884 resultados para Privatization of the Internet


Relevância:

100.00% 100.00%

Publicador:

Resumo:

In the history of modern communication, after the development of the printing press, the telegraph unleashed a revolution in communications. Today, Internet is in many ways its heir. Reflections on the telegraph may open up perspectives concerning tendencies, possibilities and pitfalls of the Internet. The telegraph has been well explored in important literature on communication and media which tends to emphasize the history of this technology, its social context and institutional meaning [e.g. Robert L. Thompson, 1947, Tom Standage, 2007 [1998]. James W. Carey, the North- American critical cultural studies' mentor, in his essay "Technology and Ideology. The Case of the Telegraph" (2009 [1983]), suggests a distinctive approach. In the telegraph, Carey sees the prototype of many subsequent commercial empires based on science and technology, a pioneer model for complex business management; an example of interest struggle for the patents control; an inductor of changes both in language and in structures of knowledge; and a promoter of a futurist and utopian thought of information technologies. Having in mind a revolution in communications promoted by the Internet, this paper revisits this seminal essay to explore its great attainment, as well as the problems of this kind of approach which conceives the innovation of the telegraph as a metaphor for all the innovations announcing the modern stage of history and determining still today the major lines of development in modern communication systems.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

All every day activities take place in space. And it is upon this that all information and knowledge revolve. The latter are the key elements in the organisation of territories. Their creation, use and distribution should therefore occur in a balanced way throughout the whole territory in order to allow all individuals to participate in an egalitarian society, in which the flow of knowledge can take precedence over the flow of interests. The information society depends, to a large extent, on the technological capacity to disseminate information and, consequently, the knowledge throughout territory, thereby creating conditions which allow a more balanced development, from the both the social and economic points of view thus avoiding the existence of info-exclusion territories. Internet should therefore be considered more than a mere technology, given that its importance goes well beyond the frontiers of culture and society. It is already a part of daily life and of the new forms of thinking and transmitting information, thus making it a basic necessity essential, for a full socio-economic development. Its role as a platform of creation and distribution of content is regarded as an indispensable element for education in today’s society, since it makes information a much more easily acquired benefit.”…in the same way that the new technologies of generation and distribution of energy allowed factories and large companies to establish themselves as the organisational bases of industrial society, so the internet today constitutes the technological base of the organisational form that characterises the Information Era: the network” (CASTELLS, 2004:15). The changes taking place today in regional and urban structures are increasingly more evident due to a combination of factors such as faster means of transport, more efficient telecommunications and other cheaper and more advanced technologies of information and knowledge. Although their impact on society is obvious, society itself also has a strong influence on the evolution of these technologies. And although physical distance has lost much of the responsibility it had towards explaining particular phenomena of the economy and of society, other aspects such as telecommunications, new forms of mobility, the networks of innovation, the internet, cyberspace, etc., have become more important, and are the subject of study and profound analysis. The science of geographical information, allows, in a much more rigorous way, the analysis of problems thus integrating in a much more balanced way, the concepts of place, of space and of time. Among the traditional disciplines that have already found their place in this process of research and analysis, we can give special attention to a geography of new spaces, which, while not being a geography of ‘innovation’, nor of theInternet’, nor even ‘virtual’, which can be defined as one of the ‘Information Society’, encompassing not only the technological aspects but also including a socio-economic approach. According to the last European statistical data, Portugal shows a deficit in terms of information and knowledge dissemination among its European partners. Some of the causes are very well identified - low levels of scholarship, weak investments on innovation and R&D (both private and public sector) - but others seem to be hidden behind socio-economical and technological factors. So, the justification of Portugal as the case study appeared naturally, on a difficult quest to find the major causes to territorial asymmetries. The substantial amount of data needed for this work was very difficult to obtain and for the islands of Madeira and Azores was insufficient, so only Continental Portugal was considered for this study. In an effort to understand the various aspects of the Geography of the Information Society and bearing in mind the increasing generalised use of information technologies together with the range of technologies available for the dissemination of information, it is important to: (i) Reflect on the geography of the new socio-technological spaces. (ii) Evaluate the potential for the dissemination of information and knowledge through the selection of variables that allow us to determine the dynamic of a given territory or region; (iii) Define a Geography of the Information Society in Continental Portugal.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The integrated system of design for manufacturing and assembly (DFMA) and internet based collaborative design are presented to support product design, manufacturing process, and assembly planning for axial eccentric oil-pump design. The presented system manages and schedules group oriented collaborative activities. The design guidelines of internet based collaborative design & DFMA are expressed. The components and the manufacturing stages of axial eccentric oil-pump are expressed in detail. The file formats of the presented system include the data types of collaborative design of the product, assembly design, assembly planning and assembly system design. Product design and assembly planning can be operated synchronously and intelligently and they are integrated under the condition of internet based collaborative design and DFMA. The technologies of collaborative modelling, collaborative manufacturing, and internet based collaborative assembly for the specific pump construction are developed. A seven-security level is presented to ensure the security of the internet based collaborative design system.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study presents a review of theories of the so-called post-industrial society, and proposes that the concept of post-industrial society can be used to understand the recent developments of the World Wide Web, often described as Web 2.0 or social Web. The study combines theories ranging from post-war management science and cultural studies to software development, and tries to build a holistic view of the development of the post-industrial society, and especially the Internet. The discourse on the emergence of a post-industrial society after the World Wars has addressed the ways in which the growing importance of information, and innovations in digital communications technology, are changing our society. It is furthermore deeply connected with the discourse on the postmodern society, which emphasizes cultural fragmentation, intertextuality, and pluralism. The Internet age is characterized by increasing masses of information that are managed through various technologies. While 1990s Internet technologies often used the network as a traditional broadcasting channel with added interactivity, Web 2.0 technologies are specifically designed to utilize the network model by facilitating communication between various services and devices, and analyzing the relationships between users and objects in order to produce intelligent insight. The wide adoption of the Internet, and recently of Internet-enabled mobile devices, is furthermore continuously producing new ways of communicating, consuming, and producing. Applications of the social Web, such as social media or social networking services, are permanently changing our traditional social, cultural, and economic practices. The study first presents an overview of the post-industrial society, the Internet, and the concept of Web 2.0. Then the concept of social Web is described with an analysis of the term social media, the brief histories of the interactive Web and social networking services, and a description of the concept ―long tail‖, used to represent the masses of information available in the Web that do not receive mainstream attention. Finally, methods for retrieving and filtering information, modeling social and cultural relationships, and communicating with customers, are presented.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Network externalities and two-sided markets in the context of web services and value creation is not very well discussed topic in academic literature. The explosive rise of the Internet users has created a strong base for many successful web services and pushed many firms towards e-business and online service based business models. Thus the subject of this thesis, the role of network externalities in value creating process of the commer-cial web service for two-sided international markets is very current and interesting topic to examine. The objective of this Master’s Thesis is to advance the study of network externalities from the viewpoint of two-sided markets and network effects as well as describe the value creation & value co-creation process in commercial web service business models. The main proposition suggests that the larger network of customers and the bigger number of users the web service is able to attract, the more value and stronger positive net-work externalities the service is able to create for each customer group. The empirical research of this study was implemented for commercial web service, targeted to Russian consumers and Finnish business users. The findings suggest that the size of the network is highly related to the experi-enced value of the customers and the whole value creation process of commercial web targeted for two-sided international markets varies from the value creation for one-sided or pure domestic markets.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Genomics is expanding the horizons of epidemiology, providing a new dimension for classical epidemiological studies and inspiring the development of large-scale multicenter studies with the statistical power necessary for the assessment of gene-gene and gene-environment interactions in cancer etiology and prognosis. This paper describes the methodology of the Clinical Genome of Cancer Project in São Paulo, Brazil (CGCP), which includes patients with nine types of tumors and controls. Three major epidemiological designs were used to reach specific objectives: cross-sectional studies to examine gene expression, case-control studies to evaluate etiological factors, and follow-up studies to analyze genetic profiles in prognosis. The clinical groups included patients' data in the electronic database through the Internet. Two approaches were used for data quality control: continuous data evaluation and data entry consistency. A total of 1749 cases and 1509 controls were entered into the CGCP database from the first trimester of 2002 to the end of 2004. Continuous evaluation showed that, for all tumors taken together, only 0.5% of the general form fields still included potential inconsistencies by the end of 2004. Regarding data entry consistency, the highest percentage of errors (11.8%) was observed for the follow-up form, followed by 6.7% for the clinical form, 4.0% for the general form, and only 1.1% for the pathology form. Good data quality is required for their transformation into useful information for clinical application and for preventive measures. The use of the Internet for communication among researchers and for data entry is perhaps the most innovative feature of the CGCP. The monitoring of patients' data guaranteed their quality.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Despite its young history, Computer Science Education has seen a number of "revolutions". Being a veteran in the field, the author reflects on the many changes he has seen in computing and its teaching. The intent of this personal collection is to point out that most revolutions came unforeseen and that many of the new learning initiatives, despite high financial input, ultimately failed. The author then considers the current revolution (MOOC, inverted lectures, peer instruction, game design) and, based on the lessons learned earlier, argues why video recording is so successful. Given the fact that this is the decade we lost print (papers, printed books, book shops, libraries), the author then conjectures that the impact of the Internet will make this revolution different from previous ones in that most of the changes are irreversible. As a consequence he warns against storming ahead blindly and suggests to conserve - while it is still possible - valuable components of what might soon be called the antebellum age of education.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The report examines the development of the Internet and Intranets in the world of business and commerce, drawing on previous literature and research. The new technology is explained, and key issues examined, such as the impact of the Internet on the surveyor's role as 'information broker' and its likely effect on clients' property requirements. The research is based on an analysis of 261 postal questionnaire responses and eight case study interviews from a sample of general practice and quantity surveying practices and corporates. For the first time the property profession is examined in detail and the key drivers, barriers and benefits of Internet use are identified for a range of different sized organisations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, I will argue that Canadian author Margaret Atwood uses fiscal and socially conservative dystopias to show how sex work and prostitution are choices that women would never have to make in a world with true gender equality. In these radically different worlds, women have no agency beyond their sexuality and no ability to express themselves as equals within either society. And while the structures of both societies, the society of The Handmaid’s Tale and that of both Oryx and Crake and The Year of the Flood, are inherently different, they both stem from modern conservative philosophies: for example, the country of Gilead in The Handmaid’s Tale holds Christian conservative beliefs on the role of religion in the state and the culturally designated roles of women. I define social conservatism as the idea that government organizations are used to pursue an agenda promoting traditional religious values such as “public morality” and opposing “immoralities” such as abortion, prostitution, and homosexuality. I define fiscal conservatism as an agenda promoting privatization of the market, deregulation and lower taxes. In this paper I argue that because these philosophies are incompatible with gender equality, they drive women to occupations such as sex work. Women find that they have no choices and sex work provides something to “trade.” For Offred, this “trading” is more limited, because she is a sex slave. For Oryx, this trading allows her to travel to the West, yet not before her childhood is marked by prostitution and pornography. Sex work allows for Ren to reclaim some agency over her life, yet she only chooses sex work because she is presented with few other options. All of these issues stem from the philosophies that define these dystopias.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The liberalization process of the Swiss telecommunications sector follows a logic of ‘autonomous adaptation’ to the regulations of the European Union (EU). Switzerland, which is not a Member State of the EU, voluntarily adapts to the European policy without being for- mally required to do so (Sciarini et al., 2004). This process went hand in hand with the partial privatization of the legal statute and assets of the former monopolist and with the re-regulation of the liberalized telecommunications sector.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Development of distance and distributed learning continuing education (CE) opportunities for human services workers requires existence of such CE offerings, participant access to the Internet, knowledge of the Internet's use, and willingness to enroll in such programs. A survey of human services professionals who attended the Family Preservation Annual Conferences in 2000 (N = 230) and 2002 (N - 197) revealed that 92% (n = 206) of 2000 survey participants and 98% (192) of 2002 survey participants have used the Internet, while 76% of 2000 and 56% of 2002 respondents reported no formal training in the use of the Internet and its features. Findings are reported that reveal substantial interest among subjects in the Internet as a medium for continuing education programs for professional development.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This briefing is an input to the discussions that will take place in the session “Privacy under mass surveillance: a multi-stakeholder international challenge” to be held on November 9th in João Pessoa, Brazil, during the “Day Zero” of the Internet Governance Forum. This document is one of the outputs of the first phase of the project “Privacy in the digital age: fostering the implementation of the bilateral German-Brazilian strategy in response to massive data collection”, jointly developed by the Center for Technology and Society of the Rio de Janeiro Law School of the Getulio Vargas Foundation and the German Institute for International and Security Affairs (SWP), with the support of FGV. The project Privacy in the Digital Age seeks to identify legal, political, technical, and economic incentives for the implementation of resolution 168/67 on Privacy in the Digital Age, proposed by Germany and Brazil, and approved by the United Nations General Assembly and to identify other potential areas of collaboration between Germany and Brazil in the field of Internet Governance.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper is located within the corporate social reporting and stakeholder management literature. It is concerned with the use of the Internet as a way of communicating with stakeholders and the extent to which this communication is or is not two-way. The evidence from the electricity industry in the UK is that the Internet is used but this use is selective and there is little true dialogue. It appears that the Internet provides an opportunity for greater corporate accountability in the future but whether this potential will be fulfilled is as yet unclear. Further research of a longitudinal nature is required to see how the Internet and more specifically corporate social or stakeholder reporting develops over time.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The connectivity of the Internet at the Autonomous System level is influenced by the network operator policies implemented. These in turn impose a direction to the announcement of address advertisements and, consequently, to the paths that can be used to reach back such destinations. We propose to use directed graphs to properly represent how destinations propagate through the Internet and the number of arc-disjoint paths to quantify this network's path diversity. Moreover, in order to understand the effects that policies have on the connectivity of the Internet, numerical analyses of the resulting directed graphs were conducted. Results demonstrate that, even after policies have been applied, there is still path diversity which the Border Gateway Protocol cannot currently exploit.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Increasingly users are seen as the weak link in the chain, when it comes to the security of corporate information. Should the users of computer systems act in any inappropriate or insecure manner, then they may put their employers in danger of financial losses, information degradation or litigation, and themselves in danger of dismissal or prosecution. This is a particularly important concern for knowledge-intensive organisations, such as universities, as the effective conduct of their core teaching and research activities is becoming ever more reliant on the availability, integrity and accuracy of computer-based information resources. One increasingly important mechanism for reducing the occurrence of inappropriate behaviours, and in so doing, protecting corporate information, is through the formulation and application of a formal ‘acceptable use policy (AUP). Whilst the AUP has attracted some academic interest, it has tended to be prescriptive and overly focussed on the role of the Internet, and there is relatively little empirical material that explicitly addresses the purpose, positioning or content of real acceptable use policies. The broad aim of the study, reported in this paper, is to fill this gap in the literature by critically examining the structure and composition of a sample of authentic policies – taken from the higher education sector – rather than simply making general prescriptions about what they ought to contain. There are two important conclusions to be drawn from this study: (1) the primary role of the AUP appears to be as a mechanism for dealing with unacceptable behaviour, rather than proactively promoting desirable and effective security behaviours, and (2) the wide variation found in the coverage and positioning of the reviewed policies is unlikely to be fostering a coherent approach to security management, across the higher education sector.