scholarly journals Methodological Proposal for the Detection of the Composing Elements of Vulnerability Regarding Disinformation

Publications ◽  
2021 ◽  
Vol 9 (4) ◽  
pp. 44
Author(s):  
Belén Puebla-Martínez ◽  
Nuria Navarro-Sierra ◽  
Gema Alcolea-Díaz

We live in a hyper-informed society that is constantly being fed with information stimuli. That information may not be correct, and society may be vulnerable to it. We present a methodological proposal with a mixed approach that allows the learning of the characteristics and weaknesses of news consumers in the face of disinformation. Said methodology moves away from the traditional model, and with it a new, much more complete and complex way of conducting discussion groups is carried out. The qualitative approach is carried out through the creation of an online community in which subjects are encouraged to participate in different activities and tests. On the other hand, in order to obtain quantitative data, a quasi-experimental survey where respondents are exposed to various stimuli created ad hoc, which seeks to measure the interest and credibility of different news items through an orthogonal design, is carried out. The use of this methodology will allow for an expansive and intensive approach to the knowledge of societal vulnerability factors, and with the subsequent results, a solid basis of disinformation can be established, which will allow for the development of a series of strategies to combat disinformation.

First Monday ◽  
2017 ◽  
Author(s):  
Jennifer Golbeck ◽  
Summer Ash ◽  
Nicole Cabrera

In the face of many cases of sexism within the sciences, scientists have turned to Twitter with hashtags to address the issue. Popular hashtags include #distractinglySexy, #iLookLikeAnEngineer, and #girlsWithToys. In this study, we set out to investigate why people were reading and using these hashtags and what impact it had on them. We administered a survey, which contained multiple choice and free response questions, to 83 people who had read or used these hashtags. We found that the hashtags ended up serving as an ad hoc online community in which participants found a space of social support. Building an improved sense of awareness was also an important reason for and outcome of participation. We examine the role of hashtags as ad hoc online communities on Twitter and the affects that they have for participants.


2019 ◽  
Vol 286 (4) ◽  
pp. 438-448 ◽  
Author(s):  
B. H. Shaw ◽  
L. E. Stiles ◽  
K. Bourne ◽  
E. A. Green ◽  
C. A. Shibao ◽  
...  

2021 ◽  
Vol 13 (14) ◽  
pp. 7887
Author(s):  
Verónica Muñoz-Arroyave ◽  
Miguel Pic ◽  
Rafael Luchoro-Parrilla ◽  
Jorge Serna ◽  
Cristòfol Salas-Santandreu ◽  
...  

The aim of this research was to study from a multidimensional point of view (decisional, relational and energetic) the interpersonal relationships established by girls and boys in the traditional sport game of Elbow Tag. Scientific evidence has shown that Traditional Sport Games (TSG) trigger different effects on male and female genders in relation to emotional experiences, decision-making, conflicts and motor relationships. Despite the fact that these dimensions are intertwined, there are hardly any studies that interpret motor behaviors holistically, i.e., taking a multidimensional (360°) view of these dimensions. For this study, a quasi-experimental design was used and a type III design was applied, inspired by the observational methodology N/P/M. A total of 147 university students participated (M = 19.6, SD = 2.3): 47 girls (31.97%) and 100 boys (68.02%). A mixed ‘ad hoc’ registration system was designed with acceptable margins of data quality. Cross-tabulations, classification trees and T-patterns analysis were applied. The results indicated that social interactions between girls and boys in a mixed group were unequal. This difference was mainly due to decision-making (sub-role variable), which has much greater predictive power than the energetic variables (MV and steps).


Author(s):  
A. Dragun

The general issue of forest use has been highly contentious in Victoria and considerable human effort has been exerted to establish the “best” use of forests. This economic, bureaucratic and political contemplation has yielded a multitude of different policy prescriptions with quite variable efficiency and equity outcomes. However, a feature of the analysis is that nowhere-on the grounds of efficiency or equity-is forestry logging the clearly desired outcome. Yet in the face of insurmountable evidence against logging, governments in Victoria prevaricate over making a formal decision not to log the forests-in fact the ad hoc approach to forest management favours the established forest interests. Clearly the narrow economic power and interests of a few logging companies are sufficient to counterbalance the much greater-but diffuse-well being of the many citizens in the state.


Author(s):  
Indrajit Ray ◽  
Indrakshi Ray ◽  
Sudip Chakraborty

Ad hoc collaborations often necessitate impromptu sharing of sensitive information or resources between member organizations. Each member of resulting collaboration needs to carefully assess and tradeoff the requirements of protecting its own sensitive information against the requirements of sharing some or all of them. The challenge is that no policies have been previously arrived at for such secure sharing (since the collaboration has been formed in an ad hoc manner). Thus, it needs to be done based on an evaluation of the trustworthiness of the recipient of the information or resources. In this chapter, the authors discuss some previously proposed trust models to determine if they can be effectively used to compute trustworthiness for such sharing purposes in ad hoc collaborations. Unfortunately, none of these models appear to be completely satisfactory. Almost all of them fail to satisfy one or more of the following requirements: (i) well defined techniques and procedures to evaluate and/or measure trust relationships, (ii) techniques to compare and compose trust values which are needed in the formation of collaborations, and (iii) techniques to evaluate trust in the face of incomplete information. This prompts the authors to propose a new vector (we use the term “vector” loosely; vector in this work means a tuple) model of trust that is suitable for reasoning about the trustworthiness of systems built from the integration of multiple subsystems, such as ad hoc collaborations. They identify three parameters on which trust depends and formulate how to evaluate trust relationships. The trust relationship between a truster and a trustee is associated with a context and depends on the experience, knowledge, and recommendation that the truster has with respect to the trustee in the given context. The authors show how their model can measure trust in a given context. Sometimes enough information is not available about a given context to calculate the trust value. Towards this end the authors show how the relationships between different contexts can be captured using a context graph. Formalizing the relationships between contexts allows us to extrapolate values from related contexts to approximate a trust value of an entity even when all the information needed to calculate the trust value is not available. Finally, the authors develop formalisms to compare two trust relationships and to compose two or more of the same – features that are invaluable in ad hoc collaborations.


2018 ◽  
pp. 122-140 ◽  
Author(s):  
Hille Paakkunainen
Keyword(s):  
Ad Hoc ◽  

Instrumentalist and teleologist views in metaepistemology hold that epistemic reasons are goal-relative or value-relative. In the face of counterexamples involving apparently pointless or counterproductive beliefs that are nonetheless supported by excellent epistemic reasons, some have retreated to the following view: while even pointless or counterproductive beliefs can be supported by excellent epistemic reasons in a not-genuinely-normative sense, we can have genuinely normative epistemic reasons only for beliefs that do serve some goal or value. In this chapter doubts are raised about the distinction between genuinely normative and not-genuinely-normative epistemic reasons employed here. It is suggested that there’s no real need or intuitive motivation for the distinction, beyond the ad hoc need of salvaging instrumentalist and teleologist views from counterexamples. The sense in which all epistemic reasons—even reasons for apparently pointless or counterproductive beliefs—seem to be equally normative is explained; and the implications for instrumentalists and teleologists are outlined.


2019 ◽  
Vol 71 (2) ◽  
pp. 195-216 ◽  
Author(s):  
Wen-Chin Tsao ◽  
Tz-Chi Mau

Purpose Consumer-generated online product reviews (OPRs) have become a crucial source of information for consumers; however, OPRs are increasingly being incentivized. The purpose of this paper is to find a method of sponsorship and disclosure that could be considered ethically sound. Design/methodology/approach This study adopted a quasi-experimental approach to clarifying how the method of sponsorship impacts reader perceptions of OPRs in terms of helpfulness, credibility and purchase intention. Two experiments were performed on an online platform using data from 480 participants. Hypotheses were tested using analysis of covariance. Findings Meaning under the premise that sponsorship information is disclosed and not withheld from the readers, Study 1 revealed that experiential sponsorship is the best sponsorship. Study 2 revealed that featuring reviewers with greater influence in the online community increases the positive influence of disclosing experiential sponsorship on OPR persuasiveness. Originality/value The findings in this study provide rational incentives for firms to disclose sponsorship information, i.e. demonstrate high ethical standards in marketing. This was shown to create a win-win-win situation for consumers, firms and reviewers. Managerial implications for online marketing managers are also discussed.


2018 ◽  
Vol 16 (3) ◽  
pp. 18-45 ◽  
Author(s):  
Yu-Tzu Lin ◽  
Cheng-Chih Wu ◽  
Chiung-Fang Chiu

This article explores the feasibility of employing cooperative program editing tools in teaching programming. A quasi-experimental study was conducted, in which the experimental group co-edited the programs with peers using the wiki. The control group co-edited the programs with peers using only the face-to-face approach. The findings show that the co-editing platform was effective in assisting collaborative learning of programming, especially for program implementation. By observing editing histories, students could compare programs and then reflect more deeply about programming. The use of the wiki history tool also helped to illuminate nonlinear and dynamic procedures utilized in programming. Students who engaged more in the collaborative programming or interacted more with partners on the wiki showed greater program implementation achievements. The major benefit of using the wiki was the enhanced ability to observe the dynamic programming procedure and to encounter programming conflicts, which contributed to the process of procedural knowledge acquisition and elaboration.


Author(s):  
Beth Van Schaack

This book situates the war in Syria within the actual and imagined system of international criminal justice. It explores the legal impediments and diplomatic challenges that have led to the fatal trinity that is Syria: the massive commission of international crimes that are subject to detailed investigations and documentation but whose perpetrators have enjoyed virtually complete impunity. The book tracks a number of accountability solutions to this tragic state of affairs that are being explored within multilateral gatherings, by states, and by civil society actors, including innovations of institutional design; the reactivation of a range of domestic jurisdictional principles (including universal jurisdiction in Europe); the emergence of creative investigative and documentation techniques, technologies, and organizations; and the rejection of state consent as a precondition for the exercise of jurisdiction. Engaging both law and policy around international justice, the text offers a set of justice blueprints, within and without the International Criminal Court. It also considers the utility, propriety, and practicality of establishing an ad hoc tribunal and pursuing a transitional justice program without a genuine political transition. All told, the book attempts to capture the creative energy radiating from members of the international community intent on advancing the accountability norm in Syria even in the face of geopolitical blockages within the U.N. Security Council. In so doing, it presents the range of juridical measures—both criminal and civil—that are available to the international community to respond to the crisis, if only the political will existed.


Sign in / Sign up

Export Citation Format

Share Document