Index

Networks, Hacking, and Media – CITA MS@30: Now and Then and Tomorrow

ISBN: 978-1-78769-666-2, eISBN: 978-1-78769-665-5

ISSN: 2050-2060

Publication date: 27 November 2018

This content is currently only available as a PDF

Citation

(2018), "Index", Wellman, B., Robinson, L., Brienza, C., Chen, W. and Cotten, S.R. (Ed.) Networks, Hacking, and Media – CITA MS@30: Now and Then and Tomorrow (Studies in Media and Communications, Vol. 17), Emerald Publishing Limited, Leeds, pp. 161-167. https://doi.org/10.1108/S2050-206020180000017009

Publisher

:

Emerald Publishing Limited

Copyright © 2019 Emerald Publishing Limited


INDEX

Note: Page numbers followed by “n” with numbers indicate notes.

Activism
, 114

Adjusted R-squared values
, 145

Age

and ASR participation
, 31–32

section membership controlling for
, 33–35

Air Force Research Laboratory (AFRL)
, 131

AlphaBay
, 114

American Sociological Association (ASA)
, 4, 11–12, 26, 42

co-membership matrices
, 9

section clusters
, 37–38

American Sociological Review (ASR)
, 26

building digital archive
, 27–29

multiple section memberships and opportunities for innovation
, 35–39

participation
, 29

participation and section membership controlling for age and gender
, 33–35

reasons for differences in participation
, 31–33

section membership and ASR participation
, 29–30

section participation in
, 29

American Sociologist article
, 43

Anonymity
, 117, 120

anonymity-based social processing
, 117

Anonymous social processing
, 117, 119

Antagonism toward ex-partner
, 87

Anti-social messages
, 117, 125

Anti-social/disinhibition
, 119

Anxiety
, 116, 119

Application programming interface (API)
, 122, 143

Archive documents
, 28

Avoidance-based strategies
, 77

Behavioral advertising
, 139

Behavioral economics
, 139

Big data
, 52–53

Bitcoin (btc)
, 135

Bitcoin Fog
, 135

Black-hat hackers’ crisis information processing

analysis plans
, 123–124

anonymity and OpSec
, 120

black-hat research
, 114–115

crisis contexts
, 121–122

crisis information processing in Darknet communities
, 116–118

Darknet black-hat community as hidden organization
, 115–116

data collection
, 122–123

Forum “W”
, 118

market information
, 120–121

overall posting activities
, 124–130

pseudonymity
, 121

registration and rules
, 118–120

social structure
, 120

“Black-hat” activities
, 114

Block
, 135

future contact
, 90–91

Blockchain
, 135

CakePHP
, 135

Cambridge Analytica
, 138–139

Campaign slogans
, 142

Center for Social Science Research (CSSR)
, 27

Chat
, 51

Clearnet sites
, (see Surface-web sites)

Clicktivism
, 138

and political participation
, 140–141

Clicktivist-like actions prediction on candidates’ Facebook posts
, 141, 147–148

clicktivism and political participation
, 140–141

data collection
, 143–144

Facebook in hybrid media system
, 141

ICTs
, 140

methods
, 144–145

regression models
, 148–149

results
, 145–147

voter online engagement
, 138–139

ways to analyzing political Facebook content
, 141–143

Clustering
, 106

algorithm groups vertices
, 36

clustered lattice
, 103, 106

clustered ties
, 102, 103

Co-creating digital traces
, 81

Co-memberships
, 8

data
, 7

Co-sponsoring ASA sessions
, 20

Cohesiveness
, 144

Collective Behavior and Social Movements (CBSM)
, 7

Collective problem solving
, 117

Communication
, 4, 51

on Internet
, 53–54

strategies
, 138

Communication, Information Technologies, and Media Sociology (CITAMS)
, 4, 27, 42

administration
, 11

growing CITAMS membership
, 12–16

improving organizational record keeping
, 11–12

intellectual growth and organizational position
, 5–6

long-term budget worksheet for
, 19

membership over time
, 31

non-ASA CITAMS listserv
, 15

partial assessments of impact of CITASA to CITAMS name change
, 6–11

planning for section’s financial future
, 16–20

strategic planning
, 20–22

Communication acts
, 117, 125–126

Communication and Information Technology Section of American Sociological Association (CITASA)
, 5, 26, 42

Community intelligence
, 114

CompApps
, 90, 47, 49–51, 54

Competing campaigns
, 102

“Complete thought” unit
, 123

Computational methods
, 115

Computer

hardware and software development
, 49–50

simulations
, 102, 109

Computer-Assisted Qualitative Data Analysis
, 56

Computer-mediated interaction
, 54

Concealment strategies
, 119

Connectivity
, 51

Constructive activism
, 116

Contemporary hybrid media system
, 141

Content analysis
, 123

Content-based dimensions
, 144–145

Coping strategies
, 75

Coping strategies for romantic dissolution
, 76–79

Coveillance
, 88

Creating continuity across years
, 20–22

Crisis
, 114, 116

contexts
, 121–122

coping
, 117, 119

events
, 122

Crisis information processing in Darknet communities
, 116–118

Crisis Information Processing in Hidden Organizations (CIPHO)
, 115–117, 119

Crisis management processes
, 116

Crypto-network
, 115

Cryptomarket

cryptomarket-based communities
, 116

shutdowns
, 121–122

Cyber-adversaries
, 114

Cyber-intelligence database
, 122

Cybercriminal Internet Chat Relay networks
, 115

Dark data
, 115

Darknet
, 115

black-hat community
, 115–116

crisis information processing in Darknet communities
, 116–118

Data

analytics
, 139

archives and repositories
, 51, 53

generated as part of online life
, 54

and metadata from communication on Internet
, 53–54

mining techniques
, 115

Data-driven approach
, 4

Database system
, 122

Defcon
, 122

Delete Facebook connections
, 84

Deliberation
, 119

Democratic potentials
, 114

Demographics
, 27

Depression
, 74

Diffusion

disparities
, 108

model
, 103

Digital

archive
, 27–29

connectedness
, 64–65

life
, 51

media
, 6

media stressors
, 77

networks
, 101

spaces
, 67

technology
, 6, 66–70

Digitality
, 66–68

Discretionary section events
, 18

Disk Operating System (DOS)
, 46

Dissemination equality
, 100

Distress
, 74–76

Drinking from fire hose
, 52–53

Eigenvector centrality
, 10

Email
, 51

Emotionality
, 68

Emotions
, 149

emotion-focused coping
, 77, 92

emotional expression
, 75, 78, 86–88

emotional tone
, 144

ENRON email data set
, 54

Ensemble instruction
, 49

Erasing and avoiding digital traces
, 81–84

Escrow
, 135

Ethos
, 142

Exit scam
, 135

Experiential processing
, 117, 119

Exponentiated logistic regression coefficients
, 34

Expressive writing
, 86

Face-to-face counterparts
, 68

Facebook
, 16, 52, 67, 74, 78, 101, 109, 139, 140, 149

communication regulation
, 84–86

digital traces
, 82

in hybrid media system
, 141

post types
, 142

Facebook official
, 81–82

First-person singular pronouns
, 145

Forum “W”
, 118, 122

Friendship and kin networks
, 88

Garlic Routing
, (see Invisible Internet Project (I2P)

GDELT Project
, 145

Gender
, 33

section membership controlling for
, 33–35

Global and Transnational and Sex and Gender co-memberships
, 8

Global moderators
, 120

Global social influence
, 102

Goal-directed coping
, 76–77

“Grave-dressing” phase
, 77

Group information processing
, 117

Harel-Koren Fast Multiscale layout algorithm
, 35–36

Hashtags
, 102, 142–143

Health-related behaviors
, 102

Hesitators
, 103

Hidden organization, Darknet black-hat community as
, 115–116

“High-stakes” stressor
, 75

Human–computer evolution
, 54–55

Hybrid media system, Facebook in
, 141

Idea Works
, 46

Identifying membership
, 14

Identity concealment strategies
, 117

In-degree centrality
, 10, 129

Independence of cyberspace
, 114

Individual memberships
, 7

Individual-level membership data
, 7, 12

Inequalities
, 106

Information

avoidance
, 90

diffusion
, 101, 110

needs for information processing
, 117, 119

providing
, 117, 119, 123, 125, 130

seeking
, 88–89

Information and Communication Technologies (ICTs)
, 101, 109, 139–140

Information technology (IT)
, 42

broad overviews from era
, 46

connectivity and communication
, 51

current status
, 50

data and metadata from communication on Internet
, 53–54

data archives and repositories
, 51, 53

data collection methods adapted for Internet
, 53

data generated as part of online life
, 54

drinking from fire hose
, 52–53

early stages
, 47–50

history of section
, 42–44

Internet
, 51

intersection of history and biography
, 44–46

online life
, 52

role for researchers
, 54–56

Information-rich environments
, 100

Institutional memory
, 12

Intellectual communities
, 4

Intellectual enterprise
, 4

Intellectual growth and organizational position of CITAMS
, 5–6

Intellectual networks
, 27

Intellectual property
, 48

Intelligence Advanced Research Projects Activity (IARPA)
, 131

Inter-site dark networks
, 115

Internet
, 44, 51, 67, 78

anonymity
, 114

data and metadata from communication on
, 53–54

traditional data collection methods adapted for
, 53

Interpersonal coordination
, 64

Interpersonal electronic surveillance
, 88–89

Interview schedule
, 98

Intimacy
, 68

Invisible Internet Project (I2P)
, 115, 135

JSON-file
, 122

Kruskal–Wallis H tests
, 125, 127

Laboratory for Applied Expert Systems Research (LAESR)
, 45

Law enforcement (LE)
, 135

Limit or eliminate Facebook use
, 85–86

Linguistic Inquiry and Word Count program (LIWC)
, 144

Live-blogging
, 67

Live-commenting
, 67

Live-streaming
, 67

Logistic regression analysis of participation in ASR publication
, 34

Long ties as equalizers
, 100, 102–103

discussions, limitations, and future research
, 109–110

local and global diffusion patterns in social networks
, 103

methods
, 103–105

political incumbents
, 100–101

results
, 105–108

social network structure
, 101–102

Long-term budget worksheet for CITAMS section
, 19

Long-term budgeting plan
, 18

Market information
, 120–121

Market shutdown
, 115

Mass media
, 5, 141

Mathematical Sociology score
, 11

Media
, 74

coverage
, 145

systems
, 6

Member-level data
, 12

Membership committee
, 16

Messages and posts/updates
, 84

Methodology Section
, 27, 30, 32–36, 39

Microcomputer Revolution
, 48

Microcomputers
, 45

Microcomputing Users Group (MUG)
, 42

Microsoft Research
, 5, 14, 18

Multimodal network
, 128

Multimodal social network analysis
, 123

Multiple reinforcement mechanism
, 102

National Science Foundation (NSF)
, 26, 44–45

Negative emotions
, 144

Network analysis
, 115, 123–124

Network hubs
, 110

NewTech89 book
, 47

NodeXL
, 35–36

Non-ASA CITAMS listserv
, 15

Non-content-based dimensions
, 144–145

“Noncrisis” category
, 124

Office of the Director of National Intelligence (ODNI)
, 131

Online

behavioral advertising
, 139

forums
, 118

political participation
, 140

social networking service
, 102

survey software
, 53

Online life
, 52

data generated as part of
, 54

Operational security (OpSec)
, 119–120, 130, 132n1, 135

Ordinary least-squared regression analyses (OLS regression analyses)
, 144

Organizational/organizations

record keeping
, 11–12

sections as
, 11

visibility
, 116

Organizations, Occupations and Work (OOW)
, 7

Out-degree centrality
, 129

Paradigms
, 27

Partial assessments of impact of CITASA to CITAMS name change
, 6–11

Participants
, 83

Participation

age and ASR participation
, 31–32

CITAMS membership over time
, 31

gender and ASR participation
, 33

reasons for differences in
, 31

in social media
, 78

Pathos
, 142

Peer review process
, 27

Personal narratives
, 119, 125

Personal pronouns
, 142

Personalization
, 144

Persuasive language
, 142

PGP-Keys
, 135

Phatic communion
, 149

Photographs
, 83

PMI
, 16, 18

Political engagement
, 138, 140

Political incumbents
, 100–101

Political participation, clicktivism and
, 140–141

Positive emotions
, 144

Post-traumatic stress disorder (PTSD)
, 75

Pretty Good Privacy (PGP)
, 135

Preventative measures
, 90–91

Private key
, 135

Pro-community
, 117, 119, 125

Problem-focused coping
, 77, 92

Procedural directives
, 117, 119

Programming
, 6

Pseudonymity
, 121

Public key
, 135

Quasi-simultaneity
, 65

Random networks
, 106

Rational processing
, 117, 119, 125

Regression models
, 143

Relationship status
, 82

Rely on membership data
, 4

Researchers, role for
, 54–56

Romantic breakup
, 75–76, 79–80, 81

Romantic dissolution

coping strategies for
, 76–79

data analysis
, 80

and distress
, 75–76

emotional expression
, 86–88

erasing and avoiding digital traces
, 81–84

Facebook
, 77, 79

information avoidance
, 90

information seeking
, 88–89

interview schedule
, 98

limitations, and future research
, 93

preventative measures
, 90–91

procedure
, 79–80

regulating Facebook communication
, 84–86

romantic breakups
, 91

sample
, 79

support seeking
, 88

Rumor Interaction Analysis System (RIAS)
, 117–118

Satoshi Nakamoto
, 135

Scanning process
, 29

Science, Knowledge, & Technology (SKAT)
, 7

Science of Science
, 27

Secretary/Treasurer
, 12, 17–18

Section membership
, 29–30

controlling for age and gender
, 33–35

Section participation in ASR
, 29

Section-co-membership data
, 4

Section’s financial future, planning for
, 16–20

Sections as organizations
, 11

Security concerns
, 90

Seeding

asymmetries
, 108

imbalances
, 109

Seeking support
, 88

Self-restraint
, 90

Silk Road 2 (SR2)
, 122

Simultaneity
, 64–68

Skepticism
, 45

Small world
, 106

Social

connectedness
, 68

institution
, 69

organization
, 69

psychology
, 8

psychology co-memberships
, 8

solidarity
, 64

structure
, 120

synchronicity
, 64–66, 70

Social media
, 52, 54, 66–68, 138

adoption
, 74

Social networks
, 77, 91, 100–101, 109

Facebook
, 16, 52, 67, 74, 78, 101, 109, 139–140, 149

graph
, 128

sites
, 74

structure
, 101–102

Twitter
, 16, 52, 67, 101, 109

Social science

research
, 42–43

researchers
, 52

Sociologists
, 43

Sociology
, 20, 35

of communication
, 5

evolution
, 27

Sociomental experiences
, 65

Source credibility
, 119

Statistical Package for the Social Science (SPSS)
, 144

Strategic communication firms
, 138

Structural diversity
, 100

Structurally diverse networks
, 100

Surface-web sites
, 115

Surveillance
, 88–89

Technical culture
, 48

Technological determinism
, 20

Technology-enhanced activities
, 68

Technology-rich society
, 70

Telegraph
, 139

Temporal outlook
, 144

Temporal symmetry
, 64–67

Terrorism recruitment
, 109

The American Sociologist (TAS)
, 47

The Onion Routing (Tor)
, 115, 135

Theory-driven analytic framework
, 115

Three-dimensional framework
, 117

Time-sensitive applications
, 56

Topic modeling
, 115

Tor-hosted forums
, 114–115

Traditional data collection methods adapted for Internet
, 53

Traditional media
, 149

Traditional political participation
, 140

Trail
, 135

Traumatic events
, 76

Twitter
, 16, 52, 67, 101, 109

Uncertainty
, 116, 119

Unitizing
, 123

University of Missouri (MU)
, 44–45

US primary election
, 139

UserRank algorithms
, 115

Utopia
, 121–122

Videoconferencing
, 51

Virtual Private Network (VPN)
, 135

Virtual reams of tutorials
, 120

voIP conversation
, 51

Voter online engagement
, 138–139

World Wide Web
, 44, 51

YouTube
, 67