• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 4
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 10
  • 10
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Framing the internet in China cross-cultural comparisons of newspapers' coverage in China, Hong Kong, Singapore, the United States and the United Kingdom /

Zhou, Xiang. January 2006 (has links) (PDF)
Thesis (Ph.D.)--The University of Tennessee, Knoxville, 2006. / Adviser: Catherine A. Luther. Includes bibliographical references (p. 188-213)
2

Integriertes Content Management in Fernsehunternehmen /

Pagel, Sven. January 2003 (has links)
Universiẗat, Diss., 2003 u.d.T.: Pagel, Sven: Digitales Content Management in Fernsehunternehmen--Dortmund.
3

Žalingas interneto tinklapių turinys: reglamentavimas ir praktinės teisinės problemos / Harmful Contents of Websites: Regulation and Practical Legal Issues

Ruibytė, Agnė 17 March 2006 (has links)
The harmful Internet content, as one of the main problems related to the birth of Internet, has already attracted attention of international and national institutions. Regardless of two main problems arising in this field – the global nature of Internet and the subjective nature of malignancy, it‘s almost decade as European Union and the Council of Europe are trying to solve harmful Internet material related questions in such ways, that would be acceptable to all the region. The author of this work suggests that basis of Lithuanian law should be reviewed and the approach to the tendencies of international regulation should be more critical – special attention should be paid when implementing self-regulatory mechanisms.
4

Vliv internetového marketingu na internetové mediální obsahy a jejich uživatele v českém mediálním prostředí / Internet marketing influence on internet media content and its users presented on the czech media environment

Rajtmajerová, Daniela January 2014 (has links)
The significations found in content aren't only explicitly present in the surface structures, but they're also built deep inside human mind as the basic semes - the minimum units with a signification. In the diploma thesis "Internet Marketing Influence on Internet Media Content and their Users at Czech Media Environment" we use a qualitative analysis method composed of the semiotic and the narrative analysis to describe and interpret the chosen samples of internet marketing content. The semiotic analysis helps us to interpret both the basic surface and deep significations present in the visual and text code of the interpreted samples. The narrative analysis unravels a narration the act is constructed from followed by interpretation. The application of both the methods allows us to identify myths in the narratives. The aim of application of both methods is to describe specific and repetitive deep significations and narrations individual communicates are built from and thus characterize internet marketing media discourse. The narratives form a basis of the interpersonal communication; they allow us to preserve and communicate significations through them. All the narratives of the interpreted samples of content were constructed with a basic conflict (or contradiction) and presented to the public...
5

Reaching the Pinnacle of Success: A Content Analysis using Organizational Culture Theory and Sport Hall of Fame Organizations

Hiestand, Katie 22 June 2022 (has links)
No description available.
6

Determining Standards for Sources of Free Information on the Internet for Inclusion in Academic Library Holdings by 2010.

Cross, Doug D. 14 December 2002 (has links) (PDF)
The purpose of this study was to develop a consensus from a panel of experts composed of library deans/directors, reference librarians, and instructors with online teaching experience. The panel developed the methodology necessary for evaluating free sources of information on the Internet for inclusion in academic library holdings by the year 2010. The following areas were explored as they related to the forecast: 1) The changes in higher education institutions that will be necessary to prepare students to deal with free sources of information on the Internet; 2) The procedures that librarians need to develop and implement to ensure that free Internet materials will meet quality standards for inclusion in academic library holdings; and 3) The things that publishers of free sources of information on the Internet need to do to ensure that their materials will be considered for inclusion in academic library holdings. The Delphi panel was composed of 24 members: eight library deans/directors, eight reference librarians, and eight instructors with online teaching experience. The members of the panel were selected from the community colleges of the Tennessee Board of Regents System. In the first round of the study, panelists responded to 10 open-ended questions on an e-mail questionnaire dealing with free sources of information on the Internet. The narrative responses to the questions were specific and provided a basis on which to develop the Round 2 Questionnaire. In the second round of the Delphi study, panelists responded to 9 questions with 42 subparts. The results of this study may be used to project the information needs of students as well as suggest strategies for publishers on the basis of the data collected in this study. A major finding of the study was the need for reliable information in documents on the Internet. The Delphi panel also listed the lack of permanence of Internet sites as a major reason librarians do not use free sources of information on the Internet. The Delphi panel recommended that educators assist students in dealing with Internet materials by teaching them how to use critical thinking skills.
7

An Internet content overview and implementation on an IP based set-top box

Widborg, Linus January 2006 (has links)
<p>This thesis covers the investigation of different content sources on the Internet and the analysis of the requirements they put on a set-top box. It also covers the adaptation of the set-top box to one of these sources. </p><p>An IP based set-top box (IP-STB) is mainly constructed for access to TV and video distributed over a high speed network. The IP-STB is also connected to the Internet and it potentially has access to all of the Internet based content. This could provide the user of the IP-STB with a lot of new services and was the stating point for my thesis work.</p><p>The goal of this thesis was to make a broad investigation of different content sources on the Internet and to adapt an IP-STB to one of them. </p><p>The investigation focused on streaming media content and how it was distributed over the Internet. It resulted in a representative overview of the streaming media content available and how the content is distributed. The IP-STB was adapted to handle the Streaming HTTP protocol which made it possible to listen to web radio transmissions from Sveriges Radio and other providers using the same protocol for their distribution.</p>
8

An Internet content overview and implementation on an IP based set-top box

Widborg, Linus January 2006 (has links)
This thesis covers the investigation of different content sources on the Internet and the analysis of the requirements they put on a set-top box. It also covers the adaptation of the set-top box to one of these sources. An IP based set-top box (IP-STB) is mainly constructed for access to TV and video distributed over a high speed network. The IP-STB is also connected to the Internet and it potentially has access to all of the Internet based content. This could provide the user of the IP-STB with a lot of new services and was the stating point for my thesis work. The goal of this thesis was to make a broad investigation of different content sources on the Internet and to adapt an IP-STB to one of them. The investigation focused on streaming media content and how it was distributed over the Internet. It resulted in a representative overview of the streaming media content available and how the content is distributed. The IP-STB was adapted to handle the Streaming HTTP protocol which made it possible to listen to web radio transmissions from Sveriges Radio and other providers using the same protocol for their distribution.
9

Proměny konzumace internetového obsahu podle typu zařízení / Changes in online content conspumtion by the type of device

Libecajtová, Tereza January 2013 (has links)
This thesis deals with the changes in the pattern of Internet content consumption caused by the new types of device, such as smart phones and tablets. In the second Chapter following the introduction, these devices are introduced, as well as their users. The third and crucial chapter first discusses how changed the activities that we have performed on a PC or laptop. The next section presents a completely new activities that occurred up with smart phones such as geolocation games and mobile tagging. The fourth chapter focuses on the mobile internet in the Czech Republic. Part of this charter is a private research / comparison of 100 most visited websites, when the endpoint was to determine how the authors of these sites are prepared for mobile visitors. Powered by TCPDF (www.tcpdf.org)
10

論網路匿名言論之保障-以身分揭露程序為中心 / A Study on the Protection of Anonymous Online Speech: Focusing on the Procedure for Disclosing the Identity of Anonymous Speakers

鍾安, Chung, An Unknown Date (has links)
在網路世界中,人們以匿名表達意見遠比現實生活中更為容易,這件事已劇烈地改變了匿名言論的量與質。從好的面向看,匿名帶來自主,讓異議者可以透過網路匿名,表達可能永遠都不敢在眾人面前說出來的真正想法,讓觀念市場變得多元豐富;另一方面,匿名提高了追究責任的困難。相較於現實世界的言論,損害他人或構成犯罪的惡質網路匿名言論,將造成影響更深遠且永久的傷害。   目前,關於網路匿名言論的管制方式,世界各國政府都是仰賴「事後追懲模式」和「實名認證模式」的其中一種。前者是網路使用者原則上可以匿名地發表言論,但如果發表不當言論並造成傷害,受害者或國家可以揭露其身份以對其展開司法追訴;後者是網路使用者在張貼言論前,必須先向國家機關指定的網路業者交出個人真實身份資料以進行驗證後,才能匿名發言,或甚至完全禁止以匿名方式發言,讓網路使用者感受到被眾人監督的壓力,不敢發表不當內容。   本文主張,網路匿名言論是受到憲法所保障的權利,而「事後追懲模式」相較於「實名認證模式」,較能調和不同權利間的衝突。不過,儘管我國政府採取此模式,卻在設計民刑事訴訟制度時,漏未導入匿名言論權利的思考,導致網路匿名表意者一經策略性訴訟攻擊,真實身份就會立即暴露,使得匿名表意自由不過徒有虛幻表象。因此,本文建議,為落實對匿名言論自由的保護,立法者宜參考美國法,修改部分訴訟法來處理此問題。 / On the internet, people can express themselves anonymously far easier than in the physical world. This fact has dramatically changed both the quantities and qualities of anonymous speech. On the bright side, anonymity brings more autonomy. Dissenters can express their real opinions, which they might never have the courage to speak out in public. It, in turn will promote the diversity and integrity of the marketplace of ideas. Yet, anonymity also makes it more difficult to hold the speakers accountable. In addition, compared to speech in the real physical world, malicious online anonymous speech will cause more serious permanent harms.   Today, governments around the world are either relying on the “Ex Post Compensation and Punishment” approach or the “Real-Name Verification System” to regulate online anonymous speech. Under the former approach, internet users can express their opinions anonymously, but if the content of their speech is malicious and causes damages to other people, the victim can seek disclosure of the speaker’s identity in order to take legal actions against the speaker. In contrast, under the latter system, internet users have to provide their personal information (real identities) to the ISPs or ICPs appointed by governments and complete the verification process before they can post their words. Some real name systems go even further by banning anonymous speech completely. By making users feel like they are being supervised by the public, the real name system wishes to deter indecent contents   This thesis argues that online anonymous speech is protected by the Constitution, and the ‘Ex Post Compensation and Punishment’ is a preferred approach because it can better balance the conflicting rights. In Taiwan, although the government has chosen the ‘Ex Post Compensation and Punishment’ approach, current civil/criminal procedural laws and practices afford little protection to online anonymous speakers. The plaintiff, who is allegedly harmed by the anonymous speech, can easily bring a “Strategic Lawsuit,” with the sole purpose of obtaining the identity of the online anonymous speaker. Consequently, this thesis suggests that, in order to better protect the freedom of anonymous speech, the legislators of Taiwan should refer to U.S. laws and practices and revise several provisions of Taiwan’s Code of Civil Procedure and Code of Criminal Procedure.

Page generated in 0.0847 seconds