Terminological Obfuscation in Online Research
نویسنده
چکیده
Many concepts—such as “computer mediated versus face-to-face interaction,” “virtual versus real,” “flaming,” and “anonymity”—that scholars have used for decades have led to theoretical misunderstandings about online and offline communication. This chapter discusses theoretical problems that standard terms introduce. The goal is not simply to urge more precision by defining terms, but rather to show how concepts and their orienting frameworks complicate scholars’ ability to observe and analyze certain data. Use of ill-defined terms may obscure data that lies outside of an orienting term’s worldview. The chapter analyzes concerns with these terms and concludes with suggestions on how to resist unreflective use of terms that complicates open-ended empirical investigation of communicative phenomena.
منابع مشابه
Terminological Knowledge Structure for Intermediary Expert Systems
An intermediary expert system (IES) helps both end users and professional searchers to conduct their online database searching. To provide advice about term selection and query expansion, an IES should include a terminological knowledge structure. Terminological attributes as well as other properties could provide the starting point for building a knowledge base, and knowledge acquisition could...
متن کاملOn the Effectiveness of Obfuscation Techniques in Online Social Networks
Data obfuscation is a well-known technique for protecting user privacy against inference attacks, and it was studied in diverse settings, including search queries, recommender systems, location-based services and Online Social Networks (OSNs). However, these studies typically take the point of view of a single user who applies obfuscation, and focus on protection of a single target attribute. U...
متن کاملASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow
Fab-less business model in semiconductor industry has led to serious concerns about trustworthy hardware. In untrusted foundries and manufacturing companies, submitted layout may be analyzed and reverse engineered to steal the information of a design or insert malicious Trojans. Understanding the netlist topology is the ultimate goal of the reverse engineering process. In this paper, we propose...
متن کاملThe Terminological Tools And Challenges Of Asian Languages Term Representation
Asian languages, such as Chinese, Japanese and Korean (CJK) have one thing in common: they exhibit different linguistics characteristics from English and other western languages. This poses special difficulties since current term representation techniques used in English cannot be applied directly to these languages. Instead, segmentation is a first process in CJK information processing. Segmen...
متن کاملSearching for rare diseases in PubMed: a blind comparison of Orphanet expert query and query based on terminological knowledge
BACKGROUND Despite international initiatives like Orphanet, it remains difficult to find up-to-date information about rare diseases. The aim of this study is to propose an exhaustive set of queries for PubMed based on terminological knowledge and to evaluate it versus the queries based on expertise provided by the most frequently used resource in Europe: Orphanet. METHODS Four rare disease te...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008