Dog blogs as ventriloquism: Authentication of the human voice
Leppänen, S. (2015). Dog blogs as ventriloquism: Authentication of the human voice. Discourse, Context and Media, 8, 63-73. https://doi.org/10.1016/j.dcm.2015.05.005
Julkaistu sarjassa
Discourse, Context and MediaTekijät
Päivämäärä
2015Tekijänoikeudet
© 2015 Elsevier Ltd. This is a final draft version of an article whose final and definitive form has been published by Elsevier. Published in this repository with the kind permission of the publisher.
This paper looks at personal blogging by dog owners in an international, English language blogsite in which dog owners from around the world report and reflect upon their dogs and their lives with dogs, and do so by using the dog׳s voice. It approaches dog blogs as an example of the strategic use of pervasive but contentious anthropomorphic western discourses about animals and discusses how dog bloggers use anthropomorphism as a discursive means for crafting and collectively ratifying authenticity in a translocal, interest-driven and informal social media context in which traditional territorial and demographic parameters of authenticity are not easily available or relevant.
More specifically, the paper shows how the discursive means for authentication in dog blogging entail deliberate acts of ventriloquism and stylization. It analyses the ways in which these function to authenticate bloggers socially and morally as legitimate participants in dog blogging and as particular kinds of persons. Further, it discusses how a range of norms associated with blogging, on the one hand, and historically specific discourses about humans and companion animals, on the other hand, are recontextualized for the purposes of the socio-cultural niche in question. Particular attention is paid to how linguistic and discursive features associated with diary writing, as well as to how western discourses of dogs and animals are mobilized in the establishment, maintenance and regulation of the global practice about dogs in a way that is highly indexical of idealized, classed gender.
...
Julkaisija
Elsevier BVISSN Hae Julkaisufoorumista
2211-6958Julkaisu tutkimustietojärjestelmässä
https://converis.jyu.fi/converis/portal/detail/Publication/24774922
Metadata
Näytä kaikki kuvailutiedotKokoelmat
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
Efficient remote authentication
Kiperberg, Michael; Zaidenberg, Nezer (Peregrine Technical Solutions, LLC, 2013)In 2003, Kennel and Jamieson described a method of remote machine authentication. By authentication, the authors meant that the remote machine is non-virtual, and the operating system on the ... -
Anomaly detection approach to keystroke dynamics based user authentication
Ivannikova, Elena; David, Gil; Hämäläinen, Timo (IEEE, 2017)Keystroke dynamics is one of the authentication mechanisms which uses natural typing pattern of a user for identification. In this work, we introduced Dependence Clustering based approach to user authentication using ... -
Visions of the Future : What Could Happen to User Authentication?
Paananen, Hanna; Woods, Naomi (Academic Conferences International Ltd, 2024)The most prevalent information system security feature for the user is the authentication process. Passwords have been the primary authentication method for decades due to their simplicity for both the user and the system ... -
What affects the intention to change information security behavior when using biometric authentication in mobile payments?
Väli-Klemelä, Ainohelena (2021)Mobiilimaksut ja mobiilimaksusovellusten käyttö ovat lisääntyneet merkittävästi viime vuosina. Käyttäjät käyttävät erityyppisiä tunnistautumismenetelmiä mobiilimaksujen suorittamiseen, mukaan lukien biometrinen tunnistautuminen. ... -
Extending OAuth2.0 for Kerberos-like authentication to avoid Internet phishing attacks
Vijayan, Anoop (2012)The combined use of OpenID and OAuth for authentication and authorization is gaining popularity day by day in Internet. Because of its simplicity to understand, use and robustness, they are used in many domains in web, ...
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.