917 resultados para social network sites


Relevância:

100.00% 100.00%

Publicador:

Resumo:

It is of course recognised that technology can be gendered and implicated in gender relations. However, it continues to be the case that men’s experiences with technology are underexplored and the situation is even more problematic where digital media is concerned. Over the past 30 years we have witnessed a dramatic rise in the pervasiveness of digital media across many parts of the world and as associated with wide ranging aspects of our lives. This rise has been fuelled over the last decade by the emergence of Web 2.0 and particularly Social Networking Sites (SNS). Given this context, I believe it is necessary for us to undertake more work to understand men’s engagements with digital media, the implications this might have for masculinities and the analysis of gender relations more generally. To begin to unpack this area, I engage theorizations of the properties of digital media networks and integrate this with the masculinity studies field. Using this framework, I suggest we need to consider the rise in what I call networked masculinities – those masculinities (co)produced and reproduced with digitally networked publics. Through this analysis I discuss themes related to digital mediators, relationships, play and leisure, work and commerce, and ethics. I conclude that as masculinities can be, and are being, complicated and given agency by advancing notions and practices of connectivity, mobility, classification and convergence, those engaged with masculinity studies and digital media have much to contribute.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The design of applications for dynamic ridesharing or carpooling is often formulated as a matching problem of connecting people with an aligned set of transport needs within a reasonable interval of time and space. This problem formulation relegates social connections to being secondary factors. Technology assisted ridesharing applications that put the matching problem first have revealed that they suffer from being unable to address the factor of social comfort, even after adding friend features or piggybacking on social networking sites. This research aims to understand the fabric of social interactions through which ridesharing happens. We take an online observation approach in order to understand the fabric of social interactions for ridesharing that is happening in highly subscribed online groups of local residents. This understanding will help researchers to identify design challenges and opportunities to support ridesharing in local communities. This paper contributes a fundamental understanding of how social interactions and social comfort precede rideshare requests in local communities.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The progress of technology has led to the increased adoption of energy monitors among household energy consumers. While the monitors available on the market deliver real-time energy usage feedback to the consumer, the form of this data is usually unengaging and mundane. Moreover, it fails to address consumers with different motivations and needs to save and compare energy. This master‟s thesis project presents a study that seeks to inform design guidelines for differently motivated energy consumers. The focus of the research is on comparative feedback supported by a community of energy consumers. In particular, the discussed comparative feedback types are explanatory comparison, temporal self-comparison, norm comparison, one-on-one comparison and ranking, whereby the last three support exploring the potential of socialising energy-related feedback in social networking sites, such as Facebook. These feedback types were integrated in EnergyWiz – a mobile application that enables users to compare with their past performance, neighbours, contacts from social networking sites and other EnergyWiz users. The application was developed through a theory-driven approach and evaluated in personal, semi-structured interviews which provided insights on how motivation-related comparative feedback should be designed. It was also employed in expert focus group discussions which resulted in defining opportunities and challenges before mobile, social energy monitors. The findings have unequivocally shown that users with different motivations to compare and to conserve energy have different preferences for comparative feedback types and design. It was established that one of the most influential factors determining design factors is the people users compare to. In addition, the research found that even simple communication strategies in Facebook, such as wall posts and groups can contribute to engagement with energy conservation practices. The concept of mobility of the application was evaluated as positive since it provides place and time-independent access to the energy consumption data.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Social networking sites (SNSs), with their large numbers of users and large information base, seem to be perfect breeding grounds for exploiting the vulnerabilities of people, the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” While technology-based security has been addressed by research and may be well understood, social engineering is more challenging to understand and manage, especially in new environments such as SNSs, owing to some factors of SNSs that reduce the ability of users to detect the attack and increase the ability of attackers to launch it. This work will contribute to the knowledge of social engineering by presenting the first two conceptual models of social engineering attacks in SNSs. Phase-based and source-based models are presented, along with an intensive and comprehensive overview of different aspects of social engineering threats in SNSs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

While social engineering represents a real and ominous threat to many organizations, companies, governments, and individuals, social networking sites (SNSs), have been identified as among the most common means of social engineering attacks. Owing to factors that reduce the ability of users to detect social engineering tricks and increase the ability of attackers to launch them, SNSs seem to be perfect breeding ground for exploiting the vulnerabilities of people, and the weakest link in security. This work will contribute to the knowledge of social engineering by identifying different entities and subentities that affect social engineering based attacks in SNSs. Moreover, this paper includes an intensive and comprehensive overview of different aspects of social engineering threats in SNSs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Detecting anomalies in the online social network is a significant task as it assists in revealing the useful and interesting information about the user behavior on the network. This paper proposes a rule-based hybrid method using graph theory, Fuzzy clustering and Fuzzy rules for modeling user relationships inherent in online-social-network and for identifying anomalies. Fuzzy C-Means clustering is used to cluster the data and Fuzzy inference engine is used to generate rules based on the cluster behavior. The proposed method is able to achieve improved accuracy for identifying anomalies in comparison to existing methods.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Social Engineering (ES) is now considered the great security threat to people and organizations. Ever since the existence of human beings, fraudulent and deceptive people have used social engineering tricks and tactics to trick victims into obeying them. There are a number of social engineering techniques that are used in information technology to compromise security defences and attack people or organizations such as phishing, identity theft, spamming, impersonation, and spaying. Recently, researchers have suggested that social networking sites (SNSs) are the most common source and best breeding grounds for exploiting the vulnerabilities of people and launching a variety of social engineering based attacks. However, the literature shows a lack of information about what types of social engineering threats exist on SNSs. This study is part of a project that attempts to predict a persons’ vulnerability to SE based on demographic factors. In this paper, we demonstrate the different types of social engineering based attacks that exist on SNSs, the purposes of these attacks, reasons why people fell (or did not fall) for these attacks, based on users’ opinions. A qualitative questionnaire-based survey was conducted to collect and analyse people’s experiences with social engineering tricks, deceptions, or attacks on SNSs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Social networking sites (SNSs), with their large number of users and large information base, seem to be the perfect breeding ground for exploiting the vulnerabilities of people, who are considered the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” Fraudulent and deceptive people use social engineering traps and tactics through SNSs to trick users into obeying them, accepting threats, and falling victim to various crimes such as phishing, sexual abuse, financial abuse, identity theft, and physical crime. Although organizations, researchers, and practitioners recognize the serious risks of social engineering, there is a severe lack of understanding and control of such threats. This may be partly due to the complexity of human behaviors in approaching, accepting, and failing to recognize social engineering tricks. This research aims to investigate the impact of source characteristics on users’ susceptibility to social engineering victimization in SNSs, particularly Facebook. Using grounded theory method, we develop a model that explains what and how source characteristics influence Facebook users to judge the attacker as credible.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Social Networks (SN) users have various privacy requirements to protect their information; to address this issue, a six-stage thematic analysis of scholarly articles related to SN user privacy concerns were synthesized. Then this research combines mixed methods research employing the strengths of quantitative and qualitative research to investigate general SN users, and thus construct a new set of ?ve primary and Twenty-?ve secondary SN user privacy requirements. Such an approach has been rarely used to examine the privacy requirements. Factor analysis results show superior agreement with theoretical predictions and signi?cant improvement over previous alternative models of SN user privacy requirements. This research presented here has the potential to provide for the development of more sophisticated privacy controls which will increase the ability of SN users to: specify their rights in SNs and to determine the protection of their own SN data.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Abstract: Social network technologies, as we know them today have become a popular feature of everyday life for many people. As their name suggests, their underlying premise is to enable people to connect with each other for a variety of purposes. These purposes however, are generally thought of in a positive fashion. Based on a multi-method study of two online environments, Habbo Hotel and Second Life, which incorporate social networking functionality, we she light on forms of what can be conceptualized as antisocial behaviours and the rationales for these. Such behaviours included: scamming, racist/homophobic attacks, sim attacks, avatar attacks, non-conformance to contextual norms, counterfeiting and unneighbourly behaviour. The rationales for sub behaviours included: profit, fun, status building, network disruption, accidental acts and prejudice. Through our analysis we are able to comment upon the difficulties of defining antisocial behaviour in such environments, particularly when such environments are subject to interpretation vis their use and expected norms. We also point to the problems we face in conducting our public and private lives given the role ICTs are playing in the convergence of these two spaces and also the convergence of ICTs themselves.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis examines perceptions of advertising on social networking sites (SNS), in particular consumers' privacy concerns, advertising engagement and advertising avoidance. It contributes to the understanding of social media by providing results of a longitudinal investigation of consumer perceptions of advertising, a topography of engagement and avoidance triggers and a three dimensional model of advertising avoidance on SNS. This research used a mixed methodology, employing Critical Incident Technique, In-depth interviews and online surveys.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents two key findings from a longitudinal study examining the dynamics of social networks during organisational change. One, the degree to which users seek new sources of information while adapting to the change. Two, the degree to which social networks display structural resilience when undergoing significant structural and technological change. Users reported an increase in advice ties post-implementation, however a proportionally higher increase in ties within their work group compared to the wider network was identified. The results also supported the supposition that while IT driven change may initially disrupt social networks some networks possess a high degree of resilience, with key players reasserting their original positions of influence following the initial phase of change related disruption.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Understanding the dynamics of disease spread is essential in contexts such as estimating load on medical services, as well as risk assessment and interven- tion policies against large-scale epidemic outbreaks. However, most of the information is available after the outbreak itself, and preemptive assessment is far from trivial. Here, we report on an agent-based model developed to investigate such epidemic events in a stylised urban environment. For most diseases, infection of a new individual may occur from casual contact in crowds as well as from repeated interactions with social partners such as work colleagues or family members. Our model therefore accounts for these two phenomena. Given the scale of the system, efficient parallel computing is required. In this presentation, we focus on aspects related to paralllelisation for large networks generation and massively multi-agent simulations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Ben Light puts forward an alternative way of thinking about how we engage with social networking sites, going beyond the emphasis upon connectivity that has been associated with research in the area to date. Analysing our engagements and disengagements social networking sites in public (in cafes and at bus stops), at work (at desks, photocopiers and whilst cleaning), in our personal lives (where we cull friends and gossip on backchannels) and as related to our health and wellbeing (where we restrict our updates), he emphasises the importance of disconnection instead of connection. The book produces a theory of disconnective practice. This theory requires our attention to geographies of disconnection that include relations with a site, within a site, between sites and between sites and a physical world. Attention to disconnectors, as human and non-human is required, and the modes by which disconnection can occur can then be revealed. Light argues that diversity in the exercise of power is key to understanding disconnective practice where social networking sites are concerned, and he suggests that the ethics of disconnection may also require interrogation.