Spelling suggestions: "subject:"betworks, social"" "subject:"conetworks, social""
41 |
Social networking site addiction in Macao / Social networking site addictionCheung, Ieng January 2012 (has links)
University of Macau / Faculty of Social Sciences and Humanities / Department of Psychology
|
42 |
The issue of corporate computing strategy : centralization versus decentralization /Kwok, Kwing-sun, Steven. January 1987 (has links)
Thesis (M.B.A.)--University of Hong Kong, 1987.
|
43 |
Modelling Awareness and Adoption: Aggregate Behaviour versus Agent-Based Interactions with Network EffectsWild, Erin 25 April 2013 (has links)
We construct and examine a model of adoption of a product or policy using, firstly, a system of differential equations and then secondly, through simulation, an agent- based model. Awareness must come before adoption, and we model this as a simple epidemic type model, where information is spread through advertising and contact with other agents in the population. Adoption is then conditional on awareness and occurs only if the agent finds the perceived cost acceptable. After simulating the system using an agent-based model, we introduce heterogeneity through the model parameters, which are then considered individual attributes and include influence rates, effectiveness of advertising, price sensitivity, and speed of adoption. We also examine the effects of various network topologies by organizing individuals into lattice and preferential attachment networks. From there, we add two extra components to the adoption mechanism by introducing a social influence factor by which an agent can be influenced by the adoption patterns of their neighbourhood, as well as a green factor, which assumes an environmental product or policy being adopted and is the likelihood that an individual will adopt based on environmental reasons alone.
|
44 |
Gender and its relationship to perception in computer-mediated communicationSierpe, Eino. January 2002 (has links)
The growth of computer-mediated communication (CMC) has generated great interest among researchers. Although perspectives vary, the anonymity inherent in textual communication and the reduction of social markers are often described as the characteristics that distinguish CMC from other forms of communication. These arguments have resulted in unprecedented optimism regarding the potential of this technology to eliminate social inequalities and increase access to institutional power. While critics have provided substantial evidence to the contrary, especially in regards to gender inequalities, CMC continues to be promoted and accepted. / Critical responses on the issue of gender have concentrated on behavioral issues. As exemplified by the work of Herring, these issues include, among others, the use of adversarial rhetorical strategies, topical control, representation in electronic communities, and the phenomenon known as "flaming". / Surprisingly, no effort has been made to address the role of gender in the cognitive aspects of CMC or directly question the claims advanced by supporters of this technology in relation to the anonymity of electronic texts. With the exception of Herring's peripheral remarks on this issue and limited work on the problem of gender judgements by Savicki and his colleagues, research is non-existent. / Given the importance of this area for the information professions, this research explores the role of gender in the cognitive processes associated with identification and impression formation. More specifically, this research addresses two concerns. The first is whether CMC users can identify the gender of those they have never met face-to-face by relying exclusively on the detection of gender cues. The second centers on the role of gender in the evaluation of electronic communicators. / Against the perspectives outlined in the feminist critique of technology, this research's theoretical framework is derived from the work of Hymes as well as literature from cognate fields. Thus, Hymes' theoretical model on the concept of communicative competence, which allows competent speakers to pass judgement on the appropriateness of linguistic events, is central to the investigation. / The results provide convincing evidence regarding the implications of gender in the cognitive dimension of CMC. Data from 133 research participants (91 females and 42 males) associated with the study of librarianship or its professional practice suggest that CMC simply recreates existing gender asymmetries. Women are less likely to remain anonymous, more likely to be described stereotypically, and more likely to be evaluated negatively.
|
45 |
Gender and community in the social constitution of the internetShade, Leslie Regan, 1957- January 1997 (has links)
This thesis has a three-fold goal: (1) it aims to contribute to studies which analyze the gender dimension in social shaping studies of technology; (2) in its emphasis on the Internet and the new information infrastructure it is a complement to the literature in communication studies on the gendering of communication technologies; and (3) it adds to emergent theories of virtual communities by positing how gendered practices and gender-related activities have influenced the emergence of social policy mores in the evolving information infrastructure. / In emphasizing the social factors that shape technological change the thesis departs from dominant approaches towards technology that typically study the "affects" or "impact" of technology on society. This thesis similarly responds to the gender-perspective gap that exists in sociotechnical studies, and enlarges the scope of gender studies through its consideration of emergent information and communication technologies, notably the Internet. How the social mores of virtual communities have been influenced and affected by and through a consideration of gender and gendered practices on the Internet forms a core component of the thesis, based upon case studies. / As this thesis argues, new information and communication technologies must be considered in relation to other communication technologies, as well as in relation to the social context in which they are designed, developed and used, including the often unarticulated social assumptions of various groups, and the unanticipated consequences of the new information infrastructure. In this sense, social scientists are now at a key turning point in their explorations of new information and communication technologies. / This thesis should be of significance to communication scholars interested in the history and theory of gender and communication technologies; social historians of technology, and feminist scholars, with an interest in a gendered perspective on new communication technologies; and public policy officials interested in how different groups of individuals will interact with, influence, and be affected by new communication and information technologies.
|
46 |
Bullying and victimization : school climate matters /Elfstrom, Jennifer L. January 2007 (has links)
Thesis (M.A.)--Miami University, Dept. of Psychology, 2007. / Includes bibliographical references (p. 23-28). Also available online via OhioLINK's ETD Center.
|
47 |
About face social networks and prestige politics in contemporary Shanghai villages /Wilson, Scott January 1994 (has links)
Thesis (Ph. D.)--Cornell University, 1994. / Vita. Includes bibliographical references (leaves 458-485).
|
48 |
About face social networks and prestige politics in contemporary Shanghai villages /Wilson, Scott Howard. January 1994 (has links)
Thesis (Ph.D.)--Cornell University, 1994. / Includes bibliographical references.
|
49 |
The importance of social movements' networks in development communication : lessons from the Zapatista Movement in Chiapas, Mexico /Garrido, Maria I. January 2006 (has links)
Thesis (Ph. D.)--University of Washington, 2006. / Vita. Includes bibliographical references (leaves 132-142).
|
50 |
Bullying and victimization school climate matters /Elfstrom, Jennifer L. January 2007 (has links)
Thesis (M.A.)--Miami University, Dept. of Psychology, 2007. / Title from first page of PDF document. Includes bibliographical references (p. 23-28).
|
Page generated in 0.0556 seconds