The document discusses how social capital theory can help explain the social effects of the Internet. It argues that individuals and communities with higher levels of social capital, as measured by factors like generalized reciprocity and social ties, will be more socially active online as well as offline. Empirical evidence from studies in Los Angeles and of U.S. states supports this, finding those with more offline social connections and belonging were more likely to make online friends or participate in online groups. The document calls for more research examining social capital and online activity over time and across different communities.
Visible Effort: A Social Entropy Methodology for Managing Computer-Mediated ...Sorin Adam Matei
A theoretically-grounded learning feedback tool suite, the Visible Effort (VE) Mediawiki extension, is proposed for optimizing online group learning activities by measuring the amount of equality and the emergence of social structure in groups that participate in Computer-Mediated Collaboration (CMC). Building on social entropy theory, drawn from Shannon’s Mathematical Theory of Communication, VE captures levels of CMC unevenness and group structure and visualizes them on wiki Web pages through background colors, charts, and tabular data. Visual information provides users entropic feedback on how balanced and equitable collaboration is within their online group are, while helping them to maintain it within optimal levels. Finally, we present the theoretical and practical implications of VE and the measures behind it, as well as illustrate VE’s capabilities by describing a quasi-experimental teaching activity (use scenario) in tandem with a detailed discussion of theoretical justification, methodological underpinning, and technological capabilities of the approach.
2009-JCMC-Discussion catalysts-Himelboim and SmithMarc Smith
This study addresses 3 research questions in the context of online political discussions:
What is the distribution of successful topic starting practices, what characterizes the content
of large thread-starting messages, and what is the source of that content? A 6-month
analysis of almost 40,000 authors in 20 political Usenet newsgroups identified authors
who received a disproportionate number of replies. We labeled these authors ‘‘discussion
catalysts.’’ Content analysis revealed that 95 percent of discussion catalysts’ messages
contained content imported from elsewhere on the web, about 2/3 from traditional news
organizations. We conclude that the flow of information from the content creators to the
readers and writers continues to be mediated by a few individuals who act as filters and
amplifiers.
2009 - Connected Action - Marc Smith - Social Media Network AnalysisMarc Smith
Review of social media network analysis of Internet social spaces like twitter, flickr, email, message boards, etc. Network analysis and visualization of social media collections of connections.
Visible Effort: A Social Entropy Methodology for Managing Computer-Mediated ...Sorin Adam Matei
A theoretically-grounded learning feedback tool suite, the Visible Effort (VE) Mediawiki extension, is proposed for optimizing online group learning activities by measuring the amount of equality and the emergence of social structure in groups that participate in Computer-Mediated Collaboration (CMC). Building on social entropy theory, drawn from Shannon’s Mathematical Theory of Communication, VE captures levels of CMC unevenness and group structure and visualizes them on wiki Web pages through background colors, charts, and tabular data. Visual information provides users entropic feedback on how balanced and equitable collaboration is within their online group are, while helping them to maintain it within optimal levels. Finally, we present the theoretical and practical implications of VE and the measures behind it, as well as illustrate VE’s capabilities by describing a quasi-experimental teaching activity (use scenario) in tandem with a detailed discussion of theoretical justification, methodological underpinning, and technological capabilities of the approach.
2009-JCMC-Discussion catalysts-Himelboim and SmithMarc Smith
This study addresses 3 research questions in the context of online political discussions:
What is the distribution of successful topic starting practices, what characterizes the content
of large thread-starting messages, and what is the source of that content? A 6-month
analysis of almost 40,000 authors in 20 political Usenet newsgroups identified authors
who received a disproportionate number of replies. We labeled these authors ‘‘discussion
catalysts.’’ Content analysis revealed that 95 percent of discussion catalysts’ messages
contained content imported from elsewhere on the web, about 2/3 from traditional news
organizations. We conclude that the flow of information from the content creators to the
readers and writers continues to be mediated by a few individuals who act as filters and
amplifiers.
2009 - Connected Action - Marc Smith - Social Media Network AnalysisMarc Smith
Review of social media network analysis of Internet social spaces like twitter, flickr, email, message boards, etc. Network analysis and visualization of social media collections of connections.
An interactive presentation on social network theory and analysis. Content includes information on tie formation and social capital. Network relations are explained by using the example of The A Team. Granovetter's Strength of Weak Ties Theory (1973) is also covered and weak ties and strong ties are explained. Appropriate application of social network theory to individuals understanding how to best take advantage of social networking platforms to find jobs as well as companies taking advantage of social media platforms to find followers are introduced.
The science of networks is becoming an increasingly important and intriguing area of study that reveals many a patterns and relationships often hidden. This presentation is about the use of SNA to study the network of the Digital Library Community
Just What Is Social in Social Media? An Actor-Network Critique of Twitter Age...Jeffrey Keefer
These are the slides I presented at the #SMSociety15 conference https://smsociety15.sched.org/event/84f2409561cd92c5cc1fc5b8b01558f9
While social media includes the applications that support the creation and exchange of user generated and participatory content (Kaplan & Haenlein, 2010), the focus is commonly on the presentation or actions of users, the networks created on the platforms, and what we can do to promote our various WIIFMs (What’s In It For Me). It is less studied from the perspective of the networks themselves, especially through the influence and role of the non-human elements. Through this inverted perspective much may be learned, especially involving simple assumptions about the role of agency, namely the power to act (Latour, 2013). It is this social aspect of social media where actor-network theory can be most usefully employed, as the agency of things themselves may frequently be overlooked (Adams & Thompson, 2011) when rushing to understand the black box of assumptions present in social media research and practice.
Community Evolution in the Digital Space and Creation of SocialInformation C...Saptarshi Ghosh
A social homogeneous group can be formed irrespective to geo-spatial contiguity and research reveals that interaction through online communication fosters social behaviours like teamwork, ties, bonding and trust building as well as community building.
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...BAINIDA
Subscriber Churn Prediction Model using Social Network Analysis In Telecommunication Industry โดย เชษฐพงศ์ ปัญญาชนกุล อาจารย์ ดร. อานนท์ ศักดิ์วรวิชญ์
ในงาน THE FIRST NIDA BUSINESS ANALYTICS AND DATA SCIENCES CONTEST/CONFERENCE จัดโดย คณะสถิติประยุกต์และ DATA SCIENCES THAILAND
The Impacts of Social Networking and Its AnalysisIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
The emerging field of computational social science (CSS) is devoted to the pursuit of interdisciplinary social science research from an information processing perspective, through the medium of advanced computing and information technologies.
An interactive presentation on social network theory and analysis. Content includes information on tie formation and social capital. Network relations are explained by using the example of The A Team. Granovetter's Strength of Weak Ties Theory (1973) is also covered and weak ties and strong ties are explained. Appropriate application of social network theory to individuals understanding how to best take advantage of social networking platforms to find jobs as well as companies taking advantage of social media platforms to find followers are introduced.
The science of networks is becoming an increasingly important and intriguing area of study that reveals many a patterns and relationships often hidden. This presentation is about the use of SNA to study the network of the Digital Library Community
Just What Is Social in Social Media? An Actor-Network Critique of Twitter Age...Jeffrey Keefer
These are the slides I presented at the #SMSociety15 conference https://smsociety15.sched.org/event/84f2409561cd92c5cc1fc5b8b01558f9
While social media includes the applications that support the creation and exchange of user generated and participatory content (Kaplan & Haenlein, 2010), the focus is commonly on the presentation or actions of users, the networks created on the platforms, and what we can do to promote our various WIIFMs (What’s In It For Me). It is less studied from the perspective of the networks themselves, especially through the influence and role of the non-human elements. Through this inverted perspective much may be learned, especially involving simple assumptions about the role of agency, namely the power to act (Latour, 2013). It is this social aspect of social media where actor-network theory can be most usefully employed, as the agency of things themselves may frequently be overlooked (Adams & Thompson, 2011) when rushing to understand the black box of assumptions present in social media research and practice.
Community Evolution in the Digital Space and Creation of SocialInformation C...Saptarshi Ghosh
A social homogeneous group can be formed irrespective to geo-spatial contiguity and research reveals that interaction through online communication fosters social behaviours like teamwork, ties, bonding and trust building as well as community building.
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...BAINIDA
Subscriber Churn Prediction Model using Social Network Analysis In Telecommunication Industry โดย เชษฐพงศ์ ปัญญาชนกุล อาจารย์ ดร. อานนท์ ศักดิ์วรวิชญ์
ในงาน THE FIRST NIDA BUSINESS ANALYTICS AND DATA SCIENCES CONTEST/CONFERENCE จัดโดย คณะสถิติประยุกต์และ DATA SCIENCES THAILAND
The Impacts of Social Networking and Its AnalysisIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
The emerging field of computational social science (CSS) is devoted to the pursuit of interdisciplinary social science research from an information processing perspective, through the medium of advanced computing and information technologies.
This is the presentation I gave for the Jesse Jones Fellowship at the College of Communication of the University of Texas at Austin in Fall 2009. Explains an overview of my research on citizens' political talk and why it matters.
Director Lee Rainie describes how libraries can be actors in building and participating in social networks through their use of social media such as Facebook, Twitter, and blogging and through delivering their time-tested — and trusted — services to their patrons. More: http://pewinternet.org/Presentations/2011/May/San-Francisco-Public-Library.aspx
Lecture Slides for Internet and Society course at the University of Edinburgh on understanding the analysis of community and internet (amd mobile etc), using ideas from studies of CMC, social network studies, social capital etc https://www.wiki.ed.ac.uk/display/IandS/Internet+and+Society+Home
In this session, we talk about the mobile and social web, and how it shapes economy, individual behavior and well-being, political events, and society as a whole.
Enhancing C-Span Video Archive with Practice Capital Metadata and data journa...Sorin Adam Matei
The presentation argues that the C-Span archive is not a mere repository of moving pictures. It can also be seen as a one of a kind “big data” repository. If processed from a “practice capital” perspective with quantitative and network analytic tools, such data can significantly extend the capabilities of C-Span archives by identifying the central actors in a debate and their ability to sway it. The proposed approach may serve the public interest though API tools that support third party development of visualization and analytic apps, which can lead to more informed debates and new forms of data driven journalism.
There is no wisdom of crowds on Wikipedia. After 500 edits articles become quite uneven, a tiny fraction of users become the ad hoc rulers of those articles.
Preseented at Wikimania 2009
http://wikimania2009.wikimedia.org/wiki/Proceedings:132
Romanian rural population has far fewer chances to get past elementary school. There is a clear and deep divide in terms of education between rural and urban populations.
Un vechi proverb românesc spune: „Cine are carte, are parte”. Un alt proverb, însă, adaugă: „Cine împarte, parte îşi face”. Există vreo legătură mai profundă între aceste două proverbe decît simplul joc de cuvinte? Eu cred că da. Problema este atît de serioasă încît i-am dedicat în cartea mea, „Boierii minţii” un spaţiu considerabil. Una dintre tezele cărţii este că mulţi, deşi nu toţi, intelectuali din România au un comportament de grup închis, în care prestigiul şi anume privilegii, inclusiv de a face parte din casta intelectualilor, în special cei de vîrf, sunt cu grijă drămuite şi apărate.
Teoria a fost primită în mediul românesc cu variate reacţii, de la entuziasm la oprobiu. Intens disputată a fost în special una dintre sugestiile cărţii, anume că intelectualitatea românească–ca instituţie socială–este, din motive sociologice şi istorice, caracterizată de un model de viaţă care pune accentul pe rolul special al acestui grup în societate şi care poate duce, în anume condiţii, la elitism. Deşi elitismul de care vorbeşte cartea „Boierii Minţii” este un fenomen destul de complex, el poate fi descris în două feluri. Pe de o parte el se compune din acţiuni şi atitudini conştiente, subiective, ale unor indivizi şi grupuri specifice. Aceşti actori sociali cred că ideile publice, visurile comune şi tematica discuţiei sociale trebuie să fie inspirate, modelate şi organizate în jurul unor teme înalte: naţiunea, filosofia, „cultura”, Europa, literatura, etc. În acest proces, intelectualii publici selectaţi printrun proces de consacrare în interiorul unor grupuri închise au un rol hotărîtor, acţionînd ca nişte preoţi iniţiaţi ai unui cult „sociointelectual”. Cum şi de ce are loc acest proces, care sunt efectele sale şi alternativele posibile, este explicat în cartea „Boierii Minţii”.
Elitismul mai poate fi descris, însă, şi ca un proces social profund, care afectează viaţa publică românească în mod tăcut. E vorba de modul în care se creează şi se menţine clasa intelectuală în mod nemijlocit. În timp ce ideologia şi ideile elitismului afectează viaţa publică la nivel de vîrf, procesele sociale care îl sprijină subteran se referă la modul în care intelectualii şi urmaşii lor au acces la educaţie şi la o şansă neegală de a înainta în societate, în general. De acest proces m-am ocupat foarte puţin în volum şi aş vrea să îl descriu în cifre în acest articol.
http://www.pagini.com/blog/2009/05/08/elitismul-educatei-romanesti-si-inegalitatea-sanselor-in-educatia-rurala/
Visible Past is a web-based knowledge creation and storage environment that is aware of a user's spatial location and which delivers information on the fly, to that location, based on the user needs connected to that location. If you are, for example, in France, in front of the Tour Eiffel, Visible Past can send you information about the Tour Eiffel, to your mobile phone. Further, the cell phone can be used to rate the information or to add your own content to the site.
However, Visible Past is not just a site. It is a software solution that can be installed on any server, by anyone, at no cost. It uses open source, free software, that can be extended and adapted for any specific project.
Romanii sunt, in sfirsit, mai optimisti in ceea ce priveste viitorul. Isarescu apare ca o alternativa pentru Tariceanu. Becail urca in top. Basescu e considerat European (ca si Geoana).
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Monitoring Java Application Security with JDK Tools and JFR Events
The Internet is a magnifying glass
1. Studying the social effects of the Internet with a “magnifying glass” Sorin A. Matei
2.
3.
4.
5.
6.
7.
8. Belonging Mass Communication On-line connections Metamorphosis research strategy Chinese Greater Monterey Park Mexican East LA Caucasian South Pasadena Korean Greater Koreatown Caucasian Westside African-American Greater Crenshaw Central American Pico Union Bilingual Telephone Interviews 1812 Households
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37. Study started as part of an undergraduate research methods class Paper presented in Maastricht, at the 3rd Conference of Internet researchers, under review at the Journal of Broadcasting and Electronic Media Methodology Using states as units of analysis: Do states with higher capacity for producing social capital generate more on-line sociability?
44. Results The higher the social capital, the more numerous the groups The more homogeneous the population, the more numerous the groups Adjusted R 2 =.18 .01 -2.546 -.420 .032 -.08 Percent population foreign born .02 2.285 .327 .014 0.03 % Yes: Most people can be trusted β Std. Error B p t Standardized Coefficients Unstandardized Coefficients
45.
46. Follow up analysis results Dependent variable: Yahoo! groups per 100,000 Adjusted R-square = . 12 The more numerous the non-profit organizations, the more numerous the on-line groups The more homogeneous the population, the more numerous the groups -- ns
47.
48.
49.
50.
51.
52.
53.
54.
55. Belonging and new/old media connectedness: a communication infrastructure model Connections to Community Organizations Local/Community Media Connections Participation in Interpersonal Storytelling BELONGING Internet connection Mainstream Mass Media Connections 1.8 1.7 5.6 1.4 1.6 Metamorphosis study: English-speaking samples 1.4
56. On-line sociability predicted by belonging ( dv: “Have you ever met someone on-line you consider a personal friend?”) Variable B S.E. Wald Sig Exp(B) BELONGING .0639 .0296 4.6612 .0309 1.0660 GENDER .5391 .3013 3.2019 .0736 1.7144 AGE -.0095 .0143 .4344 .5098 .9906 EDUC .1811 .1156 2.4549 .1172 1.1985 INCOME -.1030 .0863 1.4238 .2328 .9021 IMMIG.GEN. -.1362 .1296 1.1045 .2933 .8727 KOREATOWN 3.2065 1.3314 5.7996 .0160 24.6915 KOREAN/BELONG.-.1231 .0702 3.0737 .0796 .8842 CRENSHAW .2197 .5752 .1459 .7025 1.2457 ELA -1.2143 .8942 1.8441 .1745 .2969 MONTEREY PARK .5827 .5824 1.0010 .3171 1.7908 WESTSIDE .1334 .5405 .0609 .8051 1.1427 PICO UNION -.5566 .8220 .4586 .4983 .5731
57.
58. Results Curvilinear relationship between trust and weighted average group activity Sparser populated states generate more active clubs Adjusted R 2 =.21 .012 -2.637 -2.634 .000 -.0007 % Answered Yes “Most people can be trusted” squared .028 2.292 2.277 .023 0.05 % Answered Yes “Most people can be trusted” .065 -1.905 -.315 .000 -0.0003 Population density Beta Std. Error B Sig. t Standardized Coefficients Unstandardized Coefficients