3,235 research outputs found

    The Lived Experiences of African American Undergraduate Students with Formative and Summative Assessments at a Predominantly White Institution: A Hermeneutic Phenomenological Qualitative Study

    Get PDF
    The purpose of this qualitative study was to investigate the lived experiences of African American undergraduate students who have taken formative and summative assessments while attending a predominantly white institution. The theory guiding this study is Albert Bandura’s social cognitive theory as it relates to its main three elements of person, behavior, and environment. The research framework for this qualitative study was hermeneutic phenomenology, which focuses on obtaining, describing, and interpreting lived experiences of individuals. The central research question asks, “What are the experiences of African American undergraduate students attending a predominantly white institution (PWI) taking summative and formative assessments?” The setting was a predominantly white institution in Virginia. The sample was twelve African American undergraduate students between the ages of 18 to 21 who were members of the organization centered around multicultural student services, specifically the multicultural Greek council and the National Pan-Hellenic Council (NPHC). Data collection was conducted through three methods, individual interviews, focus group, and a journal prompt. The data analysis approach was accomplished through thematic analysis. The thematic findings for this study were performance anxiety with sub-themes being on edge, high expectations, and feeling not wanted, lack of cultural competence with sub-themes racial discrimination and need to assimilate, marginalization with sub-themes loneliness and misunderstood, multifaceted with sub-themes authenticity in minority spaces, ambiguous relationships, lack of external culture, and political environment, university confliction with sub-themes lack of university intercultural and global awareness, university intercultural and global awareness, and division in minority

    Conversations on Empathy

    Get PDF
    In the aftermath of a global pandemic, amidst new and ongoing wars, genocide, inequality, and staggering ecological collapse, some in the public and political arena have argued that we are in desperate need of greater empathy — be this with our neighbours, refugees, war victims, the vulnerable or disappearing animal and plant species. This interdisciplinary volume asks the crucial questions: How does a better understanding of empathy contribute, if at all, to our understanding of others? How is it implicated in the ways we perceive, understand and constitute others as subjects? Conversations on Empathy examines how empathy might be enacted and experienced either as a way to highlight forms of otherness or, instead, to overcome what might otherwise appear to be irreducible differences. It explores the ways in which empathy enables us to understand, imagine and create sameness and otherness in our everyday intersubjective encounters focusing on a varied range of "radical others" – others who are perceived as being dramatically different from oneself. With a focus on the importance of empathy to understand difference, the book contends that the role of empathy is critical, now more than ever, for thinking about local and global challenges of interconnectedness, care and justice

    Comparing the production of a formula with the development of L2 competence

    Get PDF
    This pilot study investigates the production of a formula with the development of L2 competence over proficiency levels of a spoken learner corpus. The results show that the formula in beginner production data is likely being recalled holistically from learners’ phonological memory rather than generated online, identifiable by virtue of its fluent production in absence of any other surface structure evidence of the formula’s syntactic properties. As learners’ L2 competence increases, the formula becomes sensitive to modifications which show structural conformity at each proficiency level. The transparency between the formula’s modification and learners’ corresponding L2 surface structure realisations suggest that it is the independent development of L2 competence which integrates the formula into compositional language, and ultimately drives the SLA process forward

    Challenging the gold standard: a methodological study of the quality and errors of web tracking data

    Get PDF
    Measuring what people consume and do online is crucial across the social sciences. In the last few years, web tracking data has gained popularity, being considered by most as the gold standard for measuring online behaviours. This thesis studies whether this prevailing notion holds true. Specifically, through a combination of traditional survey and computational methods, I assess the quality of web tracking data, its associated errors, and the consequences of these. The thesis is comprised of three distinct papers. In the first paper, inspired by the Total Survey Error, I present a Total Error framework for digital traces collected with Meters (TEM). The TEM framework describes the data generation and the analysis process for web tracking data and documents the sources of bias and variance that may arise in each step of this process. The framework suggests that metered data might indeed be affected by the error sources identified in our framework and, to some extent, biased. The second paper adopts an empirical approach to address a key error identified in the TEM framework: researchers’ failure to capture data from all the devices and browsers that individuals utilize to go online. The paper shows that tracking undercoverage is highly prevalent when using commercial panels. Additionally, through a simulation study, it demonstrates that web tracking estimates, both univariate and multivariate, are often substantially biased due to tracking undercoverage. The third paper explores the validity and reliability of web tracking data when used to measure media exposure. Merging traditional psychometric and computational techniques, I conduct a multiverse analysis to assess the predictive validity and true-score reliability of thousands of web tracking measures of media exposure. The findings show that web tracking measures have an overall low validity but remarkably high reliability. Additionally, results suggest that the design decisions made by researchers when designing web tracking measurements can have a substantial impact on their measurement properties. Collectively, this thesis challenges the prevailing belief in web tracking data as the gold standard to measure online behaviours. Methodologically, it illustrates how computational methods can be used to adapt survey methodology techniques to assess the quality of digital trace data

    Interpretive communities of resistance: Emerging counterpublics of immigration alarmism on social media

    Get PDF
    Debates over immigration have become a defining political cleavage closely related to moral values, perceptions of threat, and the rise of online anti-immigration networks and agitation. Based on in-depth interviews with immigration alarmists, this article discusses how the participants’ anti-immigration position is sanctioned in their everyday social networks and how they find alternative networks online for information, community, and support. This online community takes the form of an emerging counterpublic, characterized by active curation and different levels of participation aimed at optimizing the trade-offs between gaining visibility (moderation and mobilization) and creating an alternative moral community (a “safe space” for peers). Combining notions of interpretative communities of resistance with the theory of counterpublics, the study provides insight into the internal life and values of emerging anti-immigration online communities.Interpretive communities of resistance: Emerging counterpublics of immigration alarmism on social mediapublishedVersio

    Undocumented Young Adults Navigating Liminal Space to Carve Their Futures in The U.S.

    Get PDF
    This qualitative interview study focuses on the challenges and barriers of 1.5 generations of undocumented young adults with their liminal status in carving their present and curating their future lives in the United States. The study focuses on how these 1.5 young emerging adults navigate their lives to pursue their life goals with the limitations attached to their impermanence status. The study used a qualitative in-depth, and constant comparative methodology to approach empirical findings. In addition, the life-course theory was utilized as a theoretical framework to study different milestones in the lives of these 1.5 undocumented young adults (Elder,1998). The findings suggest that these young adults have persevered and navigated the severe challenges of pursuing their dreams of higher education but see no hope for their future in the United States due to their liminal status. As a result, there are closed doors for careers and continuing higher education, along with unique challenges to foster romantic and social relationships

    How did Britain come to this? A century of systemic failures of governance

    Get PDF
    If every system is perfectly designed to get the results it gets, what is wrong with the design of the systems that govern Britain? And how have they resulted in failures in housing, privatisation, outsourcing, education and healthcare? In How Did Britain Come to This? Gwyn Bevan examines a century of varieties of systemic failures in the British state. The book begins and ends by showing how systems of governance explain scandals in NHS hospitals, and the failures and successes of the UK and Germany in responding to Covid-19 before and after vaccines became available. The book compares geographical fault lines and inequalities in Britain with those that have developed in other European countries and argues that the causes of Britain’s entrenched inequalities are consequences of shifts in systems of governance over the past century. Clement Attlee’s postwar government aimed to remedy the failings of the prewar minimal state, while Margaret Thatcher’s governments in the 1980s in turn sought to remedy the failings of Attlee’s planned state by developing the marketised state, which morphed into the financialised state we see today. This analysis highlights the urgent need for a new political settlement of an enabling state that tackles current systemic weaknesses from market failures and over-centralisation. This book offers an accessible, analytic account of government failures of the past century, and is essential reading for anyone who wants to make an informed contribution to what an innovative, capable state might look like in a post-pandemic world

    Oportunidades, riesgos y aplicaciones de la inteligencia de fuentes abiertas en la ciberseguridad y la ciberdefensa

    Get PDF
    The intelligence gathering has transformed significantly in the digital age. A qualitative leap within this domain is the sophistication of Open Source Intelligence (OSINT), a paradigm that exploits publicly available information for planned and strategic objectives. The main purpose of this PhD thesis is to motivate, justify and demonstrate OSINT as a reference paradigm that should complement the present and future of both civilian cybersecurity solutions and cyberdefence national and international strategies. The first objective concerns the critical examination and evaluation of the state of OSINT under the current digital revolution and the growth of Big Data and Artificial Intelligence (AI). The second objective is geared toward categorizing security and privacy risks associated with OSINT. The third objective focuses on leveraging the OSINT advantages in practical use cases by designing and implementing OSINT techniques to counter online threats, particularly those from social networks. The fourth objective embarks on exploring the Dark web through the lens of OSINT, identifying and evaluating existing techniques for discovering Tor onion addresses, those that enable the access to Dark sites hosted in the Tor network, which could facilitate the monitoring of underground sites. To achieve these objectives, we follow a methodology with clearly ordered steps. Firstly, a rigorous review of the existing literature addresses the first objective, focusing on the state of OSINT, its applications, and its challenges. This serves to identify existing research gaps and establish a solid foundation for an updated view of OSINT. Consequently, a critical part of the methodology involves assessing the potential security and privacy risks that could emerge from the misuse of OSINT by cybercriminals, including using AI to enhance cyberattacks, fulfilling the second objective. Thirdly, to provide practical evidence regarding the power of OSINT, we work in a Twitter use case in the context of the 2019 Spanish general election, designing and implementing OSINT methods to understand the behaviour and impact of automated accounts. Through AI and social media analysis, this process aims to detect social bots in the wild for further behaviour characterization and impact assessment, thus covering the third objective. The last effort is dedicated to the Dark web, reviewing different works in the literature related to the Tor network to identify and characterize the techniques for gathering onion addresses essential for accessing anonymous websites, completing the fourth objective. This comprehensive methodology led to the publication of five remarkable scientific papers in peer-reviewed journals, collectively forming the basis of this PhD thesis. As main conclusions, this PhD thesis underlines the immense potential of OSINT as a strategic tool for problem-solving across many sectors. In the age of Big Data and AI, OSINT aids in deriving insights from vast, complex information sources such as social networks, online documents, web pages and even the corners of the Deep and Dark web. The practical use cases developed in this PhD thesis prove that incorporating OSINT into cybersecurity and cyberdefence is increasingly valuable. Social Media Intelligence (SOCMINT) helps to characterize social bots in disinformation contexts, which, in conjunction with AI, returns sophisticated results, such as the sentiment of organic content generated in social media or the political alignment of automated accounts. On the other hand, the Dark Web Intelligence (DARKINT) enables gathering the links of anonymous Dark web sites. However, we also expose in this PhD thesis that the development of OSINT carries its share of risks. Open data can be exploited for social engineering, spear-phishing, profiling, deception, blackmail, spreading disinformation or launching personalized attacks. Hence, the adoption of legal and ethical practices is also important.La recolección de inteligencia ha sufrido una transformación significativa durante la era digital. En particular, podemos destacar el auge y sofisticicación de la Inteligencia de Fuentes Abiertas (OSINT, por sus siglas en inglés de Open Source Intelligence), paradigma que recolecta y analiza la información públicamente disponible para objetivos estratégicos y planificados. El cometido principal de esta tesis doctoral es motivar, justificar y demostrar que OSINT es un paradigma de referencia para complementar el presente y futuro de las soluciones de ciberseguridad civiles y las estrategias de ciberdefensa nacionales e internacionales. El primer objetivo es examinar y evaluar el estado de OSINT en el contexto actual de revolución digital y crecimiento del Big Data y la Inteligencia Artificial (IA). El segundo objetivo está orientado a categorizar los riesgos de seguridad y privacidad asociados con OSINT. El tercer objetivo se centra en aprovechar las ventajas de OSINT en casos de uso prácticos, diseñando e implementando técnicas de OSINT para contrarrestar amenazas online, particularmente aquellas provenientes de las redes sociales. El cuarto objetivo es explorar la Dark web, buscando identificar y evaluar técnicas existentes para descubrir las direcciones aleatorias de las páginas alojadas en la red Tor. Para alcanzar estos objetivos seguimos una metodología con pasos ordenados. Primero, para abordar el primer objetivo, realizamos una revisión rigurosa de la literatura existente, centrándonos en el estado de OSINT, sus aplicaciones y sus desafíos. A continuación, en relación con el segundo objetivo, evaluamos los posibles riesgos de seguridad y privacidad que podrían surgir del mal uso de OSINT por parte de ciberdelincuentes, incluido el uso de IA para mejorar los ciberataques. En tercer lugar, para proporcionar evidencia práctica sobre el poder de OSINT, trabajamos en un caso de uso de Twitter en el contexto de las elecciones generales españolas de 2019, diseñando e implementando métodos de OSINT para entender el comportamiento y el impacto de las cuentas automatizadas. A través de la IA y el análisis de redes sociales, buscamos detectar bots sociales en Twitter para una posterior caracterización del comportamiento y evaluación del impacto, cubriendo así el tercer objetivo. Luego, dedicamos otra parte de la tesis al cuarto objetivo relacionado con la Dark web, revisando diferentes trabajos en la literatura de la red Tor para identificar y caracterizar las técnicas para recopilar direcciones onion, esenciales para acceder a sitios web anónimos de la red Tor. Esta metodología llevó a la publicación de cinco destacados artículos científicos en revistas revisadas por pares, formando colectivamente la base de esta tesis doctoral. Como principales conclusiones, esta tesis doctoral subraya el inmenso potencial de OSINT como herramienta estratégica para resolver problemas en muchos sectores. En la era de Big Data e IA, OSINT extrae conocimiento a partir de grandes y complejas fuentes de información en abierto como redes sociales, documentos online, páginas web, e incluso en la Deep y Dark web. Por otro lado, los casos prácticos desarrollados evidencian que la incorporación de OSINT en ciberseguridad y ciberdefensa es cada vez más valiosa. La Inteligencia de Redes Sociales (SOCMINT, por sus siglas en inglés Social Media Intelligence) ayuda a caracterizar bots sociales en contextos de desinformación. Por su parte, la Inteligencia de la Web Oscura (DARKINT, por sus siglas en inglés Dark Web Intelligence) permite recopilar enlaces de sitios anónimos de la Dark web. Sin embargo, esta tesis expone como el desarrollo de OSINT lleva consigo una serie de riesgos. Los datos abiertos pueden ser explotados para ingeniería social, spear-phishing, perfilado, engaño, chantaje, difusión de desinformación o lanzamiento de ataques personalizados. Por lo tanto, la adopción de prácticas legales y éticas es también imprescindible

    Explaining Acceptance of State Surveillance: Polarization, Ideology, and Partisan Alignment

    Get PDF
    This paper tests whether partisan alignment, defined as having last voted for the governing party, leads to greater acceptance of state surveillance powers. The present study frames partisan alignment as a potential locus of political polarization around which individuals may structure attitudes towards the state wielding its authority to conduct surveillance. The analysis provides evidence that ptisan alignment has a positive predictive effect on public opinion regarding state surveillance irrespective of national levels of polarization. Partisan alignment was additionally found to be positively associated with counterterrorism policing as well. Further exploration reveals that the effects on state surveillance are particularly pronounced in countries with ideologically right-leaning governments and are reduced in countries with left-leaning and centrist governments. The results suggest that an individual’s opinion of governmental powers and policies outwardly intended to maintain public safety are influenced by their alignment with the parties in control of government.Master of Art
    corecore