Zeitschriftenartikel zum Thema „Extremist websites“

Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Extremist websites.

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Extremist websites" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Phadke, Shruti, und Tanushree Mitra. „Educators, Solicitors, Flamers, Motivators, Sympathizers: Characterizing Roles in Online Extremist Movements“. Proceedings of the ACM on Human-Computer Interaction 5, CSCW2 (13.10.2021): 1–35. http://dx.doi.org/10.1145/3476051.

Der volle Inhalt der Quelle
Annotation:
Social media provides the means by which extremist social movements, such as white supremacy and anti-LGBTQ, thrive online. Yet, we know little about the roles played by the participants of such movements. In this paper, we investigate these participants to characterize their roles, their role dynamics, and their influence in spreading online extremism. Our participants-online extremist accounts-are 4,876 public Facebook pages or groups that have shared information from the websites of 289 Southern Poverty LawCenter (SPLC) designated extremist groups. Guided by theories of participatory activism, we map the information sharing features of these extremists accounts. By clustering the quantitative features followed by qualitative expert validation, we identify five roles surrounding extremist activism-educators, solicitors, flamers, motivators, sympathizers. For example, solicitors use links from extremist websites to attract donations and participation in extremist issues, whereas flamers share inflammatory extremist content inciting anger. We further investigate role dynamics such as, how stable these roles are over time and how likely will extremist accounts transition from one role into another. We find that roles core to the movement-educators and solicitors-are more stable, while flamers and motivators can transition to sympathizers with high probability. Finally, using a Hawkes process model, we test which roles are more influential in spreading various types of information. We find that educators and solicitors exert the most influence in triggering extremist link posts, whereas flamers are influential in triggering the spread of information from fake news sources. Our results help in situating various roles on the trajectory of deeper engagement into the extremist movements and understanding the potential effect of various counter-extremism interventions. Our findings have implications for understanding how online extremist movements flourish through participatory activism and how they gain a spectrum of allies for mobilizing extremism online.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Goede, Laura-Romina, Carl Philipp Schröder, Lena Lehmann und Thomas Bliesener. „Online Activities and Extremist Attitudes in Adolescence: An Empirical Analysis with a Gender Differentiation“. Monatsschrift für Kriminologie und Strafrechtsreform 105, Nr. 4 (01.10.2022): 257–74. http://dx.doi.org/10.1515/mks-2022-0021.

Der volle Inhalt der Quelle
Annotation:
Abstract Radicalization research is dedicated to analyzing factors related to radicalization processes, which in turn can lead to extremism. One factor is frequently discussed: the role of the Internet. This paper examines the relationship between active and passive online activities, including consumption, networking, and posting, and extremist attitudes in the field of Islamism and right-wing extremism among adolescents. Data from a school survey (N = 6,715) show that right-wing attitudes are particularly correlated with consumption of political websites, though this effect is weaker among females. However, posting shows only a small effect and networking shows no effect at all. Islamist attitudes, on the other hand, are related to the extent to which one consumes violent Islamist videos, meets other Muslims online, and posts Islamic content.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Балашова, А. А. „INFORMATION EXTREMISM: PROBLEMS AND SOLUTIONS.“ VESTNIK OF THE EAST SIBERIAN INSTITUTE OF THE MINISTRY OF INTERNAL AFFAIRS OF THE RUSSIAN FEDERATION, Nr. 2(105) (09.06.2023): 99–108. http://dx.doi.org/10.55001/2312-3184.2023.59.97.009.

Der volle Inhalt der Quelle
Annotation:
Введение. Статья посвящена вопросам распространения экстремистских материа-лов в сети Интернет, а именно в социальных сетях. Информационный экстремизм, как один из разновидностей экстремизма, на сегодняшний день наиболее опасен. Так как ин-формация, несущая в себе запрещенный контент, зачастую общедоступна, а распростра-нители данной информации, преследуя свои преступные цели, не разграничивают аудито-рию на детей и взрослых. Рассмотрение вопросов об установке ограничений пользования Интернет-сайтами сомнительной направленности и дальнейшей их блокировки как нико-гда остро стоит в нашей стране. Проблемы, возникающие при борьбе с информационным экстремизмом, должны решаться и на законодательном, и на международном уровне, а комплексный подход может привести к положительным результатам. Материалы и методы. Нормативная база исследования – нормативно-правовые акты Российской Федерации. Методология работы включает в себя как общенаучные (ана-лиз, синтез, дедукции, индукции), так и частнонаучные методы. Результаты исследования. Предложен авторский подход к решению затронутых в исследовании проблем. Выводы и заключения. Автором установлена необходимость в совершенствова-нии действующего законодательства для более углубленной проверки сайтов, имеющих сомнительный контент, а также ужесточение ответственности за преступления и правона-рушения, связанные с экстремистской деятельностью. Introduction: this article deals with the dissemination of extremist materials on the Inter-net, namely on social networks. Information extremism, as one of the varieties of extremism, is the most dangerous today. Because information containing banned content is often publicly avail-able, and distributors of this information do not distinguish between children and adults in pursuit of their criminal goals. Consideration of the issue of imposing restrictions on the use of dubious websites and their further blocking is more urgent than ever in our country. Problems arising in the fight against information extremism should be solved at both the legislative and international level, and a comprehensive approach can lead to positive results. Materials and methods: the normative base of the study normative legal acts of the Rus-sian Federation. The methodology of the work includes both general scientific methods (analysis, synthesis, deduction, induction) and particular scientific methods. The Results of the study: the author's approach to solving the problems raised in the study is proposed. Findings and Conclusion: the author has identified the need to improve existing legisla-tion to more thoroughly check websites with dubious content and to increase liability for c rimes and offences related to extremist activity. Keywords: information extremism, IT-crimes, social network, national security, criminal procedural legislation, extremist organizations.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Reid, Edna, und Hsinchen Chen. „Internet-Savvy U.S. and Middle Eastern Extremist Groups“. Mobilization: An International Quarterly 12, Nr. 2 (01.06.2007): 177–92. http://dx.doi.org/10.17813/maiq.12.2.l86p127t05362654.

Der volle Inhalt der Quelle
Annotation:
Using an interdisciplinary perspective, this study provides a hyperlink and content analysis of 44 U.S. domestic and 40 Middle Eastern extremist groups' websites to analyze their use of computer-mediated communication (CMC) to support collective identity and mobilization. The findings contrast Middle Eastern extremist groups' use of the Internet to develop virtual communities and support their virtual command/control operations with the U.S. domestic groups' focus on communication and ideological indoctrination. Finally, the results suggest that the usages of CMC are underpinned by the geographical reach of extremist groups' campaign as well as their strategic goals, ideologies, needs, and political legitimacy, driving the various groups to use CMC in a distinctive manner.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Simpson, Patricia Anne. „Mobilizing Meanings: Translocal Identities of the Far Right Web“. German Politics and Society 34, Nr. 4 (01.12.2016): 34–53. http://dx.doi.org/10.3167/gps.2016.340403.

Der volle Inhalt der Quelle
Annotation:
Europe has witnessed the rise of a multigenerational, populist shift to the right, characterized by the unapologetic deployment of extremist symbols, ideologies, and politics, but also by repudiations of right-wing labels associated with racism, xenophobia, and nativist entitlements. The political lexicon of far-right rhetoric derives its considerable persuasive force from mobilizing and normalizing extremist views. This article examines the intricately and translocally woven connections among representative movements, organizations, and media personalities who popularize and disseminate far-right views through social media and their own internet websites. With diatribes about the threat against Russia, the uncontainable and intolerable influx of refugees and asylum seekers, whom they blame for terrorist attacks, deteriorating family values, the loss of national German identity, and the antidemocratic politics of Chancellor Angela Merkel, the cadre of self-credentializing experts and politicians, some in alignment with Pegida, mobilize historical moments and meanings to make connections with a broad spectrum of supporters.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Doerr, Nicole, und Beth Gharrity Gardner. „After the storm“. Translation in Society 1, Nr. 1 (26.01.2022): 83–104. http://dx.doi.org/10.1075/tris.21008.doe.

Der volle Inhalt der Quelle
Annotation:
Abstract This study investigates the translational practices of far-right activists in Germany through content analysis of storytelling about the January 6 storming of the US Capitol in influential German alternative news websites. Findings reveal how far-right commentators used their intermediary position to re-narrate, translate, and convert ‘mainstream’ accounts of an exceptionally contentious event into stories supporting far-right- wing and extremist identities. Re-narrations of January 6 events characterized protesters as victim-heroes and contrasted them with the true villains responsible for the chaos and violence, which included a broad spectrum of political actors on the ideological left writ large.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Boulouard, Zakaria, Mariya Ouaissa, Mariyam Ouaissa, Moez Krichen, Mutiq Almutiq und Karim Gasmi. „Detecting Hateful and Offensive Speech in Arabic Social Media Using Transfer Learning“. Applied Sciences 12, Nr. 24 (14.12.2022): 12823. http://dx.doi.org/10.3390/app122412823.

Der volle Inhalt der Quelle
Annotation:
The democratization of access to internet and social media has given an opportunity for every individual to openly express his or her ideas and feelings. Unfortunately, this has also created room for extremist, racist, misogynist, and offensive opinions expressed either as articles, posts, or comments. While controlling offensive speech in English-, Spanish-, and French- speaking social media communities and websites has reached a mature level, it is much less the case for their counterparts in Arabic-speaking countries. This paper presents a transfer learning solution to detect hateful and offensive speech on Arabic websites and social media platforms. This paper will compare the performance of different BERT-based models trained to classify comments as either abusive or neutral. The training dataset contains comments in standard Arabic as well as four dialects. We will also use their English translations for comparative purposes. The models were evaluated based on five metrics: Accuracy, Precision, Recall, F1-Score, and Confusion Matrix.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Prokhorenko, Yelizaveta S. „METHODS OF RECRUITMENT ACTIVITY“. LEGAL ORDER: History, Theory, Practice 40, Nr. 1 (30.03.2024): 177–81. http://dx.doi.org/10.47475/2311-696x-2024-40-1-177-181.

Der volle Inhalt der Quelle
Annotation:
This article discusses a set of methods of committing crimes related to recruitment activities. Recruitment methods are used by representatives of terrorist and extremist organizations. The methods aimed at committing crimes of this category are diverse in nature, consist in the impact of a social and psycho-emotional nature in the form of manipulation, pressure, threats and many others. The recruiter’s choice of a means of influencing the victim’s consciousness depends on many factors, primarily on the personality of the subject being influenced. The intensity of the appearance of new faces in terrorist and extremist organizations, supporters of mass riots, and mercenaries depends on the complexity of the methods of influence and the ability to master them. There are strategies for gradual social influence on human consciousness through websites and other Internet resources, the activities of which, as a rule, are promptly suppressed by law enforcement agencies. However, interaction of a personal nature or through messengers protected by end-to-end encryption can not be stopped in a timely manner and resist the recruitment of a person. The main task is to study various methods of recruitment activities in order to create tactics to warn citizens and combat recruiters at the initial stage
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Khan, Hameed Ullah, Muhammad Farooq Shah und Muhammad Ilyas Khan. „SHANGHAI COOPERATION ORGANISATION AND AFGHANISTAN: INTERESTS AND LIMITATIONS“. Margalla Papers 27, Nr. 1 (30.06.2023): 82–95. http://dx.doi.org/10.54690/margallapapers.27.1.153.

Der volle Inhalt der Quelle
Annotation:
Shanghai Cooperation Organisation has greater relevance in Afghanistan because of its strategic importance and geographic proximity. For years, the country has harboured numerous extremist groups and insurgents. It has remained a battleground for US-led coalition forces and the Taliban for about two decades. Despite efforts by the US and its allies, peace has yet to be restored in Afghanistan, and the responsibility now rests on regional countries. It is crucial for these states, especially Eurasian nations, to work together to stabilise the war-torn country and bring lasting peace to the region. Therefore, the study examines the push and pull factors of the Shanghai Cooperation Organisation’s interests in Afghanistan and the challenges that come with implementing their peace plans. The data has been collected from various primary and secondary sources, including websites, newspapers and research articles. The paper also highlights two major concerns for the Shanghai Cooperation Organisation, the economic crisis in Afghanistan and the international recognition of the Taliban government. Bibliography Entry Khan, Hameed Ullah, Muhammad Farooq Shah and Muhammad Ilyas Khan. 2023. "Shanghai Cooperation Organisation and Afghanistan: Interests and Limitations." Margalla Papers 27 (1): 82-95.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Alderton, Zoe. „“Nothing Tastes as Good as Skinny Feels”“. International Journal for the Study of New Religions 12, Nr. 2 (13.06.2024): 157–84. http://dx.doi.org/10.1558/ijsnr.27320.

Der volle Inhalt der Quelle
Annotation:
There has always been something compelling about extreme bodies. Kate Moss exemplifies “the waif,” a body type both frightening and appealing. She is one of the most common celebrities discussed on pro-anorexia (or, pro-ana) websites. To explore the connection between Moss’s body and pro-ana participation, this article examines the potential for an extraordinary body to solidify the aims of an extremist group and to draw in new members. Her unusually slender form affirms this pro-starvation cluster by physically representing the emotional distress that lies at its core. There is no conclusive evidence that Moss suffers from an eating disorder, and she has been open about discouraging people from starving themselves to look like her. Nevertheless, she has been framed as a unique icon in the pro-ana sphere, despite her personal intent, due to the extreme nature of her body. She helps members to express mental illness and severe emotional distress via an emaciated frame and grungy-but-cool aesthetic. She therefore gives people a way to explore sickness and femininity concurrently, which is especially relevant for young women with eating disorders. The pro-ana community has adopted her as a cult icon for these reasons. Here, I analyse this process using Rodney Stark and William Sims Bainbridge’s sociological scholarship on the social role of religion broadly and “cult formation” more specifically. This raises important questions about consent in cult formation and the role required of a leader.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Sousa, Rodrigo Almeida. „Story-Building for Revolution: Post-Marxist and Neo-Nationalist Perspectives on the Yellow Vests Movement“. Perspectivas - Journal of Political Science 20 (21.06.2019): 9–21. http://dx.doi.org/10.21814/perspectivas.329.

Der volle Inhalt der Quelle
Annotation:
On 17 November 2018, hundreds of thousands of French joined in protest against the ecological tax rise on hydrocarbons announced by Emmanuel Macron. The Yellow Vests phenomenon had been born. Since then, it has been active for several months and there seems to be no end in sight. As the movement began to get organized, it created websites and pages on social media, producing a challenging storytelling based on more than 40 demands and 25 proposals for the crisis. Thus it gave voice to the middle and middle-lower classes, which are deeply dissatisfied with their present socioeconomic conditions. Naturally, this narrative appealed to the extremist parties, from Mélenchon’s radical left to Marine Le Pen’s neo-nationalist right, as they immediately declared their support for the cause. Shortly afterwards, it was time for the intellectuals to manifest their views. On one hand, post-Marxists such as Slavoj Žižek and Antonio Negri wrote their articles on the subject. On the other, Russian nationalists, from leftist Boris Kagarlitsky to traditionalist Aleksandr Dugin, did not hide their enthusiasm about the movement either. For, in fact, all these intellectuals have something in common: they all are story-building for revolution. Resumo A 17 Novembro 2018, centenas de milhares de franceses aderiram ao protesto contra a subida da taxa ecológica sobre os hidrocarbonetos anunciada por Emmanuel Macron. Nascia, assim, o fenómeno dos coletes amarelos, o qual tem perdurado ao longo de vários meses e parece não ter fim à vista. À medida que o movimento se foi organizando, criou um site e páginas em redes sociais, produzindo um «storytelling» de carácter reivindicativo com base em mais de 40 exigências e 25 propostas para a crise; o qual dava voz a um clima de profunda insatisfação quanto à situação socioeconómica em que vivem as classes média e média-baixa. Claro está que esta narrativa agradou aos partidos extremistas, desde a esquerda radical de Mélenchon à direita nacionalista de Marine Le Pen, que imediatamente declararam o seu apoio à causa. Pouco depois, era a vez dos intelectuais se manifestarem. De um lado, destacaram-se os artigos dos pós-marxistas Slavoj Žižek e Antonio Negri. Do outro, os nacionalistas russos, desde o esquerdista Boris Kagarlitsky ao tradicionalista Aleksandr Dugin, tampouco esconderam o seu entusiasmo quanto ao movimento. Com efeito, todos estes intelectuais têm algo em comum: a produção de um «story building» de cariz revolucionário.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Hodkinson, Alan. „Fundamental British Values“. International Review of Qualitative Research 13, Nr. 1 (Mai 2020): 23–40. http://dx.doi.org/10.1177/1940844720908568.

Der volle Inhalt der Quelle
Annotation:
In 2014, the United Kingdom Coalition Government, after the now infamous Trojan Horse incident, insisted that all children learn Fundamental British Values. Cameron, as Prime Minister, argued that such values, coupled with “muscular liberalism” would “challenge extremist ideology, exposing it for the lie that it is.” This article exists at the place of the apostrophe—as the scare mark (‘ ’) becomes an enclosure, enclosing a manufactured possession. “Is Britishness just a made up concept? Who determines what is or is not fundamental? I want to problematize what they include and exclude in their concept of “British Values.” What is this “British” they talk about and why do they feel a need for this “Britain” to exist? Within the enclosures provided by ‘ten scare marks’, I present research into historical and contemporary formulations of Britishness taken from academic texts, school textbooks, and websites. In addition, by invoking the work of Serres, Bhabba, and Billig, I seek to confront Cameron’s challenging discourse. Within this article, I do not though attempt to detail an authentic Britishness but rather from the outset argue that there is, and This analysis is disturbing. It disturbs my thoughts but also my personal history- it is troubling. never was any authenticity in this concept. What I seek to argue here is that their “British-ness” is nothing more than a portable, lean-to concept of violence. A “manufactured concept” (Nationalism and the origins of prejudice, International Journal of Historical Teaching, Learning and Research) which locates an inclusion but by default formulates an exclusion whose antecedents lie more in the government counter terrorists’ strategies than any substantial historical fact If it is manufactured where does this leave my schooling – which told me Britain was great? (Britishness from a linguistic perspective in school textbooks). The paper concludes by suggesting that their “Britain” is a rhetorical trope. It is itself a Trojan horse—which through flagging and banal nationalism (Banal nationalism) indoctrinates and radicalizes our children into an invented—pererted nationalism that the political elite employs to deal with a perceived/conceived/contrived threat of an internal other to our geographical, historical, and ideological borders.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Бгажноков, М. В. „Information extremism: entity and the features of the manifestation“. Journal of Applied Research, Nr. 4 (30.04.2024): 154–58. http://dx.doi.org/10.47576/2949-1878.2024.4.4.024.

Der volle Inhalt der Quelle
Annotation:
В статье рассматриваются причины возникновения, пути распространения и профилактики информационного экстремизма, который на сегодняшний день имеет не меньшую опасность, чем его традиционные формы. Благодаря цифровому пространству даже один носитель радикальных взглядов может нанести обществу больший урон, чем большая группировка, не пользующаяся благами прогресса. Он может распространить больше вредоносной информации, совершить различные общественно опасные деяния в цифровой сфере, если будет располагать необходимыми знаниями и оборудованием. Информационные экстремисты не совершают физических действий, как, например, взрывы, но они действуют в цифровом пространстве и наносят большой урон. Например, они могут взламывать различные правительственные сайты, счета граждан, распространять запрещенную или не соответствующую действительности информацию. Целью таких действий являются хаос в цифровом мире. В качестве целей экстремисты могут выбирать отдельных людей, сообщества, государственные органы и др. Они могут прибегать не только к различным техническим способам влияния на цели, но и вступать с ними в дискуссии, убеждать в своей правоте, шантажировать, вербовать. The article examines the causes, ways of spreading and preventing information extremism, which today is no less dangerous than its traditional forms. Thanks to the digital space, even a single bearer of radical views can cause more damage to society than a large group that does not benefit from progress. He can spread more malicious information and commit various socially dangerous acts in the digital sphere if he has the necessary knowledge and equipment. Information extremists do not commit physical acts, such as explosions, but they operate in the digital space and cause great damage of a different nature. For example, they can hack various government websites, citizens’ accounts, and distribute prohibited or untrue information. The purpose of such actions is chaos and confusion in the digital world. Extremists can target individuals, communities, government agencies, and more. They can resort not only to various technical methods of influencing goals, but also enter into discussions with them, convince them of their rightness, blackmail, recruit.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Svennevig, Hans, Lee Jerome und Alex Elwick. „Countering violent extremism in education: a human rights analysis“. Human Rights Education Review 4, Nr. 1 (11.03.2021): 91–110. http://dx.doi.org/10.7577/hrer.3980.

Der volle Inhalt der Quelle
Annotation:
Governments around the world have developed a range of policy approaches for countering violent extremism (CVE) in education. In this article we review a United Kingdom (UK) government website offering a library of resources (Educate Against Hate), evaluating the extent to which it is consistent with human rights principles. Whilst the advice, guidance and resources are varied and inconsistent, our analysis shows that children are frequently perceived as potential victims in need of protection, rather than individuals with agency, and they are rarely considered explicitly as rights holders. Whilst an equalities framework is used throughout the website, this is rarely linked to human rights, and does not prevent some stereotypical views of religious minorities being promoted. The article ends with an outline of how a more explicit engagement with children’s rights might help teachers to better align CVE policy with human rights education (HRE) principles.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Болвачев, М. А. „PECULIARITIES OF THE PRODUCTION OF LINGUISTIC FORENSIC EXAMINATIONS IN CASES OF CRIMES OF EXTREMISM IN SOCIAL NETWORKING WEBSITE“. Digest of research works "Criminalistics: yesterday, today, tomorrow", Nr. 2(22) (30.06.2022): 17–24. http://dx.doi.org/10.55001/2587-9820.2022.46.64.003.

Der volle Inhalt der Quelle
Annotation:
Производство лингвистических судебных экспертиз по делам о преступлениях экстремистской направленности является одной из основных по данным категориям дел. Особенное значение данные экспертизы имеют в пространстве социальных сетей информационно-телекоммуникационной сети Интернет. В статье рассматриваются основные проблемы производства таких экспертиз, их доказательственного значения. Определяются особенности применения отдельных нормативных определений в контексте их нормативного и лексического значения. Автором проведен анализ подходов к объекту лингвистических экспертиз и влияния объекта на результаты экспертизы. Рассматривается проблема правовых вопросов в лингвистических экспертизах по делам экстремистской направленности в социальных сетях. Предлагаются отдельные рекомендации по постановке вопросов эксперту. The production of linguistic forensic examinations in cases of extremist crimes is one of the main ones for these categories of cases. These examinations are of particular importance in the space of social networks of the global Internet. The article deals with the main problems of the production of such examinations, their evidentiary value. The features of the application of individual normative definitions in the context of their normative and lexical meaning are determined. The author analyzed the approaches to the object of linguistic examinations and the influence of the object on the results of the examination. The problem of legal issues in linguistic expertise in cases of extremist orientation in social media is considered. Separate recommendations are offered on posing questions to the expert.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Mustakim, Zaenal, Fachri Ali und Rahmat Kamal. „Empowering Students as Agents of Religious Moderation in Islamic Higher Education Institutions“. Jurnal Pendidikan Islam 7, Nr. 1 (30.06.2021): 65–76. http://dx.doi.org/10.15575/jpi.v7i1.12333.

Der volle Inhalt der Quelle
Annotation:
Promoting moderate Islam in the education sector to prevent radicalism and violent extremism, particularly in Indonesia’s Islamic universities has been considered important. This study demonstrated how values of moderate Islam empower student to prevent radicalism and violent extremism in university. This research is qualitative case study. Eight students and two teachers at a public Islamic university in Central Java, Indonesia were recruited to participate. Data were collected through semi-structured interviews and observation. The result of the study shows that the values of tolerance, inclusivity, flexibility, and objectivity in understanding religious texts were internalized to empower students as agents of religious moderation. The presentation of learning materials were adopted from national journals, reputable international journals, websites, and official social media platforms for moderate Muslim intellectuals. The materials contributed significantly to the prevention of hate speech and hoaxes.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Kononova, N. K. „Weather extremums in Siberia in 2019 and their connection with circulation of the atmosphere“. Environmental Dynamics and Global Climate Change 10, Nr. 2 (24.02.2020): 110–19. http://dx.doi.org/10.17816/edgcc21204.

Der volle Inhalt der Quelle
Annotation:
According to the circulation seasons [Dzerdzeevsky et al., 1946], according to the website Weather News, extreme events in the Asian territory of Russia for first half of 2019 were considered: daily maximums and minimums of air temperature; maximum daily amplitudes of air temperature, daily maximums and monthly lows of atmospheric precipitation; daily maximums wind speeds, maximum and minimum of snow depths and dangerous natural processes. Their connection with the atmospheric circulation of the Northern Hemisphere has been shown [Atmospheric Circulation fluctuations site 18992018]. In recent years, extreme situations are increasingly becoming apparent in the Asian part of Russia. This attracts the close attention of researchers [Latysheva et al., 2010; Zolina, Bulygina, 2016]. They try to identify the causes of what is happening [Vasilyev et al., 2018; Kononova, 2018; Kochugova, 2018; Tarabukina et al., 2018] and predict the future nature of extrema [Shkolnik et al., 2012]. It seemed interesting to analyze the extremes of the current year (more precisely, the first half of it), to show the real situation today. The majority of extremes, surpassed in the first half of 2019, refers to the 21st century. This means that extremity has been growing rapidly in recent years. The consequence of this is an increase in the frequency of occurrence of dangerous natural processes. The main source of information on daily meteorological extremes was Weather News [Meteonovosti.ru]. It briefly informed about fires and floods. More detailed information was taken from local sites [Amur.Info, Taiga.Info, Ulpress.ru, Social media news]. The character of atmospheric circulation was analyzed by classification [Dzerdzeevsky et al., 1946] using data from the site of the Atmospheric Circulation fluctuations.. for 1899 2018 The most disastrous flood was June 24 - 29 in the Irkutsk region. It destroyed more than 10,000 residential homes in 98 settlements, 43 schools, kindergartens and hospitals. According to information on July 11, 25 people died. The strongest were fires in the Krasnoyarsk Territory and the Irkutsk Region in the third decade of July. Smoke from them reached the Ulyanovsk region. The conducted research allows to draw the following conclusions. The number of extremes of both air temperature and precipitation in the XXI century continues to grow. Negative extremes of precipitation in combination with positive extremes of air temperature lead to natural fires, positive extremes of precipitation - to catastrophic floods. The increasing frequency of atmospheric circulation contributes to an increase in the frequency of occurrence of those and others: an increase in the frequency of occurrence of blocking processes (arctic invasions resulting in the formation of a vast stationary anticyclone) and exits of southern cyclones.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Farooq Abdullah, Hafiz Muhammad, Lukmanul Hakim und M. Syahidan. „Traditionalist salafi’s involvement in the religious moderation da’wah“. Islamic Communication Journal 7, Nr. 2 (31.12.2022): 243–56. http://dx.doi.org/10.21580/icj.2022.7.2.12664.

Der volle Inhalt der Quelle
Annotation:
Traditionalist Salafi groups differ from political and jihadist salafi groups. Traditionalist Salafi chose a moderate path in their preaching. This article aims to analyze the moderate path of Salafi Rodja in Indonesia. Using a qualitative method where data is collected through observation and reading the community's official website and interviewing key informants, we argue that Rodja as a traditionalist salafi in Indonesia develops a moderate way of preaching by applying two approaches. First, contextualizing the understanding of jihad by rejecting violence in the name of Islamic jihad. Second, engage in social activities by providing educational services and moral and material assistance to people in need. Both of these approaches show the humanization of salafi teachings which are usually associated with extremism. This fact shows that Indonesian traditionalist Salafi seeks to emphasize moderate and humanist religious ways in their preaching. However, the tendency to moderate the way (manhaj) of da'wah cannot be separated from its position as a breakaway among mainstream moderate Islamic groups (Nahdlatul Ulama and Muhammadiyah), in addition to the government's efforts to eradicate extremist movements. This study contributes to the strengthening of moderate da'wah discourse among splinter groups***Kelompok Salafi tradisionalis berbeda dengan kelompok Salafi politik dan jihadis. Salafi tradisionalis memilih jalan moderate dalam dakwahnya. Artikel ini bertujuan untuk menganalisis jalur moderat Salafi Rodja di Indonesia. Dengan menggunakan metode kualitatif di mana data dikumpulkan melalui observasi dan membaca website resmi komunitas serta mewawancarai informan kunci, kami berpendapat bahwa Rodja sebagai salafi tradisionalis di Indonesia mengembangkan cara dakwah moderat dengan menerapkan dua pendekatan. Pertama, mengkontekstualisasikan pemahaman jihad dengan menolak kekerasan atas nama jihad Islam. Kedua, terlibat dalam kegiatan sosial dengan menyediakan layanan pendidikan dan bantuan moril dan material kepada masyarakat yang membutuhkan. Kedua pendekatan ini menunjukkan humanisasi ajaran salafi yang biasanya sering diasosiasikan dengan ekstremisme. Fakta ini menunjukkan bahwa Salafi tradisionalis Indonesia berusaha untuk menekankan cara-cara keagamaan yang moderat dan humanis dalam dakwahnya. Namun, kecenderungan untuk memoderasi cara (manhaj) dakwah tidak lepas dari posisinya sebagai sempalan di antara kelompok arus utama Islam moderat (Nahdlatul Ulama dan Muhammadiyah), di samping upaya pemerintah memberantas gerakan ekstremis. Studi ini memberikan kontribusi bagi penguatan diskursus dakwah moderat dalam kalangan kelompok sempalan.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Lee, Mira, Shelly Rodgers und Mikyoung Kim. „Effects of Valence and Extremity of eWOM on Attitude toward the Brand and Website“. Journal of Current Issues & Research in Advertising 31, Nr. 2 (September 2009): 1–11. http://dx.doi.org/10.1080/10641734.2009.10505262.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Orr Bueno, Caroline. „Russia's Role in the Far-Right Truck Convoy“. Journal of Intelligence, Conflict, and Warfare 5, Nr. 3 (31.01.2023): 1–22. http://dx.doi.org/10.21810/jicw.v5i3.5101.

Der volle Inhalt der Quelle
Annotation:
Nearly a year after the start of Canada’s 2022 Freedom Convoy—a series of protests and blockades that brought together a wide variety of far-right activists and extremists, as well as ordinary Canadians who found common ground with the aggrieved message of the organizers—the question of whether and to what degree foreign actors were involved remains largely unanswered. This paper attempts to answer some of those questions by providing a brief but targeted analysis of Russia’s involvement in the Freedom Convoy via media and social media. The analysis examines Russian involvement in the convoy through the lenses of overt state media coverage, state-affiliated proxy websites, and overlap between Russian propaganda and convoy content on social media. The findings reveal that the Russian state media outlet RT covered the Freedom Convoy far more than any other international media outlet, suggesting strong interest in the far-right Canadian protest movement on the part of the Russian state. State-affiliated proxy websites and content on the messaging platform Telegram provide further evidence of Russia’s strategic interest in the Freedom Convoy. Based on these findings, it is reasonable to infer that there was Russian involvement in the 2022 truck convoy, though the scope and impact remain to be determined. Received: 2023-01-13Revised: 2023-01-24
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Anwar Jenris Tana und Milton T. Pardosi. „Efektivitas Penginjilan Digital sebagai Media dan Tantangan dalam Pemuridan Generasi Muda“. JUITAK : Jurnal Ilmiah Teologi dan Pendidikan Kristen 2, Nr. 1 (31.03.2024): 14–26. http://dx.doi.org/10.61404/juitak.v2i1.189.

Der volle Inhalt der Quelle
Annotation:
AbstractDigitalization has had a significant impact on various aspects of life, including in the realm of business and religious practices. This research focuses on Christian evangelism in the digital era, where technology has become an integral tool for spreading religious teachings. Digitalization allows churches and religious organizations to leverage social media, websites, podcasts, and other online platforms to reach a wider audience, significantly younger generations increasingly connected to technology. This research uses literature analysis methods and phenomenon observation as the primary approach. The research results show that digital evangelism effectively reaches a broader audience but is also faced with challenges, such as the risk of spreading misinformation or religious extremism. The importance of ethical responsibility in using technology is highlighted, with the need for churches and spiritual leaders to develop discipleship strategies that are contextual and responsive to current developments.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Ahmad Fadzlillah, Nurrulhidayah, Siti Jamilah Mohd Sukri, Abdul Rohman, Anis Hamizah Hamid und Nurul Widad Fitri Muhammad. „Analysis of Woman Fiqh Jihad Based on Selected Malaysian Woman Extremism Cases“. Jurnal Islam dan Masyarakat Kontemporari 23, Nr. 2 (30.08.2022): 234–47. http://dx.doi.org/10.37231/jimk.2022.23.2.621.

Der volle Inhalt der Quelle
Annotation:
Human being has experienced several series of pandemics throughout life‘s history. The serious impacts of the pandemic are experiencing towards different sectors include threatening global food security. The consequences of the COVID-19 outbreak have affected people’s productivity in daily life. The disruptive effect gives a major strike on the food supply chain which is one of the most vital areas of the economy. Prior to the outbreak of Covid 19, this paper will be discussing the factors and effects of the pandemic on global food security. Due to the income decline, it leads to difficulty accessing healthy and nutritious food. Implementation of Movement Control Order (MCO) has affected the agriculture productivity sector as well. At the early stage of the pandemic, panic buying becomes a new trend among the consumers to ensure the food supply keeps available. The declination of purchasing power is another effect, particularly from the low-income community. The risk of virus infection is reported to be high among the food supply chain workers due to negligence towards Standard Operating Procedure (SOP). Lastly, this pandemic also affected mostly community dietary routine patterns. To write this paper, the researchers are genuinely depending on the secondary sources from recent academic journals and trusted websites to vast up the discussion. It is hoped that this paper provides good ideas for other researchers to vast up another scope of discussion in the future.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Wijaya, Windhi, Sentot und Aryanto Firnadi. „Implementasi Moderasi Beragama Dalam Membangun Kerukunan Umat Beragama“. Jurnal Nyanadassana: Jurnal Penelitian Pendidikan, Sosial dan Keagamaan 2, Nr. 2 (30.12.2023): 122–33. http://dx.doi.org/10.59291/jnd.v2i2.39.

Der volle Inhalt der Quelle
Annotation:
The purpose of this research is to understand and describe the implementation of religious moderation in fostering interfaith harmony among religious communities. Religious moderation ensures that in practicing religious teachings, a follower should not be confined within limits that push towards extreme doctrines prioritizing one's own teachings, thus fostering mutual respect and honor amidst existing diversity. This research is qualitative in nature, employing a descriptive analytical approach. Data collection involves observation, interviews, and documentation. Data analysis comprises four stages: data condensation, data display, verification, and drawing conclusions. Primary and secondary data sources are used, obtained from interviews with village officials, religious figures, and community leaders. Other data sources include books, journals, theses, and relevant websites. The findings indicate that the implementation of religious moderation in building interfaith harmony is still lacking due to prevailing intolerance in religious practices. This intolerance manifests in forms such as violence, discrimination, extremism, fanaticism, and fundamentalism.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Zhu, Huawei, Rungting Tu, Wenting Feng und Jiaojiao Xu. „The impacts of evaluation duration and product types on review extremity“. Online Information Review 43, Nr. 5 (09.09.2019): 694–709. http://dx.doi.org/10.1108/oir-11-2017-0331.

Der volle Inhalt der Quelle
Annotation:
Purpose Extreme online reviews can have great impacts on consumers’ purchase decisions. The purpose of this paper is to investigate when users are more likely to provide extreme ratings. The study draws inference from attitude certainty theory and proposes that review extremity is influenced by the interaction of evaluation duration and product/service types: for hedonic products/services, shorter evaluation duration can foster attitude certainty, leading to higher review extremity; in contrast, for utilitarian products/services, longer evaluation duration can increase attitude certainty, resulting in more extreme reviews. Design/methodology/approach Three studies were conducted to test the hypotheses: Study 1 is an empirical analysis of 3,000 reviews from an online retailing website; Studies 2 and 3 are two between-subject experiments. Findings Results from three studies confirm the hypotheses. Study 1 provides preliminary evidence on how review extremity varies in evaluations of different durations and product/service types. Results from Studies 2 and 3 show that for hedonic products/services, the shorter the evaluation duration, the more likely users are to give extreme ratings; however, for utilitarian products/service, the longer the evaluation duration, the more likely users are to give extreme reviews; and attitude certainty plays a mediating role between evaluation duration and review extremity. Originality/value Findings from this study provide understandings on when a fast rather than a slow evaluation can lead to more extreme reviews. The results also highlight the role of users’ attitude certainty in the underlying mechanism.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Cameron-McKee, Samuel. „The affordances of Reddit and framing of extremism on r/the_donald“. Journal of Applied Linguistics and Professional Practice 17, Nr. 3 (17.11.2023): 231–51. http://dx.doi.org/10.1558/jalpp.21907.

Der volle Inhalt der Quelle
Annotation:
This paper reports on a study of r/the_donald, and how comment threads in this community were framed and rekeyed toward extremism. r/the_donald was a community on the social media website Reddit organized around fervent support for Donald Trump. In this paper, theories surrounding the features of Reddit such as its cultures, systems and potential for manipulation are connected to Goffman’s frame analysis to examine comments on r/the_donald from a discourse perspective. By analyzing a chain of twelve comments on r/the_donald through this lens, the effect that Reddit’s affordances had on communication was explored. A series of example comments that successively repositioned, or ‘rekeyed’, an original post, showed how the affordances of Reddit might facilitate the emergence of extreme right-wing talking points. It was found that the nature of Reddit’s scoring system, in which highly supported comments are highlighted and contentious comments are hidden from view, could create a situation in which rekeyings of a situation could be made to appear highly credible. It is hypothesized that attempting to argue with these rekeyings, or even to call them out as being in bad faith, may be difficult. The study concludes that the effect of Reddit’s affordances on the process of framing on r/the_donald allowed posts that may be in bad faith to receive positive attention so long as they supported Donald Trump.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Tiwari, Prayag, Brojo Kishore Mishra, Sachin Kumar und Vivek Kumar. „Implementation of n-gram Methodology for Rotten Tomatoes Review Dataset Sentiment Analysis“. International Journal of Knowledge Discovery in Bioinformatics 7, Nr. 1 (Januar 2017): 30–41. http://dx.doi.org/10.4018/ijkdb.2017010103.

Der volle Inhalt der Quelle
Annotation:
Sentiment Analysis intends to get the basic perspective of the content, which may be anything that holds a subjective supposition, for example, an online audit, Comments on Blog posts, film rating and so forth. These surveys and websites might be characterized into various extremity gatherings, for example, negative, positive, and unbiased keeping in mind the end goal to concentrate data from the info dataset. Supervised machine learning strategies group these reviews. In this paper, three distinctive machine learning calculations, for example, Support Vector Machine (SVM), Maximum Entropy (ME) and Naive Bayes (NB), have been considered for the arrangement of human conclusions. The exactness of various strategies is basically inspected keeping in mind the end goal to get to their execution on the premise of parameters, e.g. accuracy, review, f-measure, and precision.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Puschmann, Cornelius, Julian Ausserhofer, Noura Maan und Markus Hametner. „Information Laundering and Counter-Publics: The News Sources of Islamophobic Groups on Twitter“. Proceedings of the International AAAI Conference on Web and Social Media 10, Nr. 2 (04.08.2021): 143–50. http://dx.doi.org/10.1609/icwsm.v10i2.14847.

Der volle Inhalt der Quelle
Annotation:
Which news sources do supporters of populist islamophobic groups and their opponents rely on, and how are these sources related to each other? We explore these questions by studying the websites referenced in discussions sur- rounding Pegida, a right-wing populist movement based in Germany that is opposed to what its supporters regard as is- lamization, cultural marginalization and political correct- ness. We draw on a manual content analysis of the news sources and the stances of Twitter users, to then calculate the overlap of sources across audiences. Finally, we perform a cluster analysis of the resulting user groups, based on shared sources. Preferences by language, nationality, region and politics emerge, showing the distinction between differ- ent groups among the users. Our tentative findings have im- plications both for the study of mass media audiences through the lens of social media, and for research on the public sphere and its possible fragmentation in online dis- course. This contribution, which is the result of an interdis- ciplinary collaboration between communication scholars in Germany and journalists in Austria, is part of a larger ongo- ing effort to understand forms of online extremism through the analysis of social media data.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Firdaus, Wildan Kholidul. „ANALISIS PERILAKU BOM BUNUH BERDASARKAN TEORI AGRESI DAN BUNUH DIRI SEBAGAI DETEKSI DINI RADIKALISME“. Jurnal Cerdik: Jurnal Pendidikan dan Pengajaran 1, Nr. 2 (30.06.2022): 26–32. http://dx.doi.org/10.21776/ub.jcerdik.2022.001.02.03.

Der volle Inhalt der Quelle
Annotation:
In mid-May 2018 before ramadhan, not long after terror at Mako Brimob Depok, Indonesian people were shocked by a series of terrorist suicide bombings in various places in Surabaya which involved a family including school-age children as the perpetrators. Various figures and experts flocked to express opinions and theories, ranging from radicalism, extremism, even conspiracy theories. The onslaught of terror is also much associated with religion and certain understandings which of course only focus on the ideology of a group of people, and forget the actors as individuals with cognitive abilities who consciously choose to commit suicide bombing. This article is based on literature reviews of journals coming from various official sources and websites, each article selected to describe the theory of aggression and suicide in relation to suicide bombings. In this paper, the author wants to open up a few opportunities for the theories of aggression and suicide to explain the behavior of suicide bombing terror. The purpose of this article is to define the criteria of vulnerable individuals to be recruited to commit suicide bombings, raising our awareness to the social environment including the scope of education so that early prevention can be done.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Rahman, Fazlul. „Kekerasan Atas Nama Tuhan: Respons "Netizen" Indonesia“. JURNAL INDO-ISLAMIKA 2, Nr. 2 (20.06.2012): 197–231. http://dx.doi.org/10.15408/idi.v2i2.1175.

Der volle Inhalt der Quelle
Annotation:
Violence in the name of God—terrorism attacks, violence toward minority even inter religious conflicts—has nowadays become a global issue. In Indonesia, there are at least 30 cases of “holy” violence committed in the last ten years. The demand to have such freedoms, as of expression, of speech, of getting access to information, could be seen as a process of an ongoing democracy. Internet, in this context, is one of the popular media to channel this ambitions of democracy. On the other hand, many Muslim extremists use this change and this media to channel the ideology of jihad. This article aims to shed light on how the Indonesia netizen’s (cyber community) response to those kind of radical Islamist messages. By using descriptive content analysis to the comments of the respective issue in Kaskus website, this paper sees the variety of the responses that would contribute to the prevention of violence in the name of religion and suggest some solutions.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

van der Heijden, Hans. „Charities in Competition: Effects of Accounting Information on Donating Adjustments“. Behavioral Research in Accounting 25, Nr. 1 (01.09.2012): 1–13. http://dx.doi.org/10.2308/bria-50295.

Der volle Inhalt der Quelle
Annotation:
ABSTRACT: Following the emergence of high-profile charity comparison websites, donors are increasingly able to evaluate accounting information of several competing charities before they make a donation. Previous literature has primarily examined the effects of accounting information on donations to single charities. This study looks at the giving intentions of individual donors in settings with several charities, where charities directly compete with each other for the individual donation. The study presents an experiment (n = 226) where individuals adjust their donations after studying the program-spending ratios of the charities. The results indicate a flight to extremes—accounting information affects donations to charities at the extreme ends of the shortlist, but charities that are in the middle do not benefit. Threshold information (i.e., information whether each charity meets generally accepted guidelines for program-spending ratios) affects donation adjustments only if this information influences the positions of the charities at the top and bottom of the shortlist.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

S, Dr Shivashankara, Archana B J, Vijayalakshmi D, Meghana Gowda D und Anusha . „Road Accident Analysis and Prediction Model using a Data Mining Hybrid Technique“. International Journal for Research in Applied Science and Engineering Technology 10, Nr. 7 (31.07.2022): 4300–4304. http://dx.doi.org/10.22214/ijraset.2022.45977.

Der volle Inhalt der Quelle
Annotation:
Abstract: In India, Roads plays major role of Accidents. There are many reasons for occurring accident in India, like consuming alcohol, atmospheric condition, connection points, vehicle fault, speed, road defect etc.. The major goal of this paper is to make up analytical mock up for road accident taking into consideration of earlier years datasets from 2011-2021 and predicting the future result of 2022. The required datasets are collected from data.gov.in website for further processing. An hybrid technique is developed using the data mining techniques such Linear Regression, K-Means Clustering, Association Rule and Naive Bayes algorithms. There are 3 elements of disaster extremity has been researched by forecasting the outcome of 2022 considering all places, and on the basis high and low-level frequency of disasters Clustering of places (states) are done. Comparatively, the proposed model yields the moderately better accuracy rate.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Ariyawardana, S. S. N. „Regional Security Perspectives in South Asia: Indo-Pakistan Rivalry“. Vidyodaya Journal of Humanities and Social Sciences 07, Nr. 02 (01.07.2022): 153–64. http://dx.doi.org/10.31357/fhss/vjhss.v07i02.11.

Der volle Inhalt der Quelle
Annotation:
Inter-state and intra-state conflicts emerged with political, social, and economic factors which increasingly contributed to security dilemmas at global and regional levels. This study investigates the regional security issues which have emerged through the Indo-Pakistani conflict in South Asia. In order to obtain the data for this study, secondary qualitative data and information based on an archival research methodology were used. Books, journal articles, research papers, official websites, and e-Newspapers were incorporated into this archival research. According to this study, the first and second Kashmir wars, the 1971 conflict, the Kargil conflict, the attack on the Indian Parliament, the 2002 Military Standoff, the Mumbai Terror attack, and the Surgical Strikes carried out by India have all contributed to the gradual development of the Indo-Pakistan war, which has led to current concerns about regional security. Interstate strife and tension, hostility between nations, mutual mistrust and animosity posed by terrorism, religious extremism, nuclearization, and economic and political instability have all intensified due to security concerns posed by the Indo-Pakistan rivalry. Finally, as an effort to address these security issues related to the Indo-Pakistani wars, this study has proposed the establishment of a ‘South Asian Regional Security Cooperation’. This proposed Cooperation will be treated under four basic regional security corporation models: alliances, collective security, security regimes, and security communities to reinforce regional security in South Asia.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Zavarzina, G. A. „LANGUAGE MARKERS OF TERRORIST-COLORED TEXT AND METHODS FOR THEIR IDENTIFICATION“. VESTNIK IKBFU PHILOLOGY PEDAGOGY AND PSYCHOLOGY, Nr. 1 (2023): 30–39. http://dx.doi.org/10.5922/pikbfu-2023-1-3.

Der volle Inhalt der Quelle
Annotation:
A terrorist-­colored text (T-text) can be understood as a piece of speech containing specific linguistic elements denoting a terrorist threat, according to the features of which it is possible to identify not only the socially dangerous content of the utterance, but also to evaluate the degree of its impact. The archive of the dataset of the extremist website “Kavkaz” banned in the Russian Federation, which contains several thousand links to various topics, served as the material for analysis. A comprehensive method of analyzing T-texts was proposed, aimed at detecting, identifying and distributing T-information over the danger scale: a method of level analysis of language material, in which the text is analyzed as a semantic space formed by linguistic means of different levels, and a method of semasiological analysis of language material, which allows identifying elements of rigid ideologization, due to the terrorist ideology prevailing in the T-space, and unidirectional evaluation, determined by the conformity/ non-conformity of a concept to the basic provisions of the ideology of terrorism. It is concluded that the presented method of linguistic analysis makes it possible to detect verbal signs of a terrorist threat in the discursive space, presented at the explicit and implicit levels, and thus provide a high level of objectivity in linguistic analysis.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

Harner, Jordan, Lydia Ray und Florence Wakoko-Studstill. „An Investigation of the Effectiveness of Facebook and Twitter Algorithm and Policies on Misinformation and User Decision Making“. Journal of Systemics, Cybernetics and Informatics 20, Nr. 5 (Oktober 2022): 118–37. http://dx.doi.org/10.54808/jsci.20.05.118.

Der volle Inhalt der Quelle
Annotation:
Prominent social media sites such as Facebook and Twitter use content and filter algorithms that play a significant role in creating filter bubbles that may captivate many users. These bubbles can be defined as content that reinforces existing beliefs and exposes users to content they might have otherwise not seen. Filter bubbles are created when a social media website feeds user interactions into an algorithm that then exposes the user to more content similar to that which they have previously interacted. By continually exposing users to like-minded content, this can create what is called a feedback loop where the more the user interacts with certain types of content, the more they are algorithmically bombarded with similar viewpoints. This can expose users to dangerous or extremist content as seen with QAnon rhetoric, leading to the January 6, 2021 attack on the U.S. Capitol, and the unprecedented propaganda surrounding COVID-19 vaccinations. This paper hypothesizes that the secrecy around content algorithms and their ability to perpetuate filter bubbles creates an environment where dangerous false information is pervasive and not easily mitigated with the existing algorithms designed to provide false information warning messages. In our research, we focused on disinformation regarding the COVID-19 pandemic. Both Facebook and Twitter provide various forms of false information warning messages which sometimes include fact-checked research to provide a counter viewpoint to the information presented. Controversially, social media sites do not remove false information outright, in most cases, but instead promote these false information warning messages as a solution to extremist or false content. The results of a survey administered by the authors indicate that users would spend less time on Facebook or Twitter once they understood how their data is used to influence their behavior on the sites and the information that is fed to them via algorithmic recommendations. Further analysis revealed that only 23% of respondents who had seen a Facebook or Twitter false information warning message changed their opinion "Always" or "Frequently" with 77% reporting the warning messages changed their opinion only "Sometimes" or "Never" suggesting the messages may not be effective. Similarly, users who did not conduct independent research to verify information were likely to accept false information as factual and less likely to be vaccinated against COVID-19. Conversely, our research indicates a possible correlation between having seen a false information warning message and COVID-19 vaccination status.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

Bekdache, Omar, Tiffany Paradis, Yu Bai He Shen, Aly Elbahrawy, Jeremy Grushka, Dan L. Deckelbaum, Kosar Khwaja, Paola Fata, Tarek Razek und Andrew Beckett. „Resuscitative endovascular balloon occlusion of the aorta (REBOA): a scoping review protocol concerning indications—advantages and challenges of implementation in traumatic non-compressible torso haemorrhage“. BMJ Open 9, Nr. 2 (Februar 2019): e027572. http://dx.doi.org/10.1136/bmjopen-2018-027572.

Der volle Inhalt der Quelle
Annotation:
IntroductionHaemorrhage remains the leading cause of preventable death in trauma. Damage control measures applied to patients in extremis in order to control exsanguinating bleeding from non-compressible torso injuries use different techniques to limit blood flow from the aorta to the rest of the body. Resuscitative endovascular balloon occlusion of the aorta (REBOA) is regaining momentum recently as an adjunct measure that can provide the same results using less invasive approaches. This scoping review aims to provide a comprehensive understanding of the existing literature on REBOA. The objective is to analyse evidence and non-evidence-based medical reports and to describe current gaps in the literature about the best indication and implementation strategies for REBOA.Methods and analysisUsing the five-stage framework of Arksey and O’Malley’s scoping review methodology as a guide, we will perform a systematic search in the following databases: MEDLINE, EMBASE, BIOSIS, COCHRANE CENTRAL, PUBMED and SCOPUS from the earliest available publications. The aim is to identify diverse studies related to the topic of REBOA. For a comprehensive search, we will explore organisational websites, key journals and hand-search reference lists of key studies. Data will be charted and sorted using a descriptive analytical approach.Ethics and disseminationEthics approval is not necessary as the data are collected from publicly available sources and there will be no consultative phase. The results will be disseminated through presentations at local, national, clinical and medical education conferences and through publication in a peer-reviewed journal.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Chapp, Christopher, Paul Roback, Kendra Johnson-Tesch, Adrian Rossing und Jack Werner. „Going Vague: Ambiguity and Avoidance in Online Political Messaging“. Social Science Computer Review 37, Nr. 5 (05.08.2018): 591–610. http://dx.doi.org/10.1177/0894439318791168.

Der volle Inhalt der Quelle
Annotation:
Researchers have long investigated the conditions that promote the unambiguous communication of issues in political campaigns; however, previous research has been largely theoretic or has only tested ambiguous communication on a limited range of issues. We address these gaps, making three principal contributions. First, we provide an extensive empirical test of ambiguous communication, scoring every issue addressed on website “issues pages” from House candidates in 2014. Second, we accomplish this by using a supervised learning content analysis procedure that allows us to score a large volume of text based on a smaller subset of hand-coded text. This allows us to not only examine whether candidates comment on an issue but also the clarity of their message. Third, this article provides empirical support for how candidates’ communication strategies are shaped not only by the candidates’ personal characteristics but also the characteristics of the district. We find that district heterogeneity is an important predictor of ambiguous communication. Evidence also indicates that issue ownership and ideological extremity play a decisive role in the decision to “go vague.”
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Hernández, Antonia. „Making Room for Post-Authentic Domesticity“. Persona Studies 8, Nr. 2 (03.02.2023): 70. http://dx.doi.org/10.21153/psj2022vol8no2art1685.

Der volle Inhalt der Quelle
Annotation:
This creative response interrogates the persona that seems to inhabit sex webcam platforms, online services where people can stream and monetize amateur sexual performances (Henry & Farvid 2017; Jones 2020). If the perception of authenticity has been a crucial feature of camming since its inception (Senft 2008), this impression is no longer conveyed only through amateur signifiers (Hernández 2019). Domesticity on the sexcam platform oscillates between two poles. One of them is incarnated by the professional webcam studio, where uninhabited rooms are presented as private yet generic spaces (Korody 2019). The other pole is the personal space, staged for its transmission through the platform. Decorative trends and habits crossover between these extremes, creating a new type of domesticity with no other purpose than the sexual spectacle. The product of this mutual influence is referred to as ‘post-authentic domesticity’ in this article. Drawing upon literary studies, post-authenticity implies a fiction that engages with an ‘authentic’ referent but does not aim to replicate it (Gefter Wondrich 2020). As such, domesticity in the sexcam platform is both a second-hand reference and a space where its online persona unfolds.The exploration of this post-authentic domesticity is conveyed by means of a website that replicates some of the graphic conventions of sexcam performers’ profiles. The website is divided into different pages that address distinct aspects in the form of short poems. The images accompanying the texts, created by the author, were made using ASCII characters and they reference empty webcam rooms observed in the sexcam platform Chaturbate during 2022. The abstract character of the images aims to emphasize the role of the audience in the construction of online intimacy and meaning.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Zalewski, Daniel P., Karol P. Ruszel, Andrzej Stępniewski, Dariusz Gałkowski, Marcin Feldo, Janusz Kocki und Anna Bogucka-Kocka. „Relationships between Indicators of Lower Extremity Artery Disease and miRNA Expression in Peripheral Blood Mononuclear Cells“. Journal of Clinical Medicine 11, Nr. 6 (15.03.2022): 1619. http://dx.doi.org/10.3390/jcm11061619.

Der volle Inhalt der Quelle
Annotation:
Lower extremity artery disease (LEAD) is an underdiagnosed and globally underestimated vascular disease caused by the progressive and chronic formation of atherosclerotic plaques in the arteries of the lower limbs. Much evidence indicates that the abnormal course of pathophysiological processes underlying LEAD development is associated with altered miRNA modulatory function. In the presented study, relationships between miRNA expression and clinical indicators of this disease (ABI, claudication distance, length of arterial occlusion, Rutherford category, and plaque localization) were identified. MiRNA expression profiles were obtained using next-generation sequencing in peripheral blood mononuclear cells (PBMCs) of 40 LEAD patients. Correlation analysis performed using the Spearman rank correlation test revealed miRNAs related to ABI, claudication distance, and length of arterial occlusion. In the DESeq2 analysis, five miRNAs were found to be dysregulated in patients with Rutherford category 3 compared to patients with Rutherford category 2. No miRNAs were found to be differentially expressed between patients with different plaque localizations. Functional analysis performed using the miRNet 2.0 website tool determined associations of selected miRNAs with processes underlying vascular pathology, such as vascular smooth muscle cell differentiation, endothelial cell apoptosis, response to hypoxia, inflammation, lipid metabolism, and circadian rhythm. The most enriched functional terms for genes targeted by associated miRNAs were linked to regulation of the cell cycle, regulation of the transcription process, and nuclear cellular compartment. In conclusion, dysregulations of miRNA expression in PBMCs of patients with LEAD are indicative of the disease and could potentially be used in the prediction of LEAD progression.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

NIE, HAN, Chen Yan, Weimin Zhou und Tao-sheng Li. „Analysis of Immune and Inflammation Characteristics of Atherosclerosis from Different Sample Sources“. Oxidative Medicine and Cellular Longevity 2022 (25.04.2022): 1–31. http://dx.doi.org/10.1155/2022/5491038.

Der volle Inhalt der Quelle
Annotation:
Background. Atherosclerosis is the predominant cause of cardiovascular diseases. Existing studies suggest that the development of atherosclerosis is closely related to inflammation and immunity, but whether there are differences and similarities between atherosclerosis occurring at different sites is still unknown. We elucidated the pathological characteristics of peripheral vascular diseases by using bioinformatic analyses on immune cells and inflammation-related gene expression in atherosclerotic arteries and plaques. Methods. Eight data sets regarding atherosclerosis were downloaded from the Gene Expression Omnibus database. Human immune genes were obtained from the IMMPORT website. The samples were scored and divided into high- and low-immune groups. Then the samples were analysed using weighted gene co-expression network analysis, while the modules were analysed using functional enrichment. The protein–protein interaction network was constructed using the STRING and Cytoscape databases. The hub immune genes were screened, and the correlation between hub immune genes and immune cells was analysed. Results. Immune cells and their functions were significantly different during atherosclerosis development. The infiltration proportion of immune cells was approximately similar in samples from different sources of patients with carotid atherosclerosis. However, the sensitivity of lower extremity atherosclerosis samples to immune cells is lower than that of carotid atherosclerosis samples.The samples from the plaque and artery were mainly infiltrated by macrophages, T cells and mast cells. After immune cells were assessed, resting NK cells, activated mast cells and M0 macrophages were found to be key immune cells in atherosclerosis and plaque formation. In addition, CCL4, TLR2, IL1B and PTPRC were considered to be immune marker genes in atherosclerosis development. Conclusion. Bioinformatic data analysis confirms the essential role of immune cells in cardiovascular diseases, and also indicates some differences of immune and inflammation characteristics of atherosclerosis between carotid and lower extremity arteries.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

NIE, HAN, Chen Yan, Weimin Zhou und Tao-sheng Li. „Analysis of Immune and Inflammation Characteristics of Atherosclerosis from Different Sample Sources“. Oxidative Medicine and Cellular Longevity 2022 (25.04.2022): 1–31. http://dx.doi.org/10.1155/2022/5491038.

Der volle Inhalt der Quelle
Annotation:
Background. Atherosclerosis is the predominant cause of cardiovascular diseases. Existing studies suggest that the development of atherosclerosis is closely related to inflammation and immunity, but whether there are differences and similarities between atherosclerosis occurring at different sites is still unknown. We elucidated the pathological characteristics of peripheral vascular diseases by using bioinformatic analyses on immune cells and inflammation-related gene expression in atherosclerotic arteries and plaques. Methods. Eight data sets regarding atherosclerosis were downloaded from the Gene Expression Omnibus database. Human immune genes were obtained from the IMMPORT website. The samples were scored and divided into high- and low-immune groups. Then the samples were analysed using weighted gene co-expression network analysis, while the modules were analysed using functional enrichment. The protein–protein interaction network was constructed using the STRING and Cytoscape databases. The hub immune genes were screened, and the correlation between hub immune genes and immune cells was analysed. Results. Immune cells and their functions were significantly different during atherosclerosis development. The infiltration proportion of immune cells was approximately similar in samples from different sources of patients with carotid atherosclerosis. However, the sensitivity of lower extremity atherosclerosis samples to immune cells is lower than that of carotid atherosclerosis samples.The samples from the plaque and artery were mainly infiltrated by macrophages, T cells and mast cells. After immune cells were assessed, resting NK cells, activated mast cells and M0 macrophages were found to be key immune cells in atherosclerosis and plaque formation. In addition, CCL4, TLR2, IL1B and PTPRC were considered to be immune marker genes in atherosclerosis development. Conclusion. Bioinformatic data analysis confirms the essential role of immune cells in cardiovascular diseases, and also indicates some differences of immune and inflammation characteristics of atherosclerosis between carotid and lower extremity arteries.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Gouttebarge, Vincent, und Victor Zuidema. „Prevention of musculoskeletal injuries in recreational field hockey: the systematic development of an intervention and its feasibility“. BMJ Open Sport & Exercise Medicine 4, Nr. 1 (Oktober 2018): e000425. http://dx.doi.org/10.1136/bmjsem-2018-000425.

Der volle Inhalt der Quelle
Annotation:
ObjectiveThis article describes the systematic development of an intervention for the prevention of lower extremity injuries in field hockey and the assessment of its feasibility.MethodsThe intervention was developed according to the first four steps of the intervention mapping and knowledge transfer scheme processes, mostly based on focus group interviews with experts in field hockey and injury prevention (needs assessment; objective and target groups; content selection; development). Subsequently, a quasi-experimental research (one-group post-test design) was conducted among 35 young field hockey players and 7 coaches. Participants were asked to use the intervention for 3 weeks, and the degrees of relevancy, suitability, satisfaction and usability of the intervention were assessed by means of a questionnaire and a group interview.ResultsFirst, the needs assessment conducted among the main actors within recreational field hockey revealed that an injury prevention intervention was needed, ideally delivered through videos via an application for smartphone/tablet or website. Second, the objective and target groups of the intervention were defined, namely to prevent or reduce the occurrence of lower extremity injuries among both young and adult recreational field hockey players. Third, warming-up exercises were selected as preventive measures and strategies (eg, core stability, strength, coordination). Last, the ‘Warming-Up Hockey’ intervention was developed, consisting of a warm-up programme (delivered by coaches including more than 50 unique exercises). The relevancy, satisfaction and usability of ‘Warming-Up Hockey’ were positively evaluated, but two main alterations were made: the duration of the ‘Warming-up Hockey’ was reduced from 16 to 12 min and a match-specific warm-up was added.ConclusionThe feasibility of ‘Warming-Up Hockey’ was positively assessed by players and coaches. Prior to its nationwide implementation, the effectiveness of the intervention on injury reduction among field hockey players should be conducted.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Mohammed, Taufeeq, Utkarsh Shrivastava, Ashish K Das und Quynh Thi Nguyen. „Grandon.com Got Hacked!“ Journal of Information Technology Education: Discussion Cases 6 (2017): 10. http://dx.doi.org/10.28945/3926.

Der volle Inhalt der Quelle
Annotation:
A professor in information systems discovers that his personal website has been hacked. Even worse, his ISP has suspended his site because the defacement included a PayPal phishing scheme. This is not the first time this has happened. How should he recover? Dr. T. Grandon Gill, a Professor in the Information Systems and Decision Sciences Department at the University of South Florida, was traveling with his family in England when he received a strange phone message. Not being able to respond, he ignored it until—a couple of days later—he was notified that access to his personal website had been suspended (see Exhibit 1). Grandon.com had, once again, been hacked–for the 7th time. Getting his website hacked was not a new experience for Grandon Gill. In the past, however, getting the site back up and running had been a quick fix involving replacing the corrupted files. This time it was different. Based on the email and his service provider’s response, his site now contained links to PayPal phishing sites. Without significant changes, he could become complicit in fraud if the situation was not remedied. This was a problem that could no longer be ignored. After Gill had re-read the email, he pondered the various options available to him. Given the amount of trouble it was causing him, he wondered if he needed the website at all. To maintain the domain name grandon.com, which he had held for more than 20 years, all he needed to do was to put up a simple landing page with a message: “Hi, I am Grandon—go to my school account to find out more.” At the other extreme, he could completely re-engineer the site to make it much less vulnerable—a process that could take days, if not weeks. Between the two extremes, there were many other possibilities. These included changing hosts, simplifying the site so that it contained only the most critical information, dropping its WordPress component, or even going to a pure WordPress model. He had a suspicion, based on previous experience, that vulnerabilities in WordPress may have been the source of the hack. But were these vulnerabilities intrinsic to the application, or were they simply the result of his inattentive management? Whatever he decided, he needed to take action soon. It was very embarrassing, and perhaps professionally damaging, to have his site showing an unavailable message. He thought back to a popular ironic quote that said: “Good decisions come from experience, and experience comes from bad decisions.” What should he do now?
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Fitriati, Ratih. „Osteoarthritis“. KESANS : International Journal of Health and Science 1, Nr. 4 (21.01.2022): 415–21. http://dx.doi.org/10.54543/kesans.v1i4.42.

Der volle Inhalt der Quelle
Annotation:
Osteoarthritis (OA) is the most common joint disorder in the community and is chronic in nature and is the most common joint disease in adults to the elderly worldwide. The disease most commonly affects the joints in the knees, hands, feet, and spine and is relatively common in the shoulder and hip joints. The diagnosis of OA was made on the basis of appropriate radiological and clinical findings. The most common predilection for OA is the lower extremities, namely the knees and hips so that OA is the most common cause of lower extremity disability in the elderly. Method: The method used in writing this literature review is a literature review. The writing of this article is based on data from several sources originating from related, latest journals and from trusted journal publication websites such as NCBI, Pubmed, Elsevier, Google Scholar, Clinical Orthopedics and Related Research, and other related portals. Conclusion: Osteoarthritis is a joint disorder that is often found in adults and the elderly. OA is known to most commonly affect the knee joint. There are several risk factors for OA, namely age, gender, obesity, genetics, excessive physical activity, history of trauma and joint surgery, and other disease conditions that usually attack the joints. Diagnosis is made clinically, radiologically, and with laboratory assistance. Management includes pharmacological and non-pharmacological therapy
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Shultz, James M., David Forbes, David Wald, Fiona Kelly, Helena M. Solo-Gabriele, Alexa Rosen, Zelde Espinel, Andrew McLean, Oscar Bernal und Yuval Neria. „Trauma Signature Analysis of the Great East Japan Disaster: Guidance for Psychological Consequences“. Disaster Medicine and Public Health Preparedness 7, Nr. 2 (26.03.2013): 201–14. http://dx.doi.org/10.1017/dmp.2013.21.

Der volle Inhalt der Quelle
Annotation:
AbstractObjectivesOn March 11, 2011, Japan experienced the largest earthquake in its history. The undersea earthquake launched a tsunami that inundated much of Japan's eastern coastline and damaged nuclear power plants, precipitating multiple reactor meltdowns. We examined open-source disaster situation reports, news accounts, and disaster-monitoring websites to gather event-specific data to conduct a trauma signature analysis of the event.MethodsThe trauma signature analysis included a review of disaster situation reports; the construction of a hazard profile for the earthquake, tsunami, and radiation threats; enumeration of disaster stressors by disaster phase; identification of salient evidence-based psychological risk factors; summation of the trauma signature based on exposure to hazards, loss, and change; and review of the mental health and psychosocial support responses in relation to the analysis.ResultsExposure to this triple-hazard event resulted in extensive damage, significant loss of life, and massive population displacement. Many citizens were exposed to multiple hazards. The extremity of these exposures was partially mitigated by Japan's timely, expert-coordinated, and unified activation of an evidence-based mental health response.ConclusionsThe eastern Japan disaster was notable for its unique constellation of compounding exposures. Examination of the trauma signature of this event provided insights and guidance regarding optimal mental health and psychosocial responses. Japan orchestrated a model response that reinforced community resilience. (Disaster Med Public Health Preparedness. 2013;0:1-14)
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Fomin, Andrey Gennad'evich, und Elizaveta Aleksandrovna Mona. „Conceptual Metaphor as a Means of Terrorist Suggestion (on the Material of the Islamic State Video Messages)“. Russian Journal of Linguistics 23, Nr. 3 (15.12.2019): 698–713. http://dx.doi.org/10.22363/2312-9182-2019-23-3-698-713.

Der volle Inhalt der Quelle
Annotation:
Manipulative verbal influence is an immanent feature of modern international communication. Successful realization of the suggestive aspect allows the speaker to exert influence on the recipient’s worldview and ingrain certain ideological attitudes in their mind. This situation is characteristic of various types of discourse: political, advertising and media. However, the most dangerous for political stability and safety is utilization of persuasive linguistic devices by extremist groups and terrorist organizations. Thus, research in this field has become extremely relevant. The article presents linguistic analysis of such manifestations of destructive manipulation in the Islamic State (IS) speech, found in their official video messages. The analysis was carried out on the material of the official IS video messages, obtained through the selective sampling method on the video hosting website YouTube. Within the framework of the research we distinguish, classify and subject to a thorough linguistic analysis of conceptual metaphors which are used by the terrorists. The data obtained enables us to make a conclusion regarding the key role of conceptual metaphor in realization of the IS speaker’s communicative intention, which presupposes attracting the recipient’s attention to their activities and creating a radicalized ideological attitude in the minds of the audience. Furthermore, we prove that the metaphor is deliberately used by the terrorists to successfully fulfill their pragmatic intention, which involves manipulating the recipient. The provisions developed as part of the study and the results of the analysis can be further applied in modelling the mechanisms to confront and counteract terrorist suggestion in cyberspace and mass media.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Zhu, Qian, Leo Yu-Ho Lo, Meng Xia, Zixin Chen und Xiaojuan Ma. „Bias-Aware Design for Informed Decisions: Raising Awareness of Self-Selection Bias in User Ratings and Reviews“. Proceedings of the ACM on Human-Computer Interaction 6, CSCW2 (07.11.2022): 1–31. http://dx.doi.org/10.1145/3555597.

Der volle Inhalt der Quelle
Annotation:
People often take user ratings/reviews into consideration when shopping for products or services online. However, such user-generated data contains self-selection bias that could affect people's decisions and it is hard to resolve this issue completely by algorithms. In this work, we propose to raise people's awareness of the self-selection bias by making three types of information concerning user ratings/reviews transparent. We distill these three pieces of information, i.e., reviewers' experience, the extremity of emotion, and reported aspect(s), from the definition of self-selection bias and exploration of related literature. We further conduct an online survey to assess people's perceptions of the usefulness of such information and identify the exact facets (e.g., negative emotion) people care about in their decision process. Then, we propose a visual design to make such details behind user reviews transparent and integrate the design into an experimental website for evaluation. The results of a between-subjects study demonstrate that our bias-aware design significantly increases people's awareness of bias and their satisfaction with decision-making. We further offer a series of design implications for improving information transparency and awareness of bias in user-generated content.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Mancini, Stephen, und Lawrence A. Tomei. „The Dark Web“. International Journal of Cyber Research and Education 1, Nr. 1 (Januar 2019): 1–12. http://dx.doi.org/10.4018/ijcre.2019010101.

Der volle Inhalt der Quelle
Annotation:
The Dark Web is its own clandestine network of thousands of websites that most of us do not even know exist, much less how to access. The Dark Web uses its own tools to keep users anonymous and their activities hidden. The Dark Web is so well concealed that the full extent of its use remains largely the topic of hushed conversations. From black market drug sales to child pornography, the Dark Web operates at two extremes of the Internet, from venues for anonymous whistleblowing on one end to unguarded censorship on the other. This article provides a primer for those interested in learning more about the “known unknowns” of the Dark Web. Readers will find an excellent opening manuscript for the newly launched International Journal of Cyber Research and Education as it sets the stage for future research in cyber security and law enforcement. The paper will examine three foundational questions for the reader: What constitutes the ‘deep/dark/underground' web and keeps it obscure and remote from the community of legitimate users? How can websites that occupy the same virtual space range exist in two parallel dimensions from discoverable to undiscoverable? And finally, how do the actors on the Dark Web mature from novice to advanced? Is it the same process followed by users of the known web? In the corpus of this article, the authors will briefly examine how online markets exist simultaneously on the Internet, serving clients in both known online environments as well as the more secretive, anonymous online world. They will examine how nefarious actors migrate from the “good” web to become novice and then advanced users of the “evil” environments. To the neophyte user, the process introduced herein may appear relatively straightforward. In truth, the notion that any but the most staunchly dedicated practitioner can become a vetted participant in the ‘dark web' is inconceivable. Even so, with the sheer volume of actors operating in numerous underground forums and marketplaces, the impact remains significant and growing geometrically. Government and industry from all over the globe are hindered in their ability to track and identify the truly advanced actors operating in these more secretive environments. We shall soon see why this is the case.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Chopra, Aman, Amanda N. Fletcher, Naji S. Madi und Selene G. Parekh. „Orthopaedic Foot and Ankle Surgery Leadership Trends: A Cross-Sectional Study of Fellowship Directors and Division Chiefs“. Foot & Ankle Orthopaedics 7, Nr. 4 (Oktober 2022): 2473011421S0062. http://dx.doi.org/10.1177/2473011421s00626.

Der volle Inhalt der Quelle
Annotation:
Category: Other Introduction/Purpose: Foot and ankle surgery is a growing subspecialty within orthopaedic surgery due to the increasing demand for lower extremity trained specialists. Fellowship directors for foot and ankle surgery are uniquely tasked with the responsibilities of creating an educational experience while teaching trainees to manage lower extremity pathology. Similarly, foot and ankle division chiefs serve as clinical leaders who oversee their department's delivery of lower extremity care while acting as mentors. The primary aim of this study was to quantitatively describe and compare the demographic and professional characteristics of current foot and ankle surgery fellowship directors and division chiefs. Methods: The American Orthopaedic Foot & Ankle Society (AOFAS) fellowship directory for 2021 to 2022 was reviewed for the 48 AOFAS-recognized fellowship programs in the United States. After screening all institutional websites, fellowship directors and division chiefs were directly contacted via email. Surveys were administered between March 31, 2021 and June 1, 2021 to collect demographic, education, and professional data. Publicly accessible online sources such as institutional biographies, media accounts, uploaded curriculum vitae, and the Scopus Web of Science database were accessed to collect any missing information. The H-index value was determined for each leader by accessing the Scopus Web of Science search engine, a database that analyzes peer-reviewed scientific publications with a built-in citation tracking feature. Univariate and bivariate statistical analyses were performed. Results: A total of 42 of the 48 (87.5%) fellowship directors and 18 of the 23 (78.3%) division chiefs responded to the questionnaire. Of the 48 fellowship directors, 45 (93.8%) were male, 43 (89.6%) identified as Caucasian, their average age at leadership appointment was 42.6+-7.5 (range, 32-70) years, and the average time between fellowship graduation and leadership appointment was 9.9+-7.8 (range, 0-36) years. Most of the fellowship directors graduated from OrthoCarolina (10.4%), Oakland Bone and Joint Specialists (Roger Mann) (10.4%), and Mercy Medical Center (8.3%) (Figure 1). Of the 23 chiefs, 22 (95.7%) were male, 20 (87.0 %) identified as Caucasians, their average age at leadership appointment was 41.7+-7.8 (range, 32-53) years, and the average time between fellowship graduation and leadership appointment was 9.8+-6.8 (range, 2-21) years. The average H-index for the chiefs was greater than that of the fellowship directors (18.4 vs 13.4, P=.0373) when controlling for years of training. Conclusion: This is the first study to record professional and demographic characteristics amongst orthopaedic foot and ankle surgery fellowship directors and division chiefs. The utility of this analysis comes from highlighting common attributes of successful leaders within the field for aspiring trainees, while also drawing attention to the lack of diversity within the foot and ankle surgery community.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Kalinina, Marina. „The Genre of Invective in Public Discourse“. Nizhny Novgorod Linguistics University Bulletin, Special issue (31.12.2020): 153–63. http://dx.doi.org/10.47388/2072-3490/lunn2020-si-153-163.

Der volle Inhalt der Quelle
Annotation:
The relevance of this research project lies in the increasing interest of the general public and professional linguists towards public discourse and the specific type of the communicative personality whose verbal behavior shakes up the normative framework and leads to violations of linguistic security. Such a speaker prefers non-normative linguistic means with the strongest communicative and stylistic charge, because they support her desire for self-expression and attract the attention of others; needless to say they often include invective. The rejection of normative expressive means is also due to the deliberate or spontaneous intention of the speaker to humiliate, ridicule, or offend the interlocutor and assert herself, which is much easier to do with invective vocabulary. Looking at the functions of the invective, its paralinguistic and linguistic features, and the intentions of the speakers, the article describes the invective genres of hating and flaming. Hating is viewed as a deliberate communicative action aimed at discrediting a person or at her social stigmatization. Flaming is characterized by spontaneity and is due to the speaker’s communicative emotionality, asociality, and propensity towards conflicts. The author determines risks of using verbal abuse, invective genres, and pejoratives in public discourse, emphasizing the importance of regulating these through relevant legislation, since, as experience shows, invective may become a form of expressing linguistic extremism and lead to physical violence. The author discusses the immediate need of introducing mandatory moderation (both automated and manual) of chats on social networks, forums, public websites, messengers, TV shows and other media in order to prevent negative consequences of invectizing public discourse and to ensure linguistic security for communication participants.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Zhang, Chenchen. „Right-wing populism with Chinese characteristics? Identity, otherness and global imaginaries in debating world politics online“. European Journal of International Relations 26, Nr. 1 (20.05.2019): 88–115. http://dx.doi.org/10.1177/1354066119850253.

Der volle Inhalt der Quelle
Annotation:
The past few years have seen an emerging discourse on Chinese social media that combines the claims, vocabulary and style of right-wing populisms in Europe and North America with previous forms of nationalism and racism in Chinese cyberspace. In other words, it provokes a similar hostility towards immigrants, Muslims, feminism, the so-called ‘liberal elites’ and progressive values in general. This article examines how, in debating global political events such as the European refugee crisis and the American presidential election, well-educated and well-informed Chinese Internet users appropriate the rhetoric of ‘Western-style’ right-wing populism to paradoxically criticise Western hegemony and discursively construct China’s ethno-racial and political identities. Through qualitative analysis of 1038 postings retrieved from a popular social media website, this research shows that by criticising Western ‘liberal elites’, the discourse constructs China’s ethno-racial identity against the ‘inferior’ non-Western other, exemplified by non-white immigrants and Muslims, with racial nationalism on the one hand; and formulates China’s political identity against the ‘declining’ Western other with realist authoritarianism on the other. The popular narratives of global order protest against Western hegemony while reinforcing a state-centric and hierarchical imaginary of global racial and civilisational order. We conclude by suggesting that the discourse embodies the logics of anti-Western Eurocentrism and anti-hegemonic hegemonies. This article: (1) provides critical insights into the changing ways in which self–other relations are imagined in Chinese popular geopolitical discourse; (2) sheds light on the global circulation of extremist discourses facilitated by the Internet; and (3) contributes to the ongoing debate on right-wing populism and the ‘crisis’ of the liberal world order.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie