Paratexto

Index

2018; Emerald Publishing Limited; Linguagem: Inglês

10.1108/s2050-206020180000017009

ISSN

2050-2079

Resumo

Citation (2018), "Index", Wellman, B., Robinson, L., Brienza, C., Chen, W. and Cotten, S.R. (Ed.) Networks, Hacking, and Media – CITA MS@30: Now and Then and Tomorrow (Studies in Media and Communications, Vol. 17), Emerald Publishing Limited, Bingley, pp. 161-167. https://doi.org/10.1108/S2050-206020180000017009 Publisher: Emerald Publishing Limited Copyright © 2019 Emerald Publishing Limited INDEX Note: Page numbers followed by “n” with numbers indicate notes. Activism, 114 Adjusted R-squared values, 145 Age and ASR participation, 31–32 section membership controlling for, 33–35 Air Force Research Laboratory (AFRL), 131 AlphaBay, 114 American Sociological Association (ASA), 4, 11–12, 26, 42 co-membership matrices, 9 section clusters, 37–38 American Sociological Review (ASR), 26 building digital archive, 27–29 multiple section memberships and opportunities for innovation, 35–39 participation, 29 participation and section membership controlling for age and gender, 33–35 reasons for differences in participation, 31–33 section membership and ASR participation, 29–30 section participation in, 29 American Sociologist article, 43 Anonymity, 117, 120 anonymity-based social processing, 117 Anonymous social processing, 117, 119 Antagonism toward ex-partner, 87 Anti-social messages, 117, 125 Anti-social/disinhibition, 119 Anxiety, 116, 119 Application programming interface (API), 122, 143 Archive documents, 28 Avoidance-based strategies, 77 Behavioral advertising, 139 Behavioral economics, 139 Big data, 52–53 Bitcoin (btc), 135 Bitcoin Fog, 135 Black-hat hackers’ crisis information processing analysis plans, 123–124 anonymity and OpSec, 120 black-hat research, 114–115 crisis contexts, 121–122 crisis information processing in Darknet communities, 116–118 Darknet black-hat community as hidden organization, 115–116 data collection, 122–123 Forum “W”, 118 market information, 120–121 overall posting activities, 124–130 pseudonymity, 121 registration and rules, 118–120 social structure, 120 “Black-hat” activities, 114 Block, 135 future contact, 90–91 Blockchain, 135 CakePHP, 135 Cambridge Analytica, 138–139 Campaign slogans, 142 Center for Social Science Research (CSSR), 27 Chat, 51 Clearnet sites, (see Surface-web sites) Clicktivism, 138 and political participation, 140–141 Clicktivist-like actions prediction on candidates’ Facebook posts, 141, 147–148 clicktivism and political participation, 140–141 data collection, 143–144 Facebook in hybrid media system, 141 ICTs, 140 methods, 144–145 regression models, 148–149 results, 145–147 voter online engagement, 138–139 ways to analyzing political Facebook content, 141–143 Clustering, 106 algorithm groups vertices, 36 clustered lattice, 103, 106 clustered ties, 102, 103 Co-creating digital traces, 81 Co-memberships, 8 data, 7 Co-sponsoring ASA sessions, 20 Cohesiveness, 144 Collective Behavior and Social Movements (CBSM), 7 Collective problem solving, 117 Communication, 4, 51 on Internet, 53–54 strategies, 138 Communication, Information Technologies, and Media Sociology (CITAMS), 4, 27, 42 administration, 11 growing CITAMS membership, 12–16 improving organizational record keeping, 11–12 intellectual growth and organizational position, 5–6 long-term budget worksheet for, 19 membership over time, 31 non-ASA CITAMS listserv, 15 partial assessments of impact of CITASA to CITAMS name change, 6–11 planning for section’s financial future, 16–20 strategic planning, 20–22 Communication acts, 117, 125–126 Communication and Information Technology Section of American Sociological Association (CITASA), 5, 26, 42 Community intelligence, 114 CompApps, 90, 47, 49–51, 54 Competing campaigns, 102 “Complete thought” unit, 123 Computational methods, 115 Computer hardware and software development, 49–50 simulations, 102, 109 Computer-Assisted Qualitative Data Analysis, 56 Computer-mediated interaction, 54 Concealment strategies, 119 Connectivity, 51 Constructive activism, 116 Contemporary hybrid media system, 141 Content analysis, 123 Content-based dimensions, 144–145 Coping strategies, 75 Coping strategies for romantic dissolution, 76–79 Coveillance, 88 Creating continuity across years, 20–22 Crisis, 114, 116 contexts, 121–122 coping, 117, 119 events, 122 Crisis information processing in Darknet communities, 116–118 Crisis Information Processing in Hidden Organizations (CIPHO), 115–117, 119 Crisis management processes, 116 Crypto-network, 115 Cryptomarket cryptomarket-based communities, 116 shutdowns, 121–122 Cyber-adversaries, 114 Cyber-intelligence database, 122 Cybercriminal Internet Chat Relay networks, 115 Dark data, 115 Darknet, 115 black-hat community, 115–116 crisis information processing in Darknet communities, 116–118 Data analytics, 139 archives and repositories, 51, 53 generated as part of online life, 54 and metadata from communication on Internet, 53–54 mining techniques, 115 Data-driven approach, 4 Database system, 122 Defcon, 122 Delete Facebook connections, 84 Deliberation, 119 Democratic potentials, 114 Demographics, 27 Depression, 74 Diffusion disparities, 108 model, 103 Digital archive, 27–29 connectedness, 64–65 life, 51 media, 6 media stressors, 77 networks, 101 spaces, 67 technology, 6, 66–70 Digitality, 66–68 Discretionary section events, 18 Disk Operating System (DOS), 46 Dissemination equality, 100 Distress, 74–76 Drinking from fire hose, 52–53 Eigenvector centrality, 10 Email, 51 Emotionality, 68 Emotions, 149 emotion-focused coping, 77, 92 emotional expression, 75, 78, 86–88 emotional tone, 144 ENRON email data set, 54 Ensemble instruction, 49 Erasing and avoiding digital traces, 81–84 Escrow, 135 Ethos, 142 Exit scam, 135 Experiential processing, 117, 119 Exponentiated logistic regression coefficients, 34 Expressive writing, 86 Face-to-face counterparts, 68 Facebook, 16, 52, 67, 74, 78, 101, 109, 139, 140, 149 communication regulation, 84–86 digital traces, 82 in hybrid media system, 141 post types, 142 Facebook official, 81–82 First-person singular pronouns, 145 Forum “W”, 118, 122 Friendship and kin networks, 88 Garlic Routing, (see Invisible Internet Project (I2P) GDELT Project, 145 Gender, 33 section membership controlling for, 33–35 Global and Transnational and Sex and Gender co-memberships, 8 Global moderators, 120 Global social influence, 102 Goal-directed coping, 76–77 “Grave-dressing” phase, 77 Group information processing, 117 Harel-Koren Fast Multiscale layout algorithm, 35–36 Hashtags, 102, 142–143 Health-related behaviors, 102 Hesitators, 103 Hidden organization, Darknet black-hat community as, 115–116 “High-stakes” stressor, 75 Human–computer evolution, 54–55 Hybrid media system, Facebook in, 141 Idea Works, 46 Identifying membership, 14 Identity concealment strategies, 117 In-degree centrality, 10, 129 Independence of cyberspace, 114 Individual memberships, 7 Individual-level membership data, 7, 12 Inequalities, 106 Information avoidance, 90 diffusion, 101, 110 needs for information processing, 117, 119 providing, 117, 119, 123, 125, 130 seeking, 88–89 Information and Communication Technologies (ICTs), 101, 109, 139–140 Information technology (IT), 42 broad overviews from era, 46 connectivity and communication, 51 current status, 50 data and metadata from communication on Internet, 53–54 data archives and repositories, 51, 53 data collection methods adapted for Internet, 53 data generated as part of online life, 54 drinking from fire hose, 52–53 early stages, 47–50 history of section, 42–44 Internet, 51 intersection of history and biography, 44–46 online life, 52 role for researchers, 54–56 Information-rich environments, 100 Institutional memory, 12 Intellectual communities, 4 Intellectual enterprise, 4 Intellectual growth and organizational position of CITAMS, 5–6 Intellectual networks, 27 Intellectual property, 48 Intelligence Advanced Research Projects Activity (IARPA), 131 Inter-site dark networks, 115 Internet, 44, 51, 67, 78 anonymity, 114 data and metadata from communication on, 53–54 traditional data collection methods adapted for, 53 Interpersonal coordination, 64 Interpersonal electronic surveillance, 88–89 Interview schedule, 98 Intimacy, 68 Invisible Internet Project (I2P), 115, 135 JSON-file, 122 Kruskal–Wallis H tests, 125, 127 Laboratory for Applied Expert Systems Research (LAESR), 45 Law enforcement (LE), 135 Limit or eliminate Facebook use, 85–86 Linguistic Inquiry and Word Count program (LIWC), 144 Live-blogging, 67 Live-commenting, 67 Live-streaming, 67 Logistic regression analysis of participation in ASR publication, 34 Long ties as equalizers, 100, 102–103 discussions, limitations, and future research, 109–110 local and global diffusion patterns in social networks, 103 methods, 103–105 political incumbents, 100–101 results, 105–108 social network structure, 101–102 Long-term budget worksheet for CITAMS section, 19 Long-term budgeting plan, 18 Market information, 120–121 Market shutdown, 115 Mass media, 5, 141 Mathematical Sociology score, 11 Media, 74 coverage, 145 systems, 6 Member-level data, 12 Membership committee, 16 Messages and posts/updates, 84 Methodology Section, 27, 30, 32–36, 39 Microcomputer Revolution, 48 Microcomputers, 45 Microcomputing Users Group (MUG), 42 Microsoft Research, 5, 14, 18 Multimodal network, 128 Multimodal social network analysis, 123 Multiple reinforcement mechanism, 102 National Science Foundation (NSF), 26, 44–45 Negative emotions, 144 Network analysis, 115, 123–124 Network hubs, 110 NewTech89 book, 47 NodeXL, 35–36 Non-ASA CITAMS listserv, 15 Non-content-based dimensions, 144–145 “Noncrisis” category, 124 Office of the Director of National Intelligence (ODNI), 131 Online behavioral advertising, 139 forums, 118 political participation, 140 social networking service, 102 survey software, 53 Online life, 52 data generated as part of, 54 Operational security (OpSec), 119–120, 130, 132n1, 135 Ordinary least-squared regression analyses (OLS regression analyses), 144 Organizational/organizations record keeping, 11–12 sections as, 11 visibility, 116 Organizations, Occupations and Work (OOW), 7 Out-degree centrality, 129 Paradigms, 27 Partial assessments of impact of CITASA to CITAMS name change, 6–11 Participants, 83 Participation age and ASR participation, 31–32 CITAMS membership over time, 31 gender and ASR participation, 33 reasons for differences in, 31 in social media, 78 Pathos, 142 Peer review process, 27 Personal narratives, 119, 125 Personal pronouns, 142 Personalization, 144 Persuasive language, 142 PGP-Keys, 135 Phatic communion, 149 Photographs, 83 PMI, 16, 18 Political engagement, 138, 140 Political incumbents, 100–101 Political participation, clicktivism and, 140–141 Positive emotions, 144 Post-traumatic stress disorder (PTSD), 75 Pretty Good Privacy (PGP), 135 Preventative measures, 90–91 Private key, 135 Pro-community, 117, 119, 125 Problem-focused coping, 77, 92 Procedural directives, 117, 119 Programming, 6 Pseudonymity, 121 Public key, 135 Quasi-simultaneity, 65 Random networks, 106 Rational processing, 117, 119, 125 Regression models, 143 Relationship status, 82 Rely on membership data, 4 Researchers, role for, 54–56 Romantic breakup, 75–76, 79–80, 81 Romantic dissolution coping strategies for, 76–79 data analysis, 80 and distress, 75–76 emotional expression, 86–88 erasing and avoiding digital traces, 81–84 Facebook, 77, 79 information avoidance, 90 information seeking, 88–89 interview schedule, 98 limitations, and future research, 93 preventative measures, 90–91 procedure, 79–80 regulating Facebook communication, 84–86 romantic breakups, 91 sample, 79 support seeking, 88 Rumor Interaction Analysis System (RIAS), 117–118 Satoshi Nakamoto, 135 Scanning process, 29 Science, Knowledge, & Technology (SKAT), 7 Science of Science, 27 Secretary/Treasurer, 12, 17–18 Section membership, 29–30 controlling for age and gender, 33–35 Section participation in ASR, 29 Section-co-membership data, 4 Section’s financial future, planning for, 16–20 Sections as organizations, 11 Security concerns, 90 Seeding asymmetries, 108 imbalances, 109 Seeking support, 88 Self-restraint, 90 Silk Road 2 (SR2), 122 Simultaneity, 64–68 Skepticism, 45 Small world, 106 Social connectedness, 68 institution, 69 organization, 69 psychology, 8 psychology co-memberships, 8 solidarity, 64 structure, 120 synchronicity, 64–66, 70 Social media, 52, 54, 66–68, 138 adoption, 74 Social networks, 77, 91, 100–101, 109 Facebook, 16, 52, 67, 74, 78, 101, 109, 139–140, 149 graph, 128 sites, 74 structure, 101–102 Twitter, 16, 52, 67, 101, 109 Social science research, 42–43 researchers, 52 Sociologists, 43 Sociology, 20, 35 of communication, 5 evolution, 27 Sociomental experiences, 65 Source credibility, 119 Statistical Package for the Social Science (SPSS), 144 Strategic communication firms, 138 Structural diversity, 100 Structurally diverse networks, 100 Surface-web sites, 115 Surveillance, 88–89 Technical culture, 48 Technological determinism, 20 Technology-enhanced activities, 68 Technology-rich society, 70 Telegraph, 139 Temporal outlook, 144 Temporal symmetry, 64–67 Terrorism recruitment, 109 The American Sociologist (TAS), 47 The Onion Routing (Tor), 115, 135 Theory-driven analytic framework, 115 Three-dimensional framework, 117 Time-sensitive applications, 56 Topic modeling, 115 Tor-hosted forums, 114–115 Traditional data collection methods adapted for Internet, 53 Traditional media, 149 Traditional political participation, 140 Trail, 135 Traumatic events, 76 Twitter, 16, 52, 67, 101, 109 Uncertainty, 116, 119 Unitizing, 123 University of Missouri (MU), 44–45 US primary election, 139 UserRank algorithms, 115 Utopia, 121–122 Videoconferencing, 51 Virtual Private Network (VPN), 135 Virtual reams of tutorials, 120 voIP conversation, 51 Voter online engagement, 138–139 World Wide Web, 44, 51 YouTube, 67 Book Chapters Prelims Part I Field Analysis: Citams Past Chairs Chapter 1 CITAMS @30: Learning from the Past, Plotting a Course for the Future Chapter 2 Section Membership and Participation in the American Sociological Review Publication Process Chapter 3 How Information Technology Transforms the Methods of Sociological Research: Past and Future Part II Field Analysis: Relationships and Networks Chapter 4 In Sync, but Apart: Temporal Symmetry, Social Synchronicity, and Digital Connectedness Chapter 5 Romantic Dissolution and Facebook Life: A Typology of Coping Strategies for Breakups Chapter 6 Long Ties as Equalizers Chapter 7 Black-Hat Hackers’ Crisis Information Processing in the Darknet: A Case Study of Cyber Underground Market Shutdowns Chapter 8 I Click, Therefore I Am: Predicting Clicktivist-Like Actions on Candidates’ Facebook Posts During the 2016 US Primary Election Afterword Index

Referência(s)