scholarly journals Sui requisiti di una buona comunicazione nel libro di Kamila Miłkowska-Samul (S)cortesia e social network. Opportunità e rischi del dibattito pubblico su Facebook

2021 ◽  
Vol 21 (1) ◽  
pp. 83-87
Author(s):  
Magdalena Bartkowiak-Lerch

On the requirements of good communication in the book by Kamila Miłkowska-Samul (S)cortesia e social network. Opportunità e rischi del dibattito pubblico su Facebook The article aims to discuss the latest book by Kamila Miłkowska-Samul, entitled (S)cortesia e social network. Opportunità e rischi del dibattito pubblico su Facebook, published in 2019. It is the second time that the author takes up the subject of the language of Italian politics, this time in a pragmalinguistic and communicative perspective. The interpretation key to which the analysis of numerous examples of politicians’ statements on Facebook was subordinated is the theory of politeness (or impoliteness). The reader will also find an in-depth study of individual theoretical component issues: concerning the language of the Internet, politics, and the already mentioned theory of politeness and related sociopragmalinguistic issues.

Author(s):  
S. Fatemeh Mostafavi Shirazi

This chapter presents the subject area of the Internet as an international form of media and examines related issues. It begins by considering the Internet as a source of information in various forms of social network sites that enables any individual to post their experiences, opinions and evaluations of tourism destination. This provides a summary of the existing state of knowledge concerning to social network sites and word of mouth (WMO) recommendation. In addition, it serves to clarify the associated word of mouth and market share development.


2020 ◽  
Vol 15 (3) ◽  
pp. 32-38
Author(s):  
Natalya Yu. Akinina ◽  
Daria N. Glushenko

The subject of the research is the reasons for the commission of unlawful acts provided for by Art. 110.1 of the Criminal Code of the Russian Federation committed on the Internet in relation to minors, as well as the existing system for the prevention of these illegal acts. The aim of the study is to develop proposals for improving the specified mechanism for preventing illegal acts. As a result of the study, it was concluded that the prevention of unlawful acts under Art. 110.1 of the Criminal Code of the Russian Federation committed on the Internet in relation to minors, should include the following components: detection and suppression of suicidal content; identifying individuals who are members of social network groups and taking part in games, and carefully withdrawing them from such communities; prevention of suicidal behavior with individuals who have committed suicide attempts and with their immediate surroundings. In addition, early prevention of minors and their parents of dangerous behavior on the Internet is of great importance.


2018 ◽  
Author(s):  
Tsair-Wei Chien ◽  
Hsien-Yi Wang ◽  
Yang Shao ◽  
Willy Chou

BACKGROUND Researchers often spend a great deal of time and effort retrieving related journals for their studies and submissions. Authors often designate one article and then retrieve other articles that are related to the given one using PubMed’s service for finding cited-by or similar articles. However, to date, none present the association between cited-by and similar journals related to a given journal. Authors need one effective and efficient way to find related journals on the topic of mobile health research. OBJECTIVE This study aims (1) to show the related journals for a given journal by both cited-by and similarity criteria; (2) to present the association between cited-by and similarity journals related to a given journal; (3) to inspect the patterns of network density indices among clusters classified by social network analysis (SNA); (4) to investigate the feature of Kendall's coefficient(W) of concordance. METHODS We obtained 676 abstracts since 2013 from Medline based on the keywords of ("JMIR mHealth and uHealth"[Journal]) on June 30, 2018, and plotted the clusters of related journals on Google Maps by using MS Excel modules. The features of network density indices were examined. The Kendall coefficient (W) was used to assess the concordance of clusters across indices. RESULTS This study found that (1) the journals related to JMIR mHealth and uHealth are easily presented on dashboards; (2) a mild association(=0.14) exists between cited-by and similar journals related to JMIR mHealth and uHealth; (3) the median Impact Factor were 3.37 and 2.183 based on the representatives of top ten clusters grouped by the cited-by and similar journals, respectively; (4) all Kendall’s coefficients(i.e., 0.82, 0.89, 0.92, and 0.75) for the four sets of density centrality have a statistically significant concordance (p < 0.05). CONCLUSIONS SNA provides deep insight into the relationships of related journals to a given journal. The results of this research can provide readers with a knowledge and concept diagram to use with future submissions to a given journal in the subject category of Mobile Health Research. CLINICALTRIAL Not available


2013 ◽  
Vol 38 (02) ◽  
pp. 364-402 ◽  
Author(s):  
Michelle Oberman

Laws governing adolescent sexuality are incoherent and chaotically enforced, and legal scholarship on the subject neither addresses nor remedies adolescents’ vulnerability in sexual encounters. To posit a meaningful relationship between the criminal law and adolescent sexual encounters, one must examine what we know about adolescent sexuality from both the academic literature and the adults who control the criminal justice response to such interactions. This article presents an in-depth study of In re John Z., a 2003 rape prosecution involving two seventeen-year-olds. Using this case, I explore the implications of the prosecution by interviewing a variety of experts and analyzing the contemporary literature on sexual norms among youth. I also relate a series of interviews conducted with the major players in the prosecution. Examining this case from a variety of perspectives permits a deeper understanding of how the law regulates adolescent sexual encounters and why it fails.


Author(s):  
Ferri Susanto

The students' reading comprehension is very lowat the pandemic era, Theyare difficult to understand  the text, they don’t haveEnough English vocabulary, Many teachers/lecturer used  techniques that wereless precise in teaching reading, and the students got reading comprehension scores below the minimum completion criteria (KKM). This research aims to determine whether using Reading, Encoding, Annotating, and Pondering techhnique as Learning process in pandemic era to improve reading comprehension stability for students.This research is conducted by using descriptive qualitative method, which describe of students’s problem at pandemic era by zoom in the Internet after that, analyze the data which used percentage.The researcher also has done pre-assesment for supporting accurate data.The subjects of this research were 20 students, consisted 11 females and 9 males. The subject Instrument used in this research is reading comprehension test, researcher observation cheklits and field notes, student observation Cheklist and field notes, interview and documentation by zoom at the Internet. According to avarage results, the increasing for  students' reading comprehension ability on the pre-assessment  is the average student reaches, (55.14%), learning 1  (62.15%), learning 2  (70.14%), and learning 3 (75.65%)  avarage students’ score increase and got standardization of school. Based on the result in each levels which  there is  indeed REAP technique could increasing students’ reading comprehension text.


Author(s):  
Violetta Gaputina

This article addresses the issues of organizing the communicative space of modern media. The main focus is on considering the names of podcasts - audio blogs on the Internet - in terms of the various language techniques used in them. The material for the study was podcasts operating on the platforms of the Internet site YouTube and the social network Vkontakte in Russia. 9 groups of podcast titles were identified by the type of reception underlying each name. It has been established that the corpus of titles in the podcasting industry is characterized by a wide variety. Among them, original names predominate, built on the basis of a language game, precedent texts, borrowings from other languages, stylistically marked words or implicit meaning, metaphorical, symbolic, ironic component embedded in them, which work on the implementation of a contact-establishing strategy for subsequent communication between mediators and the audience listeners.


2008 ◽  
Vol 67 (1) ◽  
pp. 69-91 ◽  
Author(s):  
Arthur Chaskalson

There are two themes that recur in previous Sir David Williams lectures. First, that it is a considerable honour to be invited to give the lecture. Secondly, that it is a daunting task to do so in the presence of Sir David, particularly in a field in which he has expertise. Since that covers most of the law there is no escape from this dilemma. Let me then acknowledge the privilege of having been asked to give this year's lecture, and confess that it is with some trepidation that I do so. The subject, terrorism and human rights, is not exactly uncharted territory. When I looked into the internet for some guidance on what might be relevant to terrorism and human rights, the response to my Google search informed me that in .03 seconds 32,900,000 references had been found. This seemed to indicate that it was unlikely that I would be able to say anything that has not already been said. But there are some subjects that are of such importance that there is value in reminding ourselves of the issues that are at stake, and if necessary for that purpose, repeating what others have said. And it is with that in mind that I approach my chosen topic.


2008 ◽  
Vol 2 (2) ◽  
Author(s):  
Alan Sondheim

The Internet Text is an extended analysis of the environment of Internet communication, an extended meditation on the psychology and philosophy of Net exchange. As such, it is concerned primarily with virtual or electronic subjectivity – the simultaneous presence and absence of the user, the sorts of libidinal projections that result, the nature of flamewars, and the ontological or epistemological issues that underlie these processes. Internet Text begins with a brief, almost corrosive, account of the subject – an account based on the concepts of Address, Protocol, and Recognition. This section “reduces” virtual subjectivity to packets of information, Internet sputterings, and an ontology of the self based on Otherness – your recognition of me is responsible for my Net-presence. The reduction then begins to break down through a series of further texts detailing the nature of this presence; a nature which is both sexualized/gendered, and absenting, the result of an imaginary site. Eventually, it has become clear that everything revolves around issues of the virtual subject, who is only virtual on the Net, but who has a very real body elsewhere. So Internet Text has evolved more and more in a meditation on this subject – a subject which will perhaps be one of the dominant modes of being within the next millennium. Finally, it should be noted that there are no conclusions to be drawn in Internet Text, no series of protocol statements or declarations creating any sort of ultimate defining or explanatory position. The entire history of philosophy mitigates against this; instead, I side with the Schlegels, with Nietzsche, Bataille, Jabes, and others, for whom the fragment is crucial to an understanding of contemporary life... It is dedicated to Michael Current and Clara Hielo.


2018 ◽  
Vol 12 (4) ◽  
pp. 69 ◽  
Author(s):  
Osama Rababah ◽  
Bassam Alqudah

The revolution in information technology and the use of the internet changed the lifestyle of people. A major change was in the way of shopping. Companies started to offer their products online using social network s and people started to buy from the internet. Using social network has many benefits to the users starting from exploring a large variety of products to the very first way of ordering and the availability of the products 24 hours a day. One of the main problems that is found in using a social network is trusting the using social network social network s. the student concern about trusting to buy from the using social network social network s. Trust is a major concern for the merchant too; his concern is how to gain the student trust and to keep it. Many factors play a major role in acquiring the student trust in the online market. These factors rely on the social network characteristics such as design, interactivity and age and other factors vary from the social network quality, service quality, security policy of the social network, the privacy policy, the guarantee offered, the satisfaction of the user, the ease of use, the risk aversion and the culture factors. This study introduces the trusting affecting factors mentioned above and their effect on the trustworthiness factors (ability, benevolence, and integrity) a trust model has been built to show the relation between these factors and the trustworthiness factors.


Sign in / Sign up

Export Citation Format

Share Document