20 resultados para Neighbourhood movement, political issue, frames, social networks
em Aston University Research Archive
Resumo:
In this poster we presented our preliminary work on the study of spammer detection and analysis with 50 active honeypot profiles implemented on Weibo.com and QQ.com microblogging networks. We picked out spammers from legitimate users by manually checking every captured user's microblogs content. We built a spammer dataset for each social network community using these spammer accounts and a legitimate user dataset as well. We analyzed several features of the two user classes and made a comparison on these features, which were found to be useful to distinguish spammers from legitimate users. The followings are several initial observations from our analysis on the features of spammers captured on Weibo.com and QQ.com. ¦The following/follower ratio of spammers is usually higher than legitimate users. They tend to follow a large amount of users in order to gain popularity but always have relatively few followers. ¦There exists a big gap between the average numbers of microblogs posted per day from these two classes. On Weibo.com, spammers post quite a lot microblogs every day, which is much more than legitimate users do; while on QQ.com spammers post far less microblogs than legitimate users. This is mainly due to the different strategies taken by spammers on these two platforms. ¦More spammers choose a cautious spam posting pattern. They mix spam microblogs with ordinary ones so that they can avoid the anti-spam mechanisms taken by the service providers. ¦Aggressive spammers are more likely to be detected so they tend to have a shorter life while cautious spammers can live much longer and have a deeper influence on the network. The latter kind of spammers may become the trend of social network spammer. © 2012 IEEE.
Resumo:
Supply Chain Risk Management (SCRM) has become a popular area of research and study in recent years. This can be highlighted by the number of peer reviewed articles that have appeared in academic literature. This coupled with the realisation by companies that SCRM strategies are required to mitigate the risks that they face, makes for challenging research questions in the field of risk management. The challenge that companies face today is not only to identify the types of risks that they face, but also to assess the indicators of risk that face them. This will allow them to mitigate that risk before any disruption to the supply chain occurs. The use of social network theory can aid in the identification of disruption risk. This thesis proposes the combination of social networks, behavioural risk indicators and information management, to uniquely identify disruption risk. The propositions that were developed from the literature review and exploratory case study in the aerospace OEM, in this thesis are:- By improving information flows, through the use of social networks, we can identify supply chain disruption risk. - The management of information to identify supply chain disruption risk can be explored using push and pull concepts. The propositions were further explored through four focus group sessions, two within the OEM and two within an academic setting. The literature review conducted by the researcher did not find any studies that have evaluated supply chain disruption risk management in terms of social network analysis or information management studies. The evaluation of SCRM using these methods is thought to be a unique way of understanding the issues in SCRM that practitioners face today in the aerospace industry.
Resumo:
DUE TO COPYRIGHT RESTRICTIONS ONLY AVAILABLE FOR CONSULTATION AT ASTON UNIVERSITY LIBRARY AND INFORMATION SERVICES WITH PRIOR ARRANGEMENT
Resumo:
This paper presents an analysis of whether a consumer's decision to switch from one mobile phone provider to another is driven by individual consumer characteristics or by actions of other consumers in her social network. Such consumption interdependences are estimated using a unique dataset, which contains transaction data based on anonymized call records from a large European mobile phone carrier to approximate a consumer's social network. Results show that network effects have an important impact on consumers' switching decisions: switching decisions are interdependent between consumers who interact with each other and this interdependence increases in the closeness between two consumers as measured by the calling data. In other words, if a subscriber switches carriers, she is also affecting the switching probabilities of other individuals in her social circle. The paper argues that such an approach is of high relevance to both switching of providers and to the adoption of new products. © 2013 Copyright Taylor and Francis Group, LLC.
Resumo:
With the advent of GPS enabled smartphones, an increasing number of users is actively sharing their location through a variety of applications and services. Along with the continuing growth of Location-Based Social Networks (LBSNs), security experts have increasingly warned the public of the dangers of exposing sensitive information such as personal location data. Most importantly, in addition to the geographical coordinates of the user’s location, LBSNs allow easy access to an additional set of characteristics of that location, such as the venue type or popularity. In this paper, we investigate the role of location semantics in the identification of LBSN users. We simulate a scenario in which the attacker’s goal is to reveal the identity of a set of LBSN users by observing their check-in activity. We then propose to answer the following question: what are the types of venues that a malicious user has to monitor to maximize the probability of success? Conversely, when should a user decide whether to make his/her check-in to a location public or not? We perform our study on more than 1 million check-ins distributed over 17 urban regions of the United States. Our analysis shows that different types of venues display different discriminative power in terms of user identity, with most of the venues in the “Residence” category providing the highest re-identification success across the urban regions. Interestingly, we also find that users with a high entropy of their check-ins distribution are not necessarily the hardest to identify, suggesting that it is the collective behaviour of the users’ population that determines the complexity of the identification task, rather than the individual behaviour.
Resumo:
In recent years, the rapid spread of smartphones has led to the increasing popularity of Location-Based Social Networks (LBSNs). Although a number of research studies and articles in the press have shown the dangers of exposing personal location data, the inherent nature of LBSNs encourages users to publish information about their current location (i.e., their check-ins). The same is true for the majority of the most popular social networking websites, which offer the possibility of associating the current location of users to their posts and photos. Moreover, some LBSNs, such as Foursquare, let users tag their friends in their check-ins, thus potentially releasing location information of individuals that have no control over the published data. This raises additional privacy concerns for the management of location information in LBSNs. In this paper we propose and evaluate a series of techniques for the identification of users from their check-in data. More specifically, we first present two strategies according to which users are characterized by the spatio-temporal trajectory emerging from their check-ins over time and the frequency of visit to specific locations, respectively. In addition to these approaches, we also propose a hybrid strategy that is able to exploit both types of information. It is worth noting that these techniques can be applied to a more general class of problems where locations and social links of individuals are available in a given dataset. We evaluate our techniques by means of three real-world LBSNs datasets, demonstrating that a very limited amount of data points is sufficient to identify a user with a high degree of accuracy. For instance, we show that in some datasets we are able to classify more than 80% of the users correctly.
Resumo:
This chapter explores how gentrifiers in Istanbul mobilise their social networks and social capital during the gentrification process, and how their networks are constructed through processes of “ place making” and belonging. In addition, this chapter aims to demonstrate how social capital and social networks work in practice during the gentrification process. It also examines place making and claiming strategies of gentrifiers by focusing on the following questions: (a) What are the spatial strategies of the new middle class, and what is the importance of these strategies?; (b) How are class and spatial boundaries designated in gentrified neighbourhoods?; (c) What kinds of networks and relationships play a role in developing certain housing dispositions or belonging patterns
Resumo:
This PhD thesis analyses networks of knowledge flows, focusing on the role of indirect ties in the knowledge transfer, knowledge accumulation and knowledge creation process. It extends and improves existing methods for mapping networks of knowledge flows in two different applications and contributes to two stream of research. To support the underlying idea of this thesis, which is finding an alternative method to rank indirect network ties to shed a new light on the dynamics of knowledge transfer, we apply Ordered Weighted Averaging (OWA) to two different network contexts. Knowledge flows in patent citation networks and a company supply chain network are analysed using Social Network Analysis (SNA) and the OWA operator. The OWA is used here for the first time (i) to rank indirect citations in patent networks, providing new insight into their role in transferring knowledge among network nodes; and to analyse a long chain of patent generations along 13 years; (ii) to rank indirect relations in a company supply chain network, to shed light on the role of indirectly connected individuals involved in the knowledge transfer and creation processes and to contribute to the literature on knowledge management in a supply chain. In doing so, indirect ties are measured and their role as means of knowledge transfer is shown. Thus, this thesis represents a first attempt to bridge the OWA and SNA fields and to show that the two methods can be used together to enrich the understanding of the role of indirectly connected nodes in a network. More specifically, the OWA scores enrich our understanding of knowledge evolution over time within complex networks. Future research can show the usefulness of OWA operator in different complex networks, such as the on-line social networks that consists of thousand of nodes.
Resumo:
This book is an urgent and compelling account of the Occupy movements: from the M15 movement in Spain, to the wave of Occupations flooding across cities in American, Europe and Australia, to the harsh reality of evictions as corporations and governments attempted to reassert exclusive control over public space. Across a vast range of international examples over twenty authors analyse, explain and helps us understand the movement. These movements were a novel and noisy intervention into the recent capitalist crisis in developed economies, developing an exceptionally broad identity through a call to arms addressed to 'the 99%', and emphasizing the importance of public space in the creation and maintenance of opposition. The novelties of these movements, along with their radical positioning and the urgency of their claims all demand analysis. This book investigates the crucial questions of how and why this form of action spread so rapidly and so widely, how the inclusive discourse of 'the 99%' matched up to the reality of the practice. It is vital to understand not just the choice of tactics and the vitality of protest camps in public spaces, but also how the myriad of challenges and problems were negotiated. This book was published as a special issue of Social Movement Studies.
Resumo:
ONLY AVAILABLE FOR CONSULTATION AT ASTON UNIVERSITY LIBRARY WITH PRIOR ARRANGEMENT This thesis seeks to contribute to the socio-political literature. It comprises of three individual chapters examining the determinants and consequences of different social-political institutional factors. Specifically, the first study combines game theoretical and empirical techniques to examine how bureaucrats favour other agents within their social group and the effects this will have on the level of corruption in the economy. To this end, I develop a simple model of allocation of time between economic activities and leisure (time spent building social network ties), to illustrate the underlying causal mechanism between social network and corruption. It shows that large social networks and low levels of economic activities provides the condition for high levels of corruption. However, the ability of the government to punish corruption through well-established laws and property rights enforcement acts as a deterrent to corruption. he second work also combines game theoretical and empirical techniques. It aims to clarify the relationship between the degree of competition and political influence of firms, paying particular attention to the level of government regulations that exist in the countries in which the firms operates. The interplay between economic and political institutions is vital to any analysis on understanding the workings of political influence. The third study is purely empirical. It examines the role of two types of business network, namely, political connections and business group affiliations on a firm’s performance. Evidence was provided on Chinese firms’ performance during the 2008 financial crisis.
Resumo:
Firmly situating South African teams, players, and associations in the international framework in which they have to compete, South Africa and the Global Game: Football, Apartheid, and Beyond presents an interdisciplinary analysis of how and why South Africa underwent a remarkable transformation from a pariah in world sport to the first African host of a World Cup in 2010. Written by an eminent team of scholars, this special issue and book aims to examine the importance of football in South African society, revealing how the black oppression transformed a colonial game into a force for political, cultural and social liberation. It explores how the hosting of the 2010 World Cup aims to enhance the prestige of the post-apartheid nation, to generate economic growth and stimulate Pan-African pride. Among the themes dealt with are race and racism, class and gender dynamics, social identities, mass media and culture, and globalization. This collection of original and insightful essays will appeal to specialists in African Studies, Cultural Studies, and Sport Studies, as well as to non-specialist readers seeking to inform themselves ahead of the 2010 World Cup. This book was published as a special issue of Soccer and Society. 1. Introduction Peter Alegi and Chris Bolsmann Part 1: Past is Prologue – History of Football in South Africa 2. Football as Code: The Social Diffusion of ‘Soccer’ in South Africa Lloyd Hill 3. White Football in South Africa: Empire, Apartheid and Change, 1892 – 1977 Chris Bolsmann 4. A Biography of Darius Dhlomo: Transnational Footballer in the Era of Apartheid Peter Alegi 5. Women and Gender in South African Soccer Cynthia Fabrizio Pelak Part 2: Football Culture after Apartheid: Local and Transnational Dynamics 6. "You Must Support Chiefs: Pirates Already Have Two White Fans!" Race and Racial Discourse in South African Football Fandom Marc Fletcher 7. "It wasn’t that I did not like South African Football": Media, History, and Biography Sean Jacobs 8. Soccer in a Rugby Town: Restructuring Football in Stellenbosch Sylvain Cubizolles 9. Differing Trajectories: Football Development and Patterns of Player Migration in South Africa and Ghana Paul Darby and Eirik Solberg Part 3: The 2010 World Cup: Challenges and Opportunities 10. Football's Tsars: Proprietorship, Corporatism and Politics in the 2010 FIFA World Cup Scarlett Cornelissen 11. Sports as Cultural Diplomacy: The 2010 FIFA World Cup in South Africa’s Foreign Policy Sifiso Mxolisi Ndlovu 12. World Cup 2010: Africa’s Turn or the Turn on Africa? Ashwin Desai and Goolam Vahed 13. The 2010 FIFA World Cup: Critical Voices From Below Percy Ngonyama.
Resumo:
Word of mouth (WOM) communication is a major part of online consumer interactions, particularly within the environment of online communities. Nevertheless, existing (offline) theory may be inappropriate to describe online WOM and its influence on evaluation and purchase.The authors report the results of a two-stage study aimed at investigating online WOM: a set of in-depth qualitative interviews followed by a social network analysis of a single online community. Combined, the results provide strong evidence that individuals behave as if Web sites themselves are primary "actors" in online social networks and that online communities can act as a social proxy for individual identification. The authors offer a conceptualization of online social networks which takes the Web site into account as an actor, an initial exploration of the concept of a consumer-Web site relationship, and a conceptual model of the online interaction and information evaluation process. © 2007 Wiley Periodicals, Inc. and Direct Marketing Educational Foundation, Inc.