Search for dissertations about: "strategic communication"
Showing result 16 - 20 of 132 swedish dissertations containing the words strategic communication.
-
16. Voices in the Arena: A Participation-Centred Study of Multivocal Risk and Crisis Communication on Social Media
Abstract : Contemporary risk and crisis communication take place in a complex multiplatform and multivocal environment, where numerous social media foster and facilitate online participation. Lay social media users are thus able to create, maintain, and share their own crisis narrative(s), which exist alongside official information and media reports. READ MORE
-
17. Optimization of Joint Cell, Channel and Power Allocation in Wireless Communication Networks
Abstract : In this thesis we formulate joint cell, channel and power allocation problems within wireless communication networks. The objectives are to maximize the user with mini- mum data throughput (Shannon capacity) or to maximize the total system throughput, referred to as the max-min and max-sum problem respectively. READ MORE
-
18. Innovation and Intellectual Property: Strategic IP Management and Economics of Technology
Abstract : Innovations and technological developments have been recognized for their central importance for economic success and growth at least since the 1930s. Intellectual property (IP) and intellectual property rights (IPRs), such as patents, trade secret rights, and copyrights, have during more recent decades caught increasing attention, and, mainly due to various developments at macro level, IP has become an important source of competitive advantage at micro level in many industries. READ MORE
-
19. The mediation of affect : security, fear and subversive hope in visual culture
Abstract : The overarching purpose of this study has been to problematise how visual practices and the mediation of affect is linked to the capacity to produce (new) perceptual realities, sensations and imaginaries, ultimately aiming to legitimate or counter-legitimate the hegemonic discourses and practices mobilised in the name of security. The first part of my thesis approaches this matter through an analysis of media cultures and discursive systems circulating within the court and the state military. READ MORE
-
20. Understanding the Capabilities of Route Collectors to Observe Stealthy Hijacks : Does adding more monitors or reporting more paths help?
Abstract : Routing hijacks have plagued the Internet for decades. These attacks corrupt the routing table entries that networks use to forward traffic, causing affected network devices to route private and possibly sensitive Internet traffic towards the hijacker. READ MORE