837 resultados para clustering users in social network


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The practice of social entrepreneurship already exists for a long time but the concept is quite new and has more recently raised a growing interest among academics. However, the majority of researches and considerations about the subject have taken a strong positive concern by omitting some sort of a critical reflection. The idea of this study is to consider the gap between the very optimistic and the more precautious concerns about social entrepreneurship. It means presenting the advantages and downsides connected to the topic in the business, public and third sector. The aim is to help the reader building his/her own belief on social entrepreneurship by considering the positive and negative sides of social entrepreneurship. Hence, the research is intended to take a critical step and aims to answer to the following research questions:  Shall we believe in social entrepreneurship?  What are the reasons for believing or not in social entrepreneurship taking into account the advantages and possible risks of it in the business, public, and third sector? The theoretical framework consists of the comparison between the promising and precautious sides about social entrepreneurship for private, public and non-governmental organizations including the actors or participants inside these sectors. The empirical part is conducted using a qualitative method. Personal interviews of experts in the fields of business, public and third sectors were handled. The purpose of this approach is to compare the critics in theory with the experience of persons dealing with social entrepreneurship. The results from the interviews revealed that in general, reasons for believing in social entrepreneurship prevail over critics about the subject. Social entrepreneurship may not yet represent a full performing business. Concerns for weakening the public power and putting aside the interests of communities in need may exist too. Furthermore, naïve and extra liberal ways of thinking or doing can lead to practices going in opposition with initial social objectives. Nevertheless, problems about social entrepreneurship would be mainly due to the young age of the movement. Time and experience would give better foundations and results to social entrepreneurs. Critics about social entrepreneurship could also easily be done to any sorts of business. Overall, the positive considerations of social entrepreneurship with skillful, motivated and responsible actors could represent some useful tools for enterprises, governments and charities. Some tools among many other possibilities to help people in need.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study examines information security as a process (information securing) in terms of what it does, especially beyond its obvious role of protector. It investigates concepts related to ‘ontology of becoming’, and examines what it is that information securing produces. The research is theory driven and draws upon three fields: sociology (especially actor-network theory), philosophy (especially Gilles Deleuze and Félix Guattari’s concept of ‘machine’, ‘territory’ and ‘becoming’, and Michel Serres’s concept of ‘parasite’), and information systems science (the subject of information security). Social engineering (used here in the sense of breaking into systems through non-technical means) and software cracker groups (groups which remove copy protection systems from software) are analysed as examples of breaches of information security. Firstly, the study finds that information securing is always interruptive: every entity (regardless of whether or not it is malicious) that becomes connected to information security is interrupted. Furthermore, every entity changes, becomes different, as it makes a connection with information security (ontology of becoming). Moreover, information security organizes entities into different territories. However, the territories – the insides and outsides of information systems – are ontologically similar; the only difference is in the order of the territories, not in the ontological status of entities that inhabit the territories. In other words, malicious software is ontologically similar to benign software; they both are users in terms of a system. The difference is based on the order of the system and users: who uses the system and what the system is used for. Secondly, the research shows that information security is always external (in the terms of this study it is a ‘parasite’) to the information system that it protects. Information securing creates and maintains order while simultaneously disrupting the existing order of the system that it protects. For example, in terms of software itself, the implementation of a copy protection system is an entirely external addition. In fact, this parasitic addition makes software different. Thus, information security disrupts that which it is supposed to defend from disruption. Finally, it is asserted that, in its interruption, information security is a connector that creates passages; it connects users to systems while also creating its own threats. For example, copy protection systems invite crackers and information security policies entice social engineers to use and exploit information security techniques in a novel manner.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The aim of this study was to examine community and individual approaches in responses to mass violence after the school shooting incidents in Jokela (November 2007) and Kauhajoki (September 2008), Finland. In considering the community approach, responses to any shocking criminal event may have integrative, as well as disintegrative effects, within the neighborhood. The integration perspective argues that a heinous criminal event within one’s community is a matter of offence to collectively held feelings and beliefs, and increases perceived solidarity; whereas the disintegration perspective suggests that a criminal event weakens the social fabric of community life by increasing fear of crime and mistrust among locals. In considering the individual approach, socio-demographic factors, such as one’s gender, are typically significant indicators, which explain variation in fear of crime. Beyond this, people are not equally exposed to violent crime and therefore prior victimization and event related experiences may further explain why people differ in their sensitivity to risk from mass violence. Finally, factors related to subjective mental health, such as depressed mood, are also likely to moderate individual differences in responses to mass violence. This study is based on the correlational design of four independent cross-sectional postal surveys. The sampling frames (N=700) for the surveys were the Finnish speaking adult population aged 18–74-years. The first mail survey in Jokela (n=330) was conducted between May and June 2008, approximately six months from the shooting incident at the local high-school. The second Jokela survey (n=278) was conducted in May–June of 2009, 18 months removed from the incident. The first survey in Kauhajoki (n=319) was collected six months after the incident at the local University of Applied Sciences, March– April 2009, and the second (n=339) in March–April 2010, approximately 18 months after the event. Linear and ordinal regression and path analysis are used as methods of analyses. The school shootings in Jokela and Kauhajoki were extremely disturbing events, which deeply affected the communities involved. However, based on the results collected, community responses to mass violence between the two localities were different. An increase in social solidarity appears to apply in the case of the Jokela community, but not in the case of the Kauhajoki community. Thus a criminal event does not necessarily impact the wider community. Every empirical finding is most likely related to different contextual and event-specific factors. Beyond this, community responses to mass violence in Jokela also indicated that the incident was related to a more general sense of insecurity and was also associating with perceived community deterioration and further suggests that responses to mass violence may have both integrating and disintegrating effects. Moreover, community responses to mass violence should also be examined in relation to broader social anxieties and as a proxy for generalized insecurity. Community response is an emotive process and incident related feelings are perhaps projected onto other identifiable concerns. However, this may open the door for social errors and, despite integrative effects, this may also have negative consequences within the neighborhood. The individual approach suggests that women are more fearful than men when a threat refers to violent crime. Young women (aged 18–34) were the most worried age and gender group as concerns perception of threat from mass violence at schools compared to young men (aged 18–34), who were also the least worried age and gender group when compared to older men. It was also found that concerns about mass violence were stronger among respondents with the lowest level of monthly household income compared to financially better-off respondents. Perhaps more importantly, responses to mass violence were affected by the emotional proximity to the event; and worry about the recurrence of school shootings was stronger among respondents who either were a parent of a school-aged child, or knew a victim. Finally, results indicate that psychological wellbeing is an important individual level factor. Respondents who expressed depressed mood consistently expressed their concerns about mass violence and community deterioration. Systematic assessments of the impact of school shooting events on communities are therefore needed. This requires the consolidation of community and individual approaches. Comparative study designs would further benefit from international collaboration across disciplines. Extreme school violence has also become a national concern and deeper understanding of crime related anxieties in contemporary Finland also requires community-based surveys.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A modified version of the intruder-resident paradigm was used to investigate if social recognition memory lasts at least 24 h. One hundred and forty-six adult male Wistar rats were used. Independent groups of rats were exposed to an intruder for 0.083, 0.5, 2, 24, or 168 h and tested 24 h after the first encounter with the familiar or a different conspecific. Factor analysis was employed to identify associations between behaviors and treatments. Resident rats exhibited a 24-h social recognition memory, as indicated by a 3- to 5-fold decrease in social behaviors in the second encounter with the same conspecific compared to those observed for a different conspecific, when the duration of the first encounter was 2 h or longer. It was possible to distinguish between two different categories of social behaviors and their expression depended on the duration of the first encounter. Sniffing the anogenital area (49.9% of the social behaviors), sniffing the body (17.9%), sniffing the head (3%), and following the conspecific (3.1%), exhibited mostly by resident rats, characterized social investigation and revealed long-term social recognition memory. However, dominance (23.8%) and mild aggression (2.3%), exhibited by both resident and intruders, characterized social agonistic behaviors and were not affected by memory. Differently, sniffing the environment (76.8% of the non-social behaviors) and rearing (14.3%), both exhibited mostly by adult intruder rats, characterized non-social behaviors. Together, these results show that social recognition memory in rats may last at least 24 h after a 2-h or longer exposure to the conspecific.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The purpose of this qualitative research is to analyze western-based companies’ social media usage in internationalization into China and to identify social media presence’ impact on the internationalization process. Additionally, the benefits and challenges a western company may face while using social media in China will be illustrated. Competitive advantages, knowledge, networks and relations, and costs and risks could be identified as the key antecedents for successful internationalization. A great social media presence could create a competitive advantage for a western company while competitive advantages may be communicated in social media marketing, knowledge and networks can be enhanced and utilized in internationalization via social media two-way communication. The biggest benefit for internationalization resulted from decreased marketing costs due to cost-effectiveness of social media. The results revealed that cost effective brand awareness was the main benefit from the social media usage in internationalization into China. However, companies struggled with the limited resources and despite of understanding the importance of Chinese social media, lacked sufficient resources for the social media operations. Companies should determine clear strategy and goals that they are willing to achieve via social media in internationalization process, and allocate required resources according to the social media strategy. Localization of the social media operations is important in China, and business-to-consumer companies tend to benefit more from the social media presence. Business-to-business companies may increase the brand’s credibility by successful Chinese social media operations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The electricity distribution sector will face significant changes in the future. Increasing reliability demands will call for major network investments. At the same time, electricity end-use is undergoing profound changes. The changes include future energy technologies and other advances in the field. New technologies such as microgeneration and electric vehicles will have different kinds of impacts on electricity distribution network loads. In addition, smart metering provides more accurate electricity consumption data and opportunities to develop sophisticated load modelling and forecasting approaches. Thus, there are both demands and opportunities to develop a new type of long-term forecasting methodology for electricity distribution. The work concentrates on the technical and economic perspectives of electricity distribution. The doctoral dissertation proposes a methodology to forecast electricity consumption in the distribution networks. The forecasting process consists of a spatial analysis, clustering, end-use modelling, scenarios and simulation methods, and the load forecasts are based on the application of automatic meter reading (AMR) data. The developed long-term forecasting process produces power-based load forecasts. By applying these results, it is possible to forecast the impacts of changes on electrical energy in the network, and further, on the distribution system operator’s revenue. These results are applicable to distribution network and business planning. This doctoral dissertation includes a case study, which tests the forecasting process in practice. For the case study, the most prominent future energy technologies are chosen, and their impacts on the electrical energy and power on the network are analysed. The most relevant topics related to changes in the operating environment, namely energy efficiency, microgeneration, electric vehicles, energy storages and demand response, are discussed in more detail. The study shows that changes in electricity end-use may have radical impacts both on electrical energy and power in the distribution networks and on the distribution revenue. These changes will probably pose challenges for distribution system operators. The study suggests solutions for the distribution system operators on how they can prepare for the changing conditions. It is concluded that a new type of load forecasting methodology is needed, because the previous methods are no longer able to produce adequate forecasts.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This document is focused on studying privacy perception and personality traits of users in the context of smartphone application privacy. It is divided into two parts. The first part presents an in depth systematic literature review of the existing academic writings available on the topic of relation between privacy perception and personality traits. Demographics, methodologies and other useful insight is extracted and the available literature is divided into broader group of topics bringing the five main areas of research to light and highlighting the current research trends in the field along with pinpointing the research gap of interest to the author. The second part of the thesis uses the results from the literature review to administer an empirical study to investigate the current privacy perception of users and the correlation between personality traits and privacy perception in smartphone applications. Big five personality test is used as the measure for personality traits whereas three sub-variables are used to measure privacy perception i.e. perceived privacy awareness, perceived threat to privacy and willingness to trade privacy. According to the study openness to experience is the most dominant trait having a strong correlation with two privacy sub-variables whereas emotional stability doesn’t show any correlation with privacy perception. Empirical study also explores other findings as preferred privacy sources and application installation preferences that provide further insight about users and might be useful in future.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Internetin yhteisöpalveluiden käyttäjien avoimuus ja sosiaalisuus altistavat heidät monenlaisille riskeille. “Social engineering” eli käyttäjien manipulointi on uhka, joka liittyy informaation hankkimiseen perinteisen kanssakäymisen kautta, mutta yhä enenevissä määrin myös internetissä. Kun kanssakäyminen tapahtuu internetin välityksellä, käyttäjien manipuloijat hyödyntävät yhteisöpalveluita yhteydenpitoon uhrien kanssa sekä paljon käyttäjäinformaatiota sisältävänä alustana. Tämän tutkielman tarkoitus on löytää internetin yhteisöpalveluiden ja käyttäjien manipuloinnin välinen yhteys. Tämä päämäärä saavutettiin etsimällä vastauksia kysymyksiin kuten: Mitkä ovat tyypilliset hyökkäystyypit? Miksi informaatiolla on niin suuri rooli? Mitä seurauksia ilmiöllä on ja miten hyökkäyksiltä on mahdollista suojautua? Vastaukset kysymyksiin löydettiin toteuttamalla systemaattinen kirjallisuuskatsaus. Katsaus muodostui yhdistämällä tärkeimmät löydökset 60 tarkoin valitusta ilmiötä käsittelevästä artikkelista. Käyttäjien manipuloinnin huomattiin olevan hyvin laaja ja monimutkainen ilmiö internetin yhteisöpalveluissa. Huomattiin, että manipulointia ilmenee sivustoilla useissa erilaisissa muodoissa, joita ovat muun muassa tietojen kalastelu, profiilien yhdistäminen, sosiaaliset sovellukset, roskaposti, haitalliset linkit, identiteettivarkaudet, tietovuodot ja erilaiset huijaukset, jotka hyödyntävät sekä ihmisluonnon että sivustojen perusominaisuuksia. Haavoittuvuus ja luottamus havaittiin myös tärkeiksi aspekteiksi, sillä ne yhdistävät informaation merkityksen ja ihmisluonnon, jotka molemmat ovat avaintekijöitä sekä manipuloinnissa että yhteisöpalvelusivustoilla. Vaikka ilmiön seurausten huomattiin olevan negatiivisia niin käyttäjien olemukselle internetissä kuin todellisessakin elämässä, havaittiin myös, että ilmiön ymmärtäminen ja tunnistaminen helpottaa siltä suojautumista

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Human-Centered Design (HCD) is a well-recognized approach to the design of interactive computing systems that supports everyday and professional lives of people. To that end, the HCD approach put central emphasis on the explicit understanding of users and context of use by involving users throughout the entire design and development process. With mobile computing, the diversity of users as well as the variety in the spatial, temporal, and social settings of the context of use has notably expanded, which affect the effort of interaction designers to understand users and context of use. The emergence of the mobile apps era in 2008 as a result of structural changes in the mobile industry and the profound enhanced capabilities of mobile devices, further intensify the embeddedness of technology in the daily life of people and the challenges that interaction designers face to cost-efficiently understand users and context of use. Supporting interaction designers in this challenge requires understanding of their existing practice, rationality, and work environment. The main objective of this dissertation is to contribute to interaction design theories by generating understanding on the HCD practice of mobile systems in the mobile apps era, as well as to explain the rationality of interaction designers in attending to users and context of use. To achieve that, a literature study is carried out, followed by a mixed-methods research that combines multiple qualitative interview studies and a quantitative questionnaire study. The dissertation contributes new insights regarding the evolving HCD practice at an important time of transition from stationary computing to mobile computing. Firstly, a gap is identified between interaction design as practiced in research and in the industry regarding the involvement of users in context; whereas the utilization of field evaluations, i.e. in real-life environments, has become more common in academic projects, interaction designers in the industry still rely, by large, on lab evaluations. Secondly, the findings indicate on new aspects that can explain this gap and the rationality of interaction designers in the industry in attending to users and context; essentially, the professional-client relationship was found to inhibit the involvement of users, while the mental distance between practitioners and users as well as the perceived innovativeness of the designed system are suggested in explaining the inclination to study users in situ. Thirdly, the research contributes the first explanatory model on the relation between the organizational context and HCD; essentially, innovation-focused organizational strategies greatly affect the cost-effective usage of data on users and context of use. Last, the findings suggest a change in the nature of HCD in the mobile apps era, at least with universal consumer systems; evidently, the central attention on the explicit understanding of users and context of use shifts from an early requirements phase and continual activities during design and development to follow-up activities. That is, the main effort to understand users is by collecting data on their actual usage of the system, either before or after the system is deployed. The findings inform both researchers and practitioners in interaction design. In particular, the dissertation suggest on action research as a useful approach to support interaction designers and further inform theories on interaction design. With regard to the interaction design practice, the dissertation highlights strategies that encourage a more cost-effective user- and context-informed interaction design process. With the continual embeddedness of computing into people’s life, e.g. with wearable devices and connected car systems, the dissertation provides a timely and valuable view on the evolving humancentered design.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

IT outsourcing (ITO) refers to the shift of IT/IS activities from internal to external of an organization. In prior research, the governance of ITO is recognized with persistent strategic importance for practice, because it is tightly related to ITO success. Under the rapid transformation of global market, the evolving practice of ITO requires updated knowledge on effective governance. However, research on ITO governance is still under developed due to the lack of integrated theoretical frameworks and the variety of empirical settings besides dyadic client-vendor relationships. Especially, as multi-sourcing has become an increasingly common practice in ITO, its new governance challenges must be attended by both ITO researchers and practitioners. To address this research gap, this study aims to understand multi-sourcing governance with an integrated theoretical framework incorporating both governance structure and governance mechanisms. The focus is on the emerging deviations among formal, perceived and practiced governance. With an interpretive perspective, a single case study is conducted with mixed methods of Social Network Analysis (SNA) and qualitative inquiries. The empirical setting embraces one client firm and its two IT suppliers for IT infrastructure services. The empirical material is analyzed at three levels: within one supplier firm, between the client and one supplier, and among all three firms. Empirical evidences, at all levels, illustrate various deviations in governance mechanisms, with which emerging governance structures are shaped. This dissertation contributes to the understanding of ITO governance in three domains: the governance of ITO in general, the governance of multi-sourcing in particular, and research methodology. For ITO governance in general, this study has identified two research strands of governance structure and governance mechanisms, and integrated both concepts under a unified framework. The composition of four research papers contributes to multi-sourcing research by illustrating the benefits of zooming in and out across the multilateral relationships with different aspects and scopes. Methodologically, the viability and benefit of mixed-method is illustrated and confirmed for both researchers and practitioners.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Sweat bees exhibit a range of social behaviours, from solitary nesting, in which no workers are produced, to strong eusociality, in which workers exhibit a high degree of altruism, behaviour that is measured by the degree of personal reproductive sacrifice. Field studies were carried out for seven weeks during May-June 2000 in southern Greece in order to investigate intraspecific social variation, and test the hypothesis of a north-south cline of decreasing eusociality in the obligately eusocial sweat bee L. (E.) malachurum. A comparative study, using principal components analysis, was performed to determine if patterns of intraspecific social variation in L. malachurum reflect the patterns of social variation within the subgenus, Evylaeus, as a whole. The results of the field study reveal that, in Greece, two worker broods were produced followed by a third brood consisting of gynes, males and some workers, indicating that there was an overlap in worker and gyne production. There was strong caste distinction between queens and workers. Workers actively foraged and participated in nest construction as most workers (58%, n=303) had a high degree of mandibular wear. Workers did not participate in the oviposition of Brood 3 gynes since only 0.7% (n=278) of workers were mated. Furthermore, queen survival until the end of Brood 3 and a substantial size differential of 10.6% between queens and workers suggested that queen domination over worker behaviour during the early to mid-part of the colony cycle was plausible. Male production in Brood 3 by some workers was likely, since the timing of worker ovarian development corresponded with the timing of male production. These findings suggest that workers of the first two broods were primarily altruistic, but some (28%) Brood 1 (9%) and Brood 2 (19%) workers produced males, indicating that the degree of altruistic behaviour declined during the lifetime of the colony. In comparison with other L. malachurum populations in Europe, the Greek population of L. malachurum had a weaker social level as a result of the higher proportion of workers potentially involved in male production, thus 3 supporting the hypothesis of a southerly cline of decreasing eusociality. Furthermore, intraspecific variation in social level across Europe appears to be due to longer breeding seasons in more southerly locations that would promote the production of larger colonies and provide opportunities for workers to evade queen control. The comparative study using principal components analysis on 20 solitary (of the subgenera Evylaeus and Lasioglossum), eusocial and socially polymorphic Evylaeus species and populations reveals that six traits are closely associated with stronger eusociality in Evylaeus. These traits are: (1) a reduction in the proportion of males in the early brood(s); (2) a reduction in the proportion of females that mate; (3) an increase in the mean number of first brood workers; (4) a reduction in the proportion of females with developed ovaries; (5) an increase in size dimorphism between castes, and (6) nest guarding. These are traits that most significantly define principal component one and therefore distinguish social type as indicated by a clear separation of the eusocial and the solitary populations, with a socially polymorphic species falling in between. Furthermore, most of these traits are under foundress control and may suggest that the evolutionary loss or gain of eusociality is based on selection pressures on a founding female. Colony size and female ovarian development are common factors distinguishing social variation in L. malachurum and within the subgenus as a whole. The principal components analysis excluding the solitary species and the socially aberrant L. marginatum populations show the L. malachurum populations separated based on an increasing proportion of workers with developed ovaries as populations are found more south, lending further support to the hypothesis of a north-south cline of decreasing eusociality.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study examines the first experience of students, teachers, and an administrator in implementing a teacher-designed Leadership in Social Justice Program at a large urban Ontario secondary school. The program aimed to infuse a Freirean concept of critical pedagogical praxis (Freire, 1970/1993) in a grade 12 integrated educational experience with a social justice directive. Data were collected through two questionnaires and eight in-depth interviews. The data identified three areas of awareness that described ways in which student participants were impacted most profoundly (a) developing self-awareness, (b) understanding a new educational paradigm, and (c) finding a place in the world. The study found that the program was successful in highlighting the possibility for more meaningful education and engaged many students deeply; however, its success was limited by the lead teacher’s failure to fully grasp and implement tenets of Freirean critical pedagogy that involved the role of the teacher in pedagogical processes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In social Hymenoptera, the division of labour is a major step in the evolution of sociality. Bees, which express many different kinds of sociality, can be classified according to how individuals share or do not share foraging and reproductive activities (Michener, 1974). The large carpenter bee, Xylocopa virginica, lives in populations with both solitary and social nests. In social nests, reproduction is controlled by the dominant female, who does all of her own foraging and egg-laying, while the subordinates guard the nest only. This study examined foraging behaviour as a way to classify the social hierarchy. Individual females were marked, measured and intensely observed for the foraging season. It was found that a large number of subordinates forage and likely obtain more reproductive fitness than previously thought. The dominance hierarchy is very likely a social queue, in which bees take turns foraging and egg-laying.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Scant research has explored how professors in Canadian universities use Twitter as a teaching tool or to augment knowledge about their subject disciplines. This case study employed a mixed-method approach to examine how professors in an Ontario university use Twitter. Using a variation of the technology acceptance model, the survey (n = 17) found that professor participants—41.2% of whom use Twitter—perceive Twitter as somewhat useful as a teaching tool, not useful for finding and sharing information, and not useful for personal use. Participants’ gender and number of years teaching are not indicators of Twitter use. Furthermore, the level of support from peers and the university may be reasons why some do not use Twitter or have stopped using Twitter. Face-to-face interviews (n = 3) revealed that Twitter is not used in classrooms or lecture halls, but predominantly as a means of sharing information with students and colleagues. Another deterrent to using Twitter is not knowing who to follow. Findings indicate that some professors at this university embrace Twitter, but not necessarily as an in-class teaching tool. The challenge and the advantage of using Twitter is to discover and follow people who tweet material and to select relevant material to pass along to students and colleagues. Professor participants in the study found a use for the social network as a means to increase student engagement, create virtual information-exchange communities, and enrich their own learning.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

There is a paucity of studies comparing social buffering in adolescents and adults, despite their marked differences in social behaviour. I investigated whether greater effects of social buffering on plasma corticosterone concentrations and expression of Zif268 in neural regions after an acute stressor would be found in adolescent compared with adult rats. Samples were obtained before and after one hour of isolation stress and after either one or three hours of recovery back in the colony with either a familiar or unfamiliar cage partner. Adolescent and adult rats did not differ in plasma concentrations of corticosterone at any time point. Corticosterone concentrations were higher after one hour isolation than at baseline (p < 0.001), and rats with a familiar partner during the recovery phase had lower corticosterone concentrations than did rats with an unfamiliar partner (p = 0.02). Zif268 immunoreactive cell counts were higher in the arcuate nucleus in both age groups after isolation (p = 0.007) and higher in the paraventricular nucleus of adolescents compared with adults during the recovery phase irrespective of partner familiarity. There was a significant decrease in immunoreactive cell counts after one hour isolation compared to baseline in the basolateral amygdala, central nucleus of the amygdala, and in the pyramidal layer of the hippocampus (all p < 0.05). An effect of partner familiarity on Zif268 immunoreactive cell counts was found in the granule layer of the dentate gyrus irrespective of age (higher in those with a familiar partner, p = 0.03) and in the medial prefrontal cortex in adolescents (higher with an unfamiliar partner, p = 0.02). Overall, the acute stress and partner familiarity produced a similar pattern of results in adolescents and adults, with both age groups sensitive to the social context.