Estimating the real with the virtual: How does the accuracy relate to the internet penetration?

Author(s):  
Ignacio Castro ◽  
Sergey Gorinsky
Author(s):  
Е.Н. Юдина

интернет-пространство стало частью реального мира современных студентов. В наши дни особенно актуальна проблема активизации использования интернета как дополнительного ресурса в образовательном процессе. В статье приводятся результаты небольшого социологического исследования, посвященного использованию интернета в преподавании социологических дисциплин. Internet space has become a part of the real world of modern students. The problem of increasing the use of the Internet as an additional resource in the educational process is now particularly topical. The article contains the results of a small sociological study on the use of the Internet in teaching sociological disciplines.


2021 ◽  
pp. 254-267
Author(s):  
John Royce

Good readers evaluate as they go along, open to triggers and alarms which warn that something is not quite right, or that something has not been understood. Evaluation is a vital component of information literacy, a keystone for reading with understanding. It is also a complex, complicated process. Failure to evaluate well may prove expensive. The nature and amount of information on the Internet make evaluation skills ever more necessary. Looking at research studies in reading and in evaluation, real-life problems are suggested for teaching, modelling and discussion, to bring greater awareness to good, and to less good, readers.


2021 ◽  
Author(s):  
Neil Thomson

This paper outlines the results of a two month study in which a series of extremist Islamist websites - registered, hosted or given datacentre services by Canadian internet companies- were empirically observed. The results of this project are inserted into a framework which explores the misuse and wrongful application of the "terrorist" signifier to substate or nonstate activities, discerns between the purported use of the internet by extremist Islamist organizations for destructive means and the real use of the internet by such groups, and suggests a number of conclusions based on prior administrative responses to the extremist Islamist use of the internet. The full results of this project can he viewed at http://www.stonnloader.com/metnbers/nordicfury.


2012 ◽  
pp. 944-959 ◽  
Author(s):  
Stepan Konecny

Mass media often presents a warped image of the Internet as an unreliable environment in which nobody can be trusted. In this entry, the authors describe lying on the Internet both in the context of lying in the real world and with respect to the special properties of computer-mediated communication (CMC). They deal with the most frequent motives for lying online, such as increasing one’s attractiveness or experimenting with identities. They also take into account the various environments of the Internet and their individual effects on various properties of lying. The current methods for detecting lies and the potential for future computer-linguistic analysis of hints for lying in electronic communication are also considered.


Author(s):  
Nobuyoshi Terashima

On the Internet, a cyberspace is created where people communicate together, usually by using textual messages. Therefore, they cannot see each other in cyberspace. Whenever they communicate, it is desirable for them to see each other as if they were gathered at the same place. To achieve this, various kinds of concepts have been proposed, such as a collaborative environment, Tele-Immersion, and tele-presence (Sherman & Craig, 2003). In this article, HyperReality (HR) is introduced. HR is a communication paradigm between the real and the virtual (Terashima, 1995, 2002; Terashima & Tiffin, 2002; Terashima, Tiffin, & Ashworth, in press). The real means a real inhabitant, such as a real human or a real animal. The virtual means a virtual inhabitant, a virtual human, or a virtual animal. HR provides a communication environment where inhabitants, real or virtual, that are at different locations, meet and do cooperative work together as if they were gathered at the same place. HR can be developed based on virtual reality (VR) and telecommunications technologies.


Author(s):  
Azizul Hassan

Augmented reality (AR) offers an interactive experience of the real-world environment when an object of the real-world is augmented by computer-generated perceptual information and relevant artefacts. This is a conceptual chapter based on the review of available literature. Also, resources on the internet have also been accessed and reviewed. On the context of the Diffusion of Innovation theory, this research aims to outline AR guiding for in an airport used for tourist aviation. Biman Bangladesh Airlines, the national flag carrier of the country, is the example where this study also explains the possible challenges and benefits that AR guiding facilities can possibly have. This research outlines two specific areas of management and marketing issues are analysis on the way to implement such guiding. Findings show that from the understanding of the Diffusion of Innovation, AR guiding in these days is adopted by an ‘Early Majority' who are followers and engages in reading those reviews given by the previous adopters of new services or products.


Author(s):  
Nils B. Weidmann ◽  
Espen Geelmuyden Rød

The introduction of the book starts out by distinguishing between two narratives about the effect of the Internet in autocratic systems: According to “liberation technology” proponents, Internet technology is likely to empower activists in autocracies by reducing autocratic governments ability to control the ow of information and communication, while the “repression technology” perspective emphasizes the sinister ways by which autocratic regimes can use the Internet for propaganda and surveillance. The chapter argues that in order to advance the scientific debate, research should move beyond this overly simple distinction, and needs to identify the conditions under which this technology helps protesters vs. when it benefits dictators. This requires a more nuanced conception of protest and its different stages, but also better, more fine-grained data of protest and Internet penetration.


Author(s):  
Kenneth C. C. Yang ◽  
Yowei Kang

On February 4, 2015, China announced its new regulations that require all Chinese Internet users to register with their real names. The heightened control of Internet clearly demonstrates Chinese government's concerns over increasing social unrests and the abilities of Chinese Internet users to access information not censored by the government. However, the real-name registration regime has posed the greatest challenge to the anonymity of the Internet that many Chinese users have valued in an authoritarian society. Furthermore, the real-name registration system also impinges on Chinese Internet users' privacy, political freedom, and freedom of speech. This book chapter analyzes microblog discussions to examine existing Chinese censorship and control systems on the Internet, to investigate government's rhetoric to justify its censorship and control systems, and to identify major themes in Chinese netizens' reactions and discourses.


2020 ◽  
pp. 210-228
Author(s):  
Ayala Fader

This chapter looks into double lifers that were part of the loud heretical counterpublic that contributed to the contemporary ultra-Orthodox crisis. It reviews ongoing struggles in order to understand life-changing religious doubt, including its causes and its cures. It also analyzes how some rabbis and activists blamed the Internet, while others, including many religious therapists, blamed an ultra-Orthodoxy that had become too stringent and too rigid. The chapter emphasizes how faithful people and those living double lives came to a shared conclusion that the real threat of the medium of the Internet was its new possibilities for interaction with like-minded others that directly challenged ultra-Orthodox authority. It also summarizes the experience of life-changing doubt and its implications for families, friends, religious authorities, and institutions.


Sensors ◽  
2019 ◽  
Vol 19 (13) ◽  
pp. 2956 ◽  
Author(s):  
Paolo Lo Giudice ◽  
Antonino Nocera ◽  
Domenico Ursino ◽  
Luca Virgili

In the last years, several attempts to combine the Internet of Things (IoT) and social networking have been made. In the meantime, things involved in IoT are becoming increasingly sophisticated and intelligent, showing a behavior that tends to look like the one of users in social networks. Therefore, it is not out of place to talk about profiles of things and about information and topics exchanged among them. In such a context, constructing topic-driven virtual communities starting from the real ones operating in a Multi-IoT scenario is an extremely challenging issue. This paper aims at providing some contributions in this setting. First of all, it presents the concept of profile of a thing. Then, it introduces the concept of topic-guided virtual IoT. Finally, it illustrates two approaches (one supervised and one unsupervised) to constructing topic-guided virtual IoTs in a Multi-IoT scenario.


Sign in / Sign up

Export Citation Format

Share Document