American Sociological Association

Search

Search

The search found 126 results in 0.021 seconds.

Search results

  1. Review Essay: The Digital Surveillance Society

    When hundreds of thousands of protesters filled the streets of Hong Kong this summer, central figures reportedly took no selfies, avoided Facebook and Twitter, installed prepaid SIM cards, stuck to secure messaging apps, and used cash instead of rechargeable subway cards or other cashless payments. It is not clear whether this will help them avoid “conspiracy to commit public nuisance” charges, which led to prison sentences for leaders of the 2014 Umbrella movement (including sociologist Kin-man Chan).
  2. “Progress and Perfectability”: Urban Policy, Model Cities, and Community Control in the Shadow of Newark

    Positioning itself against arguments that claim that the Model Cities program (initially known as the 1966 Demonstration Cities and Metropolitan Development Act) was either an unmitigated failure, an attempt to co‐opt activists, or an effort to introduce the “carceral state” nationwide, this paper examines the implementation of Model Cities in a historically integrated suburb and argues that while the program was assuredly only a “limited success,” it did provide both funding and social space in which residents could forge intergenerational and cross‐racial alliances, as well as launch chal

  3. Featured Essay: Preventing Violence: Insights from Micro-Sociology

    Micro-sociology of violence looks at what happens in situations where people directly threaten violence, but only sometimes carry it out. This process and its turning points have become easier to see in the current era of visual data: cell-phone videos, long-distance telephoto lenses, CCTV cameras. New cues and instruments are on the horizon as we look at emotional signals, body rhythms, and monitors for body signs such as heart rate (a proxy for adrenaline level).
  4. CASM: A Deep-Learning Approach for Identifying Collective Action Events with Text and Image Data from Social Media

    Protest event analysis is an important method for the study of collective action and social movements and typically draws on traditional media reports as the data source. We introduce collective action from social media (CASM)—a system that uses convolutional neural networks on image data and recurrent neural networks with long short-term memory on text data in a two-stage classifier to identify social media posts about offline collective action. We implement CASM on Chinese social media data and identify more than 100,000 collective action events from 2010 to 2017 (CASM-China).
  5. Organizational Construction and Interdisciplinary Identity in a New Health Care Organization

    The authors examine the organizational construction of an interdisciplinary brain care center via ethnographic observation of vision and mission-building meetings and semistructured interviews with organizational leaders.

  6. Collective Social Identity: Synthesizing Identity Theory and Social Identity Theory Using Digital Data

    Identity theory (IT) and social identity theory (SIT) are eminent research programs from sociology and psychology, respectively. We test collective identity as a point of convergence between the two programs. Collective identity is a subtheory of SIT that pertains to activist identification. Collective identity maps closely onto identity theory’s group/social identity, which refers to identification with socially situated identity categories. We propose conceptualizing collective identity as a type of group/social identity, integrating activist collectives into the identity theory model.
  7. Public Concern about Terrorism: Fear, Worry, and Support for Anti-Muslim Policies

    In the era of 9/11, terrorist attacks occur with sufficient frequency and lethality to constitute a realistic threat to the well-being of the American public. Sensing this concern, politicians emphasize the threat of violent attacks to advance a platform of making public safety a priority. In this context, the authors assess the extent, sources, and emotional impact of the public’s concern about terrorism. On the basis of a national survey of 1,000 Americans, the authors examine levels of fear of a terrorist attack and worry about terrorism relative to other potential harms.

  8. Abandoning Medical Authority: When Medical Professionals Confront Stigmatized Adolescent Sex and the Human Papillomavirus (HPV) Vaccine

    Despite authority’s centrality to the medical profession, providers routinely forgo their medical authority during clinical encounters. Research focuses on patients challenging medical authority but indicates these confrontations are uncommon and providers seldom relinquish their authority in response. Using rare data of 75 audio recordings of adolescent vaccine discussions during clinical encounters and interviews with and observations of medical staff, I examine how staff leverage or abandon their medical authority to convince parents to vaccinate.

  9. Patients’ Conceptualizations of Responsibility for Healthcare: A Typology for Understanding Differing Attributions in the Context of Patient Safety

    This study examines how patients conceptualize “responsibility” for their healthcare and make sense of the complex boundaries between patient and professional roles. Focusing on the specific case of patient safety, narrative methods were used to analyze semistructured interviews with 28 people recently discharged from hospital in England. We present a typology of attribution, which demonstrates that patients’ attributions of responsibility to staff and/or to patients are informed by two dimensions of responsibility: basis and contingency.

  10. Trouble in Tech Paradise

    The structures of the tech industry, with its dependence on highly skilled immigrant workers, and the H-1B visa, with its dependence on sponsoring companies, bind tech workers in a cycle of legal violence.