792 resultados para Travel social media
Resumo:
This article examines social network users’ legal defences against content removal under the EU and ECHR frameworks, and their implications for the effective exercise of free speech online. A review of the Terms of Use and content moderation policies of two major social network services, Facebook and Twitter, shows that end users are unlikely to have a contractual defence against content removal. Under the EU and ECHR frameworks, they may demand the observance of free speech principles in state-issued blocking orders and their implementation by intermediaries, but cannot invoke this ‘fair balance’ test against the voluntary removal decisions by the social network service. Drawing on practical examples, this article explores the threat to free speech created by this lack of accountability: Firstly, a shift from legislative regulation and formal injunctions to public-private collaborations allows state authorities to influence these ostensibly voluntary policies, thereby circumventing constitutional safeguards. Secondly, even absent state interference, the commercial incentives of social media cannot be guaranteed to coincide with democratic ideals. In light of the blurring of public and private functions in the regulation of social media expression, this article calls for the increased accountability of the social media services towards end users regarding the observance of free speech principles
Resumo:
Social networks offer horizontal integration for any mobile platform providing app users with a convenient single sign-on point. Nonetheless, there are growing privacy concerns regarding its use. These vulnerabilities trigger alarm among app developers who fight for their user base: While they are happy to act on users’ information collected via social networks, they are not always willing to sacrifice their adoption rate for this goal. So far, understanding of this trade-off has remained ambiguous. To fill this gap, we employ a discrete choice experiment to explore the role of Facebook Login and investigate the impact of accompanying requests for different information items / actions in the mobile app adoption process. We quantify users’ concerns regarding these items in monetary terms. Beyond hands-on insights for providers, our study contributes to the theoretical discourse on the value of privacy in the growing world of Social Media and mobile web.
Resumo:
Research findings on how participation in social networking sites (SNSs) affects users’ subjective well-being are equivocal. Some studies suggest a positive impact of SNSs on users’ life satisfaction and mood, whereas others report undesirable consequences such as depressive symptoms and anxiety. However, whereas the factors behind the positive effects have received significant scholarly attention, little is known about the mechanisms that underlie the unfavorable consequences. To fill this gap, this study uses social comparison theory and the responses of 1,193 college-age Facebook users to investigate the role of envy in the SNS context as a potential contributor to those undesirable outcomes. Arising in response to social information consumption, envy is shown to be associated with reduced cognitive and affective well-being as well as increased reactive self-enhancement. These preliminary findings contribute to the growing body of information systems research investigating the dysfunctional consequences of information technology adoption in general and social media participation in particular.
Resumo:
Uruguay has some of the strictest tobacco-control laws in Latin America. Despite this, youth smoking rates in Uruguay are amongst the highest in South America. Thus, it is important to identify strategies to prevent youth smoking in Uruguay. The current qualitative research study sought to identify intrapersonal and socioenvironmental factors that are associated with smoking among middle school youth in Uruguay. It also sought to develop potential prevention strategies and media messages that would resonate with youth for a social media campaign. The study was grounded in social cognitive theory and the theory of reasoned action/planned behavior, among other behavioral science theories; anthropological perspectives were also considered. To achieve these goals, 29 group and individual structured interviews were conducted in two private middle schools catering to lower and higher SES youth in Montevideo, Uruguay during the summer of 2012. One hundred and three study participants, including students, parents, and teachers, were interviewed. The structured interviews were recorded, transcribed, translated, back translated, coded and analyzed. The study findings show that positive attitudes towards smoking (i.e. to be seen, to increase status, to ensure women's equality, to looking old, and to service as a rite of passage), delinquent behavior (i.e. transgression/deviant behavior), social norms that support smoking (i.e. peer pressure and modeling, group membership/sense of belonging, parental modeling, and family support), easy access and availability to tobacco (i.e. retails stores) were factors associated with youth smoking. Potential protective factors may include parental support, negative attitudes towards smoking, sports/music, and smoke-free environments. Because study participants are accustomed to government-sponsored strong countermarketing graphic imaging, study participants selected even stronger images and messages as the preferred way to receive tobacco prevention messages. Something Real ("Algo Real") was a theme that resonated with the participants and chosen as the name for the proposed campaign. This campaign was designed as a multiple component intervention that included mass, school base, and family based strategies to prevent tobacco use. Some intervention materials specific to these intervention components were developed to target relevant intrapersonal and socioenvironmental factors identified above. These materials will be tested in future pilot studies and larger scale evaluation with this population, outside the scope of this dissertation. ^
Resumo:
El documento se divide en dos grandes puntos: La utilización de las redes sociales en el deporte y con mayor detalle en el fútbol. El análisis de viabilidad de instalar una red social especializada para futbolistas amateur. Respecto al primero, presenta como se está usando el Social Media (SM) en los deportes, porque el actual y vertiginoso cambio en la sociedad, con la implantación de las redes sociales, proporciona una excelente forma de llegar a mercados que hace décadas eran inalcanzables. En base a lo anterior se presentan los casos de mejores prácticas de la industria deportiva en cuanto a redes sociales y cómo funcionan, y las nuevas tendencias en el tema. Además se presenta al fútbol desde un punto de vista estratégico tanto en su parte gerencial como en SM. Con lo anterior se deducen las buenas prácticas y las medidas que deberían implementarse para ampliar mercados y dar notoriedad en el mundo virtual a los clubes y ligas europeas de fútbol. Sobre el segundo punto, se plantea la viabilidad de una nueva red social para un target muy específico. Para esto se estudian las redes sociales existentes en el mercado viendo sus puntos débiles y fuertes. De todas las redes sociales analizadas, sólo hay una red social deportiva que es viable y funciona económicamente. Esta firma tiene en su cartera de productos la idea diferenciadora de la red social propuesta, validando así la propuesta del autor.
Resumo:
Usualmente las personas solemos buscar información ya sea escrita o digital acerca de las distintas enfermedades de las cuales padecemos o estamos expuestos medicamentos, así también de los distintos fármacos que nos son recetados por los médicos especialistas y de los laboratorios productores de los mismos. Existen muchos foros en internet especializados en salud y medicina en la cual podemos localizar información útil acerca de nuestros intereses en estos temas, así también podemos encontrar información muy valiosa en las principales redes sociales, pero no sería mejor poder tener toda esta información concentrada en una sola fuente en la cual poder realizar todas nuestras búsquedas acerca de los principales conceptos y definiciones, estadísticas, principales competidores de los fármacos que buscamos y de sus fabricantes al igual que especializadas graficas estadísticas que nos digan cuales son las cosas más importantes que se comentan de ellos y saber quiénes son los principales líderes de opinión en estos temas particulares. Kantar Heatlh España proveerá de un muy poderoso sitio web el cual nos permitirá consultar acerca de nuestras principales inquietudes acerca de estos temas como son: Fármacos, Patologías, Laboratorios, y Líderes de Opinión. Esta herramienta tiene un gran motor de recopilación de información basado en Social Media Listening (SML) la cual mantendrá el sitio siempre actualizado con los últimos comentarios, noticias y eventos que acontezcan en el entorno médico y farmacéutico. El presente proyecto tiene la finalidad de proponer una plataforma móvil basada en los principales servicios provistos por Social Pharma, que desde su origen tendrá un modelo de negocio claro. Este documento abarca el plan de negocio de la aplicación móvil, Social Pharma Aplicación Móvil, basada en sitios de recopilación de información médica, por medio de la cual poder prestar un servicio a los usuarios y a las distintas compañías productoras de fármacos información para que ambos conozcan los intereses y las oportunidades existentes. Además contiene la especificación de requisitos y de los casos de usos, que en conjunto conforman las bases para el diseño de un prototipo de alta fidelidad. Dicho prototipo no solo permite la revisión y validación de los requisitos funcionales sino que también sirve como base para el futuro desarrollo de la aplicación.
Resumo:
This paper describes the potential impact of social media and new technologies in secondary education. The case of study has been designed for the drama and theatre subject. A wide set of tools like social networks, blogs, internet, multimedia content, local press and other promotional tools are promoted to increase students’ motivation. The experiment was developed at the highschool IES Al-Satt located in Algete in the Comunidad de Madrid. The students included in the theatre group present a low academic level, 80% of them had previously repeated at least one grade, half of them come from programs for students with learning difficulties and were at risk of social exclusion. This action is supported by higher and secondary education professors and teachers who look forward to implanting networked media technologies as new tools to improve the academic results and the degree of involvement of students. The results of the experiment have been excellent, based on satisfactory opinions obtained from a survey answered by students at the end of the course, and also revealed by the analytics taken from different social networks. This project is a pioneer in the introduction and usage of new technologies in secondary high-schools in Spain.
Resumo:
This paper analyses the relationship between productive efficiency and online-social-networks (OSN) in Spanish telecommunications firms. A data-envelopment-analysis (DEA) is used and several indicators of business ?social Media? activities are incorporated. A super-efficiency analysis and bootstrapping techniques are performed to increase the model?s robustness and accuracy. Then, a logistic regression model is applied to characterise factors and drivers of good performance in OSN. Results reveal the company?s ability to absorb and utilise OSNs as a key factor in improving the productive efficiency. This paper presents a model for assessing the strategic performance of the presence and activity in OSN.
Resumo:
La evolución de Internet al modelo Web 2.0, ha creado el nuevo sistema denominado Social Media, donde han proliferado un número ingente de redes sociales, que han cambiado las formas de relación y colaboración entre los usuarios, así como la relaciones de éstos y las empresas. En respuesta a estos dramáticos cambios sociales y tecnológicos, que actualmente están dando forma a las relaciones negocio-empresa, las empresas están descubriendo que es necesario modificar la estrategia de utilización del CRM (Customer Relationship Management) con sus clientes y desarrollar nuevas capacidades que permitan la creación de valor con los clientes. Y es aquí donde aparece el concepto de Social CRM, entendido como una estrategia centrada en entender, anticiparse y responder mejor a las necesidades de los clientes existentes o potenciales, aprovechando los datos sociales, para crear unas fuertes relaciones beneficiosas para ambas partes. En este trabajo se describe un modelo de adopción de Social CRM, aplicando un método de análisis “Top-Down”, y basado en el modelo de Gartner denominado “The Eight Building Blocks of CRM” [1]. El presente trabajo descompone el modelo de adopción descrito por Gartner, en los siguientes puntos. - Una decisión estratégica de la compañía - Asomarse a la realidad social - Analizar las redes sociales. - Metodología de adopción. - Despliegue y extensión en todos los departamentos de la compañía y la adaptación de los recursos humanos. - Selección e integración con las plataformas tradicionales de CRM - Análisis de herramientas de monitorización de Social CRM El modelo propuesto tiene dos objetivos, por un lado pretende proporcionar la visión de cómo CRM puede influir en los resultados empresariales en la era del cliente social, y por otro, proporcionar a los administradores cómo las inversiones y los recursos existentes de CRM puede ser integrados con las nuevas tecnologías y procesos para formar capacidades que pueden mejorar el rendimiento del negocio. ABSTRACT. “The Internet evolution to Web 2.0 model has created a new system called Social Media, where have proliferated a huge number of social networks which have changed the relationship and collaboration forms user-to-user and user-to-company. In response to these dramatic social and technological changes that are currently shaping the business-business relationships, companies are finding it necessary to modify the strategy for use of CRM (Customer Relationship Management) with customers and develop new capabilities to creating value with customers. And here is where the concept of Social CRM appears, understood as a focus on understanding, anticipating and responding to the needs of existing and potential customers strategy, leveraging social data to create a strong mutually beneficial relationships. In this paper describes an adoption model of Social CRM, using a "Top-Down" analysis method and based on the model of Gartner called "The Eight Building Blocks of CRM" [1]. This paper decomposes the adoption model described by Gartner in the following points. - A company strategic decision. - Look at social reality. - Analyze social networks. - Methodology adoption. - Deployment and extension in all departments of the company and the adaptation of human resources. - Selection and integration with traditional CRM platforms. - Analysis of monitoring tools for Social CRM. The proposed model has two objectives, firstly aims to provide insight into how CRM can influence business outcomes in the era of the social customer, and secondly, to provide administrators how investments and existing resources can be integrated CRM with new technologies and processes for developing capabilities that can increase business performance”.
Resumo:
The binomial knowledge/action understood under the biunivocal relationship of both components is the basis of planning from a postmodern approach. Within this binomial, social communication gives appropriate information, nurtures the knowledge that leads to transformative action, promotes participation and enhances the community?s self-esteem and recognition; to deeply reflect on action is a source of new knowledge; and communication fosters the adoption of the new knowledge by the community with new actions that feed the process knowledge/action as a planning source. From this approach the project Radio Message is born as a new communication channel with the aim of offering Andean indigenous communities from the area of Cayambe (Ecuador), a series of multidisciplinary training programs that enable transformative action with a strong effect on the life quality in these communities and their importance as social actors. The contents are designed through participatory communication between the training authorities and the communities themselves, analyzing their opportunities and needs. In this research the impact of social media in the development of more than 100 indigenous communities in Cayambe is analyzed.
Resumo:
El reciente crecimiento masivo de medios on-line y el incremento de los contenidos generados por los usuarios (por ejemplo, weblogs, Twitter, Facebook) plantea retos en el acceso e interpretación de datos multilingües de manera eficiente, rápida y asequible. El objetivo del proyecto TredMiner es desarrollar métodos innovadores, portables, de código abierto y que funcionen en tiempo real para generación de resúmenes y minería cross-lingüe de medios sociales a gran escala. Los resultados se están validando en tres casos de uso: soporte a la decisión en el dominio financiero (con analistas, empresarios, reguladores y economistas), monitorización y análisis político (con periodistas, economistas y políticos) y monitorización de medios sociales sobre salud con el fin de detectar información sobre efectos adversos a medicamentos.
Resumo:
This thesis originates from my interest in exploring how minorities are using social media to talk back to mainstream media. This study examines whether hashtags that trend on Twitter may impact how news stories related to minorities are covered in Canadian media. The Canadian Prime Minister Stephen Harper stated the niqab was “rooted in a culture that is anti-women” on 10 March 2015. The next day #DressCodePM trended in response to the PM’s niqab remarks. Using network gatekeeping theory, this study examines the types of sources quoted in the media stories published on 10 and 11 March 2015. The study’s goal is to explore whether using tweet quotes leads to the representation of a more diverse range of news sources. The study compares the types of sources quoted in stories that covered Harper’s comments without mentioning #DressCodePM versus stories that mention #DressCodePM. This study also uses Tuen A. van Dijk’s methodology of asking “who is speaking, how often and how prominently?” in order to examine whose voices have been privileged and whose voices have been marginalized in covering the niqab in Canadian media from the 1970s and until the days following the PM’s remarks. Network gatekeeping theory is applied in this study to assess whether the gated gained more power after #DressCodePM trended. The case study’s findings indicates that Caucasian male politicians were predominantly used as news sources in covering stories related to the niqab for the past 38 years in the Globe and Mail. The sourcing pattern of favouring politicians continued in Canadian print and online media on 10 March 2015 following Harper’s niqab comments. However, ordinary Canadian women, including Muslim women, were used more often than politicians as news sources in the stories about #DressCodePM that were published on 11 March 2015. The gated media users were able to gain power and attract Canadian Media’s attention by widely spreading #DressCodePM. This study draws attention to the lack of diversity of sources used in Canadian political news stories, yet this study also shows it is possible for the gated media users to amplify their voices through hashtag activism.
Resumo:
Thesis (Master's)--University of Washington, 2016-06
Resumo:
The popularity of online social media platforms provides an unprecedented opportunity to study real-world complex networks of interactions. However, releasing this data to researchers and the public comes at the cost of potentially exposing private and sensitive user information. It has been shown that a naive anonymization of a network by removing the identity of the nodes is not sufficient to preserve users’ privacy. In order to deal with malicious attacks, k -anonymity solutions have been proposed to partially obfuscate topological information that can be used to infer nodes’ identity. In this paper, we study the problem of ensuring k anonymity in time-varying graphs, i.e., graphs with a structure that changes over time, and multi-layer graphs, i.e., graphs with multiple types of links. More specifically, we examine the case in which the attacker has access to the degree of the nodes. The goal is to generate a new graph where, given the degree of a node in each (temporal) layer of the graph, such a node remains indistinguishable from other k-1 nodes in the graph. In order to achieve this, we find the optimal partitioning of the graph nodes such that the cost of anonymizing the degree information within each group is minimum. We show that this reduces to a special case of a Generalized Assignment Problem, and we propose a simple yet effective algorithm to solve it. Finally, we introduce an iterated linear programming approach to enforce the realizability of the anonymized degree sequences. The efficacy of the method is assessed through an extensive set of experiments on synthetic and real-world graphs.
Resumo:
With the advent of GPS enabled smartphones, an increasing number of users is actively sharing their location through a variety of applications and services. Along with the continuing growth of Location-Based Social Networks (LBSNs), security experts have increasingly warned the public of the dangers of exposing sensitive information such as personal location data. Most importantly, in addition to the geographical coordinates of the user’s location, LBSNs allow easy access to an additional set of characteristics of that location, such as the venue type or popularity. In this paper, we investigate the role of location semantics in the identification of LBSN users. We simulate a scenario in which the attacker’s goal is to reveal the identity of a set of LBSN users by observing their check-in activity. We then propose to answer the following question: what are the types of venues that a malicious user has to monitor to maximize the probability of success? Conversely, when should a user decide whether to make his/her check-in to a location public or not? We perform our study on more than 1 million check-ins distributed over 17 urban regions of the United States. Our analysis shows that different types of venues display different discriminative power in terms of user identity, with most of the venues in the “Residence” category providing the highest re-identification success across the urban regions. Interestingly, we also find that users with a high entropy of their check-ins distribution are not necessarily the hardest to identify, suggesting that it is the collective behaviour of the users’ population that determines the complexity of the identification task, rather than the individual behaviour.