The effect of gender on the formation of semantic networks of objective words in adults
DOI :
https://doi.org/10.29051/el.v7iesp.7.16304Mots-clés :
Semantic network theory, Objective vocabulary, Semantic domains, StudentsRésumé
Semantic network theory has provided a way to show the structure of human semantic memory and how it works to understand meanings. This study investigates the role of gender variables in the formation and content of these networks on objective vocabulary. The statistical population of this study is 400 male and female Russian students in different educational levels. They answered ten objective words from other semantic domains. Subjects write the words associated with seeing those words in their minds. After collecting data and performing statistical analysis, it can be concluded that for objective words in both sexes, both men and women. The objective and abstract word is used on an almost equal level. In this research, it can be concluded that the semantic network of objective words in the minds of male and female students evokes the same semantic connections with close concepts.
Téléchargements
Références
Creemers, R., Triolo, P., Lu, X., Webster, G. (2020). Chinese Government Clarifies Cybersecurity Authorities [translation]. Retrieved from https://www.newamerica.org/cybersecurity-initiative/digichina/blog/chinese-government-clarifies-cybersecurity-authorities-translation/
Critical Information Infrastructure Security Protection Regulations (opinion-seeking draft) [translation]. Retrieved from https://chinacopyrightandmedia.wordpress.com/2017/07/10/critical-information-infrastructure-security-protection-regulations/
Critical information infrastructure. Federal Service for Technical and Export Control. Retrieved from https://fstec.ru/normotvorcheskaya/obespechenie-bezopasnosti-kriticheskoj-informatsionnoj-infrastruktury (retrieved on 19.04.2021)
Cyber Security Review Measures (网络安全审查办法). Retrieved from http://www.cac.gov.cn/2020-04/27/c_1589535450769077.htm
Cybersecurity Law of the People’s Republic of China: Order №53 of the President, 11/07/2016
Ella Gorian (2020). Genesis of Russian cyber security legal mechanism: an authentic or a trend alike model?. In Denis B. Solovev (ed.): Smart Technologies and Innovations in Design for Control of Technological Processes and Objects: Proceeding of the International Science and Technology Conference “FarEastСon-2019”. Cham: Springer, pp. 937-949
Guiding Opinions on Implementing the Cybersecurity Multi-Level Protection System and Critical Information Infrastructure Security Protection System (贯彻落实网络安全等级保护制度和关键信息基础设施安全保护制度的指导意见). Retrieved from https://www.mps.gov.cn/n6557558/c7369310/content.html.
Issues of the Federal Service for Technical and Export Control: Decree of the President of the Russian Federation dated 16 August, 2004 No. 1085.
Lu, X. (2018). Scoping Critical Information Infrastructure in China: CII is a major policy challenge in implementing Xi Jinping’s cybersecurity strategy. Retrieved from https://thediplomat.com/2018/05/scoping-critical-information-infrastructure-in-china/
National Cyber Security Inspection Operation Guide (国家网络安全检查操作指南). Retrieved from https://wlzx.hebtu.edu.cn/resources/43/20161027101045853.doc
On amendments to the Federal Law "On Communications" and the Federal Law "On Information, Information Technologies and Information Protection": Federal Law dated 01.05.2019 No. 90-FZ
On improving the state system for detecting, preventing and eliminating the consequences of computer attacks on information resources of the Russian Federation: Decree of the President of the Russian Federation dated 22 December, 2017 No. 620.
On the National Coordination Centre for Computer Incidents (together with the Regulations on the National Coordination Centre for Computer Incidents): order of the FSB of Russia dated 24 July, 2018 No. 366.
Webster, G., Sacks, S., & Triolo, P. (2019). Three Chinese Digital Economy Policies at Stake in the U.S.–China Talks. Retrieved from https://www.newamerica.org/cybersecurity-initiative/digichina/blog/three-chinese-digital-economy-policies-at-stake-in-the-uschina-talks/
Wei, L., & Davis, B. (2019). U.S. Trade Negotiators Take Aim at China’s Cybersecurity Law. Retrieved from https://www.wsj.com/articles/u-s-trade-negotiators-take-aim-at-chinas-cybersecurity-law-11553867916
Téléchargements
Publiée
Comment citer
Numéro
Rubrique
Licence

Ce travail est disponible sous licence Creative Commons Attribution - Pas d’Utilisation Commerciale - Partage dans les Mêmes Conditions 4.0 International.
Os manuscritos aceitos e publicados são de propriedade da Revista EntreLínguas. Os artigos publicados e as referências citadas na Revista EntreLínguas são de inteira responsabilidade de seus autores.
Transferência de direitos autorais – autorização para publicação
Caso o artigo submetido seja aprovado para publicação, já fica acordado que o(s) autor(es) autoriza(m) a UNESP a reproduzi-lo e publicá-lo na EntreLínguas, entendendo-se os termos “reprodução” e “publicação” conforme definição respectivamente dos incisos VI e I do artigo 5° da Lei 9610/98. O artigo poderá ser acessado pela rede mundial de computadores (Internet), sendo permitidas, a título gratuito, a consulta e a reprodução de exemplar do artigo para uso próprio de quem a consulta, desde que haja a citação ao texto consultado. Essa autorização de publicação 328 EntreLínguas, Araraquara, v. 1, n .2, p. 323-328, jul./dez. 2015 não tem limitação de tempo, ficando a UNESP responsável pela manutenção da identificação do(s) autor(es) do artigo. Os artigos publicados e as referências citadas na Revista EntreLínguas são de inteira responsabilidade de seus autores.

