5,512 research outputs found

    Confronting Wartime Sexual Violence: Public Support for Survivors in Bosnia

    Full text link
    Existing research on conflict-related sexual violence focuses on the motivations of perpetrators and effects on survivors. What remains less clear is how postconflict societies respond to the hardships survivors face. In survey experiments in Bosnia, we examine public support for financial aid, legal aid, and public recognition for survivors. First, we find a persistent ethnocentric view of sexual violence, where respondents are less supportive when the perpetrator is identified as co-ethnic and survivors are perceived as out-groups. Second, respondents are less supportive of male survivors than female survivors, which we attribute to social stigmas surrounding same-gender sexual activity. Consistent with our argument, those who are intolerant of homosexuality are especially averse to providing aid to male survivors. This study points to the long-term challenges survivors face due to ethnic divisions and social stigmatization from sexual violence

    Harnessing Collaborative Technologies: Helping Funders Work Together Better

    Get PDF
    This report was produced through a joint research project of the Monitor Institute and the Foundation Center. The research included an extensive literature review on collaboration in philanthropy, detailed analysis of trends from a recent Foundation Center survey of the largest U.S. foundations, interviews with 37 leading philanthropy professionals and technology experts, and a review of over 170 online tools.The report is a story about how new tools are changing the way funders collaborate. It includes three primary sections: an introduction to emerging technologies and the changing context for philanthropic collaboration; an overview of collaborative needs and tools; and recommendations for improving the collaborative technology landscapeA "Key Findings" executive summary serves as a companion piece to this full report

    The Dynamics of the Creation, Evolution, and Disappearance of Terrorist Internet Forums

    Get PDF
    An examination of the organizational nature of the threat posed by jihadi terrorism, supplying quantitative and qualitative data on the dynamics behind the creation, evolution, and disappearance of the main jihadi Internet forums during the period 2008–2012. An analysis of the origins and functions of the forums, their links with terrorist organizations, their internal structures, and the processes accounting for their stability in cyberspace shows that far from representing a horizontal structure where the main actors are a network of followers, the terrorist presence on the Internet is in fact a hierarchical organization in which intervention by formal terrorist organizations plays a crucial role

    SPECTRUM-BASED AND COLLABORATIVE NETWORK TOPOLOGY ANALYSIS AND VISUALIZATION

    Get PDF
    Networks are of significant importance in many application domains, such as World Wide Web and social networks, which often embed rich topological information. Since network topology captures the organization of network nodes and links, studying net- work topology is very important to network analysis. In this dissertation, we study networks by analyzing their topology structure to explore community structure, the relationship among network members and links as well as their importance to the belonged communities. We provide new network visualization methods by studying network topology through two aspects: spectrum-based and collaborative visualiza- tion techniques. For the spectrum-based network visualization, we use eigenvalues and eigenvectors to express network topological features instead of using network datasets directly. We provide a visual analytics approach to analyze unsigned networks based on re- cent achievements on spectrum-based analysis techniques which utilize the features of node distribution and coordinates in the high dimensional spectral space. To assist the interactive exploration of network topologies, we have designed network visual- ization and interactive analysis methods allowing users to explore the global topology structure. Further, to address the question of real-life applications involving of both positive and negative relationships, we present a spectral analysis framework to study both signed and unsigned networks. Our framework concentrates on two problems of net- work analysis - what are the important spectral patterns and how to use them to study signed networks. Based on the framework, we present visual analysis methods, which guide the selection of k-dimensional spectral space and interactive exploration of network topology. With the increasing complexity and volume of dynamic networks, it is important to adopt strategies of joint decision-making through developing collaborative visualiza- tion approaches. Thus, we design and develop a collaborative detection mechanism with matrix visualization for complex intrusion detection applications. We establish a set of collaboration guidelines for team coordination with distributed visualization tools. We apply them to generate a prototype system with interactions that facilitates collaborative visual analysis. In order to evaluate the collaborative detection mechanism, a formal user study is presented. The user study monitored participants to collaborate under co-located and distributed collaboration environments to tackle the problems of intrusion detection. We have observed participants’ behaviors and collected their performances from the aspects of coordination and communication. Based on the results, we conclude several coordination strategies and summarize the values of communication for collaborative visualization. Our visualization methods have been demonstrated to be efficient topology explo- ration with both synthetic and real-life datasets in spectrum-based and collaborative exploration. We believe that our methods can provide useful information for future design and development of network topology visualization system

    Maneuver and Manipulation: On the Military Strategy of Online Information Warfare

    Get PDF
    How should the defense community best organize to combat modern campaigns of propaganda and disinformation? Without a broader strategic concept of the nature of the challenge posed by these techniques, current efforts and investments run the risk of simply chasing the latest tactics without establishing enduring security. This monograph offers a way forward, proposing a cohesive strategic framework for thinking about modern information warfare and its effective conduct.https://press.armywarcollege.edu/monographs/1375/thumbnail.jp

    MAPPING THE MANOSPHERE: A SOCIAL NETWORK ANALYSIS OF THE MANOSPHERE ON REDDIT

    Get PDF
    The manosphere network is a dispersed collection of online spaces that proliferate an anti-feminist ideology that in some cases has been associated with violence. This thesis aims to observe the manosphere network structure as it exists on Reddit by using a mixed method research design of digital ethnography and social network analysis (SNA). This research identified a unifying anti-feminist framework and found that informal social divisions within the network faded over time, which indicates that both moderate and extreme manosphere subgroups are now sharing common online spaces. It also found that platform algorithms helped with network resilience by acting as gatekeepers of information that suggested related content and shielded unrelated content to users that helped to grow the network in size and interconnectivity.Civilian, Department of Homeland SecurityApproved for public release. distribution is unlimite

    African Border Disorders

    Get PDF
    Since the end of the Cold War, the monopoly of legitimate organized force of many African states has been eroded by a mix of rebel groups, violent extremist organizations, and self-defence militias created in response to the rise in organized violence on the continent. African Border Disorders explores the complex relationships that bind states, transnational rebels and extremist organizations, and borders on the African continent. Combining cutting edge network science with geographical analysis, the first part of the book highlights how the fluid alliances and conflicts between rebels, violent extremist organizations and states shape in large measure regional patterns of violence in Africa. The second part of the book examines the spread of Islamist violence around Lake Chad through the lens of the violent Nigerian Islamist group Boko Haram, which has evolved from a nationally-oriented militia group, to an internationally networked organization. The third part of the book explores how violent extremist organizations conceptualize state boundaries and territory and, reciprocally, how do the civil society and the state respond to the rise of transnational organizations. The book will be essential reading for all students and specialists of African politics and security studies, particularly those specializing on fragile states, sovereignty, new wars, and borders as well as governments and international organizations involved in conflict prevention and early intervention in the region

    InSocialNet: Interactive visual analytics for role-event videos

    Get PDF
    Role–event videos are rich in information but challenging to be understood at the story level. The social roles and behavior patterns of characters largely depend on the interactions among characters and the background events. Understanding them requires analysis of the video contents for a long duration, which is beyond the ability of current algorithms designed for analyzing short-time dynamics. In this paper, we propose InSocialNet, an interactive video analytics tool for analyzing the contents of role–event videos. It automatically and dynamically constructs social networks from role–event videos making use of face and expression recognition, and provides a visual interface for interactive analysis of video contents. Together with social network analysis at the back end, InSocialNet supports users to investigate characters, their relationships, social roles, factions, and events in the input video. We conduct case studies to demonstrate the effectiveness of InSocialNet in assisting the harvest of rich information from role–event videos. We believe the current prototype implementation can be extended to applications beyond movie analysis, e.g., social psychology experiments to help understand crowd social behaviors
    • …
    corecore