منابع مشابه
Doing autoethnography
The author has argued elsewhere that individual identity is sufficiently worthy of research and more than just a deviant case. The representation of an individual’s story that contains one of society’s taboos appears to require legitimation of not only the text but also the method by which it is conveyed. This is particularly important if memory and its distortions appear to be critical feature...
متن کاملAutoethnography helps analyse emotions
Emotions are a near-universal component of human experience, with powerful influences on human attitudes and behaviors, and large-scale social, economic, and environmental consequences (Zajonc, 1984; Oatley et al., 2006; Turner and Stets, 2006; Nesse and Ellsworth, 2009; Niedenthal and Brauer, 2012; Dehaene, 2014). They have been described as a continuum that includes over 100 named emotions, w...
متن کاملEncountering the Physical World
Manufacturing and product design are grounded in the physical world. The entire product lifecycle involves a wide range of integrated tasks that focus on the properties of physical objects, beginning with begins with the design of physical objects and the specification of the materials from which the physical objects are made. Thus, reasoning tasks within manufacturing and product design requir...
متن کاملHandicrafts, Encountering Modern Technology
This article aimes to emphasize certain points concerning traditional art , and to put forward a question. As the term” Traditional art” is rather ambiguous, first we try to clarify it. To do so, we propose an approach somehow different from one generally admitted. Thereby, we discuss the reasons why it is not so easy to give a definition of traditional art, islamic art in particular, specially...
متن کاملEncountering Encrypted Evidence (potential)
Investigative activities involving computer related cases occasionally encounter files that have been encrypted. Encryption is a valid and legal process that enables anyone to protect the privacy of his or her data and/or communications. If the suspect is cooperative and provides not only the key but also the specific encryption software, investigation is simple. However, without that cooperati...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Autoethnography
سال: 2020
ISSN: 2637-5192
DOI: 10.1525/joae.2020.1.1.60