scholarly journals Influence of Personal Preferences on Link Dynamics in Social Networks

Complexity ◽  
2017 ◽  
Vol 2017 ◽  
pp. 1-12 ◽  
Author(s):  
Ashwin Bahulkar ◽  
Boleslaw K. Szymanski ◽  
Nitesh Chawla ◽  
Omar Lizardo ◽  
Kevin Chan

We study a unique network dataset including periodic surveys and electronic logs of dyadic contacts via smartphones. The participants were a sample of freshmen entering university in the Fall 2011. Their opinions on a variety of political and social issues and lists of activities on campus were regularly recorded at the beginning and end of each semester for the first three years of study. We identify a behavioral network defined by call and text data, and a cognitive network based on friendship nominations in ego-network surveys. Both networks are limited to study participants. Since a wide range of attributes on each node were collected in self-reports, we refer to these networks as attribute-rich networks. We study whether student preferences for certain attributes of friends can predict formation and dissolution of edges in both networks. We introduce a method for computing student preferences for different attributes which we use to predict link formation and dissolution. We then rank these attributes according to their importance for making predictions. We find that personal preferences, in particular political views, and preferences for common activities help predict link formation and dissolution in both the behavioral and cognitive networks.

2018 ◽  
Vol 7 (2.15) ◽  
pp. 72
Author(s):  
Wafa Zubair Al-Dyani ◽  
Adnan Hussein Yahya ◽  
Farzana Kabir Ahmad

The area of Event Detection (ED) has attracted researchers' attention over the last few years because of the wide use of social media.  Many studies have examined the problem of ED in various social media platforms, like Twitter, Facebook, YouTube, etc. The ED task for social networks involves many issues, including the processing of huge volumes of data with a high level of noise, data collection and privacy issues, etc.  Hence, this article discusses and presents the wide range of challenges encountered in the ED process from unstructured text data for the most popular Social Networks (SNs), such as Facebook and Twitter. The main goal is to aid the researchers to understand the main challenges and to discuss the future directions in the ED area. 


2021 ◽  
Vol 115 (3) ◽  
pp. 204-214
Author(s):  
Michele C. McDonnall ◽  
Zhen S. McKnight

Introduction: The purpose of this study was to investigate the effect of visual impairment and correctable visual impairment (i.e., uncorrected refractive errors) on being out of the labor force and on unemployment. The effect of health on labor force status was also investigated. Method: National Health and Nutrition Examination Survey (NHANES) data from 1999 to 2008 ( N = 15,650) was used for this study. Participants were classified into three vision status groups: normal, correctable visual impairment, and visual impairment. Statistical analyses utilized were chi-square and logistic regression. Results: Having a visual impairment was significantly associated with being out of the labor force, while having a correctable visual impairment was not. Conversely, having a correctable visual impairment was associated with unemployment, while having a visual impairment was not. Being out of the labor force was not significantly associated with health for those with a visual impairment, although it was for those with correctable visual impairments and normal vision. Discussion: Given previous research, it was surprising to find that health was not associated with being out of the labor force for those with visual impairments. Perhaps other disadvantages for the people with visual impairments identified in this study contributed to their higher out-of-the-labor-force rates regardless of health. Implications for practitioners: Researchers utilizing national data sets that rely on self-reports to identify visual impairments should realize that some of those who self-identify as being visually impaired may actually have correctable visual impairments. Current research is needed to understand why a majority of people with visual impairments are not seeking employment and have removed themselves from the labor force.


Cosmetics ◽  
2021 ◽  
Vol 8 (2) ◽  
pp. 48
Author(s):  
Carmen G. Sotelo ◽  
María Blanco ◽  
Patricia Ramos ◽  
José A. Vázquez ◽  
Ricardo I. Perez-Martin

Long life expectancy of populations in the developing world together with some cultural and social issues has driven the need to pay special attention to health and physical appearance. Cosmeceuticals are gaining interest in the cosmetic industry as their uses fulfills a double purpose: the requirements of a cosmetic (clean, perfume, protect, change the appearance of the external parts of the body or keeping them in good condition) with a particular bioactivity function. The cosmetics industry, producing both cosmetics and cosmeceuticals, is currently facing numerous challenges to satisfy different attitudes of consumers (vegetarianism, veganism, cultural or religious concerns, health or safety reasons, eco-friendly process, etc.). A currently growing trend in the market is the interest in products of low environmental impact. Marine origin ingredients are increasingly being incorporated into cosmeceutical preparations because they are able to address several consumer requirements and also due to the wide range of bioactivities they present (antioxidant, whitening, anti-aging, etc.). Many companies claim “Marine” as a distinctive marketing signal; however, only a few indicate whether they use sustainable ingredient sources. Sustainable marine ingredients might be obtained using wild marine biomass through a sustainable extractive fishing activity; by adopting valorization strategies including the use of fish discards and fish by-products; and by sustainably farming and culturing marine organisms.


2021 ◽  
Vol 11 (6) ◽  
pp. 260
Author(s):  
Jayson Parba

Engaging in critical dialogues in language classrooms that draw on critical pedagogical perspectives can be challenging for learners because of gaps in communicative resources in their L1 and L2. Since critically oriented classrooms involve discussing social issues, students are expected to deploy “literate talk” to engage in critiquing society and a wide range of texts. Although recent studies have explored teachers’ and students’ engagement with critical materials and critical dialogues, research that explores language development in critical language teaching remains a concern for language teachers. In this paper, I share my experience of fostering language development, specifically the overt teaching of critical vocabulary to students of (Tagalog-based) Filipino language at a university in Hawai’i. Through a discussion of racist stereotypes targeting Filipinos and the impacts of these discourses on students’ lived experiences, the notion of “critical vocabulary” emerges as an important tool for students to articulate the presence of and to dismantle oppressive structures of power, including everyday discourses supporting the status quo. This paper defines critical vocabulary and advances its theoretical and practical contribution to critical language teaching. It also includes students’ perspectives of their language development and ends with pedagogical implications for heritage/world language teachers around the world.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Eliada Pampoulou ◽  
Donald R. Fuller

PurposeWhen the augmentative and alternative communication (ACC) model (Lloyd et al., 1990) was proposed, these components of symbols were not considered, nor were they contemplated when superordinate (Lloyd and Fuller, 1986) and subordinate levels (Fuller et al., 1992) of AAC symbol taxonomy were developed. The purpose of this paper is to revisit the ACC model and propose a new symbol classification system called multidimensional quaternary symbol continuum (MQSC)Design/methodology/approachThe field of AAC is evolving at a rapid rate in terms of its clinical, social, research and theoretical underpinnings. Advances in assessment and intervention methods, technology and social issues are all responsible to some degree for the significant changes that have occurred in the field of AAC over the last 30 years. For example, the number of aided symbol collections has increased almost exponentially over the past couple of decades. The proliferation of such a large variety of symbol collections represents a wide range of design attributes, physical attributes and linguistic characteristics for aided symbols and design attributes and linguistic characteristics for unaided symbols.FindingsTherefore, it may be time to revisit the AAC model and more specifically, one of its transmission processes referred to as the means to represent.Originality/valueThe focus of this theoretical paper then, is on the current classification of symbols, issues with respect to the current classification of symbols in terms of ambiguity of terminology and the evolution of symbols, and a proposal for a new means of classifying the means to represent.Peer reviewThe peer review history for this article is available at: https://publons.com/publon10.1108/JET-04-2021-0024


2018 ◽  
Vol 17 (1) ◽  
pp. 160940691878345 ◽  
Author(s):  
Benjamin L. Read

Many qualitative social scientists conduct single-session interviews with large numbers of individuals so as to maximize the sample size and obtain a wide range of study participants. Yet in some circumstances, one-shot interviews cannot produce information of adequate quality, quantity, and validity. This article explains the several conditions that call for an alternative approach, serial interviewing, that entails interviewing participants on multiple occasions. This method is appropriate when studying complex or ill-defined issues, when interviews are subject to time constraints, when exploring change or variation over time, when participants are reluctant to share valid information, and when working with critical informants. A further benefit is the opportunity it provides for verifying and cross-checking information. This article delineates the general features of this technique. Through a series of encounters, the researcher builds familiarity and trust, probes a range of key topics from multiple angles, explores different facets of participants’ experiences, and learns from events that happen to take place during the interviews. This helps overcome biases associated with one-off interviews, including a tendency toward safe, simple answers in which participants flatten complexity, downplay sociopolitical conflict, and put themselves in a flattering light. This article illustrates the utility of this approach through examples drawn from published work and through a running illustration based on the author’s research on elected neighborhood leaders in Taipei. Serial interviewing helped produce relatively accurate and nuanced data concerning the power these leaders wield and their multiple roles as intermediaries between state and society.


2019 ◽  
Vol 10 ◽  
pp. 35
Author(s):  
Andrey  Rodrigues ◽  
Natasha  M. C. Valentim ◽  
Eduardo  Feitosa

In the last few years, Online Social Networks (OSN) have experienced growth in the number of users, becoming an increasingly embedded part of people’s daily lives. Privacy expectations of OSNs are higher as more members start realizing potential privacy problems they face by interacting with these systems. Inspection methods can be an effective alternative for addressing privacy problems because they detect possible defects that could be causing the system to behave in an undesirable way. Therefore, we proposed a set of privacy inspection techniques called PIT-OSN (Privacy Inspection Techniques for Online Social Network). This paper presents the description and evolution of PIT-OSN through the results of a preliminary empirical study. We discuss the quantitative and qualitative results and their impact on improving the techniques. Results indicate that our techniques assist non-expert inspectors uncover privacy problems effectively, and are considered easy to use and useful by the study participants. Finally, the qualitative analysis helped us improve some technique steps that might be unclear.


2021 ◽  
Vol 9 (6) ◽  
pp. 13-25
Author(s):  
Michail Angelopoulos ◽  
Yannis Pollalis

This research focuses on providing insights for a solution for collecting, storing, analyzing and visualizing data from customer energy consumption patterns. The data analysis part of our research provides the models for knowledge discovery that can be used to improve energy efficiency at both producer and consumer ends. Τhe study sets a new analytical framework for assessing the role of behavioral knowledge in energy efficiency using a wide range of Case Studies, Experiments, Research, Information and Communication Technologies (ICT) in combination with the most modern econometric methods and large analytical data taking into account the characteristics of the study participants (household energy customers).


2020 ◽  
Vol 3 ◽  
pp. 40
Author(s):  
Mary Vincent Mosha ◽  
Elizabeth Kasagama ◽  
Philip Ayieko ◽  
Jim Todd ◽  
Sia E. Msuya ◽  
...  

Background: Self-reports are commonly used to assess physical activity in children.  Existing self-reports for physical activity have not been validated for use among primary school children in Kilimanjaro, Tanzania. In order to understand if primary school children can accurately report their physical activity, we examined the validity of self-reported physical activity against accelerometer measured physical activity. Methods: A community based cross-sectional study was conducted from May to July, 2018 among four primary schools in Moshi municipal and Moshi rural districts, Kilimanjaro, Tanzania.  A total of 51 primary school children aged 9–11 years were enrolled using a simple random sampling technique. A self-reported questionnaire was used to collect physical activity related variables. In addition, children wore accelerometers for seven consecutive days to capture physical activity movements. Spearman’s rank test and Bland Altman plots were used for assessing validity and agreement between self-reports and accelerometer moderate to vigorous physical activity (MVPA). Results: The mean age of the study participants was 10 (SD=0.8) years. Majority of the study participants were female 32 (63%). A moderate, positive correlation was found between self-reports and accelerometer MVPA (rho=0.36, p=0.009). Accelerometer had higher MVPA compared to self-reports. Children who reported walking to school had higher MVPA for both accelerometer and self- reports compared to children who use other means of transport to school, e.g. school buses (p < 0.001). Conclusions: This study found the moderate positive correlation between self-reports and accelerometers. Self-reports are prone to errors due to recall bias, and this interferes their validity.  More research is needed to develop better self-reported measures with specific activities which can easily be recalled by children. Also, researchers have to be aware of self-reports validity limitation.


Author(s):  
Yegireddi Ramesh ◽  
Kiran Kumar Reddi

With the enormous growth in the Internet and network, data security has become an inevitable concern for any organization. From antecedent security has attracted considerable attention from network researchers. In this perspective many possible fields of endeavour come to mind with many cryptographic algorithms in a broader way, each is highly worthy and lengthy. As society is moving towards digital information age we necessitate highly standard algorithms which compute faster when data size is of wide range or scope. On survey, numerous sequential approaches carried out by symmetric key algorithms on 128 bits as block size are ascertained to be highly in securable and resulting at a low speed. As in the course the commodities are immensely parallelized on multi core processors to solve computational problems, in accordance with, propound parallel symmetric key based algorithms to encrypt/decrypt large data for secure conveyance. The algorithm is aimed to prevail by considering 64 character (512 bits) plain text data, processed 16 characters separately by applying parallelism and finally combine each 16 character cipher data to form 64 character cipher text. The round function employed in the algorithm is very complex, on which improves efficacy.


Sign in / Sign up

Export Citation Format

Share Document