Search results for "internet"

showing 10 items of 2589 documents

Movilizaciones por la red. Las evoluciones del movimiento <em>open</em>

2019

El movimiento open es el conjunto de luchas protagonizadas por individuos, foros, organizaciones e instituciones de muy diverso tipo que postulan una visión abierta, inclusiva y participativa de internet y de los bienes digitales. Consta de seis ramas fundamentales en función del campo sobre el que operan: el software, la comunicación científica, los materiales educativos, la creación cultural, la producción maker y la neutralidad de la red. Este artículo ofrece una visión sintética del movimiento, de sus características y aportaciones fundamentales.

Cultural StudiesSociology and Political Sciencebusiness.industryMovement (music)General Arts and HumanitiesMedia studiesDigital goodsSoftwarePolitical scienceProduction (economics)The InternetNeutralitybusinessScientific communicationArbor
researchProduct

A Cross-Cultural Perspective on the Privacy Calculus

2017

The “privacy calculus” approach to studying online privacy implies that willingness to engage in disclosures on social network sites (SNSs) depends on evaluation of the resulting risks and benefits. In this article, we propose that cultural factors influence the perception of privacy risks and social gratifications. Based on survey data collected from participants from five countries (Germany [ n = 740], the Netherlands [ n = 89], the United Kingdom [ n = 67], the United States [ n = 489], and China [ n = 165]), we successfully replicated the privacy calculus. Furthermore, we found that culture plays an important role: As expected, people from cultures ranking high in individualism found i…

Cultural StudiesUncertainty avoidanceKnowledge managementSocial networkbusiness.industryCommunication05 social sciencesInternet privacy050801 communication & media studies050109 social psychologyPrivacy calculuslcsh:P87-96Computer Science Applicationslcsh:Communication. Mass mediaIndividualism0508 media and communicationsSelf-disclosureCross-cultural0501 psychology and cognitive sciencesSocial mediaSociologybusinessSocial capitalSocial Media + Society
researchProduct

‘I shared the joy’: sport-related social support and communality on Instagram

2020

The popularity of sharing photographs on digital platforms has increased significantly due to the communicative affordances of mobile media and the emergence of photo-sharing applications, such as Instagram. In this paper, we examine how social support and communality can be built and reinforced through digital visual communication. We focus especially on photo sharing in the context of recreational climbing and trail running. In a qualitative study with Finnish climbers and runners, we asked what meanings sports practitioners ascribe to the practice of sharing and observed how they communicate these meanings through photographs. The results indicate that different types of visual content b…

Cultural StudiesVisual Arts and Performing ArtsverkkoyhteisötInternet privacyComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION0507 social and economic geographysosiaalinen mediasosiaalinen tukiinspiraatioSocial support0504 sociologySociologyAffordancevalokuvatverkkopalvelutmotivaatioyhteisöllisyysbusiness.industry05 social sciencesvisuaalinen viestintä050401 social sciences methodsPopularityMobile mediaAnthropologyInstagrambusiness050703 geographyurheilijatVisual Studies
researchProduct

Folk theories of algorithmic operations during Internet use: A mixed methods study

2021

We used the folk theory perspective to investigate Internet users’ understanding of algorithms during their Internet use. Empirically, we conducted a mixed-method study. First, we carried out semi-...

Cultural StudiesWorld Wide WebInternet useComputer scienceFolk psychologyPolitical Science and International RelationsPerspective (graphical)Lay theoriesInternet usersSocial constructionismInformation SystemsManagement Information SystemsThe Information Society
researchProduct

La desinformació multimodal sobre l’alteritat a Internet. Difusió de boles racistes, xenòfobes i islamòfobes el 2020

2021

espanolEste trabajo estudia la construccion de la imagen de la otredad a traves de la desinformacion en Internet. Para ello, aplica una metodologia de analisis de contenido a los 161 bulos de caracter racista, xenofobo o islamofobo desmentidos en 2020 por los cuatro medios espanoles de verificacion de informacion acreditados por la International Fact-Checking Network: Maldita.es, Newtral, Efe Verifica y Verificat. Los resultados evidencian que los formatos mas empleados fueron la imagen y el video, y que las desinformaciones se basaron mayoritariamente en la descontextualizacion y el engano, sin identificar su fuente. Los atributos mas transmitidos asociaron la otredad a la recepcion de ayu…

Cultural Studiesbusiness.industryCommunicationPolitical scienceDisinformationThe InternetFake newsbusinessHumanitiesAnàlisi
researchProduct

Email from Nancy Nutsucker

2006

This article addresses the representational conventions and gendered forms of address in online pornography through analysis of 366 unsolicited email (spam) messages advertising porn websites. Combining content description with close reading, it considers the terminology, imagery, narrative elements and points of view employed in advertising commercial heterosexual pornography. The spam advertisements create excessive displays of gender difference. It seems that limited female agency is central, especially in messages advertising reality sites structured by gendered relations of control. Arguing that such displays of control should not be automatically translated as displays of power, this…

Cultural Studiesbusiness.industryInternet researchAdvertising06 humanities and the artsRepresentation (arts)060401 art practice history & theoryEducationTerminologyArts and Humanities (miscellaneous)Agency (sociology)Close readingPornographyThe InternetNarrativeSociologybusiness0604 artsEuropean Journal of Cultural Studies
researchProduct

DATING SECRETLY The Role of the Internet in Shaping Transnational Couple Formation in the Kurdish Diaspora

2016

Drawing on twenty-one in-depth interviews, this article discusses the Internet’s role in the formation of transnational marriages among migrant Kurds who live in Finland. In contrast to what is presented in the European media, my findings suggest that transnational couple formation among migrants should be seen as highly diverse and more than just practices that maintain and preserve “traditional” marriage customs. Transnational online dating practices make visible how young adult Kurds actively engage in partner formation and spousal selection. Online dating enables individual autonomy by widening the circle of potential partners outside familial circles and offers a private social space i…

Cultural Studiesetnografiakurditbusiness.industryMedia studiestransnational marriageDiasporaArts and Humanities (miscellaneous)AnthropologyPolitical scienceThe Internetonline datingbusinesscouple formation2016 - Special Issue: Muslim Intimacies – Families, Individuals and Late Modern Dilemmas
researchProduct

Digital Banking in Northern India: The Risks on Customer Satisfaction

2021

The widespread use of digital technologies and the current pandemic (COVID) have fueled the need and call for digital transformation in the banking sector. Although this has various benefits, it is a disruption to the norm to which a bank customer has to become accustomed. This variance means that customers would have to make some changes to their routine. This can constitute risks in terms of maintaining customer satisfaction at previous levels. These risks are associated with customer retention because a service or product needs to be aligned with customer expectations to avoid them switching to other service providers. Moreover, it can also have an effect on reputa- tion. Offering digita…

Customer retentionInternet banking -- India NorthService industries -- India NorthStrategy and Managementmedia_common.quotation_subjectEconomics Econometrics and Finance (miscellaneous)digital banking; customer satisfaction; SERVQUAL model; risk management; service quality; digital transformationrisk managementservice qualityRisk management -- India NorthInsuranceFinance -- Technological innovations -- India NorthAccountingHG8011-9999ddc:330Quality (business)Marketingmedia_commonService (business)Service qualitydigital bankingSERVQUAL (Service quality framework)customer satisfactionDigital transformationSERVQUAL modelService providerBank customers -- India Northdigital transformationCustomer satisfactionBusinessBanks and banking -- Technological innovations -- India NorthReputationRisks
researchProduct

Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks

2015

Internet of Things (IoT) devices are rapidly becoming ubiquitous while IoT services are becoming pervasive. Their success has not gone unnoticed and the number of threats and attacks against IoT devices and services are on the increase as well. Cyber-attacks are not new to IoT, but as IoT will be deeply interwoven in our lives and societies, it is becoming necessary to step up and take cyber defense seriously. Hence, there is a real need to secure IoT, which has consequently resulted in a need to comprehensively understand the threats and attacks on IoT infrastructure. This paper is an attempt to classify threat types, besides analyze and characterize intruders and attacks facing IoT device…

Cyber defenseComputer Networks and CommunicationsHardware and Architecturebusiness.industryComputer scienceInternet privacyCyber-attackInternet of ThingsbusinessComputer securitycomputer.software_genrecomputerJournal of Cyber Security and Mobility
researchProduct

DNS Tunneling Detection Techniques – Classification, and Theoretical Comparison in Case of a Real APT Campaign

2017

Domain Name System (DNS) plays an important role as a translation protocol in everyday use of the Internet. The purpose of DNS is to translate domain names into IP addresses and vice versa. However, its simple architecture can easily be misused for malicious activities. One huge security threat concerning DNS is tunneling, which helps attackers bypass the security systems unnoticed. A DNS tunnel can be used for three purposes: as a command and control channel, for data exfiltration or even for tunneling another protocol through it. In this paper, we surveyed different techniques for DNS tunneling detection. We classified those first based on the type of data and then within the categories b…

DNS tunneling detectionSIMPLE (military communications protocol)business.industryComputer scienceDomain Name SystemComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreDomain (software engineering)protokollat0202 electrical engineering electronic engineering information engineeringAPT020201 artificial intelligence & image processingThe Internetcovert channels detectiontietoturvabusinesscomputerProtocol (object-oriented programming)
researchProduct