The Social Network

Results: 5246



#Item
91Academia / Community building / Sociology / Sociolinguistics / Social information processing / Network theory / Interpersonal ties / Social network / Mixed-income housing

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution and shar

Add to Reading List

Source URL: webfiles.uci.edu

Language: English - Date: 2012-09-14 12:18:02
92Network theory / Mathematics / Graph theory / Academia / Social networks / Communication / Social networking services / Twitter / Centrality / Social network / Entropy / Social media

Small Worlds with a Difference: New Gatekeepers and the Filtering of Political Information on Twitter Pascal Jürgens Andreas Jungherr

Add to Reading List

Source URL: www.websci11.org

Language: English - Date: 2016-03-15 09:54:43
93Academia / Linguistics / Sociolinguistics / Network theory / Self-organization / Social information processing / Systems theory / Social network / William Labov / Vowel / Similarity / Bipartite graph

Network structural equivalence and the reversal of the Southern Vowel Shift Robin Dodsworth, North Carolina State University, Richard Benton, University of Illinois One kind of evidence for the i

Add to Reading List

Source URL: labphon.org

Language: English - Date: 2016-04-12 14:05:01
94Software / Computing / Film / Facebook / Social media / Universal Windows Platform apps / Social networking services / Mark Zuckerberg / The Social Network

Microsoft Word - Aufgaben.doc

Add to Reading List

Source URL: vs-oberding.de

Language: English - Date: 2015-03-26 12:33:23
95Prevention / Security / Surveillance / Safety / Video / Crime prevention / IP camera / NVR / Video management system / Axis Communications

Surveon End to End Megapixel Solutions with Enterprise RAID Storage Secure New Taipei City The IP video and network technology development provides a good foundation for advanced urban surveillance to improve social orde

Add to Reading List

Source URL: www.surveon.com

Language: English - Date: 2013-07-01 23:47:35
96Deception / Intellectual property law / Misconduct / Plagiarism / Scientific misconduct / Theft / Behavior / Human behavior / Creativity / Solutions Journalism Network / Peace journalism

Addressing Violence through solutions-oriented reporting J3800 —Temple University — Spring 2016 Solutions journalism is rigorous and compelling reporting about responses to social problems, using the best available e

Add to Reading List

Source URL: solutionsjournalism.org

Language: English - Date: 2016-06-02 15:39:29
97Economy / Finance / Community development / Economic development / Social economy / Ethical banking / Accion U.S. Network / ACCION International / Microcredit / Microfinance / Opportunity finance / Community development financial institution

MICROLENDING IN THE UNITED STATES A TIMELINE HISTORY, OVERVIEW Microfinance offers fair and empowering products — loans, savings

Add to Reading List

Source URL: accionsandiego.org

Language: English - Date: 2010-06-15 19:50:38
98Graph theory / Mathematics / Networks / Network theory / Academia / Algebraic graph theory / Centrality / Network analysis / Social network

Politician Family Networks and Electoral Outcomes: Evidence from the Philippines* Cesi Cruz† Julien Labonne‡ Pablo Querubin§

Add to Reading List

Source URL: cpd.berkeley.edu

Language: English - Date: 2015-03-16 12:35:45
99Education / Library science / Health / Structure / Digital divide / Literacy / Applied linguistics / Chartered Institute of Library and Information Professionals / Digital literacy / Royal National Institute of Blind People / National Literacy Trust / Public library

The Network Newsletter – Ebulletin 195, 29 October 2015 Events Events have been added to the Courses & Events pages on The Network website – see: http://www.seapn.org.uk/courses. Tackling social and digital exclusion

Add to Reading List

Source URL: www.seapn.org.uk

Language: English - Date: 2015-10-29 12:03:26
100Cyberwarfare / Computer network security / Security / Computer security / Cybercrime / Social engineering / E-commerce / Phishing / Threat / Targeted threat / Threat Intelligence Platform / Advanced persistent threat

T2 SPEAR PHISHING PROTECTION T2 Analysis & Mitigation Disrupt spear phishing attacks before systems and data are compromised. Spear phishing is the most prevalent and successful tactic used in advanced targeted attacks.

Add to Reading List

Source URL: pages.phishlabs.com

Language: English - Date: 2016-08-11 09:01:38
UPDATE