205 resultados para Social Network Sites
Resumo:
A people-to-people matching system (or a match-making system) refers to a system in which users join with the objective of meeting other users with the common need. Some real-world examples of these systems are employer-employee (in job search networks), mentor-student (in university social networks), consume-to-consumer (in marketplaces) and male-female (in an online dating network). The network underlying in these systems consists of two groups of users, and the relationships between users need to be captured for developing an efficient match-making system. Most of the existing studies utilize information either about each of the users in isolation or their interaction separately, and develop recommender systems using the one form of information only. It is imperative to understand the linkages among the users in the network and use them in developing a match-making system. This study utilizes several social network analysis methods such as graph theory, small world phenomenon, centrality analysis, density analysis to gain insight into the entities and their relationships present in this network. This paper also proposes a new type of graph called “attributed bipartite graph”. By using these analyses and the proposed type of graph, an efficient hybrid recommender system is developed which generates recommendation for new users as well as shows improvement in accuracy over the baseline methods.
Resumo:
Providing an incentive is becoming common practice among blood service organisations. Driven by self-orientated motives rather than pure philanthropic intentions, research is showing that people increasingly want something in return for their support. It is contended that individuals donate conspicuously with the hope it will improve their social standing. Yet there is limited evidence for the effectiveness of conspicuous recognition strategies, and no studies, to the researcher’s knowledge, that have examined conspicuous donation strategies in an online social media context. There is a need to understand what value drives individuals to donate blood, and whether conspicuous donation strategies are a source of such value post blood donation. The purpose of this paper is to conceptualise how conspicuous donation strategies, in the form of virtual badges on social media sites, can be applied to the social behaviour of blood donation, as a value-adding tool, to encourage repeat behaviour.
Resumo:
Although there is an increasing recognition of the impacts of climate change on communities, residents often resist changing their lifestyle to reduce the effects of the problem. By using a landscape architectural design medium, this paper argues that public space, when designed as an ecological system, has the capacity to create social and environmental change and to increase the quality of the human environment. At the same time, this ecological system can engage residents, enrich the local economy, and increase the social network. Through methods of design, research and case study analysis, an alternative master plan is proposed for a sustainable tourism development in Alacati, Turkey. Our master plan uses local geographical, economic and social information within a sustainable landscape architectural design scheme that addresses the key issues of ecology, employment, public space and community cohesion. A preliminary community empowerment model (CEM) is proposed to manage the designs. The designs address: the coexistence of local agricultural and sustainable energy generation; state of the art water management; and the functional and sustainable social and economic interrelationship of inhabitants, NGOs, and local government.
Resumo:
This thesis investigated how microblogging, a form of online social networking, was being employed by educators to support their professional learning. The study found that educators who participate in microblogging engage in a wide range of behaviours, with certain behaviours and activities commonly exhibited. An advantage of microblogging as a professional learning tool is its ability to link educators globally to exchange ideas from different perspectives and to share resources and teaching practices. Educators who microblog have access to relevant and timely learning that is not constrained by time or distance and can be tailored to meet their individual needs.
Resumo:
Each of the thirty-one contributions in this volume implicitly spells out its own answer to this question. Surprisingly perhaps even for such a highly interdisciplinary volume as this one, these answers vary considerably in their approaches, their objectives, and their underlying assumptions about the object of study. This diversity of scholarly perspectives on Twitter, barely half a decade since it first emerged as a popular platform, highlights its versatility. Beginning as a side project to a now-forgotten podcasting platform, rising to popularity as a social network service focussed around mundane communication and therefore widely lambasted as a cesspool of vanity and triviality by incredulous journalists (including technology journalists), it was later embraced by those same journalists, governments, and businesses as a crucial source of real-time information on everything from natural disasters to celebrity gossip, and from debates over sexual violence to Vatican politics.
Resumo:
This article examines the design of ePortfolios for music postgraduate students utilizing a practice-led design iterative research process. It is suggested that the availability of Web 2.0 technologies such as blogs and social network software potentially provide creative artist with an opportunity to engage in a dialogue about art with artefacts of the artist products and processes present in that discussion. The design process applied Software Development as Research (SoDaR) methodology to simultaneously develop design and pedagogy. The approach to designing ePortfolio systems applied four theoretical protocols to examine the use of digitized artefacts to enable a dynamic and inclusive dialogue around representations of the students work. A negative case analysis identified a disjuncture between university access and control policy, and the relative openness of Web2.0 systems outside the institution that led to the design of an integrated model of ePortfolio.
Resumo:
Journalists work in an intensively time-pressured environment, researching and writing to daily, often 24 hour, deadlines and always aware of the competition with other news outlets to be first with the news. This results, as Karen Sanders has observed, in journalists having very little time for reflection. “If they do reflect, it’s usually after a decision has been made” (Sanders 2003, 168). Yet time for reflection upon professional practice is important, especially in an era of extremely rapid and seismic technological change in the global media. This paper will reflect upon how freelance journalists can use advances in social media and web-based connectedness to tell global stories via mainstream media outlets. In exploring this question, I will examine the techniques and communications technologies used by three reporters working in the UK and Australia to find, investigate and break a series of articles, published simultaneously on the front pages of The Australian and The Times (London) newspapers, was a result of a six month investigation. The series exposed a 50-year cover-up of the serial abuse of children by one of the Church of England's most senior clergy, Robert Waddington, in Australia and the UK. It unearthed the existence of a culture of physical and sexual abuse at St Barnabas boarding school in Queensland, the sudden closure of the school and disappearance of student files - as well as Waddington's subsequent offences against children while Dean of Manchester Cathedral. We produced more than 20 articles. The coverage sparked church-ordered investigations in both countries, and also prompted the Archbishop of Canterbury to order a commission of inquiry – headed by a sitting UK judge - as well as a nationwide child safety audit of dioceses in Britain. In Australia, the church referred the case and handed its files to the Royal Commission into Child Sexual Abuse. The coverage marked the first publishing collaboration between The Australian and The Times to break an exclusive story in Australia and Britain simultaneously, on May 10, 2013.
Resumo:
In the context of modern western psychologised, techno-social hybrid realities, where individuals are incited constantly to work on themselves and perform their self-development in public, the use of online social networking sites (SNSs) can be conceptualised as what Foucault has described as a ‘technique of self’. This article explores examples of status updates on Facebook to reveal that writing on Facebook is a tool for self-formation with historical roots. Exploring examples of self-writing from the past, and considering some of the continuities and discontinuities between these age-old practices and their modern translations, provides a non-technologically deterministic and historically aware way of thinking about the use of new media technologies in modern societies that understands them to be more than mere tools for communication.
Resumo:
Numeric set watermarking is a way to provide ownership proof for numerical data. Numerical data can be considered to be primitives for multimedia types such as images and videos since they are organized forms of numeric information. Thereby, the capability to watermark numerical data directly implies the capability to watermark multimedia objects and discourage information theft on social networking sites and the Internet in general. Unfortunately, there has been very limited research done in the field of numeric set watermarking due to underlying limitations in terms of number of items in the set and LSBs in each item available for watermarking. In 2009, Gupta et al. proposed a numeric set watermarking model that embeds watermark bits in the items of the set based on a hash value of the items’ most significant bits (MSBs). If an item is chosen for watermarking, a watermark bit is embedded in the least significant bits, and the replaced bit is inserted in the fractional value to provide reversibility. The authors show their scheme to be resilient against the traditional subset addition, deletion, and modification attacks as well as secondary watermarking attacks. In this paper, we present a bucket attack on this watermarking model. The attack consists of creating buckets of items with the same MSBs and determine if the items of the bucket carry watermark bits. Experimental results show that the bucket attack is very strong and destroys the entire watermark with close to 100% success rate. We examine the inherent weaknesses in the watermarking model of Gupta et al. that leave it vulnerable to the bucket attack and propose potential safeguards that can provide resilience against this attack.
Resumo:
Social networking sites have become increasingly popular destinations for people wishing to chat, play games, make new friends or simply stay in touch. Furthermore, many organizations have been quick to grasp the potential they offer for marketing, recruitment and economic activities. Nevertheless, counterclaims depict such spaces as arenas where deception, social grooming and the posting of defamatory content flourish. Much research in this area has focused on the ends to which people deploy the technology, and the consequences arising, with a view to making policy recommendations and ethical interventions. In this paper, we argue that tracing where morality lies is more complex than these efforts suggest. Using the case of a popular social networking site, and concepts about the morality of technology, we disclose the ethics of Facebook as diffuse and multiple. In our conclusions we provide some reflections on the possibilities for action in light of this disclosure.
Resumo:
Twitter is a very popular social network website that allows users to publish short posts called tweets. Users in Twitter can follow other users, called followees. A user can see the posts of his followees on his Twitter profile home page. An information overload problem arose, with the increase of the number of followees, related to the number of tweets available in the user page. Twitter, similar to other social network websites, attempts to elevate the tweets the user is expected to be interested in to increase overall user engagement. However, Twitter still uses the chronological order to rank the tweets. The tweets ranking problem was addressed in many current researches. A sub-problem of this problem is to rank the tweets for a single followee. In this paper we represent the tweets using several features and then we propose to use a weighted version of the famous voting system Borda-Count (BC) to combine several ranked lists into one. A gradient descent method and collaborative filtering method are employed to learn the optimal weights. We also employ the Baldwin voting system for blending features (or predictors). Finally we use the greedy feature selection algorithm to select the best combination of features to ensure the best results.
Resumo:
We examine enterprise social network usage data obtained from a community of store managers in a leading Australian retail organization, over a period of fifteen months. Our interest in examining this data is in spatial preferences by the network users, that is, to ascertain who is communicating with whom and where. We offer several contrasting theoretical perspectives for spatial preference patterns and examine these against data collected from over 12,000 messages exchanged between 530 managers in 897 stores. Our findings show that interactions can generally be characterized by individual preferences for local communication but also that two different user communities exist – locals and globals. We develop empirical profiles for these social network user communities and outline implications for theories on spatial influences on communication behaviours on enterprise social networks.
Resumo:
The factors influencing both teacher and student readiness to use Facebook as part of their teaching and learning in a vocational educational institution were studied through a qualitative case study. Data included teacher and student questionnaire and focus group interviews. While it was found that the students demonstrated readiness and willingness to incorporate Facebook into their current learning, the teachers were more reluctant. Different perceptions around control of learning, time, and concerns around compartmentalisation of learning and social lives would need to be addressed before Facebook could be used as a formal learner engagement strategy.
Resumo:
The construction workforce in Hong Kong is experiencing a severe ageing problem and labour shortage. One initiative to enhance the supply of manpower is to assist ethnic minorities joining the industry. It is foreseeable that the percentage of ethnic minorities in the construction workforce will keep increasing. Statistics show that ethnic minorities were nearly 30% more likely to have work-related injuries than local workers in some developed countries. However, official statistics on the safety of ethnic minorities are not available in Hong Kong. A search in newspaper archive revealed that ethnic minorities in the construction industry of Hong Kong are subjected to higher fatality rate than local workers, just as is the case in many developed countries. This reflects that the safety of ethnic minorities has not received the attention it rightly deserves. Safety communication has been one of the key factors leading to accidents. Safety communication barriers of ethnic minorities impede them from receiving safety training and acquiring safety information effectively. Research towards improving the safety communication of ethnic minorities in the construction industry of Hong Kong becomes more urgent. This paper will provides an initial report on a research project which focuses on improving the safety communication of ethnic minorities in the construction industry of Hong Kong. Quantitative and qualitative research methods including Social Network Analysis (SNA) applied in conducting the research are first discussed. Preliminary statistics of construction accidents related to ethnic minorities in Hong Kong are then presented.
Resumo:
This paper attends to the idea of disconnection as a way of theorising people’s lived experience of social networking sites. Enrolling and extending a disconnective practice lens we suggest that the disconnective strategies of suspension and prevention are operational necessities for those we might see as the users and owners of sites such as Facebook. Indeed, our work demonstrates that disconnection in these contexts need not be associated only with modes of resistance and departure, but can also act as socioeconomic lubricant.