8 research outputs found

    Index

    Get PDF
    Janus.Net vol.14, nº

    Sticks and Stones May Break My Bones but Words Will Never Hurt Me...Until I See Them: A Qualitative Content Analysis of Trolls in Relation to the Gricean Maxims and (IM)Polite Virtual Speech Acts

    Get PDF
    The troll is one of the most obtrusive and disruptive bad actors on the internet. Unlike other bad actors, the troll interacts on a more personal and intimate level with other internet users. Social media platforms, online communities, comment boards, and chatroom forums provide them with this opportunity. What distinguishes these social provocateurs from other bad actors are their virtual speech acts and online behaviors. These acts aim to incite anger, shame, or frustration in others through the weaponization of words, phrases, and other rhetoric. Online trolls come in all forms and use various speech tactics to insult and demean their target audiences. The goal of this research is to investigate trolls\u27 virtual speech acts and the impact of troll-like behaviors on online communities. Using Gricean maxims and politeness theory, this study seeks to identify common vernacular, word usage, and other language behaviors that trolls use to divert the conversation, insult others, and possibly affect fellow internet users’ mental health and well-being

    Reinterpret 4As framework of energy security from the perspective of human security – an analysis of China’s electric vehicle (EV) development

    Get PDF
    This research addresses two issues: expanding the understanding of human security with the case of China’s electric vehicle (EV) development and examining the human security implications of China’s EV development. This research adopts an online ethnographic method to record very personal driving forces and barriers to China’s EV uptake through the experiences shared by ordinary Chinese people. From a theoretical perspective, this research provides more evidence for the applicability of the broad human security approach in energy security analysis through the case of China’s EV development. By reinterpreting the 4As framework (availability, affordability, accessibility, and acceptability), which is one of the most frequently adopted frameworks in the analysis of energy security on the state level, (Cherp & Jewell, 2014, p. 416), this research challenges the current understanding of human security by demonstrating that threats to human security exist at all levels of development and touch not only the most vulnerable but also people living in well-developed regions in the face of the lasted technological transformation. The analysis of China’s EV development as a strategic energy security consideration sheds some light on the complicated relationship between state and individual security within China’s security discussion. It enriches the understanding of human security by exploring how it has been adapted to the Chinese social and political context. Meanwhile, drawing on the insights from ontological security through the lens of some key indicators (protection, autonomy, and social acceptance), this research emphasises the necessity of incorporating the subjective dimension in human security analysis to capture subjective feelings and psychological factors in everyday security. This research contributes empirically to identifying human security implications of EV development based on the real-life experiences shared by the Chinese people, which may constitute barriers to China’s EV uptake. Informed by the flexible interpretation of security agency offered by the broad human security approach, this research demonstrates that apart from the state’s dominant position as the main security provider, other players, such as carmakers, also play an important role in shaping people’s perceptions of how secure EVs are. Recognising that the misoperation of an automobile can cause serious physical harm to both those on board and other road users, this research argues that ordinary people should not be only considered as the object of protection but also as the agent with the power to exert influence on the security implications of the new technology

    Chinese overseas and the internet: a study of old and new immigrants in New York's Manhattan Chinatown.

    Get PDF
    Chiu, Shu Ju Ann."March 2011."Thesis (Ph.D.)--Chinese University of Hong Kong, 2011.Includes bibliographical references (p. [302]-317).Questionnaire in Chinese.Abstract in Chinese and English.Acknowledgement --- p.iAbstract --- p.ivAbstract (Chinese) --- p.VChapter Chapter I. --- Introduction --- p.1Statement of Problem --- p.3Theoretical Discussion of Chinese Overseas and the Internet --- p.10Methodology --- p.20Thesis Chapters --- p.28Chapter Chapter II. --- Old and New Immigrants and the Internet in Manhattan Chinatown --- p.32Realignment of Social Structure after 9/11 --- p.36Changing Occupational Composition after 9/11 --- p.41Locality and Community Identifications of Old and New Immigrants --- p.45Transnational Migration and the Internet in Manhattan Chinatown --- p.55Chapter Chapter III. --- Emigrant Families and the Internet in Guangdong and Fujian --- p.65Transnational Migration to New York --- p.66Jiangmen Wuyi: Hometown of Old Cantonese Immigrants --- p.71Fuzhou Shiyi: Hometown of New Fujianese Immigrants --- p.84Chapter Chapter IV. --- Hometown Association and Homepage: CCBA-NY and Fujianese.com --- p.102Hometown Websites in Manhattan Chinatown --- p.104Weblog and the Profile of Hometown Associations --- p.113The Online Persona of CCBA-NY and Fujianese.com --- p.117Chapter Chapter V. --- Ancestral Worship Ritual and the Politics of Traditional Associations --- p.136Kinship Rhetoric and Cultural Politics of Ethnicity --- p.138The Sacred Place and Cultural Politics of New Fujianese Associations --- p.147The Sacred Space to Honor Ancestors for Old Cantonese Associations --- p.158Chapter Chapter VI. --- Online Debates over the Cultural Landmark of Manhattan Chinatown --- p.168Chinatown Visitor Information Kiosk --- p.170Chinese Archway --- p.176Confucius and Lin Zexu --- p.183Chapter Chapter VII. --- Miss Internet and the Hometown Memory of Fuzhou Migrants --- p.199The Internet Users and Non-Internet Users in the Fujianese Community --- p.201"Miss NY Chinese Pageant, Hometown Memory and Cultural Identity" --- p.211MissFujianese.com and the Cultural Construction --- p.222Chapter Chapter VIII. --- Online Ethnic Media and Social Action against Discrimination from American Mainstream Society --- p.239The Rally against CW11 and the Online Chinese Daily Press --- p.241The Rally against CBS and the Ethnic Websites --- p.250Online Social World of Chinese Immigrants --- p.262Chapter Chapter IX. --- Conclusion --- p.277Appendix --- p.295Bibliography --- p.30

    The drivers of Corporate Social Responsibility in the supply chain. A case study.

    Get PDF
    Purpose: The paper studies the way in which a SME integrates CSR into its corporate strategy, the practices it puts in place and how its CSR strategies reflect on its suppliers and customers relations. Methodology/Research limitations: A qualitative case study methodology is used. The use of a single case study limits the generalizing capacity of these findings. Findings: The entrepreneur’s ethical beliefs and value system play a fundamental role in shaping sustainable corporate strategy. Furthermore, the type of competitive strategy selected based on innovation, quality and responsibility clearly emerges both in terms of well defined management procedures and supply chain relations as a whole aimed at involving partners in the process of sustainable innovation. Originality/value: The paper presents a SME that has devised an original innovative business model. The study pivots on the issues of innovation and eco-sustainability in a context of drivers for CRS and business ethics. These values are considered fundamental at International level; the United Nations has declared 2011 the “International Year of Forestry”

    E-Proceeding SKIM XV 2017

    Get PDF

    Shortest Route at Dynamic Location with Node Combination-Dijkstra Algorithm

    Get PDF
    Abstract— Online transportation has become a basic requirement of the general public in support of all activities to go to work, school or vacation to the sights. Public transportation services compete to provide the best service so that consumers feel comfortable using the services offered, so that all activities are noticed, one of them is the search for the shortest route in picking the buyer or delivering to the destination. Node Combination method can minimize memory usage and this methode is more optimal when compared to A* and Ant Colony in the shortest route search like Dijkstra algorithm, but can’t store the history node that has been passed. Therefore, using node combination algorithm is very good in searching the shortest distance is not the shortest route. This paper is structured to modify the node combination algorithm to solve the problem of finding the shortest route at the dynamic location obtained from the transport fleet by displaying the nodes that have the shortest distance and will be implemented in the geographic information system in the form of map to facilitate the use of the system. Keywords— Shortest Path, Algorithm Dijkstra, Node Combination, Dynamic Location (key words
    corecore