Data-to-model: a mixed initiative approach for rapid ethnographic assessment
Author
Abstract
Suggested Citation
DOI: 10.1007/s10588-012-9125-y
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Bentley, Margaret E. & Pelto, Gretel H. & Straus, Walter L. & Schumann, Debra A. & Adegbola, Catherine & de la Pena, Emanuela & Oni, Gbolahan A. & Brown, Kenneth H. & Huffman, Sandra L., 1988. "Rapid ethnographic assessment: Applications in a diarrhea management program," Social Science & Medicine, Elsevier, vol. 27(1), pages 107-116, January.
- Jana Diesner & Kathleen M. Carley, 2008. "Conditional random fields for entity extraction and ontological text coding," Computational and Mathematical Organization Theory, Springer, vol. 14(3), pages 248-262, September.
- Kathleen M. Carley, 2006. "Destabilization of covert networks," Computational and Mathematical Organization Theory, Springer, vol. 12(1), pages 51-66, April.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Tracy Holt & Jeffrey C. Johnson & James D. Brinkley & Kathleen M. Carley & Janna Caspersen, 2012. "Structure of ethnic violence in Sudan: a semi-automated network analysis of online news (2003–2010)," Computational and Mathematical Organization Theory, Springer, vol. 18(3), pages 340-355, September.
- Jelena Vićić & Erik Gartzke, 2024. "Cyber-enabled influence operations as a ‘center of gravity’ in cyberconflict: The example of Russian foreign interference in the 2016 US federal election," Journal of Peace Research, Peace Research Institute Oslo, vol. 61(1), pages 10-27, January.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- World Bank Group, 2012. "Understanding Access to Justice and Conflict Resolution at the Local Level in the Central African Republic," World Bank Publications - Reports 16097, The World Bank Group.
- Lindelauf, R. & Borm, P.E.M. & Hamers, H.J.M., 2009.
"Understanding Terrorist Network Topologies and Their Resilience Against Disruption,"
Discussion Paper
2009-85, Tilburg University, Center for Economic Research.
- Lindelauf, R. & Borm, P.E.M. & Hamers, H.J.M., 2009. "Understanding Terrorist Network Topologies and Their Resilience Against Disruption," Other publications TiSEM 0469c068-22ad-4521-8d87-9, Tilburg University, School of Economics and Management.
- Brandy L. Aven, 2015. "The Paradox of Corrupt Networks: An Analysis of Organizational Crime at Enron," Organization Science, INFORMS, vol. 26(4), pages 980-996, August.
- Terrill L. Frantz & Kathleen M. Carley, 2017. "Reporting a network’s most-central actor with a confidence level," Computational and Mathematical Organization Theory, Springer, vol. 23(2), pages 301-312, June.
- Jürgen Pfeffer & Kathleen M. Carley, 2012. "Rapid modeling and analyzing networks extracted from pre-structured news articles," Computational and Mathematical Organization Theory, Springer, vol. 18(3), pages 280-299, September.
- Pitchforth, Emma & Lilford, Richard J. & Kebede, Yigzaw & Asres, Getahun & Stanford, Charlotte & Frost, Jodie, 2010. "Assessing and understanding quality of care in a labour ward: A pilot study combining clinical and social science perspectives in Gondar, Ethiopia," Social Science & Medicine, Elsevier, vol. 71(10), pages 1739-1748, November.
- A. Fronzetti Colladon & E. Remondi, 2021. "Using social network analysis to prevent money laundering," Papers 2105.05793, arXiv.org.
- Morgan Burcher & Chad Whelan, 2015. "Social network analysis and small group ‘dark’ networks: an analysis of the London bombers and the problem of ‘fuzzy’ boundaries," Global Crime, Taylor & Francis Journals, vol. 16(2), pages 104-122, April.
- Sara Jeza Alotaibi, 2022. "A New Internet of Things (IoT) Framework for Public Sectors," International Journal of Information Technology and Web Engineering (IJITWE), IGI Global, vol. 17(1), pages 1-15, January.
- Virginie Masson & Kelsey Wilkins, 2013. "The Small World of 9/11 and the Implications for Network Dismantlement Strategies," School of Economics and Public Policy Working Papers 2013-08, University of Adelaide, School of Economics and Public Policy.
- Alexandra-Maria Bocse, 0. "Hybrid transnational advocacy networks in environmental protection: banning the use of cyanide in European gold mining," International Environmental Agreements: Politics, Law and Economics, Springer, vol. 0, pages 1-19.
- Jana Diesner & Kathleen M. Carley & Laurent Tambayong, 2012. "Extracting socio-cultural networks of the Sudan from open-source, large-scale text data," Computational and Mathematical Organization Theory, Springer, vol. 18(3), pages 328-339, September.
- Christopher E. Hutchins & Marge Benham-Hutchins, 2010. "Hiding in plain sight: criminal network analysis," Computational and Mathematical Organization Theory, Springer, vol. 16(1), pages 89-111, March.
- Manzi, Deborah & Calderoni, Francesco, 2024. "The resilience of drug trafficking organizations: Simulating the impact of police arresting key roles," Journal of Criminal Justice, Elsevier, vol. 91(C).
- Colvin, Christopher J. & Smith, Helen J. & Swartz, Alison & Ahs, Jill W. & de Heer, Jodie & Opiyo, Newton & Kim, Julia C. & Marraccini, Toni & George, Asha, 2013. "Understanding careseeking for child illness in sub-Saharan Africa: A systematic review and conceptual framework based on qualitative research of household recognition and response to child diarrhoea, ," Social Science & Medicine, Elsevier, vol. 86(C), pages 66-78.
- Alexandra-Maria Bocse, 2021. "Hybrid transnational advocacy networks in environmental protection: banning the use of cyanide in European gold mining," International Environmental Agreements: Politics, Law and Economics, Springer, vol. 21(2), pages 285-303, June.
More about this item
Keywords
Text-mining; Network-analysis; Meta-network; Social-networks; Agent-based simulation; Data analysis; Newspaper data;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:comaot:v:18:y:2012:i:3:d:10.1007_s10588-012-9125-y. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.