To see the other types of publications on this topic, follow the link: Communicative attack.

Journal articles on the topic 'Communicative attack'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Communicative attack.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Baryshnikov, N. V. "STRATEGIES OF EQUAL STATUS INTERCULTURAL COMMUNICATION." MGIMO Review of International Relations, no. 6(33) (December 28, 2013): 90–94. http://dx.doi.org/10.24833/2071-8160-2013-6-33-90-94.

Full text
Abstract:
This article is aimed at arguing a professional type of intercultural communication,at substantiating status equality as a paramount distinctive feature of professional interculturalcommunication and also at presenting some of the strategies associated with it.Thereupon, in the article:– the notion of professional intercultural communication is validated and its integral part – statusequality - is grounded,– original strategies of equal status intercultural communication are presented, some of which include:rabulistic strategies of communicative attack, eristic strategies of communicative self-defense,– hypothetical interaction patterns of certain strategies are described, including: compliment - wittyremark pattern, bluff - improvisation pattern, negative imperative - negative imperative transformationpattern,– the hypothesis is proved that for successful intercultural communication to take place, the partnersmust be equally aware of the communicative attack and self-defense strategies.Acquiring and mastering the communicative attack and self-defense strategies enables specialistsin international relations to participate in equal status intercultural communication the content of whichis characterized by high effectiveness.
APA, Harvard, Vancouver, ISO, and other styles
2

Bahrom, Umarov, and Safarova Zamira. "Questions Communicative Attack in the Technology of Pedagogical Communication." International Journal of Social Science And Human Research 04, no. 04 (2021): 807–11. https://doi.org/10.47191/ijsshr/v4-i4-35.

Full text
Abstract:
The article presents the characteristics of the “communication attack”, as the conquest of initiative in communication and the integral communicative advantage, providing further management of communication with the audience
APA, Harvard, Vancouver, ISO, and other styles
3

Olsson, Eva-Karin, Malin Söderlund, and Jesper Falkheimer. "Communicating Terror." Scandinavian Journal of Public Administration 19, no. 1 (2015): 3–22. http://dx.doi.org/10.58235/sjpa.v19i1.15625.

Full text
Abstract:

 
 
 In essence, terror attacks are communicative events. From the perspective of political leaders, the challenge is to make sense of the event by explaining what has happened, who is behind the attack, what is the most appropriate response, and how to move forward. Adding to the difficulties is the fact that leaders have to communicate in a highly mediated environment. In this article, we explore the Norwegian government’s crisis communication in the terrorist attacks in Oslo and on the island of Utöya on July 22, 2011. We do so by applying a model of crisis framing. According to the model, political leaders have to be able to select appropriate frames that reinforce each other and match the media coverage. The study proved managerial, responsibility and cultural congruence frames to be central. Moreover, the study demonstrated how the crisis produced a certain type of news coverage characterized by high levels of descriptive journalism, which, in combination with issue and episodic framing, supported the government’s communication strategy.
 
 
APA, Harvard, Vancouver, ISO, and other styles
4

Sirajuddin, Mohammad. "Intelligent channel aware malicious free data forwarding scheme over wireless sensor networks." International Journal of Engineering & Technology 7, no. 1.2 (2017): 178. http://dx.doi.org/10.14419/ijet.v7i1.2.9061.

Full text
Abstract:
In the communicative world each and every individual needs to perform global communication with failure-free intelligent model. Wireless Sensor Network, a medium which provides efficient communication modes to clients to satisfy their communication needs. However, this kind of wireless network channels are also facing lots of communication issues by means of several fault strategies, such as: link failures, node failures, bandwidth inefficiency, poor energy level, attacks and many more. So that, a fast growing network scheme is required as well as it provides lots of features to communication strategies and routing protocols, called Intelligent-Channel-Aware-Reputation Scheme [ICARS]. In the proposed system, the main objective is to provide the strong and failure-free wireless communication medium over networking with multiple numbers of nodes. As well as to provide high-level of security while the data is communicating from source to destination. For that powerful cryptographic algorithm is employed, called Modified Rijndael Algorithm (MRA) and to clearly state that the attack-free wireless communication channel with the help of intelligent routing strategies such as Route Request (RREQ) and Route Response (RREP).
APA, Harvard, Vancouver, ISO, and other styles
5

Gukosyants, O. Yu, O. A. Alimuradov, and Z. U. Khakiyeva. "Communicative Strategies and Tactics of Trolls-Aggressors in Computer-Mediated Communication during COVID-19 Pandemic." Nauchnyi dialog 11, no. 7 (2022): 175–96. http://dx.doi.org/10.24224/2227-1295-2022-11-7-175-196.

Full text
Abstract:
The article considers the aggressive communicative behaviour of a virtual linguistic personality provoking a communication conflict in the virtual space (a troll-aggressor). The data include comments retrieved from LiveJournal posts and Internet memes published during the COVID-19 pandemic. In the course of the analysis, the authors reveal the communicative roles, strategies and tactics of trolls-aggressors. The common strategy of the troll’s aggressive conflict interaction in the indicated time period is the strategy of hostility which is embodied in particular strategies (micro-strategies) of discrediting and attack. It is concluded that discrediting as a micro-strategy can be implemented via a false compliment, the tactic of taunt, the tactic of insult and the tactic of blaming. The micro-strategy of attack is implemented by means of threat and indignation. Particular attention is paid to the description of the markers of the above-listed tactics observed in trolls-aggressors’ communicative behaviour. Enumeration of the tactics used for provoking conflicts in virtual environment made it possible to concretize the typology of trolls-aggressors which has been revealed in the course of empiric data analysis. As a result, the authors present a scheme which reflects the types of trolls, belonging to the general type “troll-aggressor”, and the implemented communicative strategies and tactics within the framework of the common strategy of hostility.
APA, Harvard, Vancouver, ISO, and other styles
6

Myasnikov, Stanislav. "THE JUSTIFICATION STRATEGIES OF RUSSIAN FOREIGN POLICY SINCE 2014: A STUDY OF THE CASES OF CRIMEA JOINING RUSSIA AND RUSSIAN MILITARY OPERATION IN SYRIA." Вестник Пермского университета. Политология 14, no. 4 (2020): 14–26. http://dx.doi.org/10.17072/2218-1067-2020-4-14-26.

Full text
Abstract:
The trajectory of the Russian foreign policy changed in 2014 as Russia deviated from its foreign policy principles. A specific justification was needed in order to legitimize Russian foreign policy domestically and abroad. Russian officials provided such a justification. It was successful on the domestic level, but its effectiveness on the international level was questionable. This article undertakes an analysis of the justification strategies of Russian foreign policy after 2014, with a focus on those, which were used by Russian authorities in their justification of Crimea joining Russia and Russian actions in the Syrian Arab Republic. It is shown why the justification could be considered as strategic. Applying the instruments of the strategic narratives’ theory, the author reveals the main strategic narratives of Russian foreign policy officials. The article discovers that the main justification strategies were communicative defense, communicative attack, communicative counter-attack, and position declaration. The communicative position of the Russian Federation in the case of Crimean justification could be explained as initially difficult, but gaining a communicative position in the justification of Russian actions in Syria could positively support the justification of the Crimean case.
APA, Harvard, Vancouver, ISO, and other styles
7

Demirdiş, Semra. "Networked Gatekeeping in ‘Twitter’ During a Crisis Event: A Case Study of #Taksim in Türkiye." Etkileşim 6, no. 12 (2023): 216–34. http://dx.doi.org/10.32739/etkilesim.2023.6.12.220.

Full text
Abstract:
Social media allows both elites and non-elites to share real-time information about crisis events, such as terrorist attacks, and express support and sympathy for victims using hashtags. Recently, a terrorist attack occurred in Taksim Square, Türkiye, resulting in numerous deaths and injuries. Following the attack, Turkish citizens created the popular hashtag #Taksim to share information and express their emotions about the incident. This article explores the key influencers within #Taksim during the attack on Taksim Square by reviewing literature on hashtags, crisis events, gatekeeping, and networked gatekeeping theory. Through a quantitative and qualitative content analysis of 285,081 tweets under the hashtag #Taksim, the article examines how key users became prominent in the information flow. The findings demonstrate that Twitter's communicative practices (retweets, likes, replies, and quote tweets) allowed primarily elite actors, such as politicians and mass media journalists, to become key gatekeepers following the attack. This suggests that views of Twitter hashtags and their democratizing effects in crisis events need to be reconsidered, as the study highlights the significant role of elites. The findings also confirm that users who played crucial roles in the information flow through #Taksim became more prominent by addressing problematic issues like the refugee problem and freedom of the internet in Türkiye. Additionally, users gained prominence within #Taksim by posting messages accompanied by influential visuals.
APA, Harvard, Vancouver, ISO, and other styles
8

Troshchenkova, Ekaterina. "“Communicative Parasitism” in the Russian Segment of Telegram Channels." Vestnik Volgogradskogo gosudarstvennogo universiteta. Serija 2. Jazykoznanije, no. 5 (November 2023): 53–71. http://dx.doi.org/10.15688/jvolsu2.2023.5.4.

Full text
Abstract:
The article examines manifestations of "communicative parasitism" as a variant of communicative alignment in Russian-language Telegram channels. It examines how the adjustment to other people's communication products begins to serve fundamentally different interests and values. The peculiarities of new media and conditions of technologically mediated communication such as interactivity, recombinativeness, multimodality, etc., as well as the specificity of high conflict nature of social-and-political discourse, which plays a significant role in the processes of using power and struggling for it, are taken into account. "Communicative parasitism" is analyzed within both the description of Telegram channel and the subscribers' posts and comments. It was found out that when "communicative parasitism" is used by a Telegram channel to build its own brand and promote itself at someone else's expense, parasitic manifestations are usually limited to elements of design. However, there are often more complex cases in the ideological confrontation of social groups, where this phenomenon is exploited to consolidate one's own group, represent it in a positive way and distance it from the opposing group, which is being discredited. Thus, "communicative parasitism" becomes an integral part of defense-attack strategies realized by a whole group of users for a long time. In this situation, a large number of customers are involved in a kind of language game with intertwining and interacting borrowings, contributing to the formation of group identity.
APA, Harvard, Vancouver, ISO, and other styles
9

Kuchynska, Valeriiya. "IMPLEMENTATION OF COMMUNICATIVE STRATEGY OF DISCREDITATION AND ATTACK IN SPANISH POLITICAL DISCOURSE." PROBLEMS OF SEMANTICS, PRAGMATICS AND COGNITIVE LINGUISTICS, no. 41 (2022): 111–22. http://dx.doi.org/10.17721/2663-6530.2022.41.11.

Full text
Abstract:
The article examines speech and language ways of expressing one of the main communicative and pragmatic strategies characteristic of political discourse - the strategy of discrediting the opponent. The research is based on the material of the speeches of the figures of the Spanish political space. The article examines the speeches of the leaders of competing political forces and analyzes the revealed linguistic features of the discrediting strategy and a number of tactics for its implementation. The strategy of discrediting and attacking the opponent is one of the most used and vividly presented in political discourse, which is explained by its effectiveness, since its use allows the speaker to simultaneously attack the authority of the opponent and raise authority of their own. Special attention was paid to negatively marked lexical units as the main means of expressing the considered strategy. Attention is also paid to features at other linguistic levels, in particular grammatical. Definitions of communicative strategies and tactics, the importance of their application for political discourse, examples of implementation of the discrediting strategy in Spanish-language political discourse are considered in the work. The tactic of verbal insinuation was singled out as the most vividly represented in the sample of examples for the study.
APA, Harvard, Vancouver, ISO, and other styles
10

Browning, Blair, and Jimmy Sanderson. "The Positives and Negatives of Twitter: Exploring How Student-Athletes Use Twitter and Respond to Critical Tweets." International Journal of Sport Communication 5, no. 4 (2012): 503–21. http://dx.doi.org/10.1123/ijsc.5.4.503.

Full text
Abstract:
Twitter has become a popular topic in sport communication research. Little research to date, however, has examined Twitter from the perspective of student-athletes. This research explored how student-athletes at an NCAA Division I university used Twitter and reacted to critical tweets from fans. Semistructured interviews with 20 student-athletes were conducted. Analysis revealed that student-athletes used Twitter in 3 primary ways: keeping in contact, communicating with followers, and accessing information. With respect to critical tweets, student-athletes reported various perceptions about them and diverse strategies for responding to them. The results suggest that Twitter is a beneficial communicative tool for student-athletes but also presents challenges, given the ease with which fans attack them via this social-media platform. Accordingly, athletic departments must be proactive in helping student-athletes use Twitter strategically, particularly in responding to detractors.
APA, Harvard, Vancouver, ISO, and other styles
11

Zhaukumova, Sh, N. Khanina, and S. Zhakipbekova. "Pedagogical technologies for the development of professional communicative competence of future primary school teachers." Bulletin of the Karaganda University. Pedagogy series 109, no. 1 (2023): 62–71. http://dx.doi.org/10.31489/2023ped1/62-71.

Full text
Abstract:
In the modern period of higher education development, the problem of formation of a future specialist, whose main characteristics are the ability to conscious personal growth, orientation to overcome social and professional stereotypes, strengthening of professional responsibility, leadership qualities is relevant. This process is connected with the formation of educational models and technologies. The urgency of the article is caused by the acute necessity to change the content of modern education. The problems of forming professional and communicative competences of students are considered. The authors regard the competence approach as the basic approach in the conditions of humanization of modern education. Emphasis is placed on the fact that there was a change of the vector of the educational process in the direction of learning outcomes from knowledge-based approach to practice-oriented one. In the article the pedagogical conditions promoting effective formation of communicative competence of the future teacher are revealed, which include: realization of interrelation of academic disciplines at formation of communicative competence; use of active and interactive methods of teaching in the educational process; use of integrated courses at formation of communicative competence of the future teacher; introduction of the activity approach in communicatively-oriented practice. In the article, the authors emphasize the need to form the communicative competence of a future teacher in the process of professional formation. Since communicative competence is basic in the professional activity of a teacher and is the main component of the professionalism. Significant skills of a teacher's communicative competence are the ability to build a dialogue, a communicative attack, while showing tact, politeness, correctness, etc. A systematic approach makes it possible to form a teacher's communicative culture, develop his competencies, enrich intellectual potential, and form communicative competence.
APA, Harvard, Vancouver, ISO, and other styles
12

Olayemi Mahmud, Memunat. "A Speech Act Analysis of Language of Emotion in Governor Akeredolu's Post Owo Massacre Broadcast." Universal Library of Languages and Literatures 01, no. 01 (2024): 25–32. http://dx.doi.org/10.70315/uloap.ullli.2024.0101004.

Full text
Abstract:
The attack on the worshippers of St. Francis Xavier Catholic Church, Ogwaluwa, Owo, Ondo State, Nigeria has further revealed the state of insecurity in the Nigerian sociospace. The grisly act, referred to as Owo massacre, has attracted widespread condemnation from individuals and groups in and outside the shore of Nigeria. This paper attempts the analysis of the post Owo massacre speech of the Governor of Ondo State, Nigeria, Arakunrin Odunayo Oluwarotimi Akeredolu’s as presented in his state broadcast on Owo terror attack. The text of the Post Owo Massacre Speech of Governor Odunayo Oluwarotimi Akeredolu as contained in his state broadcast made on June 7, 2022, entitled Owo terror attack, was downloaded from the Facebook page of Oluwarotimi Akeredolu Aketi on https://fb.watch/mhM-xkaQUu/ and analysed using Speech Act Theory as propounded by J. L Austin (1962) and expatiated by John Searle (1971). The study identifies the illocutionary acts of assertive, directive, expressive and commissive; analyse the performative functions of the identified illocutionary acts and the communicative element that give effectiveness to the acts in the emotional speech and concludes that emotion dictates the choices of the communicating elements deployed in the post Owo massacre state broadcast of Arakunrin Odunayo Oluwarotimi Akeredolu.
APA, Harvard, Vancouver, ISO, and other styles
13

S K, Ravikumar, Pruthviraj R D, and Hariprasad A S. "A Review on -Communicative English for Engineers." International Journal of English Literature and Social Sciences 9, no. 5 (2024): 077–86. http://dx.doi.org/10.22161/ijels.95.11.

Full text
Abstract:
Communication is commonly defined as the transmission of information. Its precise definition is disputed and there are disagreements about whether unintentional or failed transmissions are included and whether communication not only transmits meaning but also creates it. Models of communication are simplified overviews of its main components and their interactions. Many models include the idea that a source uses a coding system to express information in the form of a message. The message is sent through a channel to a receiver who has to decode it to understand it. The main field of inquiry investigating communication is called communication studies. A common way to classify communication is by whether information is exchanged between humans, members of other species, or non-living entities such as computers. For human communication, a central contrast is between verbal and non-verbal communication. Verbal communication involves the exchange of messages in linguistic form, including spoken and written messages as well as sign language. Non-verbal communication happens without the use of a linguistic system, for example, using body language, touch, and facial expressions. Another distinction is between interpersonal communication, which happens between distinct persons, and intrapersonal communication, which is communication with oneself. Communicative competence is the ability to communicate well and applies to the skills of formulating messages and understanding them. Non-human forms of communication include animal and plant communication. Researchers in this field often refine their definition of communicative behavior by including the criteria that observable responses are present and that the participants benefit from the exchange. Animal communication is used in areas like courtship and mating, parent–offspring relations, navigation, and self-defense. Communication through chemicals is particularly important for the relatively immobile plants. For example, maple trees release so-called volatile organic compounds into the air o warn other plants of a herbivore attack. Most communication takes place between members of the same species. The reason is that its purpose is usually some form of cooperation, which is not as common between different species. Interspecies communication happens mainly in cases of symbiotic relationships. For instance, many flowers use symmetrical shapes and distinctive colors to signal to insects where nectar is located. Humans engage in interspecies communication when interacting with pets and working animals. Human communication has a long history and how people exchange information has changed over time. These changes were usually triggered by the development of new communication technologies. Examples are the invention of writing systems, the development of mass printing, the use of radio and television, and the invention of the internet. The technological advances also led to new forms of communication, such as the exchange of data between computers.
APA, Harvard, Vancouver, ISO, and other styles
14

Bilyi, Oleh. "Attack on identity. (Russian culture as an existential threat to Ukraine)." Filosofska dumka (Philosophical Thought) -, no. 4 (2022): 145–60. http://dx.doi.org/10.15407/fd2022.04.145.

Full text
Abstract:
The article deals with the role of Russian culture in the period of the RF war against Ukraine. The history is considered as the basic structure that shapes the discursive foundation of identity. Historical narratives as well as the cultural background of imperial identity and risks of the full scale representation of Russian culture in the Ukrainian social consciousness are analyzed. The two tendencies are also comprehended — junk science foundation of geopolitical projects and devalu- ation of the historically formed senses. So the communicative action is penetrated by the strategic action bazed on the false reality fundament, this significant element of the war of the world. The vivid example of junk science is the neoeurasian ideology, that defines the strategy of Kremlin informational attack on the Ukrainian identity. Standoff between the identities takes place in the course of the imperial mobilization project development. The symbiosis of governmental authorities and artists plays the key role in its realization. The author outlines the main features of the strategic effect of penetration into the core of communicative process and the false reality building. Also the author develops the thought that the heartbreaking and impetuous change of con- tradictory narratives are the one of the fundamental resources of information war. In particular it deals with the great Russian Simulacrum as the vivid example of the instrumental reason that is in the base of the information war against Ukraine. It is also defined the historical origin of the simulacra as the instrument of the Russian special services and the role of their partners — the iconic figures of the Russian literature — in the projects of the public opinion manipulation.
APA, Harvard, Vancouver, ISO, and other styles
15

Kostikova, L., E. Chernyavskaya, and B. Shevchenko. "PROFESSIONAL LANGUAGE TRAINING OF MILITARY TRANSLATORS: COMMUNICATIVE TECHNOLOGIES." Scientific Research and Development. Modern Communication Studies 11, no. 3 (2022): 31–37. http://dx.doi.org/10.12737/2587-9103-2022-11-3-31-37.

Full text
Abstract:
Introduction. Communicative technologies are one of the most effective pedagogical technologies in the professional language training of military translators. Determining the attitude of students to the use of communicative technologies in the educational process will contribute to improving the quality of their training.
 The aim of the study is to identify the attitude of future military translators to the use of communicative technologies in their professional language training.
 Methods and materials. This study is based on an integrative methodological approach, which allows combining various educational disciplines, technologies and techniques into a single educational process. The analysis of pedagogical technologies is carried out on the basis of a communicative methodological approach that determines the principles of interaction between participants in the educational process. In classes on foreign language and military translation, the training of military translators uses various communication technologies that contribute to the formation of professional and military-special language competencies of future military translators, such as, for example, case analysis, role-playing, design technologies, etc.
 Results of the study. A study was conducted identifying the opinion of cadets on the advisability of preparing for the use of attack and self-defense strategies in the negotiation process. The questionnaire was attended by 96 cadets of 3 and 4 years of training at the Ryazan Guards Higher Airborne Command School. 93 students (88.3 per cent) noted the importance of using communicative technologies in the training of military translators. 94 (97.9 per cent) of the cadets perform case analysis with interest, 82 (85.4 per cent) of the cadets are interested in the role-playing game and 76 (79.1 per cent) of the cadets are interested in project activities. The communication technologies used in military translation sessions undoubtedly contribute to improving the level of professional language training of military interpreters.
 Conclusion. The results of the study can be used to further develop the issues of professional language training of cadets of military universities with a focus on the individualization of the educational process and on the technology of personalized training.
APA, Harvard, Vancouver, ISO, and other styles
16

Krasnobaieva-Chorna, Zh. "TYPOLOGY OF VERBAL AGGRESSION OF prof. DOMINIC A. INFANTE: AN ATTEMPT TO PHRASEMICS ADAPTATION." Opera in linguistica ukrainiana, no. 28 (September 28, 2021): 275–83. http://dx.doi.org/10.18524/2414-0627.2021.28.235553.

Full text
Abstract:
The study of the phenomenon of verbal aggression is devoted to a large number of foreign and domestic intelligence, processed in different schools and areas. One such research center is the School of Communication Studies at Kent State University (UK). Its brilliant representative, the world-famous Professor Dominic A. Infante, together with his colleagues and students, has developed a programmatic line of research and theory of argumentativeness and verbal aggressiveness inspiring many young communication scholars in the field. The object of the article is verbal aggression as a component of conflict communication. The subject is phrasemes denoting a certain type of verbal aggression, selected through a continuous survey of the academic dictionary of phraseology of the Ukrainian. Purpose: to identify and characterize the manifestations of verbal aggression (based on the typology of Dominic A. Infante) in Ukrainian phrasemics. The stated goal motivates the solution of the following tasks: 1) to outline the basic components of the terminological apparatus of the theory of verbal aggression in studies of Dominic A. Infante, his colleagues and students (‘verbal aggressiveness’, ‘verbal aggression’, ‘physical aggression’, ‘manifestation of verbal aggression’); 2) to describe the types of verbal aggression recorded in Ukrainian phrasemics, illustrating a specific communicative situation. Ukrainian phrasemics records all types of verbal aggression proposed by Dominic A. Infante: attack, curse, teasing, ridicule, threat, swearing, nonverbal emblems. A thorough analysis of the source base of the study shows that: а) the verbal aggression contains a negative evaluation nomination and serves as a marker of negative emotions towards the opponent (hostility, dislike, unfriendliness, dissatisfaction, anger, condemnation, evil, etc.); b) the verbal aggression actualizes severe / sharp attack, sensitive attack, attack with excessive demands; sharp condemnation with an ominous wish of failure, disaster, all evil; ridicule with caustic remarks, insulting words; calling someone names, giving nicknames; a promise to cause some evil, trouble; rude, unfriendly words and expressions and the spread of rumors, etc.; c) the attack correlates with swearing / quarreling and is accompanied by sharp, offensive words, condemnation, reproach with varying degrees of intensification; d) the threat is positioned as a warning, a warning about the transition to physical aggression; e) the main nonverbal sign is the look. We see the prospect of research in the further identification of the phrasemic specificity of the verbal aggression in a comparable aspect.
APA, Harvard, Vancouver, ISO, and other styles
17

Sergeev, O. "Communicative Functions Lucid Dreams in Short Story by Valery Bryusov “And Now, — When I’ve Awoke... Notes of Psychopaologist”." Scientific Research and Development. Modern Communication Studies 9, no. 2 (2020): 40–44. http://dx.doi.org/10.12737/2587-9103-2020-40-44.

Full text
Abstract:
I’ve made a conclusion about the main theme of Bryusov′s short stories in this scientific essay: it’s concern with dreams as a common communication at same the narrative’ level. It is a literary device here. The basin of this study is a classical approach to such terms as “communication” and “communicativity”. N. Schedrin and F. Dostoevsky use them in their worship to literature. The new approach in this old theme is a problem and perversion of interfere situations, laid in the basis of plot and characters’ structures. New aspects in this article determined by paradoxes of irrational forces: they attack protagonist and lead him to emotional catastrophe, madness and crime. Central object in the study is lucid dreams. I work with this term as a synonym of the dreams on the conscious level. We used to read about unconscious dreams of literature characters, otherwise in this essay I’ve bear in mind both levels in their mutual communicative interferences.
APA, Harvard, Vancouver, ISO, and other styles
18

MIZANUR RAHMAN, SK MD, and KHALIL EL-KHATIB. "SECURE ANONYMOUS COMMUNICATION FOR WIRELESS SENSOR NETWORKS BASED ON PAIRING OVER ELLIPTIC CURVES." Journal of Interconnection Networks 10, no. 04 (2009): 459–79. http://dx.doi.org/10.1142/s0219265909002662.

Full text
Abstract:
The nature of wireless communication makes it susceptible to a number of security threats, disclosing the identities of the communicating parties in the network. By revealing the identity of nodes in the network, outside parties can setup severe targeted attacks on specific nodes. Such targeted attacks are more harmful to sensor networks as sensing nodes (sensors) have limited computing and communication power prohibiting them from using robust security mechanisms. Anonymous communication is one of the key primitives for ensuring the privacy of communicating parties in a group or network. In this paper, we propose a novel secure anonymous communication protocol based on pairing over elliptic curves for wireless sensor networks (WSNs). Using this protocol, only the legitimate nodes in the sensor network can authenticate each other without disclosing their real identities. The proposed protocol is extremely efficient in terms of key storage space and communication overhead. Security analysis of our protocol shows that it provides complete anonymity for communicating nodes. The analysis also shows that the proposed protocol is robust against a number of attacks including the masquerade attack, wormhole attack, selective forwarding attack and message manipulation attack.
APA, Harvard, Vancouver, ISO, and other styles
19

Kosenko, Oleksandra, and Maksym Luchynskyi. "INFORMATION WARS AS A MARKETING TOOL IN THE CIVILIZATION OF SOCIETY." Bulletin of the National Technical University "Kharkiv Polytechnic Institute" (economic sciences), no. 3 (April 11, 2024): 3–9. https://doi.org/10.20998/2519-4461.2024.3.3.

Full text
Abstract:
The main purpose of information wars is to manipulate the masses, influence public and individual consciousness, disorient, misinform, weaken beliefs and intimidate. This can include introducing harmful ideas, creating an image of the enemy, emphasizing power and providing a market for one's economy. A successful information campaign at the operational level supports strategic goals, making it difficult for competitors to make effective decisions. The goal of information attacks is to create obstacles for competitors to prevent them from acting in a coordinated and efficient manner. Harmonization of actions at the operational and strategic levels makes it impossible for the adversary to make decisions that would contribute to the achievement of its own goals and prevent the adversary from achieving its own. A protracted information war can be harmful to all parties except PR managers, journalists and media owners who can use it for their own purposes. A business that becomes the target of an attack can spend significant money to restore its reputation, while the business carrying out the attack risks losing control of the situation. However, an experienced specialist can use an information attack to conduct a successful PR campaign, which as a result can strengthen the image of the enterprise in the eyes of the public. It is important to have a strategy and plan of action to resolve conflict situations and take advantage of the opportunities that information warfare can provide. The article examines the historical prerequisites for the emergence of the phenomenon of information warfare and considers various scientific approaches to the interpretation of this concept. Special attention is paid to the analysis of the causes of information confrontation and the definition of the heuristic-dual structure of cognitive theory, which indicates that a person uses two systems of cognitive processing of information. The role of PR services in conducting an information war, where mass media act as the driving force of politics, changing the communicative dynamics between political figures, PR service employees and the public, is also considered. This allows for a better understanding of the essence and impact of information processes on modern society and the political sphere.
APA, Harvard, Vancouver, ISO, and other styles
20

Doynikova, Marina Igorevna. "Speech behavior of deputies of the "Alternative for Germany" party (based on the materials of the Bundestag transcripts)." Philology. Theory & Practice 18, no. 3 (2025): 844–50. https://doi.org/10.30853/phil20250120.

Full text
Abstract:
The aim of the research is the identification of communicative strategies and tactics in the speech behavior of deputies of the "Alternative for Germany" (AfD) party, as well as linguistic means through which maximum perlocutionary effect is achieved. The scientific novelty of the research lies in the fact that, for the first time, communicative strategies have been defined and the semantic, pragmatic, stylistic linguistic means used by AfD deputies during parliamentary debates have been analyzed, thanks to which the party experiences a rapid growth in popularity and success against the backdrop of the failure of conservative political parties. As a result of the research, it has been established that the main communicative strategies of the AfD party are self-presentation, agitation, self-defense, attack, and provocation, through which, on the one hand, a positive image of the party is formed, and on the other hand, a negative image of competitors is created. A tendency has been established to use proverbs, sayings, colloquial words and expressions, and vulgarisms in the speech of AfD deputies in order to attract the attention of potential voters. Irony and ridicule in the speech behavior of AfD deputies are realized through lexical-semantic, logical-syntactic, and stylistic means. Of particular interest is the expression of precedent irony, based not only on proper names, but also on specific situations and facts.
APA, Harvard, Vancouver, ISO, and other styles
21

Baidawi, Achmad, Rabi'ah Rabi'ah, and Abdul Wafi. "Instilling Character Values Using Jigsaw in Teaching Grammar." Journal of English Education and Teaching 5, no. 3 (2021): 425–35. http://dx.doi.org/10.33369/jeet.5.3.425-435.

Full text
Abstract:
Building nation character should be always done specially by the teacher in the school bacause nation character is one of fundamental elements in preventing this nation from the attack of foreign or western cultures which are not suitable with our cultures. This study aimed at decribing how the character values inserted in teaching grammar using jigsaw and what values were inserted. The study used descriptive qualitative field research. The data obtained through observation, and interview. After analyzing the data, it was found that character values were inserted through jigsaw activity. The character values found were tolerance, democratic, curiousity, communicative, responsible. This reseach is expected to contribute to build nation character through teaching and learning process.
APA, Harvard, Vancouver, ISO, and other styles
22

Barbe, Danielle, Lori Pennington-Gray, and Ashley Schroeder. "Destinations’ response to terrorism on Twitter." International Journal of Tourism Cities 4, no. 4 (2018): 495–512. http://dx.doi.org/10.1108/ijtc-04-2018-0027.

Full text
Abstract:
Purpose The purpose of this paper is to understand the online communication strategies used by destination management organizations (DMOs) during a terrorist attack. In particular, this study analyzes Twitter use during seven terrorism incidents in six European cities (Paris, Brussels, Nice, Berlin, London and Barcelona) between 2015 and 2017. Design/methodology/approach Twitter content was collected via NCapture, a web browser extension of NVivo, one week prior to the attacks, the day of, and two weeks following to determine the timeframe in which DMOs communicated about the crisis, the types of messages being communicated, and whether these messages are effective. This study uses Coombs’ Situational Crisis Communication Theory as a guide to analyzing the effectiveness of the crisis communication strategies. Findings The findings of this paper indicate that DMOs are not effectively using Twitter during a terrorist attack. Few tweets relating to the attacks provided tourists with information regarding their safety, with the remaining only communicating as victims. Many DMOs went offline in the days immediately following the attacks and each DMO’s crisis communication on Twitter only lasted up to one week following the attacks. Originality/value This study provides insight into the ways DMOs are using social media for crisis communication. These results inform DMOs on their responsibility in communicating information during a terrorist attack. Messages of support are useful in the recovery stage, but tourists need information on how to stay safe and Twitter is often the first source people go to for information (Simon et al., 2014).
APA, Harvard, Vancouver, ISO, and other styles
23

Agleeva, Z. R., and I. A. Kudryashov. "Ironic pragmatic effect in Russian dialogical communication." Philology and Culture, no. 4 (December 26, 2024): 7–13. https://doi.org/10.26907/2782-4756-2024-78-4-7-13.

Full text
Abstract:
The article critically analyzes various approaches to the ironic effect of judgments developed in different linguistic disciplines. In addition to the traditional definitions of irony dating back to antiquity, as well as modern linguistic models, we describe a psychological point of view on this mechanism of influence on the interlocutor. As the analysis shows, all the discussed approaches reflect exclusively monological speech; therefore, they do not provide a holistic view of the communicative functions of ironic judgments in the everyday Russian language usage. In this regard, a dialogical perspective is proposed, emphasizing communicative effects of ironic speech, neglected by the identified models.The article concludes that in the format of Russian-language communication, irony is used by the speaking subject not so much to avoid direct criticism, a conflict dialogical situation or psychological inconsistencies in the emotional and volitional state of the communication participants, but to play a role of a skillful pragmatic technique that encourages the interlocutor to act for the benefit of himself or others. The basic properties of irony can be attributed to the expression of rhetorical, satirical and heuristic categories. As a rhetorical device, it strengthens the meaning of a statement, as a satirical device it is used to discursively attack the interlocutor’s point of view, and its heuristics allows the interlocutor to see that the discussed state of affairs is not as difficult as it seems to be at first glance. Irony is a kind of technical device used for deeply heuristic cognition of objective reality, through which the addressee is confronted with the inconsistencies that surround him/her. Irony acquires illocutionary force through an implicitly expressed negative meaning and, consequently, through the denial of the actual state of affairs.
APA, Harvard, Vancouver, ISO, and other styles
24

Kadirov, M. M. "АНАЛИЗ И КЛАССИФИКАЦИЯ КИБЕРАТАК НА ИНФОРМАЦИОННО-КОММУНИКАЦИОННЫЕ СИСТЕМЫ". Journal of Science and Innovative Development 6, № 4 (2023): 27–36. http://dx.doi.org/10.36522/2181-9637-2023-4-3.

Full text
Abstract:
This article analyzes distributed cyberattacks of the “Denial of Service” type and develops their classification. A description of the shortcomings and vulnerabilities of distributed denial-of-service attacks by category is given. An implementation diagram with examples for each category of distributed denial of service attacks is presented. Analyzed the number of attacks carried out by attackers, as well as the purpose and type of attack used. According to the results of the study, the UDP-flood 53.64% attack type is the most commonly used type by attackers in implementing distributed attacks, and the GRE-flood 1.41% is defined as the least used type. Distributed denial of service attacks are the major concern for security experts. This paper can be helpful for researchers and cyber security experts to provide a better understanding of distributed denial of service attack tools in present times.
APA, Harvard, Vancouver, ISO, and other styles
25

Lokajová, Jana. "‘And we are Stuck in One Place, Minister.’ A Study of Evasiveness in Replies to Face-Threatening Questions in Slovak Political Interviews on Scandals (A Combined Approach)." Journal of Linguistics/Jazykovedný casopis 72, no. 2 (2021): 690–704. http://dx.doi.org/10.2478/jazcas-2021-0062.

Full text
Abstract:
Abstract The phenomenon of political evasiveness in the genre of a political interview has been the focus of several discourse studies employing conversation analysis, critical discourse analysis and the social psychology approach. Most of the above-mentioned studies focus on a detailed qualitative analysis of political discourse identifying a wide range of communication strategies that permit politicians to ambiguate their agency and at the same time boost their positive face. Since these strategies may change over time and also be subject to a culture specific environment, the aim of this paper is to discover a) which evasive communicative strategies were employed by Slovak politicians in 2012–2016, b) which lexical substitutions were most frequently used by them to avoid negative connotations of face-threatening questions, and finally, c) which cognitive frames formed a frequent conceptual background of their evasive political argumentation. The paper will draw on a combination of quantitative and qualitative approach to the analysis of non-replies devised by Bull and Mayer (1993) and critical discourse analysis in the sample of five Slovak radio interviews aired on the Rádio Express. The selection of interviews was not random- in each interview the politician was asked highly conflictual questions about bribery, embezzlement or disputes in the coalition. Based on qualitative research of Russian-Slovak political discourse (2009) by Dulebová it is hypothesized that a) the evasive strategy of ‘attack’ on the opposition and ‘attack on the interviewer’ would occur in our sample with the highest prominence in the speech of the former Prime Minister Fico, and b) the politicians accused of direct involvement in scandals would be the most evasive ones.
APA, Harvard, Vancouver, ISO, and other styles
26

Bellini, Pier Paolo. "Comunicazione autorevole e disintermediazione. Mutazioni prossemiche del post-pandemia." SocietàMutamentoPolitica 14, no. 28 (2023): 159–70. http://dx.doi.org/10.36253/smp-15022.

Full text
Abstract:
The pandemic has not only affected our bodies (biological dimension) and our minds (psychological dimension): it has also left a profound mark in our relationships (social dimension). Daily life in lock down seems to be a distant and now faded memory, even if a few months have passed since we were barricaded in our homes: yet certain habits have been, perhaps irrevocably, changed. It is our intention to try to identify these micro-traumas that have occurred at the level of communication practices in this last year and a half in order to be able to interpret them as traces of new possible social configurations: that is, we want to reflect on the turmoil that has occurred in daily interactions between people, between systems and between people and systems and hypothesize their possible developments on some essential aspects of social and, more specifically, communicative relationships. In particular, it is useful to focus our attention on two aspects of our daily life that have suffered an attack (almost in a chemical sense), proposing new reasons of high criticality and uncertainty to the already complex postmodern life: on the one hand (the macro-social one), the authority / credibility of the information sources, on the other hand (the micro-social one), the management of spaces and communication channels.
APA, Harvard, Vancouver, ISO, and other styles
27

Wingate, V. Skye, and Nicholas A. Palomares. "The severity of bullying messages predicts increased levels of targets’ depression and general anxiety as a function of targets’ inferences of a bully’s goals." Journal of Social and Personal Relationships 38, no. 4 (2021): 1194–215. http://dx.doi.org/10.1177/0265407520983439.

Full text
Abstract:
Being the recipient of severe bullying messages for a period of time is a meaningful predictor of subsequent mental health issues. Employing Goal Understanding Theory, we test an explanation for this association. Specifically, we hypothesize and generally confirm that targets’ adverse emotional reaction and hurt from bullying messages serially mediate the positive association between message severity and depression and general anxiety, depending on the goal understanding of targets (i.e., inferences of upward-mobility, personal-attack, and highlight-differences goals motivating a bully). That is, the mediation of message severity on mental health via emotional reaction and then hurt is present at high (not low) levels of goal inferences. Implications of the communicative processes connecting severe bullying with mental health are discussed.
APA, Harvard, Vancouver, ISO, and other styles
28

Kompantseva, Larysa. "Psychological and Linguistic Description of Technology Discourse of New Media." PSYCHOLINGUISTICS 23, no. 2 (2018): 120–31. https://doi.org/10.5281/zenodo.1208639.

Full text
Abstract:
<strong>ABSTRACT</strong> The paper focuses on the potential of psychological and linguistic analysis of new media &ndash; the media that use various means of content delivery (for instance, online and offline versions of newspapers) and include social networks, blogosphere services, etc.; it has been proved, that technologization and manipulative techniques applied to Internet discourse, which is defined as the format of new media realization, are of great importance under the conditions of hybrid war and establishing social control. Technologization of new media discourse is performed by means of various psycholinguistic tools: NLP techniques, linguistic and cognitive mechanisms of Imagineering, inspiration, engagement into communication, framing of situations, creating a &ldquo;circle of insiders&rdquo;, amalgamation, drifting of notions, etc. The importance of these technologies is enhanced by communicative capabilities of cyberspace. The research demonstrates the possibilities of psychological and linguistic analysis (description) of the technologized Russian-language media discourse in Germany, in particular the method of defining the information interests and values of different social groups by the information interests matrix, the intent-analysis and the method of evaluative differentiation for specifying the level of importance of a particular social group (network) on the Internet, communicants&rsquo; values, as well as identifying psycholinguistic technologies of influence, with the help of which communication dominance of certain players is provided. We came to the conclusion that Russian-language media actively use psycholinguistic technologies for the implementation of social cyber-attacks &ndash; attacks on the consciousness of information consumers by means of the release of a manipulative signal in the social network or through manipulation of an existing signal with the aim of achieving the desired results &ndash; chaos, panic and mass disorders. The consequences of this type of attack are purely psychological. Such a result is achieved by means of a number of technologies: the creation of attractive content, the use of new methods for the dissemination of traditional content; the creation of influential platforms, the horizontal broadcast of narratives, the influence of public figures on global audiences, the intensifying of information by every communicator who supports and accordingly spreads certain ideas.
APA, Harvard, Vancouver, ISO, and other styles
29

Trivedi, Munesh C., and Sachin Malhotra. "Identification and Prevention of Joint Gray Hole and Black Hole Attacks." International Journal of Ambient Computing and Intelligence 10, no. 2 (2019): 80–90. http://dx.doi.org/10.4018/ijaci.2019040106.

Full text
Abstract:
Ad-hoc networks consist of a set of autonomous communicating devices that can communicate with each other by establishing multi-hop radio connections, and these connections are maintained in a localized manner. In these types of networks, especially where the nature of communicating nodes is mobile, e.g., MANETs, maintaining security remains a serious challenge due to their wireless, open, and shared communication medium, reliance on cooperative algorithms, dynamically adaptable topologies, an absence of centralized watching points, etc. Most of the existing protocols, utilized for routing in MANETs are susceptible to diverse varieties of attacks. However, it is also susceptible to the well-known gray and black hole attacks. In these types of attacks, malicious nodes are incorrectly advertised as sensible ways to a destination node throughout the route discovery method. This attack becomes complicated when a bunch of malicious nodes are acting together. In this work, a novel mechanism is introduced to identify the malicious node or nodes that have tried to perform malicious activity. Here, identification is made by their increased data routing information (DRI).
APA, Harvard, Vancouver, ISO, and other styles
30

Christopher, Mitchel, Ghaleb Baraq, M. Ghaleb Safwan, Jaroucheh Zakwan, and Ali Saleh Al-rimy Bander. "The Impact of Mobile DIS and Rank-Decreased Attacks in Internet of Things Networks." International Journal of Engineering and Advanced Technology (IJEAT) 10, no. 2 (2020): 66–72. https://doi.org/10.35940/ijeat.B1962.1210220.

Full text
Abstract:
With a predicted 50 billion devices by the end of 2020, the Internet of things has grown exponentially in the last few years. This growth has seen an increasing demand for mobility support in low power and lossy sensor networks, a type of network characterized by several limitations in terms of their resources including CPU, memory and batter, causing manufactures to push products out to the market faster, without the necessary security features. IoT networks rely on the Routing Protocol for Low Power and Lossy Network (RPL) for communication, designed by the Internet Engineering Task Force (IETF). This protocol has been proven to be efficient in relation to the handling of routing in such constrained networks, However, research studies revealed that RPL was inherently designed for static networks, indicating poor handling of mobile or dynamic topologies which is worsen when introducing mobile attacker. In this paper, two IoT routing attacks are evaluated under a mobile attacker with the aim of providing a critical evaluation of the impact the attacks have on the network in comparison to the case with static attacker. The first attack is the Rank attack in which the attacker announces false routing information to its neighbour attracting them to forward their data via the attacker. The second attack is the DIS attack in which the attacker floods the network with DIS messages triggering them to reset their transmission timers and sending messages more frequently. The comparison were conducted in terms of average power consumption and also the packet delivery ratio (PDR). Based on the results collected from the simulations, it was established that when an attacking node is mobile, there&rsquo;s an average increase of 36.6 in power consumption and a decrease of 14 for packet delivery ratios when compared to a static attacking node.
APA, Harvard, Vancouver, ISO, and other styles
31

Wang, Yihe, Mingli Zhang, Kun Song, Tie Li, and Na Zhang. "An Optimal DoS Attack Strategy Disturbing the Distributed Economic Dispatch of Microgrid." Complexity 2021 (April 1, 2021): 1–16. http://dx.doi.org/10.1155/2021/5539829.

Full text
Abstract:
As a promising method with excellent characteristics in terms of resilience and dependability, distributed methods are gradually used in the field of energy management of microgrid. However, these methods have more stringent requirements on the working conditions, which will make the system more sensitive to communication failures and cyberattacks. As a result, it is both theoretical merits and practical values to investigate the malicious effect of cyber attacks on microgrid. This paper studies the distributed economic dispatch problem (EDP) under denial-of-service (DoS) attacks for the microgrid, in which each generator can communicate with its neighbors and has the computational capability to implement local operation. Firstly, a DoS attack model is proposed, in which the DoS attacker intentionally jams the communication channel to deteriorate the performance of the microgrid. Then, the evolution mechanism of the dispatch system of the microgrid under different attack scenarios is adequately discussed. On this basis, an optimal attack strategy based on enumerating-search algorithm is presented to allocate the limited attack resources reasonably, so as to maximize the effect of DoS attacks. Finally, the validity of the theoretical studies about the attack effect under different scenarios and the effectiveness of the proposed enumerating-search-based optimal attack strategy are illustrated through the simulation examples on the IEEE 57-bus system and IEEE 39-bus system, respectively.
APA, Harvard, Vancouver, ISO, and other styles
32

Noman, Sinan Ameen, and Travis Atkison. "Techniques to Overcome Network Attacks (Sybil Attack, Jamming Attack, Timing Attack) in VANET." Journal of The Colloquium for Information Systems Security Education 10, no. 1 (2023): 7. http://dx.doi.org/10.53735/cisse.v10i1.174.

Full text
Abstract:
VANET is a type of Ad hoc network that enables the communication between vehicles and roadside units. It provides a broad range of applications, such as blind crossing, accident avoidance, protection, interactive route planning, traffic situation monitoring in real-time, etc. These applications are required to be very secure to achieve a reliable service and provide safety for drivers. This paper sheds light on three different types of attacks (Sybil Attack, Jamming Attack, Timing Attack) that can critically affect the vehicular ad hoc network environment. Furthermore, we present techniques that can overcome these attacks.
APA, Harvard, Vancouver, ISO, and other styles
33

Al Maamari, Amal S., and Nadir K.Salih. "Comparison between Black Hole and Flooding Attack in Mobile Ad-hoc Network and their Simulation Study." International Journal of Research Publication and Reviews 03, no. 12 (2022): 241–48. http://dx.doi.org/10.55248/gengpi.2022.31202.

Full text
Abstract:
Mobile ad hoc network (MANET) is dynamic in nature and vulnerable for several attacks to be arising in it. Mobile nodes frequently disconnect and join the network; they can arbitrarily moves from one place to another. In present-day wireless communication scenario, Mobile ad hoc network (MANET) plays a very important role, as it consists of many autonomous nodes which communicate together to form a proper communication network. Each node in a network will move in random path, so that nodes direction will change frequently. This paper describes the features, application, flooding attack and black hole attack in the MANET implemented on AODV protocol. The simulation work is carried out in Network Simulator (NS2.34). The performance analysis is done Nodes with 20 to 60 nodes were used in the AODV routing protocol simulation to produce energy-efficient outcomes, with the flooding attacks and the interruption of blackhole attacks. The average delay, routing overhead, packet drop rate and packet delivery rate are calculated. By the simulation it has been evaluated that in flooding attack the routing overhead is more as compared to the black hole attack. A comparative study is also done on these parameters for all three scenarios. Also we simulated the attack in various wireless ad-hoc network scenarios and have tried to find a response system in simulations.
APA, Harvard, Vancouver, ISO, and other styles
34

Sengar, Hirendra Singh. "An ECC based Secure Authentication Protocol for M2M Communication in Industrial IOT Edge Device." International Journal for Research in Applied Science and Engineering Technology 12, no. 6 (2024): 30–40. http://dx.doi.org/10.22214/ijraset.2024.62939.

Full text
Abstract:
Abstract: Machine to machine communication in industrial IoT is becoming a common phenomenon now-a-days where all the machines like IoT edge devices communicate independently. It’s always been a challenging task to create a protocol for authentication that is both secure and efficient with regard to resources for use in industrial IoT environments' M2M communication. Here we present a safe and effective authentication method that makes use of elliptic curve cryptography (ECC). We demonstrated these vulnerabilities by testing the current protocol with various assaults, including SSL strip attack and MITM attack. To further evaluate the protocol's security against various IoT threats, we employed both official and informal approaches, such as the Scyther tool and BAN logic. Secured from a variety of IoT Threats, such as Man-in-the-middle (MITM) attacks, replay attacks, and impersonation attacks, our suggested protocol, absence of device anonymity, weak mutual authentication etc. but also suitable for resource constraint IoT edge devices like RFID devices, sensors, routers and gateways.
APA, Harvard, Vancouver, ISO, and other styles
35

Guo, Tingting, Zhenxia Zhao, and Xinghua Han. "The Discourse Analysis of Social Factors Influencing Interest Contention in Business Dispute Settlement: A Perspective of Discourse Information Theory." Asian Social Science 15, no. 3 (2019): 46. http://dx.doi.org/10.5539/ass.v15n3p46.

Full text
Abstract:
Interest contention which reflects the nature of business dispute settlement is one of the vital issues to explore in the studies of business dispute and it structures the whole process of business dispute settlement from mediation, negotiation to arbitration and litigation. Under the influence of various factors, litigants with differing interest orientations and interest demands could make good use of a number of information resources for the purpose of communicating, defending and fighting for the interests of their own. Contexts are a socially based mental model dynamically constructed by participants about “the for-them-relevant properties” of communicative situation (van Dijk, 2008). The social factors in the context influences the distribution of discourse information resources in the interest contention in business dispute settlement. In view of this, the present study focuses on the discourse analysis of social factors influencing the interest contention in business dispute settlement at the stage of litigation from the perspective of Discourse Information Theory (DIT) (Du, 2007, 2013, 2015). It can be found that any conflicting party’s lawyer could take advantage of both different social identities and social relationships to attack the counterparty’s loopholes or shortcomings and gain more interests for his own party in the interest contention in business dispute settlement.
APA, Harvard, Vancouver, ISO, and other styles
36

,, Yuliawati, Nia Kania Kurniawati, Yoki Yusanto, Yoki Yusanto, and Eka Elviani Srilestari. "Rutinitas Kerja Jurnalis Media Online Dalam Pikiran Rakyat Media Network." Reslaj : Religion Education Social Laa Roiba Journal 6, no. 3 (2023): 1379–90. http://dx.doi.org/10.47467/reslaj.v6i3.5192.

Full text
Abstract:
This study discusses the routine of journalists in producing news in online media that is based on the Pikiran Rakyat Media Network, namely Serangnews.pikiran-rakyat.com and Kabarbanten.pikiran-rakyat.com. the research is motivated by the rise of online media that join in one company carrying the concept of collaborative economy. The focus of the problems analyzed is the process of selecting issues, choosing sources and word selection in news production by journalists, communicative events in the newsroom to the editorial gatekeeping process. The research method used is qualitative research, with ethnographic methods newsroom. Researchers used Shoemaker &amp; Reese's hierarchy of influence theory to find out what influences media content as a result of routines in the newsroom. Determination of informants using purposive sampling techniques. The results obtained that the routine of journalists in producing content is influenced by the level of individuals and media routines. But the most influential factors are at the organizational level. Because it is related to the company's policy to produce content that can generate a lot of good profits for the Serangnews editorial team.mind-people journalists and Kabarbanten.pikiran.rakyat.com as well as for PRMN as the parent company.&#x0D; Keywords: Mass Communication, Online Media, PRMN, news Attack, News banten.
APA, Harvard, Vancouver, ISO, and other styles
37

Victorio, Mauro, Arman Sargolzaei, and Mohammad Reza Khalghani. "A Secure Control Design for Networked Control Systems with Linear Dynamics under a Time-Delay Switch Attack." Electronics 10, no. 3 (2021): 322. http://dx.doi.org/10.3390/electronics10030322.

Full text
Abstract:
Networked control systems (NCSs) are designed to control and monitor large-scale and complex systems remotely. The communication connectivity in an NCS allows agents to quickly communicate with each other to respond to abrupt changes in the system quickly, thus reducing complexity and increasing efficiency. Despite all these advantages, NCSs are vulnerable to cyberattacks. Injecting cyberattacks, such as a time-delay switch (TDS) attack, into communication channels has the potential to make NCSs inefficient or even unstable. This paper presents a Lyapunov-based approach to detecting and estimating TDS attacks in real time. A secure control strategy is designed to mitigate the effects of TDS attacks in real time. The stability of the secure control system is investigated using the Lyapunov theory. The proposed TDS attack estimator’s performance and secure control strategy are evaluated in simulations and a hardware-in-the-loop environment.
APA, Harvard, Vancouver, ISO, and other styles
38

Zhao, Min, Danyang Qin, Ruolin Guo, and Guangchao Xu. "Efficient Protection Mechanism Based on Self-Adaptive Decision for Communication Networks of Autonomous Vehicles." Mobile Information Systems 2020 (June 10, 2020): 1–9. http://dx.doi.org/10.1155/2020/2168086.

Full text
Abstract:
The communication network of autonomous vehicles is composed of multiple sensors working together, and its dynamic topology makes it vulnerable to common attacks such as black hole attack, gray hole attack, rushing attack, and flooding attack, which pose a threat to the safety of passengers and vehicles; most of the existing safety detection mechanisms for a vehicle can only detect attacks but cannot intelligently defend against attacks. To this end, an efficient protection mechanism based on self-adaptive decision (SD-EPM) is proposed, which is divided into the offline phase and the online phase. The online phase consists of two parts: intrusion detection and efficient response. Attack detection and defense in the vehicular ad hoc networks (VANETs) are performed in terms of the attack credibility value (AC), the network performance attenuation value (NPA), and the list of self-adaptive decision. The simulation results show that the proposed mechanism can correctly identify the attack and respond effectively to different attack types. And, the negative impact on VANETs is small.
APA, Harvard, Vancouver, ISO, and other styles
39

Khabarov, Artyom A. "Techniques of Linguistic Cognitive Manipulation in the Information and Psychological Confrontation Environment." Current Issues in Philology and Pedagogical Linguistics, no. 4 (December 25, 2021): 72–82. http://dx.doi.org/10.29025/2079-6021-2021-4-72-82.

Full text
Abstract:
The article is devoted to the scientific understanding of the linguistic and cultural factors of shaping external ideology of governance in Ukraine during the preparation and conduct of a series of low-intensity conflicts (“color revolutions”) in 2004-2014. Using linguistic methods of semantic, structural, contextual, discourse and communicative analysis, the author studies verbal forms of linguistic cognitive manipulation with the public opinion of the Ukrainian society focusing on the techniques of polyphonic attack, conceptual modeling and reframing. Communicative strategies and methods of indoctrination of the population are viewed in the environment of the information and psychological war launched by the US-led collective West in the digital space of mass media and the worldwide web with the aim of alienating Ukraine from the geopolitical space of Russia and turning it into an antipode state of the Russian Federation. The author focuses on verbal forms and means of indoctrination identified in communicative strategies of disinformation, data blocking, falsifying truth, fake messages, tabooing of signs, distortion of the true semantic meaning and substitution of concepts that are used by subjects of information and psychological influence in the synergetic coupling of media resources of the media of Ukraine and the collective West. The author concludes that some processes are underway in the interdiscursive environment of the “post-Maidan” Ukraine that structure a new dominant information need of the society around the image of Russia as an enemy and aggressor. Russian linguistic and cultural pattern holders demonstrate speech behavior in Ukraine that has been formed under the external ideology of governance and illustrates the destructive changes in the values of Russian self-identity, which is a consequence of linguistic cognitive manipulation of the public opinion under the imposed information model of total Russophobia.
APA, Harvard, Vancouver, ISO, and other styles
40

Sepúlveda, Johanna, Mathieu Gross, Andreas Zankl, and Georg Sigl. "Beyond Cache Attacks." ACM Transactions on Embedded Computing Systems 20, no. 2 (2021): 1–23. http://dx.doi.org/10.1145/3433653.

Full text
Abstract:
System-on-Chips (SoCs) are a key enabling technology for the Internet-of-Things (IoT), a hyper-connected world where on- and inter-chip communication is ubiquitous. SoCs usually integrate cryptographic hardware cores for confidentiality and authentication services. However, these components are prone to implementation attacks. During the operation of a cryptographic core, the secret key may passively be inferred through cache observations. Access-driven attacks exploiting these observations are therefore a vital threat to SoCs operating in IoT environments. Previous works have shown the feasibility of these attacks in the SoC context. Yet, the SoC communication structure can be used to further improve access-based cache attacks. The communication attacks are not as well-understood as other micro-architectural attacks. It is important to raise the awareness of SoC designers of such a threat. To this end, we present four contributions. First, we demonstrate an improved Prime+Probe attack on four different AES-128 implementations (original transformation tables,T0-Only,T2KB, and S-Box). As a novelty, this attack exploits the collisions of the bus-based SoC communication to further increase its efficiency. Second, we explore the impact of preloading on the efficiency of our communication-optimized attack. Third, we integrate three countermeasures (shuffling,mini-tables, andTime-Division Multiple Access (TDMA) bus arbitration) and evaluate their impact on the attack. Althoughshufflingandmini-tablescountermeasures were proposed in previous work, their application as countermeasures against the bus-based attack was not studied before. In addition, TDMA as a countermeasure for bus-based attacks is an original contribution of this work. Fourth, we further discuss the implications of our work in the SoC design and its perspective with the new cryptographic primitives proposed in the ongoing National Institute of Standard and Technology Lightweight Cryptography competition. The results show that our improved communication-optimized attack is efficient, speeding up full key recovery by up to 400 times when compared to the traditional Prime+Probe technique. Moreover, the protection techniques are feasible and effectively mitigate the proposed improved attack.
APA, Harvard, Vancouver, ISO, and other styles
41

Chen, Juan, Hong Shan, and Tao Ma. "A Study of Modeling Mobile Ad-Hoc Networks Attacks." Advanced Materials Research 546-547 (July 2012): 1217–22. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.1217.

Full text
Abstract:
Mobile ad-hoc networks (MANETs) are especially vulnerable to attacks because of lacking infrastructure and data transfer using radio communication. In the past various types of MANET attacks have been detected and analyzed. This paper presents the enhanced attack trees for MANET attacks, which is completed by extending the basic attack trees. The enhanced attack trees add the types between nodes and the attributes of nodes. Finally this paper shows how to represent the Block hole attacks in MANETs by means of the enhanced attack trees.
APA, Harvard, Vancouver, ISO, and other styles
42

Zhu, Hongliang, Zhihua Zhang, Juan Du, Shoushan Luo, and Yang Xin. "Detection of selective forwarding attacks based on adaptive learning automata and communication quality in wireless sensor networks." International Journal of Distributed Sensor Networks 14, no. 11 (2018): 155014771881504. http://dx.doi.org/10.1177/1550147718815046.

Full text
Abstract:
Wireless sensor networks face threats of selective forwarding attacks which are simple to implement but difficult to detect. It is difficult to distinguish between malicious packet dropping and the normal packet loss on unstable wireless channels. For this situation, a selective forwarding attack detection method is proposed based on adaptive learning automata and communication quality; the method can eliminate the impact of normal packet loss on selective forwarding attack detection and can detect ordinary selective forwarding attack and special cases of selective forwarding attack. The current and comprehensive communication quality of nodes are employed to reflect the short- and long-term forwarding behaviors of nodes, and the normal packet loss caused by unstable channels and medium-access-control layer collisions is considered. The adaptive reward and penalty parameters of a detection learning automata are determined by the comprehensive communication quality of the node and the voting of its neighbors to reward normal nodes or punish malicious ones. Simulation results indicate the effectiveness of the proposed method in detecting ordinary selective forwarding attacks, black-hole attacks, on-off attacks, and energy exhaustion attacks. In addition, the communication overhead of the method is lower than that of other methods.
APA, Harvard, Vancouver, ISO, and other styles
43

Cui, Xi, and Eric Rothenbuhler. "Communicating Terror: Mediatization and Ritualization." Television & New Media 19, no. 2 (2017): 155–62. http://dx.doi.org/10.1177/1527476417715685.

Full text
Abstract:
In this essay, we explicate the internal logic of contemporary terrorist acts and our society’s responses, to denaturalize the label and meanings we give to “terrorism.” We argue that contemporary terrorism communicates intimidation, fear, and anxiety through the ritualization and mediatization of terrorist attacks. Mediatization refers to the strategic coercion of imperative media coverage of the attacks, and ritualization refers to the focus on sacred life structures in both terrorist attacks and remedial responses. In combining ritualization and mediatization, terrorism aims to introduce maximal chaos through unexpected disruption of the sacred and taken-for-granted in everyday life in the community of the attack and wherever media coverage can reach. The fear and anxiety induced by disrupted life rhythms, including normal media flows, and the compelling footage of the disruption lead to ritualized reactions which both restore and transform the social order beyond the moment of the attack.
APA, Harvard, Vancouver, ISO, and other styles
44

Butts, Jonathan, Mason Rice, and Sujeet Shenoi. "An Adversarial Model for Expressing Attacks on Control Protocols." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 9, no. 3 (2012): 243–55. http://dx.doi.org/10.1177/1548512911449409.

Full text
Abstract:
In this paper we present a model for expressing attacks on control protocols that involve the exchange of messages. Attacks are modeled using the notion of an attacker who can block and/or fabricate messages. These two attack mechanisms cover a variety of scenarios ranging from power grid failures to cyber attacks on oil pipelines. The model provides a method to syntactically express communication systems and attacks, which supports the development of attack and defense strategies. For demonstration purposes, an attack instance is modeled that shows how a targeted messaging attack can result in the rupture of a gas pipeline.
APA, Harvard, Vancouver, ISO, and other styles
45

MEDEIROS (PUCRS), Felipe Castelo Branco. "LYING IS A KIND OF DECEPTION / (MENTIRA É UM TIPO DE ENGANAÇÃO)." Kínesis - Revista de Estudos dos Pós-Graduandos em Filosofia 10, no. 23 (2018): 42–55. http://dx.doi.org/10.36311/1984-8900.2018.v10n23.05.p42.

Full text
Abstract:
Under the traditional view of lying, the concept is usually taken to be a deviant speech act with the following characteristics: (1) being insincere and (2) being done with the intention to deceive. On the recent literature, however, (2) has come under attack by a class of counter examples that purport to show that the traditional view has been misguided. In this essay, our objective is twofold, we intend to: (a) present Lackey’s defense of her take on the traditional conception; (b) present a different proposal about how to go about defending (2). This is important because, although we don’t agree with Lackey’s solution, we do agree that (2) is a necessary condition on a successful definition of lying, as evidenced by the fact that taking the deception clause out of [lying] leaves us with an overall loss of explanatory power with regards to a range of speech acts and the general ethics of communicative cooperation.
APA, Harvard, Vancouver, ISO, and other styles
46

FAFIYEBI, Damilola Oluseyi. "A Critical Discourse Analysis of Selected Utterances of State Actors on the 2019 Xenophobic Attacks on Nigerians in South Africa." Journal of Language and Literature 20, no. 2 (2020): 199. http://dx.doi.org/10.24071/joll.v20i2.2394.

Full text
Abstract:
&lt;p&gt;&lt;em&gt;The study examined the discourse strategies employed by state actors in expressing their views on the 2019 xenophobic attack in South Africa. The objective is to examine how this group of people explores the provisions of critical discourse to shape and pattern their communicative intention. The data employed for the study were sourced from selected online media sources between September and November 2019. The study employed the Critical Discourse Analysis (CDA) approach with a particular focus on the Discourse Historical Approach framework proposed by Wodak (2001) as its theoretical springboard. The study established that different state actors from each of the countries under scrutiny engage in positive self and negative others presentation. This showed that from their discourses, it can be deduced that the state actors were all out to launder the image of their respective countries on the one hand and that of the kith and kin on the other hand.&lt;/em&gt;&lt;/p&gt;
APA, Harvard, Vancouver, ISO, and other styles
47

Dr., Janaki Sivakumar, Smitha Nayak Ms., and Amala Nirmal Doss Dr. "IoT: Effective Authentication System (EAS) using Hash based Encryption on RFID Attacks." International Journal of Engineering and Management Research 10, no. 1 (2020): 72–78. https://doi.org/10.31033/ijemr.10.1.13.

Full text
Abstract:
<strong>Internet of Things (IoT) is undoubtedly a well-known research area. Security on IoT communication services is the major challenge with advanced technology and devices. This paper mainly focusing on Perceptron layer based attacks and counter measures based on Effective Authentication System (EAS). This paper is ordered as outlining IoT Architecture, Types of Threats ,Perceptron Layer&nbsp; based attacks, sensor based communication services ,RFID mechanism ,Tag identify and verification by back end server and Hash based Effective Authentication System (EAS)&nbsp; to avoid pseudonym attacks .This paper proposes EAS as security measure by preventing&nbsp;&nbsp; privacy attack, pseudonym attack, location tracking and asynchronous attack.</strong>
APA, Harvard, Vancouver, ISO, and other styles
48

Ciumacenco, Valentina. "Modality and Irony in Political Discourse." ACROSS 7, no. 1 (2023): 58–71. https://doi.org/10.5281/zenodo.7981151.

Full text
Abstract:
The central figures in political communication are the participants and the strategies of persuasion and manipulation used as tools that influence perceptions, and behaviours. The aim of political discourse is gaining and holding power, the main instrument to achieve this aim is language. Thus, the language applied in political discourse uses a broad range of linguistic devices at the phonological, syntactic, lexical, semantic, pragmatic, and textual levels. One of the expressive means is irony, whose functions vary from attack and mockery to self-defense and entertainment and rely on communicative context, background and the type of relations between the interlocutors. Modality as the expression of the attitude of the speaker, or the expression of subjectivity and the speaker&rsquo;s opinions and emotions, has much more functions, especially in political discourse. Besides rendering a message, the politician has to defend his positive face or the image of his party while undermining the opponent&rsquo;s, sometimes using subtle weapons as irony. This study examines the ideological and evaluative nature of irony and modality in political discourse. It aims at highlighting the linguistic constructions involved in ironic utterances and to reveal ideologies underpinning such structures. The key research questions focus on the role that modalization and ironic utterances play and how they contribute to the preservation of the speaker&#39;s positive image and the negative portrayal of the other.
APA, Harvard, Vancouver, ISO, and other styles
49

Gornostaeva, Anna. "Methodology of Analysis of Ironic Image Functions in Political Discourse." Bulletin of Baikal State University 34, no. 2 (2024): 389–96. https://doi.org/10.17150/2500-2759.2024.34(2).389-396.

Full text
Abstract:
Political discourse in the modern world is leaving its official frames and, according to its characteristics, is approaching the genre of talk-show with the elements of entertainment. Irony, being an important feature of modern political communication, manifests itself in ironic images — discourse tactics, chosen by politicians to implement their aims and achieve goals. The purpose of our study is to develop the ethno-discoursive theory of irony and to build the methodology of its studying as a communicative theory. The research methodology, embodying the results of English and Russian political discourse study, is based on step-by-step analysis of functions, mechanisms and language means used to represent irony. Ironic discourse of English, American and Russian politicians in the period 2009–2023, served as the information and empirical base of the study. The scientific novelty lies in introducing the new term «ironic image» as a combination of tactics, marked ethnically and stylistically which are used by politicians for self-representation. The classification of the functions of irony is given in paradigms: attack — defense, converging — distancing, self-elevating — self-belittling, conflict soothing — conflict aggravating. The study discloses the opportunity of exploring irony in discourse via ironic image analysis. It poses vast challenges for further research of irony, including comparative analysis in political and other types of discourse as well as other national discourses.
APA, Harvard, Vancouver, ISO, and other styles
50

Wu, Zhijun, Yue Yin, Guang Li, and Meng Yue. "Coherent Detection of Synchronous Low-Rate DoS Attacks." Security and Communication Networks 2021 (March 22, 2021): 1–14. http://dx.doi.org/10.1155/2021/6694264.

Full text
Abstract:
Low-rate denial-of-service (LDoS) attacks are characterized by low average rate and periodicity. Under certain conditions, the high concealment of LDoS attacks enables them to transfer the attack stream to the network without being detected at all before the end. In this article, plenty of LDoS attack traffic is spread to the victim end to detect LDoS attacks. Through experimental analysis, it is found that the attack pulses at the victim end have sequence correlation, so the coherence detection technology in spread spectrum communication is proposed to detect LDoS attacks. Therefore, this paper proposes an attack detection method based on coherent detection, which adopts bivariate cyclic convolution algorithm. Similar to the generation of receiving terminal phase dry detection code in spread spectrum communication, we construct a local detection sequence to complete the extraction of LDoS attack stream from the background traffic of the victim terminal, that is, the coherent detection of LDoS attacks. When predicting the features of an LDoS attack, how to construct the parameters of the detection sequence (such as period, pulse duration, amplitude, and so on) is very important. In this paper, we observe the correlation of LDoS attacks and use coherence detection to detect LDoS attacks. By comparing calculated cross-correlation values with designed double threshold rules, the existence of attacks can be determined. The simulation platform and experiments show that this method has high detection performance.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography