742 resultados para enterprise social networking


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The design of applications for dynamic ridesharing or carpooling is often formulated as a matching problem of connecting people with an aligned set of transport needs within a reasonable interval of time and space. This problem formulation relegates social connections to being secondary factors. Technology assisted ridesharing applications that put the matching problem first have revealed that they suffer from being unable to address the factor of social comfort, even after adding friend features or piggybacking on social networking sites. This research aims to understand the fabric of social interactions through which ridesharing happens. We take an online observation approach in order to understand the fabric of social interactions for ridesharing that is happening in highly subscribed online groups of local residents. This understanding will help researchers to identify design challenges and opportunities to support ridesharing in local communities. This paper contributes a fundamental understanding of how social interactions and social comfort precede rideshare requests in local communities.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The progress of technology has led to the increased adoption of energy monitors among household energy consumers. While the monitors available on the market deliver real-time energy usage feedback to the consumer, the form of this data is usually unengaging and mundane. Moreover, it fails to address consumers with different motivations and needs to save and compare energy. This master‟s thesis project presents a study that seeks to inform design guidelines for differently motivated energy consumers. The focus of the research is on comparative feedback supported by a community of energy consumers. In particular, the discussed comparative feedback types are explanatory comparison, temporal self-comparison, norm comparison, one-on-one comparison and ranking, whereby the last three support exploring the potential of socialising energy-related feedback in social networking sites, such as Facebook. These feedback types were integrated in EnergyWiz – a mobile application that enables users to compare with their past performance, neighbours, contacts from social networking sites and other EnergyWiz users. The application was developed through a theory-driven approach and evaluated in personal, semi-structured interviews which provided insights on how motivation-related comparative feedback should be designed. It was also employed in expert focus group discussions which resulted in defining opportunities and challenges before mobile, social energy monitors. The findings have unequivocally shown that users with different motivations to compare and to conserve energy have different preferences for comparative feedback types and design. It was established that one of the most influential factors determining design factors is the people users compare to. In addition, the research found that even simple communication strategies in Facebook, such as wall posts and groups can contribute to engagement with energy conservation practices. The concept of mobility of the application was evaluated as positive since it provides place and time-independent access to the energy consumption data.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Social networking sites (SNSs), with their large numbers of users and large information base, seem to be perfect breeding grounds for exploiting the vulnerabilities of people, the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” While technology-based security has been addressed by research and may be well understood, social engineering is more challenging to understand and manage, especially in new environments such as SNSs, owing to some factors of SNSs that reduce the ability of users to detect the attack and increase the ability of attackers to launch it. This work will contribute to the knowledge of social engineering by presenting the first two conceptual models of social engineering attacks in SNSs. Phase-based and source-based models are presented, along with an intensive and comprehensive overview of different aspects of social engineering threats in SNSs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

While social engineering represents a real and ominous threat to many organizations, companies, governments, and individuals, social networking sites (SNSs), have been identified as among the most common means of social engineering attacks. Owing to factors that reduce the ability of users to detect social engineering tricks and increase the ability of attackers to launch them, SNSs seem to be perfect breeding ground for exploiting the vulnerabilities of people, and the weakest link in security. This work will contribute to the knowledge of social engineering by identifying different entities and subentities that affect social engineering based attacks in SNSs. Moreover, this paper includes an intensive and comprehensive overview of different aspects of social engineering threats in SNSs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Social Engineering (ES) is now considered the great security threat to people and organizations. Ever since the existence of human beings, fraudulent and deceptive people have used social engineering tricks and tactics to trick victims into obeying them. There are a number of social engineering techniques that are used in information technology to compromise security defences and attack people or organizations such as phishing, identity theft, spamming, impersonation, and spaying. Recently, researchers have suggested that social networking sites (SNSs) are the most common source and best breeding grounds for exploiting the vulnerabilities of people and launching a variety of social engineering based attacks. However, the literature shows a lack of information about what types of social engineering threats exist on SNSs. This study is part of a project that attempts to predict a persons’ vulnerability to SE based on demographic factors. In this paper, we demonstrate the different types of social engineering based attacks that exist on SNSs, the purposes of these attacks, reasons why people fell (or did not fall) for these attacks, based on users’ opinions. A qualitative questionnaire-based survey was conducted to collect and analyse people’s experiences with social engineering tricks, deceptions, or attacks on SNSs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Social networking sites (SNSs), with their large number of users and large information base, seem to be the perfect breeding ground for exploiting the vulnerabilities of people, who are considered the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” Fraudulent and deceptive people use social engineering traps and tactics through SNSs to trick users into obeying them, accepting threats, and falling victim to various crimes such as phishing, sexual abuse, financial abuse, identity theft, and physical crime. Although organizations, researchers, and practitioners recognize the serious risks of social engineering, there is a severe lack of understanding and control of such threats. This may be partly due to the complexity of human behaviors in approaching, accepting, and failing to recognize social engineering tricks. This research aims to investigate the impact of source characteristics on users’ susceptibility to social engineering victimization in SNSs, particularly Facebook. Using grounded theory method, we develop a model that explains what and how source characteristics influence Facebook users to judge the attacker as credible.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The emergence of the Internet is one of the most significant leaps in the history of humanity. Information, knowledge and culture are exchanged among masses of people through interconnected information platforms. These platforms enable our culture to be analysed and rewritten, and fundamentally opens our perceptions to a wide variety of concepts and beliefs. The connected networks of the Internet have shaped a virtual — but communicative — space where people can cross borders freely within a realm characterised by the ability to go anywhere, see anything, learn, compare and understand. This chapter focuses on the Libyan experience with social networking platforms in actualising democratic change in the uprising of 17 February 2011. After briefly outlining the political and economic situation under the regime of Colonel Mummar Ghaddafi, the chapter discusses the role that social networking platforms played during the struggle of the Libyan people for democratic change. Finally, it points out the positive changes that resulted from the uprising and the potential role that social media might play in the ongoing democratization and development of Libyan society.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Abstract Within the field of Information Systems, a good proportion of research is concerned with the work organisation and this has, to some extent, restricted the kind of application areas given consideration. Yet, it is clear that information and communication technology deployments beyond the work organisation are acquiring increased importance in our lives. With this in mind, we offer a field study of the appropriation of an online play space known as Habbo Hotel. Habbo Hotel, as a site of media convergence, incorporates social networking and digital gaming functionality. Our research highlights the ethical problems such a dual classification of technology may bring. We focus upon a particular set of activities undertaken within and facilitated by the space – scamming. Scammers dupe members with respect to their ‘Furni’, virtual objects that have online and offline economic value. Through our analysis we show that sometimes, online activities are bracketed off from those defined as offline and that this can be related to how the technology is classified by members – as a social networking site and/or a digital game. In turn, this may affect members’ beliefs about rights and wrongs. We conclude that given increasing media convergence, the way forward is to continue the project of educating people regarding the difficulties of determining rights and wrongs, and how rights and wrongs may be acted out with respect to new technologies of play online and offline.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study extends previous research into social networking sites (SNSs) as environments that often reduce spatial, temporal, and social boundaries, which can result in collapsed contexts for social situations. Context collapse was investigated through interviews and Facebook walkthroughs with 27 LGBTQ young people in the United Kingdom. Since diverse sexualities are often stigmatized, participants’ sexual identity disclosure decisions were shaped by both the social conditions of their online networks and the technological architecture of SNSs. Context collapse was experienced as an event through which individuals intentionally redefined their sexual identity across audiences or managed unintentional disclosure. To prevent unintentional context collapse, participants frequently reinstated contexts through tailored performances and audience separation. These findings provide insight into stigmatized identity performances in networked publics while situating context collapse within a broader understanding of impression management, which paves the way for future research exploring the identity implications of everyday SNS use.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Introduction The professional doctorate is specifically designed for professionals investigating real-world problems and relevant issues for a profession, industry, and/or the community. The focus is scholarly research into professional practices. The research programme bridges academia and the professions, and offers doctoral candidates the opportunity to investigate issues relevant to their own practices and to apply these understandings to their professional contexts. The study on which this article is based sought to track the scholarly skill development of a cohort of professional doctoral students who commenced the course in January 2008 at an Australian university. Because they hold positions of responsibility and are time-poor, many doctoral students have difficulty transitioning from professional practitioner to researcher and scholar. The struggle many experience is in the development of a theoretical or conceptual standpoint for argumentation (Lesham, 2007; Weese et al., 1999). It was thought that the use of a scaffolded learning environment that drew upon a blended learning approach incorporating face to face intensive blocks and collaborative knowledge-building tools such as wikis would provide a data source for understanding the development of scholarly skills. Wikis, weblogs and similar social networking software have the potential to support communities to share, learn, create and collaborate. The development of a wiki page by each candidate in the 2008 cohort was encouraged to provide the participants and the teaching team members with textual indicators of progress. Learning tasks were scaffolded with the expectation that the candidates would complete these tasks via the wikis. The expectation was that cohort members would comment on each other’s work, together with the supervisor and/or teaching team member who was allocated to each candidate. The supervisor is responsible for supervising the candidate’s work through to submission of the thesis for examination and the teaching team member provides support to both the supervisor and the candidate through to confirmation. This paper reports on the learning journey of a cohort of doctoral students during the first seven months of their professional doctoral programme to determine if there had been any qualitative shifts in understandings, expectations and perceptions regarding their developing knowledge and skills. The paper is grounded in the literature pertaining to doctoral studies and examines the structure of the professional doctoral programme. Following this is a discussion of the qualitative study that helped to unearth key themes regarding the participants’ learning journey.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Organisations employ Enterprise Social Networks (ESNs) (such as Yammer) expecting better intra-organisational communication and collaboration. However, ESNs are struggling to gain momentum and wide adoption among users. Promoting user participation is a challenge, particularly in relation to lurkers – the silent ESN members who do not contribute any content. Building on behaviour change research, we propose a three-route model consisting of the central, peripheral and coercive routes of influence that depict users’ cognitive strategies, and we examine how management interventions (e.g. sending promotional emails) impact users’ beliefs and (consequent) posting and lurking behaviours in ESNs. Furthermore, we identify users’ salient motivations to lurk or post. We employ a multi-method research design to conceptualise, operationalise and validate the research model. This study has implications for academics and practitioners regarding the nature, patterns and outcomes of management interventions in prompting ESN.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Enterprise social networks provide benefits especially for knowledge-intensive work as they enable communication, collaboration and knowledge exchange. These platforms should therefore lead to increased adoption and use by knowledge-intensive workers such as consultants or indeed researchers. Our interest is in ascertaining whether scientific researchers use enterprise social networks as part of their work practices. This focus is motivated by an apparent schism between a need for researchers to exchange knowledge and profile themselves, and the aversion to sharing breakthrough ideas and joining in an ever-increasing publishing and marketing game. We draw on research on academic work practices and impression management to develop a model of academics’ ESN usage for impression management tactics. We describe important constructs of our model, offer strategies for their operationalization and give an outlook to our ongoing empirical study of the use of an ESN platform by 20 schools across six faculties at an Australian university.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis examines perceptions of advertising on social networking sites (SNS), in particular consumers' privacy concerns, advertising engagement and advertising avoidance. It contributes to the understanding of social media by providing results of a longitudinal investigation of consumer perceptions of advertising, a topography of engagement and avoidance triggers and a three dimensional model of advertising avoidance on SNS. This research used a mixed methodology, employing Critical Incident Technique, In-depth interviews and online surveys.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The rapid pace of social media means that our understanding of the way in which it facilitates the learning process continues to lag. The findings of a longitudinal study of an executive MBA cohort over the period of eight months in their use of the social media application is presented. Over time the ownership and use of the Yammer site shifted to become student driven and facilitated. The motivations behind the site’s use, perceived advantages and disadvantages and changes in usage patterns are documented. The case provides a useful insight into the way in which students used this technology to facilitate their learning goals and how patterns of behaviour changed in response to the changing needs of the cohort.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Ben Light puts forward an alternative way of thinking about how we engage with social networking sites, going beyond the emphasis upon connectivity that has been associated with research in the area to date. Analysing our engagements and disengagements social networking sites in public (in cafes and at bus stops), at work (at desks, photocopiers and whilst cleaning), in our personal lives (where we cull friends and gossip on backchannels) and as related to our health and wellbeing (where we restrict our updates), he emphasises the importance of disconnection instead of connection. The book produces a theory of disconnective practice. This theory requires our attention to geographies of disconnection that include relations with a site, within a site, between sites and between sites and a physical world. Attention to disconnectors, as human and non-human is required, and the modes by which disconnection can occur can then be revealed. Light argues that diversity in the exercise of power is key to understanding disconnective practice where social networking sites are concerned, and he suggests that the ethics of disconnection may also require interrogation.