PUBLIC CHALLENGES OF DIGITALISATION
##plugins.themes.bootstrap3.article.main##
##plugins.themes.bootstrap3.article.sidebar##
Abstract
The «information age» has changed profoundly the way we generate, store and exchange information, the way of interaction within and between individuals, institutions, societies and entities. The research aims to define frameworks of collection, usage, storage and distribution of information for better understanding legal and ethical responsibilities of states and citizens concerning application information technologies at social and political relationships. The research methodology comprises comparative case study of technology institutionalisation and its consequences for both developed and developing societies, namely, how the different societies may react to the impact of technology, what could the patterns of further relations between states, citizens and capitalist corporations be, defining prospects of the technocratic techno-science policies, multi-level governance and digital citizenship.
How to Cite
##plugins.themes.bootstrap3.article.details##
state security, information security policy, e-governance, smart citizenship, multi-level governance, populism.
2. Benigni, M. C., Joseph, K., Carley, K. M. (2017) Online extremism and the communities that sustain it: Detecting the ISIS supporting community on Twitter. PLoS ONE, 12 (12)
3. Chin, Y. C., Li, K. (2021, October). Sovereignty in the Cyberspace: Contestation of Concepts and Policies. Paper presented at AoIR 2021: The 22nd Annual Conference of the Association of Internet Researchers. Virtual Event: AoIR. Retrieved from http://spir.aoir.org.
4. Datta, A. The digital turn in postcolonial urbanism: Smart citizenship in the making of India's 100 smart cities (2018) Transactions of the Institute of British Geographers, . Article in Press.
5. Filer, T., Fredheim, R. (2017) Popular with the Robots: Accusation and Automation in the Argentine Presidential Elections, 2015. International Journal of Politics, Culture and Society, 30 (3), pp. 259-274.
6. Giest, S. (2017) Big data for policymaking: fad or fasttrack? Policy Sciences, 50 (3), pp. 367-382.
7. Lombardi Vallauri, E. (2016) The “exaptation” of linguistic implicit strategies SpringerPlus, 5 (1)
8. Manfredo, M. J., Teel, T. L., Sullivan, L., Dietsch, A. M. (2017) Values, trust, and cultural backlash in conservation governance: The case of wildlife management in the United States. Biological Conservation, 214, pp. 303-311.
9. Maréchal, N. (2017) Networked authoritarianism and the geopolitics of information: Understanding Russian internet policy. Media and Communication, 5 (1), pp. 29-41
10. Mønsted, B., Sapieżyński, P., Ferrara, E., Lehmann, S. (2017) Evidence of complex contagion of information in social media: An experiment using Twitter bots. PLoS ONE, 12 (9)
11. Rajabiun, R., Middleton, C. A. (2013) Multilevel governance and broadband infrastructure development: Evidence from Canada. Telecommunications Policy, 37 (9), pp. 702-714
12. Sobkowicz, P. (2016) Quantitative agent based model of opinion dynamics: Polish elections of 2015. PLoS ONE, 11 (5)
13. Tsukahara, T. (2017) Commentary: New Currents in Science: The Challenge of Quality, examining the discrepancies and incongruities between Japanese techno-scientific policy and the citizens’ science movement in post-3/11 Japan. Futures, 91, pp. 84-89.
14. Ulloa, R., Kacperski, C., Sancho, F. (2016) Institutions and cultural diversity: Effects of democratic and propaganda processes on local convergence and global diversity. PLoS ONE, 11 (4)
15. Zica, M. R., Ionica, A. C., Leba, M. (2018) Gamification in the context of smart cities. IOP Conference Series: Materials Science and Engineering, 294 (1)
16. Zwilling M., Klien G., Lesjak D. et al (2020) Cyber Security Awareness, Knowledge and Behaviour: A Comparative Study, Journal of Computer Information Systems, DOI: 10.1080/08874417.2020.1712269https://www.researchgate.net/profile/Fatih-Cetin-3/ publication/339273589_Cyber_Security_Awareness_Knowledge_and_Behavior_A_Comparative_Study/links/5e46ef2ba6 fdccd965a5c9be/Cyber-Security-Awareness-Knowledge-and-Behavior-A-Comparative-Study.pdf Accessed 17th March 2021.