This article analyzes the use of metaphors in writing about the Internet and mobile phones. It first summarizes previous work identifying common metaphors used in discussions of the Internet, such as conceptualizing it as a physical space. The article then conducts a preliminary survey of metaphors used in literature about mobile phones. By comparing metaphor use across these mediums, the article aims to provide insight into how each technology is understood and framed in debates about present and future use.
Evaluating impact: transliteracy and creative business innovation via social ...Dr Sue Thomas
This document summarizes a research article that outlines a theoretical framework for using social media to stimulate business innovation. The framework combines the concepts of transliteracy, structural holes, and the amplified individual. Transliteracy refers to the ability to read, write and interact across different platforms and media. Structural holes refer to gaps between networks that can be bridged. The projects discussed in the research aimed to bring together business networks and the university through transliterate spaces and measure their impact.
The document discusses adolescents' use of language and identity establishment in online social networks. It aims to analyze how male and female adolescents differently express themselves through language use, "netspeak", and emoticons on social media platforms. The study will collect data through surveys, observations of social media profiles, and analysis of text-based social media posts to determine gender differences and evolving online communication patterns among adolescents. The research seeks to contribute to the understanding of online identity development and provide insights on current online discourse trends among youths.
PRAGMATIC ANALYSIS OF WHATSAPP CHATS.docxResearchWap
Language is a distinctive quality unique to man. It is what enables man to express him/herself and communicate with his/her fellow man, and it is acquired naturally. According to Fromkin et al “…language is the source of human life and power” (3). They also state that “we use language to convey information to others…, ask questions…, give command…, and express wishes” (173). There are two specific media of using language: oral – which is by words of mouth; and written – which is a graphic representation of words on paper.
It is in the use of language that style comes in. Style shows the difference between one piece of writing and the other. According to Adejare, “style is an ambiguous term…” (1). He further states that the term style means different things to different professions. Some examples are: to a psychologist, a style is a form of behaviour, to the critic, style is individuality and to the linguist, it is the formal structures in function (1).
Stylistics is the study of oral and written texts. It is the description of the linguistic characteristics (which means features of linguistics) of all situationally restricted uses of language. Linguistics is the scientific study of language or of a particular language. Linguistics is scientific because it applies the method of objective observation, collection, classification and application of facts to the study of language.
Stylistics focuses on texts and gives much attention to the devices, parts of speech and figures of speech. It goes further to look into the effects of the use of the devices on the reader.
PRAGMATIC ANALYSIS OF WHATSAPP CHATS.docxResearchWap
This document provides an introduction and background to a study on analyzing WhatsApp chats pragmatically. It outlines the statement of the problem, which is to conduct a pragmatic study of WhatsApp conversations to understand how users derive contextual meaning from texts. The objectives are to identify common methods users employ for contextual sense-making and describe how these methods develop popularity. It discusses the significance of closing an academic gap and providing models for understanding similar conversation platforms. The research hypothesis is that contextual sense-making is key to how users communicate on WhatsApp. The scope focuses on deciphering how context informs message meaning in WhatsApp, with references to other apps. Limitations include time constraints and needing to analyze a random sample of
zmet-mapping the mind of the mobile consumer across bordersLisaIndah1
This document describes a study that used the Zaltman Metaphor Elicitation Technique (ZMET) to develop and compare mental maps of mobile internet consumers in Japan and Indonesia. ZMET interviews were conducted with 15 respondents in each country to understand the cognitive structures and perceptions they associate with the mobile internet. The results showed both structural similarities between the aggregate maps of both countries, as well as differences in experiential factors related to technical infrastructure and business models. Key barriers to adoption of the mobile internet were found to stem from inefficiencies in the wireless ecosystem rather than unique cognitive structures of individual markets. This study was the first to apply ZMET in a comparative way across cultures and to introduce the concept of linkage weights
A Review Of Social Networking Service (SNS) Research In Communication Journal...Jackie Gold
This document provides a review and summary of social networking service (SNS) research published between 2006 and 2011. It identifies 84 relevant articles from six high-ranking communication journals. The summary outlines the objects of study, methodological approaches, and thematic patterns that emerged from the research. It also addresses challenges in the field and provides reflections to guide future SNS research. The findings provide an overview of current research trends to increase understanding and inform additional studies.
Studies about mobility and mobile interaction help researchers and practitioners in the social sciences to make sense of emergent working and living practices in an increasingly mobilised world. This paper aims to present a reflective analysis of the recommended methodological approaches for mobile studies based on three case studies. Following mobile workers across the different dimensions of time and space is a major challenge researchers have to face. The paper discusses these challenges, and highlights areas of interest for researchers interested in the study of mobility and mobile interaction.
Apps And Infrastructures A Research AgendaJeff Nelson
The document introduces a research agenda for studying apps and their relationships to infrastructures from an empirical perspective. It outlines three main strands of existing app research, including those focusing on apps as mobile media, the business of apps, and an emerging strand studying apps' infrastructural situatedness. The authors argue that apps should be understood as inherently relational entities embedded within complex socio-technical systems rather than standalone software. They propose a layered "app/infrastructure stack" approach to account for apps' interdependencies. The contributions to the special issue aim to advance this perspective on apps and outline six themes for future research.
Evaluating impact: transliteracy and creative business innovation via social ...Dr Sue Thomas
This document summarizes a research article that outlines a theoretical framework for using social media to stimulate business innovation. The framework combines the concepts of transliteracy, structural holes, and the amplified individual. Transliteracy refers to the ability to read, write and interact across different platforms and media. Structural holes refer to gaps between networks that can be bridged. The projects discussed in the research aimed to bring together business networks and the university through transliterate spaces and measure their impact.
The document discusses adolescents' use of language and identity establishment in online social networks. It aims to analyze how male and female adolescents differently express themselves through language use, "netspeak", and emoticons on social media platforms. The study will collect data through surveys, observations of social media profiles, and analysis of text-based social media posts to determine gender differences and evolving online communication patterns among adolescents. The research seeks to contribute to the understanding of online identity development and provide insights on current online discourse trends among youths.
PRAGMATIC ANALYSIS OF WHATSAPP CHATS.docxResearchWap
Language is a distinctive quality unique to man. It is what enables man to express him/herself and communicate with his/her fellow man, and it is acquired naturally. According to Fromkin et al “…language is the source of human life and power” (3). They also state that “we use language to convey information to others…, ask questions…, give command…, and express wishes” (173). There are two specific media of using language: oral – which is by words of mouth; and written – which is a graphic representation of words on paper.
It is in the use of language that style comes in. Style shows the difference between one piece of writing and the other. According to Adejare, “style is an ambiguous term…” (1). He further states that the term style means different things to different professions. Some examples are: to a psychologist, a style is a form of behaviour, to the critic, style is individuality and to the linguist, it is the formal structures in function (1).
Stylistics is the study of oral and written texts. It is the description of the linguistic characteristics (which means features of linguistics) of all situationally restricted uses of language. Linguistics is the scientific study of language or of a particular language. Linguistics is scientific because it applies the method of objective observation, collection, classification and application of facts to the study of language.
Stylistics focuses on texts and gives much attention to the devices, parts of speech and figures of speech. It goes further to look into the effects of the use of the devices on the reader.
PRAGMATIC ANALYSIS OF WHATSAPP CHATS.docxResearchWap
This document provides an introduction and background to a study on analyzing WhatsApp chats pragmatically. It outlines the statement of the problem, which is to conduct a pragmatic study of WhatsApp conversations to understand how users derive contextual meaning from texts. The objectives are to identify common methods users employ for contextual sense-making and describe how these methods develop popularity. It discusses the significance of closing an academic gap and providing models for understanding similar conversation platforms. The research hypothesis is that contextual sense-making is key to how users communicate on WhatsApp. The scope focuses on deciphering how context informs message meaning in WhatsApp, with references to other apps. Limitations include time constraints and needing to analyze a random sample of
zmet-mapping the mind of the mobile consumer across bordersLisaIndah1
This document describes a study that used the Zaltman Metaphor Elicitation Technique (ZMET) to develop and compare mental maps of mobile internet consumers in Japan and Indonesia. ZMET interviews were conducted with 15 respondents in each country to understand the cognitive structures and perceptions they associate with the mobile internet. The results showed both structural similarities between the aggregate maps of both countries, as well as differences in experiential factors related to technical infrastructure and business models. Key barriers to adoption of the mobile internet were found to stem from inefficiencies in the wireless ecosystem rather than unique cognitive structures of individual markets. This study was the first to apply ZMET in a comparative way across cultures and to introduce the concept of linkage weights
A Review Of Social Networking Service (SNS) Research In Communication Journal...Jackie Gold
This document provides a review and summary of social networking service (SNS) research published between 2006 and 2011. It identifies 84 relevant articles from six high-ranking communication journals. The summary outlines the objects of study, methodological approaches, and thematic patterns that emerged from the research. It also addresses challenges in the field and provides reflections to guide future SNS research. The findings provide an overview of current research trends to increase understanding and inform additional studies.
Studies about mobility and mobile interaction help researchers and practitioners in the social sciences to make sense of emergent working and living practices in an increasingly mobilised world. This paper aims to present a reflective analysis of the recommended methodological approaches for mobile studies based on three case studies. Following mobile workers across the different dimensions of time and space is a major challenge researchers have to face. The paper discusses these challenges, and highlights areas of interest for researchers interested in the study of mobility and mobile interaction.
Apps And Infrastructures A Research AgendaJeff Nelson
The document introduces a research agenda for studying apps and their relationships to infrastructures from an empirical perspective. It outlines three main strands of existing app research, including those focusing on apps as mobile media, the business of apps, and an emerging strand studying apps' infrastructural situatedness. The authors argue that apps should be understood as inherently relational entities embedded within complex socio-technical systems rather than standalone software. They propose a layered "app/infrastructure stack" approach to account for apps' interdependencies. The contributions to the special issue aim to advance this perspective on apps and outline six themes for future research.
An Analytical Survey on Hate Speech Recognition through NLP and Deep LearningIRJET Journal
The document discusses hate speech recognition through natural language processing and deep learning. It provides an overview of past work on hate speech detection using various techniques like pattern-based methods, multi-class text classification, hybrid neural networks, convolutional neural networks and feature-based machine learning models. The literature review analyzes these previous studies and their methods and limitations to help develop an improved methodology for hate speech recognition.
E XPLORING T HE S ELF -E NHANCED M ECHANISM OF I NTERACTIVE A DVERTISING...ijma
The document discusses interactive advertising and explores its self-enhanced dissemination mechanism. It analyzes three cases of interactive ads: on official websites, social media, and mobile media. It identifies micro, meso, and macro level mechanisms. At the micro level, core, inner, and outer interaction reveal the process of interacting with content, people, and computers. The meso level shows self-fission-type spread and communication approaches. At the macro level, the communication effect of interactive advertising achieves a spiral increasing effect. The analysis enriches research on the communication effects of interactive advertising.
Exploring the Effect of Web Based Communications on Organizations Service Qua...IOSR Journals
The paper aims to study the effect of web based communications on the service quality of organizations. Web based communications is used for a variety of reasons.The quality of a Web-based customer support system involves the information it supplies, the service it provides, andcharacteristics of the system itself; its effectiveness is reflected by the satisfaction of its users. This paper presents the results of astudy of quality and effectiveness in Web-based customer support systems. Data from a survey of 726 Internet users were used to test theoretically expected relationships. The results of this study indicate that information and system quality determine effectiveness while service quality has no impact. Practical implications for managers and designers are offered.The Internet is the latest in a long succession of communication technologies. The goal of this work is to draw lessons from the evolution of all these services. Little attention is paid to technology as such, since that has changed radically many times. Instead, the stress is on the steady growth in volume of communication, the evolution in the type of traffic sent, the qualitative change this growth produces in how people treat communication, and the evolution of pricing. The focus is on the user, and in particular on how quality and price differentiation have been used by service providers to influenceconsumer behavior, and how consumers have reacted.
A CROSS-CULTURAL STUDY ON THE VALUE STRUCTURE OF MOBILE INTERNET USAGE: COMPA...Ranti Yulia Wardani
Abstract: This study aims to examine the usage a pattern of mobile Internet from perspective of intercultural among developing countries. Data obtained from a survey of questionnaire which is distributed in both Thailand and Indonesia during 2013. The multiple regression analysis has been applied to identify between value structures (functional value, emotional value, social value and monetary value) and overall satisfaction in each country. Finding shows that functional value, emotional value, social value, and monetary value significantly affect satisfaction for Indonesia users which is similar to Thai users except the emotional value does not affect the satisfaction. A comparison test to examine the difference in value structure between Indonesia and Thailand has been analyzed. The results show that the functional value, emotional value, social value and monetary value between Indonesia and Thailand are different. The results of these differences are influenced by the perceptions of respondents in Indonesia and Thailand to the different mobile Internet usage pattern. In this case it turns out different cultures influence the way in perceiving the use of different technologies, especially in the mobile Internet usage pattern.
≫ History of Cell Phones Free Essay Sample on Samploon.com. Evolution of Mobile Phones - RichardjoysWatson. The Evolution of Cell Phones: A History of Cell Phones Timeline | ZAGGblog. History of the Cell Phones! | Visual.ly. The History of The Cell Phone - A-Level ICT - Marked by Teachers.com. PPT - History of Cell Phones PowerPoint Presentation, free download .... History of mobile phones. History of cell phones. Analysis of the Impact of Cell Phones Free Essay Example. Invention of cell phones essay. History Of Cell Phone. History of Mobile Phones by acarson255. Write an essay on Mobile Phone in English (100, 150, 250 and 400 Words .... History Behind The First Cell Phone That Changed Everything. The Evolution of the Telephone Essay Example | StudyHippo.com. (PDF) A Short Review on the History of Mobile Phones. A Social History of the Mobile Telephone with a View of its Future. The mobile phone and its innovations. History of the cell phone. Tire suas próprias conclusões: Infographic - The Evolution of Cell .... History of the Telephone Workbook | Made By Teachers. History of the Telephone Workbook - Made By Teachers. History of Cell Phones – Portfolio. 014 Essay Example Cell Phones Shouldn T Allowed In School How Old Were .... Cell Phones History - ESL worksheet by Maria Elena Viglianco. Calaméo - Essay on Cell Phones: Great and Excellent Tips for Students History Of Cell Phones Essay
≫ History of Cell Phones Free Essay Sample on Samploon.com. Evolution of Mobile Phones - RichardjoysWatson. The Evolution of Cell Phones: A History of Cell Phones Timeline | ZAGGblog. History of the Cell Phones! | Visual.ly. The History of The Cell Phone - A-Level ICT - Marked by Teachers.com. PPT - History of Cell Phones PowerPoint Presentation, free download .... History of mobile phones. History of cell phones. Analysis of the Impact of Cell Phones Free Essay Example. Invention of cell phones essay. History Of Cell Phone. History of Mobile Phones by acarson255. Write an essay on Mobile Phone in English (100, 150, 250 and 400 Words .... History Behind The First Cell Phone That Changed Everything. The Evolution of the Telephone Essay Example | StudyHippo.com. (PDF) A Short Review on the History of Mobile Phones. A Social History of the Mobile Telephone with a View of its Future. The mobile phone and its innovations. History of the cell phone. Tire suas próprias conclusões: Infographic - The Evolution of Cell .... History of the Telephone Workbook | Made By Teachers. History of the Telephone Workbook - Made By Teachers. History of Cell Phones – Portfolio. 014 Essay Example Cell Phones Shouldn T Allowed In School How Old Were .... Cell Phones History - ESL worksheet by Maria Elena Viglianco. Calaméo - Essay on Cell Phones: Great and Excellent Tips for Students History Of Cell Phones Essay
Consumer Response to Different Types of Website Interactivityinventionjournals
This paper aims to explore the impact of different types of interactivity on consumer perception. A quantitative research methodology using scenario-based experiment was employed. An experiment was conducted using research participants from Turkey. The findings of this study suggest that person interactivity leads to higher levels of attitude towards website, ease of use, and e-loyalty than machine interactivity. The results also reveal that person interactivity combined with high contact interactivity is the optimal strategy for e-retailers
An Examination of the Prior Use of E-Learning Within an Extended Technology A...Maurice Dawson
The purpose of this empirical study was to test specific factors of behavioral intention to use m-learning in a community college setting using a modified technology acceptance model and antecedent factors suggested by the researcher’s review of the literature. In addition, the study’s purpose was to expand understanding of behavioral intention to use m-learning and to contribute to the growing body of research. This research model was based on relevant technology acceptance literature. The study examines the significance of “prior use of e-learning” and correlation with the behavioral intention to use m-learning. Existing models have looked at prior use of e-learning in other domains, but not specifically m-learning. Other models and studies have primarily looked at the prior use of e-learning variable as a moderating variable and not one that is directly related to attitude and behavioral intention. The study found that there is a relationship between prior use of e-learning and behavioral intention to use m-learning. This research direction was proposed by Lu and Viehland.
My introduction to a special issue of The Reference Librarian which i guest edited featuring papers from the Handheld Librarian Conferences - "Mobile Reference: Papers from the Handheld Librarian Conferences." - Originally published in The Reference Librarian, Volume 52 Issue 1 & 2 2011.
This proposal examines language use and identity management on Facebook through discourse analysis. The study will record Facebook interactions directly using screen recording software to analyze language in real time, including identity construction and repair. Both younger and older male and female participants will be recruited. Discourse analysis will be used to understand how participants discursively manage their identities and negotiate interactions through their language choices. Potential challenges around participant privacy during data collection will need to be addressed.
This proposal examines language use and identity management on Facebook through discourse analysis. It will record Facebook interactions directly using screen recording software to analyze language in real time, beyond just final products. Both younger and older males and females will be recruited. Discourse analysis will be used to understand how identities are constructed rhetorically through language rather than just what identities are presented. Potential challenges around participant privacy during data collection will need to be addressed.
OntoSOC: S ociocultural K nowledge O ntology IJwest
This paper
present
s
a
sociocultural knowledge ontology (OntoSOC) modeling appro
a
ch. Ont
o-
SOC modeling appro
a
ch is based on Engeström‟s
Human Activity Theory (HAT)
.
That Theory allowed us
to identify fundamental concepts and rel
a
tionshi
ps between them. The top
-
down precess has been used to
d
efine differents sub
-
concepts. The
modeled vocabulary permits us to organise data, to facilitate in
form
a-
tion retrieval
by introducing a semantic layer in social web platform architec
ture,
we project t
o impl
e
ment.
This platform can be considered as a «
collective me
mory
»
and Participative and Distributed Info
r
mation
System
(PDIS) which will allow Cameroonian communities to share an co
-
construct knowledge on perm
a-
nent organi
z
ed activ
i
ties.
This study used the Unified Theory of Acceptance and Use of Technology (UTAUT) model to evaluate acceptance and use of a virtual learning environment (VLE) in higher education in Turkey and the UK. Questionnaires were completed by over 1,000 students using similar VLEs in both countries. The study found differences between the two countries in behavioral intention to use and actual use of the VLE, as well as differences in the impact of factors like performance expectancy, effort expectancy, and social influence on behavioral intention and use behavior. The study aimed to contribute to understanding acceptance of technology in different cultural contexts.
The document discusses utilizing weight allocation in a term frequency-inverse document frequency (TF-IDF) environment to identify and remove noisy data from social media for improved customer segmentation and targeted advertising. Specifically, it aims to recognize keywords that can help cluster social media users based on demographics and behaviors while eliminating uninfluential data. The approach assigns higher weight to words that frequently appear in a document but rarely in the entire collection compared to common words.
This document summarizes research on the use of emoticons in computer-mediated communication (CMC) and their impact on interactivity. It outlines the history of CMC and reviews literature showing that emoticons are used to communicate more concisely and express emotions. Studies discussed found that perceived playfulness driven by text and emoticon use facilitates social relationships on messaging platforms. The research questions posed examine the motives for and emotional value of emoticon use, and how emoticons influence interactivity and are used on social media. The conclusion notes limitations in understanding emoticon usage but the potential for further research as CMC continues developing.
This paper proposes two taxonomies for classifying mobile applications for tourism based on services provided and level of user interactivity. The taxonomy of services identifies seven main categories: navigation, social, mobile marketing, security/emergency, transactional, entertainment, and information. The interactivity taxonomy has seven categories: personal preferences, location, security, web interaction, content addition, aesthetics, and no customization. The taxonomies provide a framework for understanding the landscape of tourism mobile apps and gaps for further development.
POSITIONING OF THE NEW MEANS OF COMMUNICATION AND INFORMATION: EMPIRICAL STUD...IAEME Publication
The social networks occupy a major place in the new technologies of information and communication. Beyond their weight ceaselessly increasing in the society, they became strategic supports as well for the individuals as for the organizations. With the social networks, a real revolution upsets in a radical way the ecosystem of the media and of the communication in our societies. Internet and the social media have individualized and democratized the access to real time diffusable contents in the global scale. Today, the consumers of information are also producers of information and can enter in competition with the traditional editors and broadcasting stations, the brands, the public authorities.
Assessment 3: Essay
Length: 1500 words
Weighting: 45%
This last assessment builds on the annotated bibliography completed as Assessment 1 and your Assessment 2 essay plan. Use the feedback from your Assessment 2 to write an essay developing an argument for or against your chosen topic. The essay choices are as already presented:
1. Educational institutions should incorporate mobile technology for the benefit of students.
1. Using social media enhances adolescent well-being.
1. Mobile technology will continue to transform health care in positive ways.
You need to:
· Take a position and argue your case with supporting evidence. You may support or argue against the topic. Include a counterargument either in a separate paragraph or within your supporting point(s).
· Remember to include at least six sources of evidence to support your argument.
· Be sure to include a reference list on a separate page, using APA referencing.
· Go through the marking criteria carefully to ensure you have addressed all the marking criteria for your essay.
Marking criteria – see over the page
Davison, C. B. Lazaros, E. J. (2015). Adopting mobile technology in the higher education classroom. Journal of Technology Studies, 41:1, 30-39. Retrieved from https://www.ebsco.com
This 2015 article looks at the discoveries from a study of an Indiana research and teaching university, focusing on the student’s practices with mobile technologies. The findings were based on, and cross examined with a previous similar study of British students that was undertaken 9 years prior. Key ideas demonstrated are the technological influence of mLearning in the tertiary education environment, carried out with intentions of providing infrastructure integration techniques and insight to educators, by identifying characteristics and patterns within the mobile technology utilization of the student body. The study touches on student perceptions of mobile learning, the most popular method of communicating and the benefits. A limitation to this study include lack of personal interviews with students to provide concurrent opinions of findings presented, and an uncertain means of accumulating data by use of an anonymous online poll. A further limitation includes lack of an in-depth explanation to the conclusion that laptops are the most preferred tool amongst the participants. The piece itself has been published in the peer-reviewed Journal of Technology Studies, which is owned by an international honor society of technology professions. In particular this article will be helpful in providing a comparison between the study a decade previously, to monitor what the sequences of mLearning in the classroom has demonstrated, and to collate with new evidence between this article and now.
Henderson, M. Selwyn, N. Aston, R. (2015). What works and why? Student perceptions of ‘useful’ digital technology in university teaching and learning. Studies in Higher Education, 42:8, 1567-1579, DOI: 10.1080/030 ...
MBA Essay Writing Ideal Assignment Writing By OxbRick Vogel
The document provides instructions for students to get assignment writing help from HelpWriting.net. It outlines a 5-step process: 1) Create an account, 2) Complete an order form providing instructions, sources, and deadline, 3) Review bids from writers and choose one, 4) Review the completed paper and authorize payment, 5) Request revisions until satisfied. It emphasizes that original, high-quality content is guaranteed, with refunds offered for plagiarized work.
SUPERHERO WRITING PAPER By FabFileFoldersRick Vogel
Here are the key points I gathered from your summary:
- The study examined academic clustering, which is when student athletes are disproportionately
enrolled in certain majors like general studies or undeclared.
- The researchers analyzed course enrollment data from a Division I university to see if academic
clustering occurred and if it differed between men's and women's sports.
- They found evidence of academic clustering, with certain majors over-represented among student
athletes compared to the general student population.
- Men's revenue sports like football and basketball showed the highest levels of academic clustering
into less challenging majors.
- The study helps shed light on experiences of student athletes and potential reforms needed to
support their
Mais conteúdo relacionado
Semelhante a An Exploratory Comparative Analysis Of The Use Of Metaphors In Writing On The Internet And Mobile Phones
An Analytical Survey on Hate Speech Recognition through NLP and Deep LearningIRJET Journal
The document discusses hate speech recognition through natural language processing and deep learning. It provides an overview of past work on hate speech detection using various techniques like pattern-based methods, multi-class text classification, hybrid neural networks, convolutional neural networks and feature-based machine learning models. The literature review analyzes these previous studies and their methods and limitations to help develop an improved methodology for hate speech recognition.
E XPLORING T HE S ELF -E NHANCED M ECHANISM OF I NTERACTIVE A DVERTISING...ijma
The document discusses interactive advertising and explores its self-enhanced dissemination mechanism. It analyzes three cases of interactive ads: on official websites, social media, and mobile media. It identifies micro, meso, and macro level mechanisms. At the micro level, core, inner, and outer interaction reveal the process of interacting with content, people, and computers. The meso level shows self-fission-type spread and communication approaches. At the macro level, the communication effect of interactive advertising achieves a spiral increasing effect. The analysis enriches research on the communication effects of interactive advertising.
Exploring the Effect of Web Based Communications on Organizations Service Qua...IOSR Journals
The paper aims to study the effect of web based communications on the service quality of organizations. Web based communications is used for a variety of reasons.The quality of a Web-based customer support system involves the information it supplies, the service it provides, andcharacteristics of the system itself; its effectiveness is reflected by the satisfaction of its users. This paper presents the results of astudy of quality and effectiveness in Web-based customer support systems. Data from a survey of 726 Internet users were used to test theoretically expected relationships. The results of this study indicate that information and system quality determine effectiveness while service quality has no impact. Practical implications for managers and designers are offered.The Internet is the latest in a long succession of communication technologies. The goal of this work is to draw lessons from the evolution of all these services. Little attention is paid to technology as such, since that has changed radically many times. Instead, the stress is on the steady growth in volume of communication, the evolution in the type of traffic sent, the qualitative change this growth produces in how people treat communication, and the evolution of pricing. The focus is on the user, and in particular on how quality and price differentiation have been used by service providers to influenceconsumer behavior, and how consumers have reacted.
A CROSS-CULTURAL STUDY ON THE VALUE STRUCTURE OF MOBILE INTERNET USAGE: COMPA...Ranti Yulia Wardani
Abstract: This study aims to examine the usage a pattern of mobile Internet from perspective of intercultural among developing countries. Data obtained from a survey of questionnaire which is distributed in both Thailand and Indonesia during 2013. The multiple regression analysis has been applied to identify between value structures (functional value, emotional value, social value and monetary value) and overall satisfaction in each country. Finding shows that functional value, emotional value, social value, and monetary value significantly affect satisfaction for Indonesia users which is similar to Thai users except the emotional value does not affect the satisfaction. A comparison test to examine the difference in value structure between Indonesia and Thailand has been analyzed. The results show that the functional value, emotional value, social value and monetary value between Indonesia and Thailand are different. The results of these differences are influenced by the perceptions of respondents in Indonesia and Thailand to the different mobile Internet usage pattern. In this case it turns out different cultures influence the way in perceiving the use of different technologies, especially in the mobile Internet usage pattern.
≫ History of Cell Phones Free Essay Sample on Samploon.com. Evolution of Mobile Phones - RichardjoysWatson. The Evolution of Cell Phones: A History of Cell Phones Timeline | ZAGGblog. History of the Cell Phones! | Visual.ly. The History of The Cell Phone - A-Level ICT - Marked by Teachers.com. PPT - History of Cell Phones PowerPoint Presentation, free download .... History of mobile phones. History of cell phones. Analysis of the Impact of Cell Phones Free Essay Example. Invention of cell phones essay. History Of Cell Phone. History of Mobile Phones by acarson255. Write an essay on Mobile Phone in English (100, 150, 250 and 400 Words .... History Behind The First Cell Phone That Changed Everything. The Evolution of the Telephone Essay Example | StudyHippo.com. (PDF) A Short Review on the History of Mobile Phones. A Social History of the Mobile Telephone with a View of its Future. The mobile phone and its innovations. History of the cell phone. Tire suas próprias conclusões: Infographic - The Evolution of Cell .... History of the Telephone Workbook | Made By Teachers. History of the Telephone Workbook - Made By Teachers. History of Cell Phones – Portfolio. 014 Essay Example Cell Phones Shouldn T Allowed In School How Old Were .... Cell Phones History - ESL worksheet by Maria Elena Viglianco. Calaméo - Essay on Cell Phones: Great and Excellent Tips for Students History Of Cell Phones Essay
≫ History of Cell Phones Free Essay Sample on Samploon.com. Evolution of Mobile Phones - RichardjoysWatson. The Evolution of Cell Phones: A History of Cell Phones Timeline | ZAGGblog. History of the Cell Phones! | Visual.ly. The History of The Cell Phone - A-Level ICT - Marked by Teachers.com. PPT - History of Cell Phones PowerPoint Presentation, free download .... History of mobile phones. History of cell phones. Analysis of the Impact of Cell Phones Free Essay Example. Invention of cell phones essay. History Of Cell Phone. History of Mobile Phones by acarson255. Write an essay on Mobile Phone in English (100, 150, 250 and 400 Words .... History Behind The First Cell Phone That Changed Everything. The Evolution of the Telephone Essay Example | StudyHippo.com. (PDF) A Short Review on the History of Mobile Phones. A Social History of the Mobile Telephone with a View of its Future. The mobile phone and its innovations. History of the cell phone. Tire suas próprias conclusões: Infographic - The Evolution of Cell .... History of the Telephone Workbook | Made By Teachers. History of the Telephone Workbook - Made By Teachers. History of Cell Phones – Portfolio. 014 Essay Example Cell Phones Shouldn T Allowed In School How Old Were .... Cell Phones History - ESL worksheet by Maria Elena Viglianco. Calaméo - Essay on Cell Phones: Great and Excellent Tips for Students History Of Cell Phones Essay
Consumer Response to Different Types of Website Interactivityinventionjournals
This paper aims to explore the impact of different types of interactivity on consumer perception. A quantitative research methodology using scenario-based experiment was employed. An experiment was conducted using research participants from Turkey. The findings of this study suggest that person interactivity leads to higher levels of attitude towards website, ease of use, and e-loyalty than machine interactivity. The results also reveal that person interactivity combined with high contact interactivity is the optimal strategy for e-retailers
An Examination of the Prior Use of E-Learning Within an Extended Technology A...Maurice Dawson
The purpose of this empirical study was to test specific factors of behavioral intention to use m-learning in a community college setting using a modified technology acceptance model and antecedent factors suggested by the researcher’s review of the literature. In addition, the study’s purpose was to expand understanding of behavioral intention to use m-learning and to contribute to the growing body of research. This research model was based on relevant technology acceptance literature. The study examines the significance of “prior use of e-learning” and correlation with the behavioral intention to use m-learning. Existing models have looked at prior use of e-learning in other domains, but not specifically m-learning. Other models and studies have primarily looked at the prior use of e-learning variable as a moderating variable and not one that is directly related to attitude and behavioral intention. The study found that there is a relationship between prior use of e-learning and behavioral intention to use m-learning. This research direction was proposed by Lu and Viehland.
My introduction to a special issue of The Reference Librarian which i guest edited featuring papers from the Handheld Librarian Conferences - "Mobile Reference: Papers from the Handheld Librarian Conferences." - Originally published in The Reference Librarian, Volume 52 Issue 1 & 2 2011.
This proposal examines language use and identity management on Facebook through discourse analysis. The study will record Facebook interactions directly using screen recording software to analyze language in real time, including identity construction and repair. Both younger and older male and female participants will be recruited. Discourse analysis will be used to understand how participants discursively manage their identities and negotiate interactions through their language choices. Potential challenges around participant privacy during data collection will need to be addressed.
This proposal examines language use and identity management on Facebook through discourse analysis. It will record Facebook interactions directly using screen recording software to analyze language in real time, beyond just final products. Both younger and older males and females will be recruited. Discourse analysis will be used to understand how identities are constructed rhetorically through language rather than just what identities are presented. Potential challenges around participant privacy during data collection will need to be addressed.
OntoSOC: S ociocultural K nowledge O ntology IJwest
This paper
present
s
a
sociocultural knowledge ontology (OntoSOC) modeling appro
a
ch. Ont
o-
SOC modeling appro
a
ch is based on Engeström‟s
Human Activity Theory (HAT)
.
That Theory allowed us
to identify fundamental concepts and rel
a
tionshi
ps between them. The top
-
down precess has been used to
d
efine differents sub
-
concepts. The
modeled vocabulary permits us to organise data, to facilitate in
form
a-
tion retrieval
by introducing a semantic layer in social web platform architec
ture,
we project t
o impl
e
ment.
This platform can be considered as a «
collective me
mory
»
and Participative and Distributed Info
r
mation
System
(PDIS) which will allow Cameroonian communities to share an co
-
construct knowledge on perm
a-
nent organi
z
ed activ
i
ties.
This study used the Unified Theory of Acceptance and Use of Technology (UTAUT) model to evaluate acceptance and use of a virtual learning environment (VLE) in higher education in Turkey and the UK. Questionnaires were completed by over 1,000 students using similar VLEs in both countries. The study found differences between the two countries in behavioral intention to use and actual use of the VLE, as well as differences in the impact of factors like performance expectancy, effort expectancy, and social influence on behavioral intention and use behavior. The study aimed to contribute to understanding acceptance of technology in different cultural contexts.
The document discusses utilizing weight allocation in a term frequency-inverse document frequency (TF-IDF) environment to identify and remove noisy data from social media for improved customer segmentation and targeted advertising. Specifically, it aims to recognize keywords that can help cluster social media users based on demographics and behaviors while eliminating uninfluential data. The approach assigns higher weight to words that frequently appear in a document but rarely in the entire collection compared to common words.
This document summarizes research on the use of emoticons in computer-mediated communication (CMC) and their impact on interactivity. It outlines the history of CMC and reviews literature showing that emoticons are used to communicate more concisely and express emotions. Studies discussed found that perceived playfulness driven by text and emoticon use facilitates social relationships on messaging platforms. The research questions posed examine the motives for and emotional value of emoticon use, and how emoticons influence interactivity and are used on social media. The conclusion notes limitations in understanding emoticon usage but the potential for further research as CMC continues developing.
This paper proposes two taxonomies for classifying mobile applications for tourism based on services provided and level of user interactivity. The taxonomy of services identifies seven main categories: navigation, social, mobile marketing, security/emergency, transactional, entertainment, and information. The interactivity taxonomy has seven categories: personal preferences, location, security, web interaction, content addition, aesthetics, and no customization. The taxonomies provide a framework for understanding the landscape of tourism mobile apps and gaps for further development.
POSITIONING OF THE NEW MEANS OF COMMUNICATION AND INFORMATION: EMPIRICAL STUD...IAEME Publication
The social networks occupy a major place in the new technologies of information and communication. Beyond their weight ceaselessly increasing in the society, they became strategic supports as well for the individuals as for the organizations. With the social networks, a real revolution upsets in a radical way the ecosystem of the media and of the communication in our societies. Internet and the social media have individualized and democratized the access to real time diffusable contents in the global scale. Today, the consumers of information are also producers of information and can enter in competition with the traditional editors and broadcasting stations, the brands, the public authorities.
Assessment 3: Essay
Length: 1500 words
Weighting: 45%
This last assessment builds on the annotated bibliography completed as Assessment 1 and your Assessment 2 essay plan. Use the feedback from your Assessment 2 to write an essay developing an argument for or against your chosen topic. The essay choices are as already presented:
1. Educational institutions should incorporate mobile technology for the benefit of students.
1. Using social media enhances adolescent well-being.
1. Mobile technology will continue to transform health care in positive ways.
You need to:
· Take a position and argue your case with supporting evidence. You may support or argue against the topic. Include a counterargument either in a separate paragraph or within your supporting point(s).
· Remember to include at least six sources of evidence to support your argument.
· Be sure to include a reference list on a separate page, using APA referencing.
· Go through the marking criteria carefully to ensure you have addressed all the marking criteria for your essay.
Marking criteria – see over the page
Davison, C. B. Lazaros, E. J. (2015). Adopting mobile technology in the higher education classroom. Journal of Technology Studies, 41:1, 30-39. Retrieved from https://www.ebsco.com
This 2015 article looks at the discoveries from a study of an Indiana research and teaching university, focusing on the student’s practices with mobile technologies. The findings were based on, and cross examined with a previous similar study of British students that was undertaken 9 years prior. Key ideas demonstrated are the technological influence of mLearning in the tertiary education environment, carried out with intentions of providing infrastructure integration techniques and insight to educators, by identifying characteristics and patterns within the mobile technology utilization of the student body. The study touches on student perceptions of mobile learning, the most popular method of communicating and the benefits. A limitation to this study include lack of personal interviews with students to provide concurrent opinions of findings presented, and an uncertain means of accumulating data by use of an anonymous online poll. A further limitation includes lack of an in-depth explanation to the conclusion that laptops are the most preferred tool amongst the participants. The piece itself has been published in the peer-reviewed Journal of Technology Studies, which is owned by an international honor society of technology professions. In particular this article will be helpful in providing a comparison between the study a decade previously, to monitor what the sequences of mLearning in the classroom has demonstrated, and to collate with new evidence between this article and now.
Henderson, M. Selwyn, N. Aston, R. (2015). What works and why? Student perceptions of ‘useful’ digital technology in university teaching and learning. Studies in Higher Education, 42:8, 1567-1579, DOI: 10.1080/030 ...
Semelhante a An Exploratory Comparative Analysis Of The Use Of Metaphors In Writing On The Internet And Mobile Phones (20)
MBA Essay Writing Ideal Assignment Writing By OxbRick Vogel
The document provides instructions for students to get assignment writing help from HelpWriting.net. It outlines a 5-step process: 1) Create an account, 2) Complete an order form providing instructions, sources, and deadline, 3) Review bids from writers and choose one, 4) Review the completed paper and authorize payment, 5) Request revisions until satisfied. It emphasizes that original, high-quality content is guaranteed, with refunds offered for plagiarized work.
SUPERHERO WRITING PAPER By FabFileFoldersRick Vogel
Here are the key points I gathered from your summary:
- The study examined academic clustering, which is when student athletes are disproportionately
enrolled in certain majors like general studies or undeclared.
- The researchers analyzed course enrollment data from a Division I university to see if academic
clustering occurred and if it differed between men's and women's sports.
- They found evidence of academic clustering, with certain majors over-represented among student
athletes compared to the general student population.
- Men's revenue sports like football and basketball showed the highest levels of academic clustering
into less challenging majors.
- The study helps shed light on experiences of student athletes and potential reforms needed to
support their
This case study analyzes Tata Motors' acquisition of Jaguar Land Rover from Ford in 2008. It provides background on both companies and the rationale for the deal. The acquisition allowed Tata to expand globally and diversify beyond commercial vehicles. While risky, the strategic fit was strong and Tata hoped to leverage JLR's premium brands. The analysis finds that under Tata, JLR has significantly improved its performance, transforming from losses to strong profits. However, the case also notes challenges integrating cultures and the large debt taken on for the acquisition.
The summary provides instructions for creating an account, submitting a paper request, and receiving writing help on HelpWriting.net. It explains that the platform uses a bidding system where writers submit bids and the client chooses a writer. The client can then request revisions to ensure satisfaction, and receives a full refund if the paper is plagiarized.
The document provides instructions for creating an account on HelpWriting.net in order to request that a writer complete an assignment. It outlines a 5-step process: 1) Create an account with an email and password. 2) Complete a form with assignment details. 3) Review bids from writers and select one. 4) Review the completed paper and authorize payment. 5) Request revisions to ensure satisfaction, with a refund option for plagiarized work. The site promises original, high-quality content to meet customer needs.
The document provides instructions for creating an account on a writing assistance website and requesting help with writing assignments. It outlines a 5-step process: 1) create an account; 2) complete an order form with instructions and deadline; 3) writers will bid on the request and the client chooses one; 4) the client receives and reviews the paper; 5) the client can request revisions to ensure satisfaction. The purpose is to guide clients through the process of obtaining online writing help.
7 Ways To Make Your College Essays Stand OutRick Vogel
The document provides instructions for requesting essay writing help from the HelpWriting.net website. It outlines a 5-step process: 1) Create an account; 2) Submit a request with instructions and deadline; 3) Review bids from writers and select one; 4) Review the completed paper and authorize payment; 5) Request revisions until satisfied. The website promises original, high-quality content and refunds for plagiarized work.
Position Paper Format Mun Country Name At The Top ORick Vogel
This document provides instructions for determining the Ksp (solubility product constant) value for silver acetate. It is a 5-step process:
1. Make a saturated solution of silver acetate at a measured temperature.
2. Filter the solution to remove any undissolved solid.
3. Titrate 5 mL aliquots of the filtered solution with potassium thiocyanate using an indicator, performing the titration in triplicate.
4. Use the titration results to calculate the concentration of silver ions in the saturated solution.
5. Plug the silver ion concentration into the Ksp expression for silver acetate to determine the Ksp value.
IB Written Assignment Format Citation WritingRick Vogel
This passage from The Color Purple provides insights into Celie's difficult circumstances. It reveals that Celie had another child that her abusive father ("Pa") gave away, and he insults her repeatedly. Despite her poor treatment, Celie hasn't tried to improve her situation. While she seems indifferent to her own welfare, she cares deeply for her siblings, especially Nettie, since their Pa has started to mistreat Nettie as well. The passage establishes Celie's acceptance of mistreatment and prioritization of her sister's safety over her own well-being as she endures her father's abuse.
Welcome To The Most Sophisticated Custom Paper Writing Service. OurRick Vogel
The document discusses time perception and whether time still passes if no one is around to experience it. It introduces the concept of time as the most elusive physical element, despite familiarity with measuring it. The document will explore perspectives on time from philosophy and physics and whether time exists independently of human perception.
Get Expert Tips To Teach Essay Writing To Your ChilRick Vogel
The document provides instructions for requesting essay writing help from the website HelpWriting.net, including creating an account, completing an order form with instructions and deadline, and reviewing bids from writers to select one and authorize payment after receiving a satisfactory paper. The process involves registration, submitting a request with details, choosing a writer based on qualifications and reviews, making a deposit, reviewing the paper for revisions if needed, and having the option to request multiple revisions until satisfied.
Ebook Great Writing 4 Great Essays - (4E) D.O.CRick Vogel
The document provides instructions for requesting writing assistance from HelpWriting.net. It outlines a 5-step process: 1) Create an account with a password and email. 2) Complete a 10-minute order form providing instructions, sources, and deadline. 3) Review bids from writers and select one. 4) Review the completed paper and authorize payment if satisfied. 5) Request revisions until fully satisfied, and the company guarantees original, high-quality work or a full refund.
Why You Want To Be A Police Officer Essay. Why IRick Vogel
The document provides instructions for requesting an assignment writing service from HelpWriting.net. It outlines a 5-step process: 1) Create an account with valid email and password. 2) Complete an order form with instructions, sources, and deadline. 3) Review bids from writers and choose one. 4) Review the completed paper and authorize payment. 5) Request revisions until satisfied, with a full refund option for plagiarized work. The service aims to provide original, high-quality content through this process.
Pin By Sadia Abid On My Saves In 2021 Articles For Kids, NewspaperRick Vogel
The document outlines a 5-step process for requesting an assignment be written by a service: 1) Create an account with personal information; 2) Complete an order form providing instructions, sources, and deadline; 3) Review writer bids and select one to complete the assignment; 4) Review the completed paper and authorize payment if satisfied; 5) Request revisions until fully satisfied, with a refund offered for plagiarized work.
The document discusses a story where Sammy, a grocery store employee, notices three girls arrive wearing swimsuits. His manager questions if their clothing is appropriate and tells the girls "this isn't the beach." Sammy disagrees with this and quits his job in protest, believing customers should not be shamed for their attire. The main conflict involves the manager embarrassing the girls for their clothing and Sammy quitting his job to stand up for what he feels is right treatment of customers.
Conclusion Of Research Paper Example. How To Make A Conclusion InRick Vogel
The document provides instructions for requesting writing assistance from HelpWriting.net in 5 steps:
1. Create an account with a valid email and password.
2. Complete a 10-minute order form providing instructions, sources, deadline, and attaching a sample if wanting the writer to imitate your style.
3. Review bids from writers and choose one based on qualifications, history, and feedback, then make a deposit to start the work.
4. Ensure the paper meets expectations and authorize full payment if pleased, or request revisions for free.
5. Multiple revisions can be requested to ensure satisfaction, and plagiarized work will be refunded.
Formal Analysis Essay Example. Definition And ExRick Vogel
The document discusses steps to take to build a strong "fortress balance sheet" to protect a bank's financial health during turbulent economic times. It recommends stress testing assets to project potential losses, raising capital now rather than waiting, and pursuing strategies like reducing risk-weighted assets and improving liquidity. Maintaining a strong capital position will allow the bank to defend itself while still positioning for future growth opportunities.
Why Essays Are A Bad Way To Teach WritingRick Vogel
The document outlines the purpose and methodology of a study on social influence in online choice. The study aimed to understand how social endorsements impact peoples' choices. It hypothesized that people are more likely to change their opinion when it causes less self-inconsistency or opposing social opinions are stronger. The methodology involved online experiments where participants selected image preferences on a website with and without knowledge of other users' choices, to determine if social endorsements impacted their selections.
The summary provides information about the Corporal Works of Mercy document in 3 sentences:
The document discusses the 5 steps to get writing assistance from the HelpWriting.net website. These steps include creating an account, completing an order form with instructions and sources, reviewing writer bids and choosing one, and revising the paper if needed. The document promises original, high-quality content and refunds for plagiarized work.
Sample Pdf Free Download Classles DemocracyRick Vogel
This document provides instructions for requesting writing assistance from HelpWriting.net. It outlines a 5-step process: 1) Create an account with a password and email. 2) Complete a 10-minute order form providing instructions, sources, and deadline. 3) Review bids from writers and choose one based on qualifications. 4) Review the completed paper and authorize payment if satisfied. 5) Request revisions to ensure satisfaction, with a full refund option for plagiarized work. The document promotes HelpWriting.net's writing assistance and satisfaction guarantees.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
An Exploratory Comparative Analysis Of The Use Of Metaphors In Writing On The Internet And Mobile Phones
1. This article was downloaded by: [ Swinburne University of Technology]
On: 09 October 2014, At: 16: 10
Publisher: Routledge
Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered
office: Mortimer House, 37-41 Mortimer Street, London W1T 3JH, UK
Social Semiotics
Publication details, including instructions for authors and
subscription information:
http:/ / www.tandfonline.com/ loi/ csos20
An exploratory comparative analysis of
the use of metaphors in writing on the
Internet and mobile phones
Rowan Wilken
a
a
Swinburne Institute for Social Research, Swinburne University of
Technology Hawthorn, Australia
Published online: 30 Oct 2012.
To cite this article: Rowan Wilken (2013) An exploratory comparative analysis of the use of
metaphors in writing on the Internet and mobile phones, Social Semiotics, 23:5, 632-647, DOI:
10.1080/ 10350330.2012.738999
To link to this article: http:/ / dx.doi.org/ 10.1080/ 10350330.2012.738999
PLEASE SCROLL DOWN FOR ARTICLE
Taylor & Francis makes every effort to ensure the accuracy of all the information (the
“Content”) contained in the publications on our platform. However, Taylor & Francis,
our agents, and our licensors make no representations or warranties whatsoever as to
the accuracy, completeness, or suitability for any purpose of the Content. Any opinions
and views expressed in this publication are the opinions and views of the authors,
and are not the views of or endorsed by Taylor & Francis. The accuracy of the Content
should not be relied upon and should be independently verified with primary sources
of information. Taylor and Francis shall not be liable for any losses, actions, claims,
proceedings, demands, costs, expenses, damages, and other liabilities whatsoever or
howsoever caused arising directly or indirectly in connection with, in relation to or arising
out of the use of the Content.
This article may be used for research, teaching, and private study purposes. Any
substantial or systematic reproduction, redistribution, reselling, loan, sub-licensing,
systematic supply, or distribution in any form to anyone is expressly forbidden. Terms &
Conditions of access and use can be found at http: / / www.tandfonline.com/ page/ terms-
and-conditions
2. An exploratory comparative analysis of the use of metaphors in writing
on the Internet and mobile phones
Rowan Wilken*
Swinburne Institute for Social Research, Swinburne University of Technology
Hawthorn, Australia
(Received 20 January 2011; final version received 10 March 2012)
Scant attention has been paid to the use of figures of speech in describing mobile
telephony and how it is used. While there are isolated cases, as yet there is no
study of metaphor use across a larger corpus of mobile phone research. This
article addresses this gap by developing a preliminary survey, or mapping, of the
use of metaphors and other discursive figures and tropes in the available literature
on mobile phones. It does this by using metaphors in Internet literature as a
springboard for comparative analysis, as a comparable communications medium.
Both for their general role as communications technologies and their specific
historicized position as ‘‘new media’’, and with their capacities increasingly
overlapping, mobile phones and the Internet form a useful counterpoint. The
article summarizes the key findings from earlier work mapping and critiquing the
use of metaphor in the critical and popular writing on the Internet. It then
compares and contrasts these Internet-based metaphors against those in the
mobile literature. The paper concludes with a discussion of the perils and the
promise of metaphor use in writing on communications technologies.
Keywords: metaphor; mobile media; mobile phone; Internet
Introduction
This article is part of an ongoing project that is motivated, at least in part, by a
commitment to the important task of paying due attention to the workings of new
media discourse, which I mean in the specific sense of the language used to describe
and debate new media technologies1
and in asking certain questions of the texts that
are produced about these media. In the present article, I am especially interested in
metaphor and what drives the selection and use of these particular figures of speech
in writing on the Internet and mobile phones. What, for instance, is carried by (or
perhaps ‘‘buried’’ within) the metaphors that appear in the literature on the Internet
and mobile phones? What might be revealed through a (comparative) analysis of
their usage and through the usage of other rhetorical and discursive strategies?
Moreover, what are the implications of these choices and strategies? How do they
shape the way that particular technologies and media platforms are imagined,
conceived and debated in the past, present and future? Such questioning, which
involves an ‘‘opening of media analysis to literary, hermeneutic, and rhetorical forms
of study’’ (Real 1996, 120), is productive in so far as ‘‘texts employ specific forms and
*Email: rwilken@swin.edu.au
Social Semiotics, 2013
Vol. 23, No. 5, 632647, http://dx.doi.org/10.1080/10350330.2012.738999
# 2013 Taylor Francis
Downloaded
by
[Swinburne
University
of
Technology]
at
16:10
09
October
2014
3. conventions to give shape and purpose to our media experience’’ (120), and attentive
reading of these texts can explore and reveal those devices.
In their now classic book, Metaphors We Live By, Lakoff and Johnson (1980, 3)
argue that ‘‘metaphor is pervasive in everyday life, not just in language but in
thought and action’’ and that, in fact, ‘‘our ordinary conceptual system, in terms of
which we both think and act, is thoroughly metaphorical’’. In this sense, metaphor is
inescapable, all pervasive, and the study of it is important if we are to grasp fully the
way we experience and make sense of the world especially that which we take to be
‘‘new’’, novel, or which evades apprehension (the seemingly ‘‘unknown’’). In the case
of writing on the Internet, critically examining metaphor use has proven instructive
for revealing how this particular technological form has been understood (both in
terms of its promise and its potential perils), particularly as a ‘‘spatial’’ realm, and
including the possible regulatory implications these metaphorical selections might
carry. It is in this sense that metaphors have been seen as playing a crucial role in
writing on the Internet, not just in informing but also in actively shaping popular and
critical understanding of this technology. The premise of this article is that an
examination of metaphor use in the available literature on mobile media is likely to
prove instructive for grasping how these media especially mobile phones are
presently understood. Thus, a key aim of this examination is to grasp how debate
concerning present and future uses (and possible regulation of these uses) of mobile
phones and mobile media is framed and shaped by particular metaphor selections.
In this way, it is valuable to ask: if metaphor is fundamental to conceptualize and
understand the Internet and its use, how does it function in understanding and
analysis of mobile phones? Given the continuities between the two fields in the
sense that both are important contemporary information and communication
technologies that increasingly provide access to the same data services (hence the
description of the mobile phone as the ‘‘Internet in your pocket’’), and they also
often share the literature generated by many of the same researchers and analysts,
who migrate over time from the Internet to this new form of communication it is
worth asking whether there are similar metaphors at work in the writing on mobile
phones and, if so, what are the likely implications of these metaphor selections for
our conception of and engagement with mobiles?
Metaphors and other figures of speech are common in our everyday engagements
with mobile media devices in both Anglophone settings and other cultural contexts.
In Japan, for instance, the mobile handset is commonly referred to as a ‘‘keitai’’
(roughly translated as, ‘‘something you carry with you’’ Ito 2006, 1). While in
Germany, the pseudo-English word ‘‘handy’’ has been adopted as the most common
colloquial term for a mobile phone. Despite this everyday usage, scant critical
attention has been paid to the use of metaphors and other figures of speech in
describing mobile telephony and how it is used. There are isolated cases, such as one
study, for instance, which notes the use of visual metaphors in advertising campaigns
and mobile phone content ‘‘in order to represent the experience derived from their
consumption’’ (Aguado and Martı́nez 2008, 7), and another which notes the
persistence of POSTAL metaphors in SMS use (Hjorth 2005). As yet, though, there is
no study of metaphor use across a larger corpus of mobile phone research. This
Social Semiotics 633
Downloaded
by
[Swinburne
University
of
Technology]
at
16:10
09
October
2014
4. article addresses this gap by offering an exploratory analysis of the use of metaphor
in writing on mobile phones.
One approach to the study of metaphor that has exerted a profound impact is
cognitive linguistics (or cognitive semantics), pioneered by Lakoff and Johnson
(1980), Talmy (2000a, 2000b) and Langacker (1987, 1991), among others. As Steen
(2008, 215) explains, ‘‘their most important theoretical claim is that metaphor in
language is based on conventional mappings between conceptual domains
in thought, such as ‘love’ and ‘journey’, or ‘time’ and ‘money’’’ which help us make
sense of phrases such as ‘‘love is a journey’’ and ‘‘time is money’’. What characterises
this work (as well as that to be found in the parallel but distinct field of
psycholinguistics see Ortony 1979; Hoffman and Honeck 1980) are very detailed
linguistics-based analyses of metaphor structure and operation. Such an approach is
not the intention here. It is also beyond the scope of this article to offer a
comprehensive analysis that accounts for all the various socio- and geo-political, and
cross-cultural and inter-generational differences in metaphor take-up and use.
Rather, the aim here is rather more modest: to develop a preliminary survey, or
mapping, of the use of metaphors in the available English-language literature on
mobile phones. It does this by using metaphors in Internet literature as a springboard
for analysis, as a comparable communications medium. Both for their general role as
communications technologies and their specific historicized position as ‘‘new
media’’, and with their capacities increasingly overlapping, mobile phones and the
Internet form a useful comparison and counterpoint. Summarising the key findings
from earlier work mapping and critiquing the use of metaphor in the critical and
popular writing on the Internet, the article then compares and contrasts these
Internet-based metaphors against those in the mobile literature. The article then
concludes with a discussion of some of the perils and the promise that attend
metaphor use in writing on communications technologies.
In taking up these concerns, a research project was developed to undertake an
exploratory analysis comparing the use of metaphors in the available popular and
critical literature on the Internet with those that appear in scholarship on mobile
phones. This involved a two-step process. First, literature explicitly addressing
metaphor in relation to the Internet and mobile phones was gathered using search
databases (primarily Google Scholar and EBSCOhost). Second, the literature yielded
by these means was supplemented by more general academic writing on mobiles and
their sociocultural uses especially that which was published as research
monographs or in scholarly edited collections (of which there are many). A key
reason for this approach was in order to capture what Steen (2008, 227) refers to as
both conspicuous and inconspicuous, or deliberate and non-deliberate, metaphors.
That is to say, this dual approach enabled the capture of critical reflection on
metaphor, unconscious use of or appeals to metaphor, as well as more strategic
applications of metaphor, either in ‘‘framing’’ (offering ‘‘conceptual frameworks for
concepts that require at least partial indirect understanding’’ Steen 2008, 231) or in
realising ‘‘perspectival change’’ [‘‘to produce an alternative perspective on a
particular reference or topic’’ (231)].
I begin this analysis by revisiting earlier work on the use of metaphor in the
critical and popular writing on the Internet.
634 R. Wilken
Downloaded
by
[Swinburne
University
of
Technology]
at
16:10
09
October
2014
5. Metaphor in the Internet literature
Metaphors proliferate in the literature on the Internet from the 1980s to 1990s.
Considerable critical attention has been given over to identifying the most prevalent
of these metaphors and detailing the difficulties and shortcomings associated with
their use (Adams 1997; Graham 1998; Wilken 2007). However, much less critical
attention has been paid to examining the same concerns in the available literature on
mobile phone use.
Metaphor is traditionally understood as a linguistic structure that implies
similarities between two ostensibly dissimilar things. The ‘‘essence of metaphor’’,
George Lakoff and Mark Johnson (1980, 5) explain, ‘‘is understanding and
experiencing one kind of thing in terms of another’’ one of which is familiar, the
other usually less so. For writers and readers, the power of metaphor rests in the fact
that the familiarity of the ‘‘known’’ domain can offer initial guidance to investigate
and to plumb the ‘‘unknown’’ domain.
The ability of metaphor to illuminate the seemingly ‘‘unknown’’ explains the
appeal of and appeal to metaphor in Internet scholarship. It is the reason
metaphors have been central to early imaginings of cyberspace (such as Gibson’s
Neuromancer, which draws heavily on ARCHITECTURAL metaphors in its representa-
tion of the ‘‘space’’ of cyberspace), especially the many anecdotal accounts of
cyberspace which ‘‘resemble the old ‘travelers’ tales’, accounts of adventurous trips
from the civilized world to newly discovered, exotic realms’’ (Wellman and Gulia
1999, 170). Metaphor proliferates in these accounts (Milne 2000), a way of
familiarising the ‘‘unknown’’ (or ‘‘abstract’’) via comparison with the ‘‘known’’
(and ‘‘concrete’’). The relative unfamiliarity of cyberspace and computer-mediated
communication is made comprehensible via comparison with more familiar notions
and experiences, such as SURFING, NAVIGATION, EXPLORATION, FRONTIERING, SETTLE-
MENT, TRANSPORTATION, HIGHWAYS, SITES, the DESK, OFFICE and HOME, and ARCHI-
TECTURE and URBAN PLANNING. Obviously, this list is by no means exhaustive; a
comprehensive inventory and detailed discussion of all metaphors employed to make
sense of cyberspace is beyond the scope of this paper (see Adams 1997). From my
analysis of the Internet literature, I was able to identify three recurrent types of
groups of metaphors, which I have categorized as follows: NAVIGATION and TRANS-
PORTATION metaphors, PIONEERING metaphors and ARCHITECTURAL metaphors. Each
of these has proven popular in terms of use, yet each has also proven contentious.
These metaphors often hold considerable initial appeal. This appeal tends to mask,
at least for a time, fuller recognition of the inherent shortcomings and difficulties
associated with these metaphors.
It is often forgotten that the prefix ‘‘cyber’’ is derived from the Greek root
kybernan, which means ‘‘to steer or guide’’ (Tofts and McKeich 1998, 19). In the
literature on cyberspace, the most literal use of this root meaning is in the metaphor
of NAVIGATION, where, ‘‘this nautical figure is [considered] appropriate for a world
imagined as a bit-stream of information flows’’ (19). The way that we ‘‘NAVIGATE’’
these flows the multiple pathways and hyperlinks of the Internet and the reported
addictive nature of this activity, often pursued as an end in itself, has also invited
comparisons with ‘‘SURFING’’ a metaphor which is said to be ‘‘suggestive of [the
Internet’s] dynamism and hedonism’’ (Tofts 1999, 23).
Social Semiotics 635
Downloaded
by
[Swinburne
University
of
Technology]
at
16:10
09
October
2014
6. As for TRANSPORTATION metaphors, one of the more influential has been the
description, from the early 1990s, of the Internet as an ‘‘INFORMATION SUPERHIGH-
WAY’’. Generally attributed to then US vice-president Al Gore, the INFORMATION
SUPERHIGHWAY metaphor reached its peak in 1996, declining ever since (Blavin and
Cohen 2002, 271). Recourse to TRANSPORTATION or CONDUIT (Reddy 1993)
metaphors is not surprising in this context given that communication and
transportation are inextricably linked (Carey 1989).
What troubles some commentators about this metaphor is that it strongly
describes the Internet in regulatory terms. For instance, it has been noted that, ‘‘if the
Internet is a highway, then government can regulate it for the safety of those who
pass on it’’, in much the same way as conventional highways are ‘‘subject to state and
(indirect) federal regulation’’ (Blavin and Cohen 2002, 269270). For those
attempting to make sense of the social spaces of the Internet, this metaphor is of
limited appeal. It ‘‘connotes a transfer of information’’, not social interaction and
habitation (Blavin and Cohen 2002), and it privileges one aspect of the medium and
not the many possible uses and users of this medium (Jones 2001, 54). Put another
way, any metaphor inevitably closes off particular interpretations of the target
domain in favour of others; this is an issue that will be returned to at the end of this
article.
PIONEERING and SETTLEMENT metaphors proliferate in those texts that conceive
of cyberspace not so much as pure information space but as a rich social space. A key
reason for this, Adams (1997, 160) suggests, is that, while pioneering is no longer a
familiar aspect of daily life, it has traction as a metaphor, especially in a North
American context, because ‘‘the image of the frontier is well worn in the mythology
of American culture’’, not to mention histories of the American technological
sublime (Nye 1994; Marx 2000). In this way, the notion of the electronic frontier
works by ambivalently suggesting ‘‘a theme from the past and a whole new kind of
space, because the electronic frontier did not in fact exist before the act of
settlement’’ (Adams 1997, 160). Indicative of such texts is Howard Rheingold’s
(1994) Virtual Community. Originally released in North America with the subtitle,
‘‘Homesteading on the Electronic Frontier’’, Rheingold’s text has been a key vehicle
in the early promulgation of the COMMUNITY metaphor (which is a subset of the
PIONEER metaphor) (for detailed discussion, see Wilken 2011). The FRONTIER as the
promise of community is also evident in John Seabrook’s book Deeper:
The landscape of the Net was not the great wide-open landscape of buffalo herds and
antelope, although I had imagined it was in the first year of my travels. The frontier was
more communal now. The frontier lay inside the group. (Seabrook 1997, 131)
For writer Douglas Rushkoff, on the other hand, the metaphor’s metaphysical
possibilities are of greatest appeal. Rushkoff (1994) conceives of cyberspace as ‘‘the
next dimensional home for consciousness’’, a ‘‘timeless dimension’’, a ‘‘boundless
territory’’ known as ‘‘Cyberia’’ (16). All three examples support Gregory Ulmer’s
(1994, 2631) suggestion that the FRONTIER metaphor has dominated understandings
of digital media.
The basic difficulty with the PIONEERING metaphor, and the tropes of ‘‘HOME-
STEADING’’ and ‘‘FRONTIER’’, is two-fold. On the one hand, it is argued that both feed
a nostalgic, pastoralist myth of community (Bell 2001, 98; Wellman and Gulia 1999,
636 R. Wilken
Downloaded
by
[Swinburne
University
of
Technology]
at
16:10
09
October
2014
7. 187). On the other hand, it is argued that they perpetuate western colonialist
narratives, particularly of possession, oppression and dispossession, as well as the
imposition of private property conceptions upon cyberspace (Hunter 2003; Rennie
and Young 2004; Olson 2005; Sardar 1996). As one source puts it, ‘‘SPATIAL
metaphors become not merely useful tools for making the revolutionary changes
of the information age less strange and unsettling, but a ready mechanism through
which to manage and regulate the alien phenomenon’’ (Gumpert and Drucker
1996, 32).
The third, and most prolific, metaphor type in writing on the Internet is
ARCHITECTURAL. ARCHITECTURAL metaphors have proven immensely popular in
computer interface design (most notably, Microsoft Windows and its associated
‘‘DESKTOP’’ iconography for detailed discussion, see Fauconnier and Turner 2002),
and in the design of the graphical user interfaces of many virtual communities
where users inhabit ‘‘ROOMS’’ or frequent various ‘‘AGORA’’, ‘‘CAFÉS’’, ‘‘BARS’’, and
other social spaces the use of ARCHITECTURAL and URBAN PLANNING metaphors
has been widely documented (Mitchell 2000). These metaphors, too, have attracted
criticism. In interface design, ARCHITECTURAL metaphors have been labelled non-
intuitive, restrictive and conservative (Johnson 1997, 61). Their usage in computer-
mediated communications research more generally is also resisted on the basis that it
promotes exclusion and forecloses alternative ways of conceiving of the social space
of computer-mediated communications.
Having provided this overview of earlier work on the use of metaphor in the
critical and popular writing on the Internet, discussion now turns to the use of
metaphor in academic scholarship on mobile phones. As previously stated, this
analysis is exploratory. That is to say, given the continuities between the two fields
Internet research and mobile telephony/media research and given concerns about
the larger role that metaphor plays in shaping discursive engagement with new media
technologies and knowledge in general (concerns which will be taken up and
addressed at the end of this article), it is worth asking whether there are similar
metaphors at work in the writing on mobile phones.
From Internet to mobiles
In examining the literature on mobile phone use, there are clear consistencies evident
in the way that metaphors have been employed in earlier writing on the Internet
and in more recent writing on mobile phones. While ARCHITECTURAL metaphors are
all but absent in writing on mobile telephony, NAVIGATION, TRANSPORTATION and
PIONEERING metaphors are all identifiable in the mobile phone literature. This is not
all that surprising given the wealth of literature that argues for clear continuities
between older and newer (or even just different) forms of media (see Bolter and
Grusin 1999; Chun and Keenan 2006; Gitelman 2008; Gitelman and Pingree 2003;
Marvin 1988; Milne 2010 Sconce 2000; Tofts, Jonson, and Cavallaro 2002; Tofts and
McKeich 1998). For instance, echoing the much earlier work of Marshall McLuhan
(McLuhan and Fiore 1989), Bolter and Grusin (1999) write that, ‘‘each act of
mediation depends on other acts of mediation’’ and that ‘‘media need each other in
order to function as media’’ (55). Reproduction of other media forms they suggest
and also, I would argue, the tropes used in written engagements with these forms is
‘‘integral to media’’ (55).
Social Semiotics 637
Downloaded
by
[Swinburne
University
of
Technology]
at
16:10
09
October
2014
8. Nevertheless, despite clear continuities between older and newer forms of media,
the transference of metaphor from one to the other is not necessarily always
successful. For example, one study investigates consumer experiences in accessing the
Internet via mobile handsets (Isomursu et al. 2007). As part of this study, the authors
quizzed users on the applicability (or otherwise) of Internet metaphors for capturing
their experiences of interfacing with the mobile Internet. Findings revealed the
limited applicability of Internet metaphors. As the authors note, the transfer of
metaphors from the ‘‘fixed Internet’’ to the ‘‘mobile Internet’’ ‘‘creates false
expectations towards the mobile Internet and poor understanding of its possibilities
and constraints’’ (Isomursu et al. 2007, 260). If these metaphors are to have ongoing
currency, they argue, significant amendments are required if they are to remain
pertinent to users who seek to access the Internet via mobile handsets.2
In writing up their findings, the authors explore a number of metaphors for the
mobile Internet that incorporate these figurative adjustments. NAVIGATIONAL
metaphors, and more specifically NAUTICAL metaphors (or what Isomursu et al.
2007 refer to as the idea of the ‘‘INTERNET AS OCEAN’’), are refined to distinguish
between ‘‘SCUBA DIVING’’ (the immersive experience associated with Internet
searching) and ‘‘SNORKELLING’’ (the surface skimming they claim is more closely
associated with mobile where the ‘‘user’s attention often is divided or can be
interrupted at any moment’’ (262)). As for the HIGHWAY metaphor, the authors argue
that a distinction should be made between the Internet as a ‘‘BRANCHING ROAD’’ and
the mobile Internet as a ‘‘STRAIGHT ROAD’’ ‘‘with specific destinations in mind’’ (263).
Finally, in terms of SETTLEMENT metaphors, the authors argue the Internet as a social
space akin to a CAMPFIRE a comparison first made by Rheingold is a useful
metaphor for capturing the social dimensions of mobile use in the Web 2.0 era (263).
Drawing on the work of Thornburg (2001), the authors expand this metaphor to
distinguish three separate internal components: CAMPFIRE (where people gather),
WATERING HOLE (where people share information) and CAVE (where people can isolate
themselves) (Isomursu et al. 2007, 264).
In the above case scholarship on mobile Internet user experience there are
clear continuities with the metaphors employed in writing on the Internet (both make
use of NAVIGATIONAL/NAUTICAL and SETTLEMENT metaphors), but also subtle
differentiations for this changed context (such as breaking down the SETTLEMENT
metaphor into various subcategories that are more characteristic of mobile Internet
use).
Metaphors to capture techno-social complexity
Beyond the above examples, the presence of metaphors is decidedly more fugitive in
the available (Anglophone) literature on mobile phones than is the case in writing on
the Internet. There are a number of possible explanations for this, but here I would like
to address one key reason, which has to do with the history of the telephone. Despite
its rocky early reception, and the long and halting path it had to take to achieve
widespread social acceptance (Fischer 1992), the telephone has now become, ‘‘literally,
a fixture of everyday life’’ for millions worldwide (Katz and Aakhus 2002, 1).
The widespread acceptance of and familiarity with the telephone despite the
novelties associated with its more recent transportability suggests that metaphor is
not so crucial in understanding mobile phones as a technological artefact (Fortunati
638 R. Wilken
Downloaded
by
[Swinburne
University
of
Technology]
at
16:10
09
October
2014
9. 2005b). As the telephone is to some extent a ‘‘known’’, there is seemingly less need to
explain the ‘‘unknown’’ via reference to a metaphorical figure of speech as was
required with the advent of the Internet (‘‘cyberspace’’). Indeed, BEING ON THE
PHONE, BY THE PHONE, HANGING ON THE LINE and so on are all common figures of
speech.
Those additional metaphors that are discernible in the mobile literature, and that
do not rehearse or rework those used to describe and understand the Internet, tend
to be employed less for explaining the medium itself and more for making sense of
the sociocultural and socio-technical complexities associated with this medium’s use.
For example, this is the context in which critics have employed the BIOLOGICAL
metaphor of an ECOSYSTEM as a way of making sense of the manifold industry-
related conflicts affecting mobile marketing (Wilken and Sinclair 2008, 2009).
Recourse to the DRAMATURGICAL metaphor of the theatre stage famously first
developed by Erving Goffman (1990) can be understood in similar terms: as an
attempt to make sense of the many nuances and ambiguities attending mobile users’
negotiations of publicprivate tensions (see Cumiskey 2005; Fortunati 2005a; Julsrud
2005).
From the review of the available mobiles literature, two further recurrent types of
metaphor emerged which have been deployed as a way of shedding light on the
sociocultural and socio-technical complexities of mobile use. The first of these is the
metaphor of DOMESTICATION, first developed in studies of home technology
consumption and then extended to mobile phone use. The second type are MAGICAL
and MYTHOLOGICAL metaphors, particularly Arnold’s (2003) reference to the two-
faced Roman deity JANUS to explain the many contradictions associated with mobile
phones.
Domestication
Roger Silverstone and Leslie Haddon (1996) developed the DOMESTICATION metaphor
or approach originally as a way of making sense of the ‘‘intimate relations’’ that
characterize the ‘‘production and consumption of a new media and information
technology’’ within the domestic home (54). As they conceive of it, DOMESTICATION
involves a double process. On the one hand, new technologies (such as computers,
DVD players and mobile phones) are considered exciting but also potentially
threatening and in need of being brought ‘‘under control by and on behalf of
domestic users’’ (60). On the other hand, as soon as they are ‘‘DOMESTICATED’’,
through ownership and appropriation into the culture, and through flows and
routines of family, household and everyday life, these technologies are ‘‘CULTIVATED’’.
That is to say, as they become familiar, or as they are placed alongside or replace
existing technologies, the uses of these technologies change and are redefined (60, 68).
Silverstone and Haddon summarize this as a process that involves a ‘‘taming of the
wild and a cultivation of the tame’’ (60). While originally used in British studies of
more-or-less fixed ICTs in the home, the metaphor of DOMESTICATION has
subsequently been applied to studies of mobile phones (Haddon 2003; Hjorth
2007; Morley 2003). For example, David Morley (2003) extends the domestication
model by drawing out the contradictory dynamic or tension between processes of
technological domestication that occur within the family home, and other practices
Social Semiotics 639
Downloaded
by
[Swinburne
University
of
Technology]
at
16:10
09
October
2014
10. of everyday life by which mobile phone use ‘‘dislocates’’ (in the sense of a relocation
rather than a supplanting of) domesticity.
The DOMESTICATION metaphor can be read as a further example of the translation
of PIONEERING or SETTLEMENT metaphors from Internet to mobile scholarship
especially given the explicit use of such language by Silverstone and Haddon. In this
context, again, amendments have been necessary in order for this translation to
work. Yet, Morley’s extension of the DOMESTICATION metaphor to the study of
mobile phones is perhaps more significant when read as an attempt to account for
the complexities and contradictions by which mobile use continues to be implicated
with and bound to more established sites of technology consumption, like the
domestic home. Possible limitations to this metaphor might include a restricted scope
due to its domestic setting, and a lack of serious consideration of the gendered
implications associated with the metaphor.
Magic and mythology
MAGIC has formed a further key trope in writing on mobiles (Isomursu et al. 2007,
265) as a way of making sense of the numerous complexities of mobile phone use. For
instance, Katz and Aakhus (2002, 11) developed the concept of Apparatgeist, a
portmanteau term, which bridges the machinic with the cognitive and the spiritual,
as a way of explaining the metaphysical qualities associated with mobile use. In later
work, Katz (2006) deploys MAGIC as an overarching metaphor for understanding
mobiles because ‘‘magic is one of the salient characteristics of the technology as it is
first experienced by many people’’ (6). He also uses it as a way of drawing attention
to the ‘‘too often overlooked spiritual, psychic and religious uses of the mobile
phone’’ (7) that is to say, how mobile phones are ‘‘increasingly embraced as
spiritual emissaries and are even imputed to have spiritual powers themselves’’, as
well as more specific practices which include, among other things, ‘‘the astrological
services that are available via SMS, the way churches use ICTs for spiritually
connecting with their members, and the magical powers ascribed to some mobile
phone numbers’’ (Garmendia 2008, 3).
Like MAGIC, classical mythology, too, is a key source of metaphors in the mobile
literature. One of the more productive examples is Michael Arnold’s (2003) use of the
JANUS metaphor to explain the phenomenology of mobile phones. As Arnold
explains, ‘‘Janus is a Roman deity cursed and blessed with two faces, and cursed and
blessed with no option other than to look in different directions at once’’ (233).
Applied to our experience of mobile phones, the JANUS metaphor is valuable in
placing paradox at the centre of our understanding of this particular technology:
‘‘The mobile phone is facing each and every way, it is always and at once pointing in
different directions’’ (234). Arnold then puts this metaphor to work in a careful
explication of the seemingly endless structural ambiguities attending mobiles and
their uses the way they facilitate independence as well as co-dependence; lead to a
greater sense of vulnerability while also providing reassurance; facilitate social
proximity at the same as allowing greater geographical distance; blur the public and
the private; make us both increasingly busy and also available, important and not so
important; and so on. The JANUS-FACE breaks from the existing suite of Internet-
based metaphors and is an isolated instance of a metaphor developed independently
of the Internet in order to make sense of mobile phones.
640 R. Wilken
Downloaded
by
[Swinburne
University
of
Technology]
at
16:10
09
October
2014
11. Arnold’s use of the JANUS metaphor shares certain similarities with Castells’s
deployment of the NETWORK metaphor in his work on globalisation. Anne
Wallemacq argues that Castells’s application of the NETWORK metaphor is often
‘‘more incantative than analytical’’, providing the means by which to ‘‘express some
properties sometimes contradictory (despatialization and respatialization), or puz-
zling (the end of the notion of contiguity)’’ (Wallemacq 1998, 607). In this way,
Wallemacq suggests, the NETWORK metaphor ‘‘should not be seen as a descriptive
concept’’, but rather as ‘‘a kind of ‘totem’ a method of thinking, a paradigmatical
figure’’ (608). The same holds for the JANUS metaphor. Its force comes primarily
from providing a ‘‘method of thinking’’ about the contradictions and puzzlements of
the mobile phone and their uses.
Conclusions: tantalising possibilities and risks
The image of the JANUS-FACE concludes this preliminary survey of metaphors in the
mobile literature. As stated at the outset, the intention is not to provide a
comprehensive account of metaphor in writing on mobile phones but, rather, to
develop a preliminary survey, or mapping, of the use of metaphors in the available
English-language literature on mobile phones, which were examined in comparison
to the use of metaphor in the earlier literature on the Internet. Further research in
this area will both broaden and deepen the analysis, to include, for instance,
discussion of the ‘‘WALLED GARDEN’’ (Netanel 2007) and ‘‘MOBILE COMMONS’’
(Goggin 2011, 157175) metaphors in communications policy, as well as careful
consideration of tropes that circulate in the wider literature on globalisation and ICT
use, all of which have a direct impact on our understanding of mobile phones. Key
among these is the continuing need to challenge the ‘‘folk framing’’ of mobile phones
as ‘‘devices that will liberate individuals from the constraints of their settings’’ (Katz
and Aakhus 2002, 7). In addition, future work can also embrace analysis of the
impacts and existing critiques of the NETWORK metaphor (Knox, Savage, and Harvey
2006; Nas and Houweling 1998; Wallemacq 1998), the MOBILITY metaphor (Favell
2001; Wolff 1993), the notion of CLOUD COMPUTING, and what seems to be the
metaphor du jour, that of ‘‘CONVERGENCE’’ (Jenkins 2006; Wirth 2006; Wood 2008).
Having gestured towards possible future work, then, I wish to close by offering
some comments on why metaphors matter.
Software and other forms of technological device design have long made recourse
to metaphors, both as a way of problem solving and as a way of explaining technical
capabilities to future users (Coyne 1995). This tradition has not been without
criticism, however. For at least one critic, it is a ‘‘perilous’’ process as it ‘‘firmly nail[s]
our conceptual feet to the ground’’, forever limiting the power of the device, how it is
understood and its likely future uses (Cooper 1995).
The same general criticisms can be extended to broader uses of metaphor in the
literature on mobile phones. Metaphor selection is never free of complication, and
any comparison intended to clarify also has the capacity to obfuscate (‘‘certain
aspects are illuminated, others shadowed over’’ Brown 1976, 172). Ill-chosen
metaphors even if they do not initially appear as such can prove particularly
detrimental in that they can determine in advance how we are likely to imagine and
use particular technologies and have the potential to confuse rather than clarify, thus
Social Semiotics 641
Downloaded
by
[Swinburne
University
of
Technology]
at
16:10
09
October
2014
12. failing to fulfil the very function these metaphors were employed to perform in the
first place.
What is more, in so far as metaphor is intertwined with rhetoric, metaphor is
never innocent, and the rhetorical uses of metaphor always influence and shape the
meanings that are generated by, and the meanings which accumulate around, a given
metaphor. In short, metaphors have the potential to orient research setting the
terms of reference of and agenda for research and to fix results (Derrida 2001, 17).
Steen refers to the sorts of metaphors that fall into this category as ‘‘deliberate
metaphors’’. According to Steen, deliberate metaphors (which he tentatively aligns
with metaphor in communication as opposed to metaphor in thought) involve ‘‘a
distinct rhetorical strategy that senders utilize to achieve a specific discourse function
by means of a metaphorical comparison’’ (Steen 2008, 224). Metaphors of this type,
he argues, are ‘‘deliberate in the sense of consciously being selected to achieve a
particular communicative, and especially rhetorical, effect’’ (224).
An alternative (and perhaps more positive) take is that metaphor aims to
concentrate our attention on what ‘‘emerges in the interplay of juxtaposed
associations’’ (Brown 1976, 181) and, at its best:
It provides a new way of understanding that which we already know, and in so doing it
reconstitutes from these materials new domains of perception and new languages of
thought. (185)
In light of these ‘‘twin faces’’ of metaphor (to continue Arnold’s earlier example),
I suggest that two interconnected endeavours are required.
The first is to undertake an ongoing critique of metaphor, which involves a
certain ethics of reading (as Derrida might say), a commitment to close reading
which is attentive to the shaping force of language and metaphor, and which
interrogates the ways by which metaphor operates through language (Derrida 2001,
1718). In such a process, it needs to be recollected that it is only possible to critique
metaphor from within, by working with and against metaphor, recognising its limits
and working at these limits. Using such an approach to analyse in detail each of the
metaphors surveyed here will shed considerable light on the nature and direction of
mobile studies.
It is in this context that Janet Wolff (1993, 235) suggests that an effective critical
strategy might be the reappropriation rather than the avoidance of existing
metaphors. Equally, as Lisa Gitelman (2008, 2) notes, ‘‘it pays to be careful with
language’’. We ought to think carefully about our choice of vocabulary, being
especially cautious of terminology that is liberatory in some ways but restrictive in
others (235). In other words, as Donna Haraway (1991, 150) would say, there is merit
in taking ‘‘pleasure in the confusion of boundaries, and for responsibility in their
construction’’.
The second endeavour is the need for the invention and selection of new
metaphors. Just as it is important to read backwards (asking, among other things,
‘‘How is this history of metaphor possible?’’ Derrida 2001, 17), it is equally
important to read forwards, probing what futures and future metaphors are possible.
This is to acknowledge that metaphors are not static (Wolff 1993, 235). It is also to
recognize the vitality of metaphor (with ‘‘vitality’’ intended here in a double sense,
suggesting importance to and animation of discourse with the latter suggestive of
642 R. Wilken
Downloaded
by
[Swinburne
University
of
Technology]
at
16:10
09
October
2014
13. how metaphor feeds and gives life to new media discourse) and the ongoing
relevance of metaphor to understanding technologies and the techno-social.
Neither of these tasks is easy, however. On the one hand, ‘‘to unmask metaphors
requires negative insight and circumspection’’ (Brown 1976, 176). On the other hand,
‘‘to create new metaphors is a leap of the imagination’’ (176). The ‘‘pivotal point’’,
though, as Brown makes clear, is that metaphor must ‘‘retain its consciously ‘as if’
quality [. . .] for on it turns the difference between using metaphors and being used by
them’’. It is this sense of the continual ‘‘as if’’ that must be carried with us as we
engage with metaphor and other figures of speech in our critical dealings with mobile
phones and all socio-technical interactions.
Acknowledgements
This article is an output from a program of research under Australian Research Council
Discovery Early Career Researcher Award, DE120102114, ‘‘The Cultural Economy of
Locative Media’’, funded 20122014. I gratefully acknowledge the ARC’s financial support.
I also wish to thank Anthony McCosker and Esther Milne for their input and suggestions.
Notes
1. It is worth noting here the following remark by M.H. Abrams (1953, 31 quoted in Fishelov
1993, 5): ‘‘The task of analyzing the nature and function of metaphor has traditionally been
assigned to the rhetorician and to the critic of literature. Metaphor, however, whether alive
or moribund, is an inseparable element of all discourse, including discourse whose purpose
is neither persuasive nor aesthetic, but descriptive and informative.’’
2. A similar argument is made by Richardson in relation to the ‘‘body metaphors’’ we employ
when moving from desktop computers to mobile screens. ‘‘If we are to understand the
technosomatic specificities of contemporary screen engagement,’’ she writes, ‘‘we need to
develop a more nuanced or granular interpretation of such experiences, with particular
insight into the altered somatic, haptic and facial relations to emerge from our engagement
with smaller and sometimes portable screens’’ (Richardson, 2010; see also, Richardson,
2005).
Notes on contributor
Dr Rowan Wilken holds an Australian Research Council funded Discovery Early Career
Researcher Award (DECRA) in the Swinburne Institute for Social Research, Swinburne
University of Technology, Melbourne. His present research interests include locative and
mobile media, domestic media consumption, digital technologies and culture, old and new
media, and theories and practices of everyday life. He is the author of Teletechnologies, Place,
and Community (Routledge 2011) and co-editor (with Gerard Goggin) of Mobile Technology
and Place (Routledge 2012).
References
Adams, P.C. 1997. Cyberspace and virtual places. The Geographical Review 87, no. 2: 15571.
Aguado, J.M., and I.J. Martı́nez. 2008. The construction of the mobile experience: The role of
advertising campaigns in the appropriation of mobile phone technologies. In Mobile phone
cultures, ed. G. Goggin, 112. London: Routledge.
Arnold, M. 2003. On the phenomenology of technology: The ‘‘Janus-faces’’ of mobile phones.
Information and Organization 13, no. 4: 23156.
Bell, D. 2001. An introduction to cybercultures. London: Routledge.
Social Semiotics 643
Downloaded
by
[Swinburne
University
of
Technology]
at
16:10
09
October
2014
14. Blavin, J.H., and I.G. Cohen. 2002. Gore, Gibson, and Goldsmith: The evolution of Internet
metaphors in law and commentary. Harvard Journal of Law and Technology 16, no. 1:
26585.
Bolter, J.D., and R. Grusin. 1999. Remediation: Understanding new media. Cambridge, MA:
MIT Press.
Brown, R.H. 1976. Social theory as metaphor: On the logic of discovery for the sciences of
conduct. Theory and Society 3, no. 2: 16997.
Carey, J.W. 1989. Communication as culture: Essays on media and society. Boston, MA: Unwin
Hyman.
Chun, W.H.K., and T. Keenan, eds. 2006. New media, old media: A history and theory reader.
New York: Routledge.
Cooper, A. 1995. The myth of metaphor. http://a.parsons.edu/chenj574/F05/ms/downloads/
read/The_Myth_of_Metaphor.pdf (accessed December 8, 2010).
Coyne, R. 1995. Designing information technology in the postmodern age: From method to
metaphor. Cambridge, MA: MIT Press.
Cumiskey, K.M. 2005. ‘‘Surprisingly, nobody tried to caution her’’: Perceptions of
intentionality and the role of social responsibility in the public use of mobile phones. In
Mobile communications: Re-negotiation of the social sphere, ed. R. Ling and P.E. Pedersen,
22536. London: Springer.
Derrida, J. 2001. Writing and difference. Trans. A. Bass. London: Routledge.
Fauconnier, G., and M. Turner. 2002. The way we think: Conceptual blending and the mind’s
hidden complexities. New York: Basic Books.
Favell, A. 2001. Migration, mobility and globaloney: Metaphors and rhetoric in the sociology
of globalization. Global networks 1, no. 4: 38998.
Fishelov, D. 1993. Metaphors of genre: The role of anthologies in genre theory. University Park,
PA: Pennsylvania State University Press.
Fortunati, L. 2005a. Mobile telephone and the presentation of self. In Mobile communications:
Re-negotiation of the social sphere, ed. R. Ling and P.E. Pedersen, 20318. London:
Springer.
Fortunati, L. 2005b. The mobile phone as technological artefact. In Thumb culture: The
meaning of mobile phones for society, ed. P. Glotz, S. Bertschi, and C. Locke, 14960.
Bielefeld, Germany: transcript Verlag.
Garmendia, M. 2008. Review: Magic in the air: Mobile communication and the transforma-
tion of social life. Politics and Culture 4. http://www.politicsandculture.org/2010/09/19/
review-magic-in-the-air-mobile-communication-and-the-transformation-of-social-life/ (acc-
essed March 8, 2012).
Gitelman, L. 2008. Always already new: Media, history, and the data of culture. Cambridge,
MA: MIT Press.
Gitelman, L., and G.B. Pingree, eds. 2003. New media, 17401915. Cambridge, MA: MIT
Press.
Goffman, E. 1990. The presentation of self in everyday life. London: Penguin.
Goggin, G. 2011. Global mobile media. London: Routledge.
Graham, S. 1998. The end of geography or the explosion of place? Conceptualizing space,
place and information technology. Progress in Human Geography 22, no. 2: 16585.
Gumpert, G., and S.J. Drucker. 1996. From locomotion to telecommunication, or paths of
safety, streets of Gore. In Communication and cyberspace: Social interaction in an electronic
environment, ed. L. Strate, R. Jacobson, and S.B. Gibson, 2537. Cresskill, NJ: Hampton
Press.
Haddon, L. 2003. Domestication and mobile telephony. In Machines that become us: The
social context of personal communication technology, ed. J.E. Katz, 4355. New Brunswick,
NJ: Transaction Publishers.
Haraway, D.J. 1991. Simians, cyborgs, and women: The reinvention of nature. London: Free
Association Press.
Hjorth, L. 2005. Locating mobility: Practices of co-presence and the persistence of the postal
metaphor in SMS/ MMS mobile phone customization in Melbourne. Fibreculture Journal 6.
http://six.fibreculturejournal.org/fcj-035-locating-mobility-practices-of-co-presence-and-the-
644 R. Wilken
Downloaded
by
[Swinburne
University
of
Technology]
at
16:10
09
October
2014
15. persistence-of-the-postal-metaphor-in-sms-mms-mobile-phone-customization-in-melbourne/
(accessed March 8, 2012).
Hjorth, L. 2007. Domesticating new media: A discussion on locating mobile media. In Mobile
Media 2007, ed. G. Goggin and L. Hjorth, 17988. Sydney: University of Sydney.
Hoffman, R.R., and R.P. Honeck, eds. 1980. Cognition and figurative language. Hillsdale, NJ:
Lawrence Erlbaum Associates.
Hunter, D. 2003. Cyberspace as place, and the tragedy of the digital anticommons. California
Law Review 91, no. 2: 439519.
Isomursu, P., R. Hinman, M. Isomursu, and M. Spasojevic. 2007. Metaphors for the mobile
Internet. Knowledge, Technology, Policy 20, no. 4: 25968.
Ito, M. 2006. Introduction: Personal, portable, pedestrian. In Personal, portable, pedestrian:
Mobile phones in Japanese life, ed. M. Ito, D. Okabe, and M. Matsuda, 116. Cambridge,
MA: MIT Press.
Jenkins, H. 2006. Convergence culture: Where old and new media collide. New York: New York
University Press.
Johnson, S. 1997. Interface culture: How new technology transforms the way we create and
communicate. San Francisco, CA: HarperEdge.
Jones, S. 2001. Understanding micropolis and compunity. In Culture, technology, communica-
tion: Towards an intercultural global village, ed. C. Ess and F. Sudweeks, 5366. Albany, NY:
State University of New York Press.
Julsrud, T.E. 2005. Behavioral changes at the mobile workplace: A symbolic interactionistic
approach. In Mobile communications: Re-negotiation of the social sphere, ed. R. Ling and
P.E. Pedersen, 93111. London: Springer.
Katz, J.E. 2006. Magic in the air: Mobile communication and the transformation of social life.
New Brunswick, NJ: Transaction Publishers.
Katz, J.E., and M.A. Aakhus. 2002. Introduction: Framing the issues. In Perpetual
contact: Mobile communication, private talk, public performance, ed. J.E. Katz and M.A.
Aakhus, 113. Cambridge: Cambridge University Press.
Knox, H., M. Savage, and P. Harvey. 2006. Social networks and the study of relations:
Networks as method, metaphor and form. Economy and Society 35, no. 1: 11340.
Lakoff, G., and M. Johnson. 1980. Metaphors we live by. Chicago: University of Chicago Press.
Langacker, R.W. 1987. Foundations of cognitive grammar. Vol. 1 of Theoretical prerequisites.
Stanford, CA: Stanford University Press.
Langacker, R.W. 1991. Foundations of cognitive grammar. Vol. 2 of Descriptive application.
Stanford, CA: Stanford University Press.
Marvin, C. 1988. When old technologies were new: Thinking about electric communication in the
late nineteenth century. New York: Oxford University Press.
Marx, L. 2000. The machine in the garden: Technology and the pastoral ideal in America. New
York: Oxford University Press.
McLuhan, M., and Q. Fiore. 1989. The medium is the massage. New York: Touchstone.
Milne, E. 2000. Vicious circles. Metaphor and the historiography of cyberspace. Social
Semiotics 10, no. 1: 99108.
Milne, E. 2010. Letters, postcards, email: Technologies of presence. New York: Routledge.
Mitchell, W.J. 2000. Replacing place. In The digital dialectic: New essays on new media, ed.
P. Lunenfeld, 11228. Cambridge, MA: MIT Press.
Morley, D. 2003. What’s ‘‘home’’ got to do with it? Contradictory dynamics in the
domestication of technology and the dislocation of domesticity. European Journal of
Cultural Studies 6, no. 4: 43558.
Nas, P.J.M., and A.J. Houweling. 1998. The network metaphor: An assessment of Castells’
network society paradigm. Journal of Social Sciences 2, no. 4: 22132.
Netanel, N.W. 2007. Temptations of the walled garden: Digital rights management and mobile
phone carriers. Journal on Telecommunications and High Technology Law 6; UCLA School
of Law Research Paper 07-32. http://ssrn.com/abstract1066261 (accessed March 8, 2012).
Nye, D.E. 1994. American technological sublime. Cambridge, MA: MIT Press.
Olson, K. 2005. Cyberspace as place and the limits of metaphor. Convergence 11, no. 1: 108.
Ortony, A., ed. 1979. Metaphor and thought. Cambridge: Cambridge University Press.
Real, M. 1996. Exploring media culture: A guide. Thousand Oaks, CA: SAGE.
Social Semiotics 645
Downloaded
by
[Swinburne
University
of
Technology]
at
16:10
09
October
2014
16. Reddy, M.J. 1993. The conduit metaphor: A case of frame conflict in our language about
language. In Metaphor and Thought, ed. A. Ortony, 164201. 2nd ed. Cambridge:
Cambridge University Press.
Rennie, E., and S. Young. 2004. Park life: The commons and communications policy. In
Virtual nation: The Internet in Australia, ed. G. Goggin, 24257. Sydney: UNSW Press.
Rheingold, H. 1994. Virtual community: Finding connection in a computerized world. London:
Secker and Warburg.
Richardson, I. 2005. Mobile technosoma: Some phenomenological reflections on itinerant
media devices. Fibreculture Journal 6. http://six.fibreculturejournal.org/fcj-032-mobile-tech-
nosoma-some-phenomenological-reflections-on-itinerant-media-devices/ (accessed March
9, 2012).
Richardson, I. 2010. Faces, interfaces, screens: Relational ontologies of framing, attention and
distraction. Transformations 18. http://www.transformationsjournal.org/journal/issue_18/
article_05.shtml (accessed March 9, 2012).
Rushkoff, D. 1994. Cyberia: Life in the trenches of cyberspace. London: Harper Collins.
Sardar, Z. 1996. Cyberspace as the darker side of the West. In CyberFutures: Culture and
politics on the information superhighway, ed. Z. Sardar and J.R. Ravetz, 1441. New York:
New York University Press.
Seabrook, J. 1997. Deeper: A two-year odyssey in cyberspace. London: Faber and Faber.
Sconce, J. 2000. Haunted media: Electronic presence from telegraphy to television. Durham,
NC: Duke University Press.
Steen, G. 2008. The paradox of metaphor: Why we need a three-dimensional model of
metaphor. Metaphor and Symbol 23: 21341.
Talmy, L. 2000a. Toward a cognitive semantics. Vol. I of Concept structuring systems.
Cambridge, MA: MIT Press.
Talmy, L. 2000b. Toward a cognitive semantics. Vol. II of Typology and process in concept
structuring. Cambridge, MA: MIT Press.
Thornburg, D. 2001. Campfires in cyberspace: Primordial metaphors for learning in the 21st
century. Education at a Distance 15, no. 6, n.p.
Tofts, D., ed. 1999. Hyperlogic, the avant-garde and other intransitive acts. In Parallax: Essays
on art, culture and technology, 1628. North Ryde, Sydney: Interface.
Tofts, D., A. Jonson, and A. Cavallaro, eds. 2002. Prefiguring cyberculture: An intellectual
history. Sydney: Power Publications; Cambridge, MA: MIT Press.
Tofts, D., and M. McKeich. 1998. Memory trade: A prehistory of cyberculture. North Ryde,
Sydney: Interface.
Ulmer, G.L. 1994. Heuretics: The logic of invention. Baltimore, MD: Johns Hopkins University
Press.
Wallemacq, A. 1998. Totem and metaphor: The concept of the network as a symbolic
operator. Organization 5, no. 4: 593612.
Wellman, B., and M. Gulia. 1999. Virtual communities as communities: Net surfers don’t ride
alone. In Communities in cyberspace, ed. M.A. Smith and P. Kollock, 16794. London:
Routledge.
Wilken, R. 2007. The haunting affect of place in the discourse of the virtual. Ethics, Place and
Environment 10, no. 1: 4963.
Wilken, R. 2011. Teletechnologies, place, and community. New York: Routledge.
Wilken, R., and J. Sinclair. 2008. Contests of power and place: Advertising and the
‘‘complicated mobile phone ecosystem.’’ Proceedings of the Australian and New Zealand
Communication Association Conference 2008. http://anzca08.massey.ac.nz/massey/depart/
cob/conferences/anzca-2008/anzca08-refereed-proceedings.cfm (accessed December 8,
2010).
Wilken, R., and J. Sinclair. 2009. ‘‘Waiting for the kiss of life’’: Mobile media and advertising.
Convergence: The International Journal of Research into New Media Technologies 15, no. 4:
42745.
Wirth, M. 2006. Issues in media convergence. In Handbook of media management and
economics, ed. A.B. Albarran, S.M. Chan-Olmsted, and M.O. Wirth, 44562. Mahwah, NJ:
Lawrence Erlbaum.
646 R. Wilken
Downloaded
by
[Swinburne
University
of
Technology]
at
16:10
09
October
2014
17. Wolff, J. 1993. On the road again: Metaphors of travel in cultural criticism. Cultural Studies 7,
no. 2: 22439.
Wood, A. 2008. Proliferating connections and communicating convergence. Fibreculture
Journal 13. http://thirteen.fibreculturejournal.org/fcj-090-proliferating-connections-and-
communicating-convergence/ (accessed March 8, 2012).
Social Semiotics 647
Downloaded
by
[Swinburne
University
of
Technology]
at
16:10
09
October
2014