scholarly journals Researching Internet Nicknames: On the Methodology of Material Selection (Based on German-Language Internet Communication)

2020 ◽  
Vol 17 (1) ◽  
pp. 223-235
Author(s):  
Viktoria V. Kaziaba ◽  

The paper aims to explore the Internet nickname as a main anthroponymic unit of Internet communication, an integral part of a virtual personality, and an outcome of complex psycholinguistic processes of self-naming. An overview of key studies of this phenomenon leads the author to conclude that it still lacks proper theoretical grounding, which is largely due to its specific properties that impede research. The article focuses on the issues that arise at the stage of material selection. The main points for discussion were suggested both by the analysis of existing research on the topic, as well as empirical data collected during almost ten years of anthroponymic studies of German-language virtual communication. The first issue relates to the necessity of using external sources (users’ personal data, their social media imprint) for reliable analysis and interpretation of nicknames. Thereby, the paper argues the relevance of content and discourse analysis for studying virtual personality, as well as interviewing the users to obtain a comprehensive research file. Since random sampling remains the key method for selecting factual material, the question persists about the sufficient amount of the data. The article highlights the solutions proposed by different researchers and gives sociolinguistic groundings to the minimal number of data that ensures a representative sample of aliases. Finally, the question of the choice of sources is raised. The author concludes that an unconditional trend in anthroponymic research of nicknames is the study of units within one specific Internet service.

Author(s):  
Anna Berenika Siwirska

The article is devoted to the functioning of the Belarusian language in Internet communication. The author presents the results of her own research, in which she is interested in what language the Internet users write public and private messages, read news from the world or look for information. The author presents the linguistic situation on the Belarusian Internet and the functioning of the Belarusian language in various spheres of communication: in the mass media, social media, commentaries under press articles, websites of state institutions and private enterprises. Consequently, the real position and role of the Belarusian language in virtual communication is presented in the paper.


2021 ◽  
Vol 70 (7) ◽  
pp. 12-18
Author(s):  
Т.В. Аникина ◽  
О.Ф. Родин

Communication in the Internet is an important characteristic of modern culture. The Internet has a significant impact on the vocabulary development. Due to this process new words known as neologisms appear in the Internet communication. Neologisms penetrate actively into any language, as such words react quicklier to all changes in the society life and in the language. The given article deals with the derivational models of German-language neologisms. The study showed that the main ways to form German neologisms are affixation, compounding, abbreviation, borrowing, blends and semantic derivation


Temida ◽  
2011 ◽  
Vol 14 (3) ◽  
pp. 23-36
Author(s):  
Rajko Macura ◽  
Slavoljub Vujovic ◽  
Djuro Mikic

The emergence and spread of Internet communication has led to changes in social relationships, abuse of the Internet and maladaptive behavior. Among the authors who have studied the impact of these changes there is no consensus, and the results of their research are often contradictory. Some authors conclude that Internet communication strengthens networks of its users, while others believe that such communication leads to reduced participation in real social life. In a number of people, excessive use of the Internet adversely affects the mental health and social life and can lead to obsession at the expense of other aspects of life and creating addiction. The greatest risk of negative impacts of online communication is among children and young people. This paper is meant to indicate, the good sides as well as the negative consequences of excessive and non-functional Internet use


2016 ◽  
Vol 2 (2) ◽  
pp. 214-225
Author(s):  
Pas Mahyu Akhirianto ◽  
Anita B. Wandanaya ◽  
Opan Mustopah

In the development of technology that is so advanced today, especially in the field of communication and information, maintaining privacy is something that absolutely must be done for each individual. Rapoport (in Soesilo, 1998) defines privacy as an ability to control the interaction, the ability to acquire options and the ability to achieve the desired interaction. Nowadays, a lot of things that can be done by using the internet, such as selling, social interacting through social media (Social Media) such as Facebook, learn, or just read the news through the portal of electronic media, and so forth. Most of the activities that can be done on the internet, requires personal data of its users, where the issue of privacy is of onsiderableconcern. As the development of information and communication technology in this case the Internet, the technology used to protect all personal data users also grown and will continue to evolve into more sophisticated. For this reason the author took the initiative to create a Endesapp application program, which aims to facilitate a person or agency who frequently exchange data in the form of files through the Internet. With so security in maintaining personal data even be increased as well as the possibility of the spread of sensitive data has been poor. In this study, the method used is to design programs shaped application file encryption and decryption web-based cryptographic techniques to the type of algorithm that is supported is 3DES ( Triple DES ) , AES - 128 ( Advanced encyption Standard) , AES - 192 and AES - 256.


Author(s):  
Godwin Busuttil ◽  
Felicity McMahon ◽  
Gervase de Wilde

The ascendancy of social media poses acute challenges for privacy. While Facebook, Twitter, YouTube, LinkedIn, and other similar services can confer major advantages on users in terms of access to information, ease of communication, and opportunities for network-building, the ordinary concomitant is a significant surrender of personal privacy. This is because participation generally entails the disclosure of, and the ceding of control over, one’s personal data. In order to join the community and enjoy the benefits of membership, a person must establish at a minimum an online contact point and identity (eg in the form of a Facebook account or Twitter profile), typically by transferring some version of his or her actual, real-world, identity to the internet. Many, of course, go much further than this, sharing online—arguably ‘oversharing’—any manner of private information concerning themselves, often with complete strangers. In most cases to do so will prove harmless, but from time to time individuals may make themselves a target.


2018 ◽  
Vol 2 (1) ◽  
Author(s):  
Damilola Adegoke

Governments across the globe seek opportunities at regular intervals to exercise state-power and control over aspects of society. This is not limited to dictatorships and centralized party states alone; the beginning of the internet age saw the conflicts over who has rights over the control of the internets. A typical example is the case between the French governments and Yahoo over the former’s request for Yahoo to ban Nazi’s memorabilia merchant sites from French cyberspace. The judicial decision favours the position of the French government thereby setting precedence for internet governance.[1]It is one of the defining moments for the status of internet governance and cyber territoriality. Who has a right over the internet? Should states law be allowed to determine behaviours online? Who is to exercise juridical power in case of infractions? These questions have been addressed at different for a with the odds favouring states for obvious reasons; part of which include the fact that infrastructure for the transmission and distribution of internet access are domiciled in states and these provide opportunities for governments to wield their power against Internet Service Providers who might want to exercise independent agencies. Countries in the Horn of Africa are text-book cases of government seeking absolute censorship of citizens’ communication thereby infringing upon the rights of freedom of expression. This practice of leadership section discusses social media gagging and participatory democracy in the Horn of Africa.   [1]Jack Goldsmith  and Tim Wu, Who controls the Internet?: Illusions of a Borderless World(New York: Oxford University Press, 2008), 3-6.


Author(s):  
T.P. Popovych

The article is devoted to the analysis of theoretical and legal aspects of the human right to the protection of personal data on the Internet. The author believes that at the present stage the field of personal data protection on the Internet is becoming especially important, linking it with the universal importance of communication that occurs within the Internet, as well as the threat of unauthorized dissemination of information through it. The right to the protection of personal data is considered as one of the forms of realization of the human right to the respect for his private, family life, in the context of his inviolability on the Internet. Scientific intelligence begins with a review of information protection models that have emerged in the world. Yes, we are talking about the American, European and mixed models. However, the article provides an overview of the acts adopted by the relevant European institutions in this area. In addition, the article examines the experience of some foreign countries in ensuring the human right to the protection of personal data on the Internet, in particular Brazil, France and the Republic of Belarus. The author notes that the protection of personal data involves a number of positive and negative obligations of the state and individuals. Negative obligations are aimed at prohibiting the processing of personal data without the consent of the person to whom the specific information relates. The positive obligations of public organizations and individuals (organizations) are to comply with the established legal regime of personal data processing, including the use of appropriate technical means. That is, the author emphasizes that the legal obligations in the context of ensuring the right to protection of personal data on the Internet are imposed not only on the state, but also on Internet service providers, owners of online services and websites, etc., given the possibility that they have access to personal information.


Author(s):  
Э. Акаева ◽  
E. Akaeva ◽  
Т. Винокурова ◽  
T. Vinokurova

Modern blogs are means of public influence. The authors analyze communicative strategies, stylistic and lexical means used by Deborrah Blum, journalist and blogger involved in environmental issues discussion. The range of means under consideration is wide due to extreme topical significance. Ecological problems are challenge of modern society and blog’s author attracts contemporaries attention to them. Discourse analysis and content analysis are dominant research methods. The author of the blog, having an expert status uses such communicative strategies as regulative, metacommunicative, informative and modal-evaluative. Informative and influential potential of blogs is caused both by topical acuteness and virtual communication participants feedback, their joint and collective authorship. Blog discourse emphasizes topical social issues. Contemporary blog is of both informative and evaluative character. Virtual communication depicts cognitive and mental patterns of the Internet communication typical participants in information epoch.


ADALAH ◽  
2019 ◽  
Vol 3 (1) ◽  
Author(s):  
Siti Ngainnur Rohmah

AbstractInformation and communication technology is developing very rapidly. The community is directed to use communication channels that are personal, effective and efficient. This condition leads to the allure of communication via the internet. The allure of internet communication is because the internet frees information and users to move without restrictions. Ignorance of internet users to access news from healthy sources, and spontaneity to share news without checking and rechecking, resulting in hoaks easily spread in the community.Keyword: Hoaks, Internet, Social Media AbstrakTeknologi informasi dan komunikasi berkembang sangat pesat. Masyarakat terarah untuk menggunakan saluran komunikasi yang bersifat pribadi, efektif dan efisien. Kondisi ini mengarah kepada daya pikat komunikasi melalui internet. Daya pikat komunikasi internet disebabkan karena internet membebaskan informasi dan penggunanya untuk bergerak tanpa batasan. Ketidaktahuan pengguna internet untuk mengakses berita dari sumber yang sehat, dan spontanitas berbagi berita tanpa check dan recheck, mengakibatkan hoaks mudah tersebar dalam masyarakat.Keyword: Hoaks, Internet, Media Sosial


ESOTERIK ◽  
2021 ◽  
Vol 7 (1) ◽  
pp. 78
Author(s):  
Syariful Anam ◽  
Royanullah Royanullah ◽  
Thiyas Tono Taufiq

<p class="06IsiAbstrak">Since the beginning of the industrial 4.0 and digital era, the internet has become one of the tools that cannot be responded to by the community, so that in everyday life all activities on the internet. With the presence of the internet, virtual spaces are able to provide virtual communication spaces, one of which is through social media. The social media most used by Indonesians are Youtube, WhatsApp, and Instagram. Of the three platforms, the most popular among the public is Instagram, especially Instagram, which is an effective means of preaching in the digital era. The reason the researchers chose this research, <em>first,</em> from Islamic content, Sufi content becomes content that attracts attention. <em>Second,</em> Sufi expressions are constructed in people's daily experiences. Observations were made by the author using a hashtag (#sufiindonesia) through Instagram using a qualitative approach with a virtual ethnographic method. The results showed that <em>first,</em> the expressions that appear in Sufi practice cannot be separated from the clarity of the day and inner sincerity; <em>second,</em> Sufi expressions include the values <em>of raghabah, ri'ayah, inbisath, wira’i,</em> and <em>mahabbah</em>; <em>third,</em> the expression of sufism in this era often shifts traditional Sufi behavior that describes urban communities from surfing in cyberspace.</p>


Sign in / Sign up

Export Citation Format

Share Document