8 research outputs found
Sticks and Stones May Break My Bones but Words Will Never Hurt Me...Until I See Them: A Qualitative Content Analysis of Trolls in Relation to the Gricean Maxims and (IM)Polite Virtual Speech Acts
The troll is one of the most obtrusive and disruptive bad actors on the internet. Unlike other bad actors, the troll interacts on a more personal and intimate level with other internet users. Social media platforms, online communities, comment boards, and chatroom forums provide them with this opportunity. What distinguishes these social provocateurs from other bad actors are their virtual speech acts and online behaviors. These acts aim to incite anger, shame, or frustration in others through the weaponization of words, phrases, and other rhetoric. Online trolls come in all forms and use various speech tactics to insult and demean their target audiences. The goal of this research is to investigate trolls\u27 virtual speech acts and the impact of troll-like behaviors on online communities. Using Gricean maxims and politeness theory, this study seeks to identify common vernacular, word usage, and other language behaviors that trolls use to divert the conversation, insult others, and possibly affect fellow internet users’ mental health and well-being
Reinterpret 4As framework of energy security from the perspective of human security – an analysis of China’s electric vehicle (EV) development
This research addresses two issues: expanding the understanding of human security with the case of China’s electric vehicle (EV) development and examining the human security implications of China’s EV development. This research adopts an online ethnographic method to record very personal driving forces and barriers to China’s EV uptake through the experiences shared by ordinary Chinese people. From a theoretical perspective, this research provides more evidence for the applicability of the broad human security approach in energy security analysis through the case of China’s EV development. By reinterpreting the 4As framework (availability, affordability, accessibility, and acceptability), which is one of the most frequently adopted frameworks in the analysis of energy security on the state level, (Cherp & Jewell, 2014, p. 416), this research challenges the current understanding of human security by demonstrating that threats to human security exist at all levels of development and touch not only the most vulnerable but also people living in well-developed regions in the face of the lasted technological transformation. The analysis of China’s EV development as a strategic energy security consideration sheds some light on the complicated relationship between state and individual security within China’s security discussion. It enriches the understanding of human security by exploring how it has been adapted to the Chinese social and political context. Meanwhile, drawing on the insights from ontological security through the lens of some key indicators (protection, autonomy, and social acceptance), this research emphasises the necessity of incorporating the subjective dimension in human security analysis to capture subjective feelings and psychological factors in everyday security. This research contributes empirically to identifying human security implications of EV development based on the real-life experiences shared by the Chinese people, which may constitute barriers to China’s EV uptake. Informed by the flexible interpretation of security agency offered by the broad human security approach, this research demonstrates that apart from the state’s dominant position as the main security provider, other players, such as carmakers, also play an important role in shaping people’s perceptions of how secure EVs are. Recognising that the misoperation of an automobile can cause serious physical harm to both those on board and other road users, this research argues that ordinary people should not be only considered as the object of protection but also as the agent with the power to exert influence on the security implications of the new technology
Chinese overseas and the internet: a study of old and new immigrants in New York's Manhattan Chinatown.
Chiu, Shu Ju Ann."March 2011."Thesis (Ph.D.)--Chinese University of Hong Kong, 2011.Includes bibliographical references (p. [302]-317).Questionnaire in Chinese.Abstract in Chinese and English.Acknowledgement --- p.iAbstract --- p.ivAbstract (Chinese) --- p.VChapter Chapter I. --- Introduction --- p.1Statement of Problem --- p.3Theoretical Discussion of Chinese Overseas and the Internet --- p.10Methodology --- p.20Thesis Chapters --- p.28Chapter Chapter II. --- Old and New Immigrants and the Internet in Manhattan Chinatown --- p.32Realignment of Social Structure after 9/11 --- p.36Changing Occupational Composition after 9/11 --- p.41Locality and Community Identifications of Old and New Immigrants --- p.45Transnational Migration and the Internet in Manhattan Chinatown --- p.55Chapter Chapter III. --- Emigrant Families and the Internet in Guangdong and Fujian --- p.65Transnational Migration to New York --- p.66Jiangmen Wuyi: Hometown of Old Cantonese Immigrants --- p.71Fuzhou Shiyi: Hometown of New Fujianese Immigrants --- p.84Chapter Chapter IV. --- Hometown Association and Homepage: CCBA-NY and Fujianese.com --- p.102Hometown Websites in Manhattan Chinatown --- p.104Weblog and the Profile of Hometown Associations --- p.113The Online Persona of CCBA-NY and Fujianese.com --- p.117Chapter Chapter V. --- Ancestral Worship Ritual and the Politics of Traditional Associations --- p.136Kinship Rhetoric and Cultural Politics of Ethnicity --- p.138The Sacred Place and Cultural Politics of New Fujianese Associations --- p.147The Sacred Space to Honor Ancestors for Old Cantonese Associations --- p.158Chapter Chapter VI. --- Online Debates over the Cultural Landmark of Manhattan Chinatown --- p.168Chinatown Visitor Information Kiosk --- p.170Chinese Archway --- p.176Confucius and Lin Zexu --- p.183Chapter Chapter VII. --- Miss Internet and the Hometown Memory of Fuzhou Migrants --- p.199The Internet Users and Non-Internet Users in the Fujianese Community --- p.201"Miss NY Chinese Pageant, Hometown Memory and Cultural Identity" --- p.211MissFujianese.com and the Cultural Construction --- p.222Chapter Chapter VIII. --- Online Ethnic Media and Social Action against Discrimination from American Mainstream Society --- p.239The Rally against CW11 and the Online Chinese Daily Press --- p.241The Rally against CBS and the Ethnic Websites --- p.250Online Social World of Chinese Immigrants --- p.262Chapter Chapter IX. --- Conclusion --- p.277Appendix --- p.295Bibliography --- p.30
The drivers of Corporate Social Responsibility in the supply chain. A case study.
Purpose: The paper studies the way in which a SME integrates CSR into its corporate strategy, the practices it puts in place and
how its CSR strategies reflect on its suppliers and customers relations.
Methodology/Research limitations: A qualitative case study methodology is used. The use of a single case study limits the
generalizing capacity of these findings.
Findings: The entrepreneur’s ethical beliefs and value system play a fundamental role in shaping sustainable corporate strategy.
Furthermore, the type of competitive strategy selected based on innovation, quality and responsibility clearly emerges both in
terms of well defined management procedures and supply chain relations as a whole aimed at involving partners in the process of
sustainable innovation.
Originality/value: The paper presents a SME that has devised an original innovative business model. The study pivots on the
issues of innovation and eco-sustainability in a context of drivers for CRS and business ethics. These values are considered
fundamental at International level; the United Nations has declared 2011 the “International Year of Forestry”
Shortest Route at Dynamic Location with Node Combination-Dijkstra Algorithm
Abstract— Online transportation has become a basic
requirement of the general public in support of all activities to go
to work, school or vacation to the sights. Public transportation
services compete to provide the best service so that consumers
feel comfortable using the services offered, so that all activities
are noticed, one of them is the search for the shortest route in
picking the buyer or delivering to the destination. Node
Combination method can minimize memory usage and this
methode is more optimal when compared to A* and Ant Colony
in the shortest route search like Dijkstra algorithm, but can’t
store the history node that has been passed. Therefore, using
node combination algorithm is very good in searching the
shortest distance is not the shortest route. This paper is
structured to modify the node combination algorithm to solve the
problem of finding the shortest route at the dynamic location
obtained from the transport fleet by displaying the nodes that
have the shortest distance and will be implemented in the
geographic information system in the form of map to facilitate
the use of the system.
Keywords— Shortest Path, Algorithm Dijkstra, Node
Combination, Dynamic Location (key words