Metaphoric Interaction with the Internet
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
RFID) That Can Be "Read" When Close to a Sensor
PRESS RELEASE, Immediate distribution__ We are working on a new release of materials that includes the audio files of the press conference. Thanks to all the people interested in following up the case, we will keep you informed. We are translating the report to different languages, we have translated already to english, spanish and swedish. Mail us if you can translate the information presented in this website. Thanks! THE PHYSICAL ACCESS SECURITY TO WSIS: A PRIVACY THREAT FOR THE PARTICIPANTS. [IN PICTURES] PRESS RELEASE, Immediate distribution URL: http://www.contra.info/wsis | [email protected] PRESS CONFERENCE Friday 12th December 2003 at 11.30 am à « La Pastorale », Route de Ferney 106 à Genève http://www.pressclub.ch/archives/events_2003/event_121203_1130.htm [Press Release English PDF] - [Nota Prensa en Castellano] - Ass. Prof. Dr. Alberto Escudero-Pascual, Researcher in Computer Security and Privacy, Royal Institute of Technology, Stockholm, Sweden (EN, SP) Tel: + 41786677843 , +46 702867989 - Stephane Koch, President Internet Society Geneva, Executive Master of Economic Crime Investigations, Geneva, Switzerland. (FR, EN) Tel: +41 79 607 57 33 - George Danezis, Researcher in Privacy Enhancing Technologies and Computer Security, Cambridge University, UK. (FR, EN, GR) GENEVA, 10th DEC 2003 An international group of independent researchers attending the Word Summit on the Information Society (WSIS) has revealed important technical and legal flaws, relating to data protection and privacy, in the security system used to control access to the UN Summit. The system not only fails to guarantee the promised high levels of security but also introduces the very real possibility of constant surveillance of the representatives of the civil society. -
Violent Victimization in Cyberspace: an Analysis of Place, Conduct, Perception, and Law
Violent Victimization in Cyberspace: An Analysis of Place, Conduct, Perception, and Law by Hilary Kim Morden B.A. (Hons), University of the Fraser Valley, 2010 Thesis submitted in Partial Fulfillment of the Requirements for the Degree of Master of Arts IN THE SCHOOL OF CRIMINOLOGY FACULTY OF ARTS AND SOCIAL SCIENCES © Hilary Kim Morden 2012 SIMON FRASER UNIVERSITY Summer 2012 All rights reserved. However, in accordance with the Copyright Act of Canada, this work may be reproduced, without authorization, under the conditions for “Fair Dealing.” Therefore, limited reproduction of this work for the purposes of private study, research, criticism, review and news reporting is likely to be in accordance with the law, particularly if cited appropriately. Approval Name: Hilary Kim Morden Degree: Master of Arts (School of Criminology) Title of Thesis: Violent Victimization in Cyberspace: An Analysis of Place, Conduct, Perception, and Law Examining Committee: Chair: Dr. William Glackman, Associate Director Graduate Programs Dr. Brian Burtch Senior Supervisor Professor, School of Criminology Dr. Sara Smyth Supervisor Assistant Professor, School of Criminology Dr. Gregory Urbas External Examiner Senior Lecturer, Department of Law Australian National University Date Defended/Approved: July 13, 2012 ii Partial Copyright Licence iii Abstract The anonymity, affordability, and accessibility of the Internet can shelter individuals who perpetrate violent acts online. In Canada, some of these acts are prosecuted under existing criminal law statutes (e.g., cyber-stalking, under harassment, s. 264, and cyber- bullying, under intimidation, s. 423[1]). However, it is unclear whether victims of other online behaviours such as cyber-rape and organized griefing have any established legal recourse. -
Internet Trends 2015 – Code Conference
INTERNET TRENDS 2015 – CODE CONFERENCE Mary Meeker May 27, 2015 kpcb.com/InternetTrends Outline 1) Internet – Two-Thirds of a Generation In... 2) Key Internet Trends 3) Re-Imagining Continues... 4) America’s Evolving Work Environment... 5) Big Internet Markets = China / India 6) Public / Private Company Data 7) One More Thing... 8) Ran Outta Time Thoughts / Appendix 2 INTERNET TRENDS – TWO-THIRDS OF A GENERATION IN... TWO-THIRDS OF NEXT GENERATION OUT... Internet Users – 1995 2014... <1% to 39% Population Penetration Globally 1995 2014 35MM+ Internet Users 2.8B Internet Users 0.6% Population Penetration 39% Population Penetration 10% 21% 5% 22% 23% 12% 61% 0% 19% 28% USA China Asia (ex. China) Europe Rest of World Source: Euromonitor, ITU, US Census. 4 Mobile Phone Users – 1995 2014... 1% to 73% Population Penetration Globally 1995 2014 80MM+ Mobile Phone Users 5.2B Mobile Phone Users 1% Population Penetration 73% Population Penetration 40% 60% Smartphone Feature Phone Source: Informa, World Cellular Information Service (WCIS). Assumes in 1995, one mobile phone subscription per unique user (no duplication). Note: In 2014, user base per KPCB estimates based on Morgan Stanley Research and ITU data. Smartphone users & mobile phone users represent unique individuals owning mobile devices; mobile 5 subscribers based on number of connections & may therefore overstate number of mobile users. Public Internet Company Market Capitalizations – 1995 2015... Top 15 Companies by Market Capitalization = 1995 @ $17 Billion 2015 @ $2.4 Trillion Global -
Metaphors of Big Data
International Journal of Communication 8 (2014), 1690–1709 1932–8036/20140005 Metaphors of Big Data CORNELIUS PUSCHMANN Humboldt University of Berlin, Germany JEAN BURGESS Queensland University of Technology, Australia Metaphors are a common instrument of human cognition, activated when seeking to make sense of novel and abstract phenomena. In this article we assess some of the values and assumptions encoded in the framing of the term big data, drawing on the framework of conceptual metaphor. We first discuss the terms data and big data and the meanings historically attached to them by different usage communities and then proceed with a discourse analysis of Internet news items about big data. We conclude by characterizing two recurrent framings of the concept: as a natural force to be controlled and as a resource to be consumed. Keywords: data, big data, conceptual metaphor, semantics, science, technology, discourse analysis Introduction The media discourse around big data is rife with both strong claims about its potential and metaphors to illustrate these claims. The opening article of a 2011 special issue of the magazine Popular Science reads: “A new age is upon us: the age of data” (”Data Is Power,” 2011). On the magazine’s cover, the headline “Data Is Power” appears next to a Promethean hand bathed in light. In this and similar accounts, big data is suggested to signal the arrival of a new epistemological framework, a Kuhnian paradigm shift with the potential to displace established models of knowledge creation and do away with scientific tenets such as representative sampling and the notion of theory (Anderson, 2008; Mayer- Schönberger & Cukier, 2013; Weinberger, 2012). -
Metaphors of the World Wide Web
. Metaphors of the World Wide Web .......... ‘The Web … is limited only by mans’ imagination’ User 3: 249 Amy Hogan [email protected] www.amyhogan.com . Metaphors of the World Wide Web AMY LOUISE HOGAN A dissertation submitted for the degree of Bachelor of Science University of Bath Department of Psychology June 2002 COPYRIGHT Attention is drawn to the fact that copyright of this dissertation rests with its author. This copy of the dissertation has been supplied on condition that anyone who consults it is understood to recognise that its copyright rests with its author and that no quotation from the dissertation and no information derived from it may be published without the prior written consent of the author. Preface . Metaphors of the World Wide Web ACKNOWLEDGEMENTS The greatest thing by far is to be a master of metaphor. It is the one thing that cannot be learned from others; it is also a sign of genius, since a good metaphor implies an eye for resemblance. -Aristotle, De Poetica, 322 B.C. Many thanks are extended to my dissertation supervisor, Professor Helen Haste – a true master of metaphor. Thanks are also extended to Dr. Anne Beaulieu for her insightful comments when the research was in its early stages. Finally, thanks go to all the participants who found time to detangle themselves from the Web. Preface . Metaphors of the World Wide Web Abstract In just nine years since its debut, the ‘Web’ has generated a wide variety of metaphorical expressions. Metaphor, a powerful linguistic device, is used when users try to make sense of the Web’s foreign environment by describing the unfamiliar in terms of the familiar. -
Share Information on Cyber Security Incidents
© 2015 by Observer Research Foundation Digital Debates 2015: CyFy Journal Volume 2 Authors: Aaron Kleiner, Erin English, Gabi Siboni, Ankur Sarin, Kavitha Ranganathan, Kamlesh Bajaj, Rahul Jain, Fernando Crespo, Renato Flores, Karsten Geier, Jonah Force Hill, Patryk Pawlak, James Lewis, Parminder Jeet Singh, Yu-Chuang Kuek, Siddharth Verma, Sunil Abraham, Elonnai Hickok, Tarun Krishnakumar, Mahima Kaul, Samir Saran Editorial Team: Mahima Kaul, Anahita Mathai, Ritika Passi (ORF) Inside Design: Simi Jaison Designs Printed by: Vinset Advertising, Delhi Most of the papers IN thIS joURNal Were preseNted at CYFY 2014: The INDIA CONfereNce ON Cyber SecURIty AND INterNet GoverNANce, NeW DelhI, INDIA, October 14-16, 2014. Contents Editor’s Note Achieving Digital Proximity and Collective Voice............................................................................................................ 3 Samir Saran India and the Cyberworld 1. Today’s Decisions, Tomorrow’s Terrain: ........................................................................................................ 8 Strategic Directions for India in Shaping the Future of Cyberspace Erin English and Aaron Kleiner 2. Cyber Security: Build-up of India’s National Force ...................................................................................... 15 Gabi Siboni 3. A Case for Leapfrogging the Digital Divide ..................................................................................................... 23 Ankur Sarin and Kavitha Ranganathan 4. Data Security: Challenges -
Marianne Van Den Boomen Trans Coding the Digital How Metaphors Matter in New Media
MARIANNE VAN DEN BOOMEN TRANS CODING THE DIGITAL HOW METAPHORS MATTER IN NEW MEDIA A SERIES OF READERS PUBLISHED BY THE INSTITUTE OF NETWORK CULTURES ISSUE NO.: 14 MARIANNE VAN DEN BOOMEN TRANSCODING THE DIGITAL HOW METAPHORS MATTER IN NEW MEDIA Theory on Demand #14 Transcoding the Digital: How Metaphors Matter in New Media Author: Marianne van den Boomen Editorial support: Miriam Rasch Design and DTP: Katja van Stiphout Publisher: Institute of Network Cultures, Amsterdam 2014 Printer: ‘Print on Demand’ First 200 copies printed at Drukkerij Steenman, Enkhuizen ISBN: 978-90-818575-7-4 Earlier and different versions of Chapter 2 has been published in 2008 as ‘Interfacing by Iconic Metaphors’, in Configurations 16 (1): 33-55, and in 2009 as ‘Interfacing by Material Metaphors: How Your Mailbox May Fool You’, in Digital Material: Tracing New Media in Everyday Life and Technology, edited by Marianne van den Boomen, Sybille Lammes, Ann-Sophie Lehmann, Joost Raessens, and Mirko Tobias Schäfer. Amsterdam: Amsterdam University Press, p. 253-266. An earlier and different version of Chapter 6 has been published in 2006 as ‘Transcoding Metaphors after the Mediatic Turn’, in SPIEL 25 (h.1): 47-58. Contact Institute of Network Cultures Phone: +31 20 5951865 Email: [email protected] Web: http://www.networkcultures.org This publication is available through various print on demand services. For more information, and a freely downloadable PDF: http://networkcultures.org/publications This publication is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-SA 4.0). TRANSCODING THE DIGITAL 3 TRANSCODING THE DIGITAL HOW METAPHORS MATTER IN NEW MEDIA De transcodering van het digitale Hoe metaforen ertoe doen in nieuwe media (met een samenvatting in het Nederlands) PROEFSCHRIFT ter verkrijging van de graad van doctor aan de Universiteit Utrecht op gezag van de rector magnificus, prof.dr. -
The State of Broadband 2020: Tackling Digital Inequalities a Decade for Action
The State of Broadband: Tackling digital inequalities A decade for action September 2020 The State of Broadband 2020: Tackling digital inequalities A decade for action September 2020 © International Telecommunication Union and United Nations Educational, Scientific and Cultural Organization, 2020 Some rights reserved. This work is available under the Creative Commons Attribution- NonCommercial-ShareAlike 3.0 IGO license (CC BY-NC-SA 3.0 IGO; https:// creativecommons .org/ licenses/ by -nc -sa/ 3 .0/ igo). Under the terms of this license, you may copy, redistribute and adapt the work for non-commercial purposes, provided the work is appropriately cited, as indicated below. In any use of this work, there should be no suggestion that ITU or UNESCO endorses any specific organization, products or services. The unauthorized use of the ITU or UNESCO names or logos is not permitted. If you adapt the work, then you must license your work under the same or equivalent Creative Commons license. If you create a translation of this work, you should add the following disclaimer along with the suggested citation: “This translation was not created by the International Telecommunication Union (ITU) or the United Nations Educational, Scientific and Cultural Organization (UNESCO). Neither ITU nor UNESCO are responsible for the content or accuracy of this translation. The original English edition shall be the binding and authentic edition”. Any mediation relating to disputes arising under the license shall be conducted in accordance with the mediation rules of the World Intellectual Property Organization (http:// www .wipo .int/ amc/ en/ mediation/ rules). Suggested citation. State of Broadband Report 2020: Geneva: International Telecommunication Union and United Nations Educational, Scientific and Cultural Organization, 2020. -
Sentiment Analysis for Twitter Users of America
Sentiment Analysis for Twitter Users of America Karyofyllidis Karyofyllis SID: 3306150008 SCHOOL OF SCIENCE & TECHNOLOGY A thesis submitted for the degree of Master of Science (MSc) in Mobile and Web Computing -i- DECEMBER 2018 THESSALONIKI – GREECE Sentiment Analysis for Twitter Users of America Karyofyllidis Karyofyllis SID: 3306150008 Supervisor: Prof. Apostolos Papadopoulos Supervising Committee Members: Assoc. Prof. Name Surname Assist. Prof. Name Surname SCHOOL OF SCIENCE & TECHNOLOGY A thesis submitted for the degree of Master of Science (MSc) in Mobile and Web Computing -ii- DECEMBER 2018 THESSALONIKI – GREECE Abstract This dissertation was written as a part of the MSc in “Mobile and Web Computing” at the International Hellenic University, Thessaloniki, Greece. Nowadays, social media has noted as a type of online communication where people and organizations connect online to share information, thoughts and ideas. Because of its speed and reach, ease of use, social media influence various topics that range from the politics and environment to entertainment and the technology industry. Examples in- clude Facebook, Twitter, LinkedIn etc. An important part of our information-gathering behavior has always been to find out what other people think, thus as mentioned above with the growing availability and popularity of social Media, people now can make use of information technologies tech- niques to seek out and understand the opinions of others through their posts. Techniques like Data Mining, Machine Learning, Sentiment Analysis will be introduced for the purpose of this thesis to classify opinions into sentiment states. Sentiment is a plain concept, simple to understand. It’s just a feeling or emotion, an atti- tude or opinion. -
Judicial Use of Metaphors for New Technologies
“A ROSE BY ANY OTHER NAME”: JUDICIAL USE OF METAPHORS FOR NEW TECHNOLOGIES Stephanie A. Gore* It is now fairly established in cognitive science and linguistics that metaphors are an essential tool used to organize thought. It is human nature to reach for metaphors when trying to comprehend new concepts. Metaphors, however, may also selectively guide, or misguide, our cognitive processes. By emphasizing one aspect of a concept, a metaphor may blind us to other aspects that are inconsistent with the metaphor. The power of metaphor raises particular concerns in legal disputes wherein the resolution depends on comprehending new or developing technology. First, concerns have been raised regarding the judiciary’s ability to understand complex technology. Second, fear is a powerful barrier to learning, and fear of technology is a common phenomenon. Third, metaphors can be seductive, and may lead a person to end efforts to understand a new (perhaps daunting) concept too quickly. Finally, metaphors play a particularly powerful role in the law, since a court may inherit as precedent metaphors chosen by another court. All of this leads to the potential for the creation of precedents in which courts substitute poorly fitting metaphors for true comprehension of the technology at issue. This Article examines the use of metaphors by courts to comprehend new and developing technologies. It further examines the danger in the selection of definitional metaphors for new and changing technology, and how courts can avoid such dangers through recognition of both the limits of metaphors and the need to keep the metaphorical door open to information—and even * Assistant Professor of Law, Florida State University College of Law; J.D., University of Chicago Law School, 1994; M.S., Computer and Information Sciences, Georgia Institute of Technology, 1989; B.S., Computer Science, Stanford University, 1988. -
Free Speech and the Internet
University of Mary Washington Eagle Scholar Student Research Submissions Spring 5-2-2020 Free Speech and the Internet John Huebler Follow this and additional works at: https://scholar.umw.edu/student_research Part of the Philosophy Commons Recommended Citation Huebler, John, "Free Speech and the Internet" (2020). Student Research Submissions. 338. https://scholar.umw.edu/student_research/338 This Honors Project is brought to you for free and open access by Eagle Scholar. It has been accepted for inclusion in Student Research Submissions by an authorized administrator of Eagle Scholar. For more information, please contact [email protected]. Free Speech and the Internet Submitted in partial fulfillment of the requirements for Honors in Philosophy University of Mary Washington Fredericksburg, Virginia John Huebler Philosophy 485 April 24, 2020 Supervised by Professor Craig Vasey Huebler 2 Table of Contents – Free Speech and the Internet Part 1: The Marketplace of Ideas – A Framework on Free Speech ................................................ 3 I. Introduction ............................................................................................................................. 3 II. On Liberty .............................................................................................................................. 4 III. Hate Speech .......................................................................................................................... 6 IV. Misinformation .................................................................................................................. -
ANNEX to ICANN BOARD SUBMISSION NO. 2010-08-05-01 Business Confidential and Proprietary
ANNEX TO ICANN BOARD SUBMISSION NO. 2010-08-05-!" !"#$%&## ()%*$+&%,$-. -%+ /0)10$&,-02 3 4), 5)0 6$#,0$7",$)% 8",#$+& )* 9(:44 TITLE: Delegation of !"#$%. ("Falasteen") representing the Occupied Palestinian Territory in Arabic IANA REFERENCE: 319775 In accordance with ICANN’s obligations for managing the DNS root zone, IANA1 receives requests to delegate, redelegate and revoke top-level domains. This application has been compiled by IANA for presentation to the ICANN Board of Directors for review and appropriate action. Redacted 1 The term IANA is used throughout this document to refer to the department within ICANN that performed the IANA functions. Page 1 of 243 Redacted Page 2 of 243 Redacted Submitted by: Kim Davies Position: Manager, Root Zone Services Date Noted: 16 July 2010 Email and Phone Number [email protected]; +1 310 430 0455 Page 3 of 243 Separator Page 2010-08-05-01 Annex Palestine-enclosures Page 4 of 243 ENCLOSURE 1 TO ICANN BOARD SUBMISSION NO. 2010-08-05-!" Draft Public Report — Delegation of !"#$%. ("Falasteen") representing the Occupied Palestinian Territory in Arabic ICANN has received a request to delegate !"#$%. as a country-code top-level domain representing the Occupied Palestinian Territory. ICANN Staff have assessed the request, and provide this report for the ICANN Board of Directors to consider. FACTUAL INFORMATION Country The "PS" ISO 3166-1 code, from which this application's eligibility derives, is designated for use to represent the Occupied Palestinian Territory. String The domain under consideration for delegation at the DNS root level is “!"#$%”. This is represented in ASCII-compatible encoding according to the 2003 IDNA specification as “xn--ygbi2ammx”.