646 resultados para communication theory
Resumo:
Social networks have proven to be an attractive avenue of investigation for researchers since humans are social creatures. Numerous literature have explored the term “social networks” from different perspectives and in diverse research fields. With the popularity of the Internet, social networking has taken on a new dimension. Online social communities therefore have become an emerging social avenue for people to communicate in today’s information age. People use online social communities to share their interests, maintain friendships, and extend their so-called circle of “friends”. Likewise, social capital, also known as human capital, is an important theory in sociology. Researchers usually utilise social capital theory when they investigate the topic relating to social networks. However, there is little literature that can provide an explicit and strong assertion in that research area due to the complexity of social capital. This thesis therefore focuses on the issue related to providing a better understanding about the relationship between social capital and online social communities. To enhance the value within the scope of this analysis, an online survey was conducted to examine the effects of the dimensions of social capital: relational capital, structural capital, and cognitive capital, determining the intensity of using online social communities. The data were derived from a total of 350 self-selected respondents completing an online survey during the research period. The main results indicate that social capital exists in online social communities under normal circumstances. Finally, this thesis also presents three contributions for both theory and practice in Chapter 5. The main results contribute to the understanding of connectivity in the interrelationships between individual social capital exchange within online social networks. Secondly, social trust was found to have a weak effect in influencing the intensity of individuals using online social communities. Third, the perpetual role of information sharing has an indirect influence on individual users participating in online social communities. This study also benefits online marketing consultants as marketers can not only gain consumer information easier from online social communities but also this understanding assists in designing effective communication within online social communities. The cross-sectional study, the reliability of Internet survey data, and sampling issues are the major three limitations in this research. The thesis provides a new research model and recommends that the mediating effects, privacy paradox, and social trust on online social communities should be further explored in future research.
Resumo:
Using a thematic story telling approach which draws on ethnographic method, a grounded theory of protest movement continuity is presented. The grounded theory draws from theories and activist stories relating to the facilitative role of movement networks, social contagion theory and the cultural experience of activism. It highlights the contagious influence of protest networks in maintaining protest continuity over time and how this leads to common perceptions of development risk and opportunity within communities. It also reveals how communities use collective values and identity, social capital, emotional dynamics and symbolic artifacts to maintain protest continuity.
Resumo:
This article augments Resource Dependence Theory with Real Options reasoning in order to explain time bounds specification in strategic alliances. Whereas prior work has found about a 50/50 split between alliances that are time bound and those that are open-ended, their substantive differences and antecedents are ill understood. To address this, we suggest that the two alliance modes present different real options trade-offs in adaptation to environmental uncertainty: ceteris paribus, time-bound alliances are likely to provide abandonment options over open-ended alliances, but require additional investments to extend the alliance when this turns out to be desirable after formation. Open-ended alliances are likely to provide growth options over open-ended alliances, but they demand additional effort to abandon the alliance if post-formation circumstances so desire. Therefore, we expect time bounds specification to be a function of environmental uncertainty: organizations in more uncertain environments will be relatively more likely to place time bounds on their strategic alliances. Longitudinal archival and survey data collected amongst 39 industry clusters provides empirical support for our claims, which contribute to the recent renaissance of resource dependence theory by specifying the conditions under which organizations choose different time windows in strategic partnering.
Resumo:
The following dialogue is based on an interview conducted as part of Professor Born’s visit to Brisbane in 2006, which included three public seminars at the University of Queensland (UQ) and Queensland University of Technology (QUT). The following dialogue provides a counterpoint to these events and to Born’s work as a whole, drawing together and extending key themes in the cultural politics of both public service broadcasting and new media technologies. It begins by discussing the possibilities of public sphere theory to provide useful models of institutional design. The discussion moves from there to SBS Television – an example of Public Service Broadcasting that provides an interesting contrast to the BBC, especially by virtue of SBS’s relationship with the politics of multiculturalism in Australia. The second half of the interview draws out the issues around cultural value, cultural power and the politics of technology in relation to new media, and concludes by focusing especially on the problems and potentialities of ‘user-generated content’.
Resumo:
In this chapter we take a high-level view of social media, focusing not on specific applications, domains, websites, or technologies, but instead our interest is in the forms of engagement that social media engender. This is not to suggest that all social media are the same, or even that everyone’s experience with any particular medium or technology is the same. However, we argue common issues arise that characterize social media in a broad sense, and provide a different analytic perspective than we would gain from looking at particular systems or applications. We do not take the perspective that social life merely happens “within” such systems, nor that social life “shapes” such systems, but rather these systems provide a site for the production of social and cultural reality – that media are always already social and the engagement with, in, and through media of all sorts is a thoroughly social phenomenon. Accordingly, in this chapter, we examine two phenomena concurrently: social life seen through the lens of social media, and social media seen through the lens of social life. In particular, we want to understand the ways that a set of broad phenomena concerning forms of participation in social life is articulated in the domain of social media. As a conceptual entry-point, we use the notion of the “moral economy” as a means to open up the domain of inquiry. We first discuss the notion of the “moral economy” as it has been used by a number of social theorists, and then identify a particular set of conceptual concerns that we suggest link it to the phenomena of social networking in general. We then discuss a series of examples drawn from a range of studies to elaborate and ground this conceptual framework in empirical data. This leads us to a broader consideration of audiences and publics in social media that, we suggest, holds important lessons for how we treat social media analytically.
Resumo:
There appears no shortage of theorists for preservice teacher education; however many ideas are abandoned without practical applications. Indeed, it can take years for theories to materialise into practice, if they materialise at all. The quality of preservice teacher education is central for enhancing an education system, and mentors’ roles can assist to shape preservice teachers’ development within the school context. Yet mentoring can be haphazard without being underpinned by a theoretical framework. A mentoring model (personal attributes, system requirements, pedagogical knowledge, modelling, and feedback) has emerged from research and the literature to guide mentors’ practices. This qualitative study investigates mentors’ pedagogical knowledge as one factor crucial to the mentoring process. More specifically, this study involves a questionnaire and audio-recorded focus group meetings with experienced mentors (n=14) who deliberated on devising practical applications for mentoring pedagogical knowledge. Findings revealed that these experienced mentors pinpointed practical applications around a mentor’s role for providing pedagogical knowledge to the mentee. These strategies were varied and demonstrated that any one mentoring practice may be approached from a number of different angles. Nevertheless, there were core mentoring practices in pedagogical knowledge such as showing the mentee how to plan for teaching, articulating classroom management approaches, and talking about how to connect learning to assessment. Mentors may require education on current mentoring practices with practical strategies that are linked to theoretical underpinnings.
Resumo:
The world’s increasing complexity, competitiveness, interconnectivity, and dependence on technology generate new challenges for nations and individuals that cannot be met by continuing education as usual (Katehi, Pearson, & Feder, 2009). With the proliferation of complex systems have come new technologies for communication, collaboration, and conceptualisation. These technologies have led to significant changes in the forms of mathematical and scientific thinking that are required beyond the classroom. Modelling, in its various forms, can develop and broaden children’s mathematical and scientific thinking beyond the standard curriculum. This paper first considers future competencies in the mathematical sciences within an increasingly complex world. Next, consideration is given to interdisciplinary problem solving and models and modelling. Examples of complex, interdisciplinary modelling activities across grades are presented, with data modelling in 1st grade, model-eliciting in 4th grade, and engineering-based modelling in 7th-9th grades.
Resumo:
The world’s increasing complexity, competitiveness, interconnectivity, and dependence on technology generate new challenges for nations and individuals that cannot be met by “continuing education as usual” (The National Academies, 2009). With the proliferation of complex systems have come new technologies for communication, collaboration, and conceptualization. These technologies have led to significant changes in the forms of mathematical thinking that are required beyond the classroom. This paper argues for the need to incorporate future-oriented understandings and competencies within the mathematics curriculum, through intellectually stimulating activities that draw upon multidisciplinary content and contexts. The paper also argues for greater recognition of children’s learning potential, as increasingly complex learners capable of dealing with cognitively demanding tasks.
Resumo:
The business environment across the globe is today characterised by three primary governance arrangements - bureaucracies, markets and networks. For organisations operating within each of these business contexts the terms of engagement in regard to negotiation are different. Rather than starting from a broad ‘how to’ approach or a specific cultural interface, Negotiating the Business Environment looks at governance arrangements within the business environment and at how such governance arrangements impact on how negotiation occurs. This text provides an Australian—not an overseas—perspective on negotiations that will be a welcome change for Australian students. Uniquely, it takes into account the context in which negotiations take place. Negotiating the Business Environment demonstrates how responding to business style in negotiations can effect successful outcomes. It include strong pedagogy including: key terms, key points, further reading lists, case studies, and end of chapter questions
Resumo:
Crowdsourcing harnesses the potential of large and open networks of people. It is a relatively new phenomenon and attracted substantial interest in practice. Related research, however, lacks a theoretical foundation. We propose a system-theoretical perspective on crowdsourcing systems to address this gap and illustrate its applicability by using it to classify crowdsourcing systems. By deriving two principal dimensions from theory, we identify four fundamental types of crowdsourcing systems that help to distinguish important features of such systems. We analyse their respective characteristics and discuss implications and requirements for various aspects related to the design of such systems. Our results demonstrate that systems theory can inform the study of crowdsourcing systems. The identified system types and the implications on their design may prove useful for researchers to frame future studies and for practitioners to identify the right crowdsourcing systems for a particular purpose.
Resumo:
This chapter introduces different theoretical approaches to negotiation and provides an explanation of these differing frameworks. While the action of a negotiation centres on the background research undertaken and what happens at the negotiation table, there is a need to know what principles and assumptions are informing these activities. Theories offer a way of understanding the underlying structures, processes and relationships of negotiation. Further, negotiation theories also assist with focusing attention on the 'basis of the bargain' and provide a standpoint from which to judge offers and counter-offers during the negotiation.
Resumo:
Overviews of research are clear that bullying occurs in every school, and that there are significant negative physical and mental health outcomes associated with it (Beaty and Alexeyev, 2008; Carter, 2011). As such, it is imperative to develop successful intervention strategies to help students cope with bullying, including the emergent form of cyberbullying. Research suggests, however, that students have a very limited repertoire of strategies for dealing with bullying generally (Owens, Shute, and Slee, 2004). In this paper the authors outline what is currently known about bullying, including cyberbullying, its impact on students, how theory can assist in developing interventions to assist and support students to cope with bullying, and some of the implications for schools.
Resumo:
With the growth and development of communication technology there is an increasing need for the use of interception technologies in modern policing. Law enforcement agencies are faced with increasingly sophisticated and complex criminal networks that utilise modern communication technology as a basis for their criminal success. In particular, transnational organised crime (TOC) is a diverse and complicated arena, costing global society in excess of $3 trillion annually, a figure that continues to grow (Borger, 2007) as crime groups take advantage of disappearing borders and greater profit markets. However, whilst communication can be a critical success factor for criminal enterprise it is also a key vulnerability. It is this vulnerability that the use of CIT, such as phone taps or email interception, can exploit. As such, law enforcement agencies now need a method and framework that allows them to utilise CIT to combat these crimes efficiently and successfully. This paper provides a review of current literature with the specific purpose of considering the effectiveness of CIT in the fight against TOC and the groundwork that must be laid in order for it to be fully exploited. In doing so, it fills an important gap in current research, focusing on the practical implementation of CIT as opposed to the traditional area of privacy concerns that arise with intrusive methods of investigation. The findings support the notion that CIT is an essential intelligence gathering tool that has a strong place within the modern policing arena. It identifies that the most effective use of CIT is grounded within a proactive, intelligence‐led framework and concludes that in order for this to happen Australian authorities and law enforcement agencies must re‐evaluate and address the current legislative and operational constraints placed on the use of CIT and the culture that surrounds intelligence in policing.
Resumo:
Various researchers have called for an 'opening up' of Luhmann's systems theory. We take this short paper as an occasion for a critical reflection on the necessity, existence and possibilities of such an opening. We start by pointing out the inherent openness of Luhmann's theory, and, based on this, discuss three kinds of openings: the international opening, the theoretical opening and the empirical opening. With regard to the latter, we distinguish three general options of using Luhmann's theory for empirical research. Copyright © 2007 SAGE.