788 resultados para Analysis of social nets


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Social media channels, such as Facebook or Twitter, allow for people to express their views and opinions about any public topics. Public sentiment related to future events, such as demonstrations or parades, indicate public attitude and therefore may be applied while trying to estimate the level of disruption and disorder during such events. Consequently, sentiment analysis of social media content may be of interest for different organisations, especially in security and law enforcement sectors. This paper presents a new lexicon-based sentiment analysis algorithm that has been designed with the main focus on real time Twitter content analysis. The algorithm consists of two key components, namely sentiment normalisation and evidence-based combination function, which have been used in order to estimate the intensity of the sentiment rather than positive/negative label and to support the mixed sentiment classification process. Finally, we illustrate a case study examining the relation between negative sentiment of twitter posts related to English Defence League and the level of disorder during the organisation’s related events.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this digital age organizations must focus on connecting with candidates and aspire for innovation in recruiting practices to remain competitive. This author investigated social networking to determine whether or not it provides reliable candidate information when recruiting for hire. Online media such as LinkedIn, Facebook, Twitter and MySpace, have become an integrated part of social and professional lives. Analysis of social networking revealed use for recruiting but posed challenges and advantages for organizations. A quantitative cross-sectional survey of social network members (N=136) indicated discrepancy in generational use of social networks and concerns regarding the validity and reliability of candidate information. Social networking promotes innovation in recruiting, however, by itself might not endorse equitability, validity and reliability.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Se presenta en este trabajo una aproximación metodológica al estudio de uso de revistas por parte de investigadores. Integrando la técnica de Análisis de Citaciones (AC) y de Análisis de Redes Sociales (ARS) se elaboran mapas bibliométricos que aportan capacidad de síntesis de información compleja. Se estima que su utilización en la evaluación de colecciones aportaría información valiosa para la distribución equitativa de los recursos económicos destinados a la compra de títulos, y para la optimización de su disponibilidad y acceso.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Se presenta en este trabajo una aproximación metodológica al estudio de uso de revistas por parte de investigadores. Integrando la técnica de Análisis de Citaciones (AC) y de Análisis de Redes Sociales (ARS) se elaboran mapas bibliométricos que aportan capacidad de síntesis de información compleja. Se estima que su utilización en la evaluación de colecciones aportaría información valiosa para la distribución equitativa de los recursos económicos destinados a la compra de títulos, y para la optimización de su disponibilidad y acceso.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Se presenta en este trabajo una aproximación metodológica al estudio de uso de revistas por parte de investigadores. Integrando la técnica de Análisis de Citaciones (AC) y de Análisis de Redes Sociales (ARS) se elaboran mapas bibliométricos que aportan capacidad de síntesis de información compleja. Se estima que su utilización en la evaluación de colecciones aportaría información valiosa para la distribución equitativa de los recursos económicos destinados a la compra de títulos, y para la optimización de su disponibilidad y acceso.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis critically analyses sperm donation practices from a child-centred perspective. It examines the effects, both personal and social, of disrupting the unity of biological and social relatedness in families affected by donor conception. It examines how disruption is facilitated by a process of mediation which is detailed using a model provided by Sunderland (2002). This model identifies mediating movements - alienation, translation, re-contextualisation and absorption - which help to explain the powerful and dominating material, and social and political processes which occur in biotechnology, or in reproductive technology in this case. The understanding of such movements and mediation of meanings is inspired by the complementary work of Silverstone (1999) and Sunderland. This model allows for a more critical appreciation of the movement of meaning from previously inalienable aspects of life to alienable products through biotechnology (Sunderland, 2002). Once this mediation in donor conception is subjected to critical examination here, it is then approached from different angles of investigation. The thesis posits that two conflicting notions of the self are being applied to fertility-frustrated adults and the offspring of reproductive interventions. Adults using reproductive interventions receive support to maximise their genetic continuity, but in so doing they create and dismiss the corresponding genetic discontinuity produced for the offspring. The offspring’s kinship and identity are then framed through an experimental postmodernist notion, presenting them as social rather than innate constructs. The adults using the reproductive intervention, on the other hand, have their identity and kinship continuity framed and supported as normative, innate, and based on genetic connection. This use of shifting frameworks is presented as unjust and harmful, creating double standards and a corrosion of kinship values, connection and intelligibility between generations; indeed, it is put forward as adult-centric. The analysis of other forms of human kinship dislocation provided by this thesis explores an under-utilised resource which is used to counter the commonly held opinion that any disruption of social and genetic relatedness for donor offspring is insignificant. The experiences of adoption and the stolen generations are used to inform understanding of the personal and social effects of such kinship disruption and potential reunion for donor offspring. These examples, along with laws governing international human rights, further strengthen the appeal here for normative principles and protections based on collective knowledge and standards to be applied to children of reproductive technology. The thesis presents the argument that the framing and regulation of reproductive technology is excessively influenced by industry providers and users. The interests of these parties collide with and corrode any accurate assessments and protections afforded to the children of reproductive technology. The thesis seeks to counter such encroachments and concludes by presenting these protections, frameworks, and human experiences as resources which can help to address the problems created for the offspring of such reproductive interventions, thereby illustrating why these reproductive interventions should be discontinued.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Analyzing security protocols is an ongoing research in the last years. Different types of tools are developed to make the analysis process more precise, fast and easy. These tools consider security protocols as black boxes that can not easily be composed. It is difficult or impossible to do a low-level analysis or combine different tools with each other using these tools. This research uses Coloured Petri Nets (CPN) to analyze OSAP trusted computing protocol. The OSAP protocol is modeled in different levels and it is analyzed using state space method. The produced model can be combined with other trusted computing protocols in future works.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Workflow nets, a particular class of Petri nets, have become one of the standard ways to model and analyze workflows. Typically, they are used as an abstraction of the workflow that is used to check the so-called soundness property. This property guarantees the absence of livelocks, deadlocks, and other anomalies that can be detected without domain knowledge. Several authors have proposed alternative notions of soundness and have suggested to use more expressive languages, e.g., models with cancellations or priorities. This paper provides an overview of the different notions of soundness and investigates these in the presence of different extensions of workflow nets.We will show that the eight soundness notions described in the literature are decidable for workflow nets. However, most extensions will make all of these notions undecidable. These new results show the theoretical limits of workflow verification. Moreover, we discuss some of the analysis approaches described in the literature.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Online social networks can be found everywhere from chatting websites like MSN, blogs such as MySpace to social media such as YouTube and second life. Among them, there is one interesting type of online social networks, online dating network that is growing fast. This paper analyzes an online dating network from social network analysis point of view. Observations are made and results are obtained in order to suggest a better recommendation system for people-to-people networks.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The use of Trusted Platform Module (TPM) is be- coming increasingly popular in many security sys- tems. To access objects protected by TPM (such as cryptographic keys), several cryptographic proto- cols, such as the Object Specific Authorization Pro- tocol (OSAP), can be used. Given the sensitivity and the importance of those objects protected by TPM, the security of this protocol is vital. Formal meth- ods allow a precise and complete analysis of crypto- graphic protocols such that their security properties can be asserted with high assurance. Unfortunately, formal verification of these protocols are limited, de- spite the abundance of formal tools that one can use. In this paper, we demonstrate the use of Coloured Petri Nets (CPN) - a type of formal technique, to formally model the OSAP. Using this model, we then verify the authentication property of this protocol us- ing the state space analysis technique. The results of analysis demonstrates that as reported by Chen and Ryan the authentication property of OSAP can be violated.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Purpose – This paper aims to provide insights into the moral values embodied by a popular social networking site (SNS), Facebook. Design/methodology/approach – This study is based upon qualitative fieldwork, involving participant observation, conducted over a two-year period. The authors adopt the position that technology as well as humans has a moral character in order to disclose ethical concerns that are not transparent to users of the site. Findings – Much research on the ethics of information systems has focused on the way that people deploy particular technologies, and the consequences arising, with a view to making policy recommendations and ethical interventions. By focusing on technology as a moral actor with reach across and beyond the internet, the authors reveal the complex and diffuse nature of ethical responsibility and the consequent implications for governance of SNS. Research limitations/implications – The authors situate their research in a body of work known as disclosive ethics, and argue for an ongoing process of evaluating SNS to reveal their moral importance. Along with that of other authors in the genre, this work is largely descriptive, but the paper engages with prior research by Brey and Introna to highlight the scope for theory development. Practical implications – Governance measures that require the developers of social networking sites to revise their designs fail to address the diffuse nature of ethical responsibility in this case. Such technologies need to be opened up to scrutiny on a regular basis to increase public awareness of the issues and thereby disclose concerns to a wider audience. The authors suggest that there is value in studying the development and use of these technologies in their infancy, or if established, in the experiences of novice users. Furthermore, flash points in technological trajectories can prove useful sites of investigation. Originality/value – Existing research on social networking sites either fails to address ethical concerns head on or adopts a tool view of the technologies so that the focus is on the ethical behaviour of users. The authors focus upon the agency, and hence the moral character, of technology to show both the possibilities for, and limitations of, ethical interventions in such cases.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

It is of course recognised that technology can be gendered and implicated in gender relations. However, it continues to be the case that men’s experiences with technology are underexplored and the situation is even more problematic where digital media is concerned. Over the past 30 years we have witnessed a dramatic rise in the pervasiveness of digital media across many parts of the world and as associated with wide ranging aspects of our lives. This rise has been fuelled over the last decade by the emergence of Web 2.0 and particularly Social Networking Sites (SNS). Given this context, I believe it is necessary for us to undertake more work to understand men’s engagements with digital media, the implications this might have for masculinities and the analysis of gender relations more generally. To begin to unpack this area, I engage theorizations of the properties of digital media networks and integrate this with the masculinity studies field. Using this framework, I suggest we need to consider the rise in what I call networked masculinities – those masculinities (co)produced and reproduced with digitally networked publics. Through this analysis I discuss themes related to digital mediators, relationships, play and leisure, work and commerce, and ethics. I conclude that as masculinities can be, and are being, complicated and given agency by advancing notions and practices of connectivity, mobility, classification and convergence, those engaged with masculinity studies and digital media have much to contribute.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

To prevent unauthorized access to protected trusted platform module (TPM) objects, authorization protocols, such as the object-specific authorization protocol (OSAP), have been introduced by the trusted computing group (TCG). By using OSAP, processes trying to gain access to the protected TPM objects need to prove their knowledge of relevant authorization data before access to the objects can be granted. Chen and Ryan’s 2009 analysis has demonstrated OSAP’s authentication vulnerability in sessions with shared authorization data. They also proposed the Session Key Authorization Protocol (SKAP) with fewer stages as an alternative to OSAP. Chen and Ryan’s analysis of SKAP using ProVerif proves the authentication property. The purpose of this paper was to examine the usefulness of Colored Petri Nets (CPN) and CPN Tools for security analysis. Using OSAP and SKAP as case studies, we construct intruder and authentication property models in CPN. CPN Tools is used to verify the authentication property using a Dolev–Yao-based model. Verification of the authentication property in both models using the state space tool produces results consistent with those of Chen and Ryan.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Hong Kong construction industry is currently facing ageing problem and labour shortage. There are opportunities for employing ethnic minority construction workers to join this hazardous industry. These ethnic minority workers are prone to accidents due to communication barriers. Safety communication is playing an important role for avoiding the accidents on construction sites. However, the ethnic minority workers are not very fluent in the local language and facing safety communication problems while working with local workers. Social network analysis (SNA), being an effective tool to identify the safety communication flow on the construction site, is used to attain the measures of safety communication like centrality, density and betweenness within the ethnic minorities and local workers, and to generate sociograms that visually represent communication pattern within the effective and ineffective safety networks. The aim of this paper is to present the application of SNA for improving the safety communication of ethnic minorities in the construction industry of Hong Kong. The paper provides the theoretical background of SNA approaches for the data collection and analysis using the software UCINET and NetDraw, to determine the predominant safety communication network structure and pattern of ethnic minorities on site.