• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 113
  • 24
  • 18
  • 18
  • 15
  • 9
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 236
  • 74
  • 55
  • 41
  • 35
  • 35
  • 30
  • 29
  • 27
  • 26
  • 26
  • 26
  • 24
  • 23
  • 22
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
181

Leader Emergence and Effectiveness in Virtual Workgroups: Dispositional and Social Identity Perspectives

Hite, Dwight M. 08 1900 (has links)
In today's global competitive environment, many organizations utilize virtual workgroups to overcome geographic and organizational boundaries. Research into their dynamics has received the attention of scholars within multiple disciplines, and the potential for an integrative approach to the study of virtual workgroups exists. This dissertation is a first step towards such an approach. The primary aim of this research is to examine antecedent and contextual factors that affect the emergence and effectiveness of leaders in virtual workgroups. To achieve this aim, an integrative model assembled from theory and empirical findings in leadership, management, social identity, and communications research is posited. Hypothesized relationships depicted in the model identify key dispositional and contextual variables linked to leader emergence, member behavior, and leader effectiveness within virtual workgroups. This study employed a nonexperimental research design, in which leader emergence and social identity manifest as naturally occurring phenomena. Data collection occurred via two web-based surveys administered at different points in time. Hypothesized relationships were tested utilizing correlational and hierarchical moderated multiple regression analyses. The findings of this dissertation suggest that traits, such as personality and cognitive ability, are not associated with leader emergence in virtual workgroups. In addition, the results indicate that the exhibition of relationship-oriented leader behaviors enhances group identity. In turn, identification is associated with increases in perceptions of leader effectiveness and decreases in counterproductive behavior exhibited by group members. This dissertation exposes an important limitation to the application of trait leadership theory. It also demonstrates the importance of relationship-oriented behavior and social identity in virtual contexts. Further, it advances an integrative theoretical model for the study of virtual workgroup phenomena. These contributions should assist and inform other researchers, as well as practitioners, interested in leadership and group member behavior in virtual workgroups.
182

Essai sur le don d'ovocytes : questionnements éthiques dans le monde d’aujourd’hui / Egg donation : questionings ethiques in the world of today

Chevallier, Betty 19 December 2011 (has links)
Les nouvelles pratiques d’aide médicale à la procréation, notamment celle qu’on appelle « le don d’ovocyte » bouleverse le sens de la parentalité. Elle oblige chacun d’entre nous à expliciter ses conceptions de la vie, à énoncer ses priorités, mais elle oblige aussi la collectivité à prendre conscience d’elle-même et de ce qui peut être acceptable. Est-il moralement satisfaisant qu’une femme donne ses ovocytes pour qu’une autre ait un enfant ?En interrogeant 50 donneuses d’ovocytes, ce travail a cherché à mieux comprendre la signification d’un tel geste.La procréation par don, défie nos habitudes et nos manières de penser. Elle nous réinterroge sur notre capacité de fraternité comme réponse d’un appel de l’un pour l’autre, elle cherche à donner une juste place à ce tiers-donneur qui s’insinue (presque malgré lui) dans un arbre généalogique. Elle bouleverse notre rapport à l’enfant qui se pose comme « un ayant droit à connaître ses origines ». En définitive, ce n’est pas tant la question de l’anonymat du don qui nous importe que ce qu’il en est de l’homme, de son altérité et de ses responsabilités / Reproductive technology, in particular oocyte or egg donation, upsets the meaning of parenthood and raises questions about the circumstances surrounding those who decide to have a child by means of this technology. A woman using egg donation must come to grips with questions such as the meaning of life, and what it means to be a mother. But it also requires that society become aware of what is morally acceptable. Is it morally acceptable for the egg donor to give her eggs to anotherwoman who wants to have a child? We would like to gloss over these issues by the power of love or by the growth of the uterus, but these issues will remain in the minds of everyone and will circulate in the subconscious. The purpose of this essay is to grapple with these issues. Reproduction by gift, it challenges our habits and ways of thinking. It causes us to re-examine the companionship among two people, it creates a role for the egg donor who, almost despite herself, inserts herself into the family tree. It disrupts the relationship being the parents and the child who demands the right to know where they came from. Ultimately, the focus rests not on the anonymity of the egg donor but on the father, his otherness and his responsibility.
183

Anonymita v P2P sítích / Anonymity in P2P Networks

Brunai, Adam January 2014 (has links)
Freedom of speech and the right to privacy are maybe the most important elements of a modern society, yet the rights are often violated. This fact was the main reason for writing this thesis covering P2P network models, anonymity, censorship resistance and their use in real P2P networks and publishing systems. We discuss their effectiveness and suitability for specific purposes, but also the security considerations of their use. The second part of this thesis presents the LSPP publishing protocol, which is an library implementation of an anonymous censorship resistant P2P network. Finally, we analyze the proposed protocol and compare it with existing solutions.
184

Systém anonymního sběru dat / System of anonymous data collection

Troják, David January 2015 (has links)
This thesis deals with contemporary approaches that provide higher protection of privacy of users. It focuses mainly on a group signature. In the practical part of this thesis I designed and implemented PS that is enable to gather information with the help of signal of a mobile device. The application was designed in accordance with fundamental cryptographic requirements such as the authenticity and the integrity of transmitted data. The anonymity of users is guaranteed through an application layer (the group signature) as well as through a network layer (Tor).
185

How reliable are the marginal totals in cooperation experiments in the laboratory?

Berger, Roger January 2013 (has links)
Subjects in laboratory experiments are prone to effects of social desirability. This reactive behavior is due to the subjects perceived anonymity in the entire experiment. Especially, socially desirable behavior is also triggered by assembling and/or payment procedures that are not anonymous. Indeed, in a laboratory experiments with a one-shot prisoner’s dilemma (PD) and perfect stranger anonymity subjects (n=174) showed significantly different cooperation rates depending on the anonymity conditions during assembling and the payment procedure, ranging from 33.3% to 19.9%. In addition, a first experiment with the PD and anonymous payment and double blind experimenting lead to a cooperation rate of 33.3%. Only after the same subjects (n=34) took part a second time in same, entire experiment, the cooperation rate fell to 8.8%. Therefore this measurement of the cooperation rates in a laboratory experiment failed the test-retest check on reliability. This happened though all manipulations used fulfilled the standards of fully anonymous experimenting. This means that such processes could go unnoticed and bias the results of any standard laboratory experiment on cooperation in one shot decisions. Therefore, in accordance with the textbook logic of laboratory experiments, but in contrast to a common practice (cf. Behavioral Game Theory) marginal totals from cooperation experiments in the laboratory should not be interpreted.
186

Dudle: Mehrseitig sichere Web 2.0-Terminabstimmung

Kellermann, Benjamin 16 December 2011 (has links)
Es existiert eine Vielzahl an Web 2.0-Applikationen, welche es einer Gruppe von Personen ermöglichen, einen gemeinsamen Termin zu finden (z. B. doodle.com, moreganize.ch, whenisgood.net, agreeadate.com, meetomatic.com, etc.) Der Ablauf ist simpel: Ein Initiator legt eine Terminumfrage an und schickt den Link zu der Umfrage zu den potentiellen Teilnehmern. Nachdem jeder Teilnehmer der Anwendung seine Verfügbarkeiten mitgeteilt hat, kann anhand dieser Informationen ein Termin gefunden werden, der am besten passt. Maßnahmen um die Vertraulichkeit und Integrität der Daten zu schützen finden in allen bestehenden Applikationen zu wenig Beachtung. In dieser Dissertation wurde eine Web 2.0-Applikation entwickelt, welche es zulässt Terminabstimmungen zwischen mehreren Teilnehmern durchzuführen und dabei möglichst wenige Vertrauensannahmen über alle Beteiligten zu treffen.:1. Einleitung 1 2. Anforderungsanalyse 3 2.1. Begriffsdefinitionen/Primärfunktionalität . . . . . . . . . . . . . . . . . . . 3 2.2. Anforderungen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.2.1. Benutzbarkeit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.2.2. Mehrseitige Sicherheit . . . . . . . . . . . . . . . . . . . . . . . . . 10 2.2.3. Beziehungen der Anforderungen . . . . . . . . . . . . . . . . . . . . 13 3. Abstimmungsverfahren mit mindestens einer vertrauenswürdigen Entität 15 3.1. Existierende Verfahren mit vertrauenswürdigem Serveradministrator . . . 15 3.1.1. Ohne Zugriffskontrolle . . . . . . . . . . . . . . . . . . . . . . . . . 15 3.1.2. Schutz gegen außenstehende Angreifer . . . . . . . . . . . . . . . . 16 3.1.3. Schutz gegen angreifende Teilnehmer . . . . . . . . . . . . . . . . . 18 3.1.4. Schutz gegen den Netzwerkbetreiber . . . . . . . . . . . . . . . . . 20 3.1.5. Zusammenfassung . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 3.2. Neue Verfahren mit vertrauenswürdigen Teilnehmern . . . . . . . . . . . . 20 3.2.1. Allen Teilnehmern vertrauen . . . . . . . . . . . . . . . . . . . . . 22 3.2.2. Nur dem Umfrageinitiator vertrauen . . . . . . . . . . . . . . . . . 23 3.2.3. Ausblick auf Schemata ohne vertrauenswürdige Entitäten . . . . . 25 3.2.4. Zusammenfassung . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 4. Abstimmungsverfahren ohne vertrauenswürdige Entitäten 29 4.1. Existierende Verfahren . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 4.1.1. E-Voting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 4.1.2. Verteilte Constraint-Optimierung . . . . . . . . . . . . . . . . . . . 33 4.1.3. Spezifische Terminplanungsprotokolle . . . . . . . . . . . . . . . . . 34 4.2. Einfaches Schema für protokolltreue Teilnehmer . . . . . . . . . . . . . . . 34 4.2.1. Umfrageerstellung . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 4.2.2. Stimmenabgabe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 4.2.3. Ergebnisveröffentlichung . . . . . . . . . . . . . . . . . . . . . . . . 36 4.3. Erweiterung des Schemas auf protokollverletzende Angreifer innerhalb der Teilnehmer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 4.3.1. Angriffe erkennen . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 4.3.2. Angreifer identifizieren . . . . . . . . . . . . . . . . . . . . . . . . . 43 4.4. Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 4.4.1. Integrität . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 4.4.2. Verfügbarkeit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 4.4.3. Vertraulichkeit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 4.4.4. Blockierende Protokollrunden . . . . . . . . . . . . . . . . . . . . . 57 4.4.5. Reaktionszeit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 4.4.6. Installationsaufwand . . . . . . . . . . . . . . . . . . . . . . . . . . 64 4.4.7. Flexibilität . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 4.5. Erweiterungen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 4.5.1. Teilnehmer dynamisch hinzufügen/entfernen . . . . . . . . . . . . . 64 4.5.2. Präferenzwahl . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 4.5.3. Stimmenupdate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 5. Implementierung 69 5.1. Verfahren mit vertrauenswürdigem Serveradministrator . . . . . . . . . . . 69 5.1.1. YATA – Yet Another Terminabstimmungsapplikation . . . . . . . . 69 5.1.2. Schutz gegenüber dem Netzwerkbetreiber . . . . . . . . . . . . . . 75 5.2. Verfahren ohne vertrauenswürdigem Serveradministrator . . . . . . . . . . 77 5.2.1. Symmetrische Verschlüsselung, symmetrische Authentifikation . . . 78 5.2.2. Symmetrische Verschlüsselung, digitale Signatur . . . . . . . . . . . 80 5.2.3. Asymmetrische Verschlüsselung an den Initiator . . . . . . . . . . . 81 5.2.4. Minimal benötigtes Vertrauen in alle Entitäten . . . . . . . . . . . 83 5.3. Kryptographie mit JavaScript . . . . . . . . . . . . . . . . . . . . . . . . . 88 5.3.1. Schlüsselspeicherung . . . . . . . . . . . . . . . . . . . . . . . . . . 88 5.3.2. Blockieren der JavaScript-Berechnungen vermeiden . . . . . . . . . 94 5.3.3. Performanceverbesserung der JavaScript-Berechnungen . . . . . . . 96 5.3.4. JavaScript-Code vertrauen . . . . . . . . . . . . . . . . . . . . . . . 97 6. Zusammenfassung und Ausblick 99 Literatur xvii A. Entropie eines Verfügbarkeitsvektors xxv A.1. Beispiel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxv A.2. Allgemeine Berechnung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxv B. Stimmenabgabe (min. Vertrauen) xxvii C. Ergebnisveröffentlichung (min. Vertrauen) xxix D. Schlüsseltransportmechanismus 2 nach ISO/EIC 1170-3 xxxi / Applications which help users to schedule events are becoming more and more important. A drawback of most existing applications is, that the preferences of all participants are revealed to the others. We propose a schemes, which are able to schedule events in a privacy-enhanced way. In addition, Dudle, a Web 2.0 application is presented which implements these schemes.:1. Einleitung 1 2. Anforderungsanalyse 3 2.1. Begriffsdefinitionen/Primärfunktionalität . . . . . . . . . . . . . . . . . . . 3 2.2. Anforderungen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.2.1. Benutzbarkeit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.2.2. Mehrseitige Sicherheit . . . . . . . . . . . . . . . . . . . . . . . . . 10 2.2.3. Beziehungen der Anforderungen . . . . . . . . . . . . . . . . . . . . 13 3. Abstimmungsverfahren mit mindestens einer vertrauenswürdigen Entität 15 3.1. Existierende Verfahren mit vertrauenswürdigem Serveradministrator . . . 15 3.1.1. Ohne Zugriffskontrolle . . . . . . . . . . . . . . . . . . . . . . . . . 15 3.1.2. Schutz gegen außenstehende Angreifer . . . . . . . . . . . . . . . . 16 3.1.3. Schutz gegen angreifende Teilnehmer . . . . . . . . . . . . . . . . . 18 3.1.4. Schutz gegen den Netzwerkbetreiber . . . . . . . . . . . . . . . . . 20 3.1.5. Zusammenfassung . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 3.2. Neue Verfahren mit vertrauenswürdigen Teilnehmern . . . . . . . . . . . . 20 3.2.1. Allen Teilnehmern vertrauen . . . . . . . . . . . . . . . . . . . . . 22 3.2.2. Nur dem Umfrageinitiator vertrauen . . . . . . . . . . . . . . . . . 23 3.2.3. Ausblick auf Schemata ohne vertrauenswürdige Entitäten . . . . . 25 3.2.4. Zusammenfassung . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 4. Abstimmungsverfahren ohne vertrauenswürdige Entitäten 29 4.1. Existierende Verfahren . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 4.1.1. E-Voting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 4.1.2. Verteilte Constraint-Optimierung . . . . . . . . . . . . . . . . . . . 33 4.1.3. Spezifische Terminplanungsprotokolle . . . . . . . . . . . . . . . . . 34 4.2. Einfaches Schema für protokolltreue Teilnehmer . . . . . . . . . . . . . . . 34 4.2.1. Umfrageerstellung . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 4.2.2. Stimmenabgabe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 4.2.3. Ergebnisveröffentlichung . . . . . . . . . . . . . . . . . . . . . . . . 36 4.3. Erweiterung des Schemas auf protokollverletzende Angreifer innerhalb der Teilnehmer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 4.3.1. Angriffe erkennen . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 4.3.2. Angreifer identifizieren . . . . . . . . . . . . . . . . . . . . . . . . . 43 4.4. Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 4.4.1. Integrität . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 4.4.2. Verfügbarkeit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 4.4.3. Vertraulichkeit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 4.4.4. Blockierende Protokollrunden . . . . . . . . . . . . . . . . . . . . . 57 4.4.5. Reaktionszeit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 4.4.6. Installationsaufwand . . . . . . . . . . . . . . . . . . . . . . . . . . 64 4.4.7. Flexibilität . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 4.5. Erweiterungen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 4.5.1. Teilnehmer dynamisch hinzufügen/entfernen . . . . . . . . . . . . . 64 4.5.2. Präferenzwahl . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 4.5.3. Stimmenupdate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 5. Implementierung 69 5.1. Verfahren mit vertrauenswürdigem Serveradministrator . . . . . . . . . . . 69 5.1.1. YATA – Yet Another Terminabstimmungsapplikation . . . . . . . . 69 5.1.2. Schutz gegenüber dem Netzwerkbetreiber . . . . . . . . . . . . . . 75 5.2. Verfahren ohne vertrauenswürdigem Serveradministrator . . . . . . . . . . 77 5.2.1. Symmetrische Verschlüsselung, symmetrische Authentifikation . . . 78 5.2.2. Symmetrische Verschlüsselung, digitale Signatur . . . . . . . . . . . 80 5.2.3. Asymmetrische Verschlüsselung an den Initiator . . . . . . . . . . . 81 5.2.4. Minimal benötigtes Vertrauen in alle Entitäten . . . . . . . . . . . 83 5.3. Kryptographie mit JavaScript . . . . . . . . . . . . . . . . . . . . . . . . . 88 5.3.1. Schlüsselspeicherung . . . . . . . . . . . . . . . . . . . . . . . . . . 88 5.3.2. Blockieren der JavaScript-Berechnungen vermeiden . . . . . . . . . 94 5.3.3. Performanceverbesserung der JavaScript-Berechnungen . . . . . . . 96 5.3.4. JavaScript-Code vertrauen . . . . . . . . . . . . . . . . . . . . . . . 97 6. Zusammenfassung und Ausblick 99 Literatur xvii A. Entropie eines Verfügbarkeitsvektors xxv A.1. Beispiel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxv A.2. Allgemeine Berechnung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxv B. Stimmenabgabe (min. Vertrauen) xxvii C. Ergebnisveröffentlichung (min. Vertrauen) xxix D. Schlüsseltransportmechanismus 2 nach ISO/EIC 1170-3 xxxi
187

Toxiska kulturen: Deskriptiva normaliseringen av toxiska beteenden i MMORPG

Edlund, Linus, Sellgren, Julius January 2022 (has links)
Den här uppsatsen undersöker MMORPG-spelares uppfattningar och erfarenheter av toxiskt beteende. Huvudsyftet med uppsatsen är att ge bredare perspektiv om deskriptiva normativa uppfattningar kring toxiska beteenden bland MMORPG-spelare, hur detta påverkar spelarnas beteenden samt hur det påverkar spelarbasen. Studien utförs med en intervju-orienterad kvalitativ undersökningsmetod. Utgångspunkten för studien är de teoretiska ramverken om deskriptiva normativa uppfattningar och online-hämningslöshetseffekten som utgör grunden för rekrytering av deltagarna samt intervjufrågorna. Studiens resultat påvisar att det finns indikationer på att det finns ytterligare faktorer som påverkar normaliseringen av toxiska beteenden hos individer än de som är direkt relaterade till spelandet. Studien visar att spelare anser att belöningar är en bättre lösning än bestraffningar för att förbättra deras beteenden. Deltagarnas egna beteenden förändrades i relation till deras egna uppfattningar huruvida spelsamhällets norm är att vara toxisk eller inte. Denna innebär en direkt påverkan av det normaliserade beteendet i den sociala miljön. Slutligen konstaterades att deltagarnas motivation att fortsätta spela minskade när de kommit i kontakt med toxiska beteenden. / This essay examines MMORPG players’ normative perceptions of toxic behavior. The primary purpose of this essay is to provide additional perspectives on normative perceptions about toxic behaviors among MMORPG players, how this affects player behaviors, and how it affects the player base. The study utilizes a qualitative research method with a theoretically essentially latent approach. The starting point for the study is the theoretical frameworks theory of normative beliefs and online disinhibition effect, which is the basis for recruitment of the participants and the interview questions. The results demonstrate additional aspects which affect the normalization of toxic behaviour other than gaming-related factors. Further, players believe that rewards are a better solution than penalties for improving their behavior. The participants’ behavior changed concerning their perceptions of whether the game’s norm is to be toxic or not. The players’ behavior is thus directly affected by the normalized behavior in the social environment. Finally, players describe motivation to continue playing decreased when they came in contact with toxic behaviour.
188

Diskuse k zpravodajským článkům na sociálních sítích / Discussions on News Articles on social Networks

Rozsypalová, Blanka January 2021 (has links)
The thesis focuses on discussions under news articles shared by news servers on the social network Facebook. The aim of this work is to summarize the existing understanding of the topic. Therefore, theoretical concepts connected to the topic are summarized. The thesis focuses on communication, online communication and the presence of news servers on social networks, as well as on the topic of anonymity on social networks and how anonymity can affect discussions. A chapter of the thesis focuses on the spiral of silence and its possible occurrence in discussions. Further, the thesis focuses on the freedom of speech as well as the new ways social networks are trying to fight disinformation and hate online. The empirical part focuses on how Facebook users view the use of social networks by news servers. Another part of the thesis focuses on a group of volunteers called #jsmetu. This group tries to make sure discussions are factual and are free from personal attacks and vulgarity. Three discussions are analysed - discussions #jsmetu took part in. The thesis investigates the influence #jsmetu has on discussions. Due to the topic of the thesis being a very current one, the thesis suggests more areas for further research.
189

Incarnational Fruit: Authorization and Women's Anonymous Seventeenth-Century Devotional Writing

Ellens, Jantina January 2021 (has links)
This dissertation asserts that women’s anonymity in seventeenth-century devotional texts functions as a performance to be understood rather than a mystery to be solved. Anonymity has long been framed as merely a protean form of authorship or a barrier to the recovery of a lost literary history. The archive frequently renders anonymity invisible or reveals anonymity at the moment of its undoing; however, this study of women’s anonymity contends that, although women applied anonymity to avoid the stigma of print, their anonymity functions less as a blind than as a frame to emphasize those traits they wished most to expose. In my first and second chapters, I demonstrate how the anonymous Eliza’s Babes (1652) and the nearly anonymous An Collins’s Divine Songs and Meditacion (1653) use the anonymous text to replace the signification of sick, infertile, and therefore volatile female bodies with an imitative production of devotion that constitutes the text as a divinely-restored, alternatively-productive body through which they relate to God and reader. Readers’ positive reception of this devotional re-signification of the body’s productivity countermands stereotypes readers hold against women writing, affirms the woman writer as faithful, and reincorporates both reader and writer in a corporate body of believers through their mutual participation in devotional practices. My third chapter affirms the perceived authority of anonymity’s corporate voice through the exploration of George Hickes’s retroactive attribution of several late seventeenth-century anonymous devotional texts to Susanna Hopton. I argue that the derivative nature of the anonymous devotional collections invests them with a corporate voice Hickes finds to be a valuable asset in his defense of Hopton’s devotional acumen. Drawing together scholarship on seventeenth-century relationality and intersubjectivity, readership, devotion, and women’s health, this study reconsiders the signification of women’s anonymity and their unoriginality as a tool that facilitates agentive reading and rehabilitates women’s claim to corporate belonging. / Thesis / Doctor of Philosophy (PhD)
190

The virtual experience: A qualitative study among young adults on their perception of Facebook Metaverse / Den virtuella upplevelsen: En kvalitativ studie bland unga vuxna om deras uppfattning av Facebook Metaverse

Israel, Wasaja January 2022 (has links)
This thesis investigates reactions of young people in Malmö-Sweden about the proposed Facebook Metaverse. Gauging young people’s association/reactions about Facebook Metaverse before its practical existence is the study's main focus. The thesis assesses Web 2.0 as a pivotal mark that enabled development of social networks and virtual worlds like Facebook Metaverse. Through qualitative interviews and semiotic analysis in data collection, three main themes became noted as both theoretical perspectives and findings of the study that entails the young people's opinions on the soon to be launched Facebook Metaverse. The 3 themes are; Connectivity & interactivity, Anonymity and identity, and Datafication, privacy & commercialisation. The results highlight pros and cons with the Facebook metaverse that encompasses risks of intrusive data collection, possibilities for self-empowerment through avatars and new ways of communicating. The thesis concludes with a created artifact/altered video that presents a critical aspect of Mark Zuckerberg’s version of the Facebook Metaverse informed by the research. / Young adults’ perception of Facebook Metaverse in less than 11 minutes

Page generated in 0.0442 seconds