64,298 research outputs found

    Homogeneity in Social Groups of Iraq

    Get PDF
    Homogeneity in Social Groups of Iraqis Jon Gresham, Farouk Saleh, Shara Majid June 2006 With appreciation to the Royal Institute for Inter-Faith Studies for initiating the Second World Congress for Middle Eastern Studies, this paper summarizes findings on homogeneity in community-level social groups derived from inter-ethnic research conducted during 2005 among Iraqi Arabs and Kurds living in the city of Basra, Iraq, and in the Netherlands. We found that perceptions towards out-groups were not based on religion, ethnicity, class, or location as in traditional individual-focused social networks. Patterns of perception towards out-groups seemed to be rooted in homogeneous social sub-groups with combinations of these factors. This research project used a 192-item survey of two hundred Iraqi business owners and managers in Iraq and in the Netherlands. It measured homogeneity of social group memberships. Survey elements included items drawn from the World Values Surveys (Inglehart), the Social Capital Community Benchmark Survey (Roper Center), and the Social Capital Inventory (Narayan and Cassidy). Homogeneity, relationship segregation, social trust, and community influence in social networks were estimated through indices reflecting components of social relationships in priority in-groups emerging from factor analysis of survey responses. Other indices included civic participation (socialization), perceptions of threat from out-groups, ethnic and religious identity, social trust, personal security, and contribution to community-based resources. Uniformity of responses to certain items about out-groups corresponded to findings by other authors on segregation and membership in social networks (Burt 1997, Buskins 2005, Inglehart 2004, Narayan and Cassidy 2001, Putnam 1995). This work was an expansion on a study on perceptions of threat from out-groups among Iraqis in five locations conducted in 2003 (Gresham 2004). This paper presents the following major sections: I. Introduction II. Purpose III. Background IV. Methodology V. Results VI. Reporting Process VII. Conclusions VIII. Further Work IX. Appendix X. End Notes *Jon Gresham, European Research Centre On Migration & Ethnic Relations, University of Utrecht, Netherlands Farouk Saleh, University of Tilburg, Netherlands Shara Majid, Erasmus University, Netherlands See other reports at: http://www.CivilSocietyIraq.seedwiki.co

    POISED: Spotting Twitter Spam Off the Beaten Paths

    Get PDF
    Cybercriminals have found in online social networks a propitious medium to spread spam and malicious content. Existing techniques for detecting spam include predicting the trustworthiness of accounts and analyzing the content of these messages. However, advanced attackers can still successfully evade these defenses. Online social networks bring people who have personal connections or share common interests to form communities. In this paper, we first show that users within a networked community share some topics of interest. Moreover, content shared on these social network tend to propagate according to the interests of people. Dissemination paths may emerge where some communities post similar messages, based on the interests of those communities. Spam and other malicious content, on the other hand, follow different spreading patterns. In this paper, we follow this insight and present POISED, a system that leverages the differences in propagation between benign and malicious messages on social networks to identify spam and other unwanted content. We test our system on a dataset of 1.3M tweets collected from 64K users, and we show that our approach is effective in detecting malicious messages, reaching 91% precision and 93% recall. We also show that POISED's detection is more comprehensive than previous systems, by comparing it to three state-of-the-art spam detection systems that have been proposed by the research community in the past. POISED significantly outperforms each of these systems. Moreover, through simulations, we show how POISED is effective in the early detection of spam messages and how it is resilient against two well-known adversarial machine learning attacks

    An Applied Study on Educational Use of Facebook as a Web 2.0 Tool: The Sample Lesson of Computer Networks and Communication

    Full text link
    The main aim of the research was to examine educational use of Facebook. The Computer Networks and Communication lesson was taken as the sample and the attitudes of the students included in the study group towards Facebook were measured in a semi-experimental setup. The students on Facebook platform were examined for about three months and they continued their education interactively in that virtual environment. After the-three-month-education period, observations for the students were reported and the attitudes of the students towards Facebook were measured by three different measurement tools. As a result, the attitudes of the students towards educational use of Facebook and their views were heterogeneous. When the average values of the group were examined, it was reported that the attitudes towards educational use of Facebook was above a moderate level. Therefore, it might be suggested that social networks in virtual environments provide continuity in life long learning.Comment: 11 page

    Hoodsquare: Modeling and Recommending Neighborhoods in Location-based Social Networks

    Full text link
    Information garnered from activity on location-based social networks can be harnessed to characterize urban spaces and organize them into neighborhoods. In this work, we adopt a data-driven approach to the identification and modeling of urban neighborhoods using location-based social networks. We represent geographic points in the city using spatio-temporal information about Foursquare user check-ins and semantic information about places, with the goal of developing features to input into a novel neighborhood detection algorithm. The algorithm first employs a similarity metric that assesses the homogeneity of a geographic area, and then with a simple mechanism of geographic navigation, it detects the boundaries of a city's neighborhoods. The models and algorithms devised are subsequently integrated into a publicly available, map-based tool named Hoodsquare that allows users to explore activities and neighborhoods in cities around the world. Finally, we evaluate Hoodsquare in the context of a recommendation application where user profiles are matched to urban neighborhoods. By comparing with a number of baselines, we demonstrate how Hoodsquare can be used to accurately predict the home neighborhood of Twitter users. We also show that we are able to suggest neighborhoods geographically constrained in size, a desirable property in mobile recommendation scenarios for which geographical precision is key.Comment: ASE/IEEE SocialCom 201

    A Computational Model and Convergence Theorem for Rumor Dissemination in Social Networks

    Full text link
    The spread of rumors, which are known as unverified statements of uncertain origin, may cause tremendous number of social problems. If it would be possible to identify factors affecting spreading a rumor (such as agents' desires, trust network, etc.), then this could be used to slowdown or stop its spreading. A computational model that includes rumor features and the way a rumor is spread among society's members, based on their desires, is therefore needed. Our research is centering on the relation between the homogeneity of the society and rumor convergence in it and result shows that the homogeneity of the society is a necessary condition for convergence of the spreading rumor.Comment: 29 pages, 7 figure
    • …
    corecore