468,859 research outputs found

    “Robbing Peter to Pay Paul”: Economic and Cultural Explanations for How Lower-Income Families Manage Debt

    Get PDF
    This article builds upon classic economic perspectives of financial behavior by applying the narrative identity perspective of cultural sociology to explain how lower-income families respond to indebtedness. Drawing on in-depth qualitative interviews with 194 lower-income household heads, we show that debt management strategies are influenced by a desire to promote a financially responsible, self-sufficient social identity. Families are reluctant to ask for assistance when faced with economic hardship because it undermines this identity. Because the need to pay on debts is less acute than the need to pay for regular monthly expenses like rent or groceries, debts receive a lower priority in the monthly budget and families typically juggle their debts in private rather than turning to social networks for assistance. In some cases, however, debts take on special meanings and are handled differently. Respondents prioritize debts when they perceive payment as affirming a self-sufficient or upwardly mobile identity, but they reject and ignore debts they view as unfair or unjust. Because the private coping strategies families employ trap them in costly cycles of indebtedness and hinder future mobility prospects, debt management strategies are consequential for long-term financial well-being

    Professional development and human resources management in networks

    Get PDF
    Social networks occupy more places in development of people and organizations. Confidence in institutions and social networking are different and based on referentiality in Internet. For communication in network persons choose a different strategies and behavior in LinkedIn, resources of whom may be in different degree are interesting in Human Resources Management for organizations. Members of different social groups and cultures demonstrate some differences in interaction with Russian identity native. There are gender differences behavior in networks. Participating in groups need ethical behavior and norms in social networking for professional development and communication in future

    Privacy considerations for secure identification in social wireless networks

    Get PDF
    This thesis focuses on privacy aspects of identification and key exchange schemes for mobile social networks. In particular, we consider identification schemes that combine wide area mobile communication with short range communication such as Bluetooth, WiFi. The goal of the thesis is to identify possible security threats to personal information of users and to define a framework of security and privacy requirements in the context of mobile social networking. The main focus of the work is on security in closed groups and the procedures of secure registration, identification and invitation of users in mobile social networks. The thesis includes an evaluation of the proposed identification and key exchange schemes and a proposal for a series of modifications that augments its privacy-preserving capabilities. The ultimate design provides secure and effective identity management in the context of, and in respect to, the protection of user identity privacy in mobile social networks

    Fake Profile Identification on Online Social Networks

    Get PDF
    Online social networks are web-based applications that allow user to communicate and share knowledge and information. The number of users who make use of these platforms are experiencing rapid growth both in profile creation and social interaction. However, intruders and malicious attackers have found their way into the networks, using fake profiles, thus exposing user to serious security and privacy problem.  Every user in the online social network should verify and authenticate their identities, with the other users as they interact. However, currently verification of user’s profiles and identities is faced with challenges, to the extent that a user may represent their identity with many profiles without any effective method of identity verification. As a result of this vulnerability, attackers create fake profiles which they use in attacking the online social system. In addition, online social networks use a logically centered architecture, where their control and management are under a service; provider, who must be entrusted with the security of data and communication traces; this further increases the vulnerability to attacks and online threats. In this paper, we demonstrate the causes and effects of fake profiles on online social networks, and then provide a review of the state-of-the-art mechanism for identifying and mitigating fake profiles on online social networks. Keywords: online social networks, fake profiles, sybil attack, fake account

    When social links are network links: The dawn of peer-to-peer social networks and its implications for privacy

    Get PDF
    International audienceDespite the success they enjoy among Internet users today, social networking tools are currently subject to several controversies, notably concerning the uses their administrators make of users' private data. Today, many projects and applications propose decentralised alternatives to such services, among which one of the most promising appears to be the construction of the social network on a peer-to-peer (P2P) architecture. This paper addresses and analyses the "first steps" of applications at the crossroads between social networks and P2P networks. More specifically, it discusses how such applications anticipate modifications in the management of users' right to privacy, by harnessing both anonymity and knowledge of identity - aspects generally identified with P2P networks and social networks, respectively - depending on the different functionalities and layers of the application

    The Web of Identity: Selfhood and Belonging in Online Learning Networks

    Get PDF
    In this paper, the reflexive relationship between social interaction and understanding of self in online learning networks is examined. In keeping with constructionism, we acknowledge the significance of social interaction in learning and identity formation. It is through identification with and differentiation from others that individuals are able to establish their sense of self. Therefore, a sense of self is inherently connected to one's sense of belonging within a community (-ies). Building on the work of Goffman (impressions management) and Foucault (technologies of the self), a model of identity and community formation is introduced: the Web of Identity (WoI). According to the WoI model, community members rely on technical, structural, political, cultural, and idiosyncratic perspectives coupled with performance strategies in a continuous cycle of internalization, understanding, enactment, and revision of their individual identities. We discuss how individuals construct their identities through relational dialogue and interaction in which they express, share, and build upon their histories, practices, and goals. It is an ongoing reciprocal process that constantly changes both personal and collective narratives. The combined perspectives and strategies guide the individual's behaviour, but do not completely restrict it. The individual is free to choose how to perform and may choose performances that support or contravene accepted social practices. Ideally, this process guides the individual towards cognitive resonance, a process in which he/she behaves in accordance with his/her internalized conceptions of society and self. If an individual's actions do not resonate with social expectations, accepted practices, and self, the individual may modulate his/her actions or may cause shifts in accepted practices, expectations, or self identity. Such shifts filter through the WoI performance strategies. The paper concludes with suggestions for further research in identity formation in online learning networks. We recommend study of current social networks and learning management systems to identify existing mechanisms that permit expression of WoI strategies. In addition, we recommend research into how social software systems can be developed or facilitated to encourage strategy use. Since, it is through these performances that the individual enacts his/her identity, we wish to know how, in actual practice, strategy use will affect conceptions of self and community in educational environments

    Collaboration Networks for Social Innovation: A Case Study in a Technological Incubator of Popular Cooperatives

    Get PDF
    Experiences in social innovation point to a collaborative work, in which several types of players connect in a network to seek solutions to the problems inherent in the less favored population. In this sense, the aim of this paper is to identify the constituent elements of collaboration networks for social innovation in the context of social incubators. This study used a qualitative, descriptive research approach and case study method. Data were collected through document analysis and semi-structured interviews. Based on the thematic analysis of the primary data, it was concluded that the constituent elements of collaboration networks for social innovation in social incubators are: partnerships (networks of players and different types of partnerships); collaboration (mutual help, commitment and trust); self-management (shared leadership, joint decision-making and shared processes); empowerment (recognition and construction of identity); resources (financial, material and human); learning (training, lectures and sharing of experiences); and sustainability (economic, social and environmenta

    Tutorial: Identity Management Systems and Secured Access Control

    Get PDF
    Identity Management has been a serious problem since the establishment of the Internet. Yet little progress has been made toward an acceptable solution. Early Identity Management Systems (IdMS) were designed to control access to resources and match capabilities with people in well-defined situations, Today’s computing environment involves a variety of user and machine centric forms of digital identities and fuzzy organizational boundaries. With the advent of inter-organizational systems, social networks, e-commerce, m-commerce, service oriented computing, and automated agents, the characteristics of IdMS face a large number of technical and social challenges. The first part of the tutorial describes the history and conceptualization of IdMS, current trends and proposed paradigms, identity lifecycle, implementation challenges and social issues. The second part addresses standards, industry initia-tives, and vendor solutions. We conclude that there is disconnect between the need for a universal, seamless, trans-parent IdMS and current proposed standards and vendor solutions

    Dairy farmers' responses to water quality interventions : a case study in the Manawatu-Wanganui region of New Zealand : a thesis presented in partial fulfilment of the requirements for the degree of Doctor of Philosophy in Agriculture and Environment, Palmerston North, New Zealand

    Get PDF
    New Zealand freshwater quality has declined, and dairy farming is one identified contributor to this decline. This research provides insight into dairy farmers responses to the water quality interventions introduced to mitigate diffuse pollution, and the socio-cultural dynamics that shaped their responses. Putnam’s (2000) social capital theory was the theoretical framework used to explore how and why New Zealand dairy farmers responded to water quality interventions and the role of social capital in shaping dairy farmers’ responses. A single qualitative case-study research design was undertaken in one Water Management Zone of the Manawatu-Wanganui Region. Data was drawn from semi-structured interviews with dairy farmers and key informants, and from documents. Farmer response is identified as a multi-dimensional rather than a uni-dimensional phenomenon. The dairy farmers responded to water quality interventions as individuals and collectively, and these responses were linked and interwoven. Individual farmer awareness and understanding, emotion and behaviour changed. Collectively, resistance, social learning, formation of a farmer-led action group and changes in accepted farming practices occurred. In addition, social interactions through social networks, trust, social norms and being a ‘good’ farmer that uses ‘best’ farm practice (farmer identity) emerged as key influencers of the dairy farmers’ individual and collective responses to water quality interventions. The socially constructed collective agreements on accepted behaviour, or cultural, personal and practice norms, influenced farmers’ individual and collective responses to interventions. The identified cultural norms associated with private property ownership, equity and fairness, social responsibility and relationships, and personal norms associated with the stewardship of land and water, reflected the farming culture of the farmers interviewed and the broader group to which they belong. A broad collective change in what farmers believe are the expected farm management practices around farming and water quality (practice norms) influenced individual farm practice change. In addition, informal farmer sanctioning of practice norm violation was found to be a key part of the process by which farm practices that had a negative effect on water quality were challenged, and new practice norms were fostered. The collective farmer resistance to regulation and the actions of a farmer-led collective action group were in fact resistance to an intervention that was perceived to challenge their social norms, their identity as ‘good farmers’ and to disregard their local knowledge; not resistance to practice changes that will improve water quality. Dairy farm management practice change is a social process of exchanging information and knowledge, questioning, challenging current practice and reinforcing what is considered accepted practice around farming and water quality. This understanding provides a valuable contribution to the design and implementation of environmental policy interventions
    corecore