Mobile Communication and Low-Skilled Migrants' Acculturation to Cosmopolitan Singapore by Aricat Rajiv George;Ling Rich; & Rich Ling
Author:Aricat, Rajiv George;Ling, Rich; & Rich Ling [Aricat, Rajiv George & Ling, Rich]
Language: eng
Format: epub
Publisher: Lexington Books/Fortress Academic
Published: 2018-04-06T00:00:00+00:00
Summary
As a first step towards answering the research question âHow do acculturation types relate to mobile phone appropriation types among migrants, when defined in non-essential and non-universal terms?â we first analyzed the data based on the circular model of mobile phone appropriation. The reader may recall that the circular model integrates âfunctional usesâ of the phone with the âsymbolic functionsâ that are ascribed to the ownership and use of the technology. Meta-communication, or communication on communication, provides the link between the two aspects of the appropriation process, which are âfunctional usesâ (or, âusage and handlingâ) and âsymbolic functionsâ (or, âprestige and social identityâ). Further, as a step towards achieving greater order and comprehension in data, we identified four ideal types of mobile phone appropriation. These were the convenience seeker, the experimenter, the group communicator, and the austere user. These types of users differed in their economic resources, motivation, and skills to move on to advanced features of the phone or Web 2.0, the recognition they have among peers and within informal groups, and their ability to improvise and innovate on issues related to technology. The next step is to identify acculturation types, which is followed by linking the appropriation/user types with the acculturation types. These are attempted in the following chapter.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Deep Learning with Python by François Chollet(15767)
The Mikado Method by Ola Ellnestam Daniel Brolund(13030)
Hello! Python by Anthony Briggs(12866)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(12094)
Dependency Injection in .NET by Mark Seemann(11922)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(10710)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10535)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(10489)
Grails in Action by Glen Smith Peter Ledbrook(10011)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(9826)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(9387)
Hit Refresh by Satya Nadella(9040)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(8603)
Kotlin in Action by Dmitry Jemerov(8534)
The Kubernetes Operator Framework Book by Michael Dame(8481)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8303)
Robo-Advisor with Python by Aki Ranin(8258)
Practical Computer Architecture with Python and ARM by Alan Clements(8228)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(8199)