scholarly journals How Can the Water Springs Be Sustainable?: An Overview of Cross-Time Environmental Communication Strategies on the Village-Owned Enterprise in Indonesia

2021 ◽  
Vol 3 (4) ◽  
pp. 212-226
Author(s):  
Moch. Adi Surahman ◽  
Maulina Pia Wulandari ◽  
Suryadi

This research has an interpretive social science paradigm which implies an exploratory form. The purpose of the study was to find out various potential efforts carried out by the management of the Barokah Village Owned Enterprise (BUMDes) as an environmental communication strategy for conserving the Sira Springs in Putukrejo, Malang Regency. The research data collection method was a combination of in-depth interviews, partisan field observations, and documentation. Analysis of research data is descriptive-qualitative and uses interactive analysis techniques as a reference. Application of triangulation includes size, time, and observer. The technique of collecting informant data is purposively against representatives of village government apparatus, BUMDes administrators, and managers of springs. The study results reveal that the environmental communication strategy of BUMDes Barokah as an effort to preserve Sira springs is currently achieving a Strengthening Strategy as Focht’s preposition strengthened by Tyson & Unson (2006). This is due to the decreasing controversy among them and the relatively high level of public and scientific consensus that has been achieved since the beginning of Sira resource management through the establishment of BUMDes. This strengthening strategy is mainly through Word of Mouth, special performances or events, and mass communication and new media involving the participation of the local community. They also relatively understand the axioms of environmental communication as explained by Jurin, Roush, & Danter (2010) in their daily practice. The potential efforts of the BUMDes Barokah management, together with the work unit groups under its auspices and the Putukrejo village community, which are closely related to local characteristics, are densely discussed in this article.

Author(s):  
V. Kovpak ◽  
N. Trotsenko

<div><p><em>The article analyzes the peculiarities of the format of native advertising in the media space, its pragmatic potential (in particular, on the example of native content in the social network Facebook by the brand of the journalism department of ZNU), highlights the types and trends of native advertising. The following research methods were used to achieve the purpose of intelligence: descriptive (content content, including various examples), comparative (content presentation options) and typological (types, trends of native advertising, in particular, cross-media as an opportunity to submit content in different formats (video, audio, photos, text, infographics, etc.)), content analysis method using Internet services (using Popsters service). And the native code for analytics was the page of the journalism department of Zaporizhzhya National University on the social network Facebook. After all, the brand of the journalism department of Zaporozhye National University in 2019 celebrates its 15th anniversary. The brand vector is its value component and professional training with balanced distribution of theoretical and practical blocks (seven practices), student-centered (democratic interaction and high-level teacher-student dialogue) and integration into Ukrainian and world educational process (participation in grant programs).</em></p></div><p><em>And advertising on social networks is also a kind of native content, which does not appear in special blocks, and is organically inscribed on one page or another and unobtrusively offers, just remembering the product as if «to the word». Popsters service functionality, which evaluates an account (or linked accounts of one person) for 35 parameters, but the main three areas: reach or influence, or how many users evaluate, comment on the recording; true reach – the number of people affected; network score – an assessment of the audience’s response to the impact, or how far the network information diverges (how many share information on this page).</em></p><p><strong><em>Key words:</em></strong><em> nativeness, native advertising, branded content, special project, communication strategy.</em></p>


Author(s):  
Abdul Basith ◽  
Rosmaiyadi Rosmaiyadi ◽  
Susan Neni Triani ◽  
Fitri Fitri

The aim of this research is; 1) investigating the level of online learning satisfaction among students during COVID 19; 2) analyzing the influence of differences in gender, years of study, major in determining online learning satisfaction among students during COVID 19; 3) to analyze the relationship between online learning satisfaction and student academic achievement during COVID 19. The population was 656 students at STKIP Singkawang, and then a sample of 357 students (87 males and 270 females) was taken using a simple random sampling technique. The instrument in this study was adapted from Aman's Satisfaction instrument, which was then used to collect research data. Data analysis using SPSS with descriptive statistical techniques, MANOVA, and correlation. The results showed that online learning satisfaction was at a high level, meaning that students were satisfied with the online learning that had been implemented. The major differences have a significant effect on determining online learning satisfaction. Intercorrelation shows that there is a significant relationship on each indicator of online learning satisfaction with academic achievement, meaning that the higher the satisfaction felt by students in online learning, the student's academic achievement will increase.


Author(s):  
Esti Devi Pratiwi ◽  
Filia Prima Atharina ◽  
Henry Januar Saputra

Learners find it difficult to learn if asked to solve problems with high-level thinking (HOTS). Difficulties experienced by students are difficulties in working on HOTS-based question in which students are asked to think critically and understand the purpose of the questions be worked on. Descriptive qualitative research methods. Sources of research data are students in class V SD N Bugangan 02 Semarang. Data collection procedures used are observation, interviews, and documentation. The results showed that fifth grade students found it difficult to work on HOTS-based questions because in the learning process teachers rarely gave HOTS-based question so students were not accustomed to solving questions by thinking highly.


Author(s):  
Сергей Иванович Вележев ◽  
Антон Михайлович Седогин

В представленной статье авторами рассматриваются вопросы уголовно-правовой охраны топливно-энергетического комплекса Российской Федерации от преступных проявлений, в том числе от коррупционной противоправной деятельности должностных лиц. Такие действия причиняют значительный ущерб нормальному функционированию предприятий топливно-энергетического комплекса. Авторами приводятся результаты исследования некоторых криминологических характеристик должностных лиц, совершивших преступления коррупционного характера. Дан анализ причин и условий, способствующих совершению вышеуказанных противоправных действий. Определена типовая модель преступника для данной категории преступлений и его характеристики: в первую очередь, это высокий уровень компетентности, специальное образование и т. д. Авторами отмечается высокий уровень латентной преступности в данной отрасли. Предложены некоторые пути профилактики данной категории правонарушений. Исследование проводилось на основе анализа конкретных уголовных дел, возбужденных следственными органами по результатам оперативно-розыскной деятельности правоохранительных органов. In the article the authors consider the issues of criminal and legal protection of the fuel and energy complex of the Russian Federation from criminal activity including corrupt illegal practices of officials. The authors cite the results of some criminological characteristics study of the fuel and energy complex staff committed corruption crimes. As a result of these illegal actions significant damage is caused to the normal functioning of the fuel and energy enterprises. Such officials` actions determine not only a wide range of other illegal activities, but also lead to public outcry and discredit the industry as a whole. The analysis of the reasons and conditions contributing to the above illegal actions commission is given. A typical model of a criminal for a given crime category and its characteristics are determined. First of all it is a high level competence, special education, etc. A high level of latent crime in this industry is shown. The study results are presented on the example of specific criminal cases initiated by the investigating authorities based on the results of the operation detection activities of law enforcement agencies. Some ways of preventing this category of offenses are proposed.


2021 ◽  
Vol 9 (1) ◽  
pp. 4-19
Author(s):  
Shannon Butts ◽  
Madison Jones

This article shares lessons from designing <u>EcoTour</u>, a multimedia environmental advocacy project in a state park, and it describes theoretical, practical, and pedagogical connections between locative media and community-engaged design. While maps can help share information about places, people, and change, they also limit how we visualize complex stories. Using deep mapping, and blending augmented reality with digital maps, EcoTour helps people understand big problems like climate change within the context of their local community. This article demonstrates the rhetorical potential of community-engaged design strategies to affect users, prompt action, and create more democratic discourse in environmental communication.


Diagnostics ◽  
2021 ◽  
Vol 11 (4) ◽  
pp. 713
Author(s):  
Giuseppe Angelico ◽  
Angela Santoro ◽  
Frediano Inzani ◽  
Patrizia Straccia ◽  
Saveria Spadola ◽  
...  

Background: To date, useful diagnostic applications of p16 IHC have been documented in gynecological pathology both for HPV-related and non-HPV-related lesions. In the present article, we reported our experience with the novel anti-p16 INK4a antibody (clone BC42), whose expression was tested across all different gynecologic neoplasms; we also compared it to the traditional E6H4 clone. Moreover, we discussed and explored all the diagnostic applications of p16 IHC in gynecologic pathology. Methods: Consultation cases covering a 5-year period (2016–2020) regarding gynecological neoplastic and non-neoplastic lesions in which immunohistochemistry for p16, clone E6H4 was originally performed, were retrospectively retrieved from the files of our institution. Immunohistochemical staining for p16ink4a (BC42) [Biocare Medical group-Paceco USA; Bioptica Milan] and p16ink4a (E6H4) [Ventana Medical Systems-Arizona USA; Roche] was performed by using the Ventana automated immunostainer (Ventana Medical Systems, Tucson, AZ, USA). The immunostaining pattern was defined as negative, focal/patchy, or diffuse. Results: A total of 196 cases, represented by 36 high-grade SIL/CIN3 of the uterine cervix, 30 cervical adenocarcinomas, 22 cervical squamous cell carcinoma, 70 endometrial carcinomas, 25 high grade serous ovarian carcinomas, 6 uterine adenomatoid tumors, and 10 uterine leiomyosarcomas were included in this study. Results showed concordant staining quality of both clones on all tested neoplastic tissues. Conclusions: The novel anti-p16 antibody (BC42 clone) appeared as an alternative to the current E6H4 for use in gynecological neoplasms, offering similar levels of positivity and equally reliable staining results.


2016 ◽  
Vol 44 (4) ◽  
pp. 542-561
Author(s):  
Marina Grishakova ◽  
Siim Sorokin

Drawing on non-Darwinian cultural-evolutionary approaches, the paper develops a broad, non-representational perspective on narrative, necessary to account for the narrative “ubiquity” hypothesis. It considers narrativity as a feature of intelligent behaviour and as a formative principle of symbolic representation (“narrative proclivity”). The narrative representation retains a relationship with the “primary” pre-symbolic narrativity of the basic orientational-interpretive (semiotic) behaviour affected by perceptually salient objects and “fits” in natural environments. The paper distinguishes between implicit narrativity (as the basic form of perceptual-cognitive mapping) of intelligent behaviour or non-narrative media, and the “narrative” as a symbolic representation. Human perceptual-attentional routines are enhanced by symbolic representations: due to its attention-monitoring and information-gathering function, narrative serves as a cognitive-exploratory tool facilitating cultural dynamics. The rise of new media and mass communication on the Web has thrown the ability of narrative to shape the public sphere through the ongoing process of negotiated sensemaking and interpretation in a particularly sharp relief.


2021 ◽  
Vol 13 (13) ◽  
pp. 7109
Author(s):  
Gabriela Dima ◽  
Luiza Meseșan Schmitz ◽  
Marinela-Cristina Șimon

This paper aimed to explore the changes posed by the new COVID-19 pandemic to the field of social work and its impact on social workers in terms of job stress and burnout in Romania. Two conceptual models were used to frame the discussion: the theoretical framework of VUCA (volatility, uncertainty, complexity, and ambiguity) to discuss the challenges that the unprecedented context of the COVID-19 pandemic has created for social workers; and the Job Demands and Resources model (JD-R) to understand job demands perceived as stressors and burnout. Based on convergent mixed methods, the study sample consisted of 83 social workers employed in statutory and private social services in Romania, from different areas of intervention. Results showed that social workers perceived a high level of job stress related to work during the pandemic, which was associated with higher levels of burnout in the areas of personal burnout (average score 55.9) and work-related burnout (average score 52.5). Client-related burnout was lower (average score 38.4), indicating that stress was generated mainly by organisational factors and work-related factors (workload, aligning to new legislative rules and decisions, inconsistency, instability, ambiguity of managerial decisions, and lack of clarity of working procedures) and less by client-related stressors (lack of direct contact with clients, risk of contamination, managing beneficiaries’ fears, and difficulties related to technology). High job demands and limited job resources (managerial and supervisory support, financial resources, and recognition and reward) led to a high to very high level of work-related burnout for 15.7% and an upper-medium level for 44.2% of respondents. A group of 27.7% reported lower to medium levels of work-related burnout, while 14.5% had very low levels, managing to handle stress factors in a healthy manner. Study results pointed to the importance of organisational support and the development of a self-care plan that help to protect against job stress and burnout. Recommendations were made, putting forward the voice of fieldworkers and managers fostering initiatives and the application of sustainability-based measures and activities designed to deal with the challenges of the VUCA environment.


2021 ◽  
pp. 143-165
Author(s):  
V.G. Maralov ◽  
◽  
V.A. Sitarov ◽  

The relevance of the problem is due to the importance of identifying factors that determine the propensity of students to coercion or nonviolence, creating psychological and pedagogical conditions for the formation of the socionomic sphere of nonviolent competencies for future specialists at universities. The theoretical basis of the study was the position of nonviolence as a daily practice of interaction, by which we understand the ability of a person to choose from a number of possible alternatives that carry the least charge of coercion. The aim of the work was to study the influence of irrational beliefs and sensitivity to a person (interest, empathy, understanding and assistance) on the students’ tendency to coercion, manipulation, non-violence and non-interference in the processes of interaction with people. The hypothesis was tested that the tendency of students to coercion, manipulation, and noninterference will be due to expressed irrational beliefs and low level of sensitivity to a person and the tendency to non-violence will be explained by the absence of irrational beliefs and a high level of sensitivity to a person. The study involved 125 students of pedagogical and psychological faculties of the Moscow Humanitarian and Cherepovets State universities. The authors used questionnaires to identify the positions of interaction among students and sensitivity to a person, as well as a list of irrational beliefs proposed by A. Beck and A. Freeman. It is established that the tendency to both coercion and manipulation are determined by the beliefs of anti-social type and low sensitivity to the person. The tendency to manipulate the narcissistic beliefs, high interest in people and understanding them, at the same time the tendency to non-violence and non-interference are determined by beliefs of avoidant and dependent types with a low level of understanding people. And a tendency to non-interference is determined by beliefs of dependent type with unexpressed orientation on helping. The tendency to nonviolence is determined by the high sensitivity to a person and the absence of irrational beliefs of antisocial, passive-aggressive and narcissistic types. As a result, the conclusion is made about the need to form purposefully the ability to nonviolent interaction among students, which should include the work on awareness and overcoming irrational beliefs and the development of sensitivity to a person. The obtained results can be used in practical work with students on the formation of their nonviolent competencies.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Ramaraj Palanisamy ◽  
Yang Wu

Purpose This study/ paper aims to empirically examine the user attitude on perceived security of enterprise systems (ES) mobility. Organizations are adopting mobile technologies for various business applications including ES to increase the flexibility and to gain sustainable competitive advantage. At the same time, end-users are exposed to security issues when using mobile technologies. The ES have seen breaches and malicious intrusions thereby more sophisticated recreational and commercial cybercrimes have been witnessed. ES have seen data breaches and malicious intrusions leading to more sophisticated cybercrimes. Considering the significance of security in ES mobility, the research questions in this study are: What are the security issues of ES mobility? What are the influences of users’ attitude towards those security issues? What is the impact of users’ attitude towards security issues on perceived security of ES mobility? Design/methodology/approach These questions are addressed by empirically testing a security model of mobile ES by collecting data from users of ES mobile systems. Hypotheses were evolved and tested by data collected through a survey questionnaire. The questionnaire survey was administered to 331 users from Chinese small and medium-sized enterprises (SME). The data was statistically analysed by tools such as correlation, factor analysis, regression and the study built a structural equation model (SEM) to examine the interactions between the variables. Findings The study results have identified the following security issues: users’ attitude towards mobile device security issues; users’ attitude towards wireless network security issues; users’ attitude towards cloud computing security issues; users’ attitude towards application-level security issues; users’ attitude towards data (access) level security issues; and users’ attitude towards enterprise-level security issues. Research limitations/implications The study results are based on a sample of users from Chinese SMEs. The findings may lack generalizability. Therefore, researchers are encouraged to examine the model in a different context. The issues requiring further investigation are the role of gender and type of device on perceived security of ES mobile systems. Practical implications The results show that the key security issues are related to a mobile device, wireless network, cloud computing, applications, data and enterprise. By understanding these issues and the best practices, organizations can maintain a high level of security of their mobile ES. Social implications Apart from understanding the best practices and the key issues, the authors suggest management and end-users to work collaboratively to achieve a high level of security of the mobile ES. Originality/value This is an empirical study conducted from the users’ perspective for validating the set of research hypotheses related to key security issues on the perceived security of mobile ES.


Sign in / Sign up

Export Citation Format

Share Document