How social media supports hashtag activism through multivocality: A case study of #ILookLikeanEngineer

Author(s):  
Aqdas Malik ◽  
Aditya Johri ◽  
Rajat Handa ◽  
Habib Karbasian ◽  
Hemant Purohit

Although research on different hashtag activism campaigns abounds, no study has looked at how different affordances of social media support a single campaign. We use data from a hashtag activism campaign, #ILookLikeAnEngineer, launched to showcase diversity within engineering workforce, to examine how different elements of a campaign blend together. We specifically identify three distinct but interconnected ways in which social media supports activism: 1) modality — it allows users to participate through text, photos, and links; 2) messaging — it allows users to post and support multiple though related topics; and 3) actors — it provides a voice to different participants (individuals/organizations, men/women). Our analysis supports the idea that multivocality — the core idea that people leverage multiple ways of participating — is the key to campaign success. Our analysis of 19,492 original tweets and 89,650 retweets shows that multivocality allowed the campaign to receive support not just from individuals but from large corporations, media, and NGOs, who were able to share their perspective using their preferred modality giving rise to a new form of digital polyphonic narrative that supports their agenda.

2020 ◽  
Author(s):  
Ben Little ◽  
Alison Winch

Our case study looks at the events surrounding the sacking ofGoogle engineer James Damore who was fired for authoring a memo which stated that women are biologically less suited to high-stress, high-status technical employment than men. Damore, asserting that his document ‘was absolutely consistent with what he’d seen online’, instantly became an ambivalent hero of the alt-right. Like the men who own and run the companies of Silicon Valley, the software engineer subscribes to the idea that the world can be understood and altered through the rigorous application of the scientific method. And as he draws on bodies of knowledge from evolutionary psychology and mathematical biology, we see how the core belief structures of Silicon Valley, when transferred from the technical to the cultural and social domain, can reproduce the sort of misogynistic ‘rationalism’ that fuels the alt-right. We argue that Damore’s memo is in line with Google’s ideology of ‘dataism’: that is the belief that the world can be reduced to decontextualised information and subject to quantifiable logics.Through its use of dataism, the memo reveals much about the similarities and continuities between Damore, the ideas laid out n his memo, and Google itself. Rather than being in opposition, these two entities are jostling for a place in the patriarchal structures of a new form of capitalism.


Author(s):  
Poul Houman Andersen

In order to capture market dividends and stay at par with the competition in the knowledge-based economy, firms must constantly develop their skill profile. There is considerable scope for learning through interfirm learning processes. However, the uncertain and costly nature of this process hampers exchange of knowledge in interfirm networks. This opens up for a new form of intermediary specialised in the absorption, generation, and dissemination of knowledge: the knowledge processor. This contribution addresses the core strategic issues faced by this type of firm, and illustrates the process through a case study of a knowledge processor.


2021 ◽  
pp. 186810262198971
Author(s):  
Jackson Paul Neagli

This article explores a facet of the Chinese propaganda apparatus that has yet to receive sufficient academic attention: the murky ecosystem of “semi-official” party-state presences on Chinese social media. With a particular focus on WeChat public accounts, this investigation responds to two critical research questions: first, what differentiates official party-state social media presences from semi-official presences, and second, what unique role do semi-official WeChat accounts play in the contemporary Chinese propaganda apparatus? This article samples content published by five dyads of official and semi-official WeChat public accounts during the first fifteen days of June 2019. The results of this comparative, case-study-based discourse analysis support two conclusions. First, semi-official WeChat accounts posture as independent from the party-state in order to attract large followings and gain credibility. Second, semi-official WeChat public accounts operate as “astroturfed influencers,” enabling the Chinese propaganda apparatus to covertly manipulate online discourse with extraordinary efficiency.


2019 ◽  
Vol 11 (1) ◽  
pp. 24-29
Author(s):  
Matilda Dorotic

AbstractThough some managers question the success of loyalty programs (LPs), the core idea of leveraging information gained through loyalty initiatives remains stronger than ever. But as LP membership penetration reaches all-time highs, customers demand more value from LPs. LP managers should leverage opportunities that mobile devices offer in increasing the convenience and communication with LP members. The integration of LPs with digital payment systems like mobile wallets seems particularly promising. Another way to become more attractive is by forming partnerships with other companies at which customers can collect and/or redeem points. Such partnership LPs hold appeal for retailers, particularly if potential partners might benefit from synergies. In the future of linked data, companies further need to be more flexible in terms of the types of customer engagements that will be rewarded. Many companies already move towards rewarding not only on past transactions, but also activities on social media. In the digital age, customers still enjoy some form of loyalty rewarding and expect retailers to acknowledge their purchases as investments in relationships.


2011 ◽  
pp. 1034-1043
Author(s):  
Eric Too ◽  
Martin Betts ◽  
Arun Kumar

Building for a sustainable environment requires sustainable infrastructure assets. Infrastructure capacity management is the process of ensuring optimal provision of such infrastructure assets. Effectiveness in this process will enable the infrastructure asset owners and its stakeholders to receive full value on their investment. Business research has shown that an organisation can only achieve business value when it has the right capabilities. This paradigm can also be applied to infrastructure capacity management. With limited access to resources, the challenge for infrastructure organisations is to identify and develop core capabilities to enable infrastructure capacity management. This chapter explores the concept of capability and identifies the core capability needed in infrastructure capacity management. Through a case study of the Port of Brisbane, this chapter shows that infrastructure organisations must develop their intelligence gathering capability to effectively manage the capacity of their infrastructure assets.


Prologia ◽  
2021 ◽  
Vol 5 (1) ◽  
pp. 52
Author(s):  
Jonathan Pramanta Susilo ◽  
Yugih Setyanto

Auction activities can be considered as a new form of marketing communication. Auction is an online shopping activity where the price is determined by the buyer within the duration that has been determined by the seller and the buyer is entitled to get the item based on the highest offered price. This study discusses the phenomenon of auction activities in the digital communication industry. The method used is a case study with a qualitative approach and uses interview, observation, and documentation techniques. The results of this study can be seen that the auction activities that use Instagram social media use the Instagram Comments feature. The process of this activity begins with publication through an Instagram account which was originally created as a private collection gallery but eventually became a place to sell, promote through flash sales, and hold regular giveaway. These three things have a considerable influence on the continuity of the auction activities because to gather Hot Wheels collectors to participate in the auction activities which will later become potential buyers. Publications and promotions are usually done routinely for a week to attract the attention of followers.Kegiatan lelang dapat dianggap sebagai bentuk komunikasi pemasaran yang baru. Lelang merupakan aktivitas belanja online dimana harga ditentukan oleh pembeli dalam durasi yang telah ditentukan oleh penjual dan pembeli yang berhak mendapatkan barang berdasarkan dari tawaran harga tertinggi yang dberikan. Penelitian ini membahas tentang fenomena kegiatan lelang dalam industri komunikasi digital. Metode yang digunakan adalah studi kasus dengan pendekatan kualitatif dan menggunakan teknik wawancara, observasi, serta dokumentasi. Hasil penelitian ini dapat diketahui bahwa kegiatan lelang yang menggunakan media sosial Instagram ini memanfaatkan fitur Instagram Comments. Proses kegiatan ini diawali dengan melakukan publikasi melalui akun Instagram yang awalnya dibuat sebagai galeri koleksi pribadi namun akhirnya menjadi tempat untuk berjualan, promosi melalui flash sale, dan mengadakan giveaway secara rutin. Ketiga hal ini memberikan pengaruh yang cukup besar dalam keberlangsungan kegiatan lelang karena untuk mengumpulkan para kolektor Hot Wheels untuk mengikuti kegiatan lelang yang nantinya akan menjadi calon pembeli. Publikasi dan promosi ini biasa dilakukan secara rutin selama seminggu untuk menarik perhatian followers.


Author(s):  
Sarthak Rathod ◽  
Madhav Gaur ◽  
Krishna Parihar ◽  
Akhlesh Kumar ◽  
Dr. S. K. Jain

Sextortion is a new form of cybercrime that is spreading very fast in India. Sextortion is such a type of incident where victims are very ashamed of sharing and talking. And that is why it becomes a very easy and suitable target for blackmailers. Innocent social media users are being trapped in Sextortion. Victims not only lose their money but also pride and respect in society especially family members and friends. The research paper has explored to understand the modus operandi of the blackmailers. The present study has attempted to trace blackmailers in a sextortion incident. The research paper has described the process of tracing the blackmailers online. The study analyzed the incident from a cybercrime detection and identification perspective. The research paper is also attempting to spread awareness by describing tactics to defend against cybercrimes such as sextortion.


Author(s):  
Eric Too ◽  
Martin Betts ◽  
Arun Kumar

Building for a sustainable environment requires sustainable infrastructure assets. Infrastructure capacity management is the process of ensuring optimal provision of such infrastructure assets. Effectiveness in this process will enable the infrastructure asset owners and its stakeholders to receive full value on their investment. Business research has shown that an organisation can only achieve business value when it has the right capabilities. This paradigm can also be applied to infrastructure capacity management. With limited access to resources, the challenge for infrastructure organisations is to identify and develop core capabilities to enable infrastructure capacity management. This chapter explores the concept of capability and identifies the core capability needed in infrastructure capacity management. Through a case study of the Port of Brisbane, this chapter shows that infrastructure organisations must develop their intelligence gathering capability to effectively manage the capacity of their infrastructure assets.


2020 ◽  
Author(s):  
Simone Grannò ◽  
Alessio Mosca ◽  
Jasmin Walravens-Evans

Over the last decade, a vast YouTube-based ‘market’ of child-produced content involving sexualised behaviour has developed. Children-performers produce videos featuring implicit sexual imagery to satisfy the demands of an adult fan base, and in exchange for a digital reward. We first report the discovery of several YouTube keywords leading to such content, outlining their remarkable interconnectedness via analysis of search trends over the last decade. Following, we investigate audience-child interactions by semantic analysis of n=1398 comments mined from n=30 videos, revealing the occurrence of collective grooming. We then demonstrate how this phenomenon is sustained and enhanced by YouTube search algorithms. Following, we detail a model framework to contextualise our findings. Finally, we propose specific amendments to the 2018 Online Harms White Paper that might tackle this phenomenon. Our results reveal a new form of child abuse, as of yet undescribed, wherein the core features of online grooming are translated to social media, the fundamental principles of which act as a powerful incentive. Because the victim’s manipulation is enacted collectively, we believe that responsibility ultimately rests with society as a whole. The principal aim here is to raise awareness of this issue, in an attempt to kick-start discussion of its causes, implications and potential solutions.


2021 ◽  
Vol 263 (6) ◽  
pp. 810-816
Author(s):  
Zhanjie Ju ◽  
Zhiyong Deng ◽  
Xushan Xue ◽  
Aili Liu

With its own unique musical vocabulary oundscape composition has been unprecedently developed all over the world. The analysis of music s from the perspective of acoustics has its own advantages that cannot be replaced by the traditional musicology. Based on music named Dayb for a hope to overcome COVID-19, this paper analyzes the acoustic elements of , frequency spectrum and waveform. Combined with the traditional musicology, it can show that the undulation of waveform has associated with the formal structure and the visualization of music. The frequency spectrum shows that as the climax of the piece, the sound has a high energy in the range of 300-1000Hz, which is one of the extremely sensitive frequency ranges for human. The composer not only skillfully integrates the chanting of monks with the complex environmental sounds, but also reflects the innovative composition skills. The change of from weak to strong or contrarily is also in line with the emotional expression, that is, the core idea of moving from nature to nature. Since soundscape c retains more information, it is easier to immerse the audience in the listening process and appreciate the beautiful hope rather than the difficulty of understanding it.


Sign in / Sign up

Export Citation Format

Share Document