Download Free Discoursal Construction Of Academic Identity In Cyberspace Book in PDF and EPUB Free Download. You can read online Discoursal Construction Of Academic Identity In Cyberspace and write the review.

The aim of this volume is to look into how academic identity is discoursally constructed in CMC (computer-mediated communication), using the example of an e-seminar. An e-seminar is an asynchronous type of CMC, where private, public and institutional domains merge, and therefore it provides an interesting context for exploring academic communication phenomena in cyberspace. The linguistic cues of academic identity can be identified on three levels of discourse organisation: the features of lexico-grammar, textual macrostructures and genres. In general, the analysis shows how these three levels of discourse organisation contribute towards how academics negotiate their identities relative to the aims and activities of their discourse communities and relative to their individual goals. The discoursal construction of academic identity in electronic discourse depends also on such factors as the medium’s defining properties and the lack of direct physical contact between interactants. An important finding is the confirmation of the individuating character of the medium: i.e. the authors’ self-presentation in an e-seminar is characterised by their distinctive voice and increased self-disclosure. Communication in this context enhances individuality, which bears important consequences for how academics negotiate their identity in electronic discourse, exploiting the possibilities offered by the new medium. The results of the analysis reveal how important it is for scholars to maintain a legitimate identity in an e-seminar. Virtual academic identity as constructed in this context is as an extension of academic identity constructed in the real world. The new communicative medium seems to have extended the repertoire of effective means of self-promotion, and the presentation of academic achievements and expertise. These aspects have become important for academic interaction in today’s world, which is characterised by such phenomena as the internationalisation and globalisation of scholarship, commodification of science and intensified competition. The book will be of interest to students and researchers in the fields of discourse analysis, academic literacy, rhetoric and genre studies, and to all those concerned with the complexities of identity work in the context of computer-mediated communication.
In imagining history, one must inevitably rely on its textual representations, whether fictitious or supposedly “objective”, yet always subject to the constraints and conventions of textuality. Still, it is precisely by exploiting and consciously relying on the textual in the presentation of the past that contemporary authors, including politicians and makers of history, strive to provide it with current significance, emotional impact and universal meaning. The study of such attempts benefits from a variety of perspectives, encompassing not only classical, but also popular texts and media. An interdisciplinary collection of papers devoted to the issues of retelling, rewriting, and representation of the past in fiction and various text-types, this volume juxtaposes modern and post-modern understanding of collective versus personal history. The contributors are scholars specializing in literary studies (e.g. postcolonialism and popular fiction), linguistics (e.g. critical discourse analysis) and cultural studies (e.g. media studies), bringing a wide spectrum of theoretical insights into the field. The collection opens with papers on the general changes in viewing history that have occurred since the 19th century. Further papers discuss postcolonial, feminist and gender-related perspectives on history reflected in postmodern fiction, revealing the power struggle around the depiction of the past. The next part of the volume is devoted to the presentation of historical breakthroughs in political and media discourse. Finally, the collection draws attention to some unorthodox visions of history involving alternative worlds and fantastic elements encountered in the genre of speculative fiction.
With researchers around the world are under increasing pressure to publish in high-profile international journals, this book explores some of the issues affecting authors on the semiperiphery, who often find themselves torn between conflicting academic cultures and discourses.
This volume includes methodological considerations and descriptions of some of the texts compiled in The Corpus of English Texts on Astronomy (CETA), together with a number of pilot studies using these texts showing how the corpus can be used to investigate English Astronomy writing between 1700 and 1900, from a synchronic and a diachronic perspective.CETA is part of the Coruña Corpus of English Scientific Writing (CC). Since the CC was designed in 2003 with a sampling method by which extracts of 10,000 words were selected, this method has been followed in CETA, with samples from 42 different authors both from Europe and North America. Some extralinguistic parameters, such as year of publication, sex, geographical provenance and text-types/genres have been considered for text selection. According to late Modern English text typology, the samples in CETA can be grouped in eight different categories and such categories, as well as some other metadata information, can be used to search the corpus. CETA, together with the Coruña Corpus Tool purpose-designed software by IrLab, was originally made available with the volume on CD-rom. As of early 2019, these are also accessible online at the Repositorio Universidade Coruña: CCT at http://hdl.handle.net/2183/21850 and CETA at http://hdl.handle.net/2183/21848
The use of online learning environments is now widespread, and there is a wealth of literature providing practical advice on how to teach online, develop courses and ensure effective pedagogical practice. What has been frequently overlooked is the insight offered by cyberspace theory, which considers broader social, cultural and theoretical contexts within which new technologies and learning models are situated. This book provides a fresh perspective on current thinking in e-learning. It challenges orthodox assumptions about the role of technology in the teaching and learning of the future, and explores more varied and wider-reaching conceptual frameworks for learning in cyberspace. Featuring the contributions of respected and experienced experts with a wide range of perspectives, Education in Cyberspace will be valued by anyone closely involved in the theory of e-learning and education.
'Identity' is a central organizing feature of our social world. Across the social sciences and humanities, it is increasingly treated as something that is actively and publicly accomplished in discourse. This book defines identity in its broadest sense, in terms of how people display who they are to each other. Each chapter examines a different discursive environment in which people do 'identity work': everyday conversation, institutional settings, narrative and stories, commodified contexts, spatial locations, and virtual environments. The authors describe and demonstrate a range of discourse and interaction analytic methods as they are put to use in the study of identity, including 'performative' analyses, conversation analysis, membership categorization analysis, critical discourse analysis, narrative analysis, positioning theory, discursive psychology and politeness theory. The book aims to give readers a clear sense of the coherence (or otherwise) of these different approaches, the practical steps taken in analysis, and their situation within broader critical debates. Through the use of detailed and original 'identity' case studies in a variety of spoken and written texts in order, the book offers a practical and accessible insight into what the discursive accomplishment of identity actually looks like, and how to go about analyzing it.
This book maps and analyses the official British construction of the threat of cyberterrorism. By using interpretive discourse analysis, this book identifies ‘strands’ from a corpus of policy documents, statements, and speeches from UK Ministers, MPs, and Peers between 12 May 2010 and 24 June 2016. The book examines how the threat of cyberterrorism was constructed in the UK, and what this securitisation has made possible. The author makes novel contributions to the Copenhagen School’s ‘securitisation theory’ framework by outlining a ‘tiered’ rather than monolithic audience system; refining the ‘temporal’ and ‘spatial’ conditioning of a securitisation with reference to the distinctive characteristics of cyberterrorism; and, lastly, by detailing the way in which popular fiction can be ascribed agency to ‘fill in’ an absence of ‘cyberterrorism’ case studies. He also argues that the UK government’s classification of cyberterrorism as a ‘Tier One’ threat created a central strand upon which a discursive securitisation was established. This book will be of interest to students of Critical Security Studies, terrorism studies, UK politics, and international relations.
Languages are inseparable from their contexts of use. They are not only congruent with, but also involved in the configuration of the worldviews and value systems manifested in cultures and embodied in texts. The spread of English worldwide foregrounds the issue of textual dynamics in intercultural settings. The production/reception of texts in English facilitates international contacts and exchanges, yet it also triggers hegemonic practices. The volume aims to investigate the representations and negotiations of sociocognitive identities in intercultural settings relevant for 'good practice'. Contributions explore 'languaging' strategies (verbal, visual, multimodal; English monolingual, bilingual, multilingual) through a range of methodological perspectives wherein the respect for sociocultural differences is a constitutive value.
Through the rise of big data and the internet of things, terrorist organizations have been freed from geographic and logistical confines and now have more power than ever before to strike the average citizen directly at home. This, coupled with the inherently asymmetrical nature of cyberwarfare, which grants great advantage to the attacker, has created an unprecedented national security risk that both governments and their citizens are woefully ill-prepared to face. Examining cyber warfare and terrorism through a critical and academic perspective can lead to a better understanding of its foundations and implications. Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications is an essential reference for the latest research on the utilization of online tools by terrorist organizations to communicate with and recruit potential extremists and examines effective countermeasures employed by law enforcement agencies to defend against such threats. Highlighting a range of topics such as cyber threats, digital intelligence, and counterterrorism, this multi-volume book is ideally designed for law enforcement, government officials, lawmakers, security analysts, IT specialists, software developers, intelligence and security practitioners, students, educators, and researchers.