Experiencing Penia

Author(s):  
Claire Taylor

Chapter 4 examines poverty dynamics in three distinct ways: (i) through an examination of conjunctural aspects of poverty and the events that are described as precipitating hardship, (ii) through a discussion of chronic poverty as social re-categorization, and (iii) through an exploration of gendered aspects of poverty. Together these case studies demonstrate that the discourses of poverty discussed in Chapter 2 are contested by the penetes themselves, e.g. women were able to use their social networks to resist the discourses that devalued their labour.

2018 ◽  
Vol 2018 ◽  
pp. 1-22 ◽  
Author(s):  
Shuang Zhao ◽  
Xiapu Luo ◽  
Xiaobo Ma ◽  
Bo Bai ◽  
Yankang Zhao ◽  
...  

Proximity-based apps have been changing the way people interact with each other in the physical world. To help people extend their social networks, proximity-based nearby-stranger (NS) apps that encourage people to make friends with nearby strangers have gained popularity recently. As another typical type of proximity-based apps, some ridesharing (RS) apps allowing drivers to search nearby passengers and get their ridesharing requests also become popular due to their contribution to economy and emission reduction. In this paper, we concentrate on the location privacy of proximity-based mobile apps. By analyzing the communication mechanism, we find that many apps of this type are vulnerable to large-scale location spoofing attack (LLSA). We accordingly propose three approaches to performing LLSA. To evaluate the threat of LLSA posed to proximity-based mobile apps, we perform real-world case studies against an NS app named Weibo and an RS app called Didi. The results show that our approaches can effectively and automatically collect a huge volume of users’ locations or travel records, thereby demonstrating the severity of LLSA. We apply the LLSA approaches against nine popular proximity-based apps with millions of installations to evaluate the defense strength. We finally suggest possible countermeasures for the proposed attacks.


Africa ◽  
2000 ◽  
Vol 70 (3) ◽  
pp. 422-441 ◽  
Author(s):  
Douglas Anthony

AbstractBefore the civil war, conversion to Islam for Igbo men resident in the predominantly Hausa city of Kano in northern Nigeria usually meant becoming Hausa. More recent converts, however, have retained their Igbo identity and created an organisation, the Igbo Muslim Community. Three case studies from the first group detail the process and criteria of becoming Hausa, including immersion in Hausa economic and social networks; three case studies from the second group demonstrate that, while Hausa-centred networks remain important, converts have worked to construct new, Igbo-centred support structures. The watershed in the changing relationship between religious and ethnic affiliation for Igbo converts is the end of the war in 1970 and resultant changes in Igbo perceptions of Muslims, and changes in Igbo community structures.


2020 ◽  
Author(s):  
Manoel Horta Ribeiro ◽  
Virgílio A. F. Almeida ◽  
Wagner Meira Jr

The popularization of Online Social Networks has changed the dynamics of content creation and consumption. In this setting, society has witnessed an amplification in phenomena such as misinformation and hate speech. This dissertation studies these issues through the lens of users. In three case studies in social networks, we: (i) provide insight on how the perception of what is misinformation is altered by political opinion; (ii) propose a methodology to study hate speech on a user-level, showing that the network structure of users can improve the detection of the phenomenon; (iii) characterize user radicalization in far-right channels on YouTube through time, showing a growing migration towards the consumption of extreme content in the platform.


2013 ◽  
Author(s):  
Gerardo Franco Parrillat ◽  
Victor Hugo Perez ◽  
Isidro Soloaga

Author(s):  
Christopher C. Fennell

These case studies of the Virginia and Illinois regions have been presented with diverging themes of ethnicities and racism. At a practical level, analytic concepts of ethnicities can be employed effectively to understand some places, times, and populations. One should expect change in these social networks, often within just a few decades. For other times, locations, and communities, the impacts of racial ideologies make the analysis of racism a more productive approach. That contrast of ethnicity and racism arises in larger-scale debates concerning the usefulness of these two conceptual frameworks. Researchers have frequently examined the question of whether an analytic concept of racism is better replaced by concepts of ethnic group relations. No consensus has emerged over decades of debates. Scholars in some regions are affected by “post-racial” political agendas that influence them to depart from the terminology of racism in favor of alternative concepts of ethnicities. Such initiatives have impacted researchers in South Africa. They often frame their research within the broader social context of the post-racial policies of the Mandela presidency and later administrations. The U.S. certainly has not entered such a post-racial era.


Author(s):  
Dorothy E. Denning

This chapter examines the emergence of social networks of non-state warriors launching cyber attacks for social and political reasons. It examines the origin and nature of these networks; their objectives, targets, tactics, and use of online forums; and their relationship, if any, to their governments. General concepts are illustrated with case studies drawn from operations by Strano Net, the Electronic Disturbance Theater, the Electrohippies, and other networks of cyber activists; electronic jihad as practiced by those affiliated with al-Qa’ida and the global jihadist movement associated with it; and operations by patriotic hackers from China, Russia, and elsewhere.


Author(s):  
David Knoke

This chapter explains how international terror networks, consisting of individuals and organizations spanning countries and continents, form and evolve. It describes tools and methods used by social network analysts to study such networks; their applications by counterterrorist organizations; their limitations and problems in data collection and analysis; and directions for future research. It also discusses a few recent case studies by prominent researchers.


Sign in / Sign up

Export Citation Format

Share Document