Essays about: "Legitimate Language"

Showing result 1 - 5 of 13 essays containing the words Legitimate Language.

  1. 1. Environmental Activism- a Threatening Outside? A Discourse Analysis of a Non-violent Civil Disobedience Protest in Stockholm, Sweden

    University essay from Göteborgs universitet/Institutionen för globala studier

    Author : Kandra Wahlgren Eales; [2023-11-08]
    Keywords : securitisation; discourse analysis; non-violent civil disobedience; poststructuralism; hegemony; deliberative democracy; neoliberalism;

    Abstract : This study examines the identity construction of environmental activists in discourse following a political protest in Stockholm, Sweden. More specifically it aims to understand how environmental activists have been subjected to securitisation, and what underlying ideology supports this perception. READ MORE

  2. 2. Graphic Novels and Reading:The impact of reading graphic novels in theupper secondary classroom

    University essay from Malmö universitet/Institutionen för kultur, språk och medier (KSM)

    Author : Sanna Hedin; Cathrine Flymén; [2023]
    Keywords : Graphic Novel; English as a Foreign Language; Reading Motivation; Reading Comprehension; Multiliteracy; Critical Literacy;

    Abstract : According to recent reports (Dahlberg & Jarnlo, 2021), young Swedish people are amongthose who read the least number of printed books in the world. This study aims to investigatewhat current research postulates regarding how reading graphic novels may affect the readingmotivation, cultural awareness, and critical literacy, among upper secondary school students. READ MORE

  3. 3. Integrating Trust-Based Adaptive Security Framework with Risk Mitigation to enhance SaaS User Identity and Access Control based on User Behavior

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Johnson Akpotor Scott; [2022]
    Keywords : Risk Assessment; Security countermeasure; Risk Management; Risk Mitigation; Adaptive Security Controls; Threats; Risk; Vulnerabilities; User Behavior Trust Degree; User Behavior Risk Rating; Policy Decision Point; Policy Enforcement Point; User Behavior Trust Model; Adaptive Security Architecture; SaaS; Public Cloud.;

    Abstract : In recent years, the emerging trends in cloud computing technologies have given rise to different computing services through the Internet. Organizations across the globe have seized this opportunity as a critical business driver for computing resource access and utilities that will indeed support significant business operations. READ MORE

  4. 4. People and Baboons in Cape Town: Rethinking Interactions with Wildlife in Urban Areas

    University essay from Stockholms universitet/Stockholm Resilience Centre

    Author : Kinga Psiuk; [2022]
    Keywords : wildlife management; human-baboon interactions; Cape Town; values; WVO; Q-method; reflexivity; inclusive conservation;

    Abstract : Humans and wildlife live in increasing proximity, which leads to negative human-wildlife interactions. Management efforts are often focused on “controlling” species that are considered problematic, often downplaying, or even neglecting the perceptions and values of affected communities. READ MORE

  5. 5. Sentiment and growth of different news categories on Twitter : A study in Natural Language Processing

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Navid Haghshenas; Diar Sabri; [2019]
    Keywords : ;

    Abstract : In this age of digitalization, people have begun to change their news consumption behavior. More than half the population of the world has internet access and thereby readily available platforms for acquiring and disseminating news. READ MORE