Search Results

You are looking at 1 - 10 of 28 items for :

  • social network analysis x
  • Topics in History x
Clear All
Open access

Society, Law, and Culture in the Middle East

“Modernities” in the Making

Open access

Rino Bandlitz Johansen, Monica Martinussen and Nils Kvilvang

psychological distress of soldiers during modern military operations: Building a network of relationships among morale and psychological distress. Paper presented at the IMTA conference, Amsterdam. Van Dick, R., Wagner, U., Stellmacher, O.C., & Christ, O. (2005). To be(long) or not to be(long): Social identification in organizational contexts. Genetic, Social and General Psychology Monographs, 13, 189-218. Vinokur, A. D., Pierce, P. F., Lewandowski-Romps, L., Hobfoll, S. E., & Galea, S. (2011). Effects of war exposure on air force personnel

Open access

Tamar Charkviani

Formation of Meritocracy in Transforming Public Services. Published by: Ilia State University. Tbilisi. Coleman, J.S., 1986. Social Theory, Social Research, and a Theory of Action. American Journal of Sociology 91, pp.1309-1335. Golesenko, I., 2003. The phenomenon of “Russian bribe”: the historical overview of the native sociology of bureaucracy. Available at: http://www.gumer. info bibliotek_Buks/History/Article/go;os_fen.php [Accessed 15 September 2013]. Granovetter, M., 1983. The Strength of Weak Ties: A Network Theory Revisited. Sociological Theory 1, pp

Open access

Hans-Joachim Klaus Ruff-Stahl

,1518,600567,00.html (accessed 9 January 2012). Reason, James. Human Error. Cambridge: Cambridge University Press, 1990. Reason, James. "Human Error: Models and Management." Western Journal of Medicine 172, no. 6 (June 2000): 393-396. —. Managing the Risks of Organizational Accidents. Burlington, VT: Ashgate, 1997. Ritchey, Tom. Wicked Problems - Social Messes: Decision Support Modeling with Morphological Analysis. Berlin: Springer, 2011. Ruff-Stahl, Hans-Joachim. Medienkriege. Wiesbaden: Verlag fuer

Open access

Johan Sigholm

, G., “4chan and /b/: An Analysis of Anonymity and Ephemerality in a Large Online Community,” In Proc. Fifth International AAAI Conference on Weblogs and Social Media (ICWSM-11), Jul. 2011. [9] Bhattacharjee, Y., “How a Remote Town in Romania Has Become Cybercrime Central,” Wired Magazine, Jan. 31 2011. Available: http://www.wired.com/magazine/2011/01/ff_hackerville_romania/ [10] Bradbury, D., “The Spy Who Hacked Me,” Infosecurity, Vol 8 Issue 5, Elsevier, Sep./Oct. 2011. [11] Cabinet Office of the United Kingdom

Open access

Alicia Ohlsson, Erik Hedlund and Gerry Larsson

highest (strongly agree). As mentioned in the Introduction section, these items are categorized into four dimensions: (1) networking ability, (2) apparent sincerity, (3) social astuteness and (4) interpersonal influence. The scale also offers a total score reflecting an individual’s Political skill ability and is often operationalized as a total score in the literature (e.g. Blickle et al. 2008 ; Huang et al. 2013 ; Shi et al. 2013 ). Our analysis used the total scale score, which had a Cronbach’s alpha value of 0.91. 2.5.4 Team performance Participants

Open access

Ricardo G. Lugo, Stefan Sütterlin, Benjamin J. Knox, Øyvind Jøsok, Kirsi Helkala and Natalie Marie Lande

consent prior to the study and were debriefed about the study’s purpose after completing the data collection. Participants were informed that they could withdraw from participation at any time and without any consequences throughout and after the session. The study was approved by the Norwegian Social Science Data Services (NSD; project number 43901) and conformed to the NDCA’s ethical guidelines for experimental studies. 2.5 Data reduction and statistical analysis Statistical analysis was done with SPSS v.22. The SPSS script for the moderation analysis

Open access

Helga Myrseth, Olav Kjellevold Olsen, Einar Kristian Borud and Leif Åge Strand

type. In the crude logistic regression analyses in which presence of gaming problems was entered as the criterion variable (0 = nonproblem gaming, 1 = problem gaming), six of the 12 predictor variables (social motivation, coping motivation, enhancement motivation, depression, boredom proneness – lack of internal stimulation, and loneliness) showed a significant relationship with gaming problems, but only two of these (enhancement motivation and lack of internal stimulation) remained significant in the adjusted analysis ( Tab. 3 ). Tab. 3 Predictors of

Open access

G.L.A. Harris, Ayanna Shivers and Patricia Deuster

, V.E., Talbot, L., Jonas, W., and Friedl, K. 2007. Military Medicine, 172, 1133-1137. Directory of HBCU Distance Learning Programs. http://www.dll.org/hbcus/DistanceLearning/deafult.htm. Retrieved July 23, 2010. Directory of HBCU Programs for Nontraditional Students. http://dll.org/hbcus/NonTraditionalStudents/default,htm. Retrieved July 23, 2010. Dudfield, Helen. 2009. The Development of shared Mental Models during Air Battlespace Collective Training using Dispersed Networked Systems. The Research and Technology

Open access

Tatiana Podolinská

of ethnopolitical practice as our categories of social analysis. Instead of doing that, he appeals, we have to rethink ethnicity – in relational, procedural, dynamic and eventful terms: “…thinking of ethnicity, race and nation not in terms of substantial groups or entities but in terms of practical categories, cultural idioms, cognitive schemas, discursive frames, organizational routines, institutional forms, political projects and contingent events” ( Brubaker 2002 , 167). According to Brubaker (2002 ; 2014 ), ethnicity should be studied as a category of