Avancerad sökning

Visar resultat 1 - 5 av 308 uppsatser som matchar ovanstående sökkriterier.

  1. 1. Influencers in Confinement : Measuring Covid-19’s Impact on Leadership in Pro- Eating Disorder Twitter Communities

    Master-uppsats, Linköpings universitet/Institutet för analytisk sociologi, IAS

    Författare :Jacquelynn Ennis; [2024]
    Nyckelord :Social Network Analysis; Twitter; Pro-eating Disorder; Eating Disorders; Covid-19; Topic Modelling; Online Communities;

    Sammanfattning : The Covid-19 pandemic presented unprecedented challenges, with global lockdowns impacting individuals on a profound scale. Many took to social media to cope with feelings of anxiety and isolation. LÄS MER

  2. 2. The state of social media usage to fight malnutrition among children under the age of five years in Tanzania

    Magister-uppsats, Uppsala universitet/Institutionen för informatik och media

    Författare :Debora Mbilinyi; [2023]
    Nyckelord :social media; nutrition literacy; malnutrition; behavior change communication; social media usage;

    Sammanfattning : This study has evaluated how Tanzania Food and Nutrition Centre (TFNC), a government institution overseeing nutrition, uses social media to enhance the nutrition literacy of caregivers and parents of children under the age of five years. The study contributes to knowledge on how Tanzania’s resource-constrained health sector’s nutrition communication can benefit from social media by answering the following research questions: Which social media platforms and features does TFNC use to share nutrition knowledge pertaining to children under the age of five years? What kinds of nutrition knowledge pertaining to children under the age of five years does TFNC share on social media? How is nutrition knowledge pertaining to children under the age of five years posted on TFNC social media pages packaged? And, how frequently is nutrition knowledge pertaining to children under the age of five years repeated on TFNC social media pages? These questions have been answered from a social-behavioral change communication perspective that has combined the Media Ecology Theory and the Theory of Planned Behavior. LÄS MER

  3. 3. Gaining Social Power In a Time of Conflict : A case study on how the two superpowers China and the US are using security branding on Twitter to gain social power during an ongoing war.

    Kandidat-uppsats, Högskolan Väst/Institutionen för ekonomi och it

    Författare :Emil Karlsson; Linda Wilsson; [2023]
    Nyckelord :Security Branding; Generic Frames; Digital Diplomacy; International Relations; Soft Power; Social Power; Superpower Rivalry; Twitter;

    Sammanfattning : How are the two superpowers of the world using Twitter as a platform for gathering global support for their policies when tweeting about an ongoing international conflict? That is the question that is answered in this thesis through a small-N case study. A mixed-method content analysis, based on security branding and generic framing, was applied to the data to determine how security branding is used by the actors to acquire social power. LÄS MER

  4. 4. Exploration of using Twitter data to predict Swedish political opinion polls with neural networks

    Master-uppsats, Lunds universitet/Matematisk statistik

    Författare :Alexander Gren; Klara Lundgren; [2023]
    Nyckelord :Mathematics and Statistics;

    Sammanfattning : This thesis aims to explore the possibility of using deep learning techniques to mine opinions on Twitter, with the objective to predict the political opinion distribution in Sweden. Different methods of gathering and annotating training data are evaluated to achieve accurate and reliable predictions. LÄS MER

  5. 5. Tvåfaktorsautentisering hos svenska små och medelstora företag

    Kandidat-uppsats, Högskolan i Skövde/Institutionen för informationsteknologi

    Författare :Annie Haraldsson; [2023]
    Nyckelord :Tvåfaktorsautentisering; företag; införande;

    Sammanfattning : I takt med att digitaliseringen i samhället ökar så ökar också risken för att bli utsatt för cyberbrott eller cyberattacker. För att skydda viktiga data och information så finns flera olika metoder, bland annat tvåfaktorsautentisering. LÄS MER