646 resultados para Twitter, social networks, public opinion, agenda setting, Álvaro Uribe Vélez
Resumo:
Within the communicative space online Social Network Sites (SNS) afford, Niche Social Networks Sites (NSNS) have emerged around particular geographic, demographic or topic-based communities to provide what broader SNS do not: specified and targeted content for an engaged and interested community. Drawing on a research project developed at the Queensland University of Technology in conjunction with the Australian Smart Services Cooperative Research Centre that produced an NSNS based around Adventure Travel, this paper outlines the main drivers for community creation and sustainability within NSNS. The paper asks what factors motivate users to join and stay with these sites and what, if any, common patterns can be noted in their formation. It also outlines the main barriers to online participation and content creation in NSNS, and the similarities and differences in SNS and NSNS business models. Having built a community of 100 registered members, the staywild.com.au project was a living laboratory, enabling us to document the steps taken in producing a NSNS and cultivating and retaining active contributors. The paper incorporates observational analysis of user-generated content (UGC) and user profile submissions, statistical analysis of site usage, and findings from a survey of our membership pool in noting areas of success and of failure. In drawing on our project in this way we provide a template for future iterations of NSNS initiation and development across various other social settings: not only niche communities, but also the media and advertising with which they engage and interact. Positioned within the context of online user participation and UGC research, our paper concludes with a discussion of the ways in which the tools afforded by NSNS extend earlier understandings of online ‘communities of interest’. It also outlines the relevance of our research to larger questions about the diversity of the social media ecology.
Resumo:
Online social networks can be modelled as graphs; in this paper, we analyze the use of graph metrics for identifying users with anomalous relationships to other users. A framework is proposed for analyzing the effectiveness of various graph theoretic properties such as the number of neighbouring nodes and edges, betweenness centrality, and community cohesiveness in detecting anomalous users. Experimental results on real-world data collected from online social networks show that the majority of users typically have friends who are friends themselves, whereas anomalous users’ graphs typically do not follow this common rule. Empirical analysis also shows that the relationship between average betweenness centrality and edges identifies anomalies more accurately than other approaches.
Resumo:
Privacy is an important component of freedom and plays a key role in protecting fundamental human rights. It is becoming increasingly difficult to ignore the fact that without appropriate levels of privacy, a person’s rights are diminished. Users want to protect their privacy - particularly in “privacy invasive” areas such as social networks. However, Social Network users seldom know how protect their own privacy through online mechanisms. What is required is an emerging concept that provides users legitimate control over their own personal information, whilst preserving and maintaining the advantages of engaging with online services such as Social Networks. This paper reviews “Privacy by Design (PbD)” and shows how it applies to diverse privacy areas. Such an approach will move towards mitigating many of the privacy issues in online information systems and can be a potential pathway for protecting user’s personal information. The research has posed many questions in need of further investigation for different open source distributed Social Networks. Findings from this research will lead to a novel distributed architecture that provides more transparent and accountable privacy for the users of online information systems.
Resumo:
This thesis improves the process of recommending people to people in social networks using new clustering algorithms and ranking methods. The proposed system and methods are evaluated on the data collected from a real life social network. The empirical analysis of this research confirms that the proposed system and methods achieved improvements in the accuracy and efficiency of matching and recommending people, and overcome some of the problems that social matching systems usually suffer.
Resumo:
In this paper, we propose a semi-supervised approach of anomaly detection in Online Social Networks. The social network is modeled as a graph and its features are extracted to detect anomaly. A clustering algorithm is then used to group users based on these features and fuzzy logic is applied to assign degree of anomalous behavior to the users of these clusters. Empirical analysis shows effectiveness of this method.
Resumo:
Arid systems are markedly different from non-arid systems. This distinctiveness extends to arid-social networks, by which we mean social networks which are influenced by the suite of factors driving arid and semi-arid regions. Neither the process of how aridity interacts with social structure, nor what happens as a result of this interaction, is adequately understood. This paper postulates three relative characteristics which make arid-social networks distinct: that they are tightly bound, are hierarchical in structure and, hence, prone to power abuses, and contain a relatively higher proportion of weak links, making them reactive to crisis. These ideas were modified from workshop discussions during 2006. Although they are neither tested nor presented as strong beliefs, they are based on the anecdotal observations of arid-system scientists with many years of experience. This paper does not test the ideas, but rather examines them in the context of five arid-social network case studies with the aim of hypotheses building. Our cases are networks related to pastoralism, Aboriginal outstations, the ‘Far West Coast Aboriginal Enterprise Network’ and natural resources in both the Lake-Eyre basin and the Murray–Darling catchment. Our cases highlight that (1) social networks do not have clear boundaries, and that how participants perceive their network boundaries may differ from what network data imply, (2) although network structures are important determinants of system behaviour, the role of participants as individuals is still pivotal, (3) and while in certain arid cases weak links are engaged in crisis, the exact structure of all weak links in terms of how they place participants in relation to other communities is what matters.
Resumo:
This research has established a new privacy framework, privacy model, and privacy architecture to create more transparent privacy for social networking users. The architecture is designed into three levels: Business, Data, and Technology, which is based on The Open Group Architecture Framework (TOGAF®). This framework and architecture provides a novel platform for investigating privacy in Social Networks (SNs). This approach mitigates many current SN privacy issues, and leads to a more controlled form of privacy assessment. Ultimately, more privacy will encourage more connections between people across SN services.
Resumo:
This study explores the professional development strategies of digital content professionals in Australian micro businesses. This thesis presents the argument that as these professionals are working in cutting edge creative fields where digital technology drives ongoing change, formal education experiences may be less important than for other professionals, and that specific types of online and face-to-face socially mediated informal learning strategies may be critical to currency. This thesis documents the findings of a broad survey of industry professionals' learning needs and development strategies, in conjunction with rich data from in-depth interviews and social network analyses.
Resumo:
Organisations employ Enterprise Social Networks (ESNs) (such as Yammer) expecting better intra-organisational communication and collaboration. However, ESNs are struggling to gain momentum and wide adoption among users. Promoting user participation is a challenge, particularly in relation to lurkers – the silent ESN members who do not contribute any content. Building on behaviour change research, we propose a three-route model consisting of the central, peripheral and coercive routes of influence that depict users’ cognitive strategies, and we examine how management interventions (e.g. sending promotional emails) impact users’ beliefs and (consequent) posting and lurking behaviours in ESNs. Furthermore, we identify users’ salient motivations to lurk or post. We employ a multi-method research design to conceptualise, operationalise and validate the research model. This study has implications for academics and practitioners regarding the nature, patterns and outcomes of management interventions in prompting ESN.
Resumo:
Enterprise social networks provide benefits especially for knowledge-intensive work as they enable communication, collaboration and knowledge exchange. These platforms should therefore lead to increased adoption and use by knowledge-intensive workers such as consultants or indeed researchers. Our interest is in ascertaining whether scientific researchers use enterprise social networks as part of their work practices. This focus is motivated by an apparent schism between a need for researchers to exchange knowledge and profile themselves, and the aversion to sharing breakthrough ideas and joining in an ever-increasing publishing and marketing game. We draw on research on academic work practices and impression management to develop a model of academics’ ESN usage for impression management tactics. We describe important constructs of our model, offer strategies for their operationalization and give an outlook to our ongoing empirical study of the use of an ESN platform by 20 schools across six faculties at an Australian university.
Resumo:
This research is a step forward in improving the accuracy of detecting anomaly in a data graph representing connectivity between people in an online social network. The proposed hybrid methods are based on fuzzy machine learning techniques utilising different types of structural input features. The methods are presented within a multi-layered framework which provides the full requirements needed for finding anomalies in data graphs generated from online social networks, including data modelling and analysis, labelling, and evaluation.
Resumo:
In this work, we present the challenges associated with the two-way recommendation methods in social networks and the solutions. We discuss them from the perspective of community-type social networks such as online dating networks.
Resumo:
Although a substantial amount of cross-cultural psychology research has investigated acculturative stress in general, little attention has been devoted specifically to communication-related acculturative stress (CRAS). In line with the view that cross-cultural adaptation and second language (L2) learning are social and interpersonal phenomena, the present study examines the hypothesis that migrants’ L2 social network size and interconnectedness predict CRAS. The main idea underlying this hypothesis is that L2 social networks play an important role in fostering social and cultural aspects of communicative competence. Specifically, higher interconnectedness may reflect greater access to unmodified natural cultural representations and L2 communication practices, thus fostering communicative competence through observational learning. As such, structural aspects of migrants’ L2 social networks may be protective against acculturative stress arising from chronic communication difficulties. Results from a study of first generation migrant students (N = 100) support this idea by showing that both inclusiveness and density of the participants’ L2 network account for unique variance in CRAS but not in general acculturative stress. These results support the idea that research on cross-cultural adaptation would benefit from disentangling the various facets of acculturative stress and that the structure of migrants’ L2 network matters for language related outcomes. Finally, this study contributes to an emerging body of work that attempts to integrate cultural/cross-cultural research on acculturation and research on intercultural communication and second language learning.
Resumo:
Enterprise social networks (ESNs) often fail if there are few or no contributors of content. Promotional messages are among the common interventions used to improve participation. While most users only read others’ content (i.e. lurk), contributors who create content (i.e. post) account for only 1% of the users. Research on interventions to improve participation across dissimilar groups is scarce especially in work settings. We develop a model that examines four key motivations of posting and lurking. We employ the elaboration likelihood model to understand how promotional messages influence lurkers’ and posters’ beliefs and participation. We test our model with data collected from 366 members in two corporate Google⁺ communities in a large Australian retail organization. We find that posters and lurkers are motivated and hindered by different factors. Promotional messages do not – always – yield the hoped-for results among lurkers; however, they do make posters more enthusiastic to participate.