18,676 research outputs found

    Recommendations to the Social Security Administration on the Design of the Mental Health Treatment Study

    Get PDF
    Many beneficiaries with mental illness who have a strong desire to work nevertheless continue to seek the protection and security of disability benefits, not only because of the income such benefits provide but also for the health care coverage that comes with it. Further complicating matters is that few jobs available to people with mental illnesses have mental health care coverage, forcing individuals to choose between employment and access to care. These barriers, coupled with the limited treatment options and negative employer attitudes and even discrimination when it comes to employing people with serious metal illness, help "explain" the very rates of low labor force participation among people with psychiatric disabilities

    Modeling Evolutionary Dynamics of Lurking in Social Networks

    Full text link
    Lurking is a complex user-behavioral phenomenon that occurs in all large-scale online communities and social networks. It generally refers to the behavior characterizing users that benefit from the information produced by others in the community without actively contributing back to the production of social content. The amount and evolution of lurkers may strongly affect an online social environment, therefore understanding the lurking dynamics and identifying strategies to curb this trend are relevant problems. In this regard, we introduce the Lurker Game, i.e., a model for analyzing the transitions from a lurking to a non-lurking (i.e., active) user role, and vice versa, in terms of evolutionary game theory. We evaluate the proposed Lurker Game by arranging agents on complex networks and analyzing the system evolution, seeking relations between the network topology and the final equilibrium of the game. Results suggest that the Lurker Game is suitable to model the lurking dynamics, showing how the adoption of rewarding mechanisms combined with the modeling of hypothetical heterogeneity of users' interests may lead users in an online community towards a cooperative behavior.Comment: 13 pages, 5 figures. Accepted at CompleNet 201

    Modeling Epidemic Spread in Synthetic Populations - Virtual Plagues in Massively Multiplayer Online Games

    Full text link
    A virtual plague is a process in which a behavior-affecting property spreads among characters in a Massively Multiplayer Online Game (MMOG). The MMOG individuals constitute a synthetic population, and the game can be seen as a form of interactive executable model for studying disease spread, albeit of a very special kind. To a game developer maintaining an MMOG, recognizing, monitoring, and ultimately controlling a virtual plague is important, regardless of how it was initiated. The prospect of using tools, methods and theory from the field of epidemiology to do this seems natural and appealing. We will address the feasibility of such a prospect, first by considering some basic measures used in epidemiology, then by pointing out the differences between real world epidemics and virtual plagues. We also suggest directions for MMOG developer control through epidemiological modeling. Our aim is understanding the properties of virtual plagues, rather than trying to eliminate them or mitigate their effects, as would be in the case of real infectious disease.Comment: Accepted for presentation at Digital Games Research Association (DiGRA) conference in Tokyo in September 2007. All comments to the authors (mail addresses are in the paper) are welcom

    Social networking: the application of the data protection framework revisited

    Get PDF
    This article will revisit the social media issues in the context of the Data Protection legislative framework and the extent to which the notion of 'data controller' could extend to individuals. The main contribution is that the discussion will add to the debate on the blurring of the distinctions drawn between public and private spheres and whether what is published on social media should be deemed to be private or in the public domain. This paper will revisit the concept of 'data controller' in the context of social media and consider the extent to which users are entitled to the 'privacy' of data they share on a social media platform. It will also cover some of the forthcoming changes introduced under the proposed Data Protection Regulation including the 'right to be forgotten'

    Being an Early-Career CMS Academic in the Context of Insecurity and ‘Excellence’: The Dialectics of Resistance and Compliance

    Get PDF
    Drawing on a dialectical approach to resistance, we conceptualise the latter as a multifaceted, pervasive and contradictory phenomenon. This enables us to examine the predicament in which early-career Critical Management Studies academics find themselves in the current times of academic insecurity and ‘excellence’, as gleaned through this group’s understandings of themselves as resisters and participants in the complex and contradictory forces constituting their field. We draw on 24 semi-structured interviews to map our participants’ accounts of themselves as resisters in terms of different approaches to tensions and contradictions between, on the one hand, the interviewees’ Critical Management Studies alignment and, on the other, the ethos of business school neoliberalism. Emerging from this analysis are three contingent and interlinked narratives of resistance and identity – diplomatic, combative and idealistic – each of which encapsulates a particular mode (negotiation, struggle, and laying one’s own path) of engaging with the relationship between Critical Management Studies and the business school ethos. The three narratives show how early-career Critical Management Studies academics not only use existing tensions, contradictions, overlaps and alliances between these positions to resist and comply with selected forces within each, but also contribute to the (re-)making of such overlaps, alliances, tensions and contradictions. Through this reworking of what it means to be both Critical Management Studies scholars and business school academics, we argue, early-career Critical Management Studies academics can be seen as active resisters and re-constituters of their complex field

    Social Fingerprinting: detection of spambot groups through DNA-inspired behavioral modeling

    Full text link
    Spambot detection in online social networks is a long-lasting challenge involving the study and design of detection techniques capable of efficiently identifying ever-evolving spammers. Recently, a new wave of social spambots has emerged, with advanced human-like characteristics that allow them to go undetected even by current state-of-the-art algorithms. In this paper, we show that efficient spambots detection can be achieved via an in-depth analysis of their collective behaviors exploiting the digital DNA technique for modeling the behaviors of social network users. Inspired by its biological counterpart, in the digital DNA representation the behavioral lifetime of a digital account is encoded in a sequence of characters. Then, we define a similarity measure for such digital DNA sequences. We build upon digital DNA and the similarity between groups of users to characterize both genuine accounts and spambots. Leveraging such characterization, we design the Social Fingerprinting technique, which is able to discriminate among spambots and genuine accounts in both a supervised and an unsupervised fashion. We finally evaluate the effectiveness of Social Fingerprinting and we compare it with three state-of-the-art detection algorithms. Among the peculiarities of our approach is the possibility to apply off-the-shelf DNA analysis techniques to study online users behaviors and to efficiently rely on a limited number of lightweight account characteristics

    Political Activism and Research Ethics

    Get PDF
    Those who care about and engage in politics frequently fall victim to cognitive bias. Concerns that such bias impacts scholarship recently have prompted debates—notably, in philosophy and psychology—on the proper relationship between research and politics. One proposal emerging from these debates is that researchers studying politics have a professional duty to avoid political activism because it risks biasing their work. While sympathetic to the motivations behind this proposal, I suggest several reasons to reject a blanket duty to avoid activism: (1) even if it reduced bias, this duty would make unreasonable demands on researchers; (2) this duty could hinder research by limiting viewpoint diversity; (3) this duty wrongly implies that academia offers a relative haven from bias compared to politics; and (4) not all forms of political activism pose an equal risk of bias. None of these points suggest that researchers should ignore the risk of bias. Rather, researchers should focus on stronger evidence-based strategies for reducing bias than a blanket recommendation to avoid politics
    • …
    corecore