837 resultados para online healthcare social networks


Relevância:

100.00% 100.00%

Publicador:

Resumo:

A major question in current network science is how to understand the relationship between structure and functioning of real networks. Here we present a comparative network analysis of 48 wasp and 36 human social networks. We have compared the centralisation and small world character of these interaction networks and have studied how these properties change over time. We compared the interaction networks of (1) two congeneric wasp species (Ropalidia marginata and Ropalidia cyathiformis), (2) the queen-right (with the queen) and queen-less (without the queen) networks of wasps, (3) the four network types obtained by combining (1) and (2) above, and (4) wasp networks with the social networks of children in 36 classrooms. We have found perfect (100%) centralisation in a queen-less wasp colony and nearly perfect centralisation in several other queen-less wasp colonies. Note that the perfectly centralised interaction network is quite unique in the literature of real-world networks. Differences between the interaction networks of the two wasp species are smaller than differences between the networks describing their different colony conditions. Also, the differences between different colony conditions are larger than the differences between wasp and children networks. For example, the structure of queen-right R. marginata colonies is more similar to children social networks than to that of their queen-less colonies. We conclude that network architecture depends more on the functioning of the particular community than on taxonomic differences (either between two wasp species or between wasps and humans).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper studies the problem of selecting users in an online social network for targeted advertising so as to maximize the adoption of a given product. In previous work, two families of models have been considered to address this problem: direct targeting and network-based targeting. The former approach targets users with the highest propensity to adopt the product, while the latter approach targets users with the highest influence potential – that is users whose adoption is most likely to be followed by subsequent adoptions by peers. This paper proposes a hybrid approach that combines a notion of propensity and a notion of influence into a single utility function. We show that targeting a fixed number of high-utility users results in more adoptions than targeting either highly influential users or users with high propensity.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

From selfies and memes to hashtags and parodies, social media are used for mundane and personal expressions of political commentary, engagement, and participation. The coverage of politics reflects the social mediation of everyday life, where individual experiences and thoughts are documented and shared online. In Social Media and Everyday Politics, Tim Highfield examines political talk as everyday occurrences on Twitter, Facebook, blogs, Tumblr, Instagram, and more. He considers the personal and the political, the serious and the silly, and the everyday within the extraordinary, as politics arises from seemingly banal and irreverent topics. The analysis features international examples and evolving practices, from French blogs to Vines from Australia, via the Arab Spring, Occupy, #jesuischarlie, Eurovision, #blacklivesmatter, Everyday Sexism, and #illridewithyou. This timely book will be a valuable resource for students and scholars in media and communications, internet studies, and political science, as well as general readers keen to understand our contemporary media and political contexts.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Dr Michael Whelan from Autism Queensland talks about a mentoring program supporting young people to develop creative industries skills… Following the extreme social stresses of high school, a lot of young people on the autism spectrum retreat to their bedrooms and computers to hibernate for extended periods of time. Online gaming communities and digital media hubs often provide a more accessible forum for young adults on the autism spectrum to establish and maintain social connections. A recent study suggests that school leavers on the autism spectrum in Queensland spend an average of 9.5 hours per day (68 hours per week) engaged in solitary technology-based activities. While this astonishing figure has its foundations in the sobering fact that most of these young people have limited social networks and experience significant anxiety and depression, it also serves to illustrate the extraordinary skill sets that these extended hours of technological engagement can facilitate.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article introduces the theme issue on social interaction and reflection for behaviour change. A large body of research exists on systems designed to help users in changing their behaviours, for instance, to exercise more regularly or to reduce energy consumption. Increasingly, these systems focus on multiple users, often to encourage open-ended reflection rather than prescribing a particular course of action. As background for this theme issue, this article presents a literature review on behaviour change support systems that focus on social interaction and reflection. The review highlights five key approaches amongst these systems: social traces, social support, collective use, reflection-in-action, and reflection-on-action. Each approach offers unique benefits, but also challenges for the design of behaviour change support systems. We highlight how the articles in this theme issue contribute to our current understanding of these five approaches, and beyond that, set out some broad directions for future work.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Social support offers various benefits for health and behaviour change. However, previous work has shown that individuals are typically reluctant to ask for support on social network sites, unless they can present a changed, healthier identity. To examine the relationship between stage of change and social support we conducted a thematic analysis of messages posted in a public Facebook support group for people trying to quit smoking. Our findings show that the kind of support exchanged online is related to participants' stage of change. Contrary to our expectations, supportive responses and leadership in the support group came mainly from users who just started their change process rather than people who had already changed. We discuss contributions to theories of online participation and impression management as well as implications for practitioners who seek to establish support groups.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

As the virtual world grows more complex, finding a standard way for storing data becomes increasingly important. Ideally, each data item would be brought into the computer system only once. References for data items need to be cryptographically verifiable, so the data can maintain its identity while being passed around. This way there will be only one copy of the users family photo album, while the user can use multiple tools to show or manipulate the album. Copies of users data could be stored on some of his family members computer, some of his computers, but also at some online services which he uses. When all actors operate over one replicated copy of the data, the system automatically avoids a single point of failure. Thus the data will not disappear with one computer breaking, or one service provider going out of business. One shared copy also makes it possible to delete a piece of data from all systems at once, on users request. In our research we tried to find a model that would make data manageable to users, and make it possible to have the same data stored at various locations. We studied three systems, Persona, Freenet, and GNUnet, that suggest different models for protecting user data. The main application areas of the systems studied include securing online social networks, providing anonymous web, and preventing censorship in file-sharing. Each of the systems studied store user data on machines belonging to third parties. The systems differ in measures they take to protect their users from data loss, forged information, censorship, and being monitored. All of the systems use cryptography to secure names used for the content, and to protect the data from outsiders. Based on the gained knowledge, we built a prototype platform called Peerscape, which stores user data in a synchronized, protected database. Data items themselves are protected with cryptography against forgery, but not encrypted as the focus has been disseminating the data directly among family and friends instead of letting third parties store the information. We turned the synchronizing database into peer-to-peer web by revealing its contents through an integrated http server. The REST-like http API supports development of applications in javascript. To evaluate the platform’s suitability for application development we wrote some simple applications, including a public chat room, bittorrent site, and a flower growing game. During our early tests we came to the conclusion that using the platform for simple applications works well. As web standards develop further, writing applications for the platform should become easier. Any system this complex will have its problems, and we are not expecting our platform to replace the existing web, but are fairly impressed with the results and consider our work important from the perspective of managing user data.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

As the virtual world grows more complex, finding a standard way for storing data becomes increasingly important. Ideally, each data item would be brought into the computer system only once. References for data items need to be cryptographically verifiable, so the data can maintain its identity while being passed around. This way there will be only one copy of the users family photo album, while the user can use multiple tools to show or manipulate the album. Copies of users data could be stored on some of his family members computer, some of his computers, but also at some online services which he uses. When all actors operate over one replicated copy of the data, the system automatically avoids a single point of failure. Thus the data will not disappear with one computer breaking, or one service provider going out of business. One shared copy also makes it possible to delete a piece of data from all systems at once, on users request. In our research we tried to find a model that would make data manageable to users, and make it possible to have the same data stored at various locations. We studied three systems, Persona, Freenet, and GNUnet, that suggest different models for protecting user data. The main application areas of the systems studied include securing online social networks, providing anonymous web, and preventing censorship in file-sharing. Each of the systems studied store user data on machines belonging to third parties. The systems differ in measures they take to protect their users from data loss, forged information, censorship, and being monitored. All of the systems use cryptography to secure names used for the content, and to protect the data from outsiders. Based on the gained knowledge, we built a prototype platform called Peerscape, which stores user data in a synchronized, protected database. Data items themselves are protected with cryptography against forgery, but not encrypted as the focus has been disseminating the data directly among family and friends instead of letting third parties store the information. We turned the synchronizing database into peer-to-peer web by revealing its contents through an integrated http server. The REST-like http API supports development of applications in javascript. To evaluate the platform s suitability for application development we wrote some simple applications, including a public chat room, bittorrent site, and a flower growing game. During our early tests we came to the conclusion that using the platform for simple applications works well. As web standards develop further, writing applications for the platform should become easier. Any system this complex will have its problems, and we are not expecting our platform to replace the existing web, but are fairly impressed with the results and consider our work important from the perspective of managing user data.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In Finland the organising of defence is undergoing vast restructuring. Recent legislation has redefined the central tasks of the Finnish Defence Forces. At the same time, international security cooperation, economic pressures and new administrative paradigms have steered the military towards new ways of organising. National defence is not just politics and principles; to a large extent it is also enacted in day-to-day life in organisations. The lens through which these realities of defence are analysed in this study is gender. How is the security sector – and national defence as part of it – organised in the changing security environment? What is the new division of labour between different societal actors in the face of security challenges? What happens ‘at work’ within the military and the defence sector more broadly? How does gender affect the way in which defence is organised and understood, and how do the changes in the organising of security affect gender relations? The thesis searches for answers to these questions in the context of two organisational settings in the male-dominated defence sector. The case study on a Finnish peacekeeping unit in the Balkans opens a critical view on men’s social practices and the everyday life of crisis management organisations. In the second case study, reorganising of provisioning in the Finnish Defence Forces turns out to be a complicated process where different power relations and social divisions intermingle. Tallberg’s extensive ethnographic fieldwork in the two focal organisations has produced a detailed set of data that lays the basis for critical analysis and policy development in terms of defence organising, cooperation around peace and security issues, and gender equality in organisations. Observations and results are provided for understanding social networks, militarisation, authority relations, care, public-private partnerships, personnel policies, career planning, and humour.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Research on men’s networks and homosociality in and around organisations can produce knowledge on organisational power relations, and contribute to the efforts to promote equality in working life. The search for a conceptual framework to study these issues arises in this paper from my ongoing work on men's social networks and gendered power in and around organisations. Men give each other social support through networks in which formal and informal relationships intermingle, but networks are also contexts of competition and oppression, and of construction of masculinities that are in hierarchical relations with each other and with femininities. For studying the networks men have with each other in work organisations I suggest a broader starting point that contextualises these homosocial networks with men’s other personal relations, and integrates different perspectives deriving from social network analysis, critical studies on men and organisational studies.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The title of the 14th International Conference on Electronic Publishing (ELPUB), “Publishing in the networked world: Transforming the nature of communication”, is a timely one. Scholarly communication and scientific publishing has recently been undergoing subtle changes. Published papers are no longer fixed physical objects, as they once were. The “convergence” of information, communication, publishing and web technologies along with the emergence of Web 2.0 and social networks has completely transformed scholarly communication and scientific papers turned to living and changing entities in the online world. The themes (electronic publishing and social networks; scholarly publishing models; and technological convergence) selected for the conference are meant to address the issues involved in this transformation process. We are pleased to present the proceedings book with more than 30 papers and short communications addressing these issues. What you hold in your hands is a by-product and the culmination of almost a Year long work of many people including conference organizers, authors, reviewers, editors and print and online publishers. The ELPUB 2010 conference was organized and hosted by the Hanken School of Economics in Helsinki, Finland. Professors Turid Hedlund of Hanken School of Economics and Yaşar Tonta of Hacettepe University Department of Information Management (Ankara, Turkey) served as General Chair and Program Chair, respectively. We received more than 50 submissions from several countries. All submissions were peer-reviewed by members of an international Program Committee whose contributions proved most valuable and appreciated. The 14th ELPUB conference carries on the tradition of previous conferences held in the United Kingdom (1997 and 2001), Hungary (1998), Sweden (1999), Russia (2000), the Czech Republic (2002), Portugal (2003), Brazil (2004), Belgium (2005), Bulgaria (2006), Austria (2007), Canada (2008) and Italy (2009). The ELPUB Digital Library, http://elpub.scix.net serves as archive for the papers presented at the ELPUB conferences through the years. The 15th ELPUB conference will be organized by the Department of Information Management of Hacettepe University and will take place in Ankara, Turkey, from 14-16 June 2011. (Details can be found at the ELPUB web site as the conference date nears by.) We thank Marcus Sandberg and Hannu Sääskilahti for copyediting, Library Director Tua Hindersson – Söderholm for accepting to publish the online as well as the print version of the proceedings. Thanks also to Patrik Welling for maintaining the conference web site and Tanja Dahlgren for administrative support. We warmly acknowledge the support in organizing the conference to colleagues at Hanken School of Economics and our sponsors.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Hong Kong was once a British colony and has been under the sovereignty of People’s Republic of China (PRC) since 1997. However, some of the unjust practices and colonial legacies are infiltrated into the development ideology as well as the social structures. The construction of intercity express railway project announced in 2008 causing the demolishment of Tsoi Yuen Tsuen, a “non-indigenous” agricultural village in Hong Kong, was one of the current examples. Tsoi Yuen village was established under the former colonial sovereignty sixty years ago. Approximately 450 populations were affected that they had to relocate their homeland involuntarily. However, these villagers were very attached to their homelands and were unwilling to move, and meanwhile they found that they were absent in the government’s consultation and decision-making process. Soon they began their resistance and demanded for “No Move! No Demolish!”. Their movement was strongly supported by a group of “Post-80s generation” and turned into the most important social movement of the city in recent years. In fact, demolition of Tsoi Yuen Village for city development is not an isolated case in the city. Meanwhile the situation is getting worse in Mainland China. I chose the case study of Tsoi Yuen Resistance from 2008 to 2011 for revelation of the complicated colonial history and postcolonial era of Hong Kong. I focused on discussing the Tsoi Yuen Resistance and the Post-80s movement, and how they have exposed the tension between top-down urban planning and development and public movements fighting for a more democratic process in choosing their way of living. Through the study of a village movement which as well as the rationale behind the Post-80s’ support, I hoped to illustrate how this movement has awaken a different sense of living for the new generations in the midst of the high-sounding urban development. It is an opportunity to examine Hong Kong’s colonial epoch in a different perspective: through studying the Tsoi Yuen Village, let them (subalterns) speak for themselves. Furthermore, the significance of this resistance, taking place eleven years after the handover to the PRC, is an important fact that I shall not miss in later discussion. Last but not least, during the resistance, advanced technology and social networks such as Facebook, Twitter, iPhone were used by Post 80s generation to spread the latest information in order to attract public’s concern and participation. Therefore, apart from studying Tsoi Yuen Resistance as a local social movement, I also regard it as a part of the global movement in perusing ecological lifestyle and civil society. How Post 80s’ generation manipulates the global idea in a local context will also be examined.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Many networks such as social networks and organizational networks in global companies consist of self-interested agents. The topology of these networks often plays a crucial role in important tasks such as information diffusion and information extraction. Consequently, growing a stable network having a certain topology is of interest. Motivated by this, we study the following important problem: given a certain desired network topology, under what conditions would best response (link addition/deletion) strategies played by self-interested agents lead to formation of a stable network having that topology. We study this interesting reverse engineering problem by proposing a natural model of recursive network formation and a utility model that captures many key features. Based on this model, we analyze relevant network topologies and derive a set of sufficient conditions under which these topologies emerge as pairwise stable networks, wherein no node wants to delete any of its links and no two nodes would want to create a link between them.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Motivated by the observation that communities in real world social networks form due to actions of rational individuals in networks, we propose a novel game theory inspired algorithm to determine communities in networks. The algorithm is decentralized and only uses local information at each node. We show the efficacy of the proposed algorithm through extensive experimentation on several real world social network data sets.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In recent times, crowdsourcing over social networks has emerged as an active tool for complex task execution. In this paper, we address the problem faced by a planner to incen-tivize agents in the network to execute a task and also help in recruiting other agents for this purpose. We study this mecha-nism design problem under two natural resource optimization settings: (1) cost critical tasks, where the planner’s goal is to minimize the total cost, and (2) time critical tasks, where the goal is to minimize the total time elapsed before the task is executed. We define a set of fairness properties that should beideally satisfied by a crowdsourcing mechanism. We prove that no mechanism can satisfy all these properties simultane-ously. We relax some of these properties and define their ap-proximate counterparts. Under appropriate approximate fair-ness criteria, we obtain a non-trivial family of payment mech-anisms. Moreover, we provide precise characterizations of cost critical and time critical mechanisms.