Open Access. Powered by Scholars. Published by Universities.®
- Keyword
Articles 1 - 3 of 3
Full-Text Articles in Entire DC Network
The Self-Conscious Gentrifier: The Paradox Of Authenticity And Impact Among "First-Wave Neo-Bohemians" In 2 Changing Neighborhoods, Naomi Bartz, Gordon Douglas
The Self-Conscious Gentrifier: The Paradox Of Authenticity And Impact Among "First-Wave Neo-Bohemians" In 2 Changing Neighborhoods, Naomi Bartz, Gordon Douglas
Faculty Publications, Urban and Regional Planning
Gentrification has been a major factor reshaping North American cities for at least four decades, as well as a vital concern of sociological research. In recent years, there appears to be an increasing awareness of the process among contemporary gentrifiers themselves. This self-conscoiusness is significant on two levels: (1) it is unanticipated by or at least unaccounted for in much of the canonical literature on gentrification, having only recently gained acknowledgement (most notably work by Brown-Saracino that explores aspects of a particular type of self-aware gentrifiier); (2) it is complicating the way many gentrifiers or would-be gentrifiers frame and actively …
National Schooling In Crisis: Neoliberal Policies And The 2011 Justice Campaign For The Pgcps Filipino Overseas Contract Teachers, Peter Chua
Faculty Publications, Sociology
No abstract provided.
Comparing Methods For Detecting Child Exploitation Content Online, Bryce Westlake, Martin Bouchard, Richard Frank
Comparing Methods For Detecting Child Exploitation Content Online, Bryce Westlake, Martin Bouchard, Richard Frank
Faculty Publications
The sexual exploitation of children online is seen as a global issue and has been addressed by both governments and private organizations. Efforts thus far have focused primarily on the use of image hash value databases to find content. However, recently researchers have begun to use keywords as a way to detect child exploitation content. Within the current study we explore both of these methodologies. Using a custom designed web-crawler, we create three networks using the hash value method, keywords method, and a hybrid method combining the first two. Results first show that the three million images found in our …