Investigar o efeito do gênero na formação de redes semânticas de palavras objetivas em adultos

Autores

DOI:

https://doi.org/10.29051/el.v7iesp.7.16304

Palavras-chave:

Teoria da rede semântica, Vocabulário objetivo, Domínios semânticos, Alunos

Resumo

A teoria da rede semântica forneceu uma maneira de mostrar a estrutura da memória semântica humana e como ela funciona para compreender os significados. Este estudo investiga o papel das variáveis de gênero na formação e conteúdo dessas redes no vocabulário objetivo. A população estatística deste estudo é de 400 estudantes russos do sexo masculino e feminino em diferentes níveis educacionais. Eles responderam dez palavras objetivas de outros domínios semânticos. Os sujeitos escrevem as palavras associadas a ver essas palavras em suas mentes. Após a coleta de dados e realização de análise estatística, pode-se concluir que, para palavras objetivas em ambos os sexos, tanto homens quanto mulheres. A palavra objetiva e abstrata é usada em um nível quase igual. Nesta pesquisa, pode-se concluir que a rede semântica de palavras objetivas na mente de alunos e alunas evoca as mesmas conexões semânticas com conceitos próximos.

Downloads

Não há dados estatísticos.

Biografia do Autor

Ella V. Gorian, Vladivostok State University of Economics and Service, Russia

Ph.D, Associate Professor, School of Law

Referências

Creemers, R., Triolo, P., Lu, X., Webster, G. (2020). Chinese Government Clarifies Cybersecurity Authorities [translation]. Retrieved from https://www.newamerica.org/cybersecurity-initiative/digichina/blog/chinese-government-clarifies-cybersecurity-authorities-translation/

Critical Information Infrastructure Security Protection Regulations (opinion-seeking draft) [translation]. Retrieved from https://chinacopyrightandmedia.wordpress.com/2017/07/10/critical-information-infrastructure-security-protection-regulations/

Critical information infrastructure. Federal Service for Technical and Export Control. Retrieved from https://fstec.ru/normotvorcheskaya/obespechenie-bezopasnosti-kriticheskoj-informatsionnoj-infrastruktury (retrieved on 19.04.2021)

Cyber Security Review Measures (网络安全审查办法). Retrieved from http://www.cac.gov.cn/2020-04/27/c_1589535450769077.htm

Cybersecurity Law of the People’s Republic of China: Order №53 of the President, 11/07/2016

Ella Gorian (2020). Genesis of Russian cyber security legal mechanism: an authentic or a trend alike model?. In Denis B. Solovev (ed.): Smart Technologies and Innovations in Design for Control of Technological Processes and Objects: Proceeding of the International Science and Technology Conference “FarEastСon-2019”. Cham: Springer, pp. 937-949

Guiding Opinions on Implementing the Cybersecurity Multi-Level Protection System and Critical Information Infrastructure Security Protection System (贯彻落实网络安全等级保护制度和关键信息基础设施安全保护制度的指导意见). Retrieved from https://www.mps.gov.cn/n6557558/c7369310/content.html.

Issues of the Federal Service for Technical and Export Control: Decree of the President of the Russian Federation dated 16 August, 2004 No. 1085.

Lu, X. (2018). Scoping Critical Information Infrastructure in China: CII is a major policy challenge in implementing Xi Jinping’s cybersecurity strategy. Retrieved from https://thediplomat.com/2018/05/scoping-critical-information-infrastructure-in-china/

National Cyber Security Inspection Operation Guide (国家网络安全检查操作指南). Retrieved from https://wlzx.hebtu.edu.cn/resources/43/20161027101045853.doc

On amendments to the Federal Law "On Communications" and the Federal Law "On Information, Information Technologies and Information Protection": Federal Law dated 01.05.2019 No. 90-FZ

On improving the state system for detecting, preventing and eliminating the consequences of computer attacks on information resources of the Russian Federation: Decree of the President of the Russian Federation dated 22 December, 2017 No. 620.

On the National Coordination Centre for Computer Incidents (together with the Regulations on the National Coordination Centre for Computer Incidents): order of the FSB of Russia dated 24 July, 2018 No. 366.

Webster, G., Sacks, S., & Triolo, P. (2019). Three Chinese Digital Economy Policies at Stake in the U.S.–China Talks. Retrieved from https://www.newamerica.org/cybersecurity-initiative/digichina/blog/three-chinese-digital-economy-policies-at-stake-in-the-uschina-talks/

Wei, L., & Davis, B. (2019). U.S. Trade Negotiators Take Aim at China’s Cybersecurity Law. Retrieved from https://www.wsj.com/articles/u-s-trade-negotiators-take-aim-at-chinas-cybersecurity-law-11553867916

Publicado

30/12/2021

Como Citar

GORIAN, E. V. Investigar o efeito do gênero na formação de redes semânticas de palavras objetivas em adultos. Revista EntreLinguas, Araraquara, v. 7, n. esp.7, 2021. DOI: 10.29051/el.v7iesp.7.16304. Disponível em: https://periodicos.fclar.unesp.br/entrelinguas/article/view/16304. Acesso em: 22 nov. 2024.