Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
This open access book introduces readers to the craft of writing iconographic research poetry in a way that is scholarly, yet playful. By tracing the historical foundations of concrete and iconographic poetry, as well as the development of research poetry and poetic inquiry, the book examines the intellectual roots that inform this unique methodological approach. The book offers a detailed description of the methods that can be used to design iconographic research poetry. It includes step-by-step description of strategies that researchers can use to create iconographic research poetry from qualitative data. By explicating the processes by which data can be represented in the form of iconographic research poetry and offering exemplars, readers will find specific hands-on strategies for creating their own iconographic research poems. The book contains writing exercises designed to help aspiring iconographic research poets exercise their poetic imagination. It also providesqualitative research instructors with suggestions for integrating iconographic research poetry into the classroom.
This book highlights the numerous potentials and concerns involved with using the metaverse. Furthermore, the project discusses countermeasures to protect any firm from these risks. Insights into practical solutions may assist organizations in using this new business model by raising awareness and preparing them to improve. The book helps readers get insights into technology's future, i.e., the metaverse. The application areas of the metaverse is quite vast, but it also includes security and privacy issues. Addressing the security issues is the need of the hour. Developers are designing the applications, and users are ready to use them, but on the other side, many security issues need to be focused on. Hence, along with the applications, this book helps the reader understand these hidden security and privacy issues.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.