Search results for "internet"
showing 10 items of 2589 documents
Movilizaciones por la red. Las evoluciones del movimiento <em>open</em>
2019
El movimiento open es el conjunto de luchas protagonizadas por individuos, foros, organizaciones e instituciones de muy diverso tipo que postulan una visión abierta, inclusiva y participativa de internet y de los bienes digitales. Consta de seis ramas fundamentales en función del campo sobre el que operan: el software, la comunicación científica, los materiales educativos, la creación cultural, la producción maker y la neutralidad de la red. Este artículo ofrece una visión sintética del movimiento, de sus características y aportaciones fundamentales.
A Cross-Cultural Perspective on the Privacy Calculus
2017
The “privacy calculus” approach to studying online privacy implies that willingness to engage in disclosures on social network sites (SNSs) depends on evaluation of the resulting risks and benefits. In this article, we propose that cultural factors influence the perception of privacy risks and social gratifications. Based on survey data collected from participants from five countries (Germany [ n = 740], the Netherlands [ n = 89], the United Kingdom [ n = 67], the United States [ n = 489], and China [ n = 165]), we successfully replicated the privacy calculus. Furthermore, we found that culture plays an important role: As expected, people from cultures ranking high in individualism found i…
‘I shared the joy’: sport-related social support and communality on Instagram
2020
The popularity of sharing photographs on digital platforms has increased significantly due to the communicative affordances of mobile media and the emergence of photo-sharing applications, such as Instagram. In this paper, we examine how social support and communality can be built and reinforced through digital visual communication. We focus especially on photo sharing in the context of recreational climbing and trail running. In a qualitative study with Finnish climbers and runners, we asked what meanings sports practitioners ascribe to the practice of sharing and observed how they communicate these meanings through photographs. The results indicate that different types of visual content b…
Folk theories of algorithmic operations during Internet use: A mixed methods study
2021
We used the folk theory perspective to investigate Internet users’ understanding of algorithms during their Internet use. Empirically, we conducted a mixed-method study. First, we carried out semi-...
La desinformació multimodal sobre l’alteritat a Internet. Difusió de boles racistes, xenòfobes i islamòfobes el 2020
2021
espanolEste trabajo estudia la construccion de la imagen de la otredad a traves de la desinformacion en Internet. Para ello, aplica una metodologia de analisis de contenido a los 161 bulos de caracter racista, xenofobo o islamofobo desmentidos en 2020 por los cuatro medios espanoles de verificacion de informacion acreditados por la International Fact-Checking Network: Maldita.es, Newtral, Efe Verifica y Verificat. Los resultados evidencian que los formatos mas empleados fueron la imagen y el video, y que las desinformaciones se basaron mayoritariamente en la descontextualizacion y el engano, sin identificar su fuente. Los atributos mas transmitidos asociaron la otredad a la recepcion de ayu…
Email from Nancy Nutsucker
2006
This article addresses the representational conventions and gendered forms of address in online pornography through analysis of 366 unsolicited email (spam) messages advertising porn websites. Combining content description with close reading, it considers the terminology, imagery, narrative elements and points of view employed in advertising commercial heterosexual pornography. The spam advertisements create excessive displays of gender difference. It seems that limited female agency is central, especially in messages advertising reality sites structured by gendered relations of control. Arguing that such displays of control should not be automatically translated as displays of power, this…
DATING SECRETLY The Role of the Internet in Shaping Transnational Couple Formation in the Kurdish Diaspora
2016
Drawing on twenty-one in-depth interviews, this article discusses the Internet’s role in the formation of transnational marriages among migrant Kurds who live in Finland. In contrast to what is presented in the European media, my findings suggest that transnational couple formation among migrants should be seen as highly diverse and more than just practices that maintain and preserve “traditional” marriage customs. Transnational online dating practices make visible how young adult Kurds actively engage in partner formation and spousal selection. Online dating enables individual autonomy by widening the circle of potential partners outside familial circles and offers a private social space i…
Digital Banking in Northern India: The Risks on Customer Satisfaction
2021
The widespread use of digital technologies and the current pandemic (COVID) have fueled the need and call for digital transformation in the banking sector. Although this has various benefits, it is a disruption to the norm to which a bank customer has to become accustomed. This variance means that customers would have to make some changes to their routine. This can constitute risks in terms of maintaining customer satisfaction at previous levels. These risks are associated with customer retention because a service or product needs to be aligned with customer expectations to avoid them switching to other service providers. Moreover, it can also have an effect on reputa- tion. Offering digita…
Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks
2015
Internet of Things (IoT) devices are rapidly becoming ubiquitous while IoT services are becoming pervasive. Their success has not gone unnoticed and the number of threats and attacks against IoT devices and services are on the increase as well. Cyber-attacks are not new to IoT, but as IoT will be deeply interwoven in our lives and societies, it is becoming necessary to step up and take cyber defense seriously. Hence, there is a real need to secure IoT, which has consequently resulted in a need to comprehensively understand the threats and attacks on IoT infrastructure. This paper is an attempt to classify threat types, besides analyze and characterize intruders and attacks facing IoT device…
DNS Tunneling Detection Techniques – Classification, and Theoretical Comparison in Case of a Real APT Campaign
2017
Domain Name System (DNS) plays an important role as a translation protocol in everyday use of the Internet. The purpose of DNS is to translate domain names into IP addresses and vice versa. However, its simple architecture can easily be misused for malicious activities. One huge security threat concerning DNS is tunneling, which helps attackers bypass the security systems unnoticed. A DNS tunnel can be used for three purposes: as a command and control channel, for data exfiltration or even for tunneling another protocol through it. In this paper, we surveyed different techniques for DNS tunneling detection. We classified those first based on the type of data and then within the categories b…