scholarly journals Thinking Outside the Circle: The Geistkreis and the Viennese “Kreis Culture” in America

2021 ◽  
pp. 1-27
Author(s):  
Ohad Reiss-Sorokin

Besides their ideas and social networks, émigré intellectuals bring with them practices for engagement with intellectual work. This article focuses on one such practice: the intellectual Kreis [circle]. It focuses on the Geistkreis, an interwar Viennese interdisciplinary intellectual circle. Based on archival research, the article uses a number of case studies to show that the Kreis was employed by the Viennese émigrés as a mental scheme and as a recipe for action. It argues that the émigrés’ adherence to the Kreis structure explains the friction between them and their hosts. By following the attempts of former Geistkreis members to create Kreis-like institutions in America, the article shows that the Kreis was more than mere organizational form. It represented an epistemical commitment to knowledge making as a collective effort, and the preference of general theoretical knowledge over specialized research. It also entailed an intermingling of “work” and “life” that did not conform to American norms.

Author(s):  
Claire Taylor

Chapter 4 examines poverty dynamics in three distinct ways: (i) through an examination of conjunctural aspects of poverty and the events that are described as precipitating hardship, (ii) through a discussion of chronic poverty as social re-categorization, and (iii) through an exploration of gendered aspects of poverty. Together these case studies demonstrate that the discourses of poverty discussed in Chapter 2 are contested by the penetes themselves, e.g. women were able to use their social networks to resist the discourses that devalued their labour.


Author(s):  
Siobhan Keenan

The Progresses, Processions, and Royal Entries of King Charles I, 1625–1642 is the first book-length study of the history, and the political and cultural significance, of the progresses, public processions, and royal entries of Charles I. As well as offering a much fuller account of the king’s progresses and progress entertainments than currently exists, this study throws new light on one of the most vexed topics in early Stuart historiography—the question of Charles I’s accessibility to his subjects and their concerns, and the part that this may, or may not, have played in the conflicts which culminated in the English civil wars and Charles’s overthrow. Drawing on extensive archival research, the book opens with an introduction to the early modern culture of royal progresses and public ceremonial as inherited and practised by Charles I. Part I explores the question of the king’s accessibility and engagement with his subjects further through case studies of Charles’s ‘great’ progresses in 1633, 1634, and 1636. Part II turns attention to royal public ceremonial culture in Caroline London, focusing on Charles’s royal entry on 25 November 1641. More widely travelled than his ancestors, Progresses reveals a monarch who was only too well aware of the value of public ceremonial and who did not eschew it, even if he was not always willing to engage in ceremonial dialogue with his people or able to deploy the power of public display to curry support for his policies as successfully as his Tudor and Stuart predecessors.


2018 ◽  
Vol 2018 ◽  
pp. 1-22 ◽  
Author(s):  
Shuang Zhao ◽  
Xiapu Luo ◽  
Xiaobo Ma ◽  
Bo Bai ◽  
Yankang Zhao ◽  
...  

Proximity-based apps have been changing the way people interact with each other in the physical world. To help people extend their social networks, proximity-based nearby-stranger (NS) apps that encourage people to make friends with nearby strangers have gained popularity recently. As another typical type of proximity-based apps, some ridesharing (RS) apps allowing drivers to search nearby passengers and get their ridesharing requests also become popular due to their contribution to economy and emission reduction. In this paper, we concentrate on the location privacy of proximity-based mobile apps. By analyzing the communication mechanism, we find that many apps of this type are vulnerable to large-scale location spoofing attack (LLSA). We accordingly propose three approaches to performing LLSA. To evaluate the threat of LLSA posed to proximity-based mobile apps, we perform real-world case studies against an NS app named Weibo and an RS app called Didi. The results show that our approaches can effectively and automatically collect a huge volume of users’ locations or travel records, thereby demonstrating the severity of LLSA. We apply the LLSA approaches against nine popular proximity-based apps with millions of installations to evaluate the defense strength. We finally suggest possible countermeasures for the proposed attacks.


Africa ◽  
2000 ◽  
Vol 70 (3) ◽  
pp. 422-441 ◽  
Author(s):  
Douglas Anthony

AbstractBefore the civil war, conversion to Islam for Igbo men resident in the predominantly Hausa city of Kano in northern Nigeria usually meant becoming Hausa. More recent converts, however, have retained their Igbo identity and created an organisation, the Igbo Muslim Community. Three case studies from the first group detail the process and criteria of becoming Hausa, including immersion in Hausa economic and social networks; three case studies from the second group demonstrate that, while Hausa-centred networks remain important, converts have worked to construct new, Igbo-centred support structures. The watershed in the changing relationship between religious and ethnic affiliation for Igbo converts is the end of the war in 1970 and resultant changes in Igbo perceptions of Muslims, and changes in Igbo community structures.


2020 ◽  
Author(s):  
Manoel Horta Ribeiro ◽  
Virgílio A. F. Almeida ◽  
Wagner Meira Jr

The popularization of Online Social Networks has changed the dynamics of content creation and consumption. In this setting, society has witnessed an amplification in phenomena such as misinformation and hate speech. This dissertation studies these issues through the lens of users. In three case studies in social networks, we: (i) provide insight on how the perception of what is misinformation is altered by political opinion; (ii) propose a methodology to study hate speech on a user-level, showing that the network structure of users can improve the detection of the phenomenon; (iii) characterize user radicalization in far-right channels on YouTube through time, showing a growing migration towards the consumption of extreme content in the platform.


Author(s):  
Christopher C. Fennell

These case studies of the Virginia and Illinois regions have been presented with diverging themes of ethnicities and racism. At a practical level, analytic concepts of ethnicities can be employed effectively to understand some places, times, and populations. One should expect change in these social networks, often within just a few decades. For other times, locations, and communities, the impacts of racial ideologies make the analysis of racism a more productive approach. That contrast of ethnicity and racism arises in larger-scale debates concerning the usefulness of these two conceptual frameworks. Researchers have frequently examined the question of whether an analytic concept of racism is better replaced by concepts of ethnic group relations. No consensus has emerged over decades of debates. Scholars in some regions are affected by “post-racial” political agendas that influence them to depart from the terminology of racism in favor of alternative concepts of ethnicities. Such initiatives have impacted researchers in South Africa. They often frame their research within the broader social context of the post-racial policies of the Mandela presidency and later administrations. The U.S. certainly has not entered such a post-racial era.


Author(s):  
Dorothy E. Denning

This chapter examines the emergence of social networks of non-state warriors launching cyber attacks for social and political reasons. It examines the origin and nature of these networks; their objectives, targets, tactics, and use of online forums; and their relationship, if any, to their governments. General concepts are illustrated with case studies drawn from operations by Strano Net, the Electronic Disturbance Theater, the Electrohippies, and other networks of cyber activists; electronic jihad as practiced by those affiliated with al-Qa’ida and the global jihadist movement associated with it; and operations by patriotic hackers from China, Russia, and elsewhere.


Author(s):  
David Knoke

This chapter explains how international terror networks, consisting of individuals and organizations spanning countries and continents, form and evolve. It describes tools and methods used by social network analysts to study such networks; their applications by counterterrorist organizations; their limitations and problems in data collection and analysis; and directions for future research. It also discusses a few recent case studies by prominent researchers.


Sign in / Sign up

Export Citation Format

Share Document