• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 46
  • 25
  • 13
  • 6
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 117
  • 26
  • 22
  • 19
  • 18
  • 17
  • 13
  • 13
  • 12
  • 11
  • 11
  • 10
  • 10
  • 10
  • 10
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

As figuras de argumentação como estratégias discursivas. Um estudo de avaliações no ensino superior / Rhetoric figures as discoursive strategies. A study in proofs in the university

Marcia Regina Curado Pereira Mariano 18 October 2007 (has links)
Este trabalho pretende levantar questões relativas ao uso e aos efeitos provocados pela utilização de estratégias argumentativas no discurso. Para exemplificar a importância de tais estratégias na construção da significação no uso da linguagem, elegemos como objeto de análise um discurso em especial, o pedagógico, e, dentro dele, optamos pelo estudo das avaliações no ensino superior, especificamente, das provas escritas, representantes do poder da linguagem no processo ensino/aprendizagem e do conflito existente na relação professor-aluno. A partir deste recorte metodológico, repensaremos, em especial, as figuras de argumentação e retórica, estratégias discursivas inesperadas - causam o efeito de surpresa no discurso - e privilegiadas, na medida em que permitem analisar não apenas o fazer persuasivo do enunciador, bem como a construção do ethos dos sujeitos envolvidos na situação comunicativa. Acreditamos que em todos os tipos de discurso a linguagem pode ser utilizada não apenas para convencer um interlocutor, mas para persuadi-lo. Tal fato nos leva a buscar no discurso do aluno quais são as estratégias utilizadas para este fim, e a tentar identificá-las dentro de um quadro teórico e metodológico discursivo. Para tanto, empreendemos um retorno às origens histórico-pedagógicas da avaliação, recorremos à Retórica Aristotélica e às Neo-Retóricas, à Teoria Semiótica de Greimas, à Teoria dos Gêneros do Discurso de Bakhtin, e a estudos sociossemióticos e discursivos que privilegiam questões como a construção da identidade individual e social dos sujeitos por meio do discurso e os aspectos interacionais envolvidos nas relações sociais. / The proposal of this work is to produce questions about the use of argumentatives strategies in the discourse, as well as questions about the effect of this use. To analyze the importance of these strategies during the construction of the meaning, we choose a special type of discourse, the pedagogical discourse, and inside of it, we have decided to analyze the proofs in the university, more specifically, the written proofs, because they are representative of the language´s power in the education and learning process and of the existing conflict between professor and students. From this method, we will analyze, in special, the argument and rhetoric figures and the unexpected and privileged discoursive strategies - because they cause surprise in the discourse and allow to analyze the construction of the ethos of the involved people in the communication situation. We believe that the language can be used to persuade an interlocutor and to convince him, not importing the type of discourse used. This fact makes us to search in the students´ discourse the used strategies and trying to identify them into inside of a theoretical, methodologic and discoursive frame. With this objective, we made a visit to the historical and pedagogical origins of the proofs, we appeal to the Aristotelian Rhetoric and the Neo-Rhetorical, to the Greimas´ Semiotics Theory and the Bakhtin´s work, and to the sociossemiotic and discoursive studies that privilege questions, as the construction, through the discourse, of the individual and social identity of the people, and aspects that are involved in the social relations.
42

O uso das tecnologias digitais com crianças de 7 meses a 7 anos : como as crianças estão se apropriando das tecnologias digitais na primeira infância?

Silva, Patrícia Fernanda da January 2017 (has links)
O avanço das tecnologias vem sendo impulsionado por ferramentas como internet móvel, touchscreen, wirelles, dentre outras, possibilitando que o manuseio com auxílio destes dispositivos seja cada vez mais fácil e intuitivo, não necessitando de um tutorial ou mesmo de uma explicação completa por parte dos usuários para acessá-los. Desta forma, qualquer pessoa que tenha computador, celular, smartphone ou tablet conectado à internet, poderá produzir um vídeo, um texto ou uma imagem e compartilhá-los na rede. Os meios de comunicação e informação tornam-se maiores e menores ao mesmo tempo. Por meio de uma única ferramenta portátil, que comporta diversas mídias é possível que os conteúdos educacionais, e não somente conteúdos, mas informações, revistas, artigos possam ser acessados a qualquer tempo e em qualquer lugar. Diante deste novo paradigma, estar atento à forma com que as tecnologias estão sendo utilizadas pelas crianças, e como elas vêm percebendo este mundo digital se faz necessário. A presente pesquisa tem por objetivo observar e verificar como as crianças de 7 meses a 7 anos de idade estão se apropriando das tecnologias digitais, bem como percebem os atrativos oferecidos por elas. Adotou-se como aporte teórico a Epistemologia Genética de Piaget e suas principais obras sobre o desenvolvimento infantil, para melhor compreender os processos de desenvolvimento da inteligência da criança. Para tanto, a metodologia utilizada foi a aplicação de provas Piagetianas e, posteriormente, a realização desta mesma prova com o uso de recurso tecnológico. Durante estas atividades, foi utilizado o Método Clínico, já a análise das observações e interações das crianças, foi fundamentada a partir de obras de Piaget em que o desenvolvimento da inteligência infantil era abordada. Durante a pesquisa, foi possível observar o nítido interesse das crianças pelos aparelhos e pelas tecnologias digitais. As tecnologias digitais possibilitaram que as crianças realizassem constatações mais aprofundadas do que nas provas Piagetianas, pois os recursos tecnológicos apresentados envolveram diferentes sentidos, bem como proporcionaram que elas descobrissem coisas sem terem que fazer um esforço tão grande como quando trabalham com objetos concretos. O mundo virtual mostrou-se mais atrativo, porque possibilitou às crianças ter a oportunidade de aprender de modo não-formal, e sim fazendo e descobrindo sem seguir uma sequência definida. / The advancement of technologies has been driven by tools such as mobile internet, touchscreen, wirelles, among others, making it easier and more intuitive to handle these devices without requiring a tutorial or even a full explanation for the users to access them. Anyone with a computer, cell phone, smartphone or tablet connected to the internet can produce a video, text or image and share them on the web. Media and information become larger and smaller at the same time. With a single portable tool that contains several media, it is possible that educational content, educational content, general information, magazines, articles can be accessed anytime, anywhere. Facing this new paradigm, being aware of how technologies are being used by children and how they are perceiving this digital world becomes necessary. The present research aims to observe and verify how children from 7 months to 7 years of age are appropriating digital technologies as well as perceiving the attractions offered by them. It was adopted as a theoretical contribution the Piaget's Genetic Epistemology and his main works on child development, in order to better understand the processes of child intelligence development. For this, the methodology used was the application of Piagetian tests and, later, the accomplishment of this same test with the use of technological resources. During these activities, the Clinical Method was used. The analysis of the observations and children‟s interactions was based on works of Piaget in which the development of the child intelligence was approached. During the research, it was possible to observe the clear interest of the children by the devices and the digital technologies. Digital technologies made it possible for children to make more in-depth findings than in Piagetian tests because the technological features presented involved different senses as well as allowing them to discover things without having to make as much effort as when working with concrete objects. The virtual world proved to be more attractive because it enabled children to have the opportunity to learn in a non-formal way, but by doing and discovering without following a definite sequence.
43

O uso das tecnologias digitais com crianças de 7 meses a 7 anos : como as crianças estão se apropriando das tecnologias digitais na primeira infância?

Silva, Patrícia Fernanda da January 2017 (has links)
O avanço das tecnologias vem sendo impulsionado por ferramentas como internet móvel, touchscreen, wirelles, dentre outras, possibilitando que o manuseio com auxílio destes dispositivos seja cada vez mais fácil e intuitivo, não necessitando de um tutorial ou mesmo de uma explicação completa por parte dos usuários para acessá-los. Desta forma, qualquer pessoa que tenha computador, celular, smartphone ou tablet conectado à internet, poderá produzir um vídeo, um texto ou uma imagem e compartilhá-los na rede. Os meios de comunicação e informação tornam-se maiores e menores ao mesmo tempo. Por meio de uma única ferramenta portátil, que comporta diversas mídias é possível que os conteúdos educacionais, e não somente conteúdos, mas informações, revistas, artigos possam ser acessados a qualquer tempo e em qualquer lugar. Diante deste novo paradigma, estar atento à forma com que as tecnologias estão sendo utilizadas pelas crianças, e como elas vêm percebendo este mundo digital se faz necessário. A presente pesquisa tem por objetivo observar e verificar como as crianças de 7 meses a 7 anos de idade estão se apropriando das tecnologias digitais, bem como percebem os atrativos oferecidos por elas. Adotou-se como aporte teórico a Epistemologia Genética de Piaget e suas principais obras sobre o desenvolvimento infantil, para melhor compreender os processos de desenvolvimento da inteligência da criança. Para tanto, a metodologia utilizada foi a aplicação de provas Piagetianas e, posteriormente, a realização desta mesma prova com o uso de recurso tecnológico. Durante estas atividades, foi utilizado o Método Clínico, já a análise das observações e interações das crianças, foi fundamentada a partir de obras de Piaget em que o desenvolvimento da inteligência infantil era abordada. Durante a pesquisa, foi possível observar o nítido interesse das crianças pelos aparelhos e pelas tecnologias digitais. As tecnologias digitais possibilitaram que as crianças realizassem constatações mais aprofundadas do que nas provas Piagetianas, pois os recursos tecnológicos apresentados envolveram diferentes sentidos, bem como proporcionaram que elas descobrissem coisas sem terem que fazer um esforço tão grande como quando trabalham com objetos concretos. O mundo virtual mostrou-se mais atrativo, porque possibilitou às crianças ter a oportunidade de aprender de modo não-formal, e sim fazendo e descobrindo sem seguir uma sequência definida. / The advancement of technologies has been driven by tools such as mobile internet, touchscreen, wirelles, among others, making it easier and more intuitive to handle these devices without requiring a tutorial or even a full explanation for the users to access them. Anyone with a computer, cell phone, smartphone or tablet connected to the internet can produce a video, text or image and share them on the web. Media and information become larger and smaller at the same time. With a single portable tool that contains several media, it is possible that educational content, educational content, general information, magazines, articles can be accessed anytime, anywhere. Facing this new paradigm, being aware of how technologies are being used by children and how they are perceiving this digital world becomes necessary. The present research aims to observe and verify how children from 7 months to 7 years of age are appropriating digital technologies as well as perceiving the attractions offered by them. It was adopted as a theoretical contribution the Piaget's Genetic Epistemology and his main works on child development, in order to better understand the processes of child intelligence development. For this, the methodology used was the application of Piagetian tests and, later, the accomplishment of this same test with the use of technological resources. During these activities, the Clinical Method was used. The analysis of the observations and children‟s interactions was based on works of Piaget in which the development of the child intelligence was approached. During the research, it was possible to observe the clear interest of the children by the devices and the digital technologies. Digital technologies made it possible for children to make more in-depth findings than in Piagetian tests because the technological features presented involved different senses as well as allowing them to discover things without having to make as much effort as when working with concrete objects. The virtual world proved to be more attractive because it enabled children to have the opportunity to learn in a non-formal way, but by doing and discovering without following a definite sequence.
44

Formalisation de preuves de sécurité concrète / Formal Methods For Concrete Security Proofs

Daubignard, Marion 12 January 2012 (has links)
Cette thèse se propose de remédier à l'absence de formalisme dédié aux preuves de sécurité concrète à travers 3 contributions. Nous présentons d'abord la logique CIL (Computational Indistinguishability Logic), qui permet de raisonner sur les systèmes cryptographiques. Elle contient un petit nombre de règles qui correspondent aux raisonnements souvent utilisés dans les preuves. Leur formalisation est basée sur des outils classiques comme les contextes ou les bisimulations. Deuxièmement, pour plus d'automatisation des preuves, nous avons conçu une logique de Hoare dédiée aux chiffrement asymétrique dans le modèle de l'oracle aléatoire. Elle est appliquée avec succès sur des exemples de schémas existants. Enfin, nous proposons un théorème générique de réduction pour la preuve d'indifférentiabilité d'un oracle aléatoire de fonctions de hachage cryptographiques. La preuve du théorème, formalisée en CIL, en démontre l'applicabilité. Les exemples de Keccak et Chop-Merkle-Damgard illustrent ce résultat. / In this thesis, we address the lack of formalisms to carry out concrete security proofs. Our contributions are threefold. First, we present a logic, named Computational Indistinguishability Logic (CIL), for reasoning about cryptographic systems. It consists in a small set of rules capturing reasoning principles common to many proofs. Their formalization relies on classic tools such as bisimulation relations and contexts. Second, and in order to increase proof automation, it presents a Hoare logic dedicated to asymmetric encryption schemes in the Random Oracle Model that yields an automated and sound verification method. It has been successfully applied to existing encryption schemes. Third, it presents a general reduction theorem for proving indifferentiability of iterative hash constructions from a random oracle. The theorem is proven in CIL demonstrating the usefulness of the logic and has been applied to constructions such as the SHA-3 candidate Keccak and the Chop-MD construction.
45

A influência dos sistemas de gerenciamento de cores em provas digitais

Holdschip, Rodrigo [UNESP] 15 April 2008 (has links) (PDF)
Made available in DSpace on 2014-06-11T19:24:10Z (GMT). No. of bitstreams: 0 Previous issue date: 2008-04-15Bitstream added on 2014-06-13T18:51:47Z : No. of bitstreams: 1 holdschip_r_me_bauru.pdf: 1478347 bytes, checksum: c8c5db60db1db165db215dfa841a22b3 (MD5) / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES) / Na indústria gráfica, sempre se buscou o desenvolvimento e aprimoramento de sistemas de provas com o objetivo de simular as características visuais do impresso final podendo assim prever os resultados. Atualmente, avanços tecnológicos em imagens digitais têm modificado a infra-estrutura da indústria gráfica. Demorados sistemas de provas analógicos tem sido substituído por provas digitais. O surgimento de uma infinidade de diferentes dispositivos como scanners, câmeras digitais, impressoras, aliados a uma variedade de processos de produção, substratos, tintas e a adoção de diferentes especificações, tornam a reprodução exata das cores um tanto quanto difícil. Para solucionar este problema sistemas de gerenciamento das cores baseados em perfis de cor ICC (Consórcio Internacional da Cor) tem se tornado o maior aliado. É neste contexto que esta pesquisa pretende avaliar a influência dos sistemas de gerenciamento de cores em impressoras a jato de tinta na obtenção de cores impressas com valores CIELAB próximos aos descritos pelo perfil de cor ISOcoated_v2_eci utilizado como referência, objetivando sua utilização como prova digital de cor com o intuito de simular as características visuais deste padrão, possibilitando uma verificação das cores do trabalho antes de sua impressão. Problemas de insatisfação com relação às cores entre clientes, agências e gráficas também passam a ser minimizados / The influence of the systems of color management in digital proofs. In the graphical industry, always one searched the development and improvement of systems of proofs with the objective to simulate the visual characteristics of the final printed matter thus being able to foresee the results. Currently, technological advances in digital images have modified the infrastructure of the graphical industry. Delayed analogical systems of proofs he been substituted for digital proofs. The sproutng of a infinity of different devices as scanners, digital, printer cameras, allies to a variety of production processes, substrata, inks and the adoption of different specifications, becomes the accurate reproduction of colors on how much in such a way difficult. To solve this problem systems of color management based on profiles of color ICC (International Color Consortium) if it has become the greater ally. It is in this context that this research intends to evaluate the influence of the systems of management of colors in printers the spurt of ink in the attainment of colors printed with values CIELAB next to the described ones for the profile to color used ISOcoated_v2_eci as reference, objectifying its use as digital test of color with intention to simulate the characteristics appearances of this standard, making possible a verification of the colors of the work before its impression. Problems of insatisfation with relation to the colors between custormers, agencies and graphical also pass to be minimezed
46

A influência dos sistemas de gerenciamento de cores em provas digitais /

Holdschip, Rodrigo. January 2008 (has links)
Resumo: Na indústria gráfica, sempre se buscou o desenvolvimento e aprimoramento de sistemas de provas com o objetivo de simular as características visuais do impresso final podendo assim prever os resultados. Atualmente, avanços tecnológicos em imagens digitais têm modificado a infra-estrutura da indústria gráfica. Demorados sistemas de provas analógicos tem sido substituído por provas digitais. O surgimento de uma infinidade de diferentes dispositivos como scanners, câmeras digitais, impressoras, aliados a uma variedade de processos de produção, substratos, tintas e a adoção de diferentes especificações, tornam a reprodução exata das cores um tanto quanto difícil. Para solucionar este problema sistemas de gerenciamento das cores baseados em perfis de cor ICC (Consórcio Internacional da Cor) tem se tornado o maior aliado. É neste contexto que esta pesquisa pretende avaliar a influência dos sistemas de gerenciamento de cores em impressoras a jato de tinta na obtenção de cores impressas com valores CIELAB próximos aos descritos pelo perfil de cor ISOcoated_v2_eci utilizado como referência, objetivando sua utilização como prova digital de cor com o intuito de simular as características visuais deste padrão, possibilitando uma verificação das cores do trabalho antes de sua impressão. Problemas de insatisfação com relação às cores entre clientes, agências e gráficas também passam a ser minimizados / Abstract: The influence of the systems of color management in digital proofs. In the graphical industry, always one searched the development and improvement of systems of proofs with the objective to simulate the visual characteristics of the final printed matter thus being able to foresee the results. Currently, technological advances in digital images have modified the infrastructure of the graphical industry. Delayed analogical systems of proofs he been substituted for digital proofs. The sproutng of a infinity of different devices as scanners, digital, printer cameras, allies to a variety of production processes, substrata, inks and the adoption of different specifications, becomes the accurate reproduction of colors on how much in such a way difficult. To solve this problem systems of color management based on profiles of color ICC (International Color Consortium) if it has become the greater ally. It is in this context that this research intends to evaluate the influence of the systems of management of colors in printers the spurt of ink in the attainment of colors printed with values CIELAB next to the described ones for the profile to color used ISOcoated_v2_eci as reference, objectifying its use as digital test of color with intention to simulate the characteristics appearances of this standard, making possible a verification of the colors of the work before its impression. Problems of insatisfation with relation to the colors between custormers, agencies and graphical also pass to be minimezed / Orientador: João Fernando Marar / Coorientador: Marizilda dos Santos Menezes / Banca: Jairo José Drummond Câmara / Banca: Luiz Antonio Vasques Hellmeister / Mestre
47

An Innovative Approach to Teaching Structural Induction for Computer Science

Polycarpou, Irene 23 May 2008 (has links)
Proofs by induction are central to many computer science areas such as data structures, theory of computation, programming languages, program efficiency-time complexity, and program correctness. Proofs by induction can also improve students’ understanding of and performance with computer science concepts such as programming languages, algorithm design, and recursion, as well as serve as a medium for teaching them. Even though students are exposed to proofs by induction in many courses of their curricula, they still have difficulties understanding and performing them. This impacts the whole course of their studies, since proofs by induction are omnipresent in computer science. Specifically, students do not gain conceptual understanding of induction early in the curriculum and as a result, they have difficulties applying it to more advanced areas later on in their studies. The goal of my dissertation is twofold: 1. identifying sources of computer science students’ difficulties with proofs by induction, and 2. developing a new approach to teaching proofs by induction by way of an interactive and multimodal electronic book (e-book). For the first goal, I undertook a study to identify possible sources of computer science students’ difficulties with proofs by induction. Its results suggest that there is a close correlation between students’ understanding of inductive definitions and their understanding and performance of proofs by induction. For designing and developing my e-book, I took into consideration the results of my study, as well as the drawbacks of the current methodologies of teaching proofs by induction for computer science. I designed my e-book to be used as a standalone and complete educational environment. I also conducted a study on the effectiveness of my e-book in the classroom. The results of my study suggest that, unlike the current methodologies of teaching proofs by induction for computer science, my e-book helped students overcome many of their difficulties and gain conceptual understanding of proofs induction.
48

Preuves symboliques de propriétés d’indistinguabilité calculatoire / Symbolic Proofs of Computational Indistinguishability

Koutsos, Adrien 27 September 2019 (has links)
Notre société utilise de nombreux systèmes de communications. Parce que ces systèmes sont omniprésents et sont utilisés pour échanger des informations sensibles, ils doivent être protégés. Cela est fait à l'aide de protocoles cryptographiques. Il est crucial que ces protocoles assurent bien les propriétés de sécurité qu'ils affirment avoir, car les échecs peuvent avoir des conséquences importantes. Malheureusement, concevoir des protocoles cryptographiques est notoirement difficile, comme le montre la régularité avec laquelle de nouvelles attaques sont découvertes. Nous pensons que la vérification formelle est le meilleur moyen d'avoir de bonnes garanties dans la sécurité d'un protocole: il s'agit de prouver mathématiquement qu'un protocole satisfait une certaine propriété de sécurité.Notre objectif est de développer les techniques permettant de vérifier formellement des propriétés d'équivalence sur des protocoles cryptographiques, en utilisant une méthode qui fournit de fortes garanties de sécurités, tout en étant adaptée à des procédures de preuve automatique. Dans cette thèse, nous défendons l'idée que le modèle Bana-Comon pour les propriétés d'équivalences satisfait ces objectifs. Nous soutenons cette affirmation à l'aide de trois contributions.Tout d'abord, nous étayons le modèle Bana-Comon en concevant des axiomes pour les fonctions usuelles des protocoles de sécurités, et pour plusieurs hypothèses cryptographiques. Dans un second temps, nous illustrons l'utilité de ces axiomes et du modèle en réalisant des études de cas de protocoles concrets: nous étudions deux protocoles RFID, KCL et LAK, ainsi que le protocole d'authentification 5G-AKA, qui est utilisé dans les réseaux de téléphonie mobile. Pour chacun de ces protocoles, nous montrons des attaques existentes ou nouvelles, proposons des versions corrigées de ces protocoles, et prouvons que celles-ci sont sécurisées. Finalement, nous étudions le problème de l'automatisation de la recherche de preuves dans le modèle Bana-Comon. Pour cela, nous prouvons la décidabilité d'un ensemble de règles d'inférences qui est une axiomatisation correcte, bien que incomplète, de l'indistingabilité calculatoire, lorsque l'on utilise un schéma de chiffrement IND-CCA2. Du point de vue d'un cryptographe, cela peut être interprété comme la décidabilité d'un ensemble de transformations de jeux. / Our society extensively relies on communications systems. Because such systems are used to exchange sensitive information and are pervasive, they need to be secured. Cryptographic protocols are what allow us to have secure communications. It is crucial that such protocols do not fail in providing the security properties they claim, as failures have dire consequences. Unfortunately, designing cryptographic protocols is notoriously hard, and major protocols are regularly and successfully attacked. We argue that formal verification is the best way to get a strong confidence in a protocol security. Basically, the goal is to mathematically prove that a protocol satisfies some security property.Our objective is to develop techniques to formally verify equivalence properties of cryptographic protocols, using a method that provides strong security guarantees while being amenable to automated deduction techniques. In this thesis, we argue that the Bana-Comon model for equivalence properties meets these goals. We support our claim through three different contributions.First, we design axioms for the usual functions used in security protocols, and for several cryptographic hypothesis. Second, we illustrate the usefulness of these axioms and of the model by completing case studies of concrete protocols: we study two RFID protocols, KCL et LAK, as well as the 5G-AKA authentication protocol used in mobile communication systems. For each of these protocols, we show existing or new attacks against current versions, propose fixes, and prove that the fixed versions are secure. Finally, we study the problem of proof automation in the Bana-Comon model, by showing the decidability of a set of inference rules which is a sound, though incomplete, axiomatization of computational indistinguishability when using an IND-CCA2 encryption scheme. From a cryptographer's point of view, this can be seen as the decidability of a fixed set of cryptographic game transformations.
49

Exploring philanthropic aspects of public communication campaigns: an analysis of Smokey Bear

Flaxbeard, Helene 09 1900 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / The Smokey Bear Campaign is one of the most popular and recognized public communication campaigns in the United States. The Advertising Council began the Smokey Bear campaign in 1944 and it is the longest running public communication campaign in the United States. Through a rhetorical narrative methodology, this study analyzed Smokey Bear advertising pieces from its inception through the present. The analysis of the advertising pieces was organized by narrative elements of the campaign, such as narration, themes, characters, and major and minor events with a focus on philanthropic composition relating to awareness and behavior change messaging. The following question is answered: what kind of messaging focus does the Smokey Bear campaign deploy and what aspect of philanthropy does the Smokey Bear campaign seem to be achieving? Conclusions on the philanthropic aspects of public communication campaigns are drawn based on the analysis of the Smokey Bear campaign.
50

Twitter Rhetoric: From Kinetic to Potential

Swift, Jeffrey C. 17 June 2010 (has links) (PDF)
Everyone can agree that microblogging service Twitter makes a terrible first impression. Many will agree that this impression is an accurate assessment of many microblogging media, especially considering the narcissistic and egotistical bent that so often dominates the genre. Rhetoricians are justifiably skeptical of microblogging, especially of its rhetorical value (or lack thereof). While many rhetorical scholars have contributed to the field of digital rhetoric, the field of microblogging rhetoric is still undefined. This article examines a new kind of rhetoric exhibited by Twitter, attempting to both start the discussion about Twitter rhetoric and enter the ongoing discussion about theories of rhetoric. As Aristotelian proofs of ethos, pathos, and logos provide the foundation for modern understanding of traditional rhetoric, they will also provide the framework for this analysis of Twitter's iteration of "potential" rhetoric.

Page generated in 0.0572 seconds