986 resultados para WOMENS PERSONAL NETWORKS
Resumo:
On online social networks such as Facebook, massive self-disclosure by users has attracted the attention of industry players and policymakers worldwide. Despite the impressive scope of this phenomenon, very little is understood about what motivates users to disclose personal information. Integrating focus group results into a theoretical privacy calculus framework, we develop and empirically test a Structural Equation Model of self-disclosure with 259 subjects. We find that users are primarily motivated to disclose information because of the convenience of maintaining and developing relationships and platform enjoyment. Countervailing these benefits, privacy risks represent a critical barrier to information disclosure. However, users’ perception of risk can be mitigated by their trust in the network provider and availability of control options. Based on these findings, we offer recommendations for network providers.
Resumo:
Accurate ascertainment of risk factors and disease status is vital in public health research for proper classification of research subjects. The two most common ways of obtaining this data is by self-report and review of medical records (MRs). South Texas Women’s Health Project was a case-control study looking at interrelationships between hormones, diet, and body size and breast cancer among Hispanic women 30-79 years of age. History of breast cancer, diabetes mellitus (DM) and use of DM medications was ascertained from a personal interview. At the time of interview, the subject identified her major health care providers and signed the medical records release form, which was sent to the designated providers. The MRs were reviewed to confirm information obtained from the interview.^ Aim of this study was to determine the sensitivity and specificity between MRs and personal interview in diagnosis of breast cancer, DM and DM treatment. We also wanted to assess how successful our low-cost approach was in obtaining pertinent MRs and what factors influenced the quality of MR or interview data. Study sample was 721 women with both self-report and MR data available by June 2007. Overall response rate for MR requests was 74.5%. MRs were 80.9% sensitive and 100% specific in confirming breast cancer status. Prevalence of DM was 22.7% from the interviews and 16% from MRs. MRs did not provide definite information about DM status of 53.6% subjects. Sensitivity and specificity of MRs for DM status was 88.9% and 90.4% respectively. Disagreement on DM status from the two sources was seen in 15.9% subjects. This discordance was more common among older subjects, those who were married and were predominantly Spanish speaking. Income and level of education did not have a statistically significantly association with this disagreement.^ Both self-report and MRs underestimate the prevalence of DM. Relying solely on MRs leads to greater misclassification than relying on self-report data. MRs have good to excellent specificity and thus serve as a good tool to confirm information obtained from self-report. Self-report and MRs should be used in a complementary manner for accurate assessment of DM and breast cancer status.^
Resumo:
La práctica de profesiones relacionadas con la salud se asocia a agotamiento físico y psicológico capaz de producir alteraciones en el plano de la sexualidad. Mediante una encuesta estructurada y anónima se valoró el grado de satisfacción respecto a la calidad de vida sexual y los factores relacionados con esta en médicos, residentes y enfermeros. El 62% afirmó que desde el inicio de la actividad laboral disminuyó la frecuencia y calidad de las relaciones sexuales, primordialmente en residentes (69.3%) (p<0.05) y mujeres (61%), el 33.1% refirió mayor atracción por otras personas y 15% infidelidad. El 71.8% consideró que la frecuencia no era óptima, el 48.6% no estaba satisfecho y el 37.3% que la pareja no estaba conforme con su desempeño sexual. Las mujeres utilizan más pretextos para evitar la relación sexual (22.6 vs. 6.1%), consideran que satisfacen menos a sus parejas (45 vs. 22%) y tienen orgasmos menos frecuentemente (22 vs. 8%) que los hombres (p< 0.05) y estos son más infieles (24.5 vs. 9.7%) (p< 0.05). Los residentes refieren que la frecuencia y calidad sexual disminuyó más con el inicio del trabajo (71.8 vs. 46.7%) (p<0.05), atribuido principalmente al cansancio extremo y se sienten más atraídos por compañeros de trabajo que los médicos de planta (24 vs. 2%) (p<0.05). El cuidado de la salud es un determinante de riesgo de disfunción sexual causado por las demandas y condiciones laborales, que genera un alto grado de estrés y desgaste psicofísico, que conducen a un deterioro de la salud sexual.
Resumo:
Este artículo se centra en el análisis de redes personales digitales de un grupo de adolescentes del último año de una escuela secundaria de gestión privada en Mendoza, Argentina. Se escogió Facebook porque es la red más difundida entre ellos. El objetivo de este estudio fue analizar las redes de Facebook de adolescentes de una escuela con una fuerte implementación de las TIC y comprender las percepciones que tienen sobre sus vinculaciones digitales. La recolección de los datos fueron tres momentos (administración de TouchGraph sobre Facebook, entrevista individual y Focus Group). El análisis de los datos fue cuantitativo, de análisis de grafos y cualitativo. Con respecto a los resultados se observaron que los varones tuvieron redes con mayor dispersión en cuanto al número de miembros y las mujeres mayor homogeneidad (menor número de subgrupos). En los grafos se observó que la familia tuvo una baja importancia (está aislada, es pequeña y con baja relación o no está). El análisis cualitativo, reveló un acercamiento crítico a Facebook y que la protección de la privacidad obstaculiza la relación a través de esta red con la escuela y los padres. Finalmente las redes personales digitales brindan apoyo afectivo, informacional, tangible y axiológico.
Resumo:
Next Generation Networks (NGN) provide Telecommunications operators with the possibility to share their resources and infrastructure, facilitate the interoperability with other networks, and simplify and unify the management, operation and maintenance of service offerings, thus enabling the fast and cost-effective creation of new personal, broadband ubiquitous services. Unfortunately, service creation over NGN is far from the success of service creation in the Web, especially when it comes to Web 2.0. This paper presents a novel approach to service creation and delivery, with a platform that opens to non-technically skilled users the possibility to create, manage and share their own convergent (NGN-based and Web-based) services. To this end, the business approach to user-generated services is analyzed and the technological bases supporting the proposal are explained.
Resumo:
One of the advantages of social networks is the possibility to socialize and personalize the content created or shared by the users. In mobile social networks, where the devices have limited capabilities in terms of screen size and computing power, Multimedia Recommender Systems help to present the most relevant content to the users, depending on their tastes, relationships and profile. Previous recommender systems are not able to cope with the uncertainty of automated tagging and are knowledge domain dependant. In addition, the instantiation of a recommender in this domain should cope with problems arising from the collaborative filtering inherent nature (cold start, banana problem, large number of users to run, etc.). The solution presented in this paper addresses the abovementioned problems by proposing a hybrid image recommender system, which combines collaborative filtering (social techniques) with content-based techniques, leaving the user the liberty to give these processes a personal weight. It takes into account aesthetics and the formal characteristics of the images to overcome the problems of current techniques, improving the performance of existing systems to create a mobile social networks recommender with a high degree of adaptation to any kind of user.
Resumo:
The understanding of the structure and dynamics of the intricate network of connections among people that consumes products through Internet appears as an extremely useful asset in order to study emergent properties related to social behavior. This knowledge could be useful, for example, to improve the performance of personal recommendation algorithms. In this contribution, we analyzed five-year records of movie-rating transactions provided by Netflix, a movie rental platform where users rate movies from an online catalog. This dataset can be studied as a bipartite user-item network whose structure evolves in time. Even though several topological properties from subsets of this bipartite network have been reported with a model that combines random and preferential attachment mechanisms [Beguerisse Díaz et al., 2010], there are still many aspects worth to be explored, as they are connected to relevant phenomena underlying the evolution of the network. In this work, we test the hypothesis that bursty human behavior is essential in order to describe how a bipartite user-item network evolves in time. To that end, we propose a novel model that combines, for user nodes, a network growth prescription based on a preferential attachment mechanism acting not only in the topological domain (i.e. based on node degrees) but also in time domain. In the case of items, the model mixes degree preferential attachment and random selection. With these ingredients, the model is not only able to reproduce the asymptotic degree distribution, but also shows an excellent agreement with the Netflix data in several time-dependent topological properties.
Resumo:
Con la intención de experimentar con nuevas formas de aprendizaje a través de la Educomunicación y de los MOOCs sociales o sMOOC, creamos una experiencia de aprendizaje colaborativo y de empoderamiento individual y social, a través de nuestra propuesta “Road sMOOC: Un viaje Eduktransformador”, llevado a cabo en la Plataforma ECOLearning. La finalidad de este sMOOC ha sido emprender un viaje de descubrimiento personal y de alfabetización digital crítica, motivando a los participantes a que dejen aflorar su potencial transformador y que participen activamente en las redes sociales, generando así un aprendizaje colectivo y aumentando el impacto social de nuestras acciones. Se reflexiona sobre los autores que nos inspiraron, sobre lo que entendemos por Educomunicación transformadora y las posibilidades que ofrecen los sMOOC. Finalmente resumimos los objetivos, recursos creados, aprendizajes compartidos y conclusiones que surgen al co-crear una identidad colectiva y un espíritu de trabajo en comunidad como “Eduktransformers”.
Resumo:
The sources of ideas embodied within successful technological innovation has been a subject of interest in many studies since the 1950s. This research suggests that sources external to the innovating organisation account for between one and two-thirds of the inputs important to the innovation process. In addition, studies have long highlighted the important role played by the personal boundary-spanning relationships of engineers and scientists as a channel for the transference of such inputs. However, research concerning the role and nature of personal boundary-spanning links in the innovation process have either been primarily structurally orientated, seeking to map out the informal networks of scientists and engineers, or more typically, anecdotal. The objective of this research was to reveal and build upon our knowledge of the role, nature and importance of informal exchange activity in the innovation process. In order to achieve this, an empirical study was undertaken to determine the informal sources, channels and mechanisms employed in the development of thirty five award-winning innovations. Through the adoption of the network perspective, the multiple sources and pluralistic patterns of collaboration and communication in the innovation process were systematically explored. This approach provided a framework that allowed for the detailed study of both the individual dyadic links and morphology of the innovation action-sets in which these dyads were embedded. The research found, for example, that the mobilisation of boundary-spanning links and networks was an important or critical factor in nineteen (54%) of the development projects. Of these, informal boundary-spanning exchange activity was considered to be important or critical in eight (23%).
Resumo:
This thesis reports the findings of three studies examining relationship status and identity construction in the talk of heterosexual women, from a feminist and social constructionist perspective. Semi-structured interviews were conducted with 12 women in study 1 and 13 women for study 2, between the ages of twenty and eighty-seven, discussing their experiences of relationships. All interviews were transcribed and analysed using discourse analysis, by hand and using the Nudist 6 program. The resulting themes create distinct age-related marital status expectations. Unmarried women were aware they had to marry by a ‘certain age’ or face a ‘lonely spinsterhood’. Through marriage women gained a socially accepted position associated with responsibility for others, self-sacrifice, a home-focused lifestyle and relational identification. Divorce was constructed as the consequence of personal faults and poor relationship care, reassuring the married of their own control over their status. Older unmarried women were constructed as deviant and pitiable, occupying social purgatory as a result of transgressing these valued conventions. Study 3 used repertory grid tasks, with 33 women, analysing transcripts and notes alongside numerical data using Web Grid II internet analysis tool, to produce principle components maps demonstrating the relationships between relationship terms and statuses. This study illuminated the consistency with which women of different ages and status saw marriage as their ideal living situation and outlined the domestic responsibilities associated. Spinsters and single-again women were defined primarily by their lack of marriage and by loneliness. This highlighted the devalued position of older unmarried women. The results of these studies indicated a consistent set of age-related expectations of relationship status, acknowledged by women and reinforced by their families and friends, which render many unmarried women deviant and fail to acknowledge the potential variety of women’s ways of living.
Resumo:
Purpose – The main purpose of this paper is to analyze knowledge management in service networks. It analyzes the knowledge management process and identifies related challenges. The authors take a strategic management approach instead of a more technology-oriented approach, since it is believed that managerial problems still remain after technological problems are solved. Design/methodology/approach – The paper explores the literature on the topic of knowledge management as well as the resource (or knowledge) based view of the firm. It offers conceptual insights and provides possible solutions for knowledge management problems. Findings – The paper discusses several possible solutions for managing knowledge processes in knowledge-intensive service networks. Solutions for knowledge identification/generation, knowledge application, knowledge combination/transfer and supporting the evolution of tacit network knowledge include personal and technological aspects, as well as organizational and cultural elements. Practical implications – In a complex environment, knowledge management and network management become crucial for business success. It is the task of network management to establish routines, and to build and regularly refresh meta-knowledge about the competencies and abilities that exist within the network. It is suggested that each network partner should be rated according to the contribution to the network knowledge base. Based on this rating, a particular network partner is a member of a certain knowledge club, meaning that the partner has access to a particular level of network knowledge. Such an established routine provides strong incentives to add knowledge to the network's knowledge base Originality/value – This paper is a first attempt to outline the problems of knowledge management in knowledge-intensive service networks and, by so doing, to introduce strategic management reasoning to the discussion.
Resumo:
Orthogonal frequency division multiplexing (OFDM) is becoming a fundamental technology in future generation wireless communications. Call admission control is an effective mechanism to guarantee resilient, efficient, and quality-of-service (QoS) services in wireless mobile networks. In this paper, we present several call admission control algorithms for OFDM-based wireless multiservice networks. Call connection requests are differentiated into narrow-band calls and wide-band calls. For either class of calls, the traffic process is characterized as batch arrival since each call may request multiple subcarriers to satisfy its QoS requirement. The batch size is a random variable following a probability mass function (PMF) with realistically maximum value. In addition, the service times for wide-band and narrow-band calls are different. Following this, we perform a tele-traffic queueing analysis for OFDM-based wireless multiservice networks. The formulae for the significant performance metrics call blocking probability and bandwidth utilization are developed. Numerical investigations are presented to demonstrate the interaction between key parameters and performance metrics. The performance tradeoff among different call admission control algorithms is discussed. Moreover, the analytical model has been validated by simulation. The methodology as well as the result provides an efficient tool for planning next-generation OFDM-based broadband wireless access systems.
Resumo:
In this paper, a congestion control mechanism is presented for multiservice wireless OFDMA networks. The revenue rate and the user SNR's are used to partition the bandwidth in accordance with a complete partitioning structure. Moreover, through the use of our scheme the QoS of any ongoing connections can be satisfied. Results show that the revenue rate plays an important role in prioritizing the different services. © 2013 Springer Science+Business Media New York.
Resumo:
IEEE 802.15.4 standard has been proposed for low power wireless personal area networks. It can be used as an important component in machine to machine (M2M) networks for data collection, monitoring and controlling functions. With an increasing number of machine devices enabled by M2M technology and equipped with 802.15.4 radios, it is likely that multiple 802.15.4 networks may be deployed closely, for example, to collect data for smart metering at residential or enterprise areas. In such scenarios, supporting reliable communications for monitoring and controlling applications is a big challenge. The problem becomes more severe due to the potential hidden terminals when the operations of multiple 802.15.4 networks are uncoordinated. In this paper, we investigate this problem from three typical scenarios and propose an analytic model to reveal how performance of coexisting 802.15.4 networks may be affected by uncoordinated operations under these scenarios. Simulations will be used to validate the analytic model. It is observed that uncoordinated operations may lead to a significant degradation of system performance in M2M applications. With the proposed analytic model, we also investigate the performance limits of the 802.15.4 networks, and the conditions under which coordinated operations may be required to support M2M applications. © 2012 Springer Science + Business Media, LLC.
Resumo:
With the advent of GPS enabled smartphones, an increasing number of users is actively sharing their location through a variety of applications and services. Along with the continuing growth of Location-Based Social Networks (LBSNs), security experts have increasingly warned the public of the dangers of exposing sensitive information such as personal location data. Most importantly, in addition to the geographical coordinates of the user’s location, LBSNs allow easy access to an additional set of characteristics of that location, such as the venue type or popularity. In this paper, we investigate the role of location semantics in the identification of LBSN users. We simulate a scenario in which the attacker’s goal is to reveal the identity of a set of LBSN users by observing their check-in activity. We then propose to answer the following question: what are the types of venues that a malicious user has to monitor to maximize the probability of success? Conversely, when should a user decide whether to make his/her check-in to a location public or not? We perform our study on more than 1 million check-ins distributed over 17 urban regions of the United States. Our analysis shows that different types of venues display different discriminative power in terms of user identity, with most of the venues in the “Residence” category providing the highest re-identification success across the urban regions. Interestingly, we also find that users with a high entropy of their check-ins distribution are not necessarily the hardest to identify, suggesting that it is the collective behaviour of the users’ population that determines the complexity of the identification task, rather than the individual behaviour.