688 resultados para Social media policy
Resumo:
This paper describes the potential impact of social media and new technologies in secondary education. The case of study has been designed for the drama and theatre subject. A wide set of tools like social networks, blogs, internet, multimedia content, local press and other promotional tools are promoted to increase students’ motivation. The experiment was developed at the highschool IES Al-Satt located in Algete in the Comunidad de Madrid. The students included in the theatre group present a low academic level, 80% of them had previously repeated at least one grade, half of them come from programs for students with learning difficulties and were at risk of social exclusion. This action is supported by higher and secondary education professors and teachers who look forward to implanting networked media technologies as new tools to improve the academic results and the degree of involvement of students. The results of the experiment have been excellent, based on satisfactory opinions obtained from a survey answered by students at the end of the course, and also revealed by the analytics taken from different social networks. This project is a pioneer in the introduction and usage of new technologies in secondary high-schools in Spain.
Resumo:
This paper analyses the relationship between productive efficiency and online-social-networks (OSN) in Spanish telecommunications firms. A data-envelopment-analysis (DEA) is used and several indicators of business ?social Media? activities are incorporated. A super-efficiency analysis and bootstrapping techniques are performed to increase the model?s robustness and accuracy. Then, a logistic regression model is applied to characterise factors and drivers of good performance in OSN. Results reveal the company?s ability to absorb and utilise OSNs as a key factor in improving the productive efficiency. This paper presents a model for assessing the strategic performance of the presence and activity in OSN.
Resumo:
La evolución de Internet al modelo Web 2.0, ha creado el nuevo sistema denominado Social Media, donde han proliferado un número ingente de redes sociales, que han cambiado las formas de relación y colaboración entre los usuarios, así como la relaciones de éstos y las empresas. En respuesta a estos dramáticos cambios sociales y tecnológicos, que actualmente están dando forma a las relaciones negocio-empresa, las empresas están descubriendo que es necesario modificar la estrategia de utilización del CRM (Customer Relationship Management) con sus clientes y desarrollar nuevas capacidades que permitan la creación de valor con los clientes. Y es aquí donde aparece el concepto de Social CRM, entendido como una estrategia centrada en entender, anticiparse y responder mejor a las necesidades de los clientes existentes o potenciales, aprovechando los datos sociales, para crear unas fuertes relaciones beneficiosas para ambas partes. En este trabajo se describe un modelo de adopción de Social CRM, aplicando un método de análisis “Top-Down”, y basado en el modelo de Gartner denominado “The Eight Building Blocks of CRM” [1]. El presente trabajo descompone el modelo de adopción descrito por Gartner, en los siguientes puntos. - Una decisión estratégica de la compañía - Asomarse a la realidad social - Analizar las redes sociales. - Metodología de adopción. - Despliegue y extensión en todos los departamentos de la compañía y la adaptación de los recursos humanos. - Selección e integración con las plataformas tradicionales de CRM - Análisis de herramientas de monitorización de Social CRM El modelo propuesto tiene dos objetivos, por un lado pretende proporcionar la visión de cómo CRM puede influir en los resultados empresariales en la era del cliente social, y por otro, proporcionar a los administradores cómo las inversiones y los recursos existentes de CRM puede ser integrados con las nuevas tecnologías y procesos para formar capacidades que pueden mejorar el rendimiento del negocio. ABSTRACT. “The Internet evolution to Web 2.0 model has created a new system called Social Media, where have proliferated a huge number of social networks which have changed the relationship and collaboration forms user-to-user and user-to-company. In response to these dramatic social and technological changes that are currently shaping the business-business relationships, companies are finding it necessary to modify the strategy for use of CRM (Customer Relationship Management) with customers and develop new capabilities to creating value with customers. And here is where the concept of Social CRM appears, understood as a focus on understanding, anticipating and responding to the needs of existing and potential customers strategy, leveraging social data to create a strong mutually beneficial relationships. In this paper describes an adoption model of Social CRM, using a "Top-Down" analysis method and based on the model of Gartner called "The Eight Building Blocks of CRM" [1]. This paper decomposes the adoption model described by Gartner in the following points. - A company strategic decision. - Look at social reality. - Analyze social networks. - Methodology adoption. - Deployment and extension in all departments of the company and the adaptation of human resources. - Selection and integration with traditional CRM platforms. - Analysis of monitoring tools for Social CRM. The proposed model has two objectives, firstly aims to provide insight into how CRM can influence business outcomes in the era of the social customer, and secondly, to provide administrators how investments and existing resources can be integrated CRM with new technologies and processes for developing capabilities that can increase business performance”.
Resumo:
The binomial knowledge/action understood under the biunivocal relationship of both components is the basis of planning from a postmodern approach. Within this binomial, social communication gives appropriate information, nurtures the knowledge that leads to transformative action, promotes participation and enhances the community?s self-esteem and recognition; to deeply reflect on action is a source of new knowledge; and communication fosters the adoption of the new knowledge by the community with new actions that feed the process knowledge/action as a planning source. From this approach the project Radio Message is born as a new communication channel with the aim of offering Andean indigenous communities from the area of Cayambe (Ecuador), a series of multidisciplinary training programs that enable transformative action with a strong effect on the life quality in these communities and their importance as social actors. The contents are designed through participatory communication between the training authorities and the communities themselves, analyzing their opportunities and needs. In this research the impact of social media in the development of more than 100 indigenous communities in Cayambe is analyzed.
Resumo:
O estudo visa identificar as iniciativas de Divulgação Científica empreendidas pela Universidade Federal de Mato Grosso (UFMT) e Universidade do Estado de Mato Grosso (Unemat), com vistas à atualização e ao aperfeiçoamento da comunicação institucional, maior interação com interlocutores e fortalecimento da imagem do estado como produtor de CT&I. Foram empreendidas pesquisas bibliográficas e documentais, áreas prioritárias de fomento e difusão científica; entrevistas; auditoria de imagem na mídia estadual; diagnóstico dos principais produtos de jornalismo científico desenvolvidos pela UFMT e Unemat, assim como iniciativas conjuntas (revista Fapemat Ciência e Rede de Divulgação Científica). O método investigativo adotado pode ser caracterizado como Pesquisa Participante, concebido em estreita associação com resolução de problemas, tomada de consciência ou produção de novos conhecimentos (THIOLLENT, 1996, 1997). Tal estratégia agrega distintas técnicas de pesquisa social, definidas em função de cada fase do processo de investigação. A partir da análise dos conteúdos científicos publicados nos jornais estaduais, foi possível verificar que essas IES públicas ainda não ocupam lugar relevante em tais veículos, o que pode ser justificado pela inadequação de linguagem ou canais de relacionamento, assim como, pela necessidade de uma política de divulgação mais eficiente. O mapeamento dos portais e canais de mídias sociais institucionais evidenciou que a utilização desses veículos ainda pode ser mais bem dinamizada. Por fim, as conclusões apontam que diferenças culturais e institucionais entre as duas IES inviabilizam a adoção de uma Política de Comunicação Científica integrada, comum entre UFMT e Unemat. O que pode ser considerado, é o desenvolvimento de ações para a dinamização de divulgação dessas instituições, no âmbito do Sistema Estadual de CT&I.
Resumo:
A centralidade na família é uma das principais diretrizes adotadas pela Política Nacional de Assistência Social (PNAS) implementada por meio do Sistema Único de Assistência Social (SUAS). A noção de matricialidade sociofamiliar configura-se como base para a formulação de serviços específicos de abordagem familiar nos níveis de proteção social básica e especial, que visam o acompanhamento longitudinal de famílias em situação de vulnerabilidade social, definida neste contexto pela condição de desvantagem em decorrência da pobreza, da privação de renda e de acesso aos serviços e bens públicos, da fragilização de vínculos afetivos, relacionais e de pertencimento. Objetivou-se com esse estudo identificar como as mulheres usuárias do SUAS percebiam e definiam as vulnerabilidades do próprio núcleo familiar, assim como verificar se a concepção de vulnerabilidade social proposta pela PNAS é condizente com as problemáticas apresentadas pelas famílias usuárias do SUAS. A pesquisa qualitativa foi executada por meio de entrevistas de longa duração com temas advindos da observação participante realizada ao longo de três anos de acompanhamento de mulheres usuárias do SUAS por meio de abordagem grupal em serviço de Assistência Social do bairro do Butantã na cidade de São Paulo. Participaram do estudo oito mulheres, acima de 18 anos, usuárias do SUAS e residentes da zona oeste de São Paulo. As depoentes têm entre 35 e 51 anos de idade, estudaram entre a 5ª e a 8ª série do Ensino Fundamental II, cinco delas são migrantes, quatro vivem com os companheiros e filhos e quatro residem com os filhos em uma organização familiar monoparental, três são beneficiárias da Previdência Social, duas estão inseridas em trabalhos formais, duas em trabalhos informais e uma não trabalha. Todas relataram ter sofrido episódios de violência e violação de direitos, principalmente observados na dificuldade de acesso a serviços sociais básicos. Os depoimentos marcaram dificuldades experimentadas ao longo da vida das mulheres e a tônica dos relatos destacou as preocupações atreladas ao papel de mãe e à luta cotidiana que enfrentam para educar, orientar, sustentar e estar junto aos filhos, sobretudo daqueles que se encontram na fase da infância e da adolescência. À luz da noção de enraizamento, proposta por Simone Weil, foi possível identificar que as depoentes apresentam e enfrentam cotidianamente dificuldades ligadas ao desenraizamento urbano, elucidado especialmente na carência de participação comunitária e política. Nesse cenário, a condição de vulnerabilidade pela qual as famílias são definidas no âmbito da política de assistência social, revela certa ambiguidade, pois ao mesmo tempo em que permite oferecer a essas famílias alguma modalidade de apoio também as coloca numa posição estigmatizada de beneficiárias das políticas públicas. Com isso, considerou-se que apesar da concepção de vulnerabilidade proposta pela PNAS ser condizente com as problemáticas apresentadas pelas usuárias, verifica-se uma lacuna em relação à dimensão subjetiva da formação de cada grupo familiar e suas necessidades específicas a fim de apoiá-los para a promoção de uma mudança efetiva
Resumo:
El reciente crecimiento masivo de medios on-line y el incremento de los contenidos generados por los usuarios (por ejemplo, weblogs, Twitter, Facebook) plantea retos en el acceso e interpretación de datos multilingües de manera eficiente, rápida y asequible. El objetivo del proyecto TredMiner es desarrollar métodos innovadores, portables, de código abierto y que funcionen en tiempo real para generación de resúmenes y minería cross-lingüe de medios sociales a gran escala. Los resultados se están validando en tres casos de uso: soporte a la decisión en el dominio financiero (con analistas, empresarios, reguladores y economistas), monitorización y análisis político (con periodistas, economistas y políticos) y monitorización de medios sociales sobre salud con el fin de detectar información sobre efectos adversos a medicamentos.
Resumo:
This thesis originates from my interest in exploring how minorities are using social media to talk back to mainstream media. This study examines whether hashtags that trend on Twitter may impact how news stories related to minorities are covered in Canadian media. The Canadian Prime Minister Stephen Harper stated the niqab was “rooted in a culture that is anti-women” on 10 March 2015. The next day #DressCodePM trended in response to the PM’s niqab remarks. Using network gatekeeping theory, this study examines the types of sources quoted in the media stories published on 10 and 11 March 2015. The study’s goal is to explore whether using tweet quotes leads to the representation of a more diverse range of news sources. The study compares the types of sources quoted in stories that covered Harper’s comments without mentioning #DressCodePM versus stories that mention #DressCodePM. This study also uses Tuen A. van Dijk’s methodology of asking “who is speaking, how often and how prominently?” in order to examine whose voices have been privileged and whose voices have been marginalized in covering the niqab in Canadian media from the 1970s and until the days following the PM’s remarks. Network gatekeeping theory is applied in this study to assess whether the gated gained more power after #DressCodePM trended. The case study’s findings indicates that Caucasian male politicians were predominantly used as news sources in covering stories related to the niqab for the past 38 years in the Globe and Mail. The sourcing pattern of favouring politicians continued in Canadian print and online media on 10 March 2015 following Harper’s niqab comments. However, ordinary Canadian women, including Muslim women, were used more often than politicians as news sources in the stories about #DressCodePM that were published on 11 March 2015. The gated media users were able to gain power and attract Canadian Media’s attention by widely spreading #DressCodePM. This study draws attention to the lack of diversity of sources used in Canadian political news stories, yet this study also shows it is possible for the gated media users to amplify their voices through hashtag activism.
Resumo:
The outbreak of the protests in the Maidan in Kyiv, and also periodically in other Ukrainian cities, has come as a surprise to both the government and the opposition. These rallies have now been ongoing for several weeks and their most striking feature is their focus on citizenship and their apolitical nature and, by extension, a clear attempt to dissociate the protests from Ukraine’s political opposition. Neither Batkivshchyna, UDAR nor Svoboda have managed to take over full control of the demonstrations. On the one hand, this has been linked to the fact that the protesters have little confidence in opposition politicians and, on the other hand, to disputes over a joint strategy and to rivalry between the three parties. As a result, the citizen-led movement has managed to retain its independence from any political actors. As a consequence of the radicalisation and escalation of the protests following 19 January, the political opposition has lost a significant proportion of the control it had been in possession of until then. Maidan should also be seen as the first clear manifestation of a new generation of Ukrainians – raised in an independent Ukraine, well-educated and familiar with new social media, but nonetheless seeking to ground themselves in national tradition. After the initial shock and a series of failed attempts to quell the protests, the government has seemingly opted to wait out the unrest. At the same time, however, it has been creating administrative obstacles for both the political and the civil opposition, restricting their access to the media and severely limiting the legal possibility to organise demonstrations.
Resumo:
When they look at Internet policy, EU policymakers seem mesmerised, if not bewitched, by the word ‘neutrality’. Originally confined to the infrastructure layer, today the neutrality rhetoric is being expanded to multi-sided platforms such as search engines and more generally online intermediaries. Policies for search neutrality and platform neutrality are invoked to pursue a variety of policy objectives, encompassing competition, consumer protection, privacy and media pluralism. This paper analyses this emerging debate and comes to a number of conclusions. First, mandating net neutrality at the infrastructure layer might have some merit, but it certainly would not make the Internet neutral. Second, since most of the objectives initially associated with network neutrality cannot be realistically achieved by such a rule, the case for network neutrality legislation would have to stand on different grounds. Third, the fact that the Internet is not neutral is mostly a good thing for end users, who benefit from intermediaries that provide them with a selection of the over-abundant information available on the Web. Fourth, search neutrality and platform neutrality are fundamentally flawed principles that contradict the economics of the Internet. Fifth, neutrality is a very poor and ineffective recipe for media pluralism, and as such should not be invoked as the basis of future media policy. All these conclusions have important consequences for the debate on the future EU policy for the Digital Single Market.
Resumo:
Addressing the issue of “women’s rights” in Egypt may seem like an easy topic from a purely legal standpoint, but the most enlightening way to do so is to adopt a holistic approach by understanding the political, social, cultural and class effects of this issue. Since 1952, people in Egypt have looked at “women’s rights” as a purely state matter, one characterised mainly by legal reforms. Until 2011, women’s rights were manipulated via a top-down approach by making changes in some policies and laws. Since 2011, with the emergence of the question of social movements, tackling women’s rights has been transformed via the use of certain tools and different perspectives. This is clearly manifested in the vast mobilisation that took place in governorates outside Cairo, which featured the use of artistic tools such as graffiti, story-telling performances, the production of feminist songs, open-microphone sessions, etc., in addition to the extensive use of social media and online campaigning to mainstream feminist ideologies and highlight violations experienced by women. Before 2011, the public space in Egypt was limited to citizens, political groups and civil society for employing legal approaches such as litigations and policy changes by direct pressure on authorities. The 2011 revolution opened the public space to the use of new tools that are not limited to protests and sit-ins, but also new media windows and new political forces who carried the question of certain rights in their agendas as well as the accessibility of different governmental actors. This paper will highlight different topics around women’s rights and gender issues in Egypt after 2011. This paper will review different gender issues after 2011, including the targeting of women in public spaces, women’s representation in decision-making bodies, legal reform, economic and social rights, and sexual and reproductive rights. It will also investigate how the feminist movement has changed and evolved since 2011, and to what degree women's issues and feminism can be analysed in a multidisciplinary way.
Resumo:
Thesis (Master's)--University of Washington, 2016-06
Resumo:
The problem of asset price bubbles, and more generally of instability in the financial system, has been a matter of concern since the 1980s but has only recently moved to the center of the macroeconomic policy debate. The main concern with bubbles arises when they burst, imposing losses on investors holding the bubble assets and potentially on the financial institutions that have extended credit to them. Asset price volatility is an inevitable consequence of financial market liberalization and, in extreme cases, generates asset price bubbles, the bursting of which can impose substantial economic and social costs. Policy responses within the existing liberalized financial system face daunting levels of uncertainty and risk. Given the pattern of increasing asset market volatility over recent decades and the policy issues highlighted in this paper, the future looks uncertain. Another significant cycle of asset price movements, especially in one of the major economies, could see a fundamental revision of thinking about the costs and benefits of liberalized financial systems.
Resumo:
The popularity of online social media platforms provides an unprecedented opportunity to study real-world complex networks of interactions. However, releasing this data to researchers and the public comes at the cost of potentially exposing private and sensitive user information. It has been shown that a naive anonymization of a network by removing the identity of the nodes is not sufficient to preserve users’ privacy. In order to deal with malicious attacks, k -anonymity solutions have been proposed to partially obfuscate topological information that can be used to infer nodes’ identity. In this paper, we study the problem of ensuring k anonymity in time-varying graphs, i.e., graphs with a structure that changes over time, and multi-layer graphs, i.e., graphs with multiple types of links. More specifically, we examine the case in which the attacker has access to the degree of the nodes. The goal is to generate a new graph where, given the degree of a node in each (temporal) layer of the graph, such a node remains indistinguishable from other k-1 nodes in the graph. In order to achieve this, we find the optimal partitioning of the graph nodes such that the cost of anonymizing the degree information within each group is minimum. We show that this reduces to a special case of a Generalized Assignment Problem, and we propose a simple yet effective algorithm to solve it. Finally, we introduce an iterated linear programming approach to enforce the realizability of the anonymized degree sequences. The efficacy of the method is assessed through an extensive set of experiments on synthetic and real-world graphs.
Resumo:
With the advent of GPS enabled smartphones, an increasing number of users is actively sharing their location through a variety of applications and services. Along with the continuing growth of Location-Based Social Networks (LBSNs), security experts have increasingly warned the public of the dangers of exposing sensitive information such as personal location data. Most importantly, in addition to the geographical coordinates of the user’s location, LBSNs allow easy access to an additional set of characteristics of that location, such as the venue type or popularity. In this paper, we investigate the role of location semantics in the identification of LBSN users. We simulate a scenario in which the attacker’s goal is to reveal the identity of a set of LBSN users by observing their check-in activity. We then propose to answer the following question: what are the types of venues that a malicious user has to monitor to maximize the probability of success? Conversely, when should a user decide whether to make his/her check-in to a location public or not? We perform our study on more than 1 million check-ins distributed over 17 urban regions of the United States. Our analysis shows that different types of venues display different discriminative power in terms of user identity, with most of the venues in the “Residence” category providing the highest re-identification success across the urban regions. Interestingly, we also find that users with a high entropy of their check-ins distribution are not necessarily the hardest to identify, suggesting that it is the collective behaviour of the users’ population that determines the complexity of the identification task, rather than the individual behaviour.