934 resultados para social network websites


Relevância:

100.00% 100.00%

Publicador:

Resumo:

La Banque mondiale propose la bonne gouvernance comme la stratégie visant à corriger les maux de la mauvaise gouvernance et de faciliter le développement dans les pays en développement (Carayannis, Pirzadeh, Popescu & 2012; & Hilyard Wilks 1998; Leftwich 1993; Banque mondiale, 1989). Dans cette perspective, la réforme institutionnelle et une arène de la politique publique plus inclusive sont deux stratégies critiques qui visent à établir la bonne gouvernance, selon la Banque et d’autres institutions de Bretton Woods. Le problème, c’est que beaucoup de ces pays en voie de développement ne possèdent pas l’architecture institutionnelle préalable à ces nouvelles mesures. Cette thèse étudie et explique comment un état en voie de développement, le Commonwealth de la Dominique, s’est lancé dans un projet de loi visant l’intégrité dans la fonction publique. Cette loi, la Loi sur l’intégrité dans la fonction publique (IPO) a été adoptée en 2003 et mis en œuvre en 2008. Cette thèse analyse les relations de pouvoir entre les acteurs dominants autour de évolution de la loi et donc, elle emploie une combinaison de technique de l’analyse des réseaux sociaux et de la recherche qualitative pour répondre à la question principale: Pourquoi l’État a-t-il développé et mis en œuvre la conception actuelle de la IPO (2003)? Cette question est d’autant plus significative quand nous considérons que contrairement à la recherche existante sur le sujet, l’IPO dominiquaise diverge considérablement dans la structure du l’IPO type idéal. Nous affirmons que les acteurs "rationnels," conscients de leur position structurelle dans un réseau d’acteurs, ont utilisé leurs ressources de pouvoir pour façonner l’institution afin qu’elle serve leurs intérêts et ceux et leurs alliés. De plus, nous émettons l’hypothèse que: d’abord, le choix d’une agence spécialisée contre la corruption et la conception ultérieure de cette institution reflètent les préférences des acteurs dominants qui ont participé à la création de ladite institution et la seconde, notre hypothèse rivale, les caractéristiques des modèles alternatifs d’institutions de l’intégrité publique sont celles des acteurs non dominants. Nos résultats sont mitigés. Le jeu de pouvoir a été limité à un petit groupe d’acteurs dominants qui ont cherché à utiliser la création de la loi pour assurer leur légitimité et la survie politique. Sans surprise, aucun acteur n’a avancé un modèle alternatif. Nous avons conclu donc que la loi est la conséquence d’un jeu de pouvoir partisan. Cette recherche répond à la pénurie de recherche sur la conception des institutions de l’intégrité publique, qui semblent privilégier en grande partie un biais organisationnel et structurel. De plus, en étudiant le sujet du point de vue des relations de pouvoir (le pouvoir, lui-même, vu sous l’angle actanciel et structurel), la thèse apporte de la rigueur conceptuelle, méthodologique, et analytique au discours sur la création de ces institutions par l’étude de leur genèse des perspectives tant actancielles que structurelles. En outre, les résultats renforcent notre capacité de prédire quand et avec quelle intensité un acteur déploierait ses ressources de pouvoir.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In 2013 the European Commission launched its new green infrastructure strategy to make another attempt to stop and possibly reverse the loss of biodiversity until 2020, by connecting habitats in the wider landscape. This means that conservation would go beyond current practices to include landscapes that are dominated by conventional agriculture, where biodiversity conservation plays a minor role at best. The green infrastructure strategy aims at bottom-up rather than top-down implementation, and suggests including local and regional stakeholders. Therefore, it is important to know which stakeholders influence land-use decisions concerning green infrastructure at the local and regional level. The research presented in this paper served to select stakeholders in preparation for a participatory scenario development process to analyze consequences of different implementation options of the European green infrastructure strategy. We used a mix of qualitative and quantitative social network analysis (SNA) methods to combine actors’ attributes, especially concerning their perceived influence, with structural and relational measures. Further, our analysis provides information on institutional backgrounds and governance settings for green infrastructure and agricultural policy. The investigation started with key informant interviews at the regional level in administrative units responsible for relevant policies and procedures such as regional planners, representatives of federal ministries, and continued at the local level with farmers and other members of the community. The analysis revealed the importance of information flows and regulations but also of social pressure, considerably influencing biodiversity governance with respect to green infrastructure and biodiversity.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Social networks are a recent phenomenon of communication, with a high prevalence of young users. This concept serves as a motto for a multidisciplinary project, which aims to create a simple communication network, using light as the transmission medium. Mixed team, composed by students from secondary and higher education schools, are partners on the development of an optical transceiver. A LED lamp array and a small photodiode are the optical transmitter and receiver, respectively. Using several transceivers aligned with each other, this con guration creates a ring communication network, enabling the exchange of messages between users. Through this project, some concepts addressed in physics classes from secondary schools (e.g. photoelectric phenomena and the properties of light) are experimentally veri ed and used to communicate, in a classroom or a laboratory.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Social network perspectives acknowledge the influence of disciplinary cultures on academics’ teaching beliefs and practices with implications for academic developers. The contribution of academic developers in 18 scholarship of teaching and learning (SoTL) projects situated in the sciences are explored by drawing on data from a two-year national project in Australia within a case study research design. The application of a social network lens illuminated the contribution of eight academic developers as weak ties who infused SoTL knowledge within teams. Two heuristic cases of academic developers who also linked across networks are presented. Implications of social network perspective are discussed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

As a project based industry, construction is portrayed through the short term and transitory nature of the industry. This is one of the factors that have been correlated to the poor safety performance of the construction industry. An essential part of safety performance, however, is the effective safety communication between all parties on construction projects. The construction industry is highly regulated due to its high incidence of work-place accidents. This is especially true of smaller building companies/enterprises where the burden of compliance to safety regulations is most onerous. The majority of current research in this topic area has focused on identifying the high risk components or the causes of increased risks. The literature on safety communication network patterns and its relation to safety performance is nevertheless minimal. Thus, this study takes the opportunity to explore the safety communication issue by analyzing the communications patterns in small workgroups. In a pilot study, through surveys with construction crews that are contributing to active construction projects in Sydney, Australia, patterns of safety communications were identified using social network analysis (SNA). The findings, though preliminary, has identified safety communication network patterns under formal communications and toolbox talks may determine a small group’s safety performance.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

As the need for social network data publishing continues to increase, how to preserve the privacy of the social network data before publishing is becoming an important and challenging issue. A common approach to address this issue is through anonymization of the social network structure. The problem with altering the structure of the links relationship in social network data is how to balance between the gain of privacy and the loss of information (data utility). In this paper, we address this problem. We propose a utility-aware social network graph anonymization. The approach is based on a new metric that calculates the utility impact of social network link modification. The metric utilizes the shortest path length and the neighborhood overlap as the utility value. The value is then used as a weight factor in preserving structural integrity in the social network graph anonymization. For any modification made to the social network links, the proposed approach guarantees that the distance between vertices in the modified social network stays as close as the original social network graph prior to the modification. Experimental evaluation shows that the proposed metric improves the utility preservation as compared to the number-of-change metric.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study identifies key factors driving the organizational adoption of Social Recruiting (SR) technologies, such as LinkedIn, Facebook, and Twitter. The Technology, Organization and Environment (TOE) framework, as an initial exploratory approach, is used to identify underlying factors of new technology adoption. Qualitative evidence collected from twelve Australian firms serves to specifically categorise key determinants of the organizational adoption of social recruiting technologies. It is found that, apart from several technology, organization and environment factors that significantly influence the organizational decision-making with reference to social recruiting, top management support is seen as imperative for successful adoption of recruiting technologies. Formalisation, comprehensiveness, and strategic orientation of organizational human resource departments are closely linked to adoption of social recruiting at the firm level. In addition, job applicants’ readiness and local success stories have driven firms to adopt social recruiting technologies. The study extends and modifies the TOE model to provide the theoretical foundations of social recruiting in the context of Australian organizations and help human resource professionals and practitioners to gain a better understanding of key drivers of organizational social recruiting.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The introduction of online social networks (OSN) has transformed the way people connect and interact with each other as well as share information. OSN have led to a tremendous explosion of network-centric data that could be harvested for better understanding of interesting phenomena such as sociological and behavioural aspects of individuals or groups. As a result, online social network service operators are compelled to publish the social network data for use by third party consumers such as researchers and advertisers. As social network data publication is vulnerable to a wide variety of reidentification and disclosure attacks, developing privacy preserving mechanisms are an active research area. This paper presents a comprehensive survey of the recent developments in social networks data publishing privacy risks, attacks, and privacy-preserving techniques. We survey and present various types of privacy attacks and information exploited by adversaries to perpetrate privacy attacks on anonymized social network data. We present an in-depth survey of the state-of-the-art privacy preserving techniques for social network data publishing, metrics for quantifying the anonymity level provided, and information loss as well as challenges and new research directions. The survey helps readers understand the threats, various privacy preserving mechanisms, and their vulnerabilities to privacy breach attacks in social network data publishing as well as observe common themes and future directions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Online social networks make it easier for people to find and communicate with other people based on shared interests, values, membership in particular groups, etc. Common social networks such as Facebook and Twitter have hundreds of millions or even billions of users scattered all around the world sharing interconnected data. Users demand low latency access to not only their own data but also theirfriends’ data, often very large, e.g. videos, pictures etc. However, social network service providers have a limited monetary capital to store every piece of data everywhere to minimise users’ data access latency. Geo-distributed cloud services with virtually unlimited capabilities are suitable for large scale social networks data storage in different geographical locations. Key problems including how to optimally store and replicate these huge datasets and how to distribute the requests to different datacenters are addressed in this paper. A novel genetic algorithm-based approach is used to find a near-optimal number of replicas for every user’s data and a near-optimal placement of replicas to minimise monetary cost while satisfying latency requirements for all users. Experiments on a large Facebook dataset demonstrate our technique’s effectiveness in outperforming other representative placement and replication strategies.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

La diffusione dei Social Network ha portato alla necessità di utilizzare tecniche per fare copyright e autenticazione dei file su di essi diffusi. Viene presentato un metodo di watermarking testuale basato sulla sostituzione dei caratteri omoglifi e studiato nell'ambiente dei Social Network. E' stata posta particolare attenzione sulla possibilità che questi adottino già tecniche di watermarking testuale e successivamente sono state studiate le potenzialità dell'algoritmo proposto sulle diverse piattaforme, valutandone la percentuale di successo, la robustezza e l'invisibilità.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

La diffusione dei social network ha permesso ad un elevato numero di persone di condividere i propri contenuti multimediali (testo, foto, video) con una larga platea di contatti. Potenzialmente questi contenuti possono essere condivisi anche con persone non direttamente collegate al proprietario. Uno dei comportamenti più diffuso degli utenti dei social network è la condivisione di foto. In questo contesto diventa importante riconoscere e preservare la proprietà di un'immagine. Lo studio effettuato in questo documento quindi, si prefigge lo scopo di controllare se i social network inseriscano un qualche watermark all'interno dell'immagine caricata. L'elaborato inoltre cerca di capire, analizzando e testando vari algoritmi di watermarking su immagini condivise, come le firme digitali vengano inserite all'interno di una foto e come queste rispondano alle alterazioni da parte dei social network.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Social organization is often studied through point estimates of individual association or interaction patterns, which does not account for temporal changes in the course of familiarization processes and the establishment of social dominance. Here, we present new insights on short-term temporal dynamics in social organization of mixed-sex groups that have the potential to affect sexual selection patterns. Using the live-bearing Atlantic molly (Poecilia mexicana), a species with pronounced male size polymorphism, we investigated social network dynamics of mixed sex experimental groups consisting of eight females and three different-sized males over a period of 5 days. Analyzing association-based social networks as well as direct measures of spatial proximity, we found that large males tended to monopolize most females, while excluding small- and medium-bodied males from access to females. This effect, however, emerged only gradually over time, and different-sized males had equal access to females on day 1 as well as day 2, though to a lesser extent. In this highly aggressive species with strong social dominance stratifications, the observed temporal dynamics in male-female association patterns may balance the presumed reproductive skew among differentially competitive male phenotypes when social structures are unstable (i.e., when individual turnover rates are moderate to high). Ultimately, our results point toward context-dependent sexual selection arising from temporal shifts in social organization.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Twitter is a very popular social network website that allows users to publish short posts called tweets. Users in Twitter can follow other users, called followees. A user can see the posts of his followees on his Twitter profile home page. An information overload problem arose, with the increase of the number of followees, related to the number of tweets available in the user page. Twitter, similar to other social network websites, attempts to elevate the tweets the user is expected to be interested in to increase overall user engagement. However, Twitter still uses the chronological order to rank the tweets. The tweets ranking problem was addressed in many current researches. A sub-problem of this problem is to rank the tweets for a single followee. In this paper we represent the tweets using several features and then we propose to use a weighted version of the famous voting system Borda-Count (BC) to combine several ranked lists into one. A gradient descent method and collaborative filtering method are employed to learn the optimal weights. We also employ the Baldwin voting system for blending features (or predictors). Finally we use the greedy feature selection algorithm to select the best combination of features to ensure the best results.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

As transformações sociais advindas da popularização de Tecnologias da Informação e Comunicação (TICs) como a Internet são flagrantes. E a regulamentação destas novas práticas deve ser condizente com as peculiaridades das relações jurídicas desenvolvidas neste âmbito. Este trabalho visa analisar o problema da responsabilidade civil por danos à pessoa humana sofridos no âmbito dos sites de redes sociais pela criação e uso de perfis falsos. Assim, primeiramente, faz-se uma análise introdutória do fenômeno da Internet e das visões sobre as possíveis formas de regulamentação jurídica das condutas praticadas por meio da Rede. Posteriormente, adstringe-se à temática dos danos morais, buscando-se conceituá-los sob a ótica civil constitucional, como danos à pessoa humana. Finalmente, chega-se ao estudo dos perfis falsos, enfrentando-se a problemática dos danos morais sofridos por seu manejo. São desdobradas em três subproblemas: se são ou não capazes civilmente os usuários, chegando-se ao estudo dos perfis de menores de idade; se existem ou não as pessoas representadas nos perfis, subdividindo-se a análise nas hipóteses de perfis criados em roubo de identidade e perfis que representem criações intelectuais e; se estão ou não vivas as pessoas descritas nos perfis, trazendo-se à baila a hipótese dos perfis de pessoas falecidas.