Fortifying boundaries

نویسندگان

چکیده

This article examines how recent changes in the hybrid media environment have led actors to define “how and why” of their practices. We consider discussion on differences similarities surrounding both legacy media, newcomers such as countermedia, be part journalism’s boundary work: ongoing, yet temporally fickle, process marking boundaries between journalism non-journalism. demonstrate countermedia drew through vocabulary, institutional reflection, demarcation practices, ethos. While Finnish underlined its autonomy dominance by defending social good dubbing fake actor MV-lehti own ridiculing professionals, institutions, journalists. Our findings illustrate these consistently asserted flawed ideological foundations “the other”, with consequence that become fortified, rather than crossed or blurred.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fortifying p53 – beyond Mdm2 inhibitors

tumor suppressor p53 is mutated in roughly 50% of all human malignancies. However, in the other 50% of tumors which retain wildtype p53, it appears insufficiently active to confer tumor suppression, through cell cycle arrest or apoptosis. Much of this p53-inactivation occurs through the Mdm2 oncoprotein, the product of a p53-inducible gene. Mdm2 is an E3 ubiquitin-ligase that targets p53 for pr...

متن کامل

Fortifying Our Cyber Defenses

cyber defenses, the nation’s critical infrastructure is at risk. Everything we do as a nation—from national defense to re-energizing the economy—depends on secure information technology systems and networks. Increasingly, however, these software controlled and enabled systems are vulnerable to exploitation by those that seek to do our nation harm, steal our intellectual capital, or simply colle...

متن کامل

Fortifying OSPF/IS-IS against link-failure

We propose data structures preparing shortest path routing, such as OSPF or ISIS, for link failure. Each router can in constant time determine an outgoing link on a shortest path to a destination avoiding any given failed link. This is used to avoid inconsistent forwarding in the period where router tables are updated following a link-

متن کامل

Optimally Fortifying Logic Reliability through Criticality Ranking

With CMOS technology aggressively scaling towards the 22-nm node, modern FPGA devices face tremendous aging-induced reliability challenges due to bias temperature instability (BTI) and hot carrier injection (HCI). This paper presents a novel anti-aging technique at the logic level that is both scalable and applicable for VLSI digital circuits implemented with FPGA devices. The key idea is to pr...

متن کامل

Fortifying Applications Against Xpath Injection Attacks

Code injection derives from a software vulnerability that allows a malicious user to inject custom code into the server engine. In recent years, there have been a great number of such exploits targeting web applications. In this paper we propose an approach that prevents a specific kind of code injection attacks known as xpath injection in a novel way. To detect an attack, our scheme uses locat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journalistica

سال: 2021

ISSN: ['1904-7967', '1901-6220']

DOI: https://doi.org/10.7146/journalistica.v15i1.125038