scholarly journals Internet Meme as a Unit of Communication in Modern Chinese

Author(s):  
Н. Шань

В настоящее время Интернет стал незаменимым средством коммуникации. С ростом популярности Интернета и быстрым увеличением количества пользователей создавались, развивались и распространялись с беспрецедентной скоростью также и онлайн-языки. Приводится описание и анализ популярной единицы интернет-коммуникации — интернет-мема. Выбраны преимущественно самые актуальные и популярные мемы китайской Сети. Предложен авторский перевод интернет-мемов 2021 года на русский язык. Обсуждается их влияние на современный китайский язык, а также предлагается диалектическое отношение к языку Интернета. At present, the Internet has become an indispensable means of communication. With the growth of its popularity and the number of users, online “languages” also began to develop and spread at an unprecedented tempo. The paper focuses on the description and analysis of internet memes as a recent but very popular unit of internet communication. The author has selected the most recent memes gaining popularity in China. The paper offers a tentative typology of internet memes in modern Chinese, explains their etymology and accounts for their popularity from the viewpoint of their form and social message. The author discusses the advantages and disadvantages of memes in terms of their influence on the Chinese language and suggests a dialectic treatment of this phenomenon.

2003 ◽  
Vol 1 (1) ◽  
pp. 487-490
Author(s):  
Robert Więckowski

In the paper, it is discussed the communicative role of the Internet in the view of Mounier’s conception of personal communication. E. Mounier distinguishes two aspects of human communication: objective and subjective. The first one is reduced to the function of giving information, the second one . is specific for a man as a person. It is presented the most essential features of subjective, existential communication, that after all requires an understanding of other people. This attitude, according to Mounier, is not possible without opening to transcendence. In the view, the Internet is regarded as an objective tool of communication. It is briefly discussed the main ways of using the Internet in keeping up human relationships, the specific features of the tool, its advantages and disadvantages for personal contact. Finally, the development of the Internet is understood as a symptom of the need of passing on thoughts, considerations, and love to others as a human special privilege.


2020 ◽  
Vol 6 (3) ◽  
pp. 172-182
Author(s):  
Saodat Nosirova ◽  

The article is devoted to a comparative analysis of the socio -political terminology of the modern Chinese language.The purpose of the article is to search for an integrated approach to the study of the cognitive side of social and political terms of the Chinese language from the point of view of law enforcement in the process of translating official materials from Chinese into Uzbek and / or Russian and vice versa


2018 ◽  
Vol 3 (1) ◽  
pp. 22-32 ◽  
Author(s):  
Ernest Ezema ◽  
Azizol Abdullah ◽  
Nor Fazlida Binti Mohd

The concept of the Internet of Things (IoT) has evolved over time. The introduction of the Internet of Things and Services into the manufacturing environment has ushered in a fourth industrial revolution: Industry 4.0. It is no doubt that the world is undergoing constant transformations that somehow change the trajectory and history of humanity. We can illustrate this with the first and second industrial revolutions and the information revolution. IoT is a paradigm based on the internet that comprises many interconnected technologies like RFID (Radio Frequency Identification) and WSAN (Wireless Sensor and Actor Networks) to exchange information. The current needs for better control, monitoring and management in many areas, and the ongoing research in this field, have originated the appearance and creation of multiple systems like smart-home, smart-city and smart-grid. The IoT services can have centralized or distributed architecture. The centralized approach provides is where central entities acquire, process, and provide information while the distributed architectures, is where entities at the edge of the network exchange information and collaborate with each other in a dynamic way. To understand the two approaches, it is necessary to know its advantages and disadvantages especially in terms of security and privacy issues. This paper shows that the distributed approach has various challenges that need to be solved. But also, various interesting properties and strengths. In this paper we present the main research challenges and the existing solutions in the field of IoT security, identifying open issues, the industrial revolution and suggesting some hints for future research.


2021 ◽  
Vol 29 (Supplement_1) ◽  
pp. i1-i1
Author(s):  
P Donyai ◽  
N Patel ◽  
H Almomani

Abstract Introduction The internet provides a platform for both legal and illegal online suppliers of medicines, which are sometimes difficult to distinguish between. Therefore, consumers accessing the internet are at risk of purchasing fake medicines from illegal suppliers. This is particularly problematic when people buy Prescription-Only Medicines (POMs) from the internet, despite an abundance of governmental campaigns 1. This under-researched issue has nonetheless been highlighted in news articles in the past few years which are a potential source of information, albeit informally, about how and why people end up buying fake medicines via the internet. This study is phase-1 of a larger study that aims to develop a questionnaire using the Theory of Planned Behaviour (TPB)2 to examine risky online purchasing of medicines to help focus future campaigns. Aim The aim is to identify the factors that lead people to inadvertently buy fake POMs online by examining newspaper articles covering this topic and categorising the findings according to the TPB’s indirect measures; namely, behavioural beliefs, normative beliefs, and control beliefs. Methods Newspaper articles were collected from the electronic database “ProQuest” using a series of search words for retrieving newspaper articles covering the purchasing of fake medicines online throughout the world. The search was limited to articles published from April-2019 to March-2020 to retrieve relevant articles in this fast-developing field. Articles that did not focus on POMs or only covered the supply side (e.g. efforts to combat illegal suppliers) were excluded. After evaluating each article using the inclusion/exclusion criteria, 52 articles remained. Thematic analysis was employed to analyse the newspaper articles against the TPB. The NVivo software program (version 12) was used to aid the generation of the themes. Results Using thematic analysis, 12 themes were generated and categorised according to the TPB’s indirect measures as follows. The behavioural beliefs (i.e. advantages and disadvantages of buying medicines online) included a perception of convenience, low price, privacy of the purchase, potential harmful effect, low quality, and lack of medical oversight. The normative beliefs (i.e. social factors influencing decisions to buy medicines online) included endorsement by influencers, deceptive marketing by suppliers, as well as organizations fighting the fake supply chain. The control beliefs (i.e. what encourages or stops purchasing medicines online) included encountering medicines shortages, outbreak of pandemic diseases, and accessibility issues. Conclusion This newspaper-analysis study created an initial map of ideas for why consumers might inadvertently buy fake POMs online highlighting the complexity of personal beliefs as well as a range of external circumstances. Further exploring these factors provides the basis for future campaigns for changing/controlling the purchasing of fake medicines online. Although the newspaper articles offer a wide range of data and provide different points of view, the validity of their content cannot be proven and are taken at face value. Therefore, the next step for this study is to complete semi-structured interviews with consumers purchasing medicines online (Phase-2) to verify the themes generated in Phase-1 before developing a larger questionnaire study (Phase-3). References 1. HM Government. Protect your health when buying medicines online. Accessed 08 October 2020 from: https://fakemeds.campaign.gov.uk/ 2. Ajzen, I. The theory of planned behaviour. Organizational behaviour and human decision processes. 1991; 50 (2),179–211.


Author(s):  
Sorina Mihaela Bălan

One of the most wonderful inventions is the internet. Analyzing the advantages and disadvantages of this fantastic world, we believe that we must turn our attention to the sexual implications of cyberbullying. In introduction can find the specific terminology, like: cyberbullying, harassment, cyberstalking, denigration, outing and trickery and sexting. Next part present same research in the topics, same case study from specific literature. How can manage the security and online reputation? – the answers can guided the rider. Education in prevention of Sexting and cyberbullying indicate also advices for parents, made reference at parental control recommendations and ten specific messages to share with adolescents in formal or informal. In this moment we can say that is difficult to managing the security and online reputation in sexting and cyberbullying but is a major provocation.


2008 ◽  
Vol 2 (2) ◽  
Author(s):  
Alan Sondheim

The Internet Text is an extended analysis of the environment of Internet communication, an extended meditation on the psychology and philosophy of Net exchange. As such, it is concerned primarily with virtual or electronic subjectivity – the simultaneous presence and absence of the user, the sorts of libidinal projections that result, the nature of flamewars, and the ontological or epistemological issues that underlie these processes. Internet Text begins with a brief, almost corrosive, account of the subject – an account based on the concepts of Address, Protocol, and Recognition. This section “reduces” virtual subjectivity to packets of information, Internet sputterings, and an ontology of the self based on Otherness – your recognition of me is responsible for my Net-presence. The reduction then begins to break down through a series of further texts detailing the nature of this presence; a nature which is both sexualized/gendered, and absenting, the result of an imaginary site. Eventually, it has become clear that everything revolves around issues of the virtual subject, who is only virtual on the Net, but who has a very real body elsewhere. So Internet Text has evolved more and more in a meditation on this subject – a subject which will perhaps be one of the dominant modes of being within the next millennium. Finally, it should be noted that there are no conclusions to be drawn in Internet Text, no series of protocol statements or declarations creating any sort of ultimate defining or explanatory position. The entire history of philosophy mitigates against this; instead, I side with the Schlegels, with Nietzsche, Bataille, Jabes, and others, for whom the fragment is crucial to an understanding of contemporary life... It is dedicated to Michael Current and Clara Hielo.


Author(s):  
N.I. Pushina ◽  
N.I. Leonov ◽  
N.V. Makhankova ◽  
E.A. Shirokikh

This article aims to identify the causes of conflicts in communication upsetting the balance of interethnic relations, mutual understanding, interaction between representatives of different countries and peoples and to develop mechanisms for overcoming them in the discourse of political Internet, which occupies a special place in the Internet communication and enables politicians having access to the Internet to speak to the public. The article presents a typology of communicative failures, identifies what makes a communication conflict (situational factors, contextual factors; productive and receptive factors; ritualization of live speech communication, violation of ethical norms, leveling pragmatic speech characteristics, incorrect linear speech organization; reticence; shifting from one topic to another, etc.). Theoretical and methodological bases of the research are ontological and anthropocentric approaches: a person is recognized as a "measure of all things", he perceives the world through self-awareness in this world, and language, as a means of communication, acts as the main constitutive characteristics of thinking, speaking, and creating the reality person.


Connectivity ◽  
2020 ◽  
Vol 148 (6) ◽  
Author(s):  
S. A. Zhezhkun ◽  
◽  
L. B. Veksler ◽  
S. M. Brezitsʹkyy ◽  
B. O. Tarasyuk

This article focuses on the analysis of promising technologies for long-range traffic transmission for the implementation of the Internet of Things. The result of the review of technical features of technologies, their advantages and disadvantages is given. A comparative analysis was performed. An analysis is made that in the future heterogeneous structures based on the integration of many used radio technologies will play a crucial role in the implementation of fifth generation networks and systems. The Internet of Things (IoT) is heavily affecting our daily lives in many domains, ranging from tiny wearable devices to large industrial systems. Consequently, a wide variety of IoT applications have been developed and deployed using different IoT frameworks. An IoT framework is a set of guiding rules, protocols, and standards which simplify the implementation of IoT applications. The success of these applications mainly depends on the ecosystem characteristics of the IoT framework, with the emphasis on the security mechanisms employed in it, where issues related to security and privacy are pivotal. In this paper, we survey the security of the main IoT frameworks, a total of 8 frameworks are considered. For each framework, we clarify the proposed architecture, the essentials of developing third-party smart apps, the compatible hardware, and the security features. Comparing security architectures shows that the same standards used for securing communications, whereas different methodologies followed for providing other security properties.


Sign in / Sign up

Export Citation Format

Share Document