National Repository of Grey Literature 2 records found  Search took 0.00 seconds. 
Social networks as a source of symbolic capital
Latislavová, Aneta ; Tuček, Milan (advisor) ; Grygar, Jakub (referee)
This study focuses on identifying users' motivations for using social media platforms and the question of perceiving their activity as a source of symbolic capital. The paper also provides insights into individuals' behaviors on social networks and their perspectives on associated phenomena. The empirical part is conducted through mixed research methods, wherein phenomena are examined in detail through interviews followed by a questionnaire survey. The study identifies key factors for user motivation and activity and explores how users explain them. It analyzes the mutual social interaction among users and its importance for both online and offline communication. The study includes mapping the influence of influencers on their followers and the perceived positive and negative aspects of their activities. The research also investigates how respondents react to interruptions in online communication and the impact on their mental health.
Sociological inquiry into the hacker subculture: contributions for the field
Latislavová, Aneta ; Lupač, Petr (advisor) ; Buriánek, Jiří (referee)
The aim of this work is to use a synthesis of existing knowledge about the hacker subculture to find out its description and specifics. The hacker subculture is perceived as an anarchist group that does not have a fixed hierarchy and no rules. Part of the work deals with criminological theories that explain the behavior of hackers as deviants. The hackers themselves accept the label of deviants, but do not perceive it negatively. Their motivation for hacking is above all fun and curiosity. There is no fixed hierarchy in the subculture, but a system of status based on the credibility and experience of the hacker and hacker ethics that applies to their behavior and goals. These are focused on free access to information. Hacker subculture research is limited by the problems associated with the environment in which it operates. This also affects the information found, which we must approach with caution. Keywords Hacker, hacker subculture, internet, deviation, criminology

Interested in being notified about new results for this query?
Subscribe to the RSS feed.