728 resultados para New media literacy
Resumo:
This thesis had two goals: to explore the transformation of Hollywood from the 1930s to present, and to investigate how Contemporary Hollywood functions in a growing attention economy. Evident in the types of films that it produces as well as its evolving industrial structure, Contemporary Hollywood significantly differs from the Classical Hollywood of the 1930s. New digital technologies like surround sound and computer-generated imagery (CGI) have allowed studios to create a different type of film like the blockbuster and to have more extensive control over their films. Additionally, growing exhibition and distribution platforms have also fundamentally altered the industrial landscape of Hollywood. In order to combat this more egalitarian distribution system, Contemporary Hollywood has turned to conglomeratization. But, what has caused such a radical shift in the form and function of Contemporary Hollywood and its films? This thesis argues that Hollywood is failing to thrive in this new media landscape¿not because of changing technologies¿but because of a changing consumer. Richard Lanham theorizes that we are living in a growing attention economy, where human attention is the most valuable commodity in such an information-saturated society. For the current consumer, there is near-constant media over-stimulation: he or she is exposed to any number of screens (mobile phones, laptops, tablets, televisions, etc.) at any given time. Because we can access anything from anywhere at anytime, we¿ve become somewhat schizophrenic and impatient in terms of the media that we consume in our lives.
Resumo:
This essay provides an overview of the distinctive challenges presented to teaching and learning in religious and theological studies by the conditions and characteristics of “millennial” students. While the emerging literature on this generation is far from consistent, it is still instructive and important to engage, as students that are immersed in technology and social networking have different facilities and difficulties that educators would do well to carefully address and critically employ. Teachers in theological and religious studies are distinctly positioned to grapple with such conditions, particularly around the practices of identity formation, media literacy, and embodiment. Attention to the development of such practices engages key issues for both the millennial students and the religious and theological studies teacher: virtual reality, spiritual identity, globalization and violence, critical consumption and ethical creativity, focused and contemplative thinking, and intercultural and interpersonal respect.
Resumo:
This thesis examines digital technologies used by technical communicators in healthcare settings. I show that technical communicators, who function as users, advocators and evaluators, need a useable framework for ethical engagement with digital technologies, which integrally affect the physician-patient relationship. Therefore, I apply rhetorical methodology by producing useable knowledge and phenomenological methodology by examining lived experiences of technical communicators. Substantiation comes from theories spanning technical communication, philosophy, and composition studies. Evidence also emerges from qualitative interviews with communication professionals working in healthcare; my concerns arise from personal experiences with electronic recordkeeping in the exam room. This thesis anticipates challenging the presumed theory-practice divide while encouraging greater disciplinary reciprocity. Because technical communication infuses theory into productive capacity, this thesis presents the tripartite summons of the ethical technical communicator: to exercise critically-reflective action that safeguards the physician-patient relationship by ways of using digital technologies, advocating for audiences, and evaluating digital technologies.
Resumo:
eLearning supports the education in certain disciplines. Here, we report about novel eLearning concepts, techniques, and tools to support education in Software Engineering, a subdiscipline of computer science. We call this "Software Engineering eLearning". On the other side, software support is a substantial prerequisite for eLearning in any discipline. Thus, Software Engineering techniques have to be applied to develop and maintain those software systems. We call this "eLearning Software Engineering". Both aspects have been investigated in a large joint, BMBF-funded research project, termed MuSofT (Multimedia in Software Engineering). The main results are summarized in this paper.
Resumo:
In recent years interactive media and tools, like scientific simulations and simulation environments or dynamic data visualizations, became established methods in the neural and cognitive sciences. Hence, university teachers of neural and cognitive sciences are faced with the challenge to integrate these media into the neuroscientific curriculum. Especially simulations and dynamic visualizations offer great opportunities for teachers and learners, since they are both illustrative and explorable. However, simulations bear instructional problems: they are abstract, demand some computer skills and conceptual knowledge about what simulations intend to explain. By following two central questions this article provides an overview on possible approaches to be applied in neuroscience education and opens perspectives for their curricular integration: (i) How can complex scientific media be transformed for educational use in an efficient and (for students on all levels) comprehensible manner and (ii) by what technical infrastructure can this transformation be supported? Exemplified by educational simulations for the neurosciences and their application in courses, answers to these questions are proposed a) by introducing a specific educational simulation approach for the neurosciences b) by introducing an e-learning environment for simulations, and c) by providing examples of curricular integration on different levels which might help academic teachers to integrate newly created or existing interactive educational resources in their courses.
Resumo:
Die Dissertationsschrift widmet sich der Erforschung des Online-Lernens mittels Weblogs unter Anwendung der E-Portfolio Methode als einer seit mehreren Jahren verstärkt aufkommenden Lern- und Präsentationsform im Bildungskontext. Über mehrere Lehrveranstaltungen des Studiengangs "Angewandte Medien- und Kommunikationswissenschaft" an der Technischen Universität Ilmenau hinweg wurden drei Fallstudien gebildet. Innerhalb dieser wurde das Führen von eigenen E-Portfolio Blogs durch Studierende über einen Zeitraum von etwa drei Jahren evaluiert. Als Evaluationsziel wurde anhand spezifischer Fragestellungen ermittelt, wie das damit einhergehende selbstgesteuert-konnektive Lernen zu entsprechendem Erfolg führen kann. Hierbei wurde insbesondere die Teildimension Medienkompetenz im Spannungsfeld von Lernaktivität, Wissenserwerb und Informations-/Wissensmanagement betrachtet sowie weitere intervenierende Variablen, wie zum Beispiel Aufwand oder Akzeptanz, berücksichtigt. Inhaltlich wurden zunächst begriffliche Grundlagen dargestellt, die Nutzung von E-Portfolios in Theorie und Praxis beschrieben, Medienkompetenz-Ansätze detailliert aufgezeigt sowie in den Kontext von E-Portfolios gebracht und schließlich eine umfangreiche Analyse des Forschungsstandes aufbereitet. Diese gingen mit Erkenntnissen aus einer qualitativen Vorstudie in Form von fünf leitfadengestützten Experteninterviews einher. Die darauf aufbauende Hauptstudie widmete sich anschließend der Erhebung und Auswertung quantitativer Daten anhand von Online-Befragungen mit den Studierenden zu fünf Zeitpunkten aus intra- und interindividueller Perspektive. Als markanteste empirische Erkenntnis der Arbeit kann festgehalten werden, dass es durch das selbstgesteuert-konnektive Lernen mit E-Portfolio Blogs zu einer nachhaltigen Förderung der Medienkompetenz kommt, die sich auch in signifikanten Zusammenhängen mit den anderen Teildimensionen und intervenierenden Variablen widerspiegelt. Darüber hinaus bieten sich aber auch Potenziale für eine steigende Lernaktivität, einen ansteigenden Wissenserwerb und ein verbessertes Informations-/Wissensmanagement, die es aber noch weiterführend zu erforschen gilt. Demgegenüber können allerdings der entstehende und kontinuierlich hohe Aufwand sowie die erforderliche (Eigen-) Motivation als entscheidende Herausforderungen dieser Lernmethode identifiziert werden.
Resumo:
Digital game environments are of increasing economic, social and cultural value. As their influence on diverse facets of life grows, states have felt compelled to intervene and secure some public interests. Yet, the contours of a comprehensive governance model are far from recognisable and governments are grappling with the complexity and fluidity of online games and virtual worlds as private spaces and as experimentation fields for creativity and innovation. This book contributes to a more comprehensive and fine-grained understanding of digital game environments, which is a precondition for addressing any of the pressing governance questions posed. Particular attention is given to the concept and policy objective of cultural diversity, which also offers a unique entry point into the discussion of the appropriate legal regulation of digital games. Governance of Digital Game Environments and Cultural Diversity will be of interest to researchers of media law, internet law and governance, cultural studies, anthropology and sociology. As the book addresses a highly topical theme, it will attract the attention of policymakers at national, regional and international levels and will also serve as a great resource tool for scholars in new media and, in particular, digital games and virtual worlds.
Resumo:
Digital game environments are of increasing economic, social and cultural value. As their influence on diverse facets of life grows, states have felt compelled to intervene and secure some public interests. Yet, the contours of a comprehensive governance model are far from recognisable and governments are grappling with the complexity and fluidity of online games and virtual worlds as private spaces and as experimentation fields for creativity and innovation. This book contributes to a more comprehensive and fine-grained understanding of digital game environments, which is a precondition for addressing any of the pressing governance questions posed. Particular attention is given to the concept and policy objective of cultural diversity, which also offers a unique entry point into the discussion of the appropriate legal regulation of digital games. Governance of Digital Game Environments and Cultural Diversity will be of interest to researchers of media law, internet law and governance, cultural studies, anthropology and sociology. As the book addresses a highly topical theme, it will attract the attention of policymakers at national, regional and international levels and will also serve as a great resource tool for scholars in new media and, in particular, digital games and virtual worlds.
Resumo:
The phosphoinositide 3-kinase (PI3K) family of signalling enzymes play a key role in the transduction of signals from activated cell surface receptors controlling cell growth and proliferation, survival, metabolism, and migration. The intracellular signalling pathway from activated receptors to PI3K and its downstream targets v-akt murine thymoma viral oncogene homolog (Akt) and mechanistic target of rapamycin (mTOR) is very frequently deregulated by genetic and epigenetic mechanisms in human cancer, including leukaemia and lymphoma. In the past decade, an arsenal of small molecule inhibitors of key enzymes in this pathway has been developed and evaluated in pre-clinical studies and clinical trials in cancer patients. These include pharmacological inhibitors of Akt, mTOR, and PI3K, some of which are approved for the treatment of leukaemia and lymphoma. The PI3K family comprises eight different catalytic isoforms in humans, which have been subdivided into three classes. Class I PI3K isoforms have been extensively studied in the context of human cancer, and the isoforms p110α and p110δ are validated drug targets. The recent approval of a p110δ-specific PI3K inhibitor (idelalisib/Zydelig®) for the treatment of selected B cell malignancies represents the first success in developing these molecules into anti-cancer drugs. In addition to PI3K inhibitors, mTOR inhibitors are intensively studied in leukaemia and lymphoma, and temsirolimus (Torisel®) is approved for the treatment of a type of lymphoma. Based on these promising results it is hoped that additional novel PI3K pathway inhibitors will in the near future be further developed into new drugs for leukaemia and lymphoma.
Resumo:
An analysis of print Holocaust denial literature as it compares to internet Holocaust denial, with a focus on how the transition from print literature to the internet has affected Holocaust denial.
Resumo:
The extraordinary increase of new information technologies, the development of Internet, the electronic commerce, the e-government, mobile telephony and future cloud computing and storage, have provided great benefits in all areas of society. Besides these, there are new challenges for the protection of information, such as the loss of confidentiality and integrity of electronic documents. Cryptography plays a key role by providing the necessary tools to ensure the safety of these new media. It is imperative to intensify the research in this area, to meet the growing demand for new secure cryptographic techniques. The theory of chaotic nonlinear dynamical systems and the theory of cryptography give rise to the chaotic cryptography, which is the field of study of this thesis. The link between cryptography and chaotic systems is still subject of intense study. The combination of apparently stochastic behavior, the properties of sensitivity to initial conditions and parameters, ergodicity, mixing, and the fact that periodic points are dense, suggests that chaotic orbits resemble random sequences. This fact, and the ability to synchronize multiple chaotic systems, initially described by Pecora and Carroll, has generated an avalanche of research papers that relate cryptography and chaos. The chaotic cryptography addresses two fundamental design paradigms. In the first paradigm, chaotic cryptosystems are designed using continuous time, mainly based on chaotic synchronization techniques; they are implemented with analog circuits or by computer simulation. In the second paradigm, chaotic cryptosystems are constructed using discrete time and generally do not depend on chaos synchronization techniques. The contributions in this thesis involve three aspects about chaotic cryptography. The first one is a theoretical analysis of the geometric properties of some of the most employed chaotic attractors for the design of chaotic cryptosystems. The second one is the cryptanalysis of continuos chaotic cryptosystems and finally concludes with three new designs of cryptographically secure chaotic pseudorandom generators. The main accomplishments contained in this thesis are: v Development of a method for determining the parameters of some double scroll chaotic systems, including Lorenz system and Chua’s circuit. First, some geometrical characteristics of chaotic system have been used to reduce the search space of parameters. Next, a scheme based on the synchronization of chaotic systems was built. The geometric properties have been employed as matching criterion, to determine the values of the parameters with the desired accuracy. The method is not affected by a moderate amount of noise in the waveform. The proposed method has been applied to find security flaws in the continuous chaotic encryption systems. Based on previous results, the chaotic ciphers proposed by Wang and Bu and those proposed by Xu and Li are cryptanalyzed. We propose some solutions to improve the cryptosystems, although very limited because these systems are not suitable for use in cryptography. Development of a method for determining the parameters of the Lorenz system, when it is used in the design of two-channel cryptosystem. The method uses the geometric properties of the Lorenz system. The search space of parameters has been reduced. Next, the parameters have been accurately determined from the ciphertext. The method has been applied to cryptanalysis of an encryption scheme proposed by Jiang. In 2005, Gunay et al. proposed a chaotic encryption system based on a cellular neural network implementation of Chua’s circuit. This scheme has been cryptanalyzed. Some gaps in security design have been identified. Based on the theoretical results of digital chaotic systems and cryptanalysis of several chaotic ciphers recently proposed, a family of pseudorandom generators has been designed using finite precision. The design is based on the coupling of several piecewise linear chaotic maps. Based on the above results a new family of chaotic pseudorandom generators named Trident has been designed. These generators have been specially designed to meet the needs of real-time encryption of mobile technology. According to the above results, this thesis proposes another family of pseudorandom generators called Trifork. These generators are based on a combination of perturbed Lagged Fibonacci generators. This family of generators is cryptographically secure and suitable for use in real-time encryption. Detailed analysis shows that the proposed pseudorandom generator can provide fast encryption speed and a high level of security, at the same time. El extraordinario auge de las nuevas tecnologías de la información, el desarrollo de Internet, el comercio electrónico, la administración electrónica, la telefonía móvil y la futura computación y almacenamiento en la nube, han proporcionado grandes beneficios en todos los ámbitos de la sociedad. Junto a éstos, se presentan nuevos retos para la protección de la información, como la suplantación de personalidad y la pérdida de la confidencialidad e integridad de los documentos electrónicos. La criptografía juega un papel fundamental aportando las herramientas necesarias para garantizar la seguridad de estos nuevos medios, pero es imperativo intensificar la investigación en este ámbito para dar respuesta a la demanda creciente de nuevas técnicas criptográficas seguras. La teoría de los sistemas dinámicos no lineales junto a la criptografía dan lugar a la ((criptografía caótica)), que es el campo de estudio de esta tesis. El vínculo entre la criptografía y los sistemas caóticos continúa siendo objeto de un intenso estudio. La combinación del comportamiento aparentemente estocástico, las propiedades de sensibilidad a las condiciones iniciales y a los parámetros, la ergodicidad, la mezcla, y que los puntos periódicos sean densos asemejan las órbitas caóticas a secuencias aleatorias, lo que supone su potencial utilización en el enmascaramiento de mensajes. Este hecho, junto a la posibilidad de sincronizar varios sistemas caóticos descrita inicialmente en los trabajos de Pecora y Carroll, ha generado una avalancha de trabajos de investigación donde se plantean muchas ideas sobre la forma de realizar sistemas de comunicaciones seguros, relacionando así la criptografía y el caos. La criptografía caótica aborda dos paradigmas de diseño fundamentales. En el primero, los criptosistemas caóticos se diseñan utilizando circuitos analógicos, principalmente basados en las técnicas de sincronización caótica; en el segundo, los criptosistemas caóticos se construyen en circuitos discretos u ordenadores, y generalmente no dependen de las técnicas de sincronización del caos. Nuestra contribución en esta tesis implica tres aspectos sobre el cifrado caótico. En primer lugar, se realiza un análisis teórico de las propiedades geométricas de algunos de los sistemas caóticos más empleados en el diseño de criptosistemas caóticos vii continuos; en segundo lugar, se realiza el criptoanálisis de cifrados caóticos continuos basados en el análisis anterior; y, finalmente, se realizan tres nuevas propuestas de diseño de generadores de secuencias pseudoaleatorias criptográficamente seguros y rápidos. La primera parte de esta memoria realiza un análisis crítico acerca de la seguridad de los criptosistemas caóticos, llegando a la conclusión de que la gran mayoría de los algoritmos de cifrado caóticos continuos —ya sean realizados físicamente o programados numéricamente— tienen serios inconvenientes para proteger la confidencialidad de la información ya que son inseguros e ineficientes. Asimismo una gran parte de los criptosistemas caóticos discretos propuestos se consideran inseguros y otros no han sido atacados por lo que se considera necesario más trabajo de criptoanálisis. Esta parte concluye señalando las principales debilidades encontradas en los criptosistemas analizados y algunas recomendaciones para su mejora. En la segunda parte se diseña un método de criptoanálisis que permite la identificaci ón de los parámetros, que en general forman parte de la clave, de algoritmos de cifrado basados en sistemas caóticos de Lorenz y similares, que utilizan los esquemas de sincronización excitador-respuesta. Este método se basa en algunas características geométricas del atractor de Lorenz. El método diseñado se ha empleado para criptoanalizar eficientemente tres algoritmos de cifrado. Finalmente se realiza el criptoanálisis de otros dos esquemas de cifrado propuestos recientemente. La tercera parte de la tesis abarca el diseño de generadores de secuencias pseudoaleatorias criptográficamente seguras, basadas en aplicaciones caóticas, realizando las pruebas estadísticas, que corroboran las propiedades de aleatoriedad. Estos generadores pueden ser utilizados en el desarrollo de sistemas de cifrado en flujo y para cubrir las necesidades del cifrado en tiempo real. Una cuestión importante en el diseño de sistemas de cifrado discreto caótico es la degradación dinámica debida a la precisión finita; sin embargo, la mayoría de los diseñadores de sistemas de cifrado discreto caótico no ha considerado seriamente este aspecto. En esta tesis se hace hincapié en la importancia de esta cuestión y se contribuye a su esclarecimiento con algunas consideraciones iniciales. Ya que las cuestiones teóricas sobre la dinámica de la degradación de los sistemas caóticos digitales no ha sido totalmente resuelta, en este trabajo utilizamos algunas soluciones prácticas para evitar esta dificultad teórica. Entre las técnicas posibles, se proponen y evalúan varias soluciones, como operaciones de rotación de bits y desplazamiento de bits, que combinadas con la variación dinámica de parámetros y con la perturbación cruzada, proporcionan un excelente remedio al problema de la degradación dinámica. Además de los problemas de seguridad sobre la degradación dinámica, muchos criptosistemas se rompen debido a su diseño descuidado, no a causa de los defectos esenciales de los sistemas caóticos digitales. Este hecho se ha tomado en cuenta en esta tesis y se ha logrado el diseño de generadores pseudoaleatorios caóticos criptogr áficamente seguros.
Resumo:
The spreading of new systems of broadcasting and distribution of multimedia content has had as a consequence a larger need for aggregation of data and metadata to traditionally based contents of video and audio supply. Broadcasting chains of this type of channels have become overwhelmed by the quantity of resources, infrastructures and development needed for these channels to provide information. In order to avoid this kind of shortcomings, several recommendations and standards have been created to exchange metadata between production and distribution of taped programs. The problem lies in live programs, producers sometimes offer data to channels but most often, channels are not able to face required developments. The key to this problem is cost reduction. In this work, a study is conducted on added services which producers may provide to the media about content; a system is found by which additional communication expenses are not made and a model of information transfer is offered which allows low cost developments to supply new media platforms.
Resumo:
La aparición de Internet y los sistemas informáticos supuso un antes y un después en el modo que las personas emplearían para acceder a los sistemas de información. El crecimiento exponencial seguido en los años posteriores ha llevado este hecho hasta la situación actual, donde prácticamente todos los ámbitos del día a día se encuentran reflejados en la Red. Por otro lado, a la par que la sociedad se desplazaba al ciberespacio, también comenzaban a hacerlo aquellos que buscaban obtener un rendimiento delictivo de los nuevos medios y herramientas que se ponían a su disposición. Avanzando a pasos agigantados en el desarrollo de técnicas y métodos para vulnerar unos sistemas de seguridad, aún muy inmaduros, los llamados ciberdelincuentes tomaban ventaja sobre las autoridades y su escasa preparación para abordar este nuevo problema. Poco a poco, y con el paso de los años, esta distancia ha ido reduciéndose, y pese a que aún queda mucho trabajo por hacer, y que el crecimiento de los índices de ciberdelincuencia, junto con la evolución y aparición de nuevas técnicas, sigue a un ritmo desenfrenado, los gobiernos y las empresas han tomado consciencia de la gravedad de este problema y han comenzado a poner sobre la mesa grandes esfuerzos e inversiones con el fin de mejorar sus armas de lucha y métodos de prevención para combatirla. Este Proyecto de Fin de Carrera dedica sus objetivos a la investigación y comprensión de todos estos puntos, desarrollando una visión específica de cada uno de ellos y buscando la intención final de establecer las bases suficientes que permitan abordar con la efectividad requerida el trabajo necesario para la persecución y eliminación del problema. ABSTRACT. The emergence of Internet and computer systems marked a before and after in the way that people access information systems. The continued exponential growth in the following years has taken this fact to the current situation, where virtually all areas of everyday life are reflected in the Net. On the other hand, meanwhile society moved into cyberspace, the same began to do those seeking to obtain a criminal performance of new media and tools at their disposal. Making great strides in the development of techniques and methods to undermine security systems, still very immature, so called cybercriminals took advantage over the authorities and their lack of preparation to deal with this new problem. Gradually, and over the years, this distance has been declining, and although there is still much work to do and the growth rates of cybercrime, along with the evolution and emergence of new techniques, keep increasing at a furious pace, governments and companies have become aware of the seriousness of this problem and have begun to put on the table great efforts and investments in order to upgrade their weapons to fight against this kind of crimes and prevention methods to combat it. This Thesis End of Grade Project focuses its objectives on the research and understanding of all these points, developing a specific vision of each of them and looking for the ultimate intention of establishing a sufficient basis by which to manage with the required effectiveness the type of work needed for the persecution and elimination of the problem.
Resumo:
Vivimos en un tiempo de referencias múltiples, de inquietudes en todos los ámbitos -también en el de la arquitectura-, en el que se trata de superar el peso de la historia; donde los apegos sobran y lo que interesa son las posibilidades que nos depara el presente activo. El papel de la crítica de la arquitectura se cuestiona a diario. Los nuevos media son contenedores en actualización continua y el texto ha sido sustituido inevitablemente por la imagen y la acción. En este contexto, la tesis cuestiona por que el nuevo sentido de la crítica sea el de operador que acompaña al proceso del proyecto arquitectónico. Desde el proyecto, sobre el proyecto, para el proyecto, en el proyecto, hacia el proyecto, con el proyecto. Acometiendo la acción crítica desde la complejidad de lo arquitectónico, sobre la diversidad, para la pluralidad, en lo colectivo, hacia la simultaneidad en la síntesis. Para ello, la tesis se apoya en la noción de poética –como complejidad y síntesis interna- y en cinco sistemas arquitectónicos cuya interacción no puede ignorarse –campo, programa, materia, geometría y morfología- para renovar y actualizar la usabilidad de un método crítico –el método Mirregan-Todorov- que ha obtenido reconocidos resultados; pero cuya pesada estructura limita en gran medida su campo de acción y operativa. En este sentido, no se trata ni de una tesis meramente analítica, ni de determinar unos paradigmas arquitectónicos para este siglo. Esta investigación reformula el papel de la crítica de la arquitectura hoy, y parte del orden –como autoorganización- abierto de la crítica poética para proponer una línea de trabajo sobre la interacción de sistemas arquitectónicos de una manera sinérgica y a disposición del proceso de proyecto. Disposición que lleva, como proposición final, a plantear esta actitud como instrumento docente y pedagógico de la asignatura de proyectos arquitectónicos, ya que posibilita la obtención de una serie de cartografías abiertas reflejo de los múltiples agentes y factores de influencia del presente que propician una visión compleja, pero abordable, del proyecto como totalidad. ABSTRACT We live in a time of multiple references, of concerns in all areas -also in architecture-, which tries to overcome the burden of history. A time where the attachments remain and what matters are the possibilities active present lies. The role of criticism of architecture is questioned daily. New media are continuously updated containers, and the text has been inevitably replaced by the image and the action. In this context, the thesis questions that the new sense of criticism is to be the operator that accompanies the architectural design process. From the project, on the project, for the project, in the project, to the project, with the project. An operator which undertakes the critical work from the architectural complexity, on the diversity, plurality, in the collective, to the simultaneous synthesis. To do this, the thesis is based on the notion of poetic -as complexity and internal synthesis- and in five architectural systems whose interaction cannot be ignored -field, program, material, geometry and morphology- to renovate and upgrade the usability of a critical method –the Mirregan-Todorov method- which has obtained recognized results, but whose heavy structure limits greatly its scope and operational. In this sense, it is not a purely analytical thesis. It neither tries to identify any architectural paradigms for this century. This research reformulates the role of criticism of architecture today. It runs from the open orderliness –as self-organization- of the poetic criticism to propose a line of work on the interaction of architectural systems in a synergistic manner and available to the project process. Since this attitude enables the production of a series of open mapping which reflect multiple current factors and agents of influence, this arrangement leads, as a final proposition, to raise the poetic criticism as a teaching and educational instrument of the subject of architectural design, where those maps lead to a complex, but approachable, vision of the project as a whole.
Resumo:
Dado el impacto que las redes sociales tienen en la vida diaria de los países desarrollados o en vías de desarrollo, éstas han pasado a tener un papel clave en dicho desarrollo social. Dicha consideración no sólo debe centrarse en cómo las personas forman las redes, sino las herramientas que emplean y la forma en la que estas deben ser tratadas por las organizaciones para conseguir una posición preferencial con los usuarios que forman las redes (considerando el creciente número de éstos todos los días). El presente trabajo trata de exponer la diferencia entre medios sociales y redes sociales, estableciendo una diferencia clara entre entre ambos, define lo que son los medios sociales (Social Media en Inglés), qué se debe considerar para que el uso de los mismos tenga una carácter exitoso en sus operaciones y cómo las organizaciones perciben la diferencia competitiva que éstos aportan en sus actividades. Una vez definida, destacamos la importancia de la consideración de estos nuevos medios en las estrategias de la compañías. Para ello, debemos ver el ecosistema de los medios sociales de forma general, y focalizarnos en la relación marca-compañía con el usuario/cliente. La inclusión de los medios sociales en las estrategias de las compañías, primero de forma independiente y, posteriormente, de forma integrada, hace que los modelos de negocio de las compañías se vayan adaptando a los tiempos. Se describe el cambio de paradigma de los modelos de negocio afectados por la introducción de los medios sociales, los elementos y tipos de modelos de negocio que se pueden tener, así como la adaptación de los modelos establecidos a los nuevos modelos. Posteriormente se ve cómo las compañías incluyen los medios sociales en su estrategia, a través de una planificación de medios sociales,partiendo de qué es una estrategia y cómo debe evaluarse. Una vez se ha definido el contexto (qué son los medios sociales, redes sociales, modelo de negocio, estrategia; así como sus características), se definen los bloques funcionales de los medios sociales, con su paralelismo en términos de la estrategia de las compañías, así como se indican determinados factores de éxito para su adopción. Hasta ahora, estamos mirando la organización de forma individual pero, dentro del mercado en el que desarrollan sus actividades, éstas deben ser evaluadas sobre el grado de desarrollo de los medios sociales en sus operaciones; y poder establecer así comparativas, con otras organizaciones, en relación a su grado de implantación. Con dicho objetivo, desarrollaremos un modelo de madurez de medios sociales (Social Media Maturity Model, SMMM o SM3), de forma teórica. ¿Cómo considerar dicho modelo de forma realista?. Basándonos en el método del estudio de casos, se realizará una análisis e investigación de diferentes organizaciones que nos indicará el grado de aproximación del modelo de madurez referenciado, con respecto a la realidad. ABSTRACT Considering the impact that social networks have in the daily life in developed or developing countries, they have come to play a key role in this social development. This consideration should not only focus on how people set up networks, but the tools they use and how these ones should be addressed by organizations to achieve a preferential position with users, forming networks (considering the increasing number of them every day). This work tries to explain the difference between social media and social networking, establishing a clear difference between them, defines what is Social Media, which should be considered for its use has a successful character in their operations and how organizations perceive the competitive edge they bring in their activities. Once they are defined, we remark the importance of considering these new media in companies strategies. For this, we see the social media ecosystem in general, and to focus on brandcompany relationship with the user/client. The inclusion of social media strategies in the companies, independently and in a integrated way, makes the business models of companies evolve along the time. It is described the paradigm shift in business models affected by the introduction of social media, elements and types of business models that can be had, and the adaptation of established models to new models. After that, it’s shown how companies include social media strategy through social media planning and building on what is a strategy and how it should be evaluated. Once the context is defined (what is social media, social networking, business model, strategy, and its features), the functional blocks of social media are defined, with its parallelism in terms of the strategy of companies and specific success factors are indicated. So far, we are looking at the organization individually but within the market in which they operate, they must be evaluated on the degree of development of social media in their operations; and to establish and compare with other organizations in relation to their degree of implementation. With this goal, we will develop a maturity model for social media (Social Media Maturity Model, SMMM or SM3), theoretically. How to consider the model realistically?. Based on the case study method, the analysis and research of different organizations that it will indicate the accuracy of the maturity model referenced with respect to the actually performed.