203 resultados para configuration of social networks


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Privacy is an important component of freedom and plays a key role in protecting fundamental human rights. It is becoming increasingly difficult to ignore the fact that without appropriate levels of privacy, a person’s rights are diminished. Users want to protect their privacy - particularly in “privacy invasive” areas such as social networks. However, Social Network users seldom know how protect their own privacy through online mechanisms. What is required is an emerging concept that provides users legitimate control over their own personal information, whilst preserving and maintaining the advantages of engaging with online services such as Social Networks. This paper reviews “Privacy by Design (PbD)” and shows how it applies to diverse privacy areas. Such an approach will move towards mitigating many of the privacy issues in online information systems and can be a potential pathway for protecting user’s personal information. The research has posed many questions in need of further investigation for different open source distributed Social Networks. Findings from this research will lead to a novel distributed architecture that provides more transparent and accountable privacy for the users of online information systems.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis improves the process of recommending people to people in social networks using new clustering algorithms and ranking methods. The proposed system and methods are evaluated on the data collected from a real life social network. The empirical analysis of this research confirms that the proposed system and methods achieved improvements in the accuracy and efficiency of matching and recommending people, and overcome some of the problems that social matching systems usually suffer.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, we propose a semi-supervised approach of anomaly detection in Online Social Networks. The social network is modeled as a graph and its features are extracted to detect anomaly. A clustering algorithm is then used to group users based on these features and fuzzy logic is applied to assign degree of anomalous behavior to the users of these clusters. Empirical analysis shows effectiveness of this method.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Collaboration between faculty and librarians is an important topic of discussion and research among academic librarians. These partnerships between faculty and librarians are vital for enabling students to become lifelong learners through their information literacy education. This research developed an understanding of academic collaborators by analyzing a community college faculty's teaching social networks. A teaching social network, an original term generated in this study, is comprised of communications that influence faculty when they design and deliver their courses. The communication may be formal (e.g., through scholarly journals and professional development activities) and informal (e.g., through personal communication) through their network elements. Examples of the elements of a teaching social network may be department faculty, administration, librarians, professional development, and students. This research asked 'What is the nature of faculty's teaching social networks and what are the implications for librarians?' This study moves forward the existing research on collaboration, information literacy, and social network analysis. It provides both faculty and librarians with added insight into their existing and potential relationships. This research was undertaken using mixed methods. Social network analysis was the quantitative data collection methodology and the interview method was the qualitative technique. For the social network analysis data, a survey was sent to full-time faculty at Las Positas College, a community college, in California. The survey gathered the data and described the teaching social networks for faculty with respect to their teaching methods and content taught. Semi-structured interviews were conducted following the survey with a sub-set of survey respondents to understand why specific elements were included in their teaching social networks and to learn of ways for librarians to become an integral part of the teaching social networks. The majority of the faculty respondents were moderately influenced by the elements of their network except the majority of the potentials were weakly influenced by the elements in their network in their content taught. The elements with the most influence on both teaching methods and content taught were students, department faculty, professional development, and former graduate professors and coursework. The elements with the least influence on both aspects were public or academic librarians, and social media. The most popular roles for the elements were conversations about teaching, sharing ideas, tips for teaching, insights into teaching, suggestions for ways of teaching, and how to engage students. Librarians' weakly influenced faculty in their teaching methods and their content taught. The motivating factors for collaboration with librarians were that students learned how to research, students' research projects improved, faculty saved time by having librarians provide the instruction to students, and faculty built strong working relationships with librarians. The challenges of collaborating with librarians were inadequate teaching techniques used when librarians taught research orientations and lack of time. Ways librarians can be more integral in faculty's teaching social networks included: more workshops for faculty, more proactive interaction with faculty, and more one-on-one training sessions for faculty. Some of the recommendations for the librarians from this study were develop a strong rapport with faculty, librarians should build their services in information literacy from the point of view of the faculty instead of from the librarian perspective, use staff development funding to attend conferences and workshops to improve their teaching, develop more training sessions for faculty, increase marketing efforts of the librarian's instructional services, and seek grant opportunities to increase funding for the library. In addition, librarians and faculty should review the definitions of information literacy and move from a skills based interpretation to a learning process.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Countless studies have stressed the importance of social identity, particularly its role in various organizational outcomes, yet questions remain as to how identities initially develop, shift and change based on the configuration of multiple, pluralistic relationships grounded in an organizational setting. The interactive model of social identity formation has been proposed recently to explain the internalization of shared norms and values – critical in identity formation – has not received empirical examination. We analyzed multiple sources of data from nine nuclear professionals over three years to understand the construction of social identity in new entrants entering an organization. Informed by our data analyses, we found support for the interactive model and that age and level of experience influenced whether they undertook an inductive or deductive route of the group norm and value internalization. This study represents an important contribution to the study of social identity and the process by which identities are formed, particularly under conditions of duress or significant organizational disruption.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Enterprise Social Networks continue to be adopted by organisations looking to increase collaboration between employees, customers and industry partners. Offering a varied range of features and functionality, this technology can be distinguished by the underlying business models that providers of this software deploy. This study identifies and describes the different business models through an analysis of leading Enterprise Social Networks: Yammer, Chatter, SharePoint, Connections, Jive, Facebook and Twitter. A key contribution of this research is the identification of consumer and corporate models as extreme approaches. These findings align well with research on the adoption of Enterprise Social Networks that has discussed bottom-up and top-down approaches. Of specific interest are hybrid models that wrap a corporate model within a consumer model and may, therefore, provide synergies on both models. From a broader perspective, this can be seen as the merging of the corporate and consumer markets for IT products and services.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Children and adolescents with intellectual disability have higher rates of mental health problems compared with there typically developing peers. Social support has been identified as an important protective factor for psychological well - being. In this paper we discuss the benefits of social support networks, and consider approaches for promoting children’s perceptions of the availability of social support. We describe an evidence-based intervention that has been specially adapted and implemented for students with intellectual disability in school settings. In a randomised controlled trial, the Aussie Optimism Resilience Skills Program was associated with improved perceptions of social support following a 10-week intervention. Educators need to be aware of the increased vulnerability of students with intellectual disability to the development mental health problems and the proactive ways in which they can promote psychological well - being within their classrooms.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This research has established a new privacy framework, privacy model, and privacy architecture to create more transparent privacy for social networking users. The architecture is designed into three levels: Business, Data, and Technology, which is based on The Open Group Architecture Framework (TOGAF®). This framework and architecture provides a novel platform for investigating privacy in Social Networks (SNs). This approach mitigates many current SN privacy issues, and leads to a more controlled form of privacy assessment. Ultimately, more privacy will encourage more connections between people across SN services.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study explores the professional development strategies of digital content professionals in Australian micro businesses. This thesis presents the argument that as these professionals are working in cutting edge creative fields where digital technology drives ongoing change, formal education experiences may be less important than for other professionals, and that specific types of online and face-to-face socially mediated informal learning strategies may be critical to currency. This thesis documents the findings of a broad survey of industry professionals' learning needs and development strategies, in conjunction with rich data from in-depth interviews and social network analyses.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The purpose of this study was to explore associations between forms of social support and levels of psychological distress during pregnancy. Methods: A cross-sectional analysis of 2,743 pregnant women from south-east Queensland, Australia, was conducted utilising data collected between 2007-2011 as part of the Environments for Healthy Living (EFHL) project, Griffith University. Psychological distress was measured using the Kessler 6; social support was measured using the following four factors: living with a partner, living with parents or in-laws, self-perceived social network, and area satisfaction. Data were analysed using an ordered logistic regression model controlling for a range of socio-demographic factors. Results: There was an inverse association between self-perceived strength of social networks and levels of psychological distress (OR = 0.77; 95%CI: 0.70, 0.85) and between area satisfaction and levels of psychological distress (OR = 0.77; 95%CI: 0.69, 0.87). There was a direct association between living with parents or in-laws and levels of psychological distress (OR = 1.50; 95%CI: 1.16, 1.96). There was no statistically significant association between living with a partner and the level of psychological distress of the pregnant woman after accounting for household income. Conclusion: Living with parents or in-laws is a strong marker for psychological distress. Strategies aiming to build social support networks for women during pregnancy have the potential to provide a significant benefit. Policies promoting stable family relationships and networks through community development could also be effective in promoting the welfare of pregnant women.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Organisations employ Enterprise Social Networks (ESNs) (such as Yammer) expecting better intra-organisational communication and collaboration. However, ESNs are struggling to gain momentum and wide adoption among users. Promoting user participation is a challenge, particularly in relation to lurkers – the silent ESN members who do not contribute any content. Building on behaviour change research, we propose a three-route model consisting of the central, peripheral and coercive routes of influence that depict users’ cognitive strategies, and we examine how management interventions (e.g. sending promotional emails) impact users’ beliefs and (consequent) posting and lurking behaviours in ESNs. Furthermore, we identify users’ salient motivations to lurk or post. We employ a multi-method research design to conceptualise, operationalise and validate the research model. This study has implications for academics and practitioners regarding the nature, patterns and outcomes of management interventions in prompting ESN.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This research is a step forward in improving the accuracy of detecting anomaly in a data graph representing connectivity between people in an online social network. The proposed hybrid methods are based on fuzzy machine learning techniques utilising different types of structural input features. The methods are presented within a multi-layered framework which provides the full requirements needed for finding anomalies in data graphs generated from online social networks, including data modelling and analysis, labelling, and evaluation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this work, we present the challenges associated with the two-way recommendation methods in social networks and the solutions. We discuss them from the perspective of community-type social networks such as online dating networks.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Hong Kong construction industry is currently facing ageing problem and labour shortage. There are opportunities for employing ethnic minority construction workers to join this hazardous industry. These ethnic minority workers are prone to accidents due to communication barriers. Safety communication is playing an important role for avoiding the accidents on construction sites. However, the ethnic minority workers are not very fluent in the local language and facing safety communication problems while working with local workers. Social network analysis (SNA), being an effective tool to identify the safety communication flow on the construction site, is used to attain the measures of safety communication like centrality, density and betweenness within the ethnic minorities and local workers, and to generate sociograms that visually represent communication pattern within the effective and ineffective safety networks. The aim of this paper is to present the application of SNA for improving the safety communication of ethnic minorities in the construction industry of Hong Kong. The paper provides the theoretical background of SNA approaches for the data collection and analysis using the software UCINET and NetDraw, to determine the predominant safety communication network structure and pattern of ethnic minorities on site.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Enterprise social networks (ESNs) often fail if there are few or no contributors of content. Promotional messages are among the common interventions used to improve participation. While most users only read others’ content (i.e. lurk), contributors who create content (i.e. post) account for only 1% of the users. Research on interventions to improve participation across dissimilar groups is scarce especially in work settings. We develop a model that examines four key motivations of posting and lurking. We employ the elaboration likelihood model to understand how promotional messages influence lurkers’ and posters’ beliefs and participation. We test our model with data collected from 366 members in two corporate Google⁺ communities in a large Australian retail organization. We find that posters and lurkers are motivated and hindered by different factors. Promotional messages do not – always – yield the hoped-for results among lurkers; however, they do make posters more enthusiastic to participate.