Listing 1 - 10 of 23 | << page >> |
Sort by
|
Choose an application
"Psycholinguistic analysis of Chinese-language social media can help provide insight into the attitudes of Twitter and Sina Weibo users toward local government, national government, and Western companies. Because the issue of food safety engages important themes in Chinese domestic politics---including the watchdog role of the press and the challenges of effective oversight in an authoritarian system -- this analysis focused on social media content discussing the July 2014 "Husi incident," a food safety scandal involving expired meat in McDonalds and KFC. Results suggested that Chinese-language social media users expressed more anger and sadness--but also used more words indicating positive emotions or feelings of kinship -- when discussing the national government than when discussing the local government. Discussions on openly accessible Chinese microblogging platforms may thus offer an avenue through which to gauge public opinion on issues of domestic politics, although their value may wane as a result of government attempts to curb the use of social media to mobilize individuals online into organized, politically motivated groups offline. This exploration of Chinese-language social media regarding food safety traces a preliminary road map to conduct such analysis, including a methodology for analyzing Chinese-language social media as well as a discussion of the promises and limitations of social media analysis in this unique context"--Publisher's description
Social media --- Online social networks --- Public opinion --- Food --- Food contamination --- Food security --- Food supply --- Psychological aspects. --- Safety measures --- Government policy
Choose an application
In this report, the authors describe the recent literature on insider threats and white-collar crime in non-government organisations and industries and identify management strategies used to counter them, both internationally and in the Australian context. The objective is to provide the Australian Department of Defence and the broader research and practitioner community with (1) access to sources that will generate greater understanding of the depth and breadth of the potential risks of insider threats and white-collar crime and (2) a scholarly evidence base on which to build strategies for better detection, management and prevention. The authors analyse and evaluate recent Australian and international sources on insider threats and white-collar crime, concentrating on articles, reports and accounts that help define these threats and provide important context for management and mitigation strategies and emerging risks. Key findings include challenges with identifying causal mechanisms due to the paucity of publicly available data; the importance of devising management strategies that engage with human and technical dimensions; the relative efficacy of self-regulatory approaches that generate a strong security culture; and the importance of recognising ethical and privacy concerns that can arise with increased use of new technologies, such as cybervetting.
Choose an application
This applied research project provides the Security, Suitability, and Credentialing (SSC) Performance Accountability Council Program Management Office (PAC PMO) with an examination of how U.S. government vetting processes and procedures could be enhanced by application of mobile technologies and platforms. The research team identified key mobile platform and security factors to consider when communicating with and screening candidates within the SSC process. This report also describes relevant private-sector practices on talent acquisition, applicant tracking systems, screening methods, and communication strategies with candidates prior to the onboarding process. The RAND research team performed the following tasks for the PAC PMO: (1) categorize emerging mobile technology platforms according to SSC process relevance and ability to assist government vetting of personnel; (2) illustrate relevant practices and lessons learned for integrating security applications with mobile platforms; and (3) provide recommendations on how best to incorporate potentially useful private-sector screening practices to create efficiency within initial stages of the SSC process.
Choose an application
The U.S. government's screening and vetting process seeks to ensure that those with access to classified or otherwise sensitive information, material, people, or property can be trusted. The authors of this report leverage interviews with human resources and security personnel in several corporate sectors (technology, pharmaceuticals, finance, and gaming) to derive insights for the U.S. government regarding potentially effective ways to screen and vet personnel and monitor personnel over time to decrease risk to U.S. national security and public trust. Corporations in the sample exhibited considerable diversity in screening, vetting, and monitoring practices, much of which was industry-specific and some of which was related to corporate size and stage of growth. For example, smaller and newer corporations preferred less-structured, more-flexible and informal screening and vetting processes, with any malfeasance handled on a case-by-case basis. Larger organizations in established, highly regulated industries, such as finance and pharmaceuticals, tended to have more-structured processes, owing to the constant need to follow federal and state regulations. Overall, few corporations in the sample used artificial intelligence and machine learning automated-analysis approaches for prehire screening, vetting, or employee monitoring, and those that did indicated that extensive human management of these systems was necessary. Creative solutions to employee monitoring included the development of human intelligence networks and intelligence fusion capabilities.
Choose an application
This report offers a framework for defining civic infrastructure and presents some measures that provide information to help monitor civic infrastructure across the United States, in individual states, in communities, and across diverse populations. The authors specifically define civic infrastructure as the places, policies, programs, and practices that undergird strong communities and foster civic engagement. The framework categorizes these places, policies, programs, and practices in terms of three inputs: (1) democratic governance, (2) civic education, and (3) civic spaces. The authors also consider how these inputs are related to a set of intertwined outputs: (1) civic literacy, (2) civic identity, and (3) civic engagement. They then identify a set of existing measures across a range of data sources that provide information about the status of these inputs and outputs in the United States. This research has some implications for research, policy, and practice. First, more research is needed to test and confirm the definition, framework, and measures in this report. Second, federal and state policies could increase collection and availability of measures. Lastly, this research suggests considerable variation across states and communities in regard to rights and access to many aspects of civic infrastructure framework - from democratic governance, civic education, and civic spaces to the outputs of civic literacy, identity, and engagement. For that reason, this work implies the urgent need for more efforts to measure equitable access to and participation in aspects of civic infrastructure, both to monitor the health of democracy and to determine ways of improving it.
Political participation --- Civics --- Democracy --- Digital divide --- Media literacy --- Study and teaching
Choose an application
The objective of face recognition technologies (FRTs) is to efficiently detect and recognize people captured on camera. Although these technologies have many practical security-related purposes, advocacy groups and individuals have expressed apprehensions about their use. The research reported here was intended to highlight for policymakers the high-level privacy and bias implications of FRT systems. In the report, the authors describe privacy as a person's ability to control information about them. Undesirable bias consists of the inaccurate representation of a group of people based on characteristics, such as demographic attributes. Informed by a literature review, the authors propose a heuristic with two dimensions: consent status (with or without consent) and comparison type (one-to-one or some-to-many). This heuristic can help determine a proposed FRT's level of privacy and accuracy. The authors then use more in-depth case studies to identify "red flags" that could indicate privacy and bias concerns: complex FRTs with unexpected or secondary use of personal or identifying information; use cases in which the subject does not consent to image capture; lack of accessible redress when errors occur in image matching; the use of poor training data that can perpetuate human bias; and human interpretation of results that can introduce bias and require additional storage of full-face images or video. This report is based on an exploratory project and is not intended to comprehensively introduce privacy, bias, or FRTs. Future work in this area could include examinations of existing systems, reviews of their accuracy rates, and surveys of people's expectations of privacy in government use of FRTs.
Choose an application
The coronavirus disease 2019 (COVID-19) pandemic has had a significant impact on a wide variety of risk behaviors and indicators that are considered during security, suitability, and credentialing investigations and adjudications. Given that the U.S. government personnel vetting process is focused on detecting risk and assessing an individual for their trustworthiness, such changes in behavior related to the COVID-19 pandemic have the potential to affect decisionmaking and adjudication regarding what constitutes risky behavior for the purposes of personnel vetting. This is particularly important when considering the risk an individual might present if granted a security clearance and access to classified information. In this report, the authors abstracted adjudicative factors likely to have been affected by the pandemic or pandemic-specific circumstances from pertinent personnel vetting documents and organized them into categories, including financial hardship and unemployment, alcohol abuse or misuse, drug and substance abuse or misuse, mental and emotional health and well-being, and changes or increases in remote or virtual work. They then conducted an academic literature and open-source data search to explore how these risk factors might have been affected by the pandemic and interviewed subject-matter and field experts to further understand how changes in these risk behaviors might affect the adjudication process. Potential action areas where the vetting processes could be adapted include monitoring risk behavior changes as social conditions change, assessing fairness to applicants, developing or formalizing mitigation actions, and addressing vetting workforce challenges during a pandemic or similar event.
Choose an application
Recruiting and enlistment --- Data processing. --- United States. --- Recruiting, enlistment, etc. --- Armed Forces --- Enlistment --- Military recruiting --- Re-enlistment --- Armies --- Neutrality --- Bounties, Military --- U.S. Army --- US Army
Choose an application
This report is one of a series designed to support Air Force leaders in promoting resilience among its Airmen, civilian employees, and Air Force families. It examines the relationship between spiritual fitness and resilience, using key constructs found in the scientific literature: a spiritual worldview, personal religious or spiritual practices, support from a spiritual community, and spiritual coping. The literature shows that possessing a sense of meaning and purpose in life is strongly positively related to quality of life and improved health and functioning. The authors find that diverse types of spiritual interventions are linked to improved resilience and well-being. These interventions focus mainly on the individual, but some address the military unit, the family, and the community.--
Resilience (Personality trait) --- Families of military personnel --- Social Sciences --- Psychology --- Religious life --- Military families --- Human resilience --- Resiliency (Personality trait) --- Families --- Soldiers --- Personality --- United States. --- Airmen --- Religious life. --- Civilian employees --- AF (Air force) --- Air Force (U.S.) --- U.S.A.F. (Air force) --- United States Air Force --- US Air Force --- USAF (Air force)
Choose an application
In the months after the contested Iranian presidential election in June 2009, Iranians spoke out about the election using Twitter--a social media service that allows users to send short text messages, called tweets, with relative anonymity. This research analyzed more than 2.5 million tweets discussing the Iran election that were sent in the nine months following it, drawing insights into Iranian public and mood in the post-election period.
#SBIB:328H515 --- #SBIB:309H271 --- #SBIB:309H103 --- #SBIB:324H60 --- Instellingen en beleid: Iran --- Politieke communicatie: toepassingsgebieden --- Mediatechnologie / ICT / digitale media: sociale en culturele aspecten --- Politieke socialisatie --- Presidents -- Iran -- Election -- 2009 -- Public opinion. --- Public opinion -- Iran. --- Social media -- Political aspects -- Research. --- Social media -- Political aspects. --- Presidents --- Public opinion --- Social media --- User-generated media --- Communication --- User-generated content --- Opinion, Public --- Perception, Public --- Popular opinion --- Public perception --- Public perceptions --- Judgment --- Social psychology --- Attitude (Psychology) --- Focus groups --- Reputation --- Presidency --- Heads of state --- Executive power --- Election&delete& --- Iran --- Political aspects --- Political aspects&delete& --- Research --- Election --- Public opinion. --- Political aspects. --- Research.
Listing 1 - 10 of 23 | << page >> |
Sort by
|