SwePub
Sök i SwePub databas

  Extended search

Träfflista för sökning "L773:1804 3194 "

Search: L773:1804 3194

  • Result 1-10 of 13
Sort/group result
   
EnumerationReferenceCoverFind
1.
  •  
2.
  • Ackfeldt, Anders (author)
  • I Am Malcolm X” – Islamic Themes in Hip-hop Video Clips Online
  • 2013
  • In: CyberOrient. - 1804-3194. ; 7:2
  • Journal article (peer-reviewed)abstract
    • The Internet provides a space for new interpretations and conversations concerning religious practices to take place without the direct interference of religious authorities. The intention of this article is to highlight one vivid aspect of this development, Islamic themed hip-hop video clips distributed online. The visual aesthetics, the selection of pictures (or no pictures), themes and storylines supplementing the musical message can be used to mobilize and promote different traditions of interpretation of Islam. They can also convey interesting insights in the negotiations and compromises of Muslim identities in the consumer culture logic of the modern society. Lastly, they can provide a route to analyze the articulations of alternative interpretations of Islam often, but not always, rooted in a deep social-justice activism that connects marginalized communities within and beyond the Middle East
  •  
3.
  • Ackfeldt, Anders (author)
  • Review: Methods for Studying Video Games and Religion
  • 2020
  • In: CyberOrient. - 1804-3194. ; 14:2, s. 107-109
  • Review (other academic/artistic)abstract
    • The edited volume Methods for Studying Video Games and Religion (2017) by Vít Šisler, Kerstin Radde-Antweiler, and Xenia Zeiler takes the study of religion and video games seriously and recognizes the widespread usage of religious themes in the world of games. The book can be read as an exposé of the state of research in the field of Game Stud-ies with the specific focus on methods for researching how religion is represented in games and how religious traditions change and serves as inspiration for religious practices and beliefs.
  •  
4.
  • Ackfeldt, Anders (author)
  • Review: Representing Islam: Hip-Hop of the September 11 Generation
  • 2021
  • In: CyberOrient. - 1804-3194. ; 15:2, s. 106-109
  • Review (other academic/artistic)abstract
    • The book Representing Islam: Hip-Hop of the September 11 Generation (2020) by Kamaludeen Mohmed Nasir explores the entangled relationship between Islam and hip-hop. The book centers around Muslim hip-hop artists affected by the war on terror and the long-term consequences of the 9/11 attacks; increased surveillance, a securitization of Islam, and an amplified islamophobia, not only in the United States but around the world. The centrality of 9/11 for this diverse group of young Muslim artists is reflected in the fact that references to the attacks have been staples in aural, visual, and textual modes and occur as t-shirt prints, in punch lines, and metaphors as well as on record covers and sound bites.
  •  
5.
  • Ajjoub, Orwa (author)
  • Review: The Media World of ISIS
  • 2020
  • In: CyberOrient. - 1804-3194. ; 14:2
  • Review (other academic/artistic)abstract
    • The Islamic State group (IS) has grabbed the world’s attention as one of the most dangerous and gruesome terrorist organizations in history. The group has been studied from different disciplines such as political science, history, and theology. Michael Krona and Rosemary Pennington’s edited volume, The Media World of ISIS, is an attempt by media studies scholars to explore different aspects and dimensions of the IS usage of media.
  •  
6.
  • Anderson, Jon Wilson (author)
  • Online and Offline Continuities, Community and Agency on the Internet
  • 2013
  • In: CyberOrient. - 1804-3194. ; 7:1
  • Journal article (peer-reviewed)abstract
    • How the Internet spawns community and gets its features into offline life is a recurring problem met in searches for “impacts” of its successive iterations in the Middle East and arises particularly in assessing equivocal findings most recently about social media in the Arab Spring uprisings. But the problem is more methodological than ontological: it lies in viewing the Internet through a media lens on communication as message-passing and “influence” as the outcome to be identified. The Internet and its current embodiment for new users as social media have a richer – and, I argue, normal – sociology in a more extended habitus explored here through comparison of longer-term, intermediate-term, and immediate processes highlighted by recent research that give better pictures of the Internet as networking and as cultural performance, and of appropriate methodologies that will retrieve their features.
  •  
7.
  •  
8.
  • Berglund, Jenny (author)
  • Muslim Swim Wear Fashion at Amman Waves on the Internet and Live
  • 2008
  • In: Cyber Orient: Online journal of the Virtual Middle East. - : Wiley. ; 3:1, s. 4-13
  • Journal article (peer-reviewed)abstract
    • When viewed on the internet, the waterslides and pools at Amman Waves look deserted, but when paying a visit they are filled with children, women and men in various kinds of swim wear. At Amman Waves women’s swim wear fashion ranges from small bikinis to swim-suits that cover every part of a woman’s body except the face, hands and feet. In this article these differences in covering are discussed and categorized in relation to Islamic law. It is argued that this variation in swim wear also has relevance for European societies since it shows possibilities for negotiations (agreement) between traditional Islamic ideals and ideals in modern Western societies.
  •  
9.
  •  
10.
  • Cristiano, Fabio (author)
  • Deterritorializing Cyber Security and Warfare in Palestine: Hackers, Sovereignty, and the National Cyberspace as Normative
  • 2019
  • In: CyberOrient. - : Wiley. - 1804-3194. ; 13:1, s. 28-42
  • Journal article (peer-reviewed)abstract
    • Cyber security strategies operate on the normative assumption that national cyberspace mirrors a country's territorial sovereignty. Its protection commonly entails practices of bordering through infrastructural control and service delivery, as well as the policing of data circulation and user mobility. In a context characterized by profound territorial fragmentation, such as the Occupied Palestinian Territory (OPT),1 equating national cyberspace with national territory proves to be reductive. This article explores how different cyber security strategies – implemented by the Israeli government, the Palestinian Authority, and Hamas – intersect and produce a cyberspace characterized by territorial annexation, occupation, and blockade. Drawing on this analysis, it then employs the conceptual prism of (de-)–(re-) territorialization to reflect on how these strategies, as well as those of Palestinian hackers, articulate territoriality beyond the normativity of national cyberspace.
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-10 of 13

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view