Citizen science and natural resource management : a social network analysis of two community-based water monitoring programs
- Authors: Bonney, Patrick , Hansen, Birgita , Baldwin, Claudia
- Date: 2023
- Type: Text , Journal article
- Relation: Society and Natural Resources Vol. 36, no. 6 (2023), p. 600-621
- Full Text: false
- Reviewed:
- Description: In natural resource management contexts, citizen science programs often involve a diversity of actors collaborating in broad social networks. However, the characteristics and functioning of these networks has received limited attention. In this article, we demonstrate the benefits of applying social network research to citizen science practice. Through a mixed methods approach, we compare data sharing and collaboration networks of two community-based water monitoring programs in Australia. The quantitative component revealed that despite similarities in actor diversity and activities, both programs have created divergent network structures (centralized vs decentralized) corresponding to their scale of influence in environmental decision-making (regional vs local impacts). The qualitative component showed how individuals navigated their relationships and managed key tensions inherent to network functioning. This study provides new insights on the role of social networks in citizen science and concludes by recommending program leaders adopt a “networking mindset” to maximize their sphere of influence. © 2023 Taylor & Francis Group, LLC.
The effect of facial perception and academic performance on social centrality
- Authors: Zhang, Dongyu , Peng, Ciyuan , Chang, Xiaojun , Xia, Feng
- Date: 2023
- Type: Text , Journal article
- Relation: IEEE Transactions on Computational Social Systems Vol. 10, no. 3 (2023), p. 970-981
- Full Text: false
- Reviewed:
- Description: Facial perception is of significant influence on the positions of people in social networks. Particularly, students' facial traits can affect their social centrality in educational settings (e.g., students looking intelligent can attract more friends). However, in educational environments, the social biases associated with appearances have alarming consequences, and little research has been done to investigate the effect of facial perception on social networks. Therefore, it is necessary to comprehensively analyze the influence of perceived facial traits on students' status in social interaction. In this article, we explore the effect of facial perception on the social centrality of students in social networks. Because students' social centrality is based on both their study ability and facial traits, this study does a comparative analysis of how facial perception and academic performance influence the social centrality of students. Subsequently, the experimental results demonstrate that facial perception, as well as academic performance, closely correlates with the social centrality of students. Finally, this study contributes to a comprehensive and deep understanding of social networks by analyzing facial trait-based social biases. © 2014 IEEE.
Trust-aware detection of malicious users in dating social networks
- Authors: Shen, Xingfa , Lv, Wentao , Qiu, Jianhui , Kaur, Achhardeep , Xiao, Fengjun , Xia, Feng
- Date: 2023
- Type: Text , Journal article
- Relation: IEEE Transactions on Computational Social Systems Vol. 10, no. 5 (2023), p. 2587-2598
- Full Text: false
- Reviewed:
- Description: Online dating is an increasingly thriving business which boosts billion-dollar revenues and attracts users in the tens of millions. Despite its popularity, internet dating is not exempt from the concerns about privacy and trust posed by the revelation of potentially sensitive data as well as the exposure to self-reported (and hence potentially distorted) information. The increasing popularity of online dating networks leads to an increase in security concerns and challenges, as well as harmful actions and attacks, such as creating fake accounts, phishing on these networks. To maintain the safety of legitimate online dating users, it is critical to recognize and isolate criminal people as soon as possible. However, researchers concerning malicious user detection in dating social networks are merely a few. To address some key challenges in this space, we propose a trust-aware detection framework to detect malicious users based on different kinds of data from a real dating site. In particular, we develop a user trust model to distinguish between malicious and legitimate users. Furthermore, we propose a novel data-balancing method to improve the recall rate of malicious user detection. Extensive experiments have been conducted over real-world datasets. The results show that the proposed approach yields a precision of up to 59.16% and a recall rate of up to 73%, which is significantly higher than other baseline algorithms. © 2014 IEEE.
CHIEF : clustering With higher-order motifs in big networks
- Authors: Xia, Feng , Yu, Shuo , Liu, Chengfei , Li, Jianxin , Lee, Ivan
- Date: 2022
- Type: Text , Journal article
- Relation: IEEE Transactions on Network Science and Engineering Vol. 9, no. 3 (2022), p. 990-1005
- Full Text:
- Reviewed:
- Description: Clustering network vertices is an enabler of various applications such as social computing and Internet of Things. However, challenges arise for clustering when networks increase in scale. This paper proposes CHIEF (Clustering with HIgher-ordEr motiFs), a solution which consists of two motif clustering techniques: standard acceleration CHIEF-ST and approximate acceleration CHIEF-AP. Both algorithms firstly find the maximal $k$-edge-connected subgraphs within the target networks to lower the network scale by optimizing the network structure with maximal $k$-edge-connected subgraphs, and then use heterogeneous four-node motifs clustering in higher-order dense networks. For CHIEF-ST, we illustrate that all target motifs will be kept after this procedure when the minimum node degree of the target motif is equal or greater than $k$. For CHIEF-AP, we prove that the eigenvalues of the adjacency matrix and the Laplacian matrix are relatively stable after this step. CHIEF offers an improved efficiency of motif clustering for big networks, and it verifies higher-order motif significance. Experiments on real and synthetic networks demonstrate that the proposed solutions outperform baseline approaches in large network analysis, and higher-order motifs outperform traditional triangle motifs in clustering. © 2022 IEEE Computer Society. All rights reserved.
Identifying tobacco retailers in the absence of a licensing system : lessons from Australia
- Authors: Baker, John , Masood, Mohd , Rahman, Muhammad Aziz , Thornton, Lukar , Begg, Stephen
- Date: 2021
- Type: Text , Journal article
- Relation: Tobacco Control Vol. 31, no. 4 (2021), p. 543-548
- Full Text:
- Reviewed:
- Description: ObjectivesTo estimate the proportion of retailers that sell tobacco in the absence of appropriate local government oversight, and to describe the characteristics by which they differ from those that can expect to receive such oversight.MethodsA database of listed tobacco retailers was obtained from a regional Victorian local government. Potential unlisted tobacco retailers were added using online searches, and attempts to visit all retailers were undertaken. GPS coordinates and sales type information of retailers that sold tobacco were recorded and attached to neighbourhood-level data on socioeconomic disadvantage and smoking prevalence using ArcMap. Logistic regression analyses, χ2 tests and t-tests were undertaken to explore differences in numbers of listed and unlisted retailers by business and neighbourhood-level characteristics.ResultsOf 125 confirmed tobacco retailers, 43.2% were trading potentially without government oversight. Significant differences were found between listed and unlisted retailers by primary business type (p<0.001), and sales type (p<0.001) but not by the other characteristics.ConclusionsThe database of tobacco retailers was inaccurate in two ways: (1) a number of listed retailers no longer operated or sold tobacco, and (2) 43.2% of businesses confirmed as selling tobacco were missing. As no form of licensing system exists in Victoria, it is difficult to identify the number of retailers operating, or to determine how many receive formal regulatory oversight. A positive licensing system is recommended to regulate the sale of tobacco and to generate a comprehensive database of retailers, similar to that which exists for food registration, gaming and liquor-licensed premises.
New subjectivities of work? : technologies and capitalism into the future
- Authors: Smith, Naomi , Holtum, P.
- Date: 2018
- Type: Text , Journal article
- Relation: Arena journal Vol. , no. 51/52 (2018), p. 153-176
- Full Text: false
- Reviewed:
- Description: Insecurity is no longer a condition that is specific to a set class of workers it has become a global issue. It can affect workers of any age, gender or ethnicity, across industrial or service sectors, and even our universities are no longer safe from casualisation, underemployment and outsourcing. To be sure, employment has always had elements of precariousness associated with it, particularly in the primary sectors. However, the steady intensification of capitalism around the world, and its intrusion into almost every facet of human endeavour, has meant that precarious work, as Arne Kalleberg writes, 'has become much more pervasive and generalized: [even] professional and managerial jobs are also precarious these days'. The telltale signs of precarity, such as insecurity, uncertainty and atomisation/individualisation, are frequently associated with the neoliberalisation of global societies. The twin mantras of flexibility and mobility across the economic market are further evidence of neoliberal principles, as an increasingly casualised work force allows employers the flexibility to shed and acquire labourers in accordance with the demands of capital rather than any humanitarian concern.