Inspecting Spam

Author(s):  
Ellen R. Foxman ◽  
William T. Schiano

Much coverage of the Internet focuses on undesirable, sometimes intrusive, communication, often referred to as “spam.” Spam has been decried as antisocial, wasteful, and/or fraudulent, with individuals, organizations, and media reports widely advocating regulation or outright banning of the practice, yet no uniform definition exists. Participants in the electronic communication and commerce process generally operate on an “I know it when I see it” basis that is shaped by their personal experience and expectations. This chapter begins with a brief history of this new medium, then defines spam within a typology of undesirable Internet communications. Conflicting definitions of spam are examined in light of their implications for suggested remedies. The paper concludes with recommendations on controlling spam for individuals, managers, and policy makers.

Author(s):  
Lalitha Joseph ◽  

The use of the word “thugs”, has always precipitated the crisis that has existed longue durée in the history of America. The word carries diverse meanings in different spaces, histories, communities, and countries. When used as a stigmatizing label, it can define, classify, restrict and fix boundaries within a society. Through an assessment of political rhetoric, tweets, and media reports, this article evaluates the hegemonic power embedded in the word and its strategic use by the world leaders for nefarious purposes in the post-truth era. It also explores the racial underpinnings of the word and the covert intentions behind its usage. This paper critically interrogates the social circumstances in which the word is used to suppress dissent. The role of post-truth media as the intermediaries and purveyors of the real and the fake is analyzed. Labelling theory is applied to demonstrate how policy makers, mark out a group in order to rationalize the discourse of state violence. The methods and the outcomes of stigmatizing labelling is illustrated, paying special attention to the role it plays in triggering social unrest. The essay argues that the polemics around the word “thug” enables the administrators to shift focus from the real issues, and thereby deny racial minorities their right to challenge the government policies and actions.


2019 ◽  
Vol 26 (2) ◽  
pp. 4-8
Author(s):  
Toshkentboy Pardaev ◽  
◽  
Zhavli Tursunov

In the article : In the second half of the 20 century the process of preparation of local experts in South Uzbekistan industry changes in this field a clear evidence-based analysis of the problematic processes that resulted from the discriminatory policy toward the Soviet government-dominated local policy makers


Author(s):  
Dan Jerker B. Svantesson

Internet jurisdiction has emerged as one of the greatest and most urgent challenges online, severely affecting areas as diverse as e-commerce, data privacy, law enforcement, content take-downs, cloud computing, e-health, Cyber security, intellectual property, freedom of speech, and Cyberwar. In this innovative book, Professor Svantesson presents a vision for a new approach to Internet jurisdiction––for both private international law and public international law––based on sixteen years of research dedicated specifically to the topic. The book demonstrates that our current paradigm remains attached to a territorial thinking that is out of sync with our modern world, especially, but not only, online. Having made the claim that our adherence to the territoriality principle is based more on habit than on any clear and universally accepted legal principles, Professor Svantesson advances a new jurisprudential framework for how we approach jurisdiction. He also proposes several other reform initiatives such as the concept of ‘investigative jurisdiction’ and an approach to geo-blocking, aimed at equipping us to solve the Internet jurisdiction puzzle. In addition, the book provides a history of Internet jurisdiction, and challenges our traditional categorisation of different types of jurisdiction. It places Internet jurisdiction in a broader context and outlines methods for how properly to understand and work with rules of Internet jurisdiction. While Solving the Internet Puzzle paints a clear picture of the concerns involved and the problems that needs to be overcome, this book is distinctly aimed at finding practical solutions anchored in a solid theoretical framework.


Author(s):  
Philipp Zehmisch

This chapter considers the history of Andaman migration from the institutionalization of a penal colony in 1858 to the present. It unpicks the dynamic relationship between the state and the population by investigating genealogies of power and knowledge. Apart from elaborating on subaltern domination, the chapter also reconstructs subaltern agency in historical processes by re-reading scholarly literature, administrative publications, and media reports as well as by interpreting fieldwork data and oral history accounts. The first part of the chapter defines migration and shows how it applies to the Andamans. The second part concentrates on colonial policies of subaltern population transfer to the islands and on the effects of social engineering processes. The third part analyses the institutionalization of the postcolonial regime in the islands and elaborates on the various types of migration since Indian Independence. The final section considers contemporary political negotiations of migration in the islands.


Cryptography ◽  
2021 ◽  
Vol 5 (2) ◽  
pp. 14
Author(s):  
Xavier Boyen ◽  
Udyani Herath ◽  
Matthew McKague ◽  
Douglas Stebila

The conventional public key infrastructure (PKI) model, which powers most of the Internet, suffers from an excess of trust into certificate authorities (CAs), compounded by a lack of transparency which makes it vulnerable to hard-to-detect targeted stealth impersonation attacks. Existing approaches to make certificate issuance more transparent, including ones based on blockchains, are still somewhat centralized. We present decentralized PKI transparency (DPKIT): a decentralized client-based approach to enforcing transparency in certificate issuance and revocation while eliminating single points of failure. DPKIT efficiently leverages an existing blockchain to realize an append-only, distributed associative array, which allows anyone (or their browser) to audit and update the history of all publicly issued certificates and revocations for any domain. Our technical contributions include definitions for append-only associative ledgers, a security model for certificate transparency, and a formal analysis of our DPKIT construction with respect to the same. Intended as a client-side browser extension, DPKIT will be effective at fraud detection and prosecution, even under fledgling user adoption, and with better coverage and privacy than federated observatories, such as Google’s or the Electronic Frontier Foundation’s.


2021 ◽  
pp. 074391562199967
Author(s):  
Raffaello Rossi ◽  
Agnes Nairn ◽  
Josh Smith ◽  
Christopher Inskip

The internet raises substantial challenges for policy makers in regulating gambling harm. The proliferation of gambling advertising on Twitter is one such challenge. However, the sheer scale renders it extremely hard to investigate using conventional techniques. In this paper the authors present three UK Twitter gambling advertising studies using both Big Data analytics and manual content analysis to explore the volume and content of gambling adverts, the age and engagement of followers, and compliance with UK advertising regulations. They analyse 890k organic adverts from 417 accounts along with data on 620k followers and 457k engagements (replies and retweets). They find that around 41,000 UK children follow Twitter gambling accounts, and that two-thirds of gambling advertising Tweets fail to fully comply with regulations. Adverts for eSports gambling are markedly different from those for traditional gambling (e.g. on soccer, casinos and lotteries) and appear to have strong appeal for children, with 28% of engagements with eSports gambling ads from under 16s. The authors make six policy recommendations: spotlight eSports gambling advertising; create new social-media-specific regulations; revise regulation on content appealing to children; use technology to block under-18s from seeing gambling ads; require ad-labelling of organic gambling Tweets; and deploy better enforcement.


2003 ◽  
Vol 28 (1) ◽  
pp. 10-14 ◽  
Author(s):  
Christian David ◽  
Catherine Granger ◽  
Nicole Picot

The French national museum libraries service comprises 21 libraries specialising in the history of western art and archaeology. The central library, which is at the head of the network, was automated first and has completed its retrospective conversion. At first this library catalogued the material acquired for all the others; then a number of them were able in their turn to computerise and thus contribute directly to the union catalogue of the national museum libraries. This can now be consulted on the internet site of the Ministry of Culture.


2016 ◽  
Vol 39 (3) ◽  
pp. 341-356 ◽  
Author(s):  
Olivia Rose Marcus ◽  
Merrill Singer

In this article, the authors provide a layered analysis of Ebola-chan, a visual cultural artifact of the 2014–2015 Ebola outbreak. Rather than considering her as a two-dimensional anime character (i.e. as a simple iconic coping mechanism and/or a fear response), this recent Internet meme is analyzed using an integrated semiotic and structural approach that involves discussion of the genesis of disaster humor in light of the changing world of the Internet, the history of anthropomorphism of disease, and the biosocial nature of an infectious disease epidemic. Our analysis is designed to advance both the anthropology of the Internet and the anthropology of infectious disease. As a multi-vocal symbol with different meanings for different audiences, Ebola-chan represents a social response to a lethal epidemic in the digital age.


Author(s):  
Dave Headlam

The information age has pushed music performance into the era of music informance, in which information and performance are combined in an integrated way. The types of presentation formats and analytical information found in public music theory are ideal for music informance, and present-day explorations of informance on the Internet have a history of noted musical informants including Leonard Bernstein and Glenn Gould. In order to continue to be relevant and to thrive in our connected world, live and recorded music scenarios need to develop ever more innovative ways to enhance music performance with information effectively presented in music informance.


Sign in / Sign up

Export Citation Format

Share Document