Identity-based subgroups and information exchange in adversarial policy networks

نویسندگان

چکیده

Abstract While information exchange is essential in the policy process, little known about how divergent subgroups filter actors’ technical and political exchange, blocking learning processes. Guided by social identity, group entitativity, self-categorisation theories, we introduce concept measurement of identity-based referring to informal clusters shaped self-referent perception similarities among actors. The subgroup recognised as a precursor for coalition building subsystem but received inadequate attention research on Advocacy Coalition Framework. We examine moderate links between relational embeddedness technical/political exchanges an adversarial fracking network New York. Our quadratic assignment procedure multiple regression indicated that, despite trust, actors from different are less likely share network. When two different, competition more associated with lower These findings extend subsystems.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Information Exchange in Policy Networks

Information exchange in policy networks is usually attributed to preference similarity, influence reputation, social trust and institutional actor roles. We suggest that political opportunity structures and transaction costs play another crucial role and estimate a rich statistical network model on tie formation in the German toxic chemicals policy domain. The results indicate that the effect o...

متن کامل

Coverless Information Hiding Based on Generative adversarial networks

Traditional image steganography modifies the content of the image more or less, it is hard to resist the detection of image steganalysis tools. To address this problem, a novel method named generative coverless information hiding method based on generative adversarial networks is proposed in this paper. The main idea of the method is that the class label of generative adversarial networks is re...

متن کامل

Identity-based Key Exchange Protocols for Ad Hoc Networks

In this work we present a set of authentication and key exchange protocols that use identity-based pre-shared keys from pairings. We show that those protocols are attractive for an implementation in ad hoc networks. We start with introducing a light-weight protocol that uses purely symmetric crypto primitives. We then gradually add more security features. We analyze the security and performance...

متن کامل

Generate Identity-Preserving Faces by Generative Adversarial Networks

Generating identity-preserving faces aims to generate various face images keeping the same identity given a target face image. Although considerable generative models have been developed in recent years, it is still challenging to simultaneously acquire high quality of facial images and preserve the identity. Here we propose a compelling method using generative adversarial networks (GAN). Concr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Public Policy

سال: 2022

ISSN: ['0143-814X', '1469-7815']

DOI: https://doi.org/10.1017/s0143814x22000228