scholarly journals Value potential of political internet comments

Author(s):  
Natalia Vladimirovna Melnik ◽  
Meruyert Assetovna Uaikhanova

The problem of the research was Kazakhstani political Internet comments. The problem is justified with the development of information technologies. The aim of the study was to determine the value potential of the text generation of Kazakhstani political Internet comments in the linguo-personological and text-derivational aspects. To study this problem, methods of collection and contextual analysis of theoretical material, comparative, generalizing, descriptive methods and a method of quantitative data processing were used. The results of the study showed that the texts of Kazakhstani Internet comments prevail with value potential. The level of the value potential of everyday political discourse was revealed by the number of used keywords of the original text in the production of secondary texts. The scientific novelty of the research lies in the linguo-personological and linguoaxiological comprehension of the dominant textual activity when generating Internet comments in the Kazakh virtual space.

Author(s):  
D. M. Nazarov

The article describes the training methods in the course “Information Technologies” for the future bachelors of the directions “Economics”, “Management”, “Finance”, “Business Informatics”, the development of metasubject competencies of the student while his use of tools for data processing by means of the language R. The metasubject essence of the work is to update traditional economic knowledge and skills through various presentation forms of the same data sets. As part of the laboratory work described in the article, future bachelors learn to use the basic tools of the R language and acquire specific skills and abilities in R-Studio using the example of processing currency exchange data. The description of the methods is presented in the form of the traditional Key-by-Key technology, which is widely used in teaching information technologies.


2020 ◽  
Vol 12 (1) ◽  
pp. 30
Author(s):  
Ana Fitriana P ◽  
Ema Ema ◽  
Fardiah Oktariani Lubis

This study aims to uncover the political discourse of the Presidential Candidates after the second round of debates, Jokowi VS Prabowo in virtual space. The background of the political discourse of the 2019 Presidential Election debate in the virtual space gave rise to various responses and sentiments among the supporters. After the Presidential Election debate, the hashtag war between #BohongLagiJokowi and # 02GagapUnicorn on social media Twitter became the main discussion. The aim is to disperse the power, ideology, and interests behind the presidential political discourse through the Fairclough Critical Discourse Analysis. The research method uses qualitative methods to parse the problem in research, using critical thinking as a basis for research. The results showed the tweet of Prabowo supporters trying to show stunts through language. The use of subject pronouns such as the word Mukidi to dwarf the subject, also uses the hashtags #DeletJokowi, #UnistallJokowi, and #BohongLagiJokowi as symbols of virtual communication. In contrast, the tweet of Jokowi's supporters sent a stuttering sentiment because they didn't understand the e-comer business. Hashtag # 02GagapUnicorn as a virtual symbol for organizing texts. In the order of messo or the production of text, the two supporters make a virtual symbol through the hashtag to become a topic of discussion on Twitter. In the situational or macro aspects are influenced by the post-truth phenomenon that is vague information whose source is unclear, have an impact on the inclusion of opinions on the assassination of certain characters. The advice, wise social media, understand and thoroughly source of information, is not affected by the use of certain metaphors, and at the stage of text, production needs to pay attention to the effects that will impact on the influence of social psychology of each supporter.Penelitian ini bertujuan untuk mengungkap diskursus politik Capres pasca debat putaran kedua, Jokowi VS Prabowo di ruang virtual. Dilatarbelakangi oleh lanskap diskursus politik debat Pilpres 2019 di ruang virtual yang menimbulkan berbagai tanggapan dan sentimen di antara kedua kubu pendukung. Pasca debat Pilpres perang tagar antara #BohongLagiJokowi dan #02GagapUnicorn di Twitter menjadi pembahasan utama. Tujuannya untuk membongkar kuasa, ideologi dan kepentingan di balik wacana politik Pilpres melalui analisis wacana kritis Fairclough. Metode penelitian menggunakan metode kualitatif untuk mengurai masalah dalam penelitian, dengan menggunakan pemikiran kritis sebagai dasar pijakan penelitian. Hasil penelitian menunjukan tweet warganet pendukung Prabowo berusaha menunjukkan pengkerdilan melalui Bahasa. Penggunaan kata ganti subjek seperti kata Mukidi untuk mengkerdilkan subjek, juga menggunakan tagar #DeletJokowi, #UninstallJokowi dan #BohongLagiJokowi sebagai simbol komunikasi virtual. Namun sebaliknya, tweet warganet pendukung Jokowi membuat sentimen dengan kata-kata gagap karena tidak memahami bisnis milenial (e-commerce). Tagar #02GagapUnicorn sebagai simbol virtual untuk pengorganisasin teks, sedangkan di tahapan produksi teks (messo) kedua pendukung membuat simbol virtual melalui tagar (#) untuk menjadi tren topik pembahasan di Twitter. Pada aspek situasional (makro) dipengaruhi oleh fenomena post-truth yaitu informasi-informasi samar yang tidak jelas sumbernya, berdampak terhadap penggiringan opini terhadap pembunuhan karakter tertentu. Sarannya, bijak bermedia sosial, pahami dan teliti sumber informasinya, tidak terpengaruh terhadap penggunaaan metafora tertentu, serta pada tahap produksi teks perlu memperhatikan efeknya yang akan berdampak pada pengaruh psikologi sosial masing-masing pendukung. 


Author(s):  
S. V. Moshkin ◽  

The review covers the collective monograph “Communicative Aggressions of the 21st Century” dedicated to the study of destructive manifestations of communicative aggression in the media sphere connected with functional specifics of the contemporary information technologies and, in particular, of Internet. The review deals with the contents of the book and its structure, evaluates the understanding by the authors of communicative aggression, its features and destructive consequences. Special emphasis is laid upon the growing aggressiveness of the political discourse as the Internet becomes more widespread and commonly available. It was concluded that in order to find tools to reduce communicative aggression in the media sphere, the authors should consider and assess the developing censorship practices of Internet communications.


Author(s):  
V. A. Sizov ◽  
A. D. Kirov

The article is devoted to the problem of developing an analytical data processing system for monitoring information security within the information security management system of modern companies conducting their main activities in cyberspace and using cloud infrastructure. Based on the analysis of modern information technologies related to ensuring information security of cloud infrastructure and the most popular products for ensuring information security of cloud infrastructures, as well as existing scientific approaches, a formalized approach to the synthesis of an analytical data processing system for monitoring the information security of an informatization object using cloud infrastructure is proposed. This approach takes into account the usefulness of the used information technologies from the viewpoint of information security. A general model of the structure of information support of an analytical data processing system for monitoring information security, as well as a model of the dependence of the usefulness of information technology on time and the ratio of the skill level of an information security specialist and an attacker are presented. The quality of the information security monitoring system is used as a criterion in the first optimization model. The following limitations are suggested: limitation on the time of making a decision on an incident; limitation on the degree of quality of analysis of information security events by the analytical data processing system and limitation on the compatibility of data analysis functions with data types about information security events. The cited results of the study of the second model show a logically consistent dependence of the usefulness of information technology on time and the ratio of the skill level of an information security specialist to the skill level of an attacker. The particular models of the structure of the information support of ASOD are presented. They make it possible to determine the rational structure information support of ASOD according to particular criteria. The following particular criteria are used: the maximin criterion of the usefulness of the information support of ASOD for monitoring the information security of an informatization object in the cloud infrastructure; the criterion for the maximum relevance of information support distributed over the nodes of the cloud infrastructure for systems with a low degree of centralization of management.


2021 ◽  
Vol 19 (163) ◽  
pp. 501-515
Author(s):  
Nicoleta FARCANE ◽  
◽  
Ovidiu-Constantin Bunget ◽  
Rodica BLIDISEL ◽  
Alin-Constantin DUMITRESCU ◽  
...  

In the sensitive socio-economic context generated by the COVID-19 pandemic, teleworking was, in many fields, a way to continue the activity while complying to the measures imposed by law in order to fight the spread of the new Coronavirus. On the one hand, teleworking offers flexibility in setting the work schedule, eliminates travelling time to and from the worksite and allows to attract competent employees from all over the world, by means of digitalisation. On the other hand, working from home is a challenge. The time required to transfer the activity in the virtual space, and the additional training necessary for the use of innovative information technologies can reduce efficiency and affect the work-life balance. This paper focuses on the audit profession, which had to rethink remote auditing so as to comply with the restrictive measures, but at the same time to avoid affecting the quality of audit missions. The questionnaire distributed among professional practitioners, members of the CFAR, helped us identify the perception of Romanian financial auditors on the variables influencing the efficiency of the audit work carried out in the “new normal” and the extent to which teleworking could become a practice in future financial audit missions.


Author(s):  
M. Zuccarini

Information technologies (IT) and the new (virtual) space of dominion that they create can alter the order of the powers of the democratic states. This article will discuss the idea that the digital state is becoming a Virtual state with less power of control over its territory, because the historic power of the state is being restricted by the rise of governance beyond the state. The process of globalization, as well as the larger use of digital technologies, challenges the Westphalian nation-state, changing the state’s boundaries so that new forces and new actors acquire even larger space of dominion. We will explain that the information society challenges, but does not eliminate, the effectiveness of the state. The Web, with its open spaces, extends the state’s boundaries, creating new spaces of virtual dominion and changing governments structures: Actually, digital technologies affect functions of direction, control and organization of governments, and democracy quality, opening new areas of dominion for governments. Even if some of the functions of the states, like those related to economics, are diffuse under the new globalized and virtalized world, the states still preserve most of their political and military power. And more, the regulatory role of the state is considered pivotal: In the future, national governments need to define a new code of regulation of the Internet to defend citizens’ rights in the virtual space.


2009 ◽  
pp. 154-173 ◽  
Author(s):  
Claudia Padovani ◽  
Elena Pavan

Political processes are undergoing profound changes due to the challenges imposed by globalization processes to the legitimacy of policy actors and to the effectiveness of policy-making. Building on a socio-political approach to governance and focusing on global information policies and networks, this chapter aims at developing a better understanding of the possibility of change in world politics nowadays, by critically analysing two innovative elements: the reality and relevance of “multi-stakeholder” practices and the growing role of information technologies as a complementary support to actors’ relations. Looking at Internet Governance debates in recent years, the authors reconstruct networks of interaction connecting actors in the virtual space, and look at actors’ communication modes. Thus they analyze the extent to which technological, as well as processual and cognitive innovation, shapes actors’ orientations and the structures within which they interact in the specific context of Internet Governance.


2018 ◽  
Vol 3 (1) ◽  
pp. 104
Author(s):  
Rabith Madah Khulaili Harsya

The tendency of people to choose the Sharia Economic Dispute Settlement Institution. The facts of the lack of sharia economic case submitted and decided by litigation and non-litigation institutions are the background of the research. This research is a kind of explorative research that uses qualitative approach to mengunggkap legal facts in the context of sharia economy. Data in the form of questionnaires / questionnaires processed only to describe the percentage percentage of the economic tendency of sharia community to choose dispute settlement institutions. This description is a preliminary data that lead researchers to explore the points of question needed in the interview between the results of quantitative data processing with the facts on the ground shows that people choose various options in solving the dispute sharia economy.


2002 ◽  
Vol 28 (4) ◽  
pp. 527-543 ◽  
Author(s):  
Hongyan Jing

Professional summarizers often reuse original documents to generate summaries. The task of summary sentence decomposition is to deduce whether a summary sentence is constructed by reusing the original text and to identify reused phrases. Specifically, the decomposition program needs to answer three questions for a given summary sentence: (1) Is this summary sentence constructed by reusing the text in the original document? (2) If so, what phrases in the sentence come from the original document? and (3) From where in the document do the phrases come? Solving the decomposition problem can lead to better text generation techniques for summarization. Decomposition can also provide large training and testing corpora for extraction-based summarizers. We propose a hidden Markov model solution to the decomposition problem. Evaluations show that the proposed algorithm performs well.


2020 ◽  
Vol 6 (4) ◽  
pp. 103-114
Author(s):  
Iryna Sekret

Translating metaphor and metaphoric expressions is one of the disputable problems in translation studies due to the conceptual discrepancies which exist between the source culture and the target readership, moreover, if the metaphor plays a crucial role in creating an appeal to the reader as in the political text. In this respect, it is under the discussion of how to deal with a metaphor when translating political discourse, and what are the dominating strategies and traditions of translating metaphoric units in Turkish translations. Caused by the theoretical and practical urgency of the problem, this paper is aimed to analyze strategies of conveying metaphors from English to Turkish based on the novel “Animal Farm” by George Orwell and its Turkish translations by Sedat Demir and Celal Üster. To achieve the aims of the research the efforts were undertaken to compare the original text with its two different translations. For the precise analysis, Old Major’s speech was thoroughly scrutinized on the point of the metaphoric expressions in the text and their correspondences in the Turkish translations.


Sign in / Sign up

Export Citation Format

Share Document