scholarly journals Threat perception in online anti-migrant speech: a Slovene case study

Author(s):  
Rok Chitrakar

The aim of this article is to describe the perception of refugees as a threat in Slovene online discourse, based on a critical analysis of commenters’ re­sponses to popular media posts at the height of the European migrant crisis. The proposition of the study is that the perception of migration as a threat is at the core of socially unacceptable discourse (SUD), portraying refugees and migrants as an undesirable and potentially dangerous presence. Within the framework of a comprehensive project examining public responses to media coverage of the arrival of migrants to Slovenia, online comments classified as SUD targeting refugees were extracted and annotated to reveal the recur­ring themes of threat perception. The analysis focused on describing the main categories of threat, as well as the various discursive features and strategies employed. Although the approach to observing this subject is essentially qual­itative, a general case-specific overview of the frequency and distribution of identifiable categories is also given.

1997 ◽  
Vol 60 (3) ◽  
pp. 38-57 ◽  
Author(s):  
William L. Benoit ◽  
Anne Czerwinski

Faced with a crisis, what can a business say? Crisis communication literature tends to focars on what to do before and after a crisis and on the kinds of crises corporations face. Less attention is given to the options available within mes sages about a crisis. The theory of image restoration provides a useful key to composing such messages. This article applies the theory to one case study in image repair discourse: USAir's response to media coverage of the crash of one of its aircraft in Pittsburgh in 1994. Introducing such case studies in the classroom helps students to understand the basic tenets of persausion in the highly charged context of repairing a corporate reputation after an attack.


2015 ◽  
Vol 23 (1) ◽  
pp. 42-53 ◽  
Author(s):  
Bobbi A. Knapp

Scholars have examined the ways in which gender is reproduced and resisted in various physical activities and their designated spaces such as aerobics (Markula, 2003), weight training (Dworkin, 2001), and fitness training (Ginsberg, 2000). CrossFit, a relatively new entrant on the fitness scene, has seen an increase in popularity and popular media coverage in the past few years. One of the core tenets of CrossFit is the belief that it is accessible to everyone through scaling. Using a critical feminist geographical approach, the purpose of this research was to examine the ways in which gender was reproduced and resisted in one CrossFit box. This ethnographic study incorporated participant observation, semistructured, in-depth interviews, and online archival work. The themes that emerged included sense of community, pushing through physical limits, coed workouts, beat by a girl, and spatial influence. The results indicate that even though there are ways in which gender norms are reinforced in this space there were also multiple ways in which ideal femininity and hegemonic masculinity were resisted.


2012 ◽  
Vol 6 (1-3) ◽  
pp. 309-329
Author(s):  
Claudia V. Camp

I propose that the notion of possession adds an important ideological nuance to the analyses of iconic books set forth by Martin Marty (1980) and, more recently, by James Watts (2006). Using the early second century BCE book of Sirach as a case study, I tease out some of the symbolic dynamics through which the Bible achieved iconic status in the first place, that is, the conditions in which significance was attached to its material, finite shape. For Ben Sira, this symbolism was deeply tied to his honor-shame ethos in which women posed a threat to the honor of his eternal name, a threat resolved through his possession of Torah figured as the Woman Wisdom. What my analysis suggests is that the conflicted perceptions of gender in Ben Sira’s text is fundamental to his appropriation of, and attempt to produce, authoritative religious literature, and thus essential for understanding his relationship to this emerging canon. Torah, conceived as female, was the core of this canon, but Ben Sira adds his own literary production to this female “body” (or feminized corpus, if you will), becoming the voice of both through the experience of perfect possession.


2021 ◽  
Vol 7 (1) ◽  
pp. 1927561
Author(s):  
Innocent Kutyauripo ◽  
Nyaradzo Prisca Mavodza ◽  
Christopher Tafara Gadzirayi

2020 ◽  
pp. 095792652097721
Author(s):  
Janaina Negreiros Persson

In this article, we explore how the discourses around gender are evolving at the core of Brazilian politics. Our focus lies on the discourses at the public hearing on the bill 3.492/19, which aimed at including “gender ideology” on the list of heinous crimes. We aim to identify the deputies’ linguistic representation of social actors as pertaining to in- and outgroups. In addition, the article analyzes through Critical Discourse Analysis how the terminology gender is represented in this particular hearing. The analysis shows how some of the conservative parliamentarians give a clearly negative meaning to the term gender, by labeling it “gender ideology” and additionally connecting it with heinous crimes. We propose that the re-signification of “gender ideology,” from rhetorical invention to heinous crime, is not only an attempt to undermine scientific gender studies but also a way for conservative deputies to gain more political power.


2021 ◽  
Vol 7 (12) ◽  
pp. eabc9800
Author(s):  
Ryan J. Gallagher ◽  
Jean-Gabriel Young ◽  
Brooke Foucault Welles

Core-periphery structure, the arrangement of a network into a dense core and sparse periphery, is a versatile descriptor of various social, biological, and technological networks. In practice, different core-periphery algorithms are often applied interchangeably despite the fact that they can yield inconsistent descriptions of core-periphery structure. For example, two of the most widely used algorithms, the k-cores decomposition and the classic two-block model of Borgatti and Everett, extract fundamentally different structures: The latter partitions a network into a binary hub-and-spoke layout, while the former divides it into a layered hierarchy. We introduce a core-periphery typology to clarify these differences, along with Bayesian stochastic block modeling techniques to classify networks in accordance with this typology. Empirically, we find a rich diversity of core-periphery structure among networks. Through a detailed case study, we demonstrate the importance of acknowledging this diversity and situating networks within the core-periphery typology when conducting domain-specific analyses.


Sign in / Sign up

Export Citation Format

Share Document