Operating Issue Networks on the Web

نویسنده

  • RICHARD ROGERS
چکیده

j INTRODUCTION Arguably, a small segment of organizations, governments and corporations have moved beyond ‘using’ to ‘operating’ the Internet. One of the beginnings of ‘Net operation’ lay in the emergence of Internet intelligence and monitoring companies. In 1995 the Ž rst of these companies was viewed in light of its ready off-Web comparison, the news-clipping service. Gradually, however, the companies have become known as Internet ‘surveillance’ Ž rms, where the main services comprise actively ‘monitoring’ what’s being said on the Net by their competitors (on competitor websites), by their critics (on ‘rogue’ and other websites), and by ‘Chinese whisperers’ (on newsgroups, mailing lists and listservs) (New York Times, 8 March 1999). To their clients the monitoring companies send indices, largely in the well-known styles of Web and newsgroup search engine returns. Depending on the severity of the ‘word on the Net’, the surveillance companies also recommend some form of action to be taken, in order to quash the rumour or put a more permanent end to the mongering (see Figure 1). While much of the more serious recommended action appears to be of the legal variety, in the form of trademark infringement, unfair trade and/or liable law suits, the less severe falls into the realm of ‘media tactics’. Indeed, certain corporations under Ž re for their human rights and environmental records often engage in tactical Net media (Garcia and Lovink, 1999). Be it the rather standard discursive ‘greenwashing’ of products, the more subtle creation of anger venting Net ‘grafŽ ti spaces’ such as the Shell forum, or the establishment of hyperlinks to one’s critics, such Net manoeuvring becomes immediately legible and trackable on the Internet knowledge maps, as we come to later in introducing new Web debate mapping

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improve Replica Placement in Content Distribution Networks with Hybrid Technique

The increased using of the Internet and its accelerated growth leads to reduced network bandwidth and the capacity of servers; therefore, the quality of Internet services is unacceptable for users while the efficient and effective delivery of content on the web has an important role to play in improving performance. Content distribution networks were introduced to address this issue. Replicatin...

متن کامل

Prediction of user's trustworthiness in web-based social networks via text mining

In Social networks, users need a proper estimation of trust in others to be able to initialize reliable relationships. Some trust evaluation mechanisms have been offered, which use direct ratings to calculate or propagate trust values. However, in some web-based social networks where users only have binary relationships, there is no direct rating available. Therefore, a new method is required t...

متن کامل

Evaluation of effects of operating parameters on combustible material recovery in coking coal flotation process using artificial neural networks

In this research work, the effects of flotation parameters on coking coal flotation combustible material recovery (CMR) were studied by the artificial neural networks (ANNs) method. The input parameters of the network were the pulp solid weight content, pH, collector dosage, frother dosage, conditioning time, flotation retention time, feed ash content, and rotor rotation speed. In order to sele...

متن کامل

A Sudy on Information Privacy Issue on Social Networks

In the recent years, social networks (SN) are now employed for communication and networking, socializing, marketing, as well as one’s daily life. Billions of people in the world are connected though various SN platforms and applications, which results in generating massive amount of data online. This includes personal data or Personally Identifiable Information (PII). While more and more data a...

متن کامل

HF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets

Abstract—Today, botnets have become a serious threat to enterprise networks. By creation of network of bots, they launch several attacks, distributed denial of service attacks (DDoS) on networks is a sample of such attacks. Such attacks with the occupation of system resources, have proven to be an effective method of denying network services. Botnets that launch HTTP packet flood attacks agains...

متن کامل

Protocols for fast, long-distance networks

Networks operating at 1 Gbit/s, 10 Gbit/s or even 100 Gbit/s and spanning several countries or states are now becoming commonplace. More and more users have to transfer routinely between multi-GB and multi-TB datasets over these gigabit networks. There is a growing range of application domains for such massive transfers including dataintensive Grids (e.g., in Particle Physics, Earth Observation...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002