Filters








4,498 Hits in 5.3 sec

A graph database framework for covert network analysis: An application to the Islamic State network in Europe

Alexander Gutfraind, Michael Genkin
2017 Social Networks  
Acknowledgement The authors wish to thank Roy Lindelauf for detailed feedback. AG was partly supported by Uptake Technologies, Inc. and National Institutes of Health grant R01AI101229.  ...  The problems are amplified with covert networks because the actors are consciously attempting to conceal or falsify their identities, their attributes, or their connections (Gerdes, 2015) .  ...  Tie 1-2 (from member 1 to member 2) is inferred because of their involvement in the same act. Members 2 and 3 were in the same location, but at a different year, and are thus not tied.  ... 
doi:10.1016/j.socnet.2016.10.004 fatcat:jl7nacn4i5ernitotlix53th7i

Strong by concealment? How secrecy, trust, and social embeddedness facilitate corporate crime

J. D. Jaspers
2019 Crime, law and social change  
Second, the longevity of cartels cannot be explained by isolation from but by embeddedness in their social environment.  ...  Hereby, this study contributes to an understanding of how corporate criminal conduct is organised, by applying relevant theory on criminal networks gleaned from the literature on organised crime.  ...  People within a cell know each other, but do not possess information concerning how the overarching network outside the cell is organised or know the identity of participants of other cells [3, 36] .  ... 
doi:10.1007/s10611-019-09847-4 fatcat:32in7nms2bdi7ccg6w7z6rbn5e

Concealing researcher identity during fieldwork: Sexuality and silencing research participants

Gemma Sou
2021 Area (London 1969)  
Researchers often conceal or reveal parts of their identity to ensure the success of fieldwork.  ...  Second, I argue that a researcher's decision to conceal elements of their identity may be informed by essentialist assumptions about research participants.  ...  ACKNOWLEDGEMENTS Thank you to Tanja Bastia for reading through the first draft of this paper. Your feedback was invaluable.  ... 
doi:10.1111/area.12736 fatcat:jdfpyxezefgitdnbzteuc76owi

Covert Network Construction, Disruption, and Resilience: A Survey

Annamaria Ficara, Francesco Curreri, Giacomo Fiumara, Pasquale De Meo, Antonio Liotta
2022 Mathematics  
Covert networks refer to criminal organizations that operate outside the boundaries of the law; they can be mainly classified as terrorist networks and criminal networks.  ...  We consider how Social Network Analysis (SNA) is used to analyze such networks in order to attain a greater knowledge of criminal behavior.  ...  Their study showed how the network remained operational despite the loss of key actors and how emerging leaders became more central when the network was under attack.  ... 
doi:10.3390/math10162929 fatcat:atrqfp2t7jgp5g72omr5wpijba

Covert Operations, Wars, Detainee Destinations, and the Psychology of Democratic Peace

Christian Crandall, Owen Cox, Ryan Beasley, Mariya Omelicheva
2016 Journal of Conflict Resolution  
We explore US covert forcible actions against democratic governments and their citizens and show that interdemocratic use of covert force is common and can be accommodated within the theory of democratic  ...  We test the assumptions of the theory and its implication with (1) laboratory studies of the conflation of democracy with ally status and (2) historical analyses of covert militarized actions and prisoner  ...  to make their actions seem legitimate through the elaborate myths of legitimation and/or conceal them.  ... 
doi:10.1177/0022002716669572 fatcat:jzje32jd75avzb7gz7dvtgrexi

Disruption and deniable interventionism: explaining the appeal of covert action and Special Forces in contemporary British policy

Rory Cormac
2016 International Relations  
They differ from clandestine operations in that emphasis is placed on concealment of the identity of the sponsor rather than on concealment of the operation: ie disguised but not concealed.' 22 The closest  ...  The only one accessible is that used by the military: operations 'which are so planned and executed as to conceal the identity of, or permit plausible denial by, the sponsor.  ... 
doi:10.1177/0047117816659532 fatcat:wdaqcfsfercvvoqxssdsi3mrx4

Pride Against Prejudice? The Stakes of Concealment and Disclosure of a Stigmatized Identity for Gay and Lesbian Auditors

Sebastien Stenger, Thomas J Roulet
2017 Work, Employment and Society  
As a first step, we unveil the subtle pressures exerted on those who possess concealable stigmatized identities. Homosexual auditors engage in partial or full concealment of their sexuality.  ...  How do individuals choose to conceal a stigmatized attribute and what are the consequences of such choice?  ...  Acknowledgements: The authors are thankful for the feedback they received at the workshop on Sexuality and the Professions at the Law School of the University of Birmingham, at the PSF Conference at the  ... 
doi:10.1177/0950017016682459 fatcat:mgagzwnnx5acviys3oiacsfoee

Dark Networks as Problems

J. Raab
2003 Journal of public administration research and theory  
Because the judgment of ends is inherently normative, we propose to talk about overt and legal versus covert and illegal networks.  ...  The article tries to evaluate how network structures and governance are used for criminal or immoral ends.  ...  The members of covert networks have to hide their activities and face constant risks if discovered.  ... 
doi:10.1093/jpart/mug029 fatcat:s5wpdwheejflhjs47vei2ayqra

Negotiating White Power Activist Stigma

Pete Simi, Robert Futrell
2009 Social problems  
We explain variances in the degree to which WPM members conceal and disclose their identity by focusing on structural differences in the common, everyday settings of family, work, school, and other public  ...  In the face of strong cultural codes against extreme racism, they conceal their Aryan identity to avoid the constant ire, indignation, and conflict they face from others.  ...  The authors wish to thank the anonymous Social Problems' reviewers, Editor Amy Wharton, and Associate Editor Nella Van Dyke for their insightful suggestions on improving the article.  ... 
doi:10.1525/sp.2009.56.1.89 fatcat:osznnvsiq5hevfsaq6kr7gwkpm

Animal Rescue as Civil Disobedience

Tony Milligan
2017 Res Publica  
Apparently illegal cases of animal rescue can be either open or covert:  ...  Covertness, at least in the form of identity concealment, can be sinister but it need not be so.  ...  The two dominant forms of animal rescue, in this militant and challenging sense, are covert rescue (with identity concealment) and open rescue (with identity disclosure on the part of at least some of  ... 
doi:10.1007/s11158-017-9360-7 fatcat:yrcrn4dyfjchpmvk7c274w72rm

Freedom, Justice and Illusion

Graham McFee
2004 Res Publica  
Against such objections, the paper emphasizes the importance of respecting the open texture of the concept of civil disobedience if it is to be of continuing relevance against the backdrop of changing  ...  Apparently illegal cases of animal rescue can be either open or covert: 'open rescue' is associated with organizations such as Animal Liberation Victoria and Animal Liberation New South Wales; 'covert  ...  Covertness, at least in the form of identity concealment, can be sinister but it need not be so.  ... 
doi:10.1023/b:resp.0000018141.86838.39 fatcat:i5l3mlfy6vadllas4ab77ihfce

'DISTURBING POTENTIAL': MILITARY OPERATIONS IN SOCIAL MEDIA DOMAIN

Marcin SZYMAŃSKI
1970 Politeja  
Initial section of the publication is dedicated to the social sphere of the human nature. The reasons and motives inspiring people to create networks are investigated.  ...  The subsequent part provides a description of currently available social media platforms. The tools, their utility and basic characteristics are examined.  ...  The covert, active nature of the IS campaign assumes a high degree of personal security for key network members.  ... 
doi:10.12797/politeja.14.2017.50.08 fatcat:g7nq3ccneffgxnucmveh7coguu

A Framework of Social Networks Control in Higher Educational Contexts

Maria Jakovljevic, Nkopodi Nkopodi
2021 Journal of Information and Organizational Sciences  
Educationists are urged to investigate the effect of social networks control.  ...  The paper provides a critical analysis of the impact of an economic model on social networks control and examines social engineering through the tenets of digital presence, psychological strategies and  ...  The framework with its mechanisms discloses the covert learning process that is not explicitly noticed by members of a social network including educational networks.  ... 
doaj:0cb7f15f0cdb42ee803c26d058dc9e81 fatcat:yzyzvylkqjb4je565s47xxvyay

'You Don't Know How Lucky you are to be Here!': Reflections on Covert Practices in an Overt Participant Observation Study

John S. McKenzie
2009 Sociological research online  
This is both in terms of the researcher role and the surrounding ethics, with the overt researcher role being seen as fundamentally more ethical than the covert participant observer.  ...  Drawing on my research with the contemporary spiritual milieu in Scotland, I will argue that the covert and overt roles are far from opposites and should be seen as part of a continuum.  ...  Furthermore the withholding of information in this case can be justified because my presence was not harmful to the subjects and their identity was completely concealed.  ... 
doi:10.5153/sro.1925 fatcat:kidtatg62bgxfiazqjlobj2uve

Coping With Stigma in the Workplace: Understanding the Role of Threat Regulation, Supportive Factors, and Potential Hidden Costs

Colette Van Laar, Loes Meeussen, Jenny Veldman, Sanne Van Grootel, Naomi Sterk, Catho Jacobs
2019 Frontiers in Psychology  
We outline how insights from research into stigma, social identity, and self-regulation together increase our understanding of how targets are affected by and regulate negative stereotypes in the workplace  ...  the workplace for members of stigmatized groups; (2) the ways in which members of stigmatized groups cope with these threats; (3) the role of supportive factors that mitigate potential threats and affect  ...  ACKNOWLEDGMENTS The authors would like to thank Daan Vandermeulen, Hannah Meijlaers, Sevgi Yakın, and Sarah Delcourt for their assistance.  ... 
doi:10.3389/fpsyg.2019.01879 pmid:31507478 pmcid:PMC6718612 fatcat:55lmblstbrep3ktof7ruitljca
« Previous Showing results 1 — 15 out of 4,498 results