The evolution of joint teacher observations and reflections as sites of heteroglossia and heteroopia: an actor–network theoretical discussion

2021 ◽  
pp. 1-15
Author(s):  
Eisuke Saito
Author(s):  
Huda Ibrahim ◽  
Hasmiah Kasimin

An effi cient and effective information technology transfer from developed countries to Malaysia is an important issue as a prerequisite to support the ICT needs of the country to become not only a ICT user but also a ICT producer. One of the factors that infl uences successful information technology transfer is managing the process of how technology transfer occurs in one environment. It involves managing interaction between all parties concerned which requires an organized strategy and action toward accomplishing technology transfer objective in an integrated and effective mode. Using a conceptual framework based on the Actor Network Theory (ANT), this paper will analyse a successful information technology transfer process at a private company which is also a supplier of information technology (IT) products to the local market. This framework will explain how the company has come up with a successful technology transfer in a local environment. Our study shows that the company had given interest to its relationships with all the parties involved in the transfer process. The technology transfer programme and the strategy formulated take into account the characteristics of technology and all those involved.  


2017 ◽  
Vol 23 (2) ◽  
pp. 100-121
Author(s):  
Michel Chambon

This article explores the ways in which Christians are building churches in contemporary Nanping, China. At first glance, their architectural style appears simply neo-Gothic, but these buildings indeed enact a rich web of significances that acts upon local Christians and beyond. Building on Actor-Network Theory and exploring the multiple ties in which they are embedded, I argue that these buildings are agents acting in their own right, which take an active part in the process of making the presence of the Christian God tangible.


2020 ◽  
Vol 67 (1) ◽  
pp. 155-170
Author(s):  
Shanti Ulfsbjorninn

AbstractGalician presents an intriguing case of opaque phonologically-conditioned definite article allomorphy (PCA). Though Galician features in the general literature on PCA (Nevins 2011), there is a surprising lack of synchronic theoretical discussion of this specific pattern. The data appears to require allomorph selection arranged in a system of Priority (Mascaró 2005; Bonet et al. 2003; 2007). The pattern involves opaque segment ‘deletion’ and resyllabification, where segment deletion counterbleeds allomorph insertion along with morphologically-specific segmental changes. A Strict CV representational reanalysis is proposed in which there is no true allomorphy (no selection between competing underlying morphemes). All the forms are generated from a single underlying form, thereby undercutting PRIORITY.


1987 ◽  
Vol 15 (1) ◽  
pp. 30-41 ◽  
Author(s):  
E. G. Markow

Abstract Development of the banded radial tire is discussed. A major contribution of this tire design is a reliable run-flat capability over distances exceeding 160 km (100 mi). Experimental tire designs and materials are considered; a brief theoretical discussion of the mechanics of operation is given based on initial two-dimensional studies and later on more complete finite element modeling. Results of laboratory tests for cornering, rolling resistance, and braking are presented. Low rolling resistance, good cornering and braking properties, and low tread wear rate along with good puncture resistance are among the advantages of the banded radial tire designs.


2020 ◽  
Vol 5 ◽  
pp. 94-106
Author(s):  
Y.M. Iskanderov ◽  
◽  
M.D. Pautov

Aim. The use of modern information technologies makes it possible to achieve a qualitatively new level of control in supply chains. In these conditions, ensuring information security is the most important task. The article shows the possibilities of applying the spatial concepts of the actor-network theory in the interests of forming a relevant intelligent information security management system for supply chains. Materials and methods. The article discusses a new approach based on the provisions of the actor-network theory, which makes it possible to form the structure of an intelligent information security control system for supply chains, consisting of three main functional blocks: technical, psychological and administrative. The incoming information security threats and the relevant system responses generated through the interaction of the system blocks were considered as enacting the three Law’s spaces: the space of regions, the space of networks and the space of fl uids. Results. It is shown that the stability of this system in the space of networks is a necessary condition for its successful functioning in the space of regions, and its resilience in the space of fl uids gained through the dynamic knowledge formation helps overcome the adverse effects of the fl uidity. The problems of the intentional / unintentional nature of information security threats, as well as the reactivity / proactivity of the corresponding responses of the intelligent information security management system for supply chains are investigated. Conclusions. The proposed approach showed the possibility of using such an interdisciplinary tool in the fi eld of information security as the concepts of the actor-network theory. The intelligent information security control system built on its basis ensures that almost all the features of solving information security problems in supply chains are taken into account.


Sign in / Sign up

Export Citation Format

Share Document