16 resultados para Sociology, Christian.

em Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland


Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Kirjallisuusarvostelu

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Populärkulturen har i dagens läge kommit att utgöra en allt mer viktig och central inspirationskälla för allt fler människors konstruktion av den egna religiösa identiteten även inom traditionella och institutionella kristna sammanhang. Denna avhandling belyser denna utveckling i ljuset av den finländska kristna metallmusik-kulturen - en sällsynt stark sammanblanding av protestantisk kristendom och en utpräglad och kontroversiell populärmusikform och dess kultur. Fokus riktas framför allt på hur den kristna metallmusik-kulturen blir meningsfull för sina medlemmar genom de sätt på vilka den konstrueras diskursivt, dvs. genom de sätt på vilka den representeras och talas om bland sina egna anhängare. Den diskursiva konstruktionen av den kristna metallmusik-kulturen utforskas på ett såväl bredare transnationellt som ett finländskt nationellt plan. Studien redogör även för den kristna metalmusikens och -kulturens huvudsakliga verbala, visuella och estetiska kännetecken. Uppbyggnaden och spridningen av dagens transnationella kristna metallmusik-kultur undersöks även i ljuset av det teoretiska konceptet scene. Avhandlingens centrala argument är att den kristna metallmusikscenen erbjuder sina medlemmar en mängd resurser för skapandet av ett alternativt och komplementärt religiöst uttrycksätt, religiös praxis och en alternativ kristen identitet.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study examines information security as a process (information securing) in terms of what it does, especially beyond its obvious role of protector. It investigates concepts related to ‘ontology of becoming’, and examines what it is that information securing produces. The research is theory driven and draws upon three fields: sociology (especially actor-network theory), philosophy (especially Gilles Deleuze and Félix Guattari’s concept of ‘machine’, ‘territory’ and ‘becoming’, and Michel Serres’s concept of ‘parasite’), and information systems science (the subject of information security). Social engineering (used here in the sense of breaking into systems through non-technical means) and software cracker groups (groups which remove copy protection systems from software) are analysed as examples of breaches of information security. Firstly, the study finds that information securing is always interruptive: every entity (regardless of whether or not it is malicious) that becomes connected to information security is interrupted. Furthermore, every entity changes, becomes different, as it makes a connection with information security (ontology of becoming). Moreover, information security organizes entities into different territories. However, the territories – the insides and outsides of information systems – are ontologically similar; the only difference is in the order of the territories, not in the ontological status of entities that inhabit the territories. In other words, malicious software is ontologically similar to benign software; they both are users in terms of a system. The difference is based on the order of the system and users: who uses the system and what the system is used for. Secondly, the research shows that information security is always external (in the terms of this study it is a ‘parasite’) to the information system that it protects. Information securing creates and maintains order while simultaneously disrupting the existing order of the system that it protects. For example, in terms of software itself, the implementation of a copy protection system is an entirely external addition. In fact, this parasitic addition makes software different. Thus, information security disrupts that which it is supposed to defend from disruption. Finally, it is asserted that, in its interruption, information security is a connector that creates passages; it connects users to systems while also creating its own threats. For example, copy protection systems invite crackers and information security policies entice social engineers to use and exploit information security techniques in a novel manner.