Search results

Filters

  • Journals
  • Authors
  • Keywords
  • Date
  • Type

Search results

Number of results: 2
items per page: 25 50 75
Sort by:
Download PDF Download RIS Download Bibtex

Abstract

According to the Bible, a disrespectful use of God’s name may be perceived as blasphemous or at least profane. In order to avoid the risk of violating that religious and linguistic taboo, sensitive language users representing the Judeo-Christian world have developed various euphemistic ways of referring to God. On the other hand, however, jokes that include God’s name and laugh at him are not uncommon in Western culture. Assuming a linguistic-semantic perspective, the present paper examines a group of “God jokes”, which are jokes that contain God’s name and were tagged with the word god in the collection entitled “The best god jokes”, published on the website unijokes.com. The aim of the study is to identify the place and role of God’s name in the semantic script of “God jokes”, or in other words, to check “how much” God there really is in the text of jokes that are supposed to laugh at God, potentially violating the religious taboo. Following the General Theory of Verbal Humor (Raskin and Attardo 1991; Attardo 2001), the use of God’s name is analyzed in the knowledge resources of the semantic script of a joke: the target, the script opposition, the situation, the narration, and the language.
Go to article

Authors and Affiliations

Marcin Kuczok
1

  1. University of Silesia
Download PDF Download RIS Download Bibtex

Abstract

The paper addresses a managerial problem related to ensuring cybersecurity of information and knowledge resources in production enterprises interested in the implementation of INDUSTRY 4.0 technologies. The material presented shows the results of experimental research of a qualitative nature, using two expert inventive methods: brain-netting and a fuzzy formula of inference. The experts' competences included the following three variants of the industrial application of the INDUSTRY 4.0 concept: (1) high production volumes achieved using a dedicated and fully robotic production line (2) the manufacture of short, personalized series of products through universal production cells, and (3) the manufacture of specialized unit products for individual customers. The Google Forms software was used to collect these expert opinions. The conclusions of the research carried out using the brain-netting method point to nine variants of the cybersecurity strategy of IT networks and knowledge base resources in manufacturing enterprises represented by the experts. The results of the research using the fuzzy formula of inference are numerically and situationally defined relations linking the above-mentioned nine strategies with five types of cyber-attacks. The summary record of these relations as the basis for managerial cybersecurity recommendations has a matrix form.
Go to article

Authors and Affiliations

Leszek Pacholski
1
ORCID: ORCID

  1. Poznan University of Technology, Faculty of Engineering Management, Poland

This page uses 'cookies'. Learn more