of causality, controllability, and stability. Participants (N = 180 students) read the explanations expressed by appliants during a job interview. They then described the applicants on the French version of the revised causal dimension scale and rated their future professional success. Results indicated that internal-controllable explanations were the most valued. In addition, perceived internal and external control of explanations were significant predictors of judgments.


Author(s):  
Е.Н. Юдина

интернет-пространство стало частью реального мира современных студентов. В наши дни особенно актуальна проблема активизации использования интернета как дополнительного ресурса в образовательном процессе. В статье приводятся результаты небольшого социологического исследования, посвященного использованию интернета в преподавании социологических дисциплин. Internet space has become a part of the real world of modern students. The problem of increasing the use of the Internet as an additional resource in the educational process is now particularly topical. The article contains the results of a small sociological study on the use of the Internet in teaching sociological disciplines.


2020 ◽  
Vol 9 (3) ◽  
pp. 111-119
Author(s):  
Yu.Yu. IERUSALIMSKY ◽  
◽  
A.B. RUDAKOV ◽  

The article is devoted to the study of such an important aspect of the activities of the World Russian People's Council (until 1995 it was called the World Russian Council) in the 90-s of the 20-th century as a discussion of national security issues and nuclear disarmament. At that time, a number of political and public figures actively called for the nuclear disarmament of Russia. Founded in 1993, the World Russian Council called for the Russian Federation to maintain a reasonable balance between reducing the arms race and fighting for the resumption of detente in international relations, on the one hand, and maintaining a powerful nuclear component of the armed forces of the country, on the other. The resolutions of the World Russian Council and the World Russian People's Council on the problems of the new concepts formation of foreign policy and national security of Russia in the context of NATO's eastward movement are analyzed in the article. It also shows the relationship between the provisions of the WRNS on security and nuclear weapons issues with Chapter VIII of the «Fundamentals of the Social Concept of the Russian Orthodox Church».


Author(s):  
Mark Newman

The study of networks, including computer networks, social networks, and biological networks, has attracted enormous interest in recent years. The rise of the Internet and the wide availability of inexpensive computers have made it possible to gather and analyse network data on an unprecendented scale, and the development of new theoretical tools has allowed us to extract knowledge from networks of many different kinds. The study of networks is broadly interdisciplinary and developments have occurred in many fields, including mathematics, physics, computer and information sciences, biology, and the social science. This book brings together the most important breakthroughts in each of these fields and presents them in a unified fashion, highlighting the strong interconnections between work in different areas. Topics covered include the measurement of networks; methods for analysing network data, including methods developed in physics, statistics, and sociology; fundamentals of graph theory; computer algorithms, including spectral algorithms and community detection; mathematical models of networks such as random graph models and generative models; and models of processes taking place on networks.


2020 ◽  
Vol 16 (4) ◽  
pp. 602-617
Author(s):  
Sukanya Sharma ◽  
Saumya Singh ◽  
Fedric Kujur ◽  
Gairik Das

In this digital era, the internet, and Social Media (SM) has had a radical impact on the shopping behavior of “costumers” The SM provides a platform where “costumers” are exposed to the best product with the best price along with reviews and opinions about the merchandise. So, we can turn our heads and look at a brand in a way as if the brand is speaking to us. This study was an attempt to explore the Social Media Marketing Activities (SMMA) that are being used for the marketing of fashionable products like apparel and to what level the SMMA activities of brands truly strengthen the relationship with customers and motivate purchase intention. Moreover, SMMA has a robust application in developing a marketing strategy for business. It has become a significant tool that collaborates with businesses and people. It is concluded that the “costumer”-brand relationship does have a positive and statistically significant impact on consumers’ purchase intention through SM.


Author(s):  
Xiaoyue Li

Abstract This article examines banditry, embezzlement, and other insider crimes along Egyptian railway lines during a period when British officials exerted centralized control over the Egyptian railway and financial austerity had a negative impact on the rail sector. By exploring the motives and tactics of railway crimes, I posit that criminals, by making claims on and use of the technology outside the purview of state regulations, expressed their heterogeneous desires to redistribute social wealth, repurpose the technological promise of modern railways, and confound intentions of colonial governance. Using new archival materials, this article utilizes a bottom-up approach to examine grassroots activism, everyday knowledge, informal networks, and the social mores and norms that criminals harnessed to discern infrastructural vulnerabilities and elude surveillance from the colonial state. Ultimately, I contend that criminal acts uncovered social crises otherwise hidden under the shadow of the exterior prosperity and stability of late 19th-century Egypt.


Sign in / Sign up

Export Citation Format

Share Document