7,085 research outputs found

    The Rise of Mobile and the Diffusion of Technology-Facilitated Trafficking

    Get PDF
    In this report, researchers at the USC Annenberg Center on Communication Leadership & Policy (CCLP) reveal how those involved in human trafficking have been quick to adapt to the 21st-century global landscape. While the rapid diffusion of digital technologies such as mobile phones, social networking sites, and the Internet has provided significant benefits to society, new channels and opportunities for exploitation have also emerged. Increasingly, the business of human trafficking is taking place online and over mobile phones. But the same technologies that are being used for trafficking can become a powerful tool to combat trafficking. The precise role that digital technologies play in human trafficking still remains unclear, however, and a closer examination of the phenomenon is vital to identify and respond to new threats and opportunities.This investigation indicates that mobile devices and networks have risen in prominence and are now of central importance to the sex trafficking of minors in the United States. While online platforms such as online classifieds and social networking sites remain a potential venue for exploitation, this research suggests that technology facilitated trafficking is more diffuse and adaptive than initially thought. This report presents a review of current literature, trends, and policies; primary research based on mobile phone data collected from online classified sites; a series of firsthand interviews with law enforcement; and key recommendations to policymakers and stakeholders moving forward

    An Integrated Framework for Competitive Multi-channel Marketing of Multi-featured Products

    Full text link
    For any company, multiple channels are available for reaching a population in order to market its products. Some of the most well-known channels are (a) mass media advertisement, (b) recommendations using social advertisement, and (c) viral marketing using social networks. The company would want to maximize its reach while also accounting for simultaneous marketing of competing products, where the product marketings may not be independent. In this direction, we propose and analyze a multi-featured generalization of the classical linear threshold model. We hence develop a framework for integrating the considered marketing channels into the social network, and an approach for allocating budget among these channels

    Data Innovation for International Development: An overview of natural language processing for qualitative data analysis

    Get PDF
    Availability, collection and access to quantitative data, as well as its limitations, often make qualitative data the resource upon which development programs heavily rely. Both traditional interview data and social media analysis can provide rich contextual information and are essential for research, appraisal, monitoring and evaluation. These data may be difficult to process and analyze both systematically and at scale. This, in turn, limits the ability of timely data driven decision-making which is essential in fast evolving complex social systems. In this paper, we discuss the potential of using natural language processing to systematize analysis of qualitative data, and to inform quick decision-making in the development context. We illustrate this with interview data generated in a format of micro-narratives for the UNDP Fragments of Impact project

    Internet Information and Communication Behavior during a Political Moment: The Iraq War, March 2003

    Get PDF
    This article explores the Internet as a resource for political information and communication in March 2003, when American troops were first sent to Iraq, offering us a unique setting of political context, information use, and technology. Employing a national survey conducted by the Pew Internet & American Life project. We examine the political information behavior of the Internet respondents through an exploratory factor analysis; analyze the effects of personal demographic attributes and political attitudes, traditional and new media use, and technology on online behavior through multiple regression analysis; and assess the online political information and communication behavior of supporters and dissenters of the Iraq War. The factor analysis suggests four factors: activism, support, information seeking, and communication. The regression analysis indicates that gender, political attitudes and beliefs, motivation, traditional media consumption, perceptions of bias in the media, and computer experience and use predict online political information behavior, although the effects of these variables differ for the four factors. The information and communication behavior of supporters and dissenters of the Iraq War differed significantly. We conclude with a brief discussion of the value of "interdisciplinary poaching" for advancing the study of Internet information practices

    Phantom cascades: The effect of hidden nodes on information diffusion

    Full text link
    Research on information diffusion generally assumes complete knowledge of the underlying network. However, in the presence of factors such as increasing privacy awareness, restrictions on application programming interfaces (APIs) and sampling strategies, this assumption rarely holds in the real world which in turn leads to an underestimation of the size of information cascades. In this work we study the effect of hidden network structure on information diffusion processes. We characterise information cascades through activation paths traversing visible and hidden parts of the network. We quantify diffusion estimation error while varying the amount of hidden structure in five empirical and synthetic network datasets and demonstrate the effect of topological properties on this error. Finally, we suggest practical recommendations for practitioners and propose a model to predict the cascade size with minimal information regarding the underlying network.Comment: Preprint submitted to Elsevier Computer Communication
    corecore