• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 15
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 27
  • 27
  • 27
  • 27
  • 13
  • 12
  • 7
  • 6
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Seed and Grow: An Attack Against Anonymized Social Networks

Peng, Wei 07 August 2012 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / Digital traces left by a user of an on-line social networking service can be abused by a malicious party to compromise the person’s privacy. This is exacerbated by the increasing overlap in user-bases among various services. To demonstrate the feasibility of abuse and raise public awareness of this issue, I propose an algorithm, Seed and Grow, to identify users from an anonymized social graph based solely on graph structure. The algorithm first identifies a seed sub-graph either planted by an attacker or divulged by collusion of a small group of users, and then grows the seed larger based on the attacker’s existing knowledge of the users’ social relations. This work identifies and relaxes implicit assumptions taken by previous works, eliminates arbitrary parameters, and improves identification effectiveness and accuracy. Experiment results on real-world collected datasets further corroborate my expectation and claim.
22

Inside on-line : interaction and community in graduate students’ use of computer-mediated communication

Potts, Diane 05 1900 (has links)
A qualitative investigation into language education students' use of computer-mediated communication, this study reveals how the diversity, support and resources constructed through students on-line dialogue served to scaffold students' language and content learning. The study focuses on student interaction on an asynchronous bulletin board used as an adjunct to a graduate seminar. The radicals of persistent conversation (Bregman & Haythornthwaite, 2001) interacted with elements of the seminar design to facilitate non-native speakers' entry into the dialogue, while simultaneously affording all students with opportunities for exercising agency in their own learning. Relationships between native and nonnative speakers of English were altered by nonnative speakers' ability to communicate their competence, and participants developed a strong identity as a community. Diversity and community evolved as valuable contributors to individual learning.
23

'Technic' practices of the computer game Lanner: identity development through the LAN-gameplay experience

Khunyeli, Ramotsamai Itumeleng January 2011 (has links)
This thesis is a reception analysis using qualitative interviews to investigate the formation of cultural groups around computer-game LANs present in Rhodes University. It also looks at how issues of social inequalities evident on the university's campus impact on the participation of students in these LANs. The findings of this study are that the participants have established a community around the practice of computer LAN-gameplay based on values developed through the combination of the material and gameworlds. It serves as a home-on-campus for them; where they can fully explore their passion for games thus reaffirming their identity as gamers on a campus where being a gamer is viewed negatively. In this light, computer-game playing is not just a practice these participants perform, but a culture they live out every day. This is a culture predominantly lived out by men. One of the reasons for this is because most women have been raised to believe to have negative predispositions about digital gaming e.g. that it is childish, addictive and anti-social, but also that computer are meant to be used by men - women use them only when it is absolutely necessary, for example, that it is childish, for academic-related purposes. As a result, not many of them will use computers for any otherreason for fear of being socially criticised. In addition, the gaming culture being dominated by whites is due to the fact that admittance in to this community is still unaffordable for the majority of black students on the Rhodes University campus as a result of their social backgrounds.
24

Inside on-line : interaction and community in graduate students’ use of computer-mediated communication

Potts, Diane 05 1900 (has links)
A qualitative investigation into language education students' use of computer-mediated communication, this study reveals how the diversity, support and resources constructed through students on-line dialogue served to scaffold students' language and content learning. The study focuses on student interaction on an asynchronous bulletin board used as an adjunct to a graduate seminar. The radicals of persistent conversation (Bregman & Haythornthwaite, 2001) interacted with elements of the seminar design to facilitate non-native speakers' entry into the dialogue, while simultaneously affording all students with opportunities for exercising agency in their own learning. Relationships between native and nonnative speakers of English were altered by nonnative speakers' ability to communicate their competence, and participants developed a strong identity as a community. Diversity and community evolved as valuable contributors to individual learning. / Education, Faculty of / Language and Literacy Education (LLED), Department of / Graduate
25

More connections, less connection: An examination of the effects of computer-mediated communication on relationships.

McGlynn, Joseph 12 1900 (has links)
The impact of computer-mediated communication (CMC) on relational behavior is a topic of increasing interest to communication scholars (McQuillen, 2003; Tidwell & Walther, 2002). One of the most interesting issues that CMC raises concerns the impact of CMC on relational maintenance and development. Using dialectical theory, social exchange theory, social information processing theory, and the hyperpersonal perspective as theoretical frameworks, this study used quantitative and qualitative analyses to identity potential effects of CMC on relationships. Study 1 (n=317) examined the effects of CMC on relational closeness, satisfaction, and social support. Study 2 (n=196) explored the reasons individuals provide for privileging computer-mediated forms of communication, and the perceived effects of using CMC in relational communication. Results indicated that quality of CMC predicted increased perceptions of social support and relationship satisfaction. Results further suggested that CMC enabled participants to manage more effectively relational tensions of autonomy-connection and openness-closedness. Specifically, individuals used CMC to retain higher levels of conversational control, and to maintain greater numbers of relationships with decreased levels of investment. This paper concludes with a discussion of implications and directions for future research.
26

Designing an online support community for novice computer users

Caswell, Thomas Hubbard 01 January 2004 (has links)
This project seeks to identify characteristics of successful online communities and apply them to designing and prototyping an online discussion forum where novice computer users can share computer questions and answers. Usability and sociability are identified as essential goals in the development of online communities. Appropriate and effective Computer Mediated Communication (CMC) software is evaluated and selected to run the discussion forum.
27

Trust modelling through social sciences

Kalash, Abeer January 2014 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / In today's fast paced world, people have become increasingly interested in online communication to facilitate their lives and make it faster. This goes on from simple social interactions to more advanced actions like shopping on the internet. The presence of such activities makes it crucial for people to use their common sense and judgment to process all this information and evaluate what/who they trust and what/whom they do not. This process would have been much easier if the number of people in such networks is really small and manageable. However, there are millions of users who are hooked online every day. This makes the person very overwhelmed with his trusting decision, especially when it comes to interacting with strangers over the internet, and/or buying personal items, especially expensive ones. Therefore, many trust models have been proposed by computer scientists trying to evaluate and manage the trust between users using different techniques and combining many factors. What these computer scientists basically do is coming up with mathematical formulas and models to express trust in online networks and capture its parameters. However, social scientists are the people better trained to deal with concepts related to human behaviors and their cognitive thinking such as trust. Thus, in order for computer scientists to support their ideas and get a better insight about how to direct their research, people like social scientists should contribute. With this in mind, we realized in our group work the importance of such contribution, so we came up with the idea of my research work. In my search, I tried to find how these social scientists think and tackle a dynamic notion like trust, so we can use their findings in order to enhance our work and trust model. Through the chapters, I will discuss an already developed trust model that uses measurement theory in modeling trust. I will refer back to this model and see how other social scientists dealt with some of the issues encountered by the model and its functionality. Some small experiments have been done to show and compare our results with social scientists results for the same matter. One of the most important and controversial points to be discussed from social scientists' point of view is whether trust is transitive or not. Other points to be discussed and supported by social scientists' research include aggregation, reputation, timing effects on trust, reciprocity, and experience effects on trust. Some of these points are classified into trust mapping categories and others are related to trust management or decision making stages. In sum, this work is a multidisciplinary study of trust whose overall goal is to enhance our work and results, as computer scientists.

Page generated in 0.1054 seconds