Search results
1 – 7 of 7Yeslam Al-Saggaf and Amanda Davies
The purpose of this paper is to discuss the design, application and findings of a case study in which the application of a machine learning algorithm is utilised to identify the…
Abstract
Purpose
The purpose of this paper is to discuss the design, application and findings of a case study in which the application of a machine learning algorithm is utilised to identify the grievances in Twitter in an Arabian context.
Design/methodology/approach
To understand the characteristics of the Twitter users who expressed the identified grievances, data mining techniques and social network analysis were utilised. The study extracted a total of 23,363 tweets and these were stored as a data set. The machine learning algorithm applied to this data set was followed by utilising a data mining process to explore the characteristics of the Twitter feed users. The network of the users was mapped and the individual level of interactivity and network density were calculated.
Findings
The machine learning algorithm revealed 12 themes all of which were underpinned by the coalition of Arab countries blockade of Qatar. The data mining analysis revealed that the tweets could be clustered in three clusters, the main cluster included users with a large number of followers and friends but who did not mention other users in their tweets. The social network analysis revealed that whilst a large proportion of users engaged in direct messages with others, the network ties between them were not registered as strong.
Practical implications
Borum (2011) notes that invoking grievances is the first step in the radicalisation process. It is hoped that by understanding these grievances, the study will shed light on what radical groups could invoke to win the sympathy of aggrieved people.
Originality/value
In combination, the machine learning algorithm offered insights into the grievances expressed within the tweets in an Arabian context. The data mining and the social network analyses revealed the characteristics of the Twitter users highlighting identifying and managing early intervention of radicalisation.
Details
Keywords
Yeslam Al‐Saggaf and Mohamed M Begg
There is a major transformation taking place in the Arab and Muslim worlds. People in these nations are poised on the edge of a significant new social landscape. Called the…
Abstract
There is a major transformation taking place in the Arab and Muslim worlds. People in these nations are poised on the edge of a significant new social landscape. Called the Internet, this new frontier not only includes the creation of new forms of private communication, like electronic mail and chat, but also webbased forums, which for the first time enables public discussion between males and females in conservative societies. This paper has been written as a result of an ethnographic study conducted in Saudi Arabia during the period 2001‐2002. The purpose of the study was to understand how online communities in Saudi Arabia are affecting people. The results of the study indicate that while participants to a large extent used online communities in accordance with their cultural values, norms and traditions, the communication medium and the features associated with it, such as the anonymity and lack of social cues, have affected them considerably. For example, many participants became more flexible in their thinking, more aware of the diverse nature of people within their society, less inhibited about the opposite gender, and more self‐confident. On the other hand, participants neglected their family commitments, became less shy and some became confused about some aspects of their culture and religion. These findings and their implications for the Arab and Muslim worlds will be highlighted in this paper.
Details
Keywords
John Weckert and Yeslam Al‐Saggaf
Recently two reports appeared in the press, each of which expressed a very different attitude towards intellectual property. One, in the Australian press, discusses a bill before…
Abstract
Recently two reports appeared in the press, each of which expressed a very different attitude towards intellectual property. One, in the Australian press, discusses a bill before the US House of Representatives that would “give American copyright holders freedom to hack PCs used to illicitly share files over peer‐to‐peer (P2P) networks, without fear of prosecution or litigation”. That this represents a fairly strong view of the importance of intellectual property can be seen further as the report continues.
Details
Keywords
Yeslam Al‐Saggaf, Kenneth Einar Himma and Radwan Kharabsheh
The purpose of this paper is to explore the major players operating on Al‐Saha Al‐Siyasia online community, which is by far the most widely spread political online community in…
Abstract
Purpose
The purpose of this paper is to explore the major players operating on Al‐Saha Al‐Siyasia online community, which is by far the most widely spread political online community in Saudi Arabia receiving 20 million page views per month.
Design/methodology/approach
In addition to using “focused” silent observation to observe Al‐Saha Al‐Siyasia over a period of three months (May‐July 2007) and thematic content analysis to examine 2,000 topics (and their replies) posted to Al‐Saha Al‐Siyasia during the period of May‐June 2007, semi‐structured interviews were conducted (in Arabic) with 15 key informants to report their perceptions regarding Islamic fundamentalists, extremists and liberals, etc. on their forum.
Findings
The results of this study indicate that there are three main players operating in Al‐Saha Al‐Siyasia: Islamic fundamentalists, extremists, and liberals. Islamic fundamentalists who are the vast majority on this community use the forum as a medium to promote their image and defend their way of practising the religion. Extremists on the other hand, although their numbers in the forum are very small, use the forum as a medium to establish their credibility and the grounds for their actions. Finally, the liberals use the forum to communicate with the public, and advocate their plans for social reform, invite people to adopt a less strict version of Islam and adopt secularism as a way of life.
Originality/value
This paper continues the first comprehensive descriptive study of the size and influence of the Islamic fundamentalists, extremists, and liberals in their activities as online communities.
Details
Keywords
Yeslam Al-Saggaf, Oliver Burmeister and John Weckert
– The purpose of this study is to investigate the reasons behind unethical behaviour in the Australian Information and Communications Technology (ICT) workplace.
Abstract
Purpose
The purpose of this study is to investigate the reasons behind unethical behaviour in the Australian Information and Communications Technology (ICT) workplace.
Design/methodology/approach
The study employed a qualitative research methodology. A total of 43 ICT professionals were interviewed during the month of February 2014 in six Australian capital cities. All interviews were conducted face-to-face and followed a semi-structured interviewing format utilising open-end questions and further probing questions. The purposive sample represented ICT professionals from large and small organisations, government and private sector, different geographic locations, ages, genders, types of jobs and employment experience. Data analysis was completed with the help of QSR NVivo 10, a software package for managing qualitative data.
Findings
Of the 25 reasons identified for unethical behaviour in ICT workplaces, 30 per cent of participants agreed on five major ones: pressure, bad management, greed, lack of respect towards ICT and communication issues.
Practical implications
By focussing on the reasons behind unethical behaviour in the Australian ICT workplace, this article helps those identifying strategies for dealing with unprofessional behaviour to take into account the root causes of unprofessional behaviour.
Originality/value
There is hardly any literature on reasons for unethical behaviour in the ICT workplaces. This article seeks to address this imbalance in the literature. Also, integrity systems in ICT are a new focus in collective, organisational ethics. Identification of and resolving unethical ICT workplace practice is an innovative contribution to the literature.
Details
Keywords
The aim of this study is to examine interpersonal trust in Muslim matrimonial sites (MMS) from a male perspective. Specifically how users perceive interpersonal trust in MMS; what…
Abstract
Purpose
The aim of this study is to examine interpersonal trust in Muslim matrimonial sites (MMS) from a male perspective. Specifically how users perceive interpersonal trust in MMS; what are the signs of lack of trust in MMS (if any); and what strategies do users adopt to handle the lack of trust in MMS.
Design/methodology/approach
This empirical qualitative study used ethnographic techniques to collect data. In addition to briefly observing five MMS, the study conducted semi-structured interviews with ten participants, who were all males, between the ages of 25-35, and residing in different locations, including the USA, the UK, the UAE, Australia and Bahrain. While the interviews focused on participants' experience in MMS, the analysis of these interviews focused on the issue of trust in these sites.
Findings
The analysis has revealed that participants associated trust with “risk taking”, “reliance” on one's abilities, “self-confidence” and honesty with the first three being the major themes that transpired from the analysis of data. The analysis has also revealed three signs of lack of trust in MMS. Users expressed concern over a large number of members' profiles being fake; they appeared suspicious about these sites and approached them with caution and felt intimidated by the unrealistic expectations members placed on them. However, it was found users adopted several strategies to handle the lack of trust in MMS including using their communication skills to study others carefully, doing “police work” to uncover any inconsistencies in their statements, “interrogating” them using a pre-developed list of questions and involving their family members in their negotiations.
Originality/value
Despite MMS immense popularity within the Islamic world, with the exception of a few articles, there are not many articles available in the academic literature on them. This article seeks to address this imbalance.
Details
Keywords
Bernd Carsten Stahl and Charles M Ess
The purpose of this paper is to give an introduction to the special issue by providing background on the ETHICOMP conference series and a discussion of its role in the academic…
Abstract
Purpose
The purpose of this paper is to give an introduction to the special issue by providing background on the ETHICOMP conference series and a discussion of its role in the academic debate on ethics and computing. It provides the context that influenced the launch of the conference series and highlights its unique features. Finally, it provides an overview of the papers in the special issues.
Design/methodology/approach
The paper combines an historical account of ETHICOMP and a review of the existing papers.
Findings
ETHICOMP is one of the well-established conference series (alongside IACAP and CEPE) focused on ethical issues of information and computing. Its special features include: multidisciplinary and diversity of contributors and contributions; explicit outreach to professionals whose work is to design, build, deploy and maintain specific computing applications in the world at large; creation of knowledge that is accessible and relevant across fields and disciplines; intention of making a practical difference to development, use and policy of computing principles and artefacts; and creation of an inclusive, supportive and nurturing community across traditional knowledge silos.
Originality/value
The paper is the first one to explicitly define the nature of ETHICOMP which is an important building block in the future development of the conference series and will contribute to the further self-definition of the ETHICOMP community.
Details