American Sociological Association

Search

Search

The search found 97 results in 0.024 seconds.

Search results

  1. A Haunted Generation Remembers

    Second-generation Sikhs grew up with fragments and half-told stories of the anti-Sikh violence of 1984, but it is not just direct descendants of survivors who “remember” traumatic experiences. Sikhs’ collectivist orientation, cultural traditions and diasporic location offer new insights into understanding intergenerational trauma and memory work.
  2. Text Analysis with JSTOR Archives

    I provide a visual representation of keyword trends and authorship for two flagship sociology journals using data from JSTOR’s Data for Research repository. While text data have accompanied the digital spread of information, it remains inaccessible to researchers unfamiliar with the required preprocessing. The visualization and accompanying code encourage widespread use of this source of data in the social sciences.

  3. Leader Messaging and Attitudes toward Sexual Violence

    Research exploring sexual assault within universities and sexual harassment within companies has largely overlooked how leadership in organizations can shape constituents’ perceptions of sexual violence. This question has become particularly relevant as organizations are increasingly tasked with measuring and communicating about sexual violence. We use two national survey experiments to test how altering an organization’s communication of information about sexual assault or harassment affects participants’ agreement that it is a high-priority issue.

  4. The Social Sources of Geopolitical Power: French and British Diplomacy and the Politics of Interstate Recognition, 1689 to 1789

    Why did France influence the geopolitical system of eighteenth-century Europe more effectively than did Britain? Explanations pointing to states’ military and economic power are unable to explain this outcome. I argue that durable geopolitical influence depends on states’ symbolic capacities to secure recognition from competitor states, in addition to their coercive and economic capacities. And I show that states are liable to secure recognition to the extent that their agents embody social dispositions congruent with those of competitor agents.
  5. Featured Essay: Lost and Saved . . . Again: The Moral Panic about the Loss of Community Takes Hold of Social Media

    Why does every generation believe that relationships were stronger and community better in the recent past? Lamenting about the loss of community, based on a selective perception of the present and an idealization of ‘‘traditional community,’’ dims awareness of powerful inequalities and cleavages that have always pervaded human society and favors deterministic models over a nuanced understanding of how network affordances contribute to different outcomes. Taylor Dotson’s (2017) recent book proposes a broader timeline for the demise of community.
  6. Does Violent Protest Backfire? Testing a Theory of Public Reactions to Activist Violence

    How do people respond to violent political protest? The authors present a theory proposing that the use of violence leads the general public to view a protest group as less reasonable, a perception that reduces identification with the group. This reduced identification in turn reduces public support for the violent group. Furthermore, the authors argue that violence also leads to more support for groups that are perceived as opposing the violent group. The authors test this theory using a large (n = 800) Internet-based survey experiment with a politically diverse sample.

  7. Ideal Victims and Monstrous Offenders: How the News Media Represent Sexual Predators

    Drawing on content analysis of 323 Los Angeles Times articles published between 1990 and 2015, this article examines how news reports represent sexual predator victims and offenders in order to examine how such narratives construct images of the sexual predatory. Results demonstrate that representations of the sexually predatory are aged and gendered: stories about child victims encompass more sexual violence, graphic descriptions of that violence, more male victims, and older offenders.

  8. The Role of Social Media in Collective Processes of Place Making: A Study of Two Neighborhood Blogs in Amsterdam

    The wide use of social media has facilitated new social practices that influence place meaning. This paper uses a double case study of two neighborhood blogs in gentrifying communities, to explore the role of social media in sharing place associations and community formation. Drawing on Collins’ theory of interaction ritual chains, this research project investigates how the intertwining of online and offline interaction around the blogs creates interaction chains whereby the place associations of participants in the blog become more aligned, creating an alternative place narrative.

  9. More Coffee, Less Crime? The Relationship between Gentrification and Neighborhood Crime Rates in Chicago, 1991 to 2005

    This study examines the relationship between gentrification and neighborhood crime rates by measuring the growth and geographic spread of one of gentrification's most prominent symbols: coffee shops. The annual counts of neighborhood coffee shops provide an on‐the‐ground measure of a particular form of economic development and changing consumption patterns that tap into central theoretical frames within the gentrification literature.

  10. Testing for Discrimination: Teaching Audit Studies in Quantitative Methods Courses

    This article demonstrates a method for teaching students to conduct audit studies of discrimination. The assignment can be used in courses on quantitative methods, race, gender, or other topics. Audit studies test for unequal treatment by having otherwise identical pairs of people who vary on a single trait, such as race or gender, apply for the same sets of opportunities, such as apartment vacancies or job openings. Once intricate and expensive to conduct, the online shift of the past 15 years has streamlined the approach, enabling researchers to execute audits via email.