scholarly journals VPNs AND ENCRYPTION AS BOUNDARY OBJECTS OF THE INTERNET: (MIS)TRUST IN THE TRANSLATION(S)

2019 ◽  
Vol 2019 ◽  
Author(s):  
Luke Heemsbergen ◽  
Adam Molnar

How do users come to trust VPNs? How do they understand end-to-end encrypted messaging technologies? This paper aims to answer these questions by considering VPNs and e2e encryption as boundary objects of the internet pertinent to study (dis)trust in the system. Our aim is to follow Star’s clarification of boundary objects as entities that people act towards (or with) in relation to their own communities of practice via a feminist approach to technology studies, which for Star, linked lived experience, technologies, and silences in ways that proved political. We add to the literature in three ways: empirically unpacking VPNs and e2e encryption as boundary objects that tack back and forth between the technical and abstract, which is novel for the literature; an exegesis of boundary objects ‘on’ the internet to consider conceptualizing objects ‘of’ the internet, which opens a fruitful reconfiguration for internet research; and shedding light on the ways that symbolic registers of technology have profound implications for socio-material practices. Our work suggests the back-and-forth ‘tacking’ of abstract to concrete does not manifest as universal and singular, but is made manifest from multiple community vantage points. This complexification shows how digital objects of the internet feed and are fed by multiple use cases and relational practices across commercial, security, rights based, and identity practices that they underpin, undercut or act upon. Users trusting the politics of one case may miss a need to police the other; we conclude by contextualizing these concerns for future research ‘of’ the internet.

2020 ◽  
Vol 33 (6) ◽  
pp. 1177-1192
Author(s):  
Brendan Thomas O'Connell ◽  
Paul De Lange ◽  
Ann Martin-Sardesai ◽  
Gloria Agyemang

PurposeThe purpose of this paper is to examine prominent issues and knowledge contributions from research exploring measurement and assessment of accounting research, impact and engagement. This paper also provides an overview of the other papers presented in this AAAJ Special Issue and draws from their findings to scope out future impactful research opportunities in this area.Design/methodology/approachConsists of a review and examination of the prior literature and the other papers published in this AAAJ Special Issue.FindingsThe paper identifies and summarises three key research themes in the extant literature: research productivity of accounting academics; the rise of the “Corporate University” and commodification of research; and, the benefits and limitations of Research Assessment Exercises. It draws upon work within these research themes to set out four broad areas for future impactful research.Research limitations/implicationsThe value of this paper rests with collating and synthesising several important research themes on the nature and impact of measurement and assessment of accounting research, impact and engagement, and in prompting future extensions of this work through setting out areas for further innovative research in the area.Practical implicationsThe research examined in this paper and the future research avenues proposed are highly relevant to university academics, administrators and regulators/policymakers. They also offer important insights into matters of accounting measurement, accountability, and control more generally.Originality/valueThis paper adds to vibrant existing streams of research in the area by bringing together authors from different areas of accounting research for this AAAJ Special Issue. In scoping out an agenda for impactful research in the nature and impact of measurement and assessment of accounting research, impact and engagement, this paper also draws attention to underexplored issues pertaining to areas such as the “lived experience” of academics in the corporatised university and envisioning what a future “optimal” system of measurement and assessment of research quality might look like?


2011 ◽  
pp. 74-83
Author(s):  
Abhijit Roy

Technology has enabled communities to move beyond the physical face-to-face contacts to the online realm of the World Wide Web. With the advent of the highways in the 1950s and 1960s, “communities” were created in suburbia. The Internet, on the other hand, has over the last two decades, enabled the creation of a myriad of “online communities” (Green, 2007) that have limitless boundaries across every corner of the globe. This essay will begin by providing a definition of the term “online communities” and then describing several typologies of this phenomenon. The various motivations for joining communities, how marketers create social bonds that enhance social relationships, as well as strategies used by firms in building online communities are also discussed. We conclude by discussing strategies for managing online communities, leveraging them for social networking, researching them, as well as directions for future research.


2010 ◽  
pp. 45-54 ◽  
Author(s):  
Abhijit Roy

Technology has enabled communities to move beyond the physical face-to-face contacts to the online realm of the World Wide Web. With the advent of the highways in the 1950s and 1960s, “communities” were created in suburbia. The Internet, on the other hand, has over the last two decades, enabled the creation of a myriad of “online communities” (Green, 2007) that have limitless boundaries across every corner of the globe. This essay will begin by providing a definition of the term “online communities” and then describing several typologies of this phenomenon. The various motivations for joining communities, how marketers create social bonds that enhance social relationships, as well as strategies used by firms in building online communities are also discussed. We conclude by discussing strategies for managing online communities, leveraging them for social networking, researching them, as well as directions for future research.


Author(s):  
Abhijit Roy

Technology has enabled communities to move beyond the physical face-to-face contacts to the online realm of the World Wide Web. With the advent of the highways in the 1950s and 1960s, “communities” were created in suburbia. The Internet, on the other hand, has over the last two decades, enabled the creation of a myriad of “online communities” (Green, 2007) that have limitless boundaries across every corner of the globe. This essay will begin by providing a definition of the term “online communities” and then describing several typologies of this phenomenon. The various motivations for joining communities, how marketers create social bonds that enhance social relationships, as well as strategies used by firms in building online communities are also discussed. We conclude by discussing strategies for managing online communities, leveraging them for social networking, researching them, as well as directions for future research.


2020 ◽  
Vol 5 (2) ◽  
pp. 120-134
Author(s):  
Kristian Badai ◽  
Kaleb Djeremod ◽  
Frets Keriapy

This objective is to describe how the process of affirming a child's faith to be more firm in Jesus Christ, even though there are other beliefs around the child, even the child's intellect is attacked by the internet, research at school or the environment. The assurance of salvation in Jesus needs to be strengthened, especially in Christian children. Confirming the safety of children in Jesus is done through evangelism. This study uses qualitative research methods and the informants in this study were nine children. Interview method. The results of the study found that three children who believed were saved in Jesus with an understanding because they believed Jesus had saved, while the other six believed they were saved because they did spiritual activities. This can provide evidence that most children have not seen clear reasons why believing in Jesus and Jesus guarantees salvation for every believer because the tutors have not maximized evangelism to children, so that it has not had an impact on confirming the belief in child safety.AbstrakTujuan penelitian ini adalah mendeskripsikan bagaimana proses meneguhkan iman anak agar semakin teguh dalam Yesus Kristus, walaupun sekeliling anak terdapat kepercayaan lain, bahkan diserangnya intelek anak oleh internet, pengajaran disekolah atau lingkungan. Keyakinan keselamatan pada Yesus perlu diteguhkan, khususnya pada anak-anak yang beragama Kristen. Meneguhkan keyakinan keselamatan anak pada Yesus dilakukan melalui penginjilan. Penelitian ini menggunakan metode penelitian kualitatif dan informan dalam penelitian ini adalah sembilan anak. Metode pengumpulan data menggunakan wawancara. Hasil penelitian menemukan bahwa, tiga anak yang yakin diselamatkan dalam Yesus dengan pemahaman karena percaya Yesus telah menyelamatkan sedangkan enam lainnya yakin diselamatkan karena melakukan kegiatan kerohanian. Hal tersebut dapat memberi bukti bahwa sebagian besar anak-anak belum mengetahui alasan jelas mengenai kenapa harus percaya pada Yesus dan Yesus jaminan keselamatan bagi setiap orang percaya karena para tutor belum memaksimalkan penginjilan pada anak, sehingga belum memberi dampak untuk meneguhkan keyakinan keselamatan anak.


Author(s):  
Laura Hengehold

Most studies of Simone de Beauvoir situate her with respect to Hegel and the tradition of 20th-century phenomenology begun by Husserl, Heidegger, and Merleau-Ponty. This book analyzes The Second Sex in light of the concepts of becoming, problematization, and the Other found in Gilles Deleuze. Reading Beauvoir through a Deleuzian lens allows more emphasis to be placed on Beauvoir's early interest in Bergson and Leibniz, and on the individuation of consciousness, a puzzle of continuing interest to both phenomenologists and Deleuzians. By engaging with the philosophical issues in her novels and student diaries, this book rethinks Beauvoir’s focus on recognition in The Second Sex in terms of women’s struggle to individuate themselves despite sexist forms of representation. It shows how specific forms of women’s “lived experience” can be understood as the result of habits conforming to and resisting this sexist “sense.” Later feminists put forward important criticisms regarding Beauvoir’s claims not to be a philosopher, as well as the value of sexual difference and the supposedly Eurocentric universalism of her thought. Deleuzians, on the other hand, might well object to her ideas about recognition. This book attempts to address those criticisms, while challenging the historicist assumptions behind many efforts to establish Beauvoir’s significance as a philosopher and feminist thinker. As a result, readers can establish a productive relationship between Beauvoir’s “problems” and those of women around the world who read her work under very different circumstances.


Author(s):  
Hind Mohammed Abdul Jabbar Ali

Connecting to the  electronic information network (internet) became the most characteristic that distinguish this era However , the long hours which young men daily spend on the internet On the other hand ,there are many people who are waiting for the chance to talk and convince them with their views This will lead the young people to be part in the project of the “cyber armies “that involved with states and terrorist organizations  This project has been able  to recruitment hundreds of people every day to work in its rank . It is very difficult to control these websites because we can see the terrorist presence in all its forms in the internet   In addition there are many incubation environments that feed in particular the young people minds                                                                                         Because they are suffering from the lack of social justice Also the unemployment, deprivation , social and political repression So , that terrorist organizations can attract young people through the internet by convincing them to their views and ideas . So these organizations will enable to be more  stronger.


Author(s):  
Lemcia Hutajulu ◽  
Hery Sunandar ◽  
Imam Saputra

Cryptography is used to protect the contents of information from anyone except those who have the authority or secret key to open information that has been encoded. Along with the development of technology and computers, the increase in computer crime has also increased, especially in image manipulation. There are many ways that people use to manipulate images that have a detrimental effect on others. The originality of a digital image is the authenticity of the image in terms of colors, shapes, objects and information without the slightest change from the other party. Nowadays many digital images circulating on the internet have been manipulated and even images have been used for material fraud in the competition, so we need a method that can detect the image is genuine or fake. In this study, the authors used the MD4 and SHA-384 methods to detect the originality of digital images, by using this method an image of doubtful authenticity can be found out that the image is authentic or fake.Keywords: Originality, Image, MD4 and SHA-384


2019 ◽  
Vol 3 (4) ◽  
Author(s):  
J Michael Brick ◽  
Andrew Caporaso ◽  
Douglas Williams ◽  
David Cantor

Decisions on public policy can be affected if important segments of the population are systematically excluded from the data used to drive the decisions. In the US, Spanishspeakers make up an important subgroup that surveys conducted in English-only underrepresent. This subgroup differs in a variety of characteristics and they are less likely to respond to surveys in English-only. These factors lead to nonresponse biases that are problematic for survey estimates. For surveys conducted by mail, one solution is to include both English and Spanish materials in the survey package. For addresses in the US where Spanish-speakers are likely to be living, this approach is effective, but it still may omit some non-English-speakers. Traditionally, including both English and Spanish materials for addresses not identified as likely to have Spanish-speakers was considered problematic due to concerns of a backlash effect. The backlash effect is that predominantly English-speakers might respond at a lower rate because of the inclusion of Spanish materials. Prior research found no evidence of a backlash, but used a twophase approach with a short screener questionnaire to identify the eligible population for an education survey. In this paper, we report on experiments in two surveys that extend the previous research to criminal victimization and health communication single-phase surveys. These experiments test the effect of the inclusion of Spanish language materials for addresses not identified as likely to have Spanish-speakers. Our findings confirm most results of the previous research; however we find no substantial increase in Spanish-only participation when the materials are offered in both languages for addresses that are not likely to have Spanish-speakers. We offer some thoughts on these results and directions for future research, especially with respect to collecting data by the Internet.


Author(s):  
Radovan Bačík ◽  
Mária Oleárová ◽  
Martin Rigelský

The development of the Internet and the current technologies have contributed to a significant progress in the consumer shopping process. Today, shopping decisions are more intuitive and much easier to make. E-shops, search engines, customer reviews and other similar tools reduce costs of searching for products or product information, thus boosting the habit of searching for information on the Internet - "Research Shopper Phenomenon" (Verhoef et al. 2007). According to Verhoef et al. (2015), this phenomenon leads to a phenomenon where consumers search for product information using one channel (Internet) and then make a purchase through another channel (brick-and-mortar shop). Heinrich and Thalmair (2013) refer to this effect as the "research online, purchase offline" or "ROPO" effect for short. This phenomenon can also be observed in reverse. Keywords: customer behavior, research online – purchase offline, association analysis


Sign in / Sign up

Export Citation Format

Share Document