Essays about: "functions of effective communication"
Showing result 1 - 5 of 39 essays containing the words functions of effective communication.
-
1. Potential and Limitations of the Sketch Map Tool in the International Red Cross Red Crescent Movement
University essay from Lunds universitet/Avdelningen för Riskhantering och SamhällssäkerhetAbstract : In disaster risk management, participatory mapping (PM) closes spatial data gaps in communities by integrating local risk knowledge. The thesis examined the potential and limitations of the Sketch Map Tool (SMT) as a PM tool for community-based disaster risk reduction (DRR) through an International Red Cross Red Crescent Movement case study. READ MORE
-
2. Documentary as a Medium to Advance a Public Apology to Comfort Women in a Transitional Justice Context
University essay from Malmö universitet/Institutionen för konst, kultur och kommunikation (K3)Abstract : This thesis explores how the documentary film The Apology (as a medium) and its filmmaker (as a carrier group) functions as connection points between cultural trauma and transitional justice reparations driving social change. Earlier approaches to bringing justice to comfort women have been based on legal frameworks which this thesis considers restrictive and instead examines justice and reparations from a victim-centred perspective. READ MORE
-
3. The exploration about the textual internet meme: a case study of KFC Crazy Thursday textual meme marketing activity in mainland China
University essay from Lunds universitet/Institutionen för strategisk kommunikationAbstract : In the digital era, the way people communicate has been greatly changed by information and communication technologies, such as social media. Internet memes spread virally among the public through social media platforms and utilized by contemporary people to communicate in the virtual world. READ MORE
-
4. Authentication Techniques Based on Physical Layer Attributes
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Authentication is an indispensable part of information security. It serves to distinguish legitimate users from unauthorized ones. With the rapid growth of Internet of Things (IoT) devices, authentication of wireless communication is gathering more and more attention. READ MORE
-
5. Leadership change when scaling up in an entrepreneurial setting
University essay from Blekinge Tekniska Högskola/Institutionen för industriell ekonomiAbstract : As start-ups reach a point where they must seek new markets or otherwise expand its business to find a sustainable operational level, they enter the scaling phase. As scaling poses several new or changed parameters as well as challenges for the venture, the question of how the leadership changes arises when scaling. READ MORE