Skip to main content

Home/ Digital Ethnography at Kansas State University/ Group items tagged activism

Rss Feed Group items tagged

descendants1 descendants1

sac longchamp tour eiffel pas cher Ce - 0 views

"Cela valide (et) légitime la sexualité féminine en tant qu'aspect important de la santé." Les détracteurs de ce médicament jugent en revanche que le gain de libido montré par les essais cliniques ...

sac longchamp pliage pas cher tour eiffel a dos

started by descendants1 descendants1 on 20 Aug 15 no follow-up yet
michol lasti

PostgreSQL 9.4.3 Free Download | librosdigitalescs software - 0 views

  •  
    PostgreSQL 9.4.3 Free Download - PostgreSQL 9.4.3 is a powerful, open source object-relational database system. It has a lot more than 15 years involving active development and also a proven architecture containing earned it a substantial reputation for consistency, data integrity, and correctness
Bill Genereux

Twitter, Facebook, and social activism : The New Yorker - 0 views

  • The instruments of social media are well suited to making the existing social order more efficient. They are not a natural enemy of the status quo.
Kevin Champion

Maintained Relationships on Facebook | overstated - 0 views

  • What it shows is that, as a function of the people a Facebook user actively communicate with, you are passively engaging with between 2 and 2.5 times more people in their network. I’m sure many people have had this feeling, but these data make this effect more transparent.
  • The stark contrast between reciprocal and passive networks shows the effect of technologies such as News Feed. If these people were required to talk on the phone to each other, we might see something like the reciprocal network, where everyone is connected to a small number of individuals. Moving to an environment where everyone is passively engaged with each other, some event, such as a new baby or engagement can propagate very quickly through this highly connected network.
  • All Friends: the largest representation of a person’s network is the set of all people they have verified as friends. Reciprocal Communication: as a measure of a sort of core network, we counted the number of people with whom a person had had reciprocal communications, or an active exchange of information between two parties. One-way Communication: the total set of people with whom a person has communicated. Maintained Relationships: to measure engagement, we took the set of people for whom a user had clicked on a News Feed story or visited their profile more than twice.
  • ...3 more annotations...
  • Peter Marsden found the number of people with whom individuals “can discuss important matters” numbers only 3 for Americans[3]. In a subsequent survey, researchers found that this number has dropped slightly over the past 10 years[4], causing some alarm in the press, but without sufficient explanation[5].
  • Killworth, et al. found using this technique and others that the number of people a person will know in their lifetime ranges somewhere between 300 and 3000[1]. On Facebook, the average number of friends that a person has is currently 120[2]. Given that Facebook has only been around for 5 years, that not everyone uses it, and that the not every acquaintance has found each other, this number seems reasonable for an average user.
  • We were asked a simple question: is Facebook increasing the size of people’s personal networks?
Mike Wesch

2-Channel Gives Japan's Famously Quiet People a Mighty Voice - 0 views

  • The forum's origins trace back to a college apartment in Arkansas, where founder Hiroyuki Nishimura was a student in May 1999
  • 2.5 million posts a day and about 800 active boards split into thousands of threads, 2-channel is the biggest BBS in the world
  • On occasion, the 2-channel community behaves like a mob, turning on members who transgress with massive amounts of hate mail, the revelation of private information and stalkers monitoring their homes 24/7.
  • ...1 more annotation...
  • Vote rigging: When comedian Masashi Tashiro was nominated for Time magazine's Person of the Year in 2001, 2-channelers hacked the voting system and placed multiple votes that propelled him to the No. 1 position over Osama bin Laden and George W. Bush, and crashed Time.com's server. Tashiro -- who is infamous for his blatant sexual harassment and belligerent public behavior -- was removed from the list.
Mike Wesch

"Birthers" Fouling OpenGovt Interactive Site | Personal Democracy Forum - 0 views

  • The parties creating controversy and "conspiracy" are Barry and his handlers. Man doesn't hide all his personal records for no reason. Doesn't drop $1 million plus on attorneys to ensure his dirty little secret stays a secret. The little fraud should be exposed. What he's done is unconscionable. He makes James Frey look like Honest Abe. Btw, you sound like a 14 year old girl in the throes of post American Idol heartbreaker hissy fit.
  • "Birthers" by jorji on June 2, 2009 - 12:24pm Micah, Creating a catchy little title ("birthers") for those who have informed themselves enough to understand the difference between a short form birth certificate (certificate of live birth--at the time used also for registering a birth in Hawaii, regardless of whether that birth actually took place in Hawaii) and a long form birth certificate (includes information not available on the short form, such as attending doctor, and hospital where the birth took place), does not make such informed citizens either nuts or conspiracy theorists. Asking for proof of the constitutionally demanded eligability is only good citizenship. Deriding those who care about the constitution does not however, make you a good citizen, Micah. Jorj
  • Birther NUTS trashing town hall by Stingray on June 2, 2009 - 10:21am To Micah Sifry; The site was created for response from the citizens of our country. You are obviously not aware of the importance of the 'Natural Born' issue at question, rather than just being a 'citizen'. To call those American Citizens 'NUTS' because they have a legitimate question regarding that issue in light of everything going on at such a rapid-fire pace is nothing short of blatant prejudice and hatred for those that disagree with you! You, Micah Sifry, are exactly what you are calling others! If you can't stand to be disagreed with, then you just plain don't belong here!
Bill Genereux

Mobile Ubiquitous Banking and the Future of Money - 2009 SXSW Podcast - 0 views

  •  
    Nearly half the world's population now has a mobile device and more than a thousand cell phones are being activated every minute. The ubiquity of mobile devices will make new services available to billions of people worldwide who have not had access to traditional banks or credit cards. In developing countries such as Kenya - where nearly 80% of the population is excluded from the formal financial sector - text messaging is being used to transfer money to friends and family living in other countries. Moreover, new forms of currency are being created - trading cell phone minutes for goods and services, for example. This panel will explore the challenges and opportunities as banks go mobile, and how the revolution in mobile financial services will change the way we think about money.
Steven Kelly

Why You Learn More Effectively by Writing Than Typing - 10 views

  • {"data":[{"original":{"url":"http:\/\/cache.gawker.com\/assets\/images\/lifehacker\/2011\/01\/1300-writing-is-better-than-typing.jpg","width":"1280","height":"720"},"xlarge":{"url":"http:\/\/cache.gawkerassets.com\/assets\/images\/17\/2011\/01\/xlarge_1300-writing-is-better-than-typing.jpg","width":"640","height":"360"},"medium":{"url":"http:\/\/cache.gawkerassets.com\/assets\/images\/17\/2011\/01\/medium_1300-writing-is-better-than-typing.jpg","width":"300","height":"169"},"small":{"url":"http:\/\/cache.gawkerassets.com\/assets\/images\/17\/2011\/01\/small_1300-writing-is-better-than-typing.jpg","width":"190","height":"107"}},{"original":{"url":"http:\/\/cache.gawker.com\/assets\/images\/lifehacker\/2011\/01\/screen_shot_2011-01-19_at_1.45.44_pm.png","width":"340","height":"284"},"xlarge":{"url":"http:\/\/cache.gawkerassets.com\/assets\/images\/17\/2011\/01\/xlarge_screen_shot_2011-01-19_at_1.45.44_pm.png","width":"340","height":"284"},"medium":{"url":"http:\/\/cache.gawkerassets.com\/assets\/images\/17\/2011\/01\/medium_screen_shot_2011-01-19_at_1.45.44_pm.png","width":"300","height":"251"},"small":{"url":"http:\/\/cache.gawkerassets.com\/assets\/images\/17\/2011\/01\/small_screen_shot_2011-01-19_at_1.45.44_pm.png","width":"190","height":"107"}}],"lookup":{"\/assets\/images\/lifehacker\/2011\/01\/1300-writing-is-better-than-typing.jpg":{"transform":"original","pos":0},"\/assets\/images\/17\/2011\/01\/xlarge_1300-writing-is-better-than-typing.jpg":{"transform":"xlarge","pos":0},"\/assets\/images\/17\/2011\/01\/medium_1300-writing-is-better-than-typing.jpg":{"transform":"medium","pos":0},"\/assets\/images\/17\/2011\/01\/small_1300-writing-is-better-than-typing.jpg":{"transform":"small","pos":0},"\/assets\/images\/lifehacker\/2011\/01\/screen_shot_2011-01-19_at_1.45.44_pm.png":{"transform":"original","pos":1},"\/assets\/images\/17\/2011\/01\/xlarge_screen_shot_2011-01-19_at_1.45.44_pm.png":{"transform":"xlarge","pos":1},"\/assets\/images\/17\/2011\/01\/medium_screen_shot_2011-01-19_at_1.45.44_pm.png":{"transform":"medium","pos":1},"\/assets\/images\/17\/2011\/01\/small_screen_shot_2011-01-19_at_1.45.44_pm.png":{"transform":"small","pos":1}}} Please confirm your birth date: Please enter a valid date Please enter your full birth year This content is restricted. .toppic .post-body img.image_0 { display: none; } Full size writing jQuery( '#fbPlaceholder' ).append( '' ) Share this post × var twEl = document.createElement( 'script' ); twEl.type="text/javascript"; twEl.src = 'http://platform.twitter.com/widgets.js'; jQuery( '#twitterPlaceholder' ).append( twEl ); (function() { var s = document.createElement('SCRIPT'), s1 = document.getElementsByTagName('SCRIPT')[0]; s.type = 'text/javascript'; s.async = true; s.src = 'http://widgets.digg.com/buttons.js'; s1.parentNode.insertBefore(s, s1); })(); 3diggsdigg Why You Learn More Effectively by Writing Than Typing Melanie Pinola — The act of writing helps you clarify your thoughts, remember things better, and reach your goals more surely. Here's a look at the science and psychology behind writing, and why the pen may be mightier than the keyboard.
    • Kelsey Duck
       
      This is awesome. Do you have any sights where I can look this kind of "keyboard" up
  •  
    Interesting article about the learning benefits of traditional writing vs. typing.
michol lasti

Google Chrome 38.0.2114.2 Dev Free Download | librosdigitalescs software - 0 views

  •  
    Google Chrome 38.0.2114.2 Dev Free Download - Google's activity changing browser Opera combines sophisticated technology using a simple UI, to manufacture a faster, safer as well as easier browsing encounter. Google's rapid as well as continuous development cycle ensures the browser continues to compete with one other most popular and advanced web browsers available
michol lasti

AVG Free Edition 2014.0.4765 (32-bit) Free Download | librosdigitalescs software - 0 views

  •  
    AVG Free Edition 2014.0.4765 (32-bit) free download - AVG AntiVirus free edition 2014.0.4765 is trusted antivirus and antispyware protection for Windows there for download for free. Furthermore, the new included LinkScanner® Active Surf-Shield checks website pages for threats at the only real time that matters - when you are about to click that link.
michol lasti

AntiLogger 1.7.2.390 Free Download | librosdigitalescs software - 0 views

  •  
    AntiLogger 1.7.2.390 Free Download - Zemana AntiLogger 1.7.2.390 is a very powerful and efficient app which could block various attempts by hackers to access your PC. Although the application is incredibly lightweight, it can detect any attempts to modify your computer's settings and place malicious code in your system. The Zemana AntiLogger 1.7 can also detect when someone is hoping to record your activities, monitor your webcam
swadeshdana

Naturally healthy lifestyle Is So Famous And Mysterious - 0 views

  •  
    A naturally healthy lifestyle means when you have fewer health issues in your life. Having a health condition which enables you to do all the activities and adventures you like without any compromise.
firozcosmolance

10 easy ways to reduce the plastic waste on this World Environment Day! - Gossip Ki Gal... - 0 views

  •  
    5th June is the World Environment Day! A lot of us might be environment enthusiasts to participate in various activities, plant trees and celebrate this day in every possible way, while the rest of us might shrug it off as just another day. Some of us might be upholding a great zeal but we might end up doing nothing!
wonderlandmontes

pre school |After School - 0 views

  •  
    Montessori School educational programs provide the facility for child to learn and our teachers guide their activity based on communities and academy.
zubair789

Mobile Packages - 0 views

  •  
    keep you update about all telecom companies packages. You can find the packages of all companies with full detail and activation code.
  •  
    keep you update about all telecom companies packages. You can find the packages of all companies with full detail and activation code.
Mike Wesch

The Internet and Social Life (Annual Review of Psychology 2004) - 1 views

  • However, the Internet is not merely the Swiss army knife of communications media. It has other critical differences from previously available communication media and settings (see, e.g., McKenna & Bargh 2000), and two of these differences especially have been the focus of most psychological and human-computer interaction research on the Internet. First, it is possible to be relatively anonymous on the Internet, especially when participating in electronic group venues such as chat rooms or newsgroups. This turns out to have important consequences for relationship development and group participation. second, computer-mediated communication (CMC) is not conducted face-to-face but in the absence of nonverbal features of communication such as tone of voice, facial expressions, and potentially influential interpersonal features such as physical attractiveness, skin color, gender, and so on. Much of the extant computer science and communications research has explored how the absence of these features affects the process and outcome of social interactions.
  • Sproull & Kiesler (1985) considered CMC to be an impoverished communication experience, with the reduction of available social cues resulting in a greater sense or feeling of anonymity. This in turn is said to have a deindividuating effect on the individuals involved, producing behavior that is more self-centered and less socially regulated than usual. This reduced-information model of Internet communication assumes further that the reduction of social cues, compared to richer face-to-face situations, must necessarily have negative effects on social interaction (i.e., a weaker, relatively impoverished social interaction).
  • The relative anonymity of the Internet can also contribute to close relationship formation through reducing the risks inherent in self-disclosure. Because selfdisclosure contributes to a sense of intimacy, making self-disclosure easier should facilitate relationship formation. In this regard Internet communication resembles the "strangers on a train" phenomenon described by Rubin (1975; also Derlega & Chaikin 1977). As Kang (2000, p. 1161) noted, "Cyberspace makes talking with strangers easier. The fundamental point of many cyber-realms, such as chat rooms, is to make new acquaintances. By contrast, in most urban settings, few environments encourage us to walk up to strangers and start chatting. In many cities, doing so would amount to a physical threat."Overall, then, the evidence suggests that rather than being an isolating, personally and socially maladaptive activity, communicating with others over the Internet not only helps to maintain close ties with one's family and friends, but also, if the individual is so inclined, facilitates the formation of close and meaningful new relationships within a relatively safe environment.
  • ...7 more annotations...
  • STIGMATIZED IDENTITIES McKenna & Bargh (1998) reasoned that people with stigmatized social identities (see Frable 1993, Jones et al. 1984), such as homosexuality or fringe political beliefs, should be motivated to join and participate in Internet groups devoted to that identity, because of the relative anonymity and thus safety of Internet (compared to face-to-face) participation and the scarcity of such groups in "real life." Moreover, because it is their only venue in which to share and discuss this aspect of their identity, membership in the group should be quite important to these people, and so the norms of such groups should exert a stronger than usual influence over members' behavior. This prediction was confirmed by an archival and observational study of the frequency with which stigmatized-group members posted messages to (i.e., participated in) the group: Unlike in other Internet groups, participation increased when there was positive feedback from the other group members and decreased following negative feedback (McKenna & Bargh 1998, Study 1).
  • ON-LINE SUPPORT In harmony with these conclusions, Davison et al. (2000) studied the provision and seeking of social support on-line by those with grave illnesses, and found that people used Internet support groups particularly for embarrassing, stigmatized illnesses such as AIDS and prostate cancer (and also, understandably, for those illnesses that limit mobility such as multiple sclerosis). The authors point out that because of the anxiety and uncertainty they are feeling, patients are highly motivated by social comparison needs to seek out others with the same illness (p. 213), but prefer to do this on-line when the illness is an embarrassing, disfiguring, or otherwise stigmatized one, because of the anonymity afforded by Internet groups (p. 215).
  • Accordingly, Kang (2000) has argued that one potential social benefit of the Internet is to disrupt the reflexive operation of racial stereotypes, as racial anonymity is much easier to maintain on-line than off-line. For example, studies have found that African Americans and Hispanics pay more than do white consumers for the same car, but these price differences disappear if the car is instead purchased on-line (Scott Morton et al. 2003).
  • Yet racism itself is socially stigmatized-especially when it comes to extreme forms such as advocacy of white supremacy and racial violence (see McKenna & Bargh 1998, Study 3). Thus the cloak of relative anonymity afforded by the Internet can also be used as a cover for racial hate groups, especially for those members who are concerned about public disapproval of their beliefs; hence today there are more than 3000 websites containing racial hatred, agendas for violence, and even bomb-making instructions (Lee & Leets 2002). Glaser et al. (2002) infiltrated such a group and provide telling examples of the support and encouragement given by group members to each other to act on their hatreds. All things considered, then, we don't know yet whether the overall effect of the Internet will be a positive or a negative one where racial and ethnic divisions are concerned.
  • People are not passively affected by technology, but actively shape its use and influence (Fischer 1992, Hughes & Hans 2001). The Internet has unique, even transformational qualities as a communication channel, including relative anonymity and the ability to easily link with others who have similar interests, values, and beliefs. Research has found that the relative anonymity aspect encourages self-expression, and the relative absence of physical and nonverbal interaction cues (e.g., attractiveness) facilitates the formation of relationships on other, deeper bases such as shared values and beliefs. At the same time, however, these "limited bandwidth" features of Internet communication also tend to leave a lot unsaid and unspecified, and open to inference and interpretation.
  • As Lea & Spears (1995) and O'Sullivan (1996) have noted, studying how relationships form and are maintained on the Internet brings into focus the implicit assumptions and biases of our traditional (face-to-face) relationship and communication research literatures (see Cathcart & Gumpert 1983)-most especially the assumptions that face-to-face interactions, physical proximity, and nonverbal communication are necessary and essential to the processes of relating to each other effectively. By providing an alternative interaction setting in which interactions and relationships play by somewhat different rules, and have somewhat different outcomes, the Internet sheds light on those aspects of face-to-face interaction that we may have missed all along. Tyler (2002), for example, reacting to the research findings on Internet interaction, wonders whether it is the presence of physical features that makes face-to-face interaction what it is, or is it instead the immediacy of responses (compared to e-mail)? That's a question we never knew to ask before.
  • Spears et al. (2002) contrasted the engineering model with the "social science" perspective on the Internet, which assumes instead that personal goals and needs are the sole determinant of its effects. [In the domain of communications research, Blumler & Katz's (1974) "uses and gratifications" theory is an influential version of this approach.] According to this viewpoint, the particular purposes of the individuals within the communication setting determine the outcome of the interaction, regardless of the particular features of the communication channel in which the interaction takes place.The third and most recent approach has been to focus on the interaction between features of the Internet communication setting and the particular goals and needs of the communicators, as well as the social context of the interaction setting (see Bargh 2002, McKenna & Bargh 2000, Spears et al. 2002). According to this perspective, the special qualities of Internet social interaction do have an impact on the interaction and its outcomes, but this effect can be quite different depending on the social context. With these three guiding models in mind, we turn to a review of the relevant research.
firozcosmolance

Super Pupper Party -Time to unleash your pet dogs! - Gossip Ki Galliyan - 0 views

  •  
    Ugghhh!! Summers are not just here but dreadfully taking a toll on all of us. We humans can at least choose to decide on our recreations to drive away our summer blues. But, what about your darling pet dogs? They too might be longing for some entertaining activities but can't express. I am sure you all must be deeply in love with your fur pals and already be doing anything and everything to keep them happy and healthy. But, just imagine those glaring eyes in your locality when you take your dog for a stroll. I am sure you must have come across such people because of whom you don't feel comfortable taking your dogs to public places. Also, if you do take your dog out, the poor thing must wear a leash. Can you imagine putting your pet in the community pool? Your pet might be clean and disciplined. But other people are not so considerate.
ajinkyak

Mobile Runtime Application Self-Protection is proving to be advantageous as enables app... - 0 views

  •  
    Runtime application security is an overall security innovation that utilizes runtime tooling to identify and forestall PC assaults by taking advantage of data from inside the running application. This innovation makes it workable for engineers and PC heads to decide the sort and extent of assaults against a specific application. Through this strategy, they can figure out which applications are protected or perhaps took advantage of during their run time. The ID of these kinds of assaults permits executives to hinder admittance to noxious codes and to thusly keep the clients from tainting their frameworks with hazardous infections. Mobile runtime application self-protection is usually enabled during the development stage of software development. The availability of security measures helps developers to test the applications at different stages to check for potential vulnerabilities. These measures include performing scans on runtime libraries and running vulnerability detection scans on the systems. Furthermore, developers employ a number of processes to make the software secure. One of these is the usage of application self-protection. In the end, the use of security software developed for the purpose of mobile runtime application self-protection (RASP) is a great step taken to protect a business's applications. It also provides a degree of security protection against viruses, spyware, and other Internet threats that may be brought about by poorly designed applications and by the activities of inexperienced users. It makes it possible to ensure that a business's applications run smoothly without encountering any security issues. Such issues might cause harm to the user as well as to the business as a whole. Read More @ http://prsync.com/coherent-market-insights-pvt-ltd/mobile-runtime-application-self-protection-is-proving-to-be-advantageous-as-enables-apps-to-monitor-for-suspicious-behavior-at-r-3528867/
cctvsolutionss

Realistic Benefits in Banking Solution using a Secure CCTV Camera - 0 views

  •  
    Secure CCTV camera and surveillance systems to provide overall security to its buildings monitor the monetary transactions and take care of customers and staff activities.
‹ Previous 21 - 40 of 140 Next › Last »
Showing 20 items per page