Zmiany w środowisku bezpieczeństwa regionu Morza Bałtyckiego kreowane przez działania informacyjne Federacji Rosyjskiej. Ryga, Tallin i Wilno wobec presji informacyjnej Moskwy

2018 ◽  
Vol 16 (1-2) ◽  
pp. 41-64
Author(s):  
Maciej Preus

Along with the intensive dissemination of information and communication technologies, there has been a rapid increase in the availability of information, and even its excess. The specific way of informing on the Internet and social media has started to influence the behavior of its users and on the community and society as the number of Internet users is rapidly growing. With the help of ICT tools, one can create patterns of interpersonal contacts and civic awareness, which can potentially lead to mass surveillance, the use of social engineering for purposes contrary to the objectives of a given society or creating needs and lifestyles. Examples of such activities of the Russian Federation against Lithuania, Latvia and Estonia, although necessarily limited, indicate that the Kremlin's activity is intensifying, well-organized, with the use of both people and automatic communication. Moscow uses traditional and social media directly and indirectly, carefully choosing means of information war - propaganda, disinformation, falsification of reality and discrediting opponents. The message generated by the Kremlin-friendly media creates a new security environment characterized by information chaos, causing the inability to distinguish the truth from falsehood, uncertainty about the intentions of the authorities of their own countries and neighbors, uncertainty about the actual state of affairs. The long-term goal for the Baltic states is to create organizational and administrative chaos in societies and authorities at all levels who, by making decisions on false premises, will destabilize these countries in every aspect.

2020 ◽  
Vol 56 (2) ◽  
pp. 6-20
Author(s):  
Bogdan Kosowski ◽  
Artur Luzar

Aim: The aim of this article is to analyse the activity of individual users, institutions and organisations in social media in the context of the fire in the Notre Dame Cathedral. The main threats of using this type of tools in crisis communication are presented, with particular emphasis on the propagation of information and disinformation. Introduction: The development of social media (platforms) in the global Internet means that they have become a tool commonly used by various types of private organisations, public administration and services. Using this medium gives great opportunities in the process of providing current information, efficient communication with the local community, building positive relations and creating a positive image of the organisation. Social media are also used by the government administration and emergency services of many countries during each of the four phases of crisis management (mitigation, preparedness, response, recovery). Information and communication technologies together with social media play an important role in contemporary people’s lives. They constitute an important part of everyday reality and are intrinsically related to it. The fire of the Notre Dame Cathedral in 2019 was widely commented on social media. The existing traditional methods of communication, such as press, television or radio, have significant limitations consisting in the inability to interact with the media users. Only the person who created the information could be the broadcaster. The internet, and social media in particular, has changed dramatically this state of affairs, giving recipients the opportunity to interact with people/institutions generating content. Methodology: The method applied in the article is that of literature review in the area of Web 1.0, Web 2.0, Web 3.0 development as well as the course of the fire of the Notre Dame Cathedral. Statistical analysis was performed using Google Trends. The paper indicates the main sources of opportunities and threats to users' activity in social media, with particular emphasis on the aspects related to the efficient operation of emergency services. Conclusions: The role of social media in crisis situations has not yet been established. It is evolving and it can be expected that with time it will be used to an increasing extent also in cases such as fires and other threats to cultural goods. The authors recommend further research on the behaviour of users of social networking sites, groups and the entire portal.


As we are living in the era of social media apps, from Facebook to WhatsApp which are using everywhere. All these apps are being used by everyone . Although this may seem to be a very good sign that we are moving to the new era of “THE DIGITAL WORLD” but it may have some consequences like spreading of artificial news, crack of personal information like credit card,debit card, passwords or digital wallets etc. The users believe that every message shared on social media might be true . So to protect our internet users we have come up with an idea that provides the ability to discover homonym attack and malicious links which warns the user before they can access the site. The Social engineering attacks have stirred terribly removed from this like fraudulent attack within which we have a tendency to completely rely upon our browser to present north American nation a warning. This situation may worry some computer users but we generally don’t think much about when we perform any action on our mobile phones. But all these so called to do steps are not the right way to deal with these situation .The primary commitments of this paper are understanding a working meaning of IDN satirizing assaults and how those IDN spaces are being introduced in the URL bar in some Internet programs, proposing a working arrangement that reports IDN ridiculing assaults which convert URL into Unicode and punycode.


Author(s):  
Muhammad Uwais ◽  
Arpit Sharma ◽  
Akhil Kumar ◽  
Lakshya Singh

As we are living in the era of social media apps, from Facebook to WhatsApp which are using everywhere. All these apps are being used by everyone. Although this may seem to be a very good sign that we are moving to the new era of “THE DIGITAL WORLD” but it may have some consequences like spreading of artificial news, crack of personal information like credit card, debit card, passwords or digital wallets etc. The users believe that every message shared on social media might be true. So, to protect our internet users we have come up with an idea that provides the ability to discover homonym attack and malicious links which warns the user before they can access the site. The Social engineering attacks have stirred terribly removed from this like fraudulent attack within which we tend to completely rely upon our browser to present north American nation a warning. This situation may worry some computer users, but we generally do not think much about when we perform any action on our mobile phones. But all these so called to do steps are not the right way to deal with these situation .The primary commitments of this paper are understanding a working meaning of IDN satirizing assaults and how those IDN spaces are being introduced in the URL bar in some Internet programs, proposing a working arrangement that reports IDN ridiculing assaults which convert URL into Unicode and punycode.


Author(s):  
Arul E ◽  
Punidha A

The social media platforms for teens and genz are highly influential; 39% state that they will use’ buy buttons’ and 25% use smartphones for shopping images. In the meantime, 28 percent of US internet users between 18 and 55 years of age said their aim is to buy via social media during holidays. As these channels become more central to our everyday lives, social media platforms have now become a key vector of attack that businesses cannot neglect anymore. Social media Platforms provide up to 20% more options for delivering malware for consumers, such as advertising, social engineering, equities and plug-ins compare to eCommerce and corporate websites. The suggested version Supervised SD-LVQ used to detect malicious firmware on various social media sites. LVQ classifies the different service calls attacks associated with XML, HTML, JavaScript files and different forms of malicious attacks on social networks. The test results show that 98.70% is genuinely positive and 0.02% is falsely negative.


2019 ◽  
Vol 24 (5) ◽  
pp. 205-222 ◽  
Author(s):  
Keith N Hampton

Abstract This article tests the relationship between information and communication technologies (ICT), such as the Internet, cell phones, and social media, and change over time in psychological distress (PD) and risk of serious psychological distress (SPD) associated with depression and anxiety disorders. Using a longitudinal panel design, survey data from a representative sample of American adults, findings revealed that home Internet and social network site (SNS) use are associated with decreased PD over time. Having extended family who are also Internet users further decreases PD. PD increased or decreased in relation to change in the PD of extended family who also use SNSs. For most people, ICT substantively reduce PD; in rare cases, an extreme spike in PD of extended family also on SNSs, there was a trivial increase to the risk of SPD. PD did not change when extended family not on social media experienced a change in their PD.


Author(s):  
Tomas Brusell

When modern technology permeates every corner of life, there are ignited more and more hopes among the disabled to be compensated for the loss of mobility and participation in normal life, and with Information and Communication Technologies (ICT), Exoskeleton Technologies and truly hands free technologies (HMI), it's possible for the disabled to be included in the social and pedagogic spheres, especially via computers and smartphones with social media apps and digital instruments for Augmented Reality (AR) .In this paper a nouvel HMI technology is presented with relevance for the inclusion of disabled in every day life with specific focus on the future development of "smart cities" and "smart homes".


Infoman s ◽  
2018 ◽  
Vol 12 (2) ◽  
pp. 115-124
Author(s):  
Yopi Hidayatul Akbar ◽  
Muhammad Agreindra Helmiawan

Social media is one of the information media that is currently widely used by several companies and personally to convey information, with the presence of social media companies no longer need to spread offers through print media, they can use information technology tools in this case social media to submit offers the products they sell to users globally through social media. This social media marketing technique is the process of reaching visits by internet users to certain sites or public attention through social media sites. Marketing activities using social media are usually centered on the efforts of a company to create content that attracts attention, thus encouraging readers to share the content through their social media networks. The application of the QMS method is certainly not only submitted through search engine webmasters, but also on a website keywords must be applied that relate to the contents of the website content, because with the keyword it will automatically attract visitors to the university website based on keyword phrases that they type in the search engine. With Search Media Marketing Technique (SMM) is one of the techniques that must be applied in conducting sales promotions, especially in car dealers in Bandung, it is considered important because each product requires price, feature and convenience socialization through social media so that sales traffic can increase. Each dealer should be able to apply the techniques of Social Media Marketing (SMM) well so that car sales can reach the expected target and provide profits for sales as car sellers in the field.


Author(s):  
Natalia Ivanova ◽  
◽  
Svitlana Mykhailovyna ◽  
Olena Matros ◽  
◽  
...  

There is no doubt that the issues of improving the methodological foundations of internal audit of payments to employees in the context of increased competition in all areas of business, the introduction of modern information technologies in the accounting process are relevant. Salaries are not only a source that ensures the life of employees, but their growth affects the increase in labor productivity and profit of the enterprise. Internal audit allows to ensure high-quality accounting of payments to employees, which is important in determining labor productivity indicators and ways to improve it. The purpose of the article is to substantiate the theoretical and methodological basis with the development of practical recommendations for improving the methodology of internal audit of employee benefits in order to improve the detailed audit content. It has been established that in order to ensure the correct and high-quality organization of internal audit, it is advisable to provide for the establishment of the internal audit service as a separate subdivision, providing the necessary number of accountants and auditors in the staff. The methodology of the internal audit of payroll has been improved in order to provide a detailed explanation of the content of the audit. The main objects of the internal audit of employee benefit calculations have been singled out. The sequence of the employee benefit calculations audit was determined. The internal auditor's working documents were formed: A statement of selective verification of vacation pay accrual and a Statement of violations revealed during the audit of employee benefit calculations. Using new changes and suggestions will allow the company’s internal audit service to cover all aspects of accounting and reporting on employee benefits. Preparation results of the internal audit of payments to employees in the form of proposed working documents will ensure that the results of the audit correspond to the actual state of Affairs at the enterprise and ensure the availability of information during the next audit. Prospects for further research should be carried out in the direction of developing a regulatory framework for internal audit, taking into account industry specifics affecting the economic activity of the enterprise.


2018 ◽  
Vol 6 (1) ◽  
pp. 60
Author(s):  
Ranny Rastati

In 2017 the majority of internet users are 19-34 years old or 49.52% (APJI, 2017). Almost half of the internet users in Indonesia are digital natives who were born after 1980: Generation Y (1980-1995) and Generation Z (1996-2009). This research will be focused on Generation Z as the true generation of the internet. Generation Z was born when the internet is available, a contrast to Generation Y who is still experiencing the transition of the internet. The purpose of this research is to find an effective way of providing information about media literacy to Generation Z. Through descriptive qualitative, the study was conducted with in-depth interview and observation toward 12 university students in Jakarta. The results showed that there are four effective ways of providing information about media literacy which is i) videos distributed to social media such as Youtube and Instagram, ii) interesting memes in communicative style, iii) through selebgram or micro-celebrity in Instagram who is consider as a role model and have a positive image, and iv) roadside billboards. Another interesting finding is that male informants tend to like media literacy information through videos and memes, while female informants prefer campaigns conducted by positive image selebgram and billboard. AbstrakPada tahun 2017 pengguna internet di Indonesia mayoritas berusia 19-34 tahun yaitu sebanyak 49,52% (APJI, 2017). Dari data tersebut terlihat bahwa hampir sebagian pengguna internet di Indonesia adalah digital natives atau penutur asli teknologi digital yaitu orang-orang yang lahir setelah tahun 1980: Generasi Y (1980-1995) dan Generasi Z (1996-2009). Penelitian ini akan difokuskan kepada Generasi Z karena mereka dianggap sebagai sebenar-benarnya generasi internet. Generasi Z lahir saat teknologi tersebut sudah tersedia, berbeda dengan Generasi Y yang masih mengalami transisi teknologi hingga menuju internet. Tujuan penelitian ini adalah mencari tahu cara yang efektif dalam memberikan informasi mengenai media literasi kepada generasi Z. Metode yang digunakan adalah deskriptif kualitatif dengan observasi dan wawancara mendalam. Informan berjumlah 12 orang mahasiswa di Jakarta. Hasil penelitian menunjukkan bahwa ada empat cara yang efektif dalam memberikan informasi mengenai media literasi yaitu i) video yang disebarkan ke media sosial seperti Youtube dan Instagram, ii) meme menarik dengan bahasa yang mudah dimengerti, iii) melalui selebgram yang menjadi panutan dan berimage positif, dan iv) papan iklan di pinggir jalan. Temuan menarik lainnya adalah informan laki-laki cenderung menyukai informasi media literasi melalui video dan meme yang disebarkan ke media sosial, sementara perempuan lebih menyukai kampanye yang dilakukan oleh selebgram berimage positif dan papan iklan.


Author(s):  
Jun Liu

Over the past decades, waves of political contention involving the use of information and communication technologies have swept across the globe. The phenomenon stimulates the scholarship on digital communication technologies and contentious collective action to thrive as an exciting, relevant, but highly fragmentary and contested field with disciplinary boundaries. To advance the interdisciplinary understanding, Shifting Dynamics of Contention in the Digital Age outlines a communication-centered framework that articulates the intricate relationship between technology, communication, and contention. It further prods us to engage more critically with existing theories from communication, sociology, and political science on digital technologies and political movements. Given the theoretical endeavor, Shifting Dynamics of Contention in the Digital Age systematically explores, for the first time, the influence of mobile technology on political contention in China, the country with the world’s largest number of mobile and Internet users. Using first-hand in-depth interview and fieldwork data, it tracks the strategic choice of mobile phones as repertoires of contention, illustrates the effective mobilization of mobile communication on the basis of its strong and reciprocal social ties, and identifies the communicative practice of forwarding officially alleged “rumors” as a form of everyday resistance. Through this ground-breaking study, Shifting Dynamics of Contention in the Digital Age presents a nuanced portrayal of an emerging dynamics of contention—both its strengths and limitations—through the embedding of mobile communication into Chinese society and politics.


Sign in / Sign up

Export Citation Format

Share Document