Dissertations / Theses on the topic 'Internet and terrorism – Canada'

To see the other types of publications on this topic, follow the link: Internet and terrorism – Canada.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Internet and terrorism – Canada.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Ducol, Benjamin. "Devenir jihadiste à l'ère numérique : une approche processuelle et situationnelle de l'engagement jihadiste au regard du Web." Doctoral thesis, Université Laval, 2015. http://hdl.handle.net/20.500.11794/25744.

Full text
Abstract:
Les individus peuvent-ils véritablement verser dans la militance clandestine violente sous l’influence des réseaux numériques? Au cours de la dernière décennie, le cyberespace a en effet été caractérisé par la prolifération des cybercontenus défendant l’engagement clandestin violent comme une avenue d’action légitime. Le mouvement jihadiste et ses acteurs ne constituent à cet égard pas une exception dans l’utilisation des réseaux numériques à des fins de mobilisation militante. C’est à cette forme de militance particulière qu’est consacrée la présente thèse. Notre thèse vise plus spécifiquement à explorer la problématique du rôle des espaces numériques dans les phénomènes d’engagement jihadiste contemporains. Elle a pour ambition de clarifier, tant d’un point de vue théorique que d’un point de vue empirique, les mécanismes complexes qui conduisent certains individus à s’engager dans ces formes radicalisées d’activisme, en interrogeant l’empreinte des environnements numériques dans ces comportements sociologiquement déviants. Mobilisant une architecture théorique inspirée par la théorie de l’action situationnelle (TAS), nous appréhendons l’entrée dans la militance jihadiste dans une perspective processuelle et situationnelle. À partir d’une enquête de terrain réalisée dans trois pays — Canada, Belgique et France —, notre thèse mobilise l’outil biographique ou plutôt le récit de vie, comme un instrument méthodologique permettant d’appréhender les douze trajectoires individuelles observées. Au final, notre thèse conduit à nuancer le rôle des espaces numériques vis-à-vis des trajectoires d’engagement dans le jihadisme. Dans une vaste majorité des cas, l’Internet ne constitue qu’un outil de renforcement des croyances et de construction des justifications morales entourant l’engagement des individus dans l’activisme jihadiste. Dans un nombre de cas plus restreint, le cyberespace joue néanmoins un rôle crucial comme contexte d’exposition initial à l’univers militant. En conclusion, il semble impossible de conclure que l’engagement dans le militantisme clandestin puisse s’opérer par la simple exposition d’un individu à des espaces numériques validant cette avenue d’action. La prise en considération des influences environnementales et du contexte cognitif dans lequel se trouvent les individus apparaît une considération indispensable pour faire sens du poids que les environnements numériques font peser, de manière différenciée, sur les trajectoires d’engagement dans le jihadisme. Mots clés : jihadisme, engagement clandestin, Internet, environnements numériques, radicalisation.
APA, Harvard, Vancouver, ISO, and other styles
2

Diab, Robert. "Terrorism and the administration of justice in Canada." Thesis, University of British Columbia, 2007. http://hdl.handle.net/2429/32370.

Full text
Abstract:
This thesis explores ways in which perspectives in Canada on the administration of justice have shifted after September 11, 2001, in criminal and administrative law. The introductory chapter sets out the general context of my thesis, including a discussion of the development of due process and constitutional rights, and a brief comparison between American, British and Canadian legislative responses to 9 /11. Chapter 2 concerns the context, in which the Canadian Anti-terrorism Act (2001) was drafted, the government's understanding of its purpose and function, and critical reception of the Act. In the face of considerable skepticism, the government (and a minority of sympathetic figures) insisted upon the consistency of the Act with the Canadian Charier of Rights and Freedoms, and argued that it struck a balance between individual and communal interests in a new yet appropriate fashion. Chapter 3 focuses on judicial responses to anti-terror legislation, including provisions dealings with 'security certificate' detentions; the deportation of terrorist suspects to face the risk of torture; and provisions of the Anti- terrorism Act. The cases suggest a general tendency to justify or rationalize departures, from traditional notions of due process, constitutionalism and 'fundamental justice' (in section 7 of the Charter) as appropriate, balanced, and normal. Chapter 4 addresses the problem of accountability of law enforcement and intelligence agencies in light of the post-9/11 amendments to the Canada Evidence Act that significantly expand the scope of state secrecy and privilege in 'national security' matters.
Law, Peter A. Allard School of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
3

Kelly, Michael J. Carleton University Dissertation Political Science. "The media and terrorism; an examination of news coverage of Armenian terrorism in Canada." Ottawa, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Algwaiz, Noura. "Modeling Internet Penetration in Canada." Thesis, University of Ottawa (Canada), 2010. http://hdl.handle.net/10393/28733.

Full text
Abstract:
Internet penetration is an important measure for a knowledge-based economy as it indicates how connected it is to the internet. It does not spread evenly across regions and societies, which results in digital divides. Despite being one of the most connected countries, Canada suffers from uneven penetration rates across the country. In this research, we study the socio-economic factors that int1uence Internet penetration in Canada. We found that the int1uence of rurality has decreased between 2005 and 2007, which suggests that initiatives that took place in those two years were effective. We also analyze the differences among the regions of Canada and found that the regions least int1uenced by the demographic variables are not necessarily the ones with the highest penetration rates. Therefore, a mere look at the penetration rates across the regions is not enough to assess the connectivity of the region and the digital divide within.
APA, Harvard, Vancouver, ISO, and other styles
5

Banez, Justin D. "The internet and homegrown jihadist terrorism assessing U.S. detection techniques." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5027.

Full text
Abstract:
Approved for public release; distribution is unlimited
The idea of homegrown terrorism is not a new concept, especially considering the history of challenges faced by the United States and other Western countries. However, the current violent jihadist problem has overshadowed those past misfortunes in terms of its objective and volatility. What is emergent is the means by which the individuals involved in this movement reinforce or possibly operationalize their radicalized behavior. The Internet is often that vehicle. Efforts to reform U.S. intelligence have placed increasing value on open source information for threat assessments. Consequently, the open Internet has been targeted in search of radical actors, both foreign and homegrown. Some analysts contend that the availability of radical discourse on the Internet presents an opportunity for early identification by authorities. This thesis analyzes the value of open source exploitation of the Internet in the domestic counterterrorism role in relation to other detection techniques in order to extract best practices and lessons learned for improved intelligence and law enforcement activities.
APA, Harvard, Vancouver, ISO, and other styles
6

Sampson, Kirk J. "Winning the battle of ideas through individual resiliency a multi-dimensional approach for countering radicalization in the homeland /." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FSampson.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, September 2009.
Thesis Advisor(s): Supinski, Stanley ; Strindberg, Anders. "September 2009." Description based on title screen as viewed on November 5, 2009. Author(s) subject terms: Community Outreach, Counterradicalization, Counterterrorism, Deradicalization, Education, Extremism, Homeland Security, Internet, Media, Multi-Discipline, Multi-Dimensional, Radicalization, Resiliency, Terrorism. Includes bibliographical references (p. 123-143). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
7

Wilson, II Samuel Forrest. "Terrorist Experts' Perceptions of how the Internet has Shaped International Terrorism." ScholarWorks, 2014. http://scholarworks.waldenu.edu/dissertations/110.

Full text
Abstract:
Mass media and the Internet have emerged as enablers for terrorist planning, facilitation, and communication. The Internet allows terrorists to operate without the confines of borders and increases the potential impact on victims. The purpose of this phenomenological study was to explore the perceptions of American terrorist experts on how terrorists' Internet use has shaped international terrorism. Stepanova's asymmetric conflict theory served as the theoretical framework of this study. Specifically, this study explored terrorists' Internet-based recruitment strategies, the ways in which those recruitment efforts were supported in the United States, the measures to counter such recruitment efforts, and the future direction of terrorist recruitment in the 21st century. Data were collected through in-depth semistructured interviews with a purposive sample of 10 American terrorist experts. Data were analyzed using thematic coding. Findings indicated that terrorists' Internet use has resulted in challenges for counterterrorism agencies in the United States and abroad due to the ability of terrorists to easily close, change, and create new websites or accounts. These findings may inform the work of domestic and international counterterrorism entities in creating policy objectives that address the fluid nature of Internet recruitment, including proactive and coordinated responses by member states. This action may improve the United States' security through more effective recognition and response to terrorist Internet tactics.
APA, Harvard, Vancouver, ISO, and other styles
8

Reilly, Paul John. "Framing online communications of civil and uncivil groups in post-conflict Northern Ireland." Connect to e-thesis. Move to record for print version, 2008. http://theses.gla.ac.uk/131/.

Full text
Abstract:
Thesis (Ph.D.) - University of Glasgow, 2008.
Ph.D. thesis submitted to the Faculty of Law, Business and Social Sciences, Department of Politics, University of Glasgow, 2008. Includes bibliographical references. Print version also available.
APA, Harvard, Vancouver, ISO, and other styles
9

teBrake, Rebecca. "Campaigning online : the internet, elections and democracy in Canada." Thesis, University of British Columbia, 2010. http://hdl.handle.net/2429/24891.

Full text
Abstract:
As political engagement declines in Western democracies, the Internet has been held up as a promising site for citizen participation and engagement. This optimism has been fuelled by recent political events that seem to confirm the Internet's democratic potential. Barack Obama channelled the Internet's power for fundraising and voter mobilization in the 2009 U.S. election. Likewise, Iranian voters successfully used social media such as Twitter to organize protests of the country's 2009 presidential election. This paper presents a first look at how Canadian political parties are using and responding to online communication tools during elections campaigns. Specifically it examines the role of online communications tools in building and developing a campaign platform. Moreover, it discusses whether these activities represent a shift towards a strengthened democracy or are simply reflective of current political culture. The findings are based on data gathered through semi-structured interviews with political strategists involved in the 2008-09 federal, British Columbia provincial and Vancouver municipal elections. This study found that online communication during election campaigns has little influence on the shape of the policy platform. However, political parties have been quick to adopt new online communications platforms allowing them to market their candidates and policies. Moreover, the Internet has shaped traditional campaign functions allowing parties to recruit funds, voter information and volunteers online. Rather than fundamentally shifting the character of democracy in Canada, the current use of online communication tools seems to be defined by the existing political culture.
APA, Harvard, Vancouver, ISO, and other styles
10

Carpenter, Pauline. "Korean international graduate students in Canada: identity and internet use." Thesis, McGill University, 2009. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=66863.

Full text
Abstract:
East Asian international students often face challenges identifying and participating as active and equal members in western academic communities (Morita, 2004). Even though international students often depend on the internet during this critical time (Yang, et al., 2004), how their internet uses impact their identity is largely unknown. Using semi-structured interviews, this phenomenological study explores the experiences of seven South Korean graduate students in Canada, their internet uses, and how these uses influence their identity construction. Findings reveal that these students often experience identity challenges and report that using the internet for socializing, entertainment and information alleviates these issues. Depending on the degree of awareness and purposes of their online practices, these students' internet uses both enable and constrain their identities. Understanding these processes is useful for university student services and students themselves in considering ways the internet can be used to facilitate overcoming challenges international students face during educational sojourn.
Les étudiants internationaux d'Asie de l'Est se retrouvent souvent confrontés à de nombreux challenges quant il s'agit de s'identifier et de participer de manière active et égale aux autres étudiants au sein des communautés universitaires occidentals (Morita, 2004). Même si l'on sait que les étudiants internationaux dépendent souvent d'internet durant cette période cruciale (Yang, et al., 2004), la façon dont ils l'utilisent et l'influence que cela peut avoir sur leur identité reste un domaine largement peu connu. En utilisant des interviews semi structurés, cette étude phénoménologique explore les expériences de sept étudiants universitaires au Canada, leur utilisation d'internet et comment cette utilisation peut avoir une influence sur la construction de leur identité. Les résultats nous révèlent que ces étudiants se retrouvent fréquemment confrontés à des challenges identitaires et que l'utilisation d'internet à des fins de socialisation, d'amusement et d'information les aident dans les difficultés qu'ils rencontrent. L'utilisation d'internet peut à la fois affirmer leur identité ou alors être une source de contrainte suivant le degré de conscience et les raisons pour lesquelles ils se servent d'internet. La compréhension de ces processus décrits précédemment est non seulement utile pour les services aux étudiants au sein des Universités, mais également pour les étudiants eux-mêmes, puisqu'elle met en lumière différentes manières dont internet peut être utilisé afin de dépasser les difficultés que peuvent rencontrer les étudiants internationaux durant leur parcours universitaire.
APA, Harvard, Vancouver, ISO, and other styles
11

Johnson, Ernest. "Privacy and Security Concerns Related to Internet Use in Canada." Thesis, Keele University, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.489683.

Full text
Abstract:
Internet use in Canada and the us has grown and has transcended the lives of many, as it offers unprecedented :c'onveniences. However , privacy and security concerns related to Internet use are widely prevalent and are -:~considered as barriers to realizing the Internet's fullest ._''.' . ~ ,'. potential in the e-Commerce and e-Health arena. Two related studies were conducted to try and .C''':''~'uriderstand the extent of privacy and security concerns related to Intern~t use. Using a national dataset, study 1 examined the profile of Internet use, as well as Internet privacy and security concerns among Canadians. On average, ;57 percent of respondents used the Internet on a regular basis, and Internet privacy and security concerns were expressed by SO and 78 percent, respectively. Given that Internet privacy and security are complex .constructs, these constructs should be examined from a multidimensional ~erspective. As such, study 2 focused on the development of a tool to measure Internet privacy and security concerns. Another purpose of this study 2'was to examine the relationships between Internet privacy and security factors with e-Commerce (i.e., shopping online) and e-Health (i.e., accessing health information online). This study was examined from the perspective of potential customers in Canada, particularly through a survey of students enrolled at a Canadian university. Internet privacy and security tool development led to five statistically determined factors: Interaction, Data Intrusion, Privacy Policy, Security, and Information/Data Sharing. Further analyses showed that the level of concern was significantly higher in four of five factors for those who did not shop online, compared to those who did. -However, no statistically significant difference emerged in any of the five factors in accessing e-Health information . The results of these two studies may have implications for managerial and government regulatory bodies establishing Internet privacy and security codes with further research based on the present findings. Also, the findings may be used to address customers'/marketers' concerns through evidence-based education programs and the development of alternate marketing strategies among young adults. It is hoped the results will form the basis for future research with other customer groups especially as it relates to the concepts of trust and risk.
APA, Harvard, Vancouver, ISO, and other styles
12

Leppington, Kristen Nicole. "Bill C-36: The Creation of Canada's 2001 Anti-Terrorism Act." Master's thesis, Université Laval, 2011. http://hdl.handle.net/20.500.11794/22916.

Full text
Abstract:
Bien que les attentats du 11 septembre 2001 aient pris place aux États-Unis, la réaction du gouvernement canadien a été de proposer la Loi C-36 (la Loi anti-terroriste), une loi qui apporte plusieurs changements au Code criminel canadien et modifie d'autres lois. L´adoption de cette loi s'est faite dans un temps record. Afin de mieux comprendre cette rapidité (du 11 septembre à sa sanction royale en 99 jours) et de mieux cerner la relation avec un événement survenu à l´étranger, ce mémoire cherche à expliquer les facteurs internes et externes qui ont influencé le moment choisi et le contenu de la loi.
Though the terrorist attacks of September 11th, 2001, took place on foreign soil, the Canadian government reacted to this event by proposing Bill C-36 (the Anti-terrorism Act), an omnibus bill outlining multiple changes to the existing Canadian Criminal Code and other acts. With an aim to better understand this anomaly of Canadian public policy in both its record speed (from 9/11 to its Royal Assent in 99 days) and its relation to a foreign catastrophe, this thesis seeks to explore both the internal and external factors that influenced the timing and the content of Bill C-36.
APA, Harvard, Vancouver, ISO, and other styles
13

Leppington, Kristen Nicole. "Bill C-36 : The Creation of Canada's 2011 Anti-Terrorism Act." Thesis, Université Laval, 2011. http://www.theses.ulaval.ca/2011/28374/28374.pdf.

Full text
Abstract:
Bien que les attentats du 11 septembre 2001 aient pris place aux États-Unis, la réaction du gouvernement canadien a été de proposer la Loi C-36 (la Loi anti-terroriste), une loi qui apporte plusieurs changements au Code criminel canadien et modifie d’autres lois. L´adoption de cette loi s’est faite dans un temps record. Afin de mieux comprendre cette rapidité (du 11 septembre à sa sanction royale en 99 jours) et de mieux cerner la relation avec un événement survenu à l´étranger, ce mémoire cherche à expliquer les facteurs internes et externes qui ont influencé le moment choisi et le contenu de la loi.
Though the terrorist attacks of September 11th, 2001, took place on foreign soil, the Canadian government reacted to this event by proposing Bill C-36 (the Anti-terrorism Act), an omnibus bill outlining multiple changes to the existing Canadian Criminal Code and other acts. With an aim to better understand this anomaly of Canadian public policy in both its record speed (from 9/11 to its Royal Assent in 99 days) and its relation to a foreign catastrophe, this thesis seeks to explore both the internal and external factors that influenced the timing and the content of Bill C-36.
APA, Harvard, Vancouver, ISO, and other styles
14

Cheung, Christopher Zodda Daniel J. "Joint Task Force Olympics : monitoring potential terrorists behavior via deceptive computer means /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Jun%5FCheung.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Farries, Greg, and University of Lethbridge Faculty of Arts and Science. "What voters want, what campaigns provide : examining Internet based campaigns in Canadian federal elections." Thesis, Lethbridge, Alta. : University of Lethbridge, Faculty of Arts and Science, 2005, 2005. http://hdl.handle.net/10133/250.

Full text
Abstract:
This paper examines differences between what voters want from a campaign website and what political parties are actually providing on their campaign websites. A series of focus groups were conducted and the results of those discussions provided insight into what potential voters wanted from a campaign website. Analysis of the Conservative, Liberal, Bloc Quebecois, Green and New Democratic Party campaign websites was then conducted, and the results provided a glimpse at what the political parties were providing during the 2004 federal election campaign. The results of this research show that is a significance imbalance between what the political parties in Canada were providing and what the focus groups mentioned they wanted from a campaign website. The participants wanted more engaging and mobilizing features, while the campaign websites used during the 2004 election lacked these types of features.
vi, 130 leaves ; 29 cm.
APA, Harvard, Vancouver, ISO, and other styles
16

Smith, G. Davidson. "The liberal democratic response to terrorism : a comparative study of the policies of Canada, the United States and the United Kingdom." Thesis, University of Aberdeen, 1986. http://digitool.abdn.ac.uk/R?func=search-advanced-go&find_code1=WSN&request1=AAIU366344.

Full text
Abstract:
The dissertation is a comparative study of the government counter terrorism policies of the liberal democratic nations of Canada, the United States, and the United Kingdom. It includes reference to the threat of terrorism as a modem phenomenon beginning in the period of the 1960s decade. While discussion centres on policies of response, attention is also given to policy measures which have developed as an outcome of those policies. The dissertation is comprised of five chapters. Chapter one is devoted to terrorism as a threat to national and international security and stability. The context describes problems associated with definition of terrorism, motivational aspects, the aims and strategies of terrorists, group infrastructure, and factors and implications of current and future importance. Chapter two is concerned with an examination of general policies of response adopted by the three subject nations. Discussion relates to characteristics of policy, the philosophy of the use of force, policy development, fundamental policies, and the translation of those policies into direct (active) and indirect (passive) measures. Chapter three provides a description of the decision-making and crisis-management machinery peculiar to Canada, the United States, and the United Kingdom in regard to counter terrorism activity. Chapter four reviews a range of resources and capabilities available to those nations for response to the threat of terrorism. Specifically included are factors of policy, experience, infrastructure, law enforcement agencies, the armed forces, legislation, and the role of the media. Chapter five summarizes general comments on strengths and weaknesses of the policies and policy measures presented in the preceding chapters. Many of the salient points are contained in the observations put forward in chapter five, but some judgements must necessarily be left to a reading of individual chapters. In conjunction, chapter two includes a brief commentary on the Cycle of Activity involving the threat of terrorism and the mechanics of governmental reaction to that threat. Acting upon the Cycle is a spectrum of other factors,' termed the Envelope of Influences, which has. a significant effect upon all the components. The Envelope is a combination of such influences as environment, history, culture, precedent, ideas, pressure groups, et al, which must be taken into consideration when assessing policy and policy measures. Judgements of policy and policy measures (taking into account the Envelope) were based upon four principal aspects of governmental performance; 1. Perceptiveness; 2. Capacity to Adapt to New Challenges; 3- Practicality; and, 4* Adherence to Legal, Democratic, and Moral Principles. The context of chapter five, as well as that of chapters two, three, and four, reflects that approach.
APA, Harvard, Vancouver, ISO, and other styles
17

Alati, Daniel. "Domestic counter-terrorism in a global context : a comparison of legal and political structures and cultures in Canada and the United Kingdom's counter-terrorism policy-making." Thesis, University of Oxford, 2014. http://ora.ox.ac.uk/objects/uuid:2a37e08e-8463-4000-9fdc-389072bc5960.

Full text
Abstract:
Although both Canada and the United Kingdom had experienced terrorism prior to the attacks that occurred in the United States on September 11, 2001, Roach has argued that the events of that day ‘produced a horrible natural experiment that allows us to compare how international institutions and different countries responded’. Arguably, the most significant international response post-9/11 was the United Nations Security Council Resolution 1373, which set a 90-day deadline for states to implement measures in accordance with the Resolution. Despite the fact that both Canada and the United Kingdom already had in place extensive provisions to deal with terrorism, both countries responded swiftly and their legislative responses reflect the histories and legal, political and social cultures of each country. This thesis tests the hypothesis that national security remains a bastion of national sovereignty, despite the force of international legal instruments like UN Security Council Resolution 1373 and, as such, the evolution of counter-terrorism policies in different jurisdictions is best analyzed and understood as a product of local institutional structures and cultures. To test this hypothesis, this thesis engages in comparative analyses of legal and political structures and cultures within Canada and the United Kingdom. It analyses variations in the evolution of counter-terrorism policies in the two jurisdictions and explores the domestic reasons for them. In its analysis of security certificates and bail with recognizance/investigative hearings in Canada, and detention without trial, control orders and TPIMs in the UK, this thesis reveals how domestic structures and cultures, including the legal system, the relative stability of government, local human rights culture, and geopolitical relationships all influence how counter-terrorism measures evolve.
APA, Harvard, Vancouver, ISO, and other styles
18

Sayers, Tamara Michelle. "Cyberfeminism in Canada, women, women's organizations, the women's movement and internet technology." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape15/PQDD_0014/MQ31248.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Azriel, Joshua N. "Internet hate speech in the United States and Canada a legal comparison /." [Gainesville, Fla.] : University of Florida, 2006. http://purl.fcla.edu/fcla/etd/UFE0013646.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Patel, Shaista. "Legalizing the racialization of Muslim : an anti-Orientalist discourse analysis of the Anti-terrorism Act of Canada." Thesis, University of British Columbia, 2007. http://hdl.handle.net/2429/31994.

Full text
Abstract:
The central argument in this research is that the knowledges produced through the Antiterrorism Act naturalize the Orientalist construction of male Muslim bodies as threats to the nation, while simultaneously legitimizing the Canadian nation as white. This study disrupts the binary of the security versus civil liberties debates surrounding the dominant discourses about the Anti-terrorism Act. Using race, space and the law as critical tools of analysis, I examine the Orientalist rationalities underpinning the successful mobilization of the Antiterrorism Act as a "juridical discourse" of the Canadian nation. I read for the racialized power in the Act in order to argue that the seemingly neutral language of the Act disguises the way it represents the Orientalist construction of male Muslim bodies as inherently violent, and as a threat to the spaces of the white nation. Within this discussion, I also examine how the Orientalist imagining of Muslim women's bodies has been deployed by the Canadian state to reify the image of Muslim man as 'barbaric' and 'uncivilized'. I situate my analysis of the Act within the broader socio-political history of colonized Canada to argue that the Anti-terrorism Act is part of the historically racist and exclusionary discourses of the nation built on stolen land where mythologies of white supremacy are still rampant as official narratives of the nation.
Education, Faculty of
Curriculum and Pedagogy (EDCP), Department of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
21

Bilimoria, Cyrus M. "Use of computers and the Internet to facilitate export of prefabricated housing from Canada." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/mq64106.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Yuan, Xiaotong 1979. "Copyright protection to musical works in cyberspace." Thesis, McGill University, 2004. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=82675.

Full text
Abstract:
The objective of this thesis is to demonstrate, through analysis of the current Canadian Copyright Act and related cases, how the rapid development of Internet technology has challenged the legal protection of musical works under Canadian copyright legislation and jurisprudence. Canadian government and courts have begun contemplating these issues and attempted to formulate constitutional reform policies and effective measures for Canada. These initiatives related to copyright protection of musical works reflect a sophisticated analysis of each participant involved in music transmission through the Internet and are unique in this way. More flexible business mechanisms may contribute towards the achievement of a delicate balance between all the parties involved under the copyright umbrella.
APA, Harvard, Vancouver, ISO, and other styles
23

Avigdor, Allan. "Exploring the use of e-government services in social service settings." Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=81250.

Full text
Abstract:
E-government services are rapidly becoming a permanent part of the governing process the world over. These services involve the use of the latest information and communication technologies to facilitate and enhance access to government information and services. E-government represents an entirely new mode of service delivery that promises some of the most important advances in the area of government accessibility since the advent of the modern welfare state. These resources have a number of unexplored social service applications that are examined in this study. E-government principles and practices are reviewed at the local and international levels, with particular attention paid to the Government of Canada's e-government initiative, known as Government On-Line (GOL). Seven specific e-government applications that can benefit social workers and clients are identified and discussed. The results of eight interviews with directors of local agencies regarding the future of e-government in social services are reported and examined. Specific recommendations and directions for future research are provided.
APA, Harvard, Vancouver, ISO, and other styles
24

Karim, Karim H. (Karim Haiderali) 1956. "Constructions of the Islamic peril in English-language Canadian print media : discourses on power and violence." Thesis, McGill University, 1996. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=42064.

Full text
Abstract:
This is an inquiry into cultural constructions of "Islamic violence" in dominant Northern discourses. Mainstream Canadian journalism's participation in these discourses is analyzed within the context of its cultural and structural integration into global media networks. Media materials are scrutinized using critical discourse, dramatistic, and ritual analysis methodologies. The thesis follows Hamid Mowlana's suggestion that inquiries into international communication flows should move beyond traditional paradigms of inter-national relations (in which nation-states are the primary objects of study) to consider intra- and transnational participants as well.
Borrowing from Jacques Ellul, this study examines the importance of myth as a fundamental basis of communication. However, unlike Ellul, it also explores alternatives to the operations of dominant communication structures. Edward Said's critique of Orientalism informs the analysis of Northern portrayals of Muslim societies; but the dissertation attempts to avoid overstating the Orientalist discourses' hegemony by proposing a model of competition among dominant, oppositional and alternative discourses on "Islam."
Mainstream media's adherence to dominant technological myths and their general reticence about the structural and direct violence of elite states are examined. Distinct similarities are found between the utopic orientations and technical operations of dominant Northern and Muslim discourses, as well as in Jewish, Christian and Muslim conceptions of holy/just war. The proliferation of contemporary Northern images about "Islam" are traced historically to four primary stereotypes about Muslims.
Examinations of the supposedly objective and secularist media reportage on terrorism show differences in portrayal according to the perpetrators' religions. Analyses of the coverage of wars involving peoples of Muslim backgrounds in the Middle East, Bosnia-Herzegovina, and the former USSR demonstrate the tendency of dominant journalistic scripts to attribute diverse political, economic and territorial conflicts to a monolithic "lslam" The dissertation traces how the global media narrative's transformation of Saddam Hussein from an ally of the West to a demonic despot was aided by according him "Islamic" characteristics. It also looks at the emergence of "Islam" as a post-Cold War Other. Lastly, proposals made by scholars and journalists for enhancing inter-cultural communication between Northern and Muslim societies are considered.
APA, Harvard, Vancouver, ISO, and other styles
25

Brown, Peter. ""They're flooding the internet" : a cross-national analysis of newspaper representations of the 'internet predator' in Australia, Canada, the UK and USA." Thesis, Cardiff University, 2013. http://orca.cf.ac.uk/46894/.

Full text
Abstract:
Although online child sexual abuse is an issue of international concern, little is known about the news media’s role in its construction. In this study I draw upon a corpus of 6,077 newspaper articles from Australia, Canada, the UK and USA – four member countries of the Virtual Global Taskforce set up in 2003 to combat online child abuse. Through a quantitative content analysis, I trace the trajectory of news coverage in each country and identify the news hooks and key events through which the issue has been framed during peak periods. This is complemented by a critical discourse analysis, through which I interrogate discourses around spatiality, particularly those pertaining to the paedophile’s migration from the ‘real world’ to ‘cyberspace’, and from the ‘outside’ into the heart of ‘the home’. The quantitative element of my study shows that: (1) although coverage began to emerge during the mid-1990s, it only began to accelerate after the turn of the century; (2) online abuse has been defined through episodic coverage, often around high-profile ‘grooming’ cases; (3) coverage in each country has largely followed a unique, nationally-specific narrative (shaped by its own socio-political context); and (4) although coverage has gone through periods of peaks and troughs, there are few signs that online abuse is slipping off the news agenda. In my qualitative analysis, I present evidence that: (1) claims-makers have drawn upon existing understandings of, and fears about, parks and playgrounds to construct aspects of the internet as online ‘paedophile places’; (2) a discourse of temporal proximity has been adopted to depict children as being ‘seconds’ or ‘clicks’ away from an internet predator; (3) this discourse of temporal proximity has been used to localise a global problem and depict the internet predator as being even closer to children than the traditional figure of ‘the paedophile’; and (4) the internet has been framed as bringing fundamental changes to how sexual threats to children should be understood. Through this analysis I argue that these discourses have been used to legitimise tighter regulation of children’s lives and, although specific to the internet, they perpetuate myths about paedophiles, childhood, the family and home that limit thinking about child sexual abuse on a much broader scale.
APA, Harvard, Vancouver, ISO, and other styles
26

Beylier, Pierre Alexandre. "La frontière Canada/Etats-Unis depuis le 11 septembre 2001 : mutations et continuité." Thesis, Paris 3, 2013. http://www.theses.fr/2013PA030142.

Full text
Abstract:
Cette thèse étudie les transformations que la frontière américano-canadienne a connues dans le sillage des attentats du 11 septembre 2001. A travers une approche à la fois géographique, historique, politique et économique, elle s’intéresse au rôle qui a été attribué à la ligne internationale dans le cadre de la Guerre contre le terrorisme.Pour sécuriser son territoire, les Etats-Unis ont non seulement utilisé leurs frontières comme un levier central pour leur politique nationale, mais ils ont également défini un concept d’un nouveau genre, celui de « frontière intelligente ». Souhaitant trouver un équilibre entre deux objectifs présentés comme mutuellement non-exclusifs, la sécurité et la facilitation, Washington joue avec la binarité traditionnelle ouverture/fermeture pour plonger ses frontières, et notamment la frontière américano-canadienne dans un nouveau paradigme. Dès lors, nous voyons comment ce processus a lieu le long du front nord et comment celle que l’on nomme, de façon métonymique, le 49ème parallèle est passée d’une des plus longues frontières démilitarisées au monde, ouverte et défonctionnalisée, à une barrière hautement sécurisée. Nous explorons ainsi le rôle de pivot attribué aux attentats sur le World Trade Center et le Pentagone pour la frontière et ce que ce changement de paradigme signifie pour la relation américano-canadienne.Cette étude analyse donc le contenu de cette « frontière intelligente » tout en jaugeant son degré de succès pour ses deux versants – sécurité et facilitation. Il s’attache également à mettre en lumière les forces, parfois entremêlées, qui sous-tendent cette institution multiforme qu’est la frontière. Entre discours, désinformation, manipulation et desseins cachés, la frontière est au carrefour de différentes stratégies qui parasitent parfois notre perception de la situation
This thesis aims at studying the transformations that the Canada/US border has undergone in the wake of 9/11. Using a multiple analytical lens – at once geographical, historical, political and economic – it deals with the role that the international boundary has played in the War against Terror.In order to secure its homeland, not only did the United States used its borders as a central tool for its policy but it also defined a new kind of concept, that of “smart borders”. Looking for a balance between two goals that are presented as mutually non-exclusive – security and facilitation – Washington plays with the traditional binary functioning of borders – open borders vs. close borders – to impose a new paradigm in North America, and more particularly along the Canada/US border. The purpose of this work is to look into this process to see how the metaphorically called 49th parallel has moved on from being the longest undefended border in the world, an open and defunctionnalized border, to a highly securitized barrier. Thus, it explores the supposedly pivotal role attributed to the terrorist attacks on the World Trade Center and the Pentagon as well as the meaning of this shift in paradigm for the Canada/US relationship.To do so, this thesis analyzes what this “smart border” consists in and assesses the success of its double engine – security and facilitation. It also endeavors to shed a light on the forces that underlie this multifaceted institution that the border is. Amidst rhetoric, disinformation, hidden agendas, the border is at the crossroads of different strategies that may sometimes blur our perception of the situation
APA, Harvard, Vancouver, ISO, and other styles
27

Holmström, Conny. "Terroristorganisationer på Internet, en möjlighet eller realitet? : en undersökning om vilka möjligheter informationsteknologin ger terroristorganisationer." Thesis, Försvarshögskolan, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-1925.

Full text
Abstract:
Denna uppsats avser lämna ett bidrag till en ökad kunskap om vilka terroristorganisationer som finns publicerade på Internet, vilka syften organisationerna har med denna publicering samt att se om det finns några paralleller mellan olika kategorier av terroristorganisationer.
The revolution in information technology that took place in the middle of the 1990’s has offered new possibilities for terrorist organisations in terms of consolidation and action. In this essay these possibilities are limited to the use of Internet, and defined as active use (logical attacks) and passive use (consolidation).This essay focuses on the passive use of the Internet. The attempt is to answer questions on which of the studied organisations that make use of the Internet, the purposes they have for publicising themselves and to examine if there are any similarities between the different categories use of the Internet.The essay shows different definitions of “terrorism” and gives an example on how to divide terrorist organisations into different categories.It also gives an overview on the revolution in information technology of the 1990’s and brings to light the possibilities it offers the terrorist organisations.A total of 37 organisations have been studied, and 21 of these have been found on the Internet. The difficulties that the author has met during the search for the organisations on the Internet are described in connection to the general description of the study. In conclusion, the author discusses the results in terms of purpose, infrastructural prerequisites, technical competence, the strength in resources, and need for secrecy. All these varibles affect the organisations use of the Internet as a way of publicising.
Avdelning: ALB - Slutet Mag 3 C-upps.Hylla: Upps. ChP 99-01
APA, Harvard, Vancouver, ISO, and other styles
28

Carter, Sabrena Michelle. "The day we all became Hokies an exploratory uses and gratifications study of Facebook use after the Virgina Tech shootings /." Lynchburg, Va. : Liberty University, 2008. http://digitalcommons.liberty.edu.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Grove, Alan J. "Drawing a Line in the Snow: the Geopolitical Place-making of Canadian Security Policy." University of Cincinnati / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1243349150.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Heni, Amira. "Internet et la fidélisation de la clientèle bancaire : étude du passage de la relation B2C de personne à personne à la relation B2C virtuelle." Thesis, Université Laval, 2007. http://www.theses.ulaval.ca/2007/25020/25020.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Ryan, Jo-Anne. "Exploring the investor relations website : the impact of internet reporting on institutions." Thesis, University of Birmingham, 2011. http://etheses.bham.ac.uk//id/eprint/1530/.

Full text
Abstract:
This thesis employed a case study approach to explore the rules and routines that have evolved within the Investor Relations (IR) functions of a large Canadian public company (ABC) from the inception of their IR website in 1997 to 2010. Utilizing weblog analysis, institutional theory (specifically, the Burns and Scapens (2000) institutional framework), and a detailed case study analysis of the interviews undertaken, the findings of this study illustrate that rules and routines of operation within an IR web team are likely to be dynamic and will evolve at a quick pace if the business is actively seeking to employ best practice in its IR website strategy. The results also show how both internal and various external influences are likely to play key roles in altering the rules and routines of IR websites operation. Within the case study presented, five distinct stages of institutionalization were recognized. The analysis framework used provided an effective tool to analyze the internal aspects of these stages. However, it was also enlarged to incorporate specific external influences to show how they play a parallel part in affecting activity in this domain specifically. The findings further show that there is minimal normative isomorphism occurring in this domain. It is proposed that the lack of formalized education in the IR website management and operation area may be playing a key role in constraining the further development of this. Further, the thesis concludes by highlighting the critical need for senior management ‘buy-in’, identification and development of a suitable lead for this activity within the company, and the right context in which they can be allowed freedom to innovate and explore best practices applicable to the online IR function, where-ever they may be found. These features must then be balanced with the overall strategic placement of the IR website as a best practice driver, or follower, to ensure a successful, strategically aligned operation in this domain. While these issues individually have been found to be important in other rapidly innovating business domains, this thesis illustrates and explores their need for the first time, in the IR field in the context of a recognized leader in its field.
APA, Harvard, Vancouver, ISO, and other styles
32

Beauvais, Geneviève. "Imaginaires migratoires et médias virtuels : le cas des Argentins au Canada et au Québec." Master's thesis, Université Laval, 2015. http://hdl.handle.net/20.500.11794/26200.

Full text
Abstract:
Ce mémoire s'intéresse aux imaginaires migratoires des Argentins qui souhaitent émigrer au Canada et au Québec par le biais du programme des travailleurs qualifiés, dans un contexte de multiplication des sources d'information en ligne. L'objectif est de déterminer le rôle des nouvelles technologies de l'information dans la construction de ces imaginaires. Dans cette optique, on a d'abord réalisé une analyse comparative du contenu de sources internet officielles et informelles offrant des renseignements aux candidats à l'immigration. Des entretiens réalisés avec de futurs migrants argentins permettent de constater que si elles constituent des supports d'information importants dans le processus pré-migratoire, ces ressources virtuelles ne jouent pas un rôle actif dans la construction des imaginaires du Canada. Ces derniers se construisent plutôt à partir des facteurs d'attraction et d'expulsion qui sous-tendent la décision d'émigrer et d'une comparaison dynamique et constante des caractéristiques, réelles et imaginées, du pays d'origine et du pays d'accueil.
APA, Harvard, Vancouver, ISO, and other styles
33

Ubayasiri, Kasun. "Media, Tamil Tigers, terrorism and the internet: The cyber interface between the Liberation Tigers of Tamil Eelam (LTTE) and mainstream media." Thesis, Queensland University of Technology, 2008.

Find full text
Abstract:
Sri Lanka is the theatre of a three decade-long armed ethnic conflict between the predominantly Sinhala government and the Liberation Tigers of Tamil Eel am - the militant group fighting for a separate state for the island's Tamil speaking people. This contemporary conflict is rooted in a perceived historical crisis between Tamil and Sinhala ethnic groups which spans more than two millennia. This study examines the perceived historical crisis between the two lingua ethnic nations from a post­modern perspective, to better understand the contemporary interpretation which has led to a militant and at times terrorist conflict. It also focuses on the fusion of contemporary and historical narratives used by the LTTE to further their strategic goals. The study defines the notion of terrorism as a politico-military strategy stripped of its populist pejorative interpretations, to understand the strategy of terrorism as part of a communication process designed to terrorise a target audience and demand its political compliance by harnessing terror as a psychological weapon. The study further discusses the role of traditional mainstream media in this communication process and the result of state imposed media censorships set in place to prevent terrorist news voices from reaching the media consumer. This thesis argues media censorship creates a news media vacuum ideally suited to terrorist-backed alternative cyber media, such as Tamilnet, which are resistant to state imposed media censorship. This results in the alternative media being the only significant source of news from the conflict zone, creating a media monopoly which allows terrorist narratives and politically loaded reports to filter into mainstream media copy. Based on an analysis of Tamilnet, this study outlines the role of terrorist-backed cyber media and its relationship with traditional and contemporary sources of news in the current media landscape.
APA, Harvard, Vancouver, ISO, and other styles
34

Le, Cam Florence. "L'identité du groupe des journalistes du Québec au défi d'Internet." Phd thesis, Université Rennes 1, 2005. http://tel.archives-ouvertes.fr/tel-00011013.

Full text
Abstract:
L'introduction d'Internet dans le milieu journalistique, au Québec comme ailleurs, met au défi le groupe des journalistes professionnels. En questionnant les termes de journaliste et de journalisme et en heurtant certaines représentations, elle touche à l'identité du groupe, à la production historique de sa spécificité. Tenter de dessiner cette identité du groupe confrontée à un changement spécifique implique une démarche de recherche inductive, qualitative et itérative réalisée sur plusieurs fronts : un approfondissement de l'histoire du journalisme québécois au travers de l'analyse documentaire de textes émanant des instances professionnelles et syndicales, l'étude des impacts de la nouvelle technologie sur le milieu journalistique et notamment l'observation et l'analyse des sites et des pratiques professionnelles développées par les ‘journalistes en ligne' sur les sites de plusieurs médias traditionnels, et finalement l'étude spécifique de certaines pratiques de publication en ligne avec une observation participante menée sur un weblog personnel. Cette démarche articulée avec la réflexion théorique sur l'identité aboutit à dresser un portrait de la forme identitaire du groupe des journalistes du Québec qui se révèle avant tout comme une production discursive spécifique, fondée sur différentes stratégies discursives. Celles-ci renvoient principalement à la participation du groupe à la nation, à la filière corporatiste, à la dualité institutionnelle et l'auto-organisation et sont interpellées et parfois remises en cause par les acteurs ‘non-professionnels' de la diffusion d'information en ligne. L'enjeu de cette recherche consiste à dévoiler les mécanismes de la permanence, les processus qui ont fait et font que le groupe des journalistes s'est constitué et perdure, qu'il continue de faire face aux changements, voire même aux crises, même si sa composition, son territoire et ses stratégies changent.
APA, Harvard, Vancouver, ISO, and other styles
35

Cormier, Eric. "L'industrie de l'omniscience : le profilage comportemental et le droit à la vie privée au Canada." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/20680.

Full text
Abstract:
La collecte et l’agrégation des renseignements personnels par des organisations du secteur privé représentent une menace grandissante pour la vie privée des citoyens canadiens. Bien que les pratiques de profilage à des fins commerciales soient en pleine émergence depuis l’arrivée d’Internet, le Canada dispose tout de même de mesures législatives servant à limiter leur impact sur la vie privée des individus. Cependant, certaines organisations parviennent néanmoins à contourner ces mesures législatives par l’entremise d’ententes contractuelles auxquelles adhèrent les utilisateurs d’Internet. Il est donc indispensable que les lois en matière de protection des renseignements personnels soient modernisées afin de minimiser les impacts du profilage en ligne. À cet effet, certaines leçons peuvent être tirées de l’approche européenne en matière de protection des renseignements personnels collectés à partir d’Internet et d’autres technologies d’information et de communication.
APA, Harvard, Vancouver, ISO, and other styles
36

Torok, Robyn. "Discourses of terrorism: The role of Internet technologies (social media and online propaganda) on Islamic radicalisation, extremism and recruitment post 9/11." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2016. https://ro.ecu.edu.au/theses/1938.

Full text
Abstract:
The threat of Islamic terrorism has become the biggest threat to Australian National Security. Since 9/11 and the subsequent war on terror, the threat of terrorism has not subsided. Significant parts of this threat are the online discourses of radicalisation perpetuated throughout social media. Literature reviewed included main discursive influences as well as a number of useful theoretical frameworks for later analysis. This thesis used a longitudinal online ethnographic approach coupled with Grounded Theory to examine the discourses and processes involved in radicalisation. The global context for this study was significant and hence has been outlined. Three overarching meta narratives were found: Narratives of grievance, narratives of jihad and narratives of martyrdom. Another important finding was that these narratives were complemented by a significant number of visual images that embedded and conveyed slightly different, yet complementary discourses. In addition, several case studies were also undertaken looking at the discourses and process of recruitment. A case study on the researcher’s insights was also included covering recruiting strategies of the newly formed Islamic State terrorist group. A number of analytical frameworks were applied to the data with the most notable being the Psychiatric Power and the notion of an online institution in which power structures are embedded. A number of radicalisation models are examined in relation to the data and a new model is developed termed: Institutionalised Moral Reframing, which is built on the foundational notions of Psychiatric Power. Finally, implications for counter radicalisation policies are discussed with the need to broaden the focus to better deal with the threats posed by online social media.
APA, Harvard, Vancouver, ISO, and other styles
37

Oliver, Hazel Dawn. "Why information privacy and the employment relationship don't mix, workplace e-mail and Internet monitoring in the United Kingdom and Canada." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp05/MQ63088.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Herail, Leslie. "Le traitement juridique des propos haineux sur les plateformes numériques de partage de contenus." Master's thesis, Université Laval, 2019. http://hdl.handle.net/20.500.11794/38196.

Full text
Abstract:
L’internet était à l’origine un réseau bien différent de celui qui existe aujourd’hui ; né du réseau Arpanet, qui avait été créé dans un but militaire afin de résister à une attaque nucléaire, il a su s’adapter à l’évolution des sociétés. Désormais, l’internet est devenu un réseau de communication si puissant que des problématiques nouvelles voient sans cesse le jour, notamment avec l’avènement des plateforme numériques telles que les réseaux sociaux. Parmi ces problématiques, celle du traitement juridique des contenus haineux sur l’internet est de plus en plus mise en avant. La notion de propos haineux est une notion floue qui n’est pas toujours bien comprise, ce qui donne parfois lieu à l’émergence de différents problèmes. Un des soucis majeurs est qu’il est difficile de déterminer avec précision ce qu’englobe le terme de contenu haineux. Par conséquent, il sera tout aussi fastidieux d’affirmer ou non que des propos partagés en ligne sont condamnables. En effet, chaque parole incriminée devra être mise en balance avec le principe de la liberté d’expression. Par ailleurs, la responsabilité des auteurs des propos diffusés n’est plus la seule à être pointée du doigt. Cette dernière a fait l’objet de nombreux travaux, mais désormais, beaucoup avancent que les différents acteurs du numérique, tels que les intermédiaires techniques, devraient, eux aussi, avoir des obligations quant à la suppression de ces discours de haine. Étudier le traitement juridique des propos haineux sur l’internet permet de mettre en avant des problématiques actuelles liées au développement des nouvelles technologies. Il faut cependant garder à l’esprit que l’internet n’est pas une zone de non-droit. Ainsi, ce mémoire a pour objet de démontrer comment la diffusion des propos haineux en ligne est appréhendée par le droit, tant canadien que français. Il s’agira de déterminer les ressemblances et les différences entre ces deux systèmes nationaux, afin de mettre en lumière des solutions pertinentes permettant de combler les éventuelles lacunes.
APA, Harvard, Vancouver, ISO, and other styles
39

Vidanage, Harinda Ranura. "Exploring the impact of online politics on political agents and political strategies in the Sri Lankan Tamil diaspora." Thesis, University of Edinburgh, 2009. http://hdl.handle.net/1842/5949.

Full text
Abstract:
The thesis explores the role and impact of the internet on Sri Lankan Tamil diaspora political activism, focusing on both the experiences of political activists and on an analysis of web content related to diaspora activism. The central argument of the thesis is based around the relationship between political agents and cyberspace. The thesis argues that the political strategies and tactics adopted in the Tamil diasporan political sphere have changed with an increased dependence on the internet changing with it the politics and lives of individual activists. Cyberspace is presented as a site of power struggle with power as both an objective and source in micro-political struggles. The thesis also highlights the double sense of space attributed to cyberspace, both as a space facilitating political activism and as a qualitatively new space for politics. It traces the manifestation of violence in cyberspace based on its extensive reach and the collateral damage it can cause in political conflicts. Also the thesis argues that these intense web engagements for domination and resistance within the diaspora communities cause the emergence of new political priorities in Tamil diaspora politics. These do not parallel political developments in the conflict back in Sri Lanka. The thesis is based on research conducted from 2005 to 2008 during heightened rivalries between supporters of the LTTE (Liberation Tigers of Tamil Eelam) and dissident Tamil diaspora political activists which involved the extensive use of cyberspace for political purposes. The empirical research consisted of an integrated framework of online and offline research. The offline research was based on eight months of fieldwork in London including interviews with Tamil diaspora political activists across the spectrum from pro-LTTE to anti-LTTE dissidents. The online research was based on the technique of Web Sphere Analysis, which enables a framing of web content into a coherent unit of analysis.
APA, Harvard, Vancouver, ISO, and other styles
40

VanderWallen, Lisa. "Deconstructing Representations of "The Other" in the Online Media of Canadian Based Non-Governmental Organizations." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/23109.

Full text
Abstract:
Deconstructing visual representations of the Self and Other in the online media of NGOs, this thesis is grounded in postdevelopment and postcolonial theories. Visual culture and emerging digital technologies are crucial to identity construction, and NGOs are a major purveyor of representations of those in the developing world. Evaluating image use by Canadian based NGOs, this thesis unites theoretical concepts of visual representation with concrete photographic depictions and structured content analysis to investigate multiple and changing development discourses. Considerable literature has focused on the notion of the Self and Other dichotomy especially as it relates to international relations. Positioned in an era of polycentric global governance, NGOs are professionalized groups whose power is often obscured by charitable discourses. Despite the humanitarian and altruistic aims of the NGOs selected for the study, data demonstrates the implications of their image use for development discourse and practices.
APA, Harvard, Vancouver, ISO, and other styles
41

Chatur, Noorin. "Political outcomes of digital conversations : case study of the Facebook group "Canadians against proroguing parliament"." Thesis, Lethbridge, Alta. : University of Lethbridge, Dept. of Political Science, 2011, 2011. http://hdl.handle.net/10133/3100.

Full text
Abstract:
Since the emergence of the Internet, scholars have had mixed opinions regarding its role in influencing levels of political participation. Two frameworks, the mobilization and the reinforcement theses, were created from these opposing views. The introduction of social networking websites (such as Facebook) offers new platforms with which to test these opposing theories on. This study investigates the Facebook group ―Canadian‘s against Proroguing Parliament,‖ to determine: 1) what the members' motivations were for participating in the group, 2) whether the group attracted formerly marginalized voices to participate on the group, or simply reinforced those who were already active in the political process, and 3) whether the participation of members on the group translated into offline or real world political participation. The findings suggest that the group‘s members had a variety of reasons for joining the group. As well, the findings suggest that the group both mobilized reinforced its participants. Finally, the data indicates that in some instances, the group‘s members translated their online participation into real world political activity.
171 leaves ; 29 cm
APA, Harvard, Vancouver, ISO, and other styles
42

Dupré, Florence. "La fabrique des parentés : enjeux électifs, pratiques relationnelles et productions symboliques chez les Inuit des îles Belcher (Nunavut, Arctique canadien)." Thesis, Lyon 2, 2014. http://www.theses.fr/2014LYO20020.

Full text
Abstract:
Cette thèse est une contribution à l’étude des relations de parenté inuit. Elle présente une ethnographie et une analyse des pratiques relationnelles contemporaines dans le village arctique de Sanikiluaq (Nunavut). Elle vise plus particulièrement à comprendre le processus de production, de pratique et d’interruption du lien de parenté dans une communauté travaillée par le contexte sociohistorique des sociétés inuit canadiennes du début du 21e siècle ; elle met ainsi en regard le contexte historique de l’archipel des îles Belcher, les enjeux électifs travaillant les pratiques relationnelles contemporaines et les identités relationnelles de leurs acteurs pour accéder à une compréhension du sens de la parenté inuit refusant de postuler la flexibilité de l’organisation sociale comme une réponse culturelle satisfaisante à la question de la nature de la parenté.Sur le fond du contexte historique ayant déterminé la formation récente du village de Sanikiluaq, la première partie (chapitres 2 et 3) retrace les évolutions des pratiques relationnelles au cours du 20e siècle et s’attache à identifier les principaux enjeux déterminant aujourd’hui l’élection parentale. La deuxième partie (chapitres 4 et 5) est consacrée à une ethnographie et à une analyse de la fabrique des parentés dans neuf fratries qikirtamiut (i.e. des îles Belcher) contemporaines ; elle travaille le rapport entre les enjeux électifs contemporains, la production du lien de parenté et le vécu effectif de la relation autour des trois registres d’appartenance parentale structurant les pratiques et les théories culturelles concernées : la généalogie, l’identité et le quotidien. La troisième et dernière partie (chapitres 6 et 7) poursuit l’analyse dans des lieux et des milieux mobilisant l’image de la personne et de la relation pour produire, dire et pratiquer le lien. Elle aborde les pratiques relationnelles sur les sites Internet de réseaux sociaux, l’utilisation des photographies de famille, ainsi que plusieurs catégories de marquage qui, du tatouage au dessin, participent de pratiques d’identification impliquant l’identité ontologique à la base de la relation de parenté. La thèse propose ainsi une approche de la parenté inuit articulant processus électifs, pratiques relationnelles et productions symboliques dans le contexte arctique du début du 21e siècle
This doctoral dissertation is a contribution to the study of Inuit kinship. It presents an ethnography and analysis of contemporary kinship practices in the Arctic village of Sanikiluaq (Nunavut). The specific aim is to understand how kinship ties are produced, practised, and severed in a community that historically and socially has much in common with other Canadian Inuit societies of the early 21st century. The text thus covers the history of the Belcher Islands, the strategies currently used to establish kinship ties, and the kin identities of the people involved. The aim, here, is to understand the meaning of Inuit kinship without having to fall back on the flexibility of social organization to provide a satisfactory answer.After describing the historical backdrop to the recent formation of the village of Sanikiluaq, the first part (chapters 2 and 3) retraces the development of kinship practices during the 20th century and identifies the main strategies behind present-day kinship choices, e.g., choosing a mate, a godmother, a godfather, or a namesake for a newborn child. The second part (chapters 4 and 5) provides an ethnography and analysis of kinship choices in nine groups of siblings who are contemporary Qikirtamiut (i.e., Inuit of the Belcher Islands). It addresses how kinship strategies, production of kinship ties, and the actual kinship experience interrelate in terms of three factors that structure the practices and cultural theories under discussion: genealogy, identity, and daily life. The third and last part (chapters 6 and 7) pursues this analysis in places and settings where images of oneself and one’s kin group are used as means to produce, convey, and practise kinship. Topics include kinship practices on social networking websites, use of family photos, and several categories of tagging, which range from tattooing to drawing, that help people to identify themselves to others via the ontological identity that underlies their kinship ties. In sum, this dissertation describes Inuit kinship by showing how strategy processes, day-to-day practices, and forms of symbolic production relate to each other in the Arctic of the early 21st century
APA, Harvard, Vancouver, ISO, and other styles
43

Daniels, Minji. "Online Islamic organizations and measuring Web effectiveness." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FDaniels.pdf.

Full text
Abstract:
Thesis (M.S. in Systems Engineering)--Naval Postgraduate School, Dec. 2004.
Thesis Advisor(s): James Ehlert, Raymond Buettner. Includes bibliographical references (p. 55-58). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
44

Dauverchain, Mathieu. "Le consentement dans le contexte du traitement de données personnelles sur les sites de réseautage social." Master's thesis, Université Laval, 2018. http://hdl.handle.net/20.500.11794/29484.

Full text
Abstract:
Vous souvenez-vous de la dernière fois où vous avez lu les conditions d’utilisations d’un site web? Statistiquement c’est fort peu probable. Pourquoi? Parce qu’une majorité de gens ne lisent pas les conditions d’utilisation des sites et des politiques de confidentialité. Cette étude se propose d’analyser le cadre juridique de ce phénomène. Dès lors que l’on utilise un site de réseautage social, nos données personnelles sont captées par le site. Nous ne le savons peut-être pas mais nous avons consenti à ce traitement. La notion de consentement fait l’objet d’une définition rigoureuse dans les lois françaises et canadiennes de protections des données personnelles. Cette étude va suivre la mise en oeuvre des règles de consentement dans le contexte des sites de réseautage. Cette analyse permettra de déterminer si les informations fournies par les sites de réseautage social sont conformes aux exigences de la loi. En cas de défaillance des sites de réseautage, des solutions plus adéquates seront présentées.
APA, Harvard, Vancouver, ISO, and other styles
45

Gramaccia, Julie. "La propagande terroriste : étude du récit propagandiste numérique de l'organisation Daech." Thesis, Bordeaux 3, 2020. http://www.theses.fr/2020BOR30036.

Full text
Abstract:
Profitant de l’opportunité offerte par Internet de s’adresser directement à ses publics sans passer par le « goulot d’étranglement » du système du gatekeeping traditionnel, l’organisation terroriste Daech a pu construire un discours polarisant, capable de s’adresser aussi bien à l’individu qu’à la collectivité, à ses adeptes qu’à ses ennemis. Ce contexte particulier constitue la problématique générale de cette recherche : avant les médias numériques, les organisations terroristes dépendaient des médias traditionnels pour se faire connaître auprès du public et ne possédaient qu’une marge de manœuvre limitée pour parler d’elles-mêmes. En contournant le système du gatekeeping traditionnel, Daech a été capable de construire un récit propagandiste djihadiste particulièrement efficace. Non seulement cette propagande aura dépassé les frontières étatiques et culturelles, mais elle aura également participé à la radicalisation de milliers d’individus qui, depuis 2014, ont rallié les rangs de Daech. Ce travail souhaite participer à la compréhension de l’émergence de la propagande terroriste de l’organisation djihadiste Daech par les médias numériques dans une perspective narrative et énonciative. Dans cette perspective, nous avons formulé les questions de recherche suivante : Comment est construit le récit propagandiste de Daech dans les médias numériques ? Quelles en sont les caractéristiques énonciatives et narratives ? Afin de répondre à ces interrogations, nous avons mobilisé une méthodologie d'analyse du discours issue d’une approche sémiotique, l’étude de la narrativité selon les propositions de Greimas et de Courtés. Cette recherche a permis de mettre en exergue les fondements narratifs de cette propagande numérique. Le discours de Daech constitue une expérience numérique unique à ce jour : ces propagandistes ont mobilisé tous les moyens possibles pour construire un discours le plus légitime possible, empruntant pour ce faire aussi bien à une liturgie extrémiste de l’Islam qu’aux genres médiatiques et culturels occidentaux
Taking advantage of the opportunity offered by the Internet to address its audiences directly without going through the "bottleneck" of the traditional gatekeeping system, the terrorist organization Daech (ISIS) has been able to construct a polarizing discourse, capable of addressing the individual as well as the collective, its followers as well as its enemies. This particular context constitutes the general problem of this research: before digital media, terrorist organizations depended on traditional media to make themselves known to the public and had limited room for manoeuvre to speak for themselves. By bypassing the traditional gatekeeping system, Daech was able to construct a particularly effective jihadist propaganda narrative. Not only has this propaganda transcended state and cultural boundaries, but it has also contributed to the radicalization of thousands of individuals who, since 2014, have joined Daech's ranks. This work aims to contribute to the understanding of the emergence of the terrorist propaganda of the jihadist organization Daech through digital media in a narrative and enunciative perspective. In this perspective, we have formulated the following research questions: How is Daech's propaganda narrative constructed in the digital media? What are its enunciative and narrative characteristics? In order to answer these questions, we have mobilized a methodology of discourse analysis based on a semiotic approach, the study of narrativity according to the proposals of Greimas and Courtés. This research has allowed us to highlight the narrative foundations of this digital propaganda. Daech's discourse constitutes a unique digital experience to this day: these propagandists have mobilized all possible means to construct a discourse that is as legitimate as possible, borrowing for this purpose both from an extremist liturgy of Islam and from Western media and cultural genres
APA, Harvard, Vancouver, ISO, and other styles
46

Duaso, Calés Rosario. "Principe de finalité, protection des renseignements personnels et secteur public : étude sur la gouvernance des structures en réseau." Thèse, Paris 2, 2011. http://hdl.handle.net/1866/12714.

Full text
Abstract:
Thèse réalisée en cotutelle avec l'Université de Montréal et l'Université Panthéon-Assas Paris II
La question de la protection des renseignements personnels présente des enjeux majeurs dans le contexte des réseaux. Les premières lois en la matière au Canada et en Europe avaient pour base une série de principes qui sont encore aujourd’hui d’actualité. Toutefois, l’arrivée d’Internet et des structures en réseau permettant l’échange d’un nombre infini d’informations entre organismes et personnes ont changé la donne et induisent de nouveaux risques informationnels. Le principe de finalité, pierre angulaire des systèmes de protection des renseignements personnels, postule le caractère adéquat, pertinent et non excessif des informations collectées par rapport à l’objet du traitement et exige qu’elles soient uniquement utilisées à des fins compatibles avec la finalité initiale. Nous retracerons l’historique de ce principe et analyserons la manière dont la doctrine, la jurisprudence et les décisions du CPVPC comme de la CNIL ont contribué à délimiter ses contours. Nous étudierons comment ce principe se manifeste dans la structure en réseau de l’administration électronique ou du gouvernement électronique et nous relèverons les nouveautés majeures que présente l’État en réseau par rapport au modèle d’État en silo, ainsi que la nécessité d’une gouvernance adaptée à cette structure. Nous examinerons également la présence de standards juridiques et de notions à contenus variable dans le domaine de la protection des renseignements personnels et nous tenterons de montrer comment la finalité, en tant que principe ou standard, a les capacités de s’adapter aux exigences de proportionnalité, d’ajustement et de mutation continuelle qui sont aujourd’hui au cœur des défis de la gouvernance des réseaux. Finalement, il sera question de présenter quelques pistes pour l’adoption de mécanismes d’adaptation « réseautique » pour la protection des renseignements personnels et de montrer dans quelle mesure ce droit, capable de créer un cadre de protection adéquat, est également un « droit en réseau » qui possède tous les attributs du « droit post-moderne », attributs qui vont rendre possible une adaptation propre à protéger effectivement les renseignements personnels dans les structures, toujours changeantes, où circulent aujourd’hui les informations.
Personal data protection poses significant challenges in the context of networks. The first laws on this matter both in Canada and in Europe were based on a series of principles that remain valid today. Nevertheless, Internet and the development of network-based structures that enable infinite exchange of information between institutions and individuals are changing the priorities and, at the same time, present new risks related to data protection. The purpose principle, which is the personal data protection systems cornerstone, stresses the relevance and adequate yet not excessive nature of the collected information vis à vis the objective of data collection. The purpose principle also requires that the information shall not further be processed in a way incompatible with the initial purpose. We will describe the origins and evolution of this principle, as well as its present relevance and scope analysing the doctrine, jurisprudence and decisions of the Office of the Privacy Commissioner in Canada and of the Commission nationale de l’informatique et des libertés (CNIL) in France. We will also examine how this principle is reflected in the network structure of the digital administration and of the electronic government. We will also underline the differences between a network-based State and a « silo-based » State, each needing its structure of governance. Within the context of personal data protection, we will explore the presence of legal standards and of concepts with a changing nature. An effort will be made to highlight how purpose, be it as a principle or as a standard, has the capacity to adapt to the requirements of the core principles of the current network governance, such as proportionality, adjustment and continuous mutation. Finally, the objective is to reflect on some personal data protection network adaptation mechanisms, and to demonstrate how personal data protection can work in a network that includes all « post-modern law » elements that allow for true adaptation for effective personal data protection within the ever changing structures where data is being exchanged.
APA, Harvard, Vancouver, ISO, and other styles
47

Hogan, Bernard Michael, and n/a. "The Internet as a Research and/or Communication Tool to Support Classroom-Based Instruction: Usage, Value, and Utility for Post-Secondary Students." Griffith University. School of Film, Media and Cultural Studies, 2004. http://www4.gu.edu.au:8080/adt-root/public/adt-QGU20040719.124141.

Full text
Abstract:
Recent research indicates that the Internet (or Net) is currently being used at many post-secondary institutions in support of traditional, classroom-based instruction. From 1994 to 2002, the percentage of post-secondary classes using the Web as a research tool and E-mail as a method of communication has increased almost ten fold. An extensive literature on the evaluation of the Internet as an educational technology has developed in recent years; however, there are some gaps that need to be filled to provide a more complete understanding of the Internet and its use by post-secondary students. First, most of the studies focus primarily on student usage of the Net, and less so on the value (or the advantages and disadvantages) and the utility (or usefulness) associated with that usage. Second, many of these studies make a distinction between the research and communication functions of the Internet. While I argue that this is an appropriate distinction, many examine one function or the other only – and not both simultaneously. The central research problem that this study addresses is helping to fill those two gaps in the evaluation literature by examining in detail student usage, value and utility of the Net as a research and/or communication tool for post-secondary students in support of classroom-based instruction. Drawing upon work from the fields of media studies, learning theory, and theories of communication, I establish a "Net as Tool" framework and adopt a uses and gratifications approach to examine student use of the Net. The three main inter-related concepts of usage, value and utility are used as organizing themes for the study, and I designed and developed a survey instrument to gather original quantitative data from post-secondary students in both Canada and Australia to fully examine those concepts. Two focus group sessions were designed to supplement this quantitative data with qualitative findings (and to generate more in-depth insights into student usage, value and utility of the Net as a research and/or communication tool). The results presented in this study have both theoretical and practical importance. In regards to the theoretical side, I have identified the underlying dimensions of usage, value, and utility, and highlighted what makes the Net valuable and useful as a research and/or communication tool. Additionally, I have identified the factors which are related to usage, value, and utility, and explored the inter-related nature of those three concepts. I concluded my study with an outline of the importance of the skill of digital literacy so that students can cope effectively with the online environment. These findings are significant because they help to fill some specific gaps in the evaluation knowledge of the Net in post-secondary education. In addition, I have developed a practical strategy which suggests how the Net could be used most effectively by students as a research and/or communication tool in support of classroom based instruction. The areas addressed by the strategy include access, infrastructure, technical support, training, integration into the curriculum, and appropriate use of the tool. The overall strategy is important because it contributes to our understanding of the Net as an educational tool, and it outlines ways to address the issue of the digital divide within post-secondary education. It is hoped the strategy will be useful to training staff, post-secondary administrators, instructors, and students.
APA, Harvard, Vancouver, ISO, and other styles
48

Udrescu, Florin. "Le concept contemporain du djihad à l’épreuve des pratiques discursives des acteurs radicaux sur l’Internet." Thesis, Lyon 3, 2013. http://www.theses.fr/2013LYO30017.

Full text
Abstract:
Sur le thème du djihad, le discours islamiste radical qui se propage dans le cyberespace, suite aux attentats du 11 septembre, se nourrit d’une interaction entre la reconfiguration d’un héritage religieux et la technique numérique. En cela, la rhétorique déployée par les acteurs centraux d’Al Qaida fait émerger un espace de représentation et d’action inédit d’une violence prônée au nom du djihad. Ce concept, initialement fruit d’une construction juridique qui en fait une « doctrine déontologique », se retrouve vidé de sa substance normative et symbolique pour se rigidifier dans une clôture réflexive et n’être plus qu’un faire-valoir à des théories et des pratiques terroristes. Il s’agit, dés lors, de saisir les dynamiques qui sont à l’œuvre autour des captures de sens opérées par les acteurs du discours radical contemporain. Fondamental est l’enjeu de la mémoire collective et la manière dont le discours radical la capte de manière sélective pour la détourner au profit d’un bricolage conceptuel. Associée aux modalités techniques du medium Internet, la virtualisation constitue un puissant vecteur d’action performative. À cet égard, une analyse des interactions liant de manière consubstantielle action physique et action discursive, activisme et discours, contribuera à prendre la mesure d’une pragmatique discursive dans ses épaisseurs à la fois sémantiques et contextuelles
Concerning the topic of djihad, radical Islamist discourse that spreads in the cyberspace following the attacks of September 11, feeds on an interaction between the reconfiguration of a religious heritage and the digital technology. Thus, the rhetoric deployed by the central actors of Al Qaeda generates a new space of performance and action of a violence advocated in the name of djihad. This concept, which initially is the result of a legal construction which makes it an “ethical doctrine”, becomes emptied of its normative and symbolic substance to stiffen in a reflexive closure used to assert the theories and the terrorist practices. Henceforth, it is necessary to grasp the dynamics at work in the seizures of the significations operated by the actors of contemporary radical discourse. Fundamental is the issue of the collective memory and the way that the radical discourse captures it, selectively, to divert it for the benefit of a conceptual bricolage. Associated with the technical modalities of the Internet medium, the virtualization is a powerful vector of performative action. In this regard, an analysis of the interactions linking in a consubstantial way the physical and discursive action, activism and discourse, will take the measure of the discursive pragmatics in its both semantic and contextual thickness
APA, Harvard, Vancouver, ISO, and other styles
49

Becuywe, Isabelle. "Patrimoine immatériel et technologies numériques : représentations et usages." Thesis, Paris, EHESS, 2020. http://www.theses.fr/2020EHES0003.

Full text
Abstract:
Avec la Convention pour la Sauvegarde du Patrimoine Culturel Immatériel de l’UNESCO (2003), le concept de patrimoine s’est trouvé élargi à de nouveaux objets, mais surtout une nouvelle distribution des rôles s’est opérée parmi les acteurs, mettant les praticiens individuels et collectifs au coeur du dispositif. Les états qui ont ratifié la convention se sont donné l’obligation de procéder à des inventaires en impliquant les communautés dans la désignation de ce qui, pour elles, fait patrimoine immatériel, offrant ainsi une opportunité d’expérimentations de formes et de méthodes pour réaliser cet objectif. Ces inventaires se sont largement appuyés sur des technologies numériques pour leur constitution et sur le web pour leur diffusion. La dynamique sociale dans laquelle s’inscrit la notion d’inventaire s’appuie sur un imaginaire des techniques numériques comme moyen de conjurer la perte culturelle et une relation ambigüe se noue au moment de l’inventaire nativement numérique entre immatériel et virtuel. L’étude du récit de l’histoire du web permet de mettre en évidence un ensemble de mythes fondateurs d’Internet qui contribuent à cette ambiguïté. À partir d’une participation observante à l’Inventaire du Patrimoine Immatériel Religieux du Québec (IPIR), qui s’appuie sur les définitions de la convention UNESCO, il s’agit de considérer les technologies numériques, dont Internet, comme outils que les communautés (État, communautés locales, acteurs de l’inventaire) mobilisent pour se mettre en scène par le patrimoine immatériel. L’exemple de l’IPIR, chargé de trois missions (conserver la mémoire, répertorier les pratiques vivantes, les communiquer), comparé à d’autres inventaires en ligne existants illustre la plasticité des inventaire du Patrimoine Culturel Immatériel. Les trajectoires de l’inventorisation émergent en interrogeant la demande sociale d’un inventaire du Patrimoine Culturel Immatériel religieux dans le contexte de déchristianisation du Québec à partir des années 1960. Enfin, la diffusion sur le web des données d’inventaire permet de questionner les usages des techniques et les formes de représentations du web comme moyen de transmission culturelle. Alors que la dynamique sociale dans laquelle s’inscrit un inventaire en ligne s’appuie sur un imaginaire des techniques numériques comme moyen de conjurer la perte culturelle, la prolifération des traces sur le web vient défier la promesse d’accessibilité universelle que portait le web des origines
With the Convention for the Safeguarding of the Intangible Cultural Heritage of UNESCO (2003), the concept of heritage was expanded to new objects, but above all a new distribution of roles was made among the actors, putting the practitioners individual and collective at the heart of the device. States that have ratified the convention have given themselves the obligation to carry out inventories by involving the communities in the designation of what, for them, constitutes intangible heritage, thus offering an opportunity for experimentation of forms and methods to achieve this goal. These inventories were largely based on digital technologies for their constitution and on the web for their dissemination. The social dynamics in which the notion of inventory is inscribed is based on an imaginary of digital techniques as a means of warding off cultural loss, and an ambiguous relationship is formed at the time of the natively digital inventory between immaterial and virtual. The study of the narative of the history of the web makes it possible to highlight a set of founding myths of the Internet which contribute to this ambiguity. Based on an observant participation in the Inventory of the Intangible Religious Heritage of Quebec (IPIR), which is based on the definitions of the UNESCO Convention, digital technologies, including the Internet, should be considered as tools that the communities (state, local communities, actors of the inventory) mobilize to be staged by intangible heritage. The example of the IPIR, with three missions (keep the memory, list the living practices, communicate them), compared to other existing online inventories illustrates the plasticity of the intangible cultural heritage inventory. The trajectories of inventorization emerge by questioning the social demand for an inventory of intangible cultural heritage in the context of de-Christianization of Quebec from the 1960s. Finally, the web-based dissemination of inventory data makes it possible to question the uses of techniques and forms of representation of the web as a means of cultural transmission. While the social dynamics in which an online inventory is based on an imaginary digital techniques as a means to avert cultural loss, the proliferation of tracks on the Internet comes to challenge the promise of universal accessibility that the web was wearing. origins
APA, Harvard, Vancouver, ISO, and other styles
50

Kinuthia, Wanyee. "“Accumulation by Dispossession” by the Global Extractive Industry: The Case of Canada." Thèse, Université d'Ottawa / University of Ottawa, 2013. http://hdl.handle.net/10393/30170.

Full text
Abstract:
This thesis draws on David Harvey’s concept of “accumulation by dispossession” and an international political economy (IPE) approach centred on the institutional arrangements and power structures that privilege certain actors and values, in order to critique current capitalist practices of primitive accumulation by the global corporate extractive industry. The thesis examines how accumulation by dispossession by the global extractive industry is facilitated by the “free entry” or “free mining” principle. It does so by focusing on Canada as a leader in the global extractive industry and the spread of this country’s mining laws to other countries – in other words, the transnationalisation of norms in the global extractive industry – so as to maintain a consistent and familiar operating environment for Canadian extractive companies. The transnationalisation of norms is further promoted by key international institutions such as the World Bank, which is also the world’s largest development lender and also plays a key role in shaping the regulations that govern natural resource extraction. The thesis briefly investigates some Canadian examples of resource extraction projects, in order to demonstrate the weaknesses of Canadian mining laws, particularly the lack of protection of landowners’ rights under the free entry system and the subsequent need for “free, prior and informed consent” (FPIC). The thesis also considers some of the challenges to the adoption and implementation of the right to FPIC. These challenges include embedded institutional structures like the free entry mining system, international political economy (IPE) as shaped by international institutions and powerful corporations, as well as concerns regarding ‘local’ power structures or the legitimacy of representatives of communities affected by extractive projects. The thesis concludes that in order for Canada to be truly recognized as a leader in the global extractive industry, it must establish legal norms domestically to ensure that Canadian mining companies and residents can be held accountable when there is evidence of environmental and/or human rights violations associated with the activities of Canadian mining companies abroad. The thesis also concludes that Canada needs to address underlying structural issues such as the free entry mining system and implement FPIC, in order to curb “accumulation by dispossession” by the extractive industry, both domestically and abroad.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography