Powerlessness and Personalization

2019 ◽  
Vol 33 (2) ◽  
pp. 319-343
Author(s):  
Victoria I. Burke ◽  
Robin D. Burke ◽  

Is privacy the key ethical issue of the internet age? This coauthored essay argues that even if all of a user’s privacy concerns were met through secure communication and computation, there are still ethical problems with personalized information systems. Our objective is to show how computer-mediated life generates what Ernesto Laclou and Chantal Mouffe call an “atypical form of social struggle.” Laclau and Mouffe develop a politics of contingent identity and transient articulation (or social integration) by means of the notions of absent, symbolic, hegemonic power and antagonistic transitions or relations. In this essay, we introduce a critical approach to one twenty-first-century atypical social struggle that, we claim, has a disproportionate effect on those who experience themselves as powerless. Our aim is to render explicit the forms of social mediation and distortion that result from large-scale machine learning as applied to personal preference information. We thus bracket privacy in order to defend some aspects of the EU GDPR that will give individuals more control over their experience of the internet if they want to use it and, thereby, decrease the unwanted epistemic effects of the internet. Our study is thus a micropolitics in in the Deleuzian micropolitical sense and a preliminary analysis of an atypical social struggle.

1996 ◽  
Vol 60 (3) ◽  
pp. 50-68 ◽  
Author(s):  
Donna L. Hoffman ◽  
Thomas P. Novak

The authors address the role of marketing in hypermedia computer-mediated environments (CMEs). Their approach considers hypermedia CMEs to be large-scale (i.e., national or global) networked environments, of which the World Wide Web on the Internet is the first and current global implementation. They introduce marketers to this revolutionary new medium, propose a structural model of consumer navigation behavior in a CME that incorporates the notion of flow, and examine a series of research issues and marketing implications that follow from the model.


2014 ◽  
Vol 68 (1) ◽  
pp. 22-31 ◽  
Author(s):  
Jeff Scheible

This article considers a cinematic subgenre of "longing to connect" narratives that explore the theme of romantic connection in the internet age. The release and success of Her (Spike Jonze) and Noah(Patrick Cederberg and Walter Woodman) contemporaneously in 2013, which both romance disembodiment, suggest a tipping point in the circulation of works that index attitudes about the complex affective structures of digital sociality. Pairing Lauren Berlant's notion of "cruel optimism" with Eva Ilouz's discussion of "emotional capitalism," this essay offers a comparative reading of Her and Noah alongside two earlier works, You've Got Mail and I Love Alaska, to interrogate cinema's potential, and potentially unique capability, to intervene in fantasies of computer-mediated love.


Author(s):  
Jennifer Stromer-Galley

Presidential candidates and their campaigns in the United States are fully invested in the use of social media. Yet, since 1996 presidential campaigns have been experimenting with ways to use digital communication technologies on the Internet to their advantage. This book tells the stories of the practices of campaigning online between 1996 and 2016, looking at winners and also-rans. The stories provide rich details of the factors that contribute to the success or failure of candidates, including the influence of digital media. The stories also show how political campaigns over six election cycles transitioned from the paradigm of mass media campaigning, to networked campaigning, and finally to mass-targeted campaigning. Campaigns shifted from efforts at mass persuasion to networked persuasion by identifying and communicating with super-supporters to give them the right digital tools and messages to take to their social network. Campaigns learned over time how to use the Internet’s interactive affordances to communicate with the public in ways that structures what supporters do for the campaign that maximizes strategic benefit—what I call “controlled interactivity.” By the 2016 campaign, technology companies made it easier and more effective to engage in mass-targeted campaigning—using large-scale data analytics by campaigns and tech companies to identify target audiences for campaigns to advertise to online.


2021 ◽  
pp. 222-238
Author(s):  
Jon R. Lindsay

The ubiquity of information technology augurs a new golden age of espionage. Intelligence is the use of deceptive means for strategic ends. It encompasses the collection of secrets, analysis and decision support, covert action and influence, and counterintelligence. Modern computational networks expand the opportunities for all these types of intelligence, for new types of actors to engage in intelligence activities, and for almost anyone or anything to become intelligence targets. Yet large-scale information systems also amplify the classic ethical, operational, and strategic challenges associated with intelligence. Many of the policy controversies associated with cybersecurity, for instance, are not simply novelties of the Internet age, but rather are symptomatic of the uneasy relationship between counterintelligence and democracy. Understanding the technology used for cyber intrusion may be necessary for understanding cyber conflict, but it is not sufficient for comprehending its strategic ends and limits: it is further necessary to understand the political logic of intelligence.


2020 ◽  
pp. 1-26
Author(s):  
Qinwen Hu ◽  
Muhammad Rizwan Asghar ◽  
Nevil Brownlee

HTTPS refers to an application-specific implementation that runs HyperText Transfer Protocol (HTTP) on top of Secure Socket Layer (SSL) or Transport Layer Security (TLS). HTTPS is used to provide encrypted communication and secure identification of web servers and clients, for different purposes such as online banking and e-commerce. However, many HTTPS vulnerabilities have been disclosed in recent years. Although many studies have pointed out that these vulnerabilities can lead to serious consequences, domain administrators seem to ignore them. In this study, we evaluate the HTTPS security level of Alexa’s top 1 million domains from two perspectives. First, we explore which popular sites are still affected by those well-known security issues. Our results show that less than 0.1% of HTTPS-enabled servers in the measured domains are still vulnerable to known attacks including Rivest Cipher 4 (RC4), Compression Ratio Info-Leak Mass Exploitation (CRIME), Padding Oracle On Downgraded Legacy Encryption (POODLE), Factoring RSA Export Keys (FREAK), Logjam, and Decrypting Rivest–Shamir–Adleman (RSA) using Obsolete and Weakened eNcryption (DROWN). Second, we assess the security level of the digital certificates used by each measured HTTPS domain. Our results highlight that less than 0.52% domains use the expired certificate, 0.42% HTTPS certificates contain different hostnames, and 2.59% HTTPS domains use a self-signed certificate. The domains we investigate in our study cover 5 regions (including ARIN, RIPE NCC, APNIC, LACNIC, and AFRINIC) and 61 different categories such as online shopping websites, banking websites, educational websites, and government websites. Although our results show that the problem still exists, we find that changes have been taking place when HTTPS vulnerabilities were discovered. Through this three-year study, we found that more attention has been paid to the use and configuration of HTTPS. For example, more and more domains begin to enable the HTTPS protocol to ensure a secure communication channel between users and websites. From the first measurement, we observed that many domains are still using TLS 1.0 and 1.1, SSL 2.0, and SSL 3.0 protocols to support user clients that use outdated systems. As the previous studies revealed security risks of using these protocols, in the subsequent studies, we found that the majority of domains updated their TLS protocol on time. Our 2020 results suggest that most HTTPS domains use the TLS 1.2 protocol and show that some HTTPS domains are still vulnerable to the existing known attacks. As academics and industry professionals continue to disclose attacks against HTTPS and recommend the secure configuration of HTTPS, we found that the number of vulnerable domain is gradually decreasing every year.


Author(s):  
Lena Nadarevic ◽  
Rolf Reber ◽  
Anne Josephine Helmecke ◽  
Dilara Köse

Abstract To better understand the spread of fake news in the Internet age, it is important to uncover the variables that influence the perceived truth of information. Although previous research identified several reliable predictors of truth judgments—such as source credibility, repeated information exposure, and presentation format—little is known about their simultaneous effects. In a series of four experiments, we investigated how the abovementioned factors jointly affect the perceived truth of statements (Experiments 1 and 2) and simulated social media postings (Experiments 3 and 4). Experiment 1 explored the role of source credibility (high vs. low vs. no source information) and presentation format (with vs. without a picture). In Experiments 2 and 3, we additionally manipulated repeated exposure (yes vs. no). Finally, Experiment 4 examined the role of source credibility (high vs. low) and type of repetition (congruent vs. incongruent vs. no repetition) in further detail. In sum, we found no effect of presentation format on truth judgments, but strong, additive effects of source credibility and repetition. Truth judgments were higher for information presented by credible sources than non-credible sources and information without sources. Moreover, congruent (i.e., verbatim) repetition increased perceived truth whereas semantically incongruent repetition decreased perceived truth, irrespectively of the source. Our findings show that people do not rely on a single judgment cue when evaluating a statement’s truth but take source credibility and their meta-cognitive feelings into account.


Electronics ◽  
2021 ◽  
Vol 10 (2) ◽  
pp. 219
Author(s):  
Phuoc Duc Nguyen ◽  
Lok-won Kim

People nowadays are entering an era of rapid evolution due to the generation of massive amounts of data. Such information is produced with an enormous contribution from the use of billions of sensing devices equipped with in situ signal processing and communication capabilities which form wireless sensor networks (WSNs). As the number of small devices connected to the Internet is higher than 50 billion, the Internet of Things (IoT) devices focus on sensing accuracy, communication efficiency, and low power consumption because IoT device deployment is mainly for correct information acquisition, remote node accessing, and longer-term operation with lower battery changing requirements. Thus, recently, there have been rich activities for original research in these domains. Various sensors used by processing devices can be heterogeneous or homogeneous. Since the devices are primarily expected to operate independently in an autonomous manner, the abilities of connection, communication, and ambient energy scavenging play significant roles, especially in a large-scale deployment. This paper classifies wireless sensor nodes into two major categories based the types of the sensor array (heterogeneous/homogeneous). It also emphasizes on the utilization of ad hoc networking and energy harvesting mechanisms as a fundamental cornerstone to building a self-governing, sustainable, and perpetually-operated sensor system. We review systems representative of each category and depict trends in system development.


Sign in / Sign up

Export Citation Format

Share Document