On Predicting Social Unrest Using Social Media

Total Page:16

File Type:pdf, Size:1020Kb

On Predicting Social Unrest Using Social Media 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) On Predicting Social Unrest Using Social Media Rostyslav Korolov∗, Di Luy, Jingjing Wangz, Guangyu Zhouz, Claire Bonialx, Clare Vossx, Lance Kaplanx, William Wallace∗, Jiawei Hanz and Heng Jiy ∗Department of Industrial and Systems Engineering, Rensselaer Polytechnic Institute fkorolr, [email protected] yDepartment of Computer Science Rensselaer Polytechnic Institute flud2, [email protected] zDepartment of Computer Science, University of Illinois at Urbana-Champaign fjwang112, gzhou6, [email protected] xU.S. Army Research Laboratory fclaire.n.bonial.civ, clare.r.voss.civ, [email protected] Abstract—We study the possibility of predicting a social This paper provides a more detailed review of related protest (planned, or unplanned) based on social media messaging. research in both social science and data analysis followed by a We consider the process called mobilization, described in the discussion of the theoretical foundations of our methodology literature as the precursor of participation. Mobilization includes and then a description of our empirical testing of the pertinent four stages: being sympathetic to the cause, being aware of the theoretical constructs. We conclude by reporting results and movement, motivation to take part and ability to participate. setting forth directions for future work. We suggest that expressions of mobilization in communications of individuals may be used to predict the approaching protest. We have utilized several Natural Language Processing techniques A. Related Work to create a methodology to identify mobilization in social media communication. This study is related to three research areas: social and political science on antecedents of protest behavior, research Results of experimentation with Twitter data collected before concerning forecasting events and behaviors using social media and during the 2015 Baltimore events and the information data, extracting information from social media. on actual protests taken from news media show a correlation over time between volume of Twitter communications related to There is an abundance of research on protest in the fields of mobilization and occurrences of protest at certain geographical social and political sciences, using various approaches to the locations. We conclude with discussion of possible theoretical subject. Studies have been done at the macro level: looking explanations and practical applications of these results. at the influence of the political and economic situation in general on protest moods [1] and viewing protests as organized I. INTRODUCTION social movements [6]. From the perspective of an individual, scholarly research has been concerned with recruitment and Human society has a long history of social protests in var- activism [7], [8] and factors and cognitive processes affecting ious forms [1]. The use of digital communications including individual participation in protests [9], [10], [11]. Such factors social media has become a salient feature of protests in recent have also been used for modeling protest participation, e.g. in years. Scholars have established the link between individual’s [9], [10], [12], and in a recent study combining social science social media use and political involvement [2]. For example, with computational simulation of dynamics of participants scholarly studies have considered the role of social media [13]. Recent reviews of literature concerning individual protest in recruitment for protest [3], dissemination of situational participation can be found in [9], [10]. information during protest [4], [5] and relation between social media use and activism [2]. If digital communications can be Since the online social media gained their worldwide pop- used to facilitate the social protest, then can it be possible to ularity, a wide stream of research has emerged on extraction use these communications to predict the protest as well? This and structuring of the available information [14]. Among the study provides a positive answer to this question. various social media websites, Twitter is especially popular among scholars due to the availability of large numbers of data We hypothesize that there is a relationship between the that can be collected while the event is unfolding - a naturally volume of particular types of social media communications and occurring experiment. Approaches to extracting information actual occurrences of protests. The challenge in this approach from Twitter are described, for example, in [15] and [16]. lies in identifying the relevant messages in a very large stream Scholarly works taking advantage of these technologies have of social media. To tackle this challenge we developed a been concerned with public response to extreme events [17], methodology that intergrates research findings from the social [18], [19], modeling human behavior [20], [21], [22], and and political sciences with recent advances in natural language forecasting actions [21], [22], attitudes [23] or even election processing and information extraction. We have applied this results [24]. methodology to the Twitter data gathered before and during 2015 Baltimore protests and found empirical support for our Research on the role of social media in protests has hypothesis. emerged after the Arab Spring, when its contribution to the IEEE/ACM ASONAM 2016, August 18-21, 2016, San Francisco, CA, USA 978-1-5090-2846-7/16/$31.00 c 2016 IEEE 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) emergence of revolutions in Arab countries became apparent. As mobilization must precede protest participation, being Studies were undertaken on the role of social media in rev- able to identify individuals at different stages and to quanti- olutions [4], [25], information dissemination during protests tatively measure the progress of mobilization enables one to [2], [5], and activism and support of social movements [3], make inferences about the upcoming protest. [23], [26]. Despite the general abundance of research concerning B. Mobilization in Social Media social media and protest, studies focused on the prediction of a In order to utilize social media data we need a method protest using data from social media are scarce. In one of these to detect and measure mobilization. Assuming we can label papers [27], the authors compare the prediction of a protest individual messages according to mobilization stages (or lack with the prediction of election results. A study described in thereof), what do we expect to observe? [28] presents a solution, relying on the constructed vocabulary. Recent research [29] addresses the problem using influence Typically, research on social phenomena, such as protest, cascades as a predictor of protest. This study, however, also employs surveys conducted after the fact. While it has been relies on a constructed vocabulary. Authors of [30] exploit found that mobilization precedes individual participation in a previous activity of a social media user to predict whether protest [11], we do not know, based upon empirical research, her next message will be related to protest. The relationship how mobilization develops over time in order to result in a between social media activity and protests during the Arab protest. Spring was established in [31], using hashtags to filter relevant Consider a closed community, in which all individuals ini- messages. Our approach also uses geographical and topical tially sympathetic to the cause of a potential protest are known. grouping of messages and our results confirm main finding of As individuals are mobilizing, we would expect to observe these studies, which is that social media activity can be used a growing number of people at later stages of mobilization to forecast a protest. The notable difference in our approach, compared to those who don’t progress beyond sympathy. This which we consider our main contribution, is that we ground consideration, however, is not relevant in social media because our method of finding relevant messages on social science [9], we can only identify an individual’s mobilization status if [11], thus linking observations based on the data to underlying this individual voluntarily chooses to communicate it. Thus, social and cognitive processes. unlike the post-hoc survey study, for a longitudinal study using social media data it is unreasonable to assume a static set of II. THEORETICAL CONSIDERATIONS initial sympathizers (recruitment pool) for two reasons. First, different users may be vocal at each observation, and second, A. Introduction to Mobilization new sympathizers may emerge as a result of increased social Social science literature [9], [11] defines action mobiliza- media activity. This is due to the fact that communications are tion, which we refer to simply as ‘mobilization’ throughout not targeted just at sympathizers, but also at those who are this paper, as a four-stage cognitive process resulting in an neutral towards the issue (e.g. due to being unaware of it). In individual’s decision to participate in a collective action, such [21], [22] it has been shown that social media activity may as to protest. These stages are as follows. contribute to spreading of the behavior even among those who do not communicate about it, a phenomenon that we have no Sympathy to the cause reason to rule out in our case. Every potential protest has a cause - the reason why it happens, which normally emerges
Recommended publications
  • The Textiles of the Han Dynasty & Their Relationship with Society
    The Textiles of the Han Dynasty & Their Relationship with Society Heather Langford Theses submitted for the degree of Master of Arts Faculty of Humanities and Social Sciences Centre of Asian Studies University of Adelaide May 2009 ii Dissertation submitted in partial fulfilment of the research requirements for the degree of Master of Arts Centre of Asian Studies School of Humanities and Social Sciences Adelaide University 2009 iii Table of Contents 1. Introduction.........................................................................................1 1.1. Literature Review..............................................................................13 1.2. Chapter summary ..............................................................................17 1.3. Conclusion ........................................................................................19 2. Background .......................................................................................20 2.1. Pre Han History.................................................................................20 2.2. Qin Dynasty ......................................................................................24 2.3. The Han Dynasty...............................................................................25 2.3.1. Trade with the West............................................................................. 30 2.4. Conclusion ........................................................................................32 3. Textiles and Technology....................................................................33
    [Show full text]
  • Archaeological Observation on the Exploration of Chu Capitals
    Archaeological Observation on the Exploration of Chu Capitals Wang Hongxing Key words: Chu Capitals Danyang Ying Chenying Shouying According to accurate historical documents, the capi- In view of the recent research on the civilization pro- tals of Chu State include Danyang 丹阳 of the early stage, cess of the middle reach of Yangtze River, we may infer Ying 郢 of the middle stage and Chenying 陈郢 and that Danyang ought to be a central settlement among a Shouying 寿郢 of the late stage. Archaeologically group of settlements not far away from Jingshan 荆山 speaking, Chenying and Shouying are traceable while with rice as the main crop. No matter whether there are the locations of Danyang and Yingdu 郢都 are still any remains of fosses around the central settlement, its oblivious and scholars differ on this issue. Since Chu area must be larger than ordinary sites and be of higher capitals are the political, economical and cultural cen- scale and have public amenities such as large buildings ters of Chu State, the research on Chu capitals directly or altars. The site ought to have definite functional sec- affects further study of Chu culture. tions and the cemetery ought to be divided into that of Based on previous research, I intend to summarize the aristocracy and the plebeians. The relevant docu- the exploration of Danyang, Yingdu and Shouying in ments and the unearthed inscriptions on tortoise shells recent years, review the insufficiency of the former re- from Zhouyuan 周原 saying “the viscount of Chu search and current methods and advance some personal (actually the ruler of Chu) came to inform” indicate that opinion on the locations of Chu capitals and later explo- Zhou had frequent contact and exchange with Chu.
    [Show full text]
  • Shuk Han CHENG (Ne Shuk Han CHUNG) Education 85-90 Phd / RA
    1 page cv April 2011 Shuk Han CHENG (neé Shuk Han CHUNG) Education 85-90 PhD / RA (Department of Bacteriology, Royal Postgraduate Medical School, University of London) 80-83 BSc (Department of Zoology, University of Hong Kong) Employment 10-date Professor, Department of Biology & Chemistry, City University of Hong Kong 01-10 Associate Professor, Department of Biology & Chemistry, City University of Hong Kong 00-01 Assistant Professor, Department of Biology & Chemistry, City University of Hong Kong 97-00 Research Assistant Professor, Department of Biology & Chemistry, City University of Hong Kong 93-97 Lecturer/Scientific Officer, Depts of Paediatrics and Orthopaedics, Chinese University of Hong Kong 90-93 Postdoctoral Fellow in Tak Mak’s lab, Ontario cancer Institute, University of Toronto Research Interest: developmental and regenerative biology, nanobiological interface, nanomedicine Publications Records: 75 papers in SCI journals, 2 book chapters & 10 referred conference proceedings (full list available upon request), 1 patent awarded and 8 patents filed Five most representative publications in recent 5 years: * denotes corresponding authorship 1. Cheng J., * Cheng S.H. (2011) Poly(ethylene glycol) conjugated multi-walled carbon nanotubes as an efficient drug carrier for overcoming multi-drug resistance. Toxicology and Applied Pharmacology 250:184-93. 2. Cheng J., Chan CM, Veca LM, Poon W.L., Chan P.K., Qu L, *Sun Y.-P., *Cheng S.H. (2009). Acute and long-term effects after single loading of functionalized multi-walled carbon nanotubes into zebrafish (Danio rerio) Toxicology & Applied Pharmacology 235:216-225. 3. Gu Y.-J., Cheng J., Lin A.C.-C., Lam Y.W., *Cheng S.H., *Wong W.-T.
    [Show full text]
  • Southeast Asia
    SOUTHEAST ASIA Shang Dynasty Zhou Dynasty ● Time of emergence: 1766 BC ● Time of emergence: 1046-256 BCE ● Time they were at their peak:1350 BC ● Divided into 2 different periods (Western Zhou: ● Time they were around: 1766-1122 BC 1046-771 BCE)(Eastern Zhou: 770-256 BCE) ● Time of fall: 1122 BC ● They were around for 8 centuries (800+ years) ● Time of fall: 256 BCE GEOGRAPHIC IMPACT ON SOCIETY Shang Dynasty Zhou Dynasty The Shang Dynasty controlled the North China Plain, which ● They were located west of Shang Dynasty however after corresponds to the modern day Chinese provinces of Anhui, Hebei, conquering Shang Dynasty, their borders extended as far Henan, Shandong, and Shanxi. The area that those of the Shang south as chang Jiang river and east to the Yellow sea. Dynasty lived in, under the Yellow River Valley, gave them water as These body of waters provided fertile soil for good farming well as fertile soil which helped their civilization thrive. Natural borders, and their trading increased. ● Present day location: Xi’an in Shaanxi near the Wei river such as mountains, also protected the area, making it easier to protect. and confluence of the Yellow river The Yellow River also made it easy for the people that lived there to ● They were not geographically isolated from other obtain a steady supply of water. civilizations ● They were exposed to large bodies of water POLITICAL SYSTEM AND IMPACT ON SOCIETY government Shang Dynasty Zhou Dynasty The Shang Dynasty was ruled by a ● The Zhou Dynasty ruled with a confucian social hierarchy hereditary monarchy, in which the ● The citizens were expected to follow the rules and values of confucianism government wa controlled by the king Organization: mainly, and the line of rule descended ● Had the “mandate of heaven” through the family.
    [Show full text]
  • Technological Surveillance and the Spatial Struggle of Black Lives Matter Protests
    No Privacy, No Peace? Technological Surveillance and the Spatial Struggle of Black Lives Matter Protests Research Thesis Presented in partial fulfillment of the requirements for graduation with research distinction in the undergraduate colleges of The Ohio State University by Eyako Heh The Ohio State University April 2021 Project Advisor: Professor Joel Wainwright, Department of Geography I Abstract This paper investigates the relationship between technological surveillance and the production of space. In particular, I focus on the surveillance tools and techniques deployed at Black Lives Matter protests and argue that their implementation engenders uneven outcomes concerning mobility, space, and power. To illustrate, I investigate three specific forms and formats of technological surveillance: cell-site simulators, aerial surveillance technology, and social media monitoring tools. These tools and techniques allow police forces to transcend the spatial-temporal bounds of protests, facilitating the arrests and subsequent punishment of targeted dissidents before, during, and after physical demonstrations. Moreover, I argue that their unequal use exacerbates the social precarity experienced by the participants of demonstrations as well as the racial criminalization inherent in the policing of majority Black and Brown gatherings. Through these technological mediums, law enforcement agents are able to shape the physical and ideological dimensions of Black Lives Matter protests. I rely on interdisciplinary scholarly inquiry and the on- the-ground experiences of Black Lives Matter protestors in order to support these claims. In aggregate, I refer to this geographic phenomenon as the spatial struggle of protests. II Acknowledgements I extend my sincerest gratitude to my advisor and former professor, Joel Wainwright. Without your guidance and critical feedback, this thesis would not have been possible.
    [Show full text]
  • Boya Genuine] the Sweet Kitchen Mu Han(Chinese Edition
    FANLB1OIFM « Boya Genuine] the sweet kitchen Mu Han(Chinese Edition) < eBook Boya Genuine] th e sweet kitch en Mu Han(Ch inese Edition) By MU HAN ZHU To get Boya Genuine] the sweet kitchen Mu Han(Chinese Edition) eBook, remember to follow the hyperlink listed below and save the ebook or gain access to other information that are related to BOYA GENUINE] THE SWEET KITCHEN MU HAN(CHINESE EDITION) book. Our services was released using a aspire to serve as a comprehensive on the internet digital local library that oers entry to large number of PDF file document selection. You might find many dierent types of e-book as well as other literatures from the files data bank. Certain preferred subject areas that distribute on our catalog are popular books, solution key, exam test question and solution, guideline example, exercise guideline, quiz trial, user manual, consumer guide, services instruction, maintenance guide, and many others. READ ONLINE [ 1.91 MB ] Reviews This book is definitely worth buying. This really is for all who statte there had not been a worthy of studying. You will not sense monotony at at any moment of the time (that's what catalogs are for concerning should you check with me). -- Mr. Martin Baumbach Completely essential study ebook. This is for all those who statte there was not a well worth reading. I realized this book from my dad and i recommended this publication to find out. -- Jarrell Kovacek YMKF4KJGXL < Boya Genuine] the sweet kitchen Mu Han(Chinese Edition) ^ Book Oth er Books Friendfluence: The Surprising Ways Friends Make Us Who We Are [PDF] Access the link under to read "Friendfluence: The Surprising Ways Friends Make Us Who We Are" PDF document.
    [Show full text]
  • The Analects of Confucius
    The analecTs of confucius An Online Teaching Translation 2015 (Version 2.21) R. Eno © 2003, 2012, 2015 Robert Eno This online translation is made freely available for use in not for profit educational settings and for personal use. For other purposes, apart from fair use, copyright is not waived. Open access to this translation is provided, without charge, at http://hdl.handle.net/2022/23420 Also available as open access translations of the Four Books Mencius: An Online Teaching Translation http://hdl.handle.net/2022/23421 Mencius: Translation, Notes, and Commentary http://hdl.handle.net/2022/23423 The Great Learning and The Doctrine of the Mean: An Online Teaching Translation http://hdl.handle.net/2022/23422 The Great Learning and The Doctrine of the Mean: Translation, Notes, and Commentary http://hdl.handle.net/2022/23424 CONTENTS INTRODUCTION i MAPS x BOOK I 1 BOOK II 5 BOOK III 9 BOOK IV 14 BOOK V 18 BOOK VI 24 BOOK VII 30 BOOK VIII 36 BOOK IX 40 BOOK X 46 BOOK XI 52 BOOK XII 59 BOOK XIII 66 BOOK XIV 73 BOOK XV 82 BOOK XVI 89 BOOK XVII 94 BOOK XVIII 100 BOOK XIX 104 BOOK XX 109 Appendix 1: Major Disciples 112 Appendix 2: Glossary 116 Appendix 3: Analysis of Book VIII 122 Appendix 4: Manuscript Evidence 131 About the title page The title page illustration reproduces a leaf from a medieval hand copy of the Analects, dated 890 CE, recovered from an archaeological dig at Dunhuang, in the Western desert regions of China. The manuscript has been determined to be a school boy’s hand copy, complete with errors, and it reproduces not only the text (which appears in large characters), but also an early commentary (small, double-column characters).
    [Show full text]
  • China's Fear of Contagion
    China’s Fear of Contagion China’s Fear of M.E. Sarotte Contagion Tiananmen Square and the Power of the European Example For the leaders of the Chinese Communist Party (CCP), erasing the memory of the June 4, 1989, Tiananmen Square massacre remains a full-time job. The party aggressively monitors and restricts media and internet commentary about the event. As Sinologist Jean-Philippe Béja has put it, during the last two decades it has not been possible “even so much as to mention the conjoined Chinese characters for 6 and 4” in web searches, so dissident postings refer instead to the imagi- nary date of May 35.1 Party censors make it “inconceivable for scholars to ac- cess Chinese archival sources” on Tiananmen, according to historian Chen Jian, and do not permit schoolchildren to study the topic; 1989 remains a “‘for- bidden zone’ in the press, scholarship, and classroom teaching.”2 The party still detains some of those who took part in the protest and does not allow oth- ers to leave the country.3 And every June 4, the CCP seeks to prevent any form of remembrance with detentions and a show of force by the pervasive Chinese security apparatus. The result, according to expert Perry Link, is that in to- M.E. Sarotte, the author of 1989: The Struggle to Create Post–Cold War Europe, is Professor of History and of International Relations at the University of Southern California. The author wishes to thank Harvard University’s Center for European Studies, the Humboldt Foundation, the Institute for Advanced Study, the National Endowment for the Humanities, and the University of Southern California for ªnancial and institutional support; Joseph Torigian for invaluable criticism, research assistance, and Chinese translation; Qian Qichen for a conversation on PRC-U.S.
    [Show full text]
  • Proof of Investors' Binding Borrowing Constraint Appendix 2: System Of
    Appendix 1: Proof of Investors’ Binding Borrowing Constraint PROOF: Use the Kuhn-Tucker condition to check whether the collateral constraint is binding. We have h I RI I mt[mt pt ht + ht − bt ] = 0 If (11) is not binding, then mt = 0: We can write the investor’s FOC Equation (18) as: I I I I h I I I I i Ut;cI ct ;ht ;nt = bIEt (1 + it)Ut+1;cI ct+1;ht+1;nt+1 (42) At steady state, we have bI (1 + i) = 1 However from (6); we know bR (1 + i) = 1 at steady state. With parameter restrictions that bR > bI; therefore bI (1 + i) < 1; contradiction. Therefore we cannot have mt = 0: Therefore, mt > 0; and I h I RI thus we have bt = mt pt ht + ht : Q.E.D. Appendix 2: System of Steady-State Conditions This appendix lays out the system of equilibrium conditions in steady state. Y cR + prhR = + idR (43) N R R R r R R R UhR c ;h = pt UcR c ;h (44) R R R R R R UnR c ;h = −WUcR c ;h (45) 1 = bR(1 + i) (46) Y cI + phd hI + hRI + ibI = + I + prhRI (47) t N I I I h I I I h [1 − bI (1 − d)]UcI c ;h p = UhI c ;h + mmp (48) I I I h I I I r h [1 − bI (1 − d)]UcI c ;h p = UcI c ;h p + mmp (49) I I I [1 − bI (1 + i)]UcI c ;h = m (50) bI = mphhI (51) 26 ©International Monetary Fund.
    [Show full text]
  • Achieving High Coverage for Floating-Point Code Via Unconstrained Programming
    Achieving High Coverage for Floating-Point Code via Unconstrained Programming Zhoulai Fu Zhendong Su University of California, Davis, USA [email protected] [email protected] Abstract have driven the research community to develop a spectrum Achieving high code coverage is essential in testing, which of automated testing techniques for achieving high code gives us confidence in code quality. Testing floating-point coverage. code usually requires painstaking efforts in handling floating- A significant challenge in coverage-based testing lies in point constraints, e.g., in symbolic execution. This paper turns the testing of numerical code, e.g., programs with floating- the challenge of testing floating-point code into the oppor- point arithmetic, non-linear variable relations, or external tunity of applying unconstrained programming — the math- function calls, such as logarithmic and trigonometric func- ematical solution for calculating function minimum points tions. Existing solutions include random testing [14, 23], over the entire search space. Our core insight is to derive a symbolic execution [17, 24], and various search-based strate- representing function from the floating-point program, any of gies [12, 25, 28, 31], which have found their way into many whose minimum points is a test input guaranteed to exercise mature implementations [16, 39]. Random testing is easy to a new branch of the tested program. This guarantee allows employ and fast, but ineffective in finding deep semantic is- us to achieve high coverage of the floating-point program by sues and handling large input spaces; symbolic execution and repeatedly minimizing the representing function. its variants can perform systematic path exploration, but suf- We have realized this approach in a tool called CoverMe fer from path explosion and are weak in dealing with complex and conducted an extensive evaluation of it on Sun’s C math program logic involving numerical constraints.
    [Show full text]
  • (And Misreading) the Draft Constitution in China, 1954
    Textual Anxiety Reading (and Misreading) the Draft Constitution in China, 1954 ✣ Neil J. Diamant and Feng Xiaocai In 1927, Mao Zedong famously wrote that a revolution is “not the same as inviting people to dinner” and is instead “an act of violence whereby one class overthrows the authority of another.” From the establishment of the People’s Republic of China (PRC) in 1949 until Mao’s death in 1976, his revolutionary vision became woven into the fabric of everyday life, but few years were as violent as the early 1950s.1 Rushing to consolidate power after finally defeating the Nationalist Party (Kuomintang, or KMT) in a decades- long power struggle, the Chinese Communist Party (CCP) threatened the lives and livelihood of millions. During the Land Reform Campaign (1948– 1953), landowners, “local tyrants,” and wealthier villagers were targeted for repression. In the Campaign to Suppress Counterrevolutionaries in 1951, the CCP attacked former KMT activists, secret society and gang members, and various “enemy agents.”2 That same year, university faculty and secondary school teachers were forced into “thought reform” meetings, and businessmen were harshly investigated during the “Five Antis” Campaign in 1952.3 1. See Mao’s “Report of an Investigation into the Peasant Movement in Hunan,” in Stuart Schram, ed., The Political Thought of Mao Tse-tung (New York: Praeger, 1969), pp. 252–253. Although the Cultural Revolution (1966–1976) was extremely violent, the death toll, estimated at roughly 1.5 million, paled in comparison to that of the early 1950s. The nearest competitor is 1958–1959, during the Great Leap Forward.
    [Show full text]
  • The Later Han Empire (25-220CE) & Its Northwestern Frontier
    University of Pennsylvania ScholarlyCommons Publicly Accessible Penn Dissertations 2012 Dynamics of Disintegration: The Later Han Empire (25-220CE) & Its Northwestern Frontier Wai Kit Wicky Tse University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/edissertations Part of the Asian History Commons, Asian Studies Commons, and the Military History Commons Recommended Citation Tse, Wai Kit Wicky, "Dynamics of Disintegration: The Later Han Empire (25-220CE) & Its Northwestern Frontier" (2012). Publicly Accessible Penn Dissertations. 589. https://repository.upenn.edu/edissertations/589 This paper is posted at ScholarlyCommons. https://repository.upenn.edu/edissertations/589 For more information, please contact [email protected]. Dynamics of Disintegration: The Later Han Empire (25-220CE) & Its Northwestern Frontier Abstract As a frontier region of the Qin-Han (221BCE-220CE) empire, the northwest was a new territory to the Chinese realm. Until the Later Han (25-220CE) times, some portions of the northwestern region had only been part of imperial soil for one hundred years. Its coalescence into the Chinese empire was a product of long-term expansion and conquest, which arguably defined the egionr 's military nature. Furthermore, in the harsh natural environment of the region, only tough people could survive, and unsurprisingly, the region fostered vigorous warriors. Mixed culture and multi-ethnicity featured prominently in this highly militarized frontier society, which contrasted sharply with the imperial center that promoted unified cultural values and stood in the way of a greater degree of transregional integration. As this project shows, it was the northwesterners who went through a process of political peripheralization during the Later Han times played a harbinger role of the disintegration of the empire and eventually led to the breakdown of the early imperial system in Chinese history.
    [Show full text]