03490nam 22007215 450 99620252910331620200701163226.03-319-11379-810.1007/978-3-319-11379-1(CKB)3710000000227403(SSID)ssj0001338840(PQKBManifestationID)11704413(PQKBTitleCode)TC0001338840(PQKBWorkID)11345464(PQKB)10661467(DE-He213)978-3-319-11379-1(MiAaPQ)EBC6301208(MiAaPQ)EBC5579436(Au-PeEL)EBL5579436(OCoLC)889880814(PPN)180626566(EXLCZ)99371000000022740320140820d2014 u| 0engurnn|008mamaatxtccrResearch in Attacks, Intrusions and Defenses[electronic resource] 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014, Proceedings /edited by Angelos Stavrou, Herbert Bos, Georgios Portokalidis1st ed. 2014.Cham :Springer International Publishing :Imprint: Springer,2014.1 online resource (XIV, 490 p. 114 illus.) Security and Cryptology ;8688Includes index.3-319-11378-X Computer security.- Network security -- Authentication -- Malware -- Intrusion detection -- Browser security -- Web application security -- Wireless security -- Vulnerability analysis.This book constitutes the proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2014, held in Gothenburg, Sweden, in September 2014. The 22 full papers were carefully reviewed and selected from 113 submissions, and are presented together with 10 poster abstracts. The papers address all current topics in computer security, including network security, authentication, malware, intrusion detection, browser security, web application security, wireless security, vulnerability analysis.Security and Cryptology ;8688Computer securityManagement information systemsComputer scienceComputer communication systemsSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Computer security.Management information systems.Computer science.Computer communication systems.Systems and Data Security.Management of Computing and Information Systems.Computer Communication Networks.353.00722Stavrou Angelosedthttp://id.loc.gov/vocabulary/relators/edtBos Herbertedthttp://id.loc.gov/vocabulary/relators/edtPortokalidis Georgiosedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996202529103316Research in Attacks, Intrusions, and Defenses1912512UNISA04103nam 22006252 450 991079100770332120140322143123.01-4725-6668-81-4742-7537-01-4725-9374-X1-4725-6669-610.5040/9781472593740(CKB)2550000001333573(EBL)1761940(SSID)ssj0001292334(PQKBManifestationID)12583339(PQKBTitleCode)TC0001292334(PQKBWorkID)11283607(PQKB)10622121(MiAaPQ)EBC1761940(OCoLC)1162867935(UtOrBLW)bpp09257868(EXLCZ)99255000000133357320140310d2014 uy 0engur|n|---|||||txtccrAntagonism on Youtube metaphor in online discourse /Stephen PihlajaLondon ;New York :Bloomsbury Academic, An imprint of Bloomsbury Publishing Plc,2014.1 online resource (193 p.)Description based upon print version of record.1-4725-6667-X 1-306-98815-2 Includes bibliographical references and index.1.Drama in the YouTube Community -- 2.YouTube as a Field: Life in a YouTube Community : Entering the field ; YouTube videos as data ; Ethical considerations ; Discourse analysis -- 3.Withered Branches and Human Garbage: Biblical and Metaphorical Stories ; The discourse dynamics of metaphor ; Doing metaphor analysis ; Biblical metaphor in Christian discourse ; From branches to garbage ; The development of Biblical metaphor in non-Christian user talk ; Discussion -- 4.Fake Christians and Fluffy Christians: Metaphor in the Categorization of Users ; Membership categorization analysis ; Doing categorization analysis ; Metaphorical categories and category-bound activities ; The categorization devices of 'types of Christians' ; The role of the Bible in categorization and interaction ; Discussion -- 5.'Friends of the World and Enemies of God': Metaphor in Conflicting Storylines: ; Positioning in social interaction ; Doing positioning analysis ; Shifting positionings and conflict ; Discussion -- 6.Metaphor in Drama."This book focuses on the ways in which metaphor contributes to the development of Internet arguments, known as 'drama', particularly on YouTube. Although a growing body of research into YouTube interaction has developed descriptions of user experience on the site, empirical studies of the YouTube video page and discourse analysis of user interaction are rare. This research specifically focuses on user interaction around issues of Christian theology and atheism on the site, analysing how 'drama' emerges. Since YouTube drama occurs publicly, Antagonism on YouTube focuses on video pages rather than user reports of their actions and responses. It investigates how and why YouTube drama develops through a systematic description and analysis of user discourse activity. Through close analysis of video pages, this study contributes to a greater academic understanding of Internet antagonism and YouTube interaction by revealing the factors which contribute to the development of drama over time."--Bloomsbury Publishing.ChristianityComputer network resourcesMetaphorReligious aspectsChristianityInterpersonal conflictReligious aspectsChristianityDiscourse analysisReligious aspectsChristianitylinguisticsChristianityComputer network resources.MetaphorReligious aspectsChristianity.Interpersonal conflictReligious aspectsChristianity.Discourse analysisReligious aspectsChristianity.303.602856754Pihlaja Stephen1495013UtOrBLWUtOrBLWBOOK9910791007703321Antagonism on Youtube3718961UNINA