scholarly journals Does the internet affect assortative mating? Evidence from the U.S. and Germany

2017 ◽  
Vol 61 ◽  
pp. 278-297 ◽  
Author(s):  
Gina Potarca
2018 ◽  
Author(s):  
Reuben J. Thomas

Increases in the rates of interracial and interreligious couples within the U.S. have occurred seemingly in tandem with the rise of the Internet and online dating, but the evidence connecting online sources of romance and couple heterogeneity have been limited and mixed. Using a unique dataset collected in 2009 and again in 2017 on how U.S. couples met, and controlling for the diversity of their local geographies, I find that couples who met online are more likely to be interracial, interreligious, and of different college degree status, but also more similar in age. These differences can vary by where on the Internet couples met, with online dating websites and apps showing a clear effect on increased age assortativity, while other online sources of partners do not. Population-level estimates suggests that only a small part of the recent changes in couple diversity can be directly attributed to couples meeting online, but there is the potential for more Internet-induced change if it becomes the primary source of romantic introductions.


1997 ◽  
Vol 78 (3) ◽  
pp. 227-229
Author(s):  
N. V. Nemkova

In 1969, the U.S. created the ARPAnet computer network, linking the computer centers of the Department of Defense and several academic organizations. This network was designed for a narrow purpose: mainly to study how to communicate in the event of a nuclear attack and to help researchers exchange information. As this network grew, many other networks were created and developed.


There has been a neglect on the part of Western governments with focus on the U.S. to take seriously the internet campaign that ISIS has been waging since 2014 and the affective response that still draws citizens from across the world into their promise of a civilized, united nation for Muslims. It is possible that the West, even with a severely increased commitment to fighting the Islamic State, may be too late. This chapter will explore responses by Western governments including the United States to fight internet-enabled terrorism.


Author(s):  
Ping Lan ◽  
David C. Yen

There have been a very limited number of systematic studies of how a region is turning digital opportunities into a development force. In theory, major advances in information and communication technology (ICT) have successfully transformed traditional businesses and markets, revolutionized learning and knowledge-sharing, generated global information flows, and empowered citizens and communities in new ways to redefine governance (Afuah, 2003; Mullaney et al., 2003). At a regional level, this “digital revolution” could offer enormous opportunities to support sustainable local prosperity, and thus help to achieve the broader development goals (DOT Force, 2001). Alaska is one state that can be positioned to take advantage of Internet and e-commerce technologies. Isolated from the U.S. main economic centers and heavily reliant on the export of commodities in its economy, e-commerce or business via the Internet is an ideal choice for Alaska. However, the available statistics do not support this claim. Most economic indicators show a downward trend in Alaska since 1995, in spite of the fact that the federal government expenditure has been increasing (ASTF, 2002). This chapter is dedicated to measuring the usage of the Internet in Alaska. It hypothesizes that geographical limitations help a region like Alaska embrace ICT and its applications without much hesitation, but also hinders the region to fully exploit the potential of ICT due to the limitations of resources. A large-scale survey was conducted to reveal the characteristics of Internet usage among individuals, government agencies, local communities, and private firms in Alaska. This research is of interest in two aspects: It could offer help for policymakers and enterprises within Alaska to realize the potential development brought about by the current digital revolution, and it could help enterprises outside Alaska to target this market more effectively. Theoretically, it could shed light on issues related to technology adoption and local innovation. Besides that, the platform-dependent approach used in this research can be applied in a broader context.


2011 ◽  
pp. 1254-1265
Author(s):  
Michael Kyobe

Electronic communication developments have always been associated with many security risks since the ARPANET implementation in 1960s. In 1972, John Draper (Captain Crunch) unlocked the AT&T phone network marking the beginning of the modern technology of hacking. Later in the 1980s, the seminal developments in the U.S. laid the conceptual and practical foundation for future electronic crime tools such as trapdoors, trojans, and viruses. More recently in the Internet environment, electronic attacks have reached an epidemic level (US-CERT, 2004). In South Africa alone, over 500 Web sites were defaced in January 2005 and e-crime losses are estimated at around 40 billion a year.


Author(s):  
Mark Pearcy

America’s Army is a first-person “shooter” online video game produced by the U.S. Army and freely available on the Internet. Ostensibly a recruitment tool, the game constitutes a “mimetic” experience that encompasses real-life Army codes, regulations, and behaviors, approximating an authentic military experience, including realistic missions that involve violence. This article considers the educational role of such mimetic games, practical impediments to its inclusion in classrooms, and the conceptual demands the use of such games may place on teachers and students. Additionally, this article considers the ideological barriers and arguments against the educational use of games like America’s Army. Finally, this article connects the experience of America’s Army to Douglas’ (2008) concept of “playful hatred,” calling for a reconceptualization of the term towards a more competitive and pedagogically useful approach.


2008 ◽  
pp. 2704-2723
Author(s):  
Michael Kyobe

Electronic communication developments have always been associated with many security risks since the ARPANET implementation in 1960s. In 1972, John Draper (Captain Crunch) unlocked the AT&T phone network marking the beginning of the modern technology of hacking. Later in the 1980s, the seminal developments in the U.S. laid the conceptual and practical foundation for future electronic crime tools such as trapdoors, trojans, and viruses. More recently in the Internet environment, electronic attacks have reached an epidemic level (US-CERT, 2004). In South Africa alone, over 500 Web sites were defaced in January 2005 and e-crime losses are estimated at around 40 billion a year.


2011 ◽  
pp. 42-87
Author(s):  
Ashutosh Deshmukh

The Internet spins a vast web of information across the globe. Data and information flow freely — available to anyone for learning, understanding and analysis. Organizations can cooperate across departments, regions and countries. ERP II and ECM herald the era of intra- and inter-business collaboration. Sounds wonderful – what is the problem? The problem is as old as mainframe vs. PC and Windows vs. Macintosh. Data can move freely but are not standardized. Data streams have no universal meanings; consequently, data are not understood by all systems, analyzed easily, translated across different languages and human readable, among other things. Specialized hardware and software is needed for data decoding, and if the required tools are not available, then you are out of luck. This problem is not only confined to the Internet. A great deal of money (by one estimate, almost 20% of the U.S. gross national product) is spent on generating new information, and more than 90% of this information is in documents, not in databases. Businesses in the U.S. produce approximately 100 billion documents per year. This information is stored in various formats across a range of computer systems. These disparate storage formats cause severe problems in accessing, searching and distributing this information. Any solution (a combination of information technology products and services) that manages information across diverse software and hardware platforms must address a few key requirements. First, these solutions should be transparent to users. The technical details should not be handled by users. Second, users should be able to save data and information in the desired format; for example, databases, text files or proprietary formats. Third, a solution must intelligently retrieve data and information. This solution should be knowledgeable regarding meaning of the information itself. Finally, such solution should be capable of providing the desired output — print, screen, Web or CD/DVD format.


Sign in / Sign up

Export Citation Format

Share Document