scholarly journals Multifaith Third Spaces: Digital Activism, Netpeace, and the Australian Religious Response to Climate Change

Religions ◽  
2020 ◽  
Vol 11 (3) ◽  
pp. 105 ◽  
Author(s):  
Geraldine Smith ◽  
Anna Halafoff

Multifaith spaces typically imply sites where people of diverse faith traditions gather to participate in shared activities or practices, such as multifaith prayer rooms, multifaith art exhibitions, or multifaith festivals. Yet, there is a lack of literature that discusses online multifaith spaces. This paper focuses on the website of an Australian multifaith organisation, the Australian Religious Response to Climate Change (ARRCC), which we argue is a third space of digital activism. We begin by outlining the main aims of the multifaith movement and how it responds to global risks. We then review religion and geography literature on space, politics and poetics, and on material religion and embodiment. Next, we discuss third spaces and digital activism, and then present a thematic and aesthetic analysis on the ARRCC website drawing on these theories. We conclude with a summary of our main findings, arguing that mastery of the online realm through digital third spaces and activism, combined with a willingness to partake in “real-world”, embodied activism, can assist multifaith networks and social networks more generally to develop Netpeace and counter the risks of climate change collaboratively.

Author(s):  
Marc J. Stern

This chapter covers systems theories relevant to understanding and working to enhance the resilience of social-ecological systems. Social-ecological systems contain natural resources, users of those resources, and the interactions between each. The theories in the chapter share lessons about how to build effective governance structures for common pool resources, how to facilitate the spread of worthwhile ideas across social networks, and how to promote collaboration for greater collective impacts than any one organization alone could achieve. Each theory is summarized succinctly and followed by guidance on how to apply it to real world problem solving.


Author(s):  
Holly Lawford-Smith ◽  
William Tuckwell

According to act-consequentialism, only actions that make a difference to an outcome can be morally bad. Yet, there are classes of actions that don’t make a difference, but nevertheless seem to be morally bad. Explaining how such non-difference making actions are morally bad presents a challenge for act-consequentialism: the no-difference challenge. In this chapter we go into detail on what the no-difference challenge is, focusing in particular on act consequentialism. We talk about how different theories of causation affect the no-difference challenge; how the challenge shows up in real-world cases, including voting, global labor injustice, global poverty, and climate change; and we work through a number of the solutions to the challenge that have been offered, arguing that many fail to actually meet it. We defend and extend one solution that does, and we present a further solution of our own.


2018 ◽  
Vol 2018 ◽  
pp. 1-22 ◽  
Author(s):  
Shuang Zhao ◽  
Xiapu Luo ◽  
Xiaobo Ma ◽  
Bo Bai ◽  
Yankang Zhao ◽  
...  

Proximity-based apps have been changing the way people interact with each other in the physical world. To help people extend their social networks, proximity-based nearby-stranger (NS) apps that encourage people to make friends with nearby strangers have gained popularity recently. As another typical type of proximity-based apps, some ridesharing (RS) apps allowing drivers to search nearby passengers and get their ridesharing requests also become popular due to their contribution to economy and emission reduction. In this paper, we concentrate on the location privacy of proximity-based mobile apps. By analyzing the communication mechanism, we find that many apps of this type are vulnerable to large-scale location spoofing attack (LLSA). We accordingly propose three approaches to performing LLSA. To evaluate the threat of LLSA posed to proximity-based mobile apps, we perform real-world case studies against an NS app named Weibo and an RS app called Didi. The results show that our approaches can effectively and automatically collect a huge volume of users’ locations or travel records, thereby demonstrating the severity of LLSA. We apply the LLSA approaches against nine popular proximity-based apps with millions of installations to evaluate the defense strength. We finally suggest possible countermeasures for the proposed attacks.


2022 ◽  
Vol 40 (2) ◽  
pp. 1-23
Author(s):  
Sheng Zhou ◽  
Xin Wang ◽  
Martin Ester ◽  
Bolang Li ◽  
Chen Ye ◽  
...  

User recommendation aims at recommending users with potential interests in the social network. Previous works have mainly focused on the undirected social networks with symmetric relationship such as friendship, whereas recent advances have been made on the asymmetric relationship such as the following and followed by relationship. Among the few existing direction-aware user recommendation methods, the random walk strategy has been widely adopted to extract the asymmetric proximity between users. However, according to our analysis on real-world directed social networks, we argue that the asymmetric proximity captured by existing random walk based methods are insufficient due to the inbalance in-degree and out-degree of nodes. To tackle this challenge, we propose InfoWalk, a novel informative walk strategy to efficiently capture the asymmetric proximity solely based on random walks. By transferring the direction information into the weights of each step, InfoWalk is able to overcome the limitation of edges while simultaneously maintain both the direction and proximity. Based on the asymmetric proximity captured by InfoWalk, we further propose the qualitative (DNE-L) and quantitative (DNE-T) directed network embedding methods, capable of preserving the two properties in the embedding space. Extensive experiments conducted on six real-world benchmark datasets demonstrate the superiority of the proposed DNE model over several state-of-the-art approaches in various tasks.


2020 ◽  
Author(s):  
Joseph Bayer ◽  
Neil Anthony Lewis ◽  
Jonathan Stahl

Much remains unknown about moment-to-moment social-network cognition — that is, who comes to mind as we go about our day-to-day lives. Responding to this void, we describe the real-time construction of cognitive social networks. First, we outline the types of relational structures that comprise momentary networks, distinguishing the roles of personal relationships, social groups, and mental sets. Second, we discuss the cognitive mechanisms that determine which individuals are activated — and which are neglected — through a dynamic process. Looking forward, we contend that these overlooked mechanisms need to be considered in light of emerging network technologies. Finally, we chart the next steps for understanding social-network cognition across real-world contexts, along with the built-in implications for social resources and intergroup disparities.


2018 ◽  
Vol 45 (2) ◽  
pp. 156-168 ◽  
Author(s):  
Mahsa Seifikar ◽  
Saeed Farzi

Recently, social networks have provided an important platform to detect trends of real-world events. The trends of real-world events are detected by analysing flow of massive bulks of data in continuous time steps over various social media platforms. Today, many researchers have been interested in detecting social network trends, in order to analyse the gathered information for enabling users and organisations to satisfy their information need. This article is aimed at complete surveying the recent text-based trend detection approaches, which have been studied from three perspectives (algorithms, dimension and diversity of events). The advantages and disadvantages of the considered approaches have also been paraphrased separately to illustrate a comprehensive view of the previous works and open problems.


2013 ◽  
pp. 446-464 ◽  
Author(s):  
Ana Paula Appel ◽  
Christos Faloutsos ◽  
Caetano Traina Junior

Graphs appear in several settings, like social networks, recommendation systems, computer communication networks, gene/protein biological networks, among others. A large amount of graph patterns, as well as graph generator models that mimic such patterns have been proposed over the last years. However, a deep and recurring question still remains: “What is a good pattern?” The answer is related to finding a pattern or a tool able to help distinguishing between actual real-world and fake graphs. Here we explore the ability of ShatterPlots, a simple and powerful algorithm to tease out patterns of real graphs, helping us to spot fake/masked graphs. The idea is to force a graph to reach a critical (“Shattering”) point, randomly deleting edges, and study its properties at that point.


Author(s):  
Agostino Poggi ◽  
Michele Tomaiuolo

Social web sites are used daily by many millions of users. They have attracted users with very weak interest in technology, including absolute neophytes of computers in general. Common users of social web sites often have a carefree attitude in sharing information. Moreover, some system operators offer sub-par security measures, which are not adequate for the high value of the published information. For all these reasons, online social networks suffer more and more attacks by sophisticated crackers and scammers. To make things worse, the information gathered from social web sites can trigger attacks to even more sensible targets. This work reviews some typical social attacks that are conducted on social networking systems, describing real-world examples of such violations and analyzing in particular the weakness of password mechanisms. It then presents some solutions that could improve the overall security of the systems.


2013 ◽  
pp. 103-120
Author(s):  
Giuseppe Berio ◽  
Antonio Di Leva ◽  
Mounira Harzallah ◽  
Giovanni M. Sacco

The exploitation and integration of social network information in a competence reference model (CRAI, Competence, Resource, Aspect, Individual) are discussed. The Social-CRAI model, which extends CRAI to social networks, provides an effective solution to this problem and is discussed in detail. Finally, dynamic taxonomies, a model supporting explorative conceptual search, are introduced and their use in the context of the Social-CRAI model for exploring retrieved information available in social networks is discussed. A real-world example is provided.


Author(s):  
Yingzi Jin ◽  
Yutaka Matsuo

Previous chapters focused on the models of static networks, which consider a relational network at a given point in time. However, real-world social networks are dynamic in nature; for example, friends of friends become friends. Social network research has, in recent years, paid increasing attention to dynamic and longitudinal network analysis in order to understand network evolution, belief formation, friendship formation, and so on. This chapter focuses mainly on the dynamics and evolutional patterns of social networks. The chapter introduces real-world applications and reviews major theories and models of dynamic network mining.


Sign in / Sign up

Export Citation Format

Share Document