Info Genetics

Communication and Social Transformation Master Programme: ILT508 – Mass Media and ICTs in Development and Social Transformation References: Aeron Davis – Whither Mass Media and Power? Evidence for a Critical Elite Theory Alternative – Media Culture Society 2003 25: 669 Albert Bandura (2001): Social Cognitive Theory of Mass Communication, Media Psychology, 3:3, 265-299 Alfred Hermida, […]

Share onEmail this to someoneShare on FacebookTweet about this on TwitterShare on LinkedInPin on PinterestShare on Google+Share on RedditDigg thisShare on StumbleUponShare on Tumblr

Communications and Social Transformation Master Programme ILT510 Activism, Digital Activism and Hacktivism References: Activism Articles Andreas Jungherr – The Digiactive Guide to Twitter for Activism Athina Karatzogianni – Social Movement Theory and Sociopolitical Cyberconflicts – Tenth International Conference on Alternative Futures and Popular Protest Manchester Metropolitan University Bart Cammaerts – Activism and Media – Reclaiming […]

Share onEmail this to someoneShare on FacebookTweet about this on TwitterShare on LinkedInPin on PinterestShare on Google+Share on RedditDigg thisShare on StumbleUponShare on Tumblr

When the government/companies use the technology for surveillance; called “security, public safety, marketing, economy”, but when an individual use the technology “to observe” the government; called “committed to crime”. The interesting thing in both situation, individuals are willingly put themselves in these surveillance and crime. One called itself democracy, the other one’s anarchy. For both […]

Share onEmail this to someoneShare on FacebookTweet about this on TwitterShare on LinkedInPin on PinterestShare on Google+Share on RedditDigg thisShare on StumbleUponShare on Tumblr

Anonymous has announced the new plan for an attack to the social Network Facebook on November 5th, 2011. In mid-July a posted video on Youtube by Anonymous claims Facebook for selling the information to government agencies and spying users all around the world. And privacy issues are also delusion. Operation Facebook DATE: November 5, 2011. […]

Share onEmail this to someoneShare on FacebookTweet about this on TwitterShare on LinkedInPin on PinterestShare on Google+Share on RedditDigg thisShare on StumbleUponShare on Tumblr

When I was a child, before the internet enters my life, we all played lots of games ourselves or previous generations had invented. Now, with the rise of the new age coming to our lives with its goods and bads, we can not learn from the bads before experiencing them. However, we can protect ourselves […]

Share onEmail this to someoneShare on FacebookTweet about this on TwitterShare on LinkedInPin on PinterestShare on Google+Share on RedditDigg thisShare on StumbleUponShare on Tumblr

LulzSec who was behind sophisticated hacking acts, launched its website and released all hacked data from Sony, PBS,  Fox News as below. As stated by LulzSec; We recently broke into SonyPictures.com and compromised over 1,000,000 users’ personal information, including passwords, email addresses, home addresses, dates of birth, and all Sony opt-in data associated with their […]

Share onEmail this to someoneShare on FacebookTweet about this on TwitterShare on LinkedInPin on PinterestShare on Google+Share on RedditDigg thisShare on StumbleUponShare on Tumblr

Every person in the world can speak about democracy or want to live in a democratically way. That’s normal, it’s human rights. In some situations sometimes human kind understand the democracy concept in a different and false way. What kind of democracy? Who has to be in charge in a democracy, most powerful or just […]

Share onEmail this to someoneShare on FacebookTweet about this on TwitterShare on LinkedInPin on PinterestShare on Google+Share on RedditDigg thisShare on StumbleUponShare on Tumblr

IT security company Sophos published a report focused on data security, The State of Data Security, which emphasizes risks and costs of exposure of personal information on mobile devices and social media sites. Social media sites will become a threat for your organization as a tool of social engineering with your employee’s unprotected social networks […]

Share onEmail this to someoneShare on FacebookTweet about this on TwitterShare on LinkedInPin on PinterestShare on Google+Share on RedditDigg thisShare on StumbleUponShare on Tumblr