Влияние силового подавления протеста на обсуждение протестной акции в социальных сетях
The focus of this paper is the reaction in social networks to state repressions against the protesters. Being practically unexplored, this topic is examined by the authors at the intersection of two major areas of protest politics: first, the interrelationship between repressions and protest activity and, second, the role of social networks in the dynamics of protest. Basing on the existing theories, we assume that the discussion of the suppressed action should be broader, and should attract more attention of users than the discussion of the action that took place peacefully. In addition, we hypothesize that the violent nature of the suppression of the protest tends to bring its discussion beyond the range of political sympathizers. To test the hypotheses we analyze two protest actions, which took place with a lag of less than a week and were characterized by an overlapping composition of the organizers, but passed according to fundamentally different scenarios. The first action, “Rally in defense of the Internet” / “Rally against Telegram blocking”, took place on April 30, 2018. The second protest action, “He is not our Tzar,” was timed to coincide with the inauguration of V. Putin for a fourth term (May 5, 2018). We collected all publicly available posts (original posts, reposts, comments), containing the word "rally" in any form, from the “Vkontakte” social network for the period in question. The tools of network analysis and descriptive statistics were applied to examine the data. It was shown that the action, suppressed by the police, caused a wider discussion in social networks, - due to both a better resonance in the comments and to a longer and broader discussion in the original posts. The same set of users discussing both actions generated a larger number of posts about the action suppressed by the police. Moreover, the posts devoted to the discussion of this action were more likely to cause a “costly” user reaction. Suppressed rally turned out to provoke a more centralized and “dense” communication. All these empirical findings are in accordance with our hypotheses. Thus, the use of violence by the police contributes both to the expansion of the number of actively involved users and to the improvement of the “quality” of their participation.
By analyzing the logs of corporate e-mail networks we found a number of patterns, showing how the size of ego-networks of individual employees changes on a day by day basis. We proposed a simple model that adequately describes the observed time dependence of an employee's "social circle". Comparison of experimental data with the theoretical model showed that employees are divided into two groups - with fast and slow changes in their social circles, respectively. We believe that the presence of these groups reflects both project-type and process-type of employees' activities. Comparison of data obtained before and during the global economic crisis has shown that the crisis led to an actual reduction in project-type activities.
Legal pluralism and the experience of the state in the Caucasus are at the centre of this edited volume. This is a region affected by a multitude of legal orders and the book describes social action and governance in the light of this, and considers how conceptions of order are enforced, used, followed and staged in social networks and legal practice. Principally, how is the state perceived and how does it perform in both the North and South Caucasus? From elections in Dagestan and Armenia to uses of traditional law in Ingushetia and Georgia, from repression of journalism in Azerbaijan to the narrations of anti-corruption campaigns in Georgia - the text reflects the multifarious uses and performances of law and order. The collection includes approaches from different scholarly traditions and their respective theoretical background and therefore forms a unique product of multinational encounters.
The paper considers linguistic and cross-cultural features of speech strategy and tactics in political texts.
This book presents a course of English for Specific Purposes devoted specifically to the widely-discussed topic Web 2.0. It covers several aspects of online communication ranging from online friendship to business interacions. The activities presented in the coursebook are aimed at developing students’ communicative competence in both written and oral discourse. Web 2.0 includes a variety of authentic articles that arouse interest and provoke discussions. It also presents listening texts based on professional podcasts. Most grammar and vocabulary activities are developed from authentic texts as well.
Web 2.0 can be used at the B2-C1 levels of Common European Famework. The coursebook will help learn and practice the target vocabulary. It will be relevant to those interested in the development of Information and Communication Technologies in general and the Internet in particular.
This paper is devoted to the explanation of selected bureaus’ behavior patterns in the soviet type of totalitarian dictatorships with the command economic model. It is a proven fact that the plan figures in the soviet economy were fabricated as a consequence of intrigues and secret negotiations between different interested parties. Generally, bureaus, as rational agents that minimize risk and maximize slack, should have been interested in reducing the plan figures, nevertheless, they strived to increase them. As examples, mass repression under dictatorships and overexpenditure of an administrative leverage at elections in non-democratic and quasi-democratic countries can be observed. In the article we develop a simple model of coordination between principal (dictator) and his agents (bureaus), which explain the mentioned paradoxical situation.
The article discusses the phenomenon of interconnected glocal hospitality communities which have recently spread over the world in the context of the internet development and cultural globalization processes. It focuses on a typical community of users of CouchSurfi ng.org, a major social hospitality network in St. Petersburg. The author argues that, in the framework of this web service, there occurs a transformation of virtual groups of users localized in various spots of the globe into actual interconnected glocal communities which shape shared identities, norms, values, and practices among its members.
There have been implemented engineering and development of multi-agent recommender system «EZSurf» that performs analysis of interests and provides recommendations for the social network «VKontakte» users based on the data from profile of particular user. During the work process different methods and technological solutions have been analyzed with examination of their advantages and disadvantages. Besides of that the comparative analysis of analogous products has been held where the most similar is Russian start-up service - Surfingbird. Based on this analysis the decision of recommender system implementation and integration has been accepted. The feature of this system is that it uses social network “VKontakte” profile for user’s data collection and API of third-party services (LastFM, TheMovieDB) for an extraction of information about similar objects. Such an approach contributes into optimization of recommender system, because it does not require creation of its own object classification system and objects database. The functionality of multi-agent system was separated between three agents. First agent (Collector) collects user data from “VKontakte” profile using VK API. Second agent (Analyzer) collects similar objects from databases of thitd-party services (LastFM, TheMovieDB) that will be the criteria for further search of recommendatory content. For search and selection of information an agent (Recommender) that works as web-crawler has been implemented. System «EZSurf» can be exploited by the users of social network “VKontakte” in everyday life for time economy on web-surfing process. At the same time they will get recommendations on content that are filtered depending on preferences of every particular user.
The article deals with the processes of building the information society and security in the CIS in accordance with modern conditions. The main objective is to review existing mechanisms for the formation of a common information space in the Eurasian region, regarded as one of the essential aspects of international integration. The theoretical significance of the work is to determine the main controls of the regional information infrastructure, improved by the development of communication features in a rapid process.The practical component consists in determining the future policies of the region under consideration in building the information society. The study authors used historical-descriptive approach and factual analysis of events having to do with drawing the contours of today's global information society in the regional refraction.
The main result is the fact that the development of information and communication technologies, and network resources leads to increased threats of destabilization of the socio-political situation in view of the emergence of multiple centers that generate the ideological and psychological background. Keeping focused information policy can not be conceived without the collective participation of States in the first place, members of the group leaders of integration - Russia, Belarus and Kazakhstan. Currently, only produced a comprehensive approach to security in the information field in the Eurasian region, but the events in the world, largely thanks to modern technology, make the search for an exit strategy with a much higher speed. The article contributes to the science of international relations, engaging in interdisciplinary thinking that is associated with a transition period in the development of society. A study of current conditions in their relation to the current socio-political patterns of the authors leads to conclusions about the need for cooperation with the network centers of power in the modern information environment, the formation of alternative models of networking, especially in innovation and scientific and technical areas of information policy, and expanding the integration of the field in this region on the information content.
Event logs collected by modern information and technical systems usually contain enough data for automated process models discovery. A variety of algorithms was developed for process models discovery, conformance checking, log to model alignment, comparison of process models, etc., nevertheless a quick analysis of ad-hoc selected parts of a journal still have not get a full-fledged implementation. This paper describes an ROLAP-based method of multidimensional event logs storage for process mining. The result of the analysis of the journal is visualized as directed graph representing the union of all possible event sequences, ranked by their occurrence probability. Our implementation allows the analyst to discover process models for sublogs defined by ad-hoc selection of criteria and value of occurrence probability
I give the explicit formula for the (set-theoretical) system of Resultants of m+1 homogeneous polynomials in n+1 variables