765 resultados para social Networking Theory
Resumo:
Local communities are vulnerable to the potential environmental risks associated with construction activity. Currently, little is understood about how perceptions of environmental risks are shaped and spread within a community. A better understanding of this process can help bridge the gap between developers and communities and bring about more sustainable development practices. This paper reports a research methodology which uses social contagion theory to investigate this process. The research adopts a single case study approach of a highly controversial housing project in the greater Sydney metropolitan area. The case study is particularly significant as it investigates an extensive and on-going community-based protest campaign (dating back almost 20 years) that has generated the longest standing 24 hour community picket in the New South Wales.
Resumo:
In the last decade or so, we have witnessed the growth of web 2.0 technology and social networking platforms, and their rapid rise in popularity as methods of social interaction and communication. Yet, platforms such as Facebook and Twitter are not just online social phenomena, but can impact on the way the law and courts operate. This article highlights the issues that legal practitioners and courts need to be aware of in engaging with this technology, and suggests possible ways forward.
Resumo:
Most social network users hold more than one social network account and utilize them in different ways depending on the digital context. For example, friendly chat on Facebook, professional discussion on LinkedIn, and health information exchange on PatientsLikeMe. Thus many web users need to manage many disparate profiles across many distributed online sources. Maintaining these profiles is cumbersome, time consuming, inefficient, and leads to lost opportunity. In this paper we propose a framework for multiple profile management of online social networks and showcase a demonstrator utilising an open source platform. The result of the research enables a user to create and manage an integrated profile and share/synchronise their profiles with their social networks. A number of use cases were created to capture the functional requirements and describe the interactions between users and the online services. An innovative application of this project is in public health informatics. We utilize the prototype to examine how the framework can benefit patients and physicians. The framework can greatly enhance health information management for patients and more importantly offer a more comprehensive personal health overview of patients to physicians.
Resumo:
The first year of a property degree program is a time to establish threshold concept knowledge to acculturise students into their discipline or professional group. Due to the foundational nature of first year in many property degrees, students are enrolled in large, multi-disciplinary classes. There are several challenges in the delivery of large first year multi-disciplinary units to engage the student in a community of leaning to aid in student retention. Through action based research this study shows how social networking, particularly Facebook, can be used to create a sense of community across large, multi-disciplinary units to illicit ‘real time’ feedback from students and encourage peer to peer learning. This study assesses the benefits of using social media and considers the potential limitations of this medium.
Resumo:
With the explosion of Web 2.0 application such as blogs, social and professional networks, and various other types of social media, the rich online information and various new sources of knowledge flood users and hence pose a great challenge in terms of information overload. It is critical to use intelligent agent software systems to assist users in finding the right information from an abundance of Web data. Recommender systems can help users deal with information overload problem efficiently by suggesting items (e.g., information and products) that match users’ personal interests. The recommender technology has been successfully employed in many applications such as recommending films, music, books, etc. The purpose of this report is to give an overview of existing technologies for building personalized recommender systems in social networking environment, to propose a research direction for addressing user profiling and cold start problems by exploiting user-generated content newly available in Web 2.0.
Resumo:
Physical activity has been identified as a key behaviour in determining an individual’s health and functioning. Adolescent physical inactivity has been shown to track strongly through to adulthood. Interventions in youth to promote and increase physical activity have had mixed results. The significant rise over the past decade in time spent by adolescents performing social networking may provide a unique opportunity for health promoters to interact with adolescents through a familiar medium. The purpose of was study is to investigate the potential utility of social networking and associated technologies for the promotion of physical activity amongst adolescents. Participants were recruited from two nondenominational same-sex private schools, from high socioeconomic backgrounds in Brisbane, Australia. A total of 112 (90.3%) participants had complete data sets and were included in the analysis. Account ownership and rates of access to some social networking sites were high. However, a combination of a lack of interest and additional risks associated with social networking utilities, means that caution should be undertaken prior to the commencement of any intervention seeking to increase engagement in physical activities through these mediums. Student smart phone access and interest in smart phone applications for physical activity promotion purposes were moderate, and may provide opportunities for samples of adolescents from high socioeconomic backgrounds who are more likely to have access to appropriate technologies. As technology advances, the rate of smart phone ownership as opposed to overall phone ownership is likely to steadily increase over time. Access and use of information technology by children likely to continue to become more convenient. This makes smart phone applications as a means for physical activity promotion progressively more practical, and a promising future option.
Resumo:
This thesis examines the effectiveness of offences in the Copyright Act 1968 (Cth) in the online environment. The application of social norm theories suggests that the offences will be ineffective in creating an effective deterrent to non-commercial copyright infringement.
Resumo:
It is of course recognised that technology can be gendered and implicated in gender relations. However, it continues to be the case that men’s experiences with technology are underexplored and the situation is even more problematic where digital media is concerned. Over the past 30 years we have witnessed a dramatic rise in the pervasiveness of digital media across many parts of the world and as associated with wide ranging aspects of our lives. This rise has been fuelled over the last decade by the emergence of Web 2.0 and particularly Social Networking Sites (SNS). Given this context, I believe it is necessary for us to undertake more work to understand men’s engagements with digital media, the implications this might have for masculinities and the analysis of gender relations more generally. To begin to unpack this area, I engage theorizations of the properties of digital media networks and integrate this with the masculinity studies field. Using this framework, I suggest we need to consider the rise in what I call networked masculinities – those masculinities (co)produced and reproduced with digitally networked publics. Through this analysis I discuss themes related to digital mediators, relationships, play and leisure, work and commerce, and ethics. I conclude that as masculinities can be, and are being, complicated and given agency by advancing notions and practices of connectivity, mobility, classification and convergence, those engaged with masculinity studies and digital media have much to contribute.
Resumo:
The design of applications for dynamic ridesharing or carpooling is often formulated as a matching problem of connecting people with an aligned set of transport needs within a reasonable interval of time and space. This problem formulation relegates social connections to being secondary factors. Technology assisted ridesharing applications that put the matching problem first have revealed that they suffer from being unable to address the factor of social comfort, even after adding friend features or piggybacking on social networking sites. This research aims to understand the fabric of social interactions through which ridesharing happens. We take an online observation approach in order to understand the fabric of social interactions for ridesharing that is happening in highly subscribed online groups of local residents. This understanding will help researchers to identify design challenges and opportunities to support ridesharing in local communities. This paper contributes a fundamental understanding of how social interactions and social comfort precede rideshare requests in local communities.
Resumo:
Social networking sites (SNSs), with their large numbers of users and large information base, seem to be perfect breeding grounds for exploiting the vulnerabilities of people, the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” While technology-based security has been addressed by research and may be well understood, social engineering is more challenging to understand and manage, especially in new environments such as SNSs, owing to some factors of SNSs that reduce the ability of users to detect the attack and increase the ability of attackers to launch it. This work will contribute to the knowledge of social engineering by presenting the first two conceptual models of social engineering attacks in SNSs. Phase-based and source-based models are presented, along with an intensive and comprehensive overview of different aspects of social engineering threats in SNSs.
Resumo:
While social engineering represents a real and ominous threat to many organizations, companies, governments, and individuals, social networking sites (SNSs), have been identified as among the most common means of social engineering attacks. Owing to factors that reduce the ability of users to detect social engineering tricks and increase the ability of attackers to launch them, SNSs seem to be perfect breeding ground for exploiting the vulnerabilities of people, and the weakest link in security. This work will contribute to the knowledge of social engineering by identifying different entities and subentities that affect social engineering based attacks in SNSs. Moreover, this paper includes an intensive and comprehensive overview of different aspects of social engineering threats in SNSs.
Resumo:
Social Engineering (ES) is now considered the great security threat to people and organizations. Ever since the existence of human beings, fraudulent and deceptive people have used social engineering tricks and tactics to trick victims into obeying them. There are a number of social engineering techniques that are used in information technology to compromise security defences and attack people or organizations such as phishing, identity theft, spamming, impersonation, and spaying. Recently, researchers have suggested that social networking sites (SNSs) are the most common source and best breeding grounds for exploiting the vulnerabilities of people and launching a variety of social engineering based attacks. However, the literature shows a lack of information about what types of social engineering threats exist on SNSs. This study is part of a project that attempts to predict a persons’ vulnerability to SE based on demographic factors. In this paper, we demonstrate the different types of social engineering based attacks that exist on SNSs, the purposes of these attacks, reasons why people fell (or did not fall) for these attacks, based on users’ opinions. A qualitative questionnaire-based survey was conducted to collect and analyse people’s experiences with social engineering tricks, deceptions, or attacks on SNSs.
Resumo:
The emergence of the Internet is one of the most significant leaps in the history of humanity. Information, knowledge and culture are exchanged among masses of people through interconnected information platforms. These platforms enable our culture to be analysed and rewritten, and fundamentally opens our perceptions to a wide variety of concepts and beliefs. The connected networks of the Internet have shaped a virtual — but communicative — space where people can cross borders freely within a realm characterised by the ability to go anywhere, see anything, learn, compare and understand. This chapter focuses on the Libyan experience with social networking platforms in actualising democratic change in the uprising of 17 February 2011. After briefly outlining the political and economic situation under the regime of Colonel Mummar Ghaddafi, the chapter discusses the role that social networking platforms played during the struggle of the Libyan people for democratic change. Finally, it points out the positive changes that resulted from the uprising and the potential role that social media might play in the ongoing democratization and development of Libyan society.