Technology Disruption in the Time of the Digital Ecosystem Society's Adoption

2022 ◽  
pp. 238-255
Author(s):  
Desi Setiana ◽  
Siti Norsarah ◽  
Norainna Besar ◽  
Tiro Anna ◽  
Marlina Nasution ◽  
...  

The internet and technologies are revolving around the world today. Most of the people around this world have access to the internet easily nowadays; it can lead to a most common and dangerous problem, which is cyber bullying. Cyber bullying is considered as a crime which usually occurs among the young people. Cases from cyberbullying have shown that there is a growing significantly which is becoming a worrying topic for the societies to be aware of. This study revealed cyberbullying teen actors involved within the area of Jakarta. The result is very interesting. Parents play a vital role to the teens as they will become a support for them (actor and victim) and also peer groups give the high impact of the actors to conduct cyberbullying to another group. Much cyberbullying happens for the same reasons as any other form of bullying. Generally, the cyber bullies act in such manner due to them being insecure, to gain popularity, social pressure, and jealousy as well as personal grudges.

2020 ◽  
Vol 11 (SPL1) ◽  
pp. 171-174
Author(s):  
Tarare Toshida ◽  
Chaple Jagruti

The covid-19 resulted in broad range of spread throughout the world in which India has also became a prey of it and in this situation the means of media is extensively inϑluencing the mentality of the people. Media always played a role of loop between society and sources of information. In this epidemic also media is playing a vital role in shaping the reaction in ϑirst place for both good and ill by providing important facts regarding symptoms of Corona virus, preventive measures against the virus and also how to deal with any suspect of disease to overcome covid-19. On the other hand, there are endless people who spread endless rumours overs social media and are adversely affecting life of people but we always count on media because they provide us with valuable answers to our questions, facts and everything in need. Media always remains on top of the line when it comes to stop the out spread of rumours which are surely dangerous kind of information for society. So on our side we should react fairly and maturely to handle the situation to keep it in the favour of humanity and help government not only to ϑight this pandemic but also the info emic.


Author(s):  
Дмитрий Викторович Кияйкин ◽  
Екатерина Андреевна Дворецкая

В статье раскрываются особенности сущностного понимания религиозного экстремизма и организационно-правовой профилактики данного явления. Обращено внимание на важность профилактической работы в рамках предупреждения антиобщественного (девиантного) поведения. Авторами рассматриваются причины и условия формирования религиозного экстремизма и наполнения им сети Интернет. Интернет-сообщество сталкивается с массовой информационной угрозой со стороны экстремистских организаций. Это связано с катастрофически быстрым распространением радикальных идеологий, всеобщей компьютеризацией и информатизацией общественных процессов, что облегчает процесс распространения материалов, носящих экстремистский характер. Религиозный экстремизм является источником вооруженных конфликтов во всем мире. Жертвами этого страшного явления, как правило, являются дети, подростки, молодые люди, кого легко заманить в сети идеологического обмана. Религиозный экстремизм опасен не только разрушением социальных объектов и ценностей, убийствами, террором. Гораздо опаснее сама идеология экстремизма, которая искажает мировоззрение и психику человека. В этих условиях эффективным является проведение профилактических мероприятий с молодым поколением, доведение до людей важности вопроса, осуществление контроля за неблагополучными семьями, обучение молодых лиц толерантности и уважению к окружающим людям. В работе определены направления работы правоохранительных органов по вопросу совершенствования механизма противодействия распространению экстремистской информации. Определена важность международного сотрудничества. The article reveals the features of the essential understanding of religious extremism and organizational and legal prevention of this phenomenon. Attention is drawn to the importance of preventive work as part of the prevention of antisocial (deviant) behavior. The authors consider the reasons and conditions for the formation of religious extremism and the filling of the Internet. The online community is facing a massive information threat from extremist organizations. This is due to the catastrophically lightning-fast spread of radical ideologies, the general computerization and informatization of social processes, which facilitates the process of distributing materials of an extremist nature. Religious extremism is a source of armed conflict throughout the world. The victims of this terrible phenomenon, as a rule, are children, adolescents, young people and girls - whom it is easy to lure into networks of ideological deception. Religious extremism is dangerous not only the destruction of social objects and values, murders, terror. The ideology of extremism itself, which distorts the worldview and the human psyche, is much more dangerous. Religious extremism is a source of armed conflict throughout the world. The victims of this terrible phenomenon, as a rule, are children, adolescents, young people and girls - whom it is easy to lure into networks of ideological deception. Religious extremism is dangerous not only the destruction of social objects and values, murders, terror. The ideology of extremism itself, which distorts the worldview and the human psyche, is much more dangerous.


Author(s):  
Vaishnavi Bhagwat Savant ◽  
Rupali D. Kasar ◽  
Priti B. Savant

The explosive growth of the Internet has brought many good things such as E-commercebanking, E-mail, cloud computing, but there is also a dark side such as Hacking, Backdoors, Trapdoors etc. Hacking is the first big problem faced by Governments, companies, and private citizens around the world. Hacking means reading email’s of someone, stealing passwords, stealing credit card numbers etc. An ethical hacker is one who can help the people who are suffered by this hackings. This paper describes about Ethical hackers, it’s types and phases of hacking


Author(s):  
O. P. Kopylova ◽  
◽  
S. V. Medvedeva ◽  
Yu. V. Kalashnikova ◽  
◽  
...  

Possibilities of legal regulation of cyber bullying are considered in modern conditions. Aggressive behavior in the Internet space is gaining momentum in its distribution among adolescents not only in Russia but throughout the world. Cyber bullying is one of the newest, most dangerous, and also depressing emotional states of a teenager in terms of the consequences of the risk they face. The concept of “cyber bullying” is considered; its forms are specified; proposals aimed at neutralizing the bullying that occurs among adolescents in the Internet space are formulated.


M/C Journal ◽  
1998 ◽  
Vol 1 (1) ◽  
Author(s):  
Joseph Crawfoot

Cities are an important symbol of our contemporary era. They are not just places of commerce, but are emblems of the people who live within them. A significant feature of cities are their meeting places; areas that have either been designed or appropriated by the people. An example of this is the café. Cafés hold a unique place in history, as sites that have witnessed the growth of revolution, relationships great and small, between people and ideas, and more recently, technology. Computers are transcending their place in the private home or office and are now finding their way into café culture. What I am suggesting is that this is bringing about a new way of understanding how cafés foster community and act as media for social interaction. To explore this idea further I will look at the historical background of the café, particularly within Parisian culture. For W. Scott Haine, cities such as Paris have highly influential abilities. As he points out "the Paris milieu determined the consciousness of workers as much as their labor" (114). While specifically related to Paris, Haine is highlighting an important aspect in the relationship between people and the built environment. He suggests that buildings and streets are not just inanimate objects, but structures that shape our habits and our beliefs. Towards the middle of the nineteenth century, Paris was developing a new cultural level, referred to as Bohemia. Derived from the French word for Gypsy (Seigel 5) it was used to denote a class of people who in the eyes of Honoré de Balzac were the talent of the future (Seigel 4). People who would be diplomats, artists, journalists, soldiers, who at that moment existed in a transient state with much social but little material wealth. Emerging within this Bohemian identity were the bourgeois. They were individuals who led a working class existence, they usually held property but more importantly they helped provide the physical environment for Bohemian culture to flourish. Bourgeois society had the money to patronize Bohemian artists. As Seigel says "Bohemian and bourgeois were -- and are -- parts of a single field: they imply, require, and attract each other" (5). Cafés were a site of symbiosis between these two groups. As Seigel points out they were not so much established to create a Bohemian world away from the reality of working life, but to provide a space were the predominantly bourgeois clientèle could be entertained (216). These ideas of entertainment saw the rise of the literary café, a venue not just for drinking and socialization but where potential writers and orators could perform for an audience. Contemporary society has seen a strong decline in Bohemian culture, with the (franchised) café being appropriated by the upper class as a site of lattes and mud cake. Recent developments in Internet technology however have prompted a change in this trend. Whereas in the past cafés had brought about a symbiosis between the classes of Bohemian and bourgeois society they are now becoming sites that foster relationships between the middle class and computer technology. Computers and the Internet have their origins within a privileged community, of government departments, defence forces and universities. It is only in the past three years that Internet technology has moved out of a realm of expert knowledge to achieve a broad level of usage in the average household. Certain barriers still exist though in terms of a person's ability to gain access to this medium. Just as Bohemian culture arose out of a population of educated people lacking skills of manual labor and social status (Seigel 217), computers and Internet culture offer a means for people to go beyond their social boundaries. Cafés were sites for Bohemians to transcend the social, political, and economic dictates that had shaped their lives. In a similar fashion the Internet offers a means for people to explore beyond their physical world. Internet cafés have been growing steadily around the world. What they represent is a change in the concept of social interaction. As in the past with the Paris café and the exchange of ideas, Internet cafés have become places were people can interact not just on a face-to-face basis but also through computer-mediated communication. What this points to is a broadening in the idea of the café as a medium of social interaction. This is where the latte and mud cake trend is beginning to break down. By placing Internet technology within cafés, proprietors are inviting a far greater section of the community within their walls. While these experiences still attract a price tag they suggest a change in the idea that would have seen both the café and the Internet as commodities of the élite. What this is doing is re-invigorating the idea of the streets belonging to the middle class and other sub-cultures, allowing people access to space so that relationships and communities can be formed. References Haine, W. Scott. The World of the Paris Cafe: Sociability amongst the French Working Class 1789 - 1914. Baltimore: Johns Hopkins UP, 1996. Seigel, Jerrold. Bohemian Paris: Culture, Politics and the Boundaries of Bourgeois Life, 1830 - 1930. New York: Penguin Books, 1987. Citation reference for this article MLA style: Joseph Crawfoot. "Cybercafé, Cybercommunity." M/C: A Journal of Media and Culture 1.1 (1998). [your date of access] <http://www.uq.edu.au/mc/9807/cafe.php>. Chicago style: Joseph Crawfoot, "Cybercafé, Cybercommunity," M/C: A Journal of Media and Culture 1, no. 1 (1998), <http://www.uq.edu.au/mc/9807/cafe.php> ([your date of access]). APA style: Joseph Crawfoot. (1998) Cybercafé, cybercommunity. M/C: A Journal of Media and Culture 1(1). <http://www.uq.edu.au/mc/9807/cafe.php> ([your date of access]).


Author(s):  
Vannie Naidoo

In today's world where the global economy is shrinking and the people of the world are constantly being plaque by recession, natural disasters, poverty and war the youth have to grapple with all these stressful influences. Due to the recession the job markets have become saturated as recession has hit the global economies throughout the world. The youth now are tasked with becoming involved in entrepreneurial activities to survive in these complex world economies. However entrepreneurship is not an easy endeavour. It is not for the faint hearted either. Entrepreneurism involves drive, perseverance, emotional intelligence and risk taking. A way forward for young people is social entrepreneurship as it offers them very viable opportunities within the backdrop of such a volatile economy.


evacuation of blood occurred at a time when I was in great pain and already despaired of, I might even have died from suppuration. As it was, it was this that saved me, the evacuation of blood. To prove that in this too I am telling the truth, and that I was subjected to illness such as to reduce me to a desperate condition, as a result of the blows I received from these men, read the doctor’s deposition and that of the people who visited me. Depositions [13] So the fact that the blows I received were not slight or insignificant but that I found myself in extreme danger because of the outrageous behaviour and the violence of these people, and so the action I have brought is far less serious than they deserve, this has I think been made clear to you on many counts. And I imagine that some of you are wondering what on earth Konon will dare to say in reply to this. Now I want to warn you about the argument I am informed he has contrived; he will attempt to divert the issue away from the outrage of what was done and reduce it to laughter and ridicule. [14] And he will say that there are many individuals in the city, the sons of decent men, who in the playful manner of young people have given themselves titles, and they call some ‘Ithyphallics’, others ‘Down-and-outs’; that some of them love courtesans and have often suffered and inflicted blows over a courtesan, and that this is the way of young people. As for my brothers and myself, he will misrepresent all of us as drunken and violent but also as unreasonable and vindictive. [15] Personally, judges, though I have been angered by the treatment I have received, my indignation and feeling of having been outraged would be no less, if I may say so, if these statements about us by Konon here are regarded as the truth and your ignorance is such that each man is taken for whatever he claims or his neighbour alleges him to be, and decent men get no benefit at all from their normal life and habits. [16] We have not been seen either drunk or behaving violently by anyone in the world, nor do we think we are behaving unreasonably if we demand to receive satisfaction under the laws for the wrongs done to us. We agree that his sons are ‘Ithyphallics’ and ‘Down-and-outs’, and I for my part pray to the gods that this and all else of the sort may recoil upon Konon and his sons. [17] For these are the men who initiate each other into the rites of Ithyphallos and commit the sort of acts which decent people find it deeply shameful even to speak of, let alone do.

2002 ◽  
pp. 96-96

2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Rajeesh Kumar N.V. ◽  
Arun M. ◽  
Baraneetharan E. ◽  
Stanly Jaya Prakash J. ◽  
Kanchana A. ◽  
...  

Purpose Many investigations are going on in monitoring, contact tracing, predicting and diagnosing the COVID-19 disease and many virologists are urgently seeking to create a vaccine as early as possible. Even though there is no specific treatment for the pandemic disease, the world is now struggling to control the spread by implementing the lockdown worldwide and giving awareness to the people to wear masks and use sanitizers. The new technologies, including the Internet of things (IoT), are gaining global attention towards the increasing technical support in health-care systems, particularly in predicting, detecting, preventing and monitoring of most of the infectious diseases. Similarly, it also helps in fighting against COVID-19 by monitoring, contract tracing and detecting the COVID-19 pandemic by connection with the IoT-based smart solutions. IoT is the interconnected Web of smart devices, sensors, actuators and data, which are collected in the raw form and transmitted through the internet. The purpose of this paper is to propose the concept to detect and monitor the asymptotic patients using IoT-based sensors. Design/methodology/approach In recent days, the surge of the COVID-19 contagion has infected all over the world and it has ruined our day-to-day life. The extraordinary eruption of this pandemic virus placed the World Health Organization (WHO) in a hazardous position. The impact of this contagious virus and scarcity among the people has forced the world to get into complete lockdown, as the number of laboratory-confirmed cases is increasing in millions all over the world as per the records of the government. Findings COVID-19 patients are either symptomatic or asymptotic. Symptomatic patients have symptoms such as fever, cough and difficulty in breathing. But patients are also asymptotic, which is very difficult to detect and monitor by isolating them. Originality/value Asymptotic patients are very hazardous because without knowing that they are infected, they might spread the infection to others, also asymptotic patients might be having very serious lung damage. So, earlier prediction and monitoring of asymptotic patients are mandatory to save their life and prevent them from spreading.


2015 ◽  
Vol 47 (2) ◽  
pp. 348-353
Author(s):  
Gholam Khiabany

A year and a half after the Iranian uprising in 2009, unprecedented popular uprisings in several Arab countries provided some of the most evocative moments of power meeting its opposite, in decisive and surprising ways. In a matter of weeks, powerful hereditary/republican regimes in the region, including in Tunisia and Egypt, crumbled under relentless pressure and opposition from highly mediated “street politics.” The uprising and revolts that shook Iran in the aftermath of the 2009 electoral coup, and the revolts in Tunisia and Egypt that toppled the governments in these countries in twenty-eight and eighteen days, respectively, had three significant similarities. First, the Arab revolutions, like the 2009 uprising in Iran, were, in the first place, revolts against dictatorship and in direct opposition to the ruling regimes. These uprisings, like many such movements against despotism, were also marked with demonstrations and the visible participation of young people. Second, all three happened at a time in which, unlike 1979 (the time of the Iranian Revolution), the world was not divided into two camps, but rather was confronted with US hegemony and globalization of financial capital. And finally, they all happened at a time when advances in communication technologies, and in particular the Internet, have allowed for a much faster circulation and dissemination of information—hence the constant association of these revolts with Twitter, Facebook, YouTube, and so forth.


2001 ◽  
Vol 1 (3) ◽  
pp. 303-319 ◽  
Author(s):  
THOM FRÜHWIRTH ◽  
SLIM ABDENNADHER

Most cities in Germany regularly publish a booklet called the Mietspiegel. It basically contains a verbal description of an expert system. It allows the calculation of the estimated fair rent for a flat. By hand, one may need a weekend to do this task. With our computerized version, the Munich Rent Advisor, the user just fills in a form in a few minutes, and the rent is calculated immediately. We also extended the functionality and applicability of the Mietspiegel so that the user need not answer all questions on the form. The key to computing with partial information using high-level programming was to use constraint logic programming. We rely on the Internet, and more specifically the World Wide Web, to provide this service to a broad user group, the citizens of Munich and the people who are planning to move to Munich. To process the answers from the questionnaire and return its result, we wrote a small simple stable special-purpose web server directly in ECLiPSe. More than 10,000 people have used our service in the last three years. This article describes the experiences in implementing and using the Munich Rent Advisor. Our results suggest that logic programming with constraints can be an important ingredient in intelligent internet systems.


Sign in / Sign up

Export Citation Format

Share Document