991 resultados para Social inhibition


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Social media is playing an ever-increasing role in both viewers engagement with television and in the television industries evaluation of programming, in Australia – which is the focus of our study - and beyond. Twitter hashtags and viewer comments are increasingly incorporated into broadcasts, while Facebook fan pages provide a means of marketing upcoming shows and television personalities directly into the social media feed of millions of users. Additionally, bespoke applications such as FanGo and ZeeBox, which interact with the mainstream social networks, are increasingly being utilized by broadcasters for interactive elements of programming (c.f. Harrington, Highfield and Bruns, 2012). However, both the academic and industry study of these platforms has focused on the measure of content during the specific broadcast of the show, or a period surrounding it (e.g. 3 hours before until 3 am the next day, in the case of 2013 Nielsen SocialGuide reports). In this paper, we argue that this focus ignores a significant period for both television producers and advertisers; the lead-up to the program. If, as we argue elsewhere (Bruns, Woodford, Highfield & Prowd, forthcoming), users are persuaded to engage with content both by advertising of the Twitter hash-tag or Facebook page and by observing their network connections engaging with such content, the period before and between shows may have a significant impact on a viewers likelihood to watch a show. The significance of this period for broadcasters is clearly highlighted by the efforts they afford to advertising forthcoming shows through several channels, including television and social media, but also more widely. Biltereyst (2004, p.123) has argued that reality television generates controversy to receive media attention, and our previous small-scale work on reality shows during 2013 and 2014 supports the theory that promoting controversial behavior is likely to lead to increased viewing (Woodford & Prowd, 2014a). It remains unclear, however, to what extent this applies to other television genres. Similarly, while networks use of social media has been increasing, best practices remain unclear. Thus, by applying our telemetrics, that is social media metrics for television based on sabermetric approaches (Woodford, Prowd & Bruns, forthcoming; c.f. Woodford & Prowd, 2014b), to the period between shows, we are able to better understand the period when key viewing decisions may be made, to establish the significance of observing discussions within your network during the period between shows, and identify best practice examples of promoting a show using social media.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

University–community engagement (UCE) represents a hybrid discourse and a set of practices within contemporary higher education. As a modality of research and teaching, ‘engagement’ denotes the process of universities forming partnerships with external communities for the promised generation of mutually beneficial and socially responsive knowledge, leading to enhanced economic, social and cultural developments. A critical discourse analysis (Fairclough 2003. Analysing Discourse: Textual analysis for social research. London: Routledge) of the Australian Universities Community Engagement Alliance’s (AUCEA) ‘Position Paper’(2008 Universities and community engagement (Position paper 2008–2010)), as reported in this article, suggests that its uneasy synthesis of neoliberal, social inclusion and civic engagement discourses into a hybrid UCE discourse semantically privileges neoliberal forms of engagement. Perhaps, as a result, the AUCEA seems to have missed an opportunity to influence the Australian ‘widening participation’ debate on securing access and opportunity for marginalised students at universities and building social and cultural capital within their communities of origin.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Social Engineering (ES) is now considered the great security threat to people and organizations. Ever since the existence of human beings, fraudulent and deceptive people have used social engineering tricks and tactics to trick victims into obeying them. There are a number of social engineering techniques that are used in information technology to compromise security defences and attack people or organizations such as phishing, identity theft, spamming, impersonation, and spaying. Recently, researchers have suggested that social networking sites (SNSs) are the most common source and best breeding grounds for exploiting the vulnerabilities of people and launching a variety of social engineering based attacks. However, the literature shows a lack of information about what types of social engineering threats exist on SNSs. This study is part of a project that attempts to predict a persons’ vulnerability to SE based on demographic factors. In this paper, we demonstrate the different types of social engineering based attacks that exist on SNSs, the purposes of these attacks, reasons why people fell (or did not fall) for these attacks, based on users’ opinions. A qualitative questionnaire-based survey was conducted to collect and analyse people’s experiences with social engineering tricks, deceptions, or attacks on SNSs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Social networking sites (SNSs), with their large number of users and large information base, seem to be the perfect breeding ground for exploiting the vulnerabilities of people, who are considered the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” Fraudulent and deceptive people use social engineering traps and tactics through SNSs to trick users into obeying them, accepting threats, and falling victim to various crimes such as phishing, sexual abuse, financial abuse, identity theft, and physical crime. Although organizations, researchers, and practitioners recognize the serious risks of social engineering, there is a severe lack of understanding and control of such threats. This may be partly due to the complexity of human behaviors in approaching, accepting, and failing to recognize social engineering tricks. This research aims to investigate the impact of source characteristics on users’ susceptibility to social engineering victimization in SNSs, particularly Facebook. Using grounded theory method, we develop a model that explains what and how source characteristics influence Facebook users to judge the attacker as credible.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background Current treatment of ovarian cancer patients with chemotherapy leaves behind a residual tumor which results in recurrent ovarian cancer within a short time frame. We have previously demonstrated that a single short-term treatment of ovarian cancer cells with chemotherapy in vitro resulted in a cancer stem cell (CSC)-like enriched residual population which generated significantly greater tumor burden compared to the tumor burden generated by control untreated cells. In this report we looked at the mechanisms of the enrichment of CSC-like residual cells in response to paclitaxel treatment. Methods The mechanism of survival of paclitaxel-treated residual cells at a growth inhibitory concentration of 50% (GI50) was determined on isolated tumor cells from the ascites of recurrent ovarian cancer patients and HEY ovarian cancer cell line by in vitro assays and in a mouse xenograft model. Results Treatment of isolated tumor cells from the ascites of ovarian cancer patients and HEY ovarian cancer cell line with paclitaxel resulted in a CSC-like residual population which coincided with the activation of Janus activated kinase 2 (JAK2) and signal transducer and activation of transcription 3 (STAT3) pathway in paclitaxel surviving cells. Both paclitaxel-induced JAK2/STAT3 activation and CSC-like characteristics were inhibited by a low dose JAK2-specific small molecule inhibitor CYT387 (1 μM) in vitro. Subsequent, in vivo transplantation of paclitaxel and CYT387-treated HEY cells in mice resulted in a significantly reduced tumor burden compared to that seen with paclitaxel only-treated transplanted cells. In vitro analysis of tumor xenografts at protein and mRNA levels demonstrated a loss of CSC-like markers and CA125 expression in paclitaxel and CYT387-treated cell-derived xenografts, compared to paclitaxel only-treated cell-derived xenografts. These results were consistent with significantly reduced activation of JAK2 and STAT3 in paclitaxel and CYT387-treated cell-derived xenografts compared to paclitaxel only-treated cell derived xenografts. Conclusions This proof of principle study demonstrates that inhibition of the JAK2/STAT3 pathway by the addition of CYT387 suppresses the ‘stemness’ profile in chemotherapy-treated residual cells in vitro, which is replicated in vivo, leading to a reduced tumor burden. These findings have important implications for ovarian cancer patients who are treated with taxane and/or platinum-based therapies. Keywords: Ovarian carcinoma, Cancer stem cell, Metastasis, Ascites, Chemoresistance, Recurrence, JAK2/STAT3 pathway

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this study was to explore associations between forms of social support and levels of psychological distress during pregnancy. Methods: A cross-sectional analysis of 2,743 pregnant women from south-east Queensland, Australia, was conducted utilising data collected between 2007-2011 as part of the Environments for Healthy Living (EFHL) project, Griffith University. Psychological distress was measured using the Kessler 6; social support was measured using the following four factors: living with a partner, living with parents or in-laws, self-perceived social network, and area satisfaction. Data were analysed using an ordered logistic regression model controlling for a range of socio-demographic factors. Results: There was an inverse association between self-perceived strength of social networks and levels of psychological distress (OR = 0.77; 95%CI: 0.70, 0.85) and between area satisfaction and levels of psychological distress (OR = 0.77; 95%CI: 0.69, 0.87). There was a direct association between living with parents or in-laws and levels of psychological distress (OR = 1.50; 95%CI: 1.16, 1.96). There was no statistically significant association between living with a partner and the level of psychological distress of the pregnant woman after accounting for household income. Conclusion: Living with parents or in-laws is a strong marker for psychological distress. Strategies aiming to build social support networks for women during pregnancy have the potential to provide a significant benefit. Policies promoting stable family relationships and networks through community development could also be effective in promoting the welfare of pregnant women.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recent natural disasters such as the Haitian earthquake 2011, the South East Queensland floods 2011, the Japanese earthquake and tsunami 2011 and Hurricane Sandy in the United States of America in 2012, have seen social media platforms changing the face of emergency management communications, not only in times of crisis and also during business-as-usual operations. With social media being such an important and powerful communication tool, especially for emergency management organisations, the question arises as to whether the use of social media in these organisations emerged by considered strategic design or more as a reactive response to a new and popular communication channel. This paper provides insight into how the social media function has been positioned, staffed and managed in organisations throughout the world, with a particular focus on how these factors influence the style of communication used on social media platforms. This study has identified that the social media function falls on a continuum between two polarised models, namely the authoritative one-way communication approach and the more interactive approach that seeks to network and engage with the community through multi-way communication. Factors such the size of the organisation; dedicated resourcing of the social media function; organisational culture and mission statement; the presence of a social media champion within the organisation; management style and knowledge about social media play a key role in determining where on the continuum organisations sit in relation to their social media capability. This review, together with a forthcoming survey of Australian emergency management organisations and local governments, will fill a gap in the current body of knowledge about the evolution, positioning and usage of social media in organisations working in the emergency management field in Australia. These findings will be fed back to Industry for potential inclusion in future strategies and practices.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

On Sunday, Germany held the World Cup aloft after scoring a goal in extra time. Somewhat surprisingly, the final wasn’t the most tweeted event of the 2014 tournament: that title went to Germany’s demolition of Brazil in its semi-final four days earlier, which ended up being the most tweeted sporting event in history. Let’s take a look back at some of the bigger stories of the World Cup from social media, as well as the prominence of the event in Europe...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The ability to inhibit unwanted actions is a heritable executive function that may confer risk to disorders such as attention deficit hyperactivity disorder (ADHD). Converging evidence from pharmacology and cognitive neuroscience suggests that response inhibition is instantiated within frontostriatal circuits of the brain with patterns of activity that are modulated by the catecholamines dopamine and noradrenaline. A total of 405 healthy adult participants performed the stop-signal task, a paradigmatic measure of response inhibition that yields an index of the latency of inhibition, termed the stop-signal reaction time (SSRT). Using this phenotype, we tested for genetic association, performing high-density single-nucleotide polymorphism mapping across the full range of autosomal catecholamine genes. Fifty participants also underwent functional magnetic resonance imaging to establish the impact of associated alleles on brain and behaviour. Allelic variation in polymorphisms of the dopamine transporter gene (SLC6A3: rs37020; rs460000) predicted individual differences in SSRT, after corrections for multiple comparisons. Furthermore, activity in frontal regions (anterior frontal, superior frontal and superior medial gyri) and caudate varied additively with the T-allele of rs37020. The influence of genetic variation in SLC6A3 on the development of frontostriatal inhibition networks may represent a key risk mechanism for disorders of behavioural inhibition.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article explores a number of social control strategies on individuals and families actioned by the newly created state-national project during the first decades of Colombian XIX century. With special attention on the discourse of urbanity, also named 'civility or good manners', this paper analyses literary sources produced in the time for molding citizens behaviors in order to incorporate the society into the new paradigm of Modernity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

While organizations strive to leverage the vast information generated daily from social media platforms and both decision makers and consultants are keen to identify and exploit this information’s value, there has been little research into social media in the business context. Social media are diverse, varying in scope and functionality, this diversity entailing a complex of attributes and characteristics, resulting in confusion for both researchers and organizations. Taxonomies are important precursors in emerging fields and are foundational for rigorous theory building. Though aspects of social media have been studied from various discipline perspectives, this work has been largely descriptive. Thus, while the need for a rigorous taxonomy of social media is strong, previous efforts to classify social media suffer limitations – e.g. lack of a systematic taxonomic method, overreliance on intuition, disregard for the users’ perspective, and inadequate consideration of purpose. Thus, this study was mainly initiated by the overarching question “How can social media in the business context be usefully classified?” In order to address this gap, the current paper proposes a systematic method for developing a taxonomy appropriate to study social media in organizations context, combining Nickerson et al,’s (2012) IS taxonomy building guidelines and a Repertory grid (RepGrid) approach.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Healthcare professionals’ use of social media platforms, such as blogs, wikis, and social networking web sites has grown considerably in recent years. However, few studies have explored the perspectives and experiences of physicians in adopting social media in healthcare. This article aims to identify the potential benefits and challenges of adopting social media by physicians and demonstrates this by presenting findings from a survey conducted with physicians. A qualitative survey design was employed to achieve the research goal. Semi-structured interviews were conducted with 24 physicians from around the world who were active users of social media. The data were analyzed using the thematic analysis approach. The study revealed six main reasons and six major challenges for physicians adopting social media. The main reasons to join social media were as follows: staying connected with colleagues, reaching out and networking with the wider community, sharing knowledge, engaging in continued medical education, benchmarking, and branding. The main challenges of adopting social media by physicians were also as follows: maintaining confidentiality, lack of active participation, finding time, lack of trust, workplace acceptance and support, and information anarchy. By revealing the main benefits as well as the challenges of adopting social media by physicians, the study provides an opportunity for healthcare professionals to better understand the scope and impact of social media in healthcare, and assists them to adopt and harness social media effectively, and maximize the benefits for the specific needs of the clinical community.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Submission in response to government options paper regarding arrangements for regulation of charities following abolition of the Australian Charities and Not-for-profits Commission.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The ubiquitin-proteasome system targets many cellular proteins for degradation and thereby controls most cellular processes. Although it is well established that proteasome inhibition is lethal, the underlying mechanism is unknown. Here, we show that proteasome inhibition results in a lethal amino acid shortage. In yeast, mammalian cells, and flies, the deleterious consequences of proteasome inhibition are rescued by amino acid supplementation. In all three systems, this rescuing effect occurs without noticeable changes in the levels of proteasome substrates. In mammalian cells, the amino acid scarcity resulting from proteasome inhibition is the signal that causes induction of both the integrated stress response and autophagy, in an unsuccessful attempt to replenish the pool of intracellular amino acids. These results reveal that cells can tolerate protein waste, but not the amino acid scarcity resulting from proteasome inhibition.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Social Networks (SN) users have various privacy requirements to protect their information; to address this issue, a six-stage thematic analysis of scholarly articles related to SN user privacy concerns were synthesized. Then this research combines mixed methods research employing the strengths of quantitative and qualitative research to investigate general SN users, and thus construct a new set of ?ve primary and Twenty-?ve secondary SN user privacy requirements. Such an approach has been rarely used to examine the privacy requirements. Factor analysis results show superior agreement with theoretical predictions and signi?cant improvement over previous alternative models of SN user privacy requirements. This research presented here has the potential to provide for the development of more sophisticated privacy controls which will increase the ability of SN users to: specify their rights in SNs and to determine the protection of their own SN data.