90 resultados para SOCIAL NETWORKING


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This chapter explores five ethical dilemmas associated with using Social Networking Sites (SNS) in classrooms. First, do we have the right to colonize or marginalize students’ out of school social networking practices in the classroom? Second, should we access students’ out of classroom virtual identities from their SNS in a classroom context? Third, should we be engaging students’ social networking in public performances of the curriculum? Fourth, are we prepared for recognising and responding to illicit activity in SNS? Fifth, do teachers understand the implications of exposing their out of school identities to their students who inhabit the same social network? The authors do not dispute that SNS in the classroom can be a rich site for learning, but they argue that the concept of ethics as a process of analyzing and respecting the other is essential if we are to responsibly engage with SNS in the classroom.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

As the proportion of older adults continues to grow in many Western countries, there are increasing concerns about how to meet their needs. Ensuring social connectedness and inclusion is one way to support older adults’ wellbeing. Online social networking has become common place amongst younger age groups, suggesting its possible usefulness for older adults, in order to combat isolation and loneliness. Some quantitative studies have already explored the amount and degree of online social networking amongst older adults. To add further understanding of how older adults experience social inclusion via the internet, the current qualitative study aimed to explore older adults’ subjective experience of online social networking. Findings demonstrated a number of supports and barriers to social inclusion which reflect barriers to social inclusion of older adults in the non-virtual world. Recommendations to support social inclusion of isolated older adults via online social networking are suggested.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

From empowering consumers and citizens, through to sharing party photographs and organising social events, social networking has transformed the way most people communicate. The Australian dairy industry, wracked by ten years of drought and increasing numbers of activists questioning its environmental and social costs, has established a closed-wall social networking site, called Udderly Fantastic, exclusively for internal stakeholders such as farmers and dairy manufacturers. This case study demonstrates that organisations wanting to engage their stakeholders in an open and transparent way can use social networking as a way of providing information and, importantly, a platform for dialogue in which issues can be raised and discussed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

 This article presents SOR, a vehicular social network to enable social communications and interactions among users on the road during their highway travels. Motivated by the limited connection to Internet contents and services, the essential goal of SOR is to encourage distributed users on the road to spontaneously contribute as the information producer, assembler, and distributer in order to provide timely and localized infotainments to each other through low-cost inter-vehicle communications. To be specific, SOR enables individual users to maintain a personal blog, similar to one on Facebook and Twitter, over which users can create and share personal content information to the public such as travel blogs with pictures and videos. By accessing each other's SOR blogs and commenting on interesting topics, passengers can exchange messages and initiate social interactions. In the specific highway environment, SOR addresses two challenges in the context of vehicular social communications. First, vehicular social communications tend to be frequently interrupted by diverse vehicle mobility and intermittent intervehicle connections, which is annoying to users. To address this issue, SOR adopts a proactive mechanism by estimating the connection time between peer vehicles, and recommending vehicles with relatively long-lasting and stable intervehicle connections for social communications. Second, as users on the road are typically strangers to each other, they are reluctant to disclose personal information to others. This makes it challenging to identify users of shared interests and accordingly restricts the scale of users' social interactions. To remedy that, SOR provides a secured solution to protect sensitive user information during social communications. Lastly, we use simulations to verify the performance of SOR. © 2015 IEEE.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Young people with first episode psychosis are at an increased risk for a range of poor health outcomes. In contrast to the growing body of evidence that suggests that exercise therapy may benefit the physical and mental health of people diagnosed with schizophrenia, there are no studies to date that have sought to extend the use of exercise therapy among patients with first episode psychosis. The aim of the study is to test the feasibility and acceptability of an exercise program that will be delivered via internet enabled mobile devices and social networking technologies among young people with first episode psychosis.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Any organisation that captures personal data in Canada for processing is deemed tohave a ‘real and substantial connection’ to Canada and thus fall within thejurisdiction of the Personal Information Protection and Electronic Documents Act(PIPEDA) and of the Office of the Privacy Commissioner of Canada (OPC). Whathas been the experience of enforcing Canadian privacy protection law on US-basedsocial networking services? We analyse some of the high-profile enforcement actionsby the Privacy Commissioner. We also test compliance through an analysis of theprivacy policies of the top 23 SNSs operating in Canada and through the use of accessto personal information requests. Our analysis suggests that non-compliance iswidespread, and is explained by the countervailing conceptions of jurisdictioninherent in corporate policy and technical system design.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper we analyze some of the practical realities around deleting personal data on social networks with respect to the Canadian regime of privacy protection. We first discuss the extent to which Canadian privacy law imposes access, deletion, and retention requirements on data brokers. After this discussion we turn to corporate organizational practices. Our analyses of social networking sites’ privacy policies reveal how poorly companies recognize the right to be have one’s personal information deleted in their existing privacy commitments and practices. Next, we turn to Law Enforcement Authorities (LEAs) and how their practices challenge the deletion requirements because of LEAs’ own capture, processing, and retention of social networking information. We conclude by identifying lessons from the Canadian experience and raising them against the intense transatlantic struggle over the scope of deletion of data stored in cloud-based computing infrastructures.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

BACKGROUND: Online social networks offer considerable potential for delivery of socially influential health behavior change interventions. OBJECTIVE: To determine the efficacy, engagement, and feasibility of an online social networking physical activity intervention with pedometers delivered via Facebook app. METHODS: A total of 110 adults with a mean age of 35.6 years (SD 12.4) were recruited online in teams of 3 to 8 friends. Teams were randomly allocated to receive access to a 50-day online social networking physical activity intervention which included self-monitoring, social elements, and pedometers ("Active Team" Facebook app; n=51 individuals, 12 teams) or a wait-listed control condition (n=59 individuals, 13 teams). Assessments were undertaken online at baseline, 8 weeks, and 20 weeks. The primary outcome measure was self-reported weekly moderate-to-vigorous physical activity (MVPA). Secondary outcomes were weekly walking, vigorous physical activity time, moderate physical activity time, overall quality of life, and mental health quality of life. Analyses were undertaken using random-effects mixed modeling, accounting for potential clustering at the team level. Usage statistics were reported descriptively to determine engagement and feasibility. RESULTS: At the 8-week follow-up, the intervention participants had significantly increased their total weekly MVPA by 135 minutes relative to the control group (P=.03), due primarily to increases in walking time (155 min/week increase relative to controls, P<.001). However, statistical differences between groups for total weekly MVPA and walking time were lost at the 20-week follow-up. There were no significant changes in vigorous physical activity, nor overall quality of life or mental health quality of life at either time point. High levels of engagement with the intervention, and particularly the self-monitoring features, were observed. CONCLUSIONS: An online, social networking physical activity intervention with pedometers can produce sizable short-term physical activity changes. Future work is needed to determine how to maintain behavior change in the longer term, how to reach at-need populations, and how to disseminate such interventions on a mass scale. TRIAL REGISTRATION: Australian New Zealand Clinical Trials Registry (ANZCTR): ACTRN12614000488606; https://www.anzctr.org.au/Trial/Registration/TrialReview.aspx?id=366239 (Archived by WebCite at http://www.webcitation.org/6ZVtu6TMz).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

© 2015, IGI Global. The chapter investigates the security and ethical issues relating to privacy and security. This chapter also examines the ethical issues of new forms of bullying that are being played out weekly in the media: cyber bulling, specifically on SNS such as Facebook. The traditional and direct forms of bullying are being replaced by consistent abuse via SNS due to the ease and accessibility of these new forms of communications.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This chapter argues that theories about privacy would benefit from embracing deliberative democratic theory on the grounds that it addresses harms to democracy, and widens our understandings of privacy infringements in social networking environments. We first explore how social networking services (SNS) have evolved through different phases and how they enable political deliberation. Subsequently, we discuss more traditional individualistic and intersubjective theories of privacy in relation to social networking and point out their limitations in identifying and redressing social networking-related harms. We then critique emerging claims concerning the social value of privacy in the context of the social Web. Here we point out how these theories might identify non-individualized harms, yet, at the same time, suffer important challenges in application. We conclude by arguing that deliberative democratic theory can add some critical insights into the privacy harms encountered on the contemporary “social Web” that are only imperfectly understood by individualistic and social conceptions of privacy.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis explored the use of social networking sites (SNSs) from social and cognitive psychological perspectives. It focused on the interpersonal processes associated with interacting with emotionally negative SNS posts, and found that impression management, trait empathy, mood, and cognitive function all impact the ways in which people interact online.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

The continuous growth of the users pool of Social Networking web sites such as Facebook and MySpace, and their incessant augmentation of services and capabilities will in the future, meet and compare in contrast with today's Content distribution Networks (CDN) and Peer-to-Peer File sharing applications such as Kazaa and BitTorrent, but how can these two main streams applications, that already encounter their own security problems cope with the combined issues, trust for Social Networks, content and index poisoning in CDN? We will address the problems of Social Trust and File Sharing with an overlay level of trust model based on social activity and transactions, this can be an answer to enable users to increase the reliability of their online social life and also enhance the content distribution and create a better file sharing example. The aim of this research is to lower the risk of malicious activity on a given Social Network by applying a correlated trust model, to guarantee the validity of someone's identity, privacy and trustfulness in sharing content.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Social Media is a term commonly used to describe a group of individual web based services that have grown beyond the provisioning of the capability to connect, network or blog. The popular social networking services have evolved into a ‘platform’ by incorporating a multitude of functionalities through an array of applications to attract millions of users. This has created a favourable environment for businesses to exploit the benefit of having access to millions of social media users by using it as a business support tool. Studies indicate that social media services are being used by businesses for engaging with the general public, enhancing customer interaction, and for crisis communications. Whilst there are many businesses who have adopted social media, others have either rejected the idea or are still unsure about how to proceed. This paper analyses the functionality of selected social media services in order to explore how Australian banks use such services strategically. It reports findings from a longitudinal study of Australian bank use of four popular social media services: Facebook, MySpace, Twitter, and YouTube.