9,287 research outputs found

    TURNING THE CORNER: IMPROVING LAW ENFORCEMENT PERCEPTION THROUGH MEDIA

    Get PDF
    Over the last several years, law enforcement’s image in the United States has been tarnished by the unlawful acts of a number of bad actors. These actions have negatively influenced the perception of law enforcement, particularly within some minority communities located in metropolitan cities nationwide. To strengthen its public profile, law enforcement is exploring methods to improve its image. This thesis investigates how law enforcement can develop positive social media exposure to improve police–community relations in the current social climate. Using qualitative and quantitative research, this thesis examined the different methods the Metropolitan Police Department of Washington, DC, the Boston Police Department, and the Portland Police Bureau used to develop positive social media exposure on Twitter directly before and after the murder of George Floyd on May 25, 2020. To assess the departments’ methods, this research analyzed their respective tweets by their frequency, method of posting, and the number of reactions they generated within this timeframe. As a result, this thesis finds that nationwide protests created significant exposure opportunities for law enforcement. This thesis concludes that to improve its image, law enforcement should continuously promote positive messaging on Twitter by highlighting positive work, conveying solidarity with the community, and exhibiting a willingness to work with the public.Civilian, State GovtApproved for public release. Distribution is unlimited

    Impacted Communities Leading Authentic Legal Mobilization: A Refugee-Led Access-To-Justice Story

    Get PDF
    (Excerpt) I have a modest proposal to begin addressing the civil access-to-justice problem in the United States: eliminate the barriers for refugees to provide legal representation. In discussions of access to civil justice, immigration and immigrant rights compel our attention—images of children as young as three facing deportation without representation and non-citizens detained because of civil immigration infractions come to mind. But we hear less about the access-to-justice challenges of immigrants fighting for their rights to safe housing, public benefits, education for their children, or often-contingent or under-the-table jobs. The cries of immigrant communities about informal and formal threats from immigration enforcement—and harassment and exploitation beyond the formal legal system—are rarely treated as civil access-to-justice problems. All of us who work with immigrants are forced to turn down most very needy potential immigration clients, despite knowing that there is nowhere else for them to go. To fill in the gaps, many hold meetings, conduct know-your-rights or organizing sessions, or try to write about complex immigration law issues in ways that people can understand—all of which make us feel better because we think it might do some good or narrow the breach in our unkept promise of fairness, due process of law, or the dignity of human possibility. All of us who do this work also meet people every day who have been refugees, are seeking asylum, or have otherwise encountered the immigration system—and who, given the chance and a little training, could do at least as well as immigration and human rights attorneys. In my more honest moments, I admit that they likely would do my job much better than I can. They might find ways to do that work differently, and my generation of immigration advocates must admit that, however much we tried to change the immigration system for the better, we failed. We were not prepared nor fit for the challenges of the Trump and Biden administrations. And even if we had, there will never be enough lawyers to satisfy immigrant communities’ needs, even if every lawyer had the knowledge, attitude, and commitment to do so—and fat chance of that

    Facilitating prosociality through technology: Design to promote digital volunteerism

    Get PDF
    Volunteerism covers many activities involving no financial rewards for volunteers but which contribute to the common good. There is existing work in designing technology for volunteerism in HumanComputer Interaction (HCI) and related disciplines that focuses on motivation to improve performance, but it does not account for volunteer wellbeing. Here, I investigate digital volunteerism in three case studies with a focus on volunteer motivation, engagement, and wellbeing. My research involved volunteers and others in the volunteering context to generate recommendations for a volunteer-centric design for digital volunteerism. The thesis has three aims: 1. To investigate motivational aspects critical for enhancing digital volunteers’ experiences 2. To identify digital platform attributes linked to volunteer wellbeing 3. To create guidelines for effectively supporting volunteer engagement in digital volunteering platforms In the first case study I investigate the design of a chat widget for volunteers working in an organisation with a view to develop a design that improves their workflow and wellbeing. The second case study investigates the needs, motivations, and wellbeing of volunteers who help medical students improve their medical communication skills. An initial mixed-methods study was followed by an experiment comparing two design strategies to improve volunteer relatedness; an important indicator of wellbeing. The third case study looks into volunteer needs, experiences, motivations, and wellbeing with a focus on volunteer identity and meaning-making on a science-based research platform. I then analyse my findings from these case studies using the lens of care ethics to derive critical insights for design. The key contributions of this thesis are design strategies and critical insights, and a volunteer-centric design framework to enhance the motivation, wellbeing and engagement of digital volunteers

    Endogenous measures for contextualising large-scale social phenomena: a corpus-based method for mediated public discourse

    Get PDF
    This work presents an interdisciplinary methodology for developing endogenous measures of group membership through analysis of pervasive linguistic patterns in public discourse. Focusing on political discourse, this work critiques the conventional approach to the study of political participation, which is premised on decontextualised, exogenous measures to characterise groups. Considering the theoretical and empirical weaknesses of decontextualised approaches to large-scale social phenomena, this work suggests that contextualisation using endogenous measures might provide a complementary perspective to mitigate such weaknesses. This work develops a sociomaterial perspective on political participation in mediated discourse as affiliatory action performed through language. While the affiliatory function of language is often performed consciously (such as statements of identity), this work is concerned with unconscious features (such as patterns in lexis and grammar). This work argues that pervasive patterns in such features that emerge through socialisation are resistant to change and manipulation, and thus might serve as endogenous measures of sociopolitical contexts, and thus of groups. In terms of method, the work takes a corpus-based approach to the analysis of data from the Twitter messaging service whereby patterns in users’ speech are examined statistically in order to trace potential community membership. The method is applied in the US state of Michigan during the second half of 2018—6 November having been the date of midterm (i.e. non-Presidential) elections in the United States. The corpus is assembled from the original posts of 5,889 users, who are nominally geolocalised to 417 municipalities. These users are clustered according to pervasive language features. Comparing the linguistic clusters according to the municipalities they represent finds that there are regular sociodemographic differentials across clusters. This is understood as an indication of social structure, suggesting that endogenous measures derived from pervasive patterns in language may indeed offer a complementary, contextualised perspective on large-scale social phenomena

    Startup Home-Based Social Media Businesses

    Get PDF
    Purpose: The objective of this study is to investigate and analyze issues faced by small-business owners while running their businesses via social media sites, and to emphasize the opportunities for conducting business via social media.   Theoretical framework:  Small businesses are vital to the success of any economy, through job creation, sparking innovation, and providing opportunities for many people to achieve financial success and independence. In today’s social media-driven environment, it is essential that small business’ owners engage with social media networking sites and understand how social media can play a crucial role in developing their businesses.   Design/methodology/approach: The research focuses on analyzing the day-to-day operations and procedures of small businesses involving social media networking sites. Two questionnaires were developed to analyze and investigate these issues effectively.   Findings:  The results reveal the importance of organizing the operations and procedures of social media businesses, also emphasize the opportunities for conducting business via social media sites.   Research, Practical & Social implications:  this study was conducted to help business owners to engage with social media sites, as well as to solve issues that they face while running their online businesses.   Originality/value: The results of the first questionnaire indicate issues from customers’ perspectives, while the second questionnaire indicate issues from merchants’ perspectives. The results reveal the importance of organizing the operations and procedures of social media businesses, also emphasize the opportunities for conducting business via social media sites

    The Viability and Potential Consequences of IoT-Based Ransomware

    Get PDF
    With the increased threat of ransomware and the substantial growth of the Internet of Things (IoT) market, there is significant motivation for attackers to carry out IoT-based ransomware campaigns. In this thesis, the viability of such malware is tested. As part of this work, various techniques that could be used by ransomware developers to attack commercial IoT devices were explored. First, methods that attackers could use to communicate with the victim were examined, such that a ransom note was able to be reliably sent to a victim. Next, the viability of using "bricking" as a method of ransom was evaluated, such that devices could be remotely disabled unless the victim makes a payment to the attacker. Research was then performed to ascertain whether it was possible to remotely gain persistence on IoT devices, which would improve the efficacy of existing ransomware methods, and provide opportunities for more advanced ransomware to be created. Finally, after successfully identifying a number of persistence techniques, the viability of privacy-invasion based ransomware was analysed. For each assessed technique, proofs of concept were developed. A range of devices -- with various intended purposes, such as routers, cameras and phones -- were used to test the viability of these proofs of concept. To test communication hijacking, devices' "channels of communication" -- such as web services and embedded screens -- were identified, then hijacked to display custom ransom notes. During the analysis of bricking-based ransomware, a working proof of concept was created, which was then able to remotely brick five IoT devices. After analysing the storage design of an assortment of IoT devices, six different persistence techniques were identified, which were then successfully tested on four devices, such that malicious filesystem modifications would be retained after the device was rebooted. When researching privacy-invasion based ransomware, several methods were created to extract information from data sources that can be commonly found on IoT devices, such as nearby WiFi signals, images from cameras, or audio from microphones. These were successfully implemented in a test environment such that ransomable data could be extracted, processed, and stored for later use to blackmail the victim. Overall, IoT-based ransomware has not only been shown to be viable but also highly damaging to both IoT devices and their users. While the use of IoT-ransomware is still very uncommon "in the wild", the techniques demonstrated within this work highlight an urgent need to improve the security of IoT devices to avoid the risk of IoT-based ransomware causing havoc in our society. Finally, during the development of these proofs of concept, a number of potential countermeasures were identified, which can be used to limit the effectiveness of the attacking techniques discovered in this PhD research

    Radical Left Parties and the Role of Euroscepticism

    Get PDF
    Globalization has shifted the political competition landscape in Western Europe. Extensive research has studied the impact of this on the radical right, yet little attention has been paid to the radical left. This dissertation, comprised of three papers, analyses the impact of the increased European integration emphasis on the radical left. My first paper analyses whether there is a beneficial policy position for the radical left on European integration. The chapter finds that there is an electoral benefit to a Eurosceptic position for radical left parties but also shows that this benefit is constrained when a Eurosceptic competitor, i.e. radical right party, enters the party system. My second paper follows from this and examines an alternative approach for the radical left on European integration. While the benefit of a Eurosceptic position can be constrained, blurring the position on European integration can help avoid losing pro-EU voters. The chapter finds that position blurring on EU integration is beneficial when there is electorate polarization but harmful when the electorate is in consensus on EU integration. When there is consensus, radical left parties benefit from a clear position on EU integration. My third paper is co-authored with Royce Carroll and zooms into the findings of the first two chapters by examining the demand side of Euroscepticism. The paper finds that European integration is an important issue for vote choice of the electorate. The results of the chapter show that the more Eurosceptic voters are, the higher their propensity to vote for a radical left party becomes. These three papers demonstrate how the issue of European integration is in the centre of radical left strategy from a supply and demand side perspective. This thesis contributes to the literature by providing a detailed understanding of the success of small parties beyond their issue ownership

    CITIES: Energetic Efficiency, Sustainability; Infrastructures, Energy and the Environment; Mobility and IoT; Governance and Citizenship

    Get PDF
    This book collects important contributions on smart cities. This book was created in collaboration with the ICSC-CITIES2020, held in San José (Costa Rica) in 2020. This book collects articles on: energetic efficiency and sustainability; infrastructures, energy and the environment; mobility and IoT; governance and citizenship
    • 

    corecore