perspective theory
Recently Published Documents


TOTAL DOCUMENTS

114
(FIVE YEARS 32)

H-INDEX

14
(FIVE YEARS 1)

2021 ◽  
Vol 4 (2) ◽  
pp. 234-245
Author(s):  
Muhammad Luhfi ◽  
Ansor Putra ◽  
Arman Arman

This study is intended to analyze the form of Framing of Covid-19 vaccine new on CNN website based on Discourse Analysis perspective theory of Framing Analysis by Zhondang Pan & Gerald M. Kosicki. The objective of this research is “To describe how are the forms of framing of covid 19 vaccine news on CNN website”. This research used the descriptive qualitative method. The researcher used Zhondang Pan & Gerald M. Kosicki Framing Models to analyze the data. The source of the data in this research was taken from News on CNN Website. The data was collected through reading intensively, identifying and selecting, classifying, describing, and interpreting the data to get a complete conclusion of Framing Covid-19 Vaccine News on CNN Website by Zhondang Pan & Gerald M. Kosicki theory. The researcher analyzes six pieces of data or news from the CNN website. The result showed there are framing the researcher found based on four models of framing Pan & Kosicki namely: Syntactical Structure, Script Structure, Thematical Structure and Rhetorical Structure in six data or news from CNN website.  


2021 ◽  
pp. 1-16
Author(s):  
Ali H. Al-Hoorie ◽  
Phil Hiver ◽  
Diane Larsen-Freeman ◽  
Wander Lowie

Abstract In contemporary methodological thinking, replication holds a central place. However, relatively little attention has been paid to replication in the context of complex dynamic systems theory (CDST), perhaps due to uncertainty regarding the epistemology–methodology match between these domains. In this paper, we explore the place of replication in relation to open systems and argue that three conditions must be in place for replication research to be effective: results interpretability, theoretical maturity, and terminological precision. We consider whether these conditions are part of the applied linguistics body of work, and then propose a more comprehensive framework centering on what we call substantiation research, only one aspect of which is replication. Using this framework, we discuss three approaches to dealing with replication from a CDST perspective theory. These approaches are moving from a representing to an intervening mindset, from a comprehensive theory to a mini-theory mindset, and from individual findings to a cumulative mindset.


2021 ◽  
Vol 3 (2) ◽  
pp. 153-178
Author(s):  
Chantal Crozet ◽  
Kerry Mullan ◽  
Jing Qi ◽  
Masoud Kianpour

This paper reflects on the literature on Critical Language and Intercultural Communication Education in light of learnings gained from designing and delivering a course titled ‘Intercultural Communication’ over four years to large cohorts of first-year tertiary students in Australia. It is based on a qualitative research project which involves the analysis of two sets of data: a) ethnographic notes from teaching staff meetings, tutors’ interviews, and tutorial observation, and b) student formal and informal feedback surveys as well as focus group discussions. The paper explores what and who is at stake when teaching and learning about language and intercultural communication from a critical perspective. It unveils from a praxis perspective (theory informed by practice and vice versa) the deeply political and ethical level of engagement that is required of teachers, the kind of metalinguistic and metacultural knowledge, as well as the kind of disposition towards critical thinking and reflexivity, that are called for when teaching and learning in this domain in an Australian tertiary environment.


2021 ◽  
Vol 14 (7) ◽  
pp. 290
Author(s):  
Davood Askarany ◽  
Hassan Yazdifar ◽  
Kevin Dow

While the benefits and advantages of using renewable energies are remarkable, and their prices have been decreasing dramatically and are expected to fall further, the diffusion and adoption of renewable energies still lag fossil energies. This paper improves our understanding regarding the role of the interrelationship among businesses (as an example of B2B networking amongst parent and subsidiary firms). Furthermore, it demonstrates the way/s that such interrelationships can contribute to the diffusion and adoption of sustainable and energy-efficient technologies. This study describes four diffusion channels in the interrelated firms which can help with promoting and using renewable and sustainable energies. The paper also reports the actual share of each diffusion channel contributing to implementing sustainable energy-efficient technologies in practice. The findings suggest that parent organisations enforce the majority (over 50%) of sustainable and energy-efficient technologies implemented in a B2B environment. In comparison, inter-subsidiary relationships are responsible for less than 30% of the implemented sustainable and energy-efficient technologies in organisations. The findings are in line with the forced perspective theory. They could, to some degree, explain the differences in the levels of implementation of sustainable and energy-efficient technologies in practice. These findings can help practitioners prioritise the diffusion channels when they want to facilitate the implementation of new technologies in their organisations. While some organisations may expect a more successful implementation of innovations initiated by subsidiaries than those enforced by parent organisations, the levels of success of the adoption of sustainable and energy-efficient technologies are not examined in this study. Further research is recommended to investigate the extent of association between different diffusion channels and the levels of success in terms of the adoption of innovation. We did not find similar studies to compare the results, which could be one of the limitations of this study.


2021 ◽  
Vol 21 (2) ◽  
pp. 171-184
Author(s):  
Muawwan Muawwan

Abstract   The escalation of cyber threats in Singapore has prompted the country to intensify its cyberspace security protection. Singapore then implemented numerous strategies by collaborating across agencies and actors to obtain a protective cyberspace security system. This research aimed at figuring out Singapore Cyber Security Strategy (SCSS) documents comprehensively throughout textual analysis based on qualitative approach of an emerging-dominant elements in documents such as actor, instrument, politic, economy, research, and collaboration which were cooperated within actors. The author also fulfilled this analysis using qualitative approach to measure the data relation and the big picture of SCSS documents. Finally, the author found that Singapore’s strategy in applications and infrasctructure aspects, the government intervened them intensively. Singapore, one of the highest technological expertise countries in Southeast Asia, was fuflnerable getting the threats or attacks. So, this country was regulating an excellent cyber system and infrastructure to proctect their cyber management system secure. Meanwhile, Singapore’s policy in core aspects was a transfer due to the fact that Singapore was multi-ethnical and multi-culturalism country. Thus, Singapore’s strategy for ideological aspects was not regulated significantly in SCSS documents.   Keywords: Cyber Security Strategy, Data Relation, Sovereignty   Abstrak   Eskalasi ancaman terhadap ruang siber yang terjadi di Singapura telah mendorong negara tersebut untuk meningkatkan proteksi keamanan ruang sibernya. Singapura kemudian menerapkan berbagai strategi dengan cara menjalin kerjasama lintas instansi dan aktor untuk memperoleh sistem keamanan ruang siber yang lebih protektif. Tulisan ini bermaksud untuk memahami dokumen Singapore Cyber Security Strategy (SCSS) secara komprehensif dengan melakukan analisis kontekstual berdasarkan pendekatan kualitatif terhadap sejumlah unsur yang dominan muncul di dalam dokumen seperti aktor, instrument, politik, ekonomi, penelitian, dan kolaborasi yang dibangun di antara para aktor. Penulis juga melengkapi analisis ini dengan pendekatan kuantitatif untuk mengukur relasi data dan kecenderungan yang tergambar dari dokumen SCSS tersebut. Hasilnya, penulis menemukan bahwa pada level strategi di sektor application dan infrastruktur, pemerintah Singapura memiliki intervensi penuh dalam mengatur seluruh aktivitas di kedua aspek tersebut. Sebagai salah satu negara yang cukup signifikan di dalam pengelolaan teknologinya di kawasan Asia Tenggara, maka Singapura secara eksklusif berupaya membangun sistem dan infrastruktur siber yang mumpuni untuk melindungi tata kelola ruang siber mereka dari berbagai ancaman. Berbeda pada aspek core yang bersifat lebih terbuka (transfer) lantaran banyak dipengaruhi oleh multietnis dan multikulturalisme. Sehingga proteksi terhadap hal-hal yang bersifat ideologis tidak banyak diatur di dalam dokumen SCSS.   Kata kunci: Kedaulatan, Relasi Data, Strategi Keamanan Siber


2021 ◽  
Vol 21 (2) ◽  
pp. 195-208
Author(s):  
Alfonsus Maria de Liguori Sakunab ◽  
Anggraeni Silvia

Abstract   Cybersecurity has attracted attention in the study of international relations. This issue is important because most of life is connected to cyberspace. This research analyzes Lebanon's cybersecurity strategy in its official cybersecurity documents. The theoretical framework used in this study is the Three Perspective Theory of Cyber Sovereignty. The theory is explaining the division of layers in the context of sovereignty in cyberspace. The method used in this research is quantitative research obtained through the MAXQDA and GEPHI. The applications that are used in this research are to provide evidence of data in the Lebanese national strategy document. The results of this study indicate that the Lebanese security strategy documents tend to be exclusive. The Lebanese government is more dominant in discussing matters that are administrative, theoretical, principal, and planning.   Keywords: Cyber Security, Sovereignty, Strategy, Lebanon   Abstrak   cKeamanan siber merupakan salah satu isu yang menarik perhatian dalam studi hubungan internasional. Isu ini menjadi penting tatkala hampir sebagian besar unsur kehidupan terhubung ke ruang siber. Penelitian ini berupaya menganalisis strategi keamanan siber Lebanon dalam dokumen resmi kemananan sibernya.  Kerangka teori yang digunakan dalam dalam penelitian ini menggunakan Three Perspective Theory of Cyber Sovereignity yang menjelaskan pembagian lapisan dalam konteks kedaulatan di ruang siber. Metode yang digunakan ialah metode penelitian kuantitatif yang diperoleh melalui aplikasi MAXQDA dan GEPHI untuk memberikan bukti data dalam menganalisis dokumen strategi keamanan nasional Lebanon. Hasil penelitian ini menunjukkan bahwa dokumen strategi keamanan siber Lebanon cenderung bersifat eksklusif. Pemerintah Lebanon lebih dominan membahas hal-hal yang bersifat administratif, teoretis, prinsipil dan perencanaan.   Kata kunci: Keamanan Siber, Kedaulatan, Strategi, Lebanon


Dimensions ◽  
2021 ◽  
Vol 1 (1) ◽  
pp. 173-180
Author(s):  
Peter Schmid

Editorial Summary Professional drawing has always played an important role in the training of architects. Plan-drawings have already been sufficiently considered in established architectural research. The research of Peter Schmid presented in this text focuses on so far only scarcely examined architectural sketchbooks as well as various records used for architectural education, such as manuscripts for lectures or notes on perspective theory which belong to the »Munich School« - a tradition of teaching hand-drawing that developed over a period of 150 years through an on-going teacher-student relationship at the Technical University of Munich. He finds that the aim of »Munich School« was not only learning how to illustrate, but also to comprehend architecture through graphic analysis - thereby combining teaching and practice. Against the background that the interest in hand-drawings has significantly increased in recent years, the research helps to refine the role of hand-drawings today as a tool that sets »processes of cognition in motion«. [Ferdinand Ludwig]


2021 ◽  
Vol 2 (2) ◽  

This study focused on crime reporting and perceived effects on its victims: a case study of Ekpoma. Crime is a universal social problem which goes beyond the general notion of theft, murder, assault, rape, fraud, kidnapping and other unwholesome behaviour. This research work posits that whatever definition one gives to crime, the concept suggests a decline of public security and steady descent into social chaos. The research work argues that crime reporting and prevention must dovetail into the entire region of security management. The research work concludes by maintaining the true security goes beyond the provision of modern electronic equipment and increased police surveillance, etc, but involves much more of social justice, equity, employment opportunities in the society at large. Two major theories were use: Strain and Conflict Perspective Theory. Proffer suggestions were made on how the problem of crime reporting and victimization can be managed in Nigeria.


2021 ◽  
Vol 12 (1) ◽  
pp. 048-058
Author(s):  
Alexey V. Shcherbina ◽  
◽  
Mikhail V. Grechko ◽  
Mikhail A. Stasev ◽  
◽  
...  

Importance. The article is devoted to research, as well as systematization and integration of knowledge in the aspect of managing consumer choice and customer loyalty of consumers of educational products, taking into account the transforming strategy of behavior of economic agents. Objectives. As the goal of the study, the problem of developing application tools for managing the targeted supply of educational products and customer loyalty was identified, based on the QFD and RDB methodologies – analysis taking into account the transformation of the classical purchase cycle. Methods. The study is based on the cognitive potential of behavioral economics, cognitive psychology, the results of perspective theory, expert survey techniques, QFD and RDB - analyses that made it possible to systematize economic knowledge, in the context of the study of the problem of developing applied tools for managing the targeted supply of educational products and customer loyalty. All this eventually allowed us to give examples of the application of tools for personalized management of client loyalty of economic agents. Results. Based on the cognitive potential of behavioral economics, the use of behavioral science tools in economic theory, in work, using the QFD matrix, a target set of consumer factors for choosing an educational product was determined. In addition, on the example of the Higher School of Business, the SFU, relying on the cognitive potential of the RDB model, managed to reveal the special significance of the factors for choosing the educational product of the Higher School of Business, as well as determine the flaw in Resonance and propose measures aimed at eliminating the identified problem zone. Conclusions and Importance. The present text systematizes the main conclusions of the study. The results obtained should subsequently become the basis for the formation of a base of practical tools for managing consumer choice and customer loyalty of consumers of educational services.


Sign in / Sign up

Export Citation Format

Share Document