Scientific Articles in Internet Homepages: Assumptions upon Lay Audiences

2003 ◽  
Vol 33 (2) ◽  
pp. 165-184 ◽  
Author(s):  
Isabel Gonzalez-Pueyo ◽  
Alicia Redrado

This article studies a set of scientific/technical articles published in Internet homepages. Focusing upon current trends on genre theory and the functional approach deployed by Halliday and Martin [1], linguistic features and schematic structure are analyzed in relation to more standard genres. The structural analysis suggests that these kind of texts imaginatively realize and assume the standpoint and main tenets of a lay audience that just consumes specific genres, most being analogous to the persuasive, manipulative, amusement-oriented genres of TV news stories, tabloids, and commercials. It is pondered that much of the “technological utopianism” (term used by Kling [2] surrounding the ever increasingly standardized Internet discourse turns the Internet into a productive vehicle to sustain technoscience as modern myth by spreading and forging that utopian imagery into the audience's consciousness, and that scientists are taking fruitful advantage of the utopian, futurist, and often sensationalist accounts of the Internet as a formidable frame to advertise themselves and the deeds achieved in their laboratories.

1999 ◽  
Author(s):  
Jeffrey A. Gibbons ◽  
Rodney J. Vogl ◽  
Thomas Grimes ◽  
Charles P. Thompson
Keyword(s):  

2002 ◽  
Author(s):  
Christopher J. A. Gibbons ◽  
N. M. Traxel ◽  
R. J. Vogl ◽  
T. Grimes
Keyword(s):  

2021 ◽  
pp. tobaccocontrol-2020-056131
Author(s):  
Jungmi Jun ◽  
Sei-Hill Kim ◽  
James Thrasher ◽  
Yoo Jin Cho ◽  
Yu-Jin Heo

BackgroundWe analyse news representations of the regulation of heated tobacco products (HTPs) in South Korea, the country where HTP use is among the highest in the world despite conflicts between the government and the HTP manufacturers.MethodsWe analysed a total of 571 print and TV news covering HTP regulations, published between 2017 and 2018, the time period when HTPs were introduced to the country and various regulations of HTPs were proposed and implemented. We assessed the prevalence and associations among specific types of HTP regulations that were discussed, valence towards regulation, sources, framing of the relative health risks/benefits of HTPs compared with conventional cigarettes.ResultsTaxation (55.2%) and warning labels (25.7%) were two regulation topics covered the most. Almost equal proportions of pro-regulation (2.5%) and anti-regulation valence (2.2%) were found in taxation-related news, while pro-regulation valence appeared more frequently for other restrictions, including warning labels (pro=9.5% vs anti=1.4%), marketing restrictions (pro=6.9% vs anti=0%) and integration of HTPs into smoke-free policies for cigarettes (pro=8.7% vs anti=0%). The government (59%), followed by the tobacco industry (39.4%), was the source cited most often across news stories while the presence of tobacco control advocates was low (4.9%). As for framing, there was no significant difference in the prevalence of stories mentioning reduced harm (31.7%) and equal or more harm (33.6%) of HTPs compared with cigarettes.ConclusionsWe provide implications for governments and tobacco control advocates on building consensus for applying cigarette equivalent taxes and pictorial warning labels to HTPs.


2018 ◽  
pp. 240-250
Author(s):  
Michael Tierney

This article describes how the internet has come to play a central role in terrorist financing endeavours. Online channels allow terrorist financiers to network with like-minded individuals, in order to increase support, raise funds, and move wealth across the international system. For instance, the Islamic State, Hezbollah, and other groups have become adept at using these channels to finance their activities. Therefore, increased examination is required of the ways in which terrorists use the internet to raise and move funds. This study assesses some of the current trends and risks associated with online terrorist financing. Some policy options are also outlined, in order to reduce the threat of terrorist financing via the internet moving into the future.


YouTube is more than cute pet videos and aspiring musicians. Fully understanding YouTube and how it influences, reproduces, and changes our culture begins with accepting the role of media technologies inside and outside of YouTube. The history of the Internet and its core technologies provides one foundational proposition in this book. Two other propositions, regarding YouTube's reliance on Internet-based technology and historically relevant communication theories, specifically Cultural Studies and Medium Theory, are discussed, as well. In consideration of important historical and theoretical perspectives, YouTube is transformed in our minds from a simple user-generated content repository to a cultural change agent. The tools and technology associated with the Internet, richly integrated and manifest in YouTube, allow us to change the world around us. Understanding the function and design of Internet-specific technology and how we experience social networking can contextualize current trends and influences in our daily online experience. Essential to our understanding and ultimately our power over the technology that we create (in this case, YouTube) is informed through understanding the technologies presented as part of our shared history. Finally, grasping the technological concepts and terminology reveals a deeper perspective on our cultural and participatory experience with the Internet and YouTube far beyond cute pet videos.


Author(s):  
Neil C. Rowe

Captions are text that describes some other information; they are especially useful for describing nontext media objects (images, audio, video, and software). Captions are valuable metadata for managing multimedia, since they help users better understand and remember (McAninch, Austin, & Derks, 1992-1993) and permit better indexing of media. Captions are essential for effective data mining of multimedia data, since only a small amount of text in typical documents with multimedia—1.2% in a survey of random World Wide Web pages (Rowe, 2002)—describes the media objects. Thus standard Web browsers do poorly at finding media without knowledge of captions. Multimedia information is increasingly common in documents as computer technology improves in speed and ability to handle it, and people need multimedia for a variety of purposes like illustrating educational materials and preparing news stories. Captions are also valuable because nontext media rarely specify internally the creator, date, or spatial and temporal context, and cannot convey linguistic features like negation, tense, and indirect reference. Furthermore, experiments with users of multimediaretrieval systems show a wide range of needs (Sutcliffe, Hare, Doubleday, & Ryan, 1997), but a focus on media meaning rather than appearance (Armitage & Enser, 1997). This suggests that content analysis of media is unnecessary for many retrieval situations, which is fortunate, because it is often considerably slower and more unreliable than caption analysis. But using captions requires finding them and understanding them. Many captions are not clearly identified, and the mapping from captions to media objects is rarely easy. Nonetheless, the restricted semantics of media and captions can be exploited.


Author(s):  
S. Kavitha ◽  
J. V. Anchitaalagammai ◽  
S. Nirmala ◽  
S. Murali

The chapter summarizes the concepts and challenges of DevOps in IoT, DevSecOps in IoT, integrating security into IoT, machine learning and AI in IoT of software engineering practices. DevOps is a software engineering culture and practice that aims at unifying software development (Dev) and software operation (Ops). The main characteristic of DevOps is the automation and monitoring at all steps of software construction, from integration, testing, releasing to deployment and infrastructure management. DevSecOps is a practice of integrating security into every aspect of an application lifecycle from design to development.


Author(s):  
Tejaswini Herath ◽  
S. Bagchi-Sen ◽  
H. R. Rao

A tremendous growth in the use of the Internet has been observed in the past two decades. More than 75% of Americans participate in online activities (University of Southern California Annenberg School Center for the Digital Future, 2004) such as e-mail, Web browsing, working from home, accessing news stories, seeking information, instant messaging, using the Internet in lieu of the library for school work, playing games, and managing personal finance. For professionals, the Internet is an important medium for networking and building social capital. However, along with all positive impacts, there are also negative outcomes. One such negative outcome includes Internet crimes. Dowland, Furnell, Illingworth, and Reynolds (1999) state that “with society’s widespread use of and, in some cases, reliance upon technology, significant opportunities now exist for both mischievous and malicious abuse via IT systems” (p. 715). Internet crimes (cyber crimes) consist of specific crimes dealing with computers and networks (such as hacking, spreading of viruses, and worms) and the facilitation of traditional crime through the use of computers on the Internet (such as child pornography, hate crimes, telemarketing/Internet fraud). This article focuses on Internet crimes, especially those affecting individual users, and offers a discussion of issues regarding Internet crimes and gender.


Sign in / Sign up

Export Citation Format

Share Document