285 resultados para advertising, avoidance, online social networking, perceptions, privacy, teenagers, trust


Relevância:

100.00% 100.00%

Publicador:

Resumo:

With the explosion of Web 2.0 application such as blogs, social and professional networks, and various other types of social media, the rich online information and various new sources of knowledge flood users and hence pose a great challenge in terms of information overload. It is critical to use intelligent agent software systems to assist users in finding the right information from an abundance of Web data. Recommender systems can help users deal with information overload problem efficiently by suggesting items (e.g., information and products) that match users’ personal interests. The recommender technology has been successfully employed in many applications such as recommending films, music, books, etc. The purpose of this report is to give an overview of existing technologies for building personalized recommender systems in social networking environment, to propose a research direction for addressing user profiling and cold start problems by exploiting user-generated content newly available in Web 2.0.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The design of applications for dynamic ridesharing or carpooling is often formulated as a matching problem of connecting people with an aligned set of transport needs within a reasonable interval of time and space. This problem formulation relegates social connections to being secondary factors. Technology assisted ridesharing applications that put the matching problem first have revealed that they suffer from being unable to address the factor of social comfort, even after adding friend features or piggybacking on social networking sites. This research aims to understand the fabric of social interactions through which ridesharing happens. We take an online observation approach in order to understand the fabric of social interactions for ridesharing that is happening in highly subscribed online groups of local residents. This understanding will help researchers to identify design challenges and opportunities to support ridesharing in local communities. This paper contributes a fundamental understanding of how social interactions and social comfort precede rideshare requests in local communities.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Social Engineering (ES) is now considered the great security threat to people and organizations. Ever since the existence of human beings, fraudulent and deceptive people have used social engineering tricks and tactics to trick victims into obeying them. There are a number of social engineering techniques that are used in information technology to compromise security defences and attack people or organizations such as phishing, identity theft, spamming, impersonation, and spaying. Recently, researchers have suggested that social networking sites (SNSs) are the most common source and best breeding grounds for exploiting the vulnerabilities of people and launching a variety of social engineering based attacks. However, the literature shows a lack of information about what types of social engineering threats exist on SNSs. This study is part of a project that attempts to predict a persons’ vulnerability to SE based on demographic factors. In this paper, we demonstrate the different types of social engineering based attacks that exist on SNSs, the purposes of these attacks, reasons why people fell (or did not fall) for these attacks, based on users’ opinions. A qualitative questionnaire-based survey was conducted to collect and analyse people’s experiences with social engineering tricks, deceptions, or attacks on SNSs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Social networking sites (SNSs), with their large number of users and large information base, seem to be the perfect breeding ground for exploiting the vulnerabilities of people, who are considered the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” Fraudulent and deceptive people use social engineering traps and tactics through SNSs to trick users into obeying them, accepting threats, and falling victim to various crimes such as phishing, sexual abuse, financial abuse, identity theft, and physical crime. Although organizations, researchers, and practitioners recognize the serious risks of social engineering, there is a severe lack of understanding and control of such threats. This may be partly due to the complexity of human behaviors in approaching, accepting, and failing to recognize social engineering tricks. This research aims to investigate the impact of source characteristics on users’ susceptibility to social engineering victimization in SNSs, particularly Facebook. Using grounded theory method, we develop a model that explains what and how source characteristics influence Facebook users to judge the attacker as credible.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The emergence of the Internet is one of the most significant leaps in the history of humanity. Information, knowledge and culture are exchanged among masses of people through interconnected information platforms. These platforms enable our culture to be analysed and rewritten, and fundamentally opens our perceptions to a wide variety of concepts and beliefs. The connected networks of the Internet have shaped a virtual — but communicative — space where people can cross borders freely within a realm characterised by the ability to go anywhere, see anything, learn, compare and understand. This chapter focuses on the Libyan experience with social networking platforms in actualising democratic change in the uprising of 17 February 2011. After briefly outlining the political and economic situation under the regime of Colonel Mummar Ghaddafi, the chapter discusses the role that social networking platforms played during the struggle of the Libyan people for democratic change. Finally, it points out the positive changes that resulted from the uprising and the potential role that social media might play in the ongoing democratization and development of Libyan society.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Abstract Within the field of Information Systems, a good proportion of research is concerned with the work organisation and this has, to some extent, restricted the kind of application areas given consideration. Yet, it is clear that information and communication technology deployments beyond the work organisation are acquiring increased importance in our lives. With this in mind, we offer a field study of the appropriation of an online play space known as Habbo Hotel. Habbo Hotel, as a site of media convergence, incorporates social networking and digital gaming functionality. Our research highlights the ethical problems such a dual classification of technology may bring. We focus upon a particular set of activities undertaken within and facilitated by the space – scamming. Scammers dupe members with respect to their ‘Furni’, virtual objects that have online and offline economic value. Through our analysis we show that sometimes, online activities are bracketed off from those defined as offline and that this can be related to how the technology is classified by members – as a social networking site and/or a digital game. In turn, this may affect members’ beliefs about rights and wrongs. We conclude that given increasing media convergence, the way forward is to continue the project of educating people regarding the difficulties of determining rights and wrongs, and how rights and wrongs may be acted out with respect to new technologies of play online and offline.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study extends previous research into social networking sites (SNSs) as environments that often reduce spatial, temporal, and social boundaries, which can result in collapsed contexts for social situations. Context collapse was investigated through interviews and Facebook walkthroughs with 27 LGBTQ young people in the United Kingdom. Since diverse sexualities are often stigmatized, participants’ sexual identity disclosure decisions were shaped by both the social conditions of their online networks and the technological architecture of SNSs. Context collapse was experienced as an event through which individuals intentionally redefined their sexual identity across audiences or managed unintentional disclosure. To prevent unintentional context collapse, participants frequently reinstated contexts through tailored performances and audience separation. These findings provide insight into stigmatized identity performances in networked publics while situating context collapse within a broader understanding of impression management, which paves the way for future research exploring the identity implications of everyday SNS use.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article conceptualises ‘participatory reluctance’ as a particular orientation to social media that problematises binarised notions of connection and disconnection in social networking sites. It qualitatively examines how the concept has functioned within gay men’s social networking service, Gaydar, among 18- to 28-year-old users of the site in Brisbane, Australia. Participatory reluctance is shown to be a central aspect of the culture of this space, fostered among the studied demographic by the convergence of the growing global push for marriage equality and increasing normalisation of the kinds of gay male identities commonly adopted among this group, with three key factors rooted primarily in Gaydar’s design: (1) young users’ perceptions of the site as a space for procuring casual sex; (2) their perceptions of the imagined user as embodying existing stereotypes of gay masculinity, and; (3) a lack of genuine alternatives in terms of niche digital spaces for gay men’s social networking.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The end of the Korean War in 1953 marked the beginning of Seoul’s transformation from the shattered capital city of South Korea to one of the most connected, populous, and fast-changing hubs of global economy. Seoul’s technosocial development has been celebrated nationally and internationally. To the outside, young Koreans’ swift and extensive adoption and adaptation to digital technologies has been a subject of exotification; to adults in Korea, it has been a subject of criticism (see Yoon in this volume). With the understanding that ‘the city is connections,’ it is crucial to study not only the macro-level design of the city as a network (through policy, for example), but also its micro-level construction at the intersection of people, place, and technology. Accordingly, this chapter explores this exact intersection to comprehensively portray the constant renewal of the city as imagined and experienced by young Koreans. The chapter is based on fieldwork conducted in Seoul, South Korea, from 2007 to 2008 as part of a research project on the mobile play culture of Seoul transyouth, the transitional demographic situated between youth and adulthood, and the pioneers of the Korean ‘broadband miracle’ (Hazlett, 2004). The study draws upon transdisciplinary research data including interviews, questionnaires, diaries, and Shared Visual Ethnography (SVE) to render the everyday urban social networking of young Seoulites with and through which they interact to constantly (re)create the city and the self.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents a brief analysis of Seoul trans-youth’s search for identity through urban social networking, arguing that technological, socio-cultural and environmental (urban) contexts frame how mobility and ubiquity are (re)created in Seoul. The paper is empirically based on fieldwork conducted in Seoul, South Korea, from 2007 to 2008 as part of a research project on the mobile play culture of Seoul trans-youth(a term that will be explained in detail in the following section). Shared Visual Ethnography (SVE) was used as the research method which involved sharing of visual ethnographic data that were created by the participants. More specifically, the participants were asked to take photos, which were then shared and discussed with other participants and the researcher on the photo-sharing service Flickr. The research also involved a questionnaire and daily activity diaries, as well as interviews. A total of 44 Korean transyouths – including 23 females and 21 males – participated in interviews and photo-sharing. The paper draws specifically on the qualitative data from individual and/or group interviews, the total duration of which was 2–2.5 hours for each participant.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The popularity of social networking sites (SNSs) among adolescents has grown exponentially, with little accompanying research to understand the influences on adolescent engagement with this technology. The current study tested the validity of an extended theory of planned behaviour model (TPB), incorporating the additions of group norm and self-esteem influences, to predict frequent SNS use. Adolescents (N = 160) completed measures assessing the standard TPB constructs of attitude, subjective norm, perceived behavioural control (PBC), and intention, as well as group norm and self-esteem. One week later, participants reported their SNS use during the previous week. Support was found for the standard TPB variables of attitude and PBC, as well as group norm, in predicting intentions to use SNS frequently, with intention, in turn, predicting behaviour. These findings provide an understanding of the factors influencing frequent engagement in what is emerging as a primary tool for adolescent socialisation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The explosion in use of online social networks is an important phenomenon that provides a new set of entrepreneurial opportunities. Emerging musicians have been among the first to exploit this new market opportunity – and indeed, many have used it successfully. A recent study Carter (2009) reveals that artists who earned the most returns had an online presence on multiple social online sites and services such as MySpace and Facebook. These web pages are leveraged to build fan bases and develop different types of revenue streams. Yet, little is currently known about discovery or exploitation of such opportunities.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A remarkable growth in quantity and popularity of online social networks has been observed in recent years. There is a good number of online social networks exists which have over 100 million registered users. Many of these popular social networks offer automated recommendations to their users. This automated recommendations are normally generated using collaborative filtering systems based on the past ratings or opinions of the similar users. Alternatively, trust among the users in the network also can be used to find the neighbors while making recommendations. To obtain the optimum result, there must be a positive correlation exists between trust and interest similarity. Though the positive relations between trust and interest similarity are assumed and adopted by many researchers; no survey work on real life people’s opinion to support this hypothesis is found. In this paper, we have reviewed the state-of-the-art research work on trust in online social networks and have presented the result of the survey on the relationship between trust and interest similarity. Our result supports the assumed hypothesis of positive relationship between the trust and interest similarity of the users.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In recent years, there is a dramatic growth in number and popularity of online social networks. There are many networks available with more than 100 million registered users such as Facebook, MySpace, QZone, Windows Live Spaces etc. People may connect, discover and share by using these online social networks. The exponential growth of online communities in the area of social networks attracts the attention of the researchers about the importance of managing trust in online environment. Users of the online social networks may share their experiences and opinions within the networks about an item which may be a product or service. The user faces the problem of evaluating trust in a service or service provider before making a choice. Recommendations may be received through a chain of friends network, so the problem for the user is to be able to evaluate various types of trust opinions and recommendations. This opinion or recommendation has a great influence to choose to use or enjoy the item by the other user of the community. Collaborative filtering system is the most popular method in recommender system. The task in collaborative filtering is to predict the utility of items to a particular user based on a database of user rates from a sample or population of other users. Because of the different taste of different people, they rate differently according to their subjective taste. If two people rate a set of items similarly, they share similar tastes. In the recommender system, this information is used to recommend items that one participant likes, to other persons in the same cluster. But the collaborative filtering system performs poor when there is insufficient previous common rating available between users; commonly known as cost start problem. To overcome the cold start problem and with the dramatic growth of online social networks, trust based approach to recommendation has emerged. This approach assumes a trust network among users and makes recommendations based on the ratings of the users that are directly or indirectly trusted by the target user.