Spelling suggestions: "subject:"anline social networks."" "subject:"bnline social networks.""
331 |
Addressing Relationships among Moral Judgment Development, Narcissism, and Electronic Media and Communication DevicesSaculla, Meghan M. 01 August 2010 (has links)
Recently, Thoma and Bebeau (2008) reported moral judgment developmental trends among various samples of undergraduates and graduates where increases in Personal Interests reasoning and decreases in Postconventional reasoning were observed. In an attempt to explain such trends, they cited recent trends in increased narcissism among college students (Twenge, Konrath, Foster, Campbell, & Bushman, 2008) and also noted that certain types of technological devices (i.e. social networking websites, cell phones, etc.) may have adverse effects social decision-making and self-presentation. The current study, therefore, addresses the relationships among moral judgment development, narcissism, and electronic media and communication devices (EMCD's). Analyses support that the extent of EM CD usage, as well as the reasons for usage, contribute to decreased Postconventional reasoning, but have a negligible effect on Personal Interests reasoning.
|
332 |
Economic issues in distributed computingHuang, Yun, 1973- 28 August 2008 (has links)
On the Internet, one of the essential characteristics of electronic commerce is the integration of large-scale computer networks and business practices. Commercial servers are connected through open and complex communication technologies, and online consumers access the services with virtually unpredictable behavior. Both of them as well as the e-Commerce infrastructure are vulnerable to cyber attacks. Among the various network security problems, the Distributed Denial-of-Service (DDoS) attack is a unique example to illustrate the risk of commercial network applications. Using a massive junk traffic, literally anyone on the Internet can launch a DDoS attack to flood and shutdown an eCommerce website. Cooperative technological solutions for Distributed Denial-of-Service (DDoS) attacks are already available, yet organizations in the best position to implement them lack incentive to do so, and the victims of DDoS attacks cannot find effective methods to motivate the organizations. Chapter 1 discusses two components of the technological solutions to DDoS attacks: cooperative filtering and cooperative traffic smoothing by caching, and then analyzes the broken incentive chain in each of these technological solutions. As a remedy, I propose usage-based pricing and Capacity Provision Networks, which enable victims to disseminate enough incentive along attack paths to stimulate cooperation against DDoS attacks. Chapter 2 addresses possible Distributed Denial-of-Service (DDoS) attacks toward the wireless Internet including the Wireless Extended Internet, the Wireless Portal Network, and the Wireless Ad Hoc network. I propose a conceptual model for defending against DDoS attacks on the wireless Internet, which incorporates both cooperative technological solutions and economic incentive mechanisms built on usage-based fees. Cost-effectiveness is also addressed through an illustrative implementation scheme using Policy Based Networking (PBN). By investigating both technological and economic difficulties in defense of DDoS attacks which have plagued the wired Internet, our aim here is to foster further development of wireless Internet infrastructure as a more secure and efficient platform for mobile commerce. To avoid centralized resources and performance bottlenecks, online peer-to-peer communities and online social network have become increasingly popular. In particular, the recent boost of online peer-to-peer communities has led to exponential growth in sharing of user-contributed content which has brought profound changes to business and economic practices. Understanding the dynamics and sustainability of such peer-to-peer communities has important implications for business managers. In Chapter 3, I explore the structure of online sharing communities from a dynamic process perspective. I build an evolutionary game model to capture the dynamics of online peer-to-peer communities. Using online music sharing data collected from one of the IRC Channels for over five years, I empirically investigate the model which underlies the dynamics of the music sharing community. Our empirical results show strong support for the evolutionary process of the community. I find that the two major parties in the community, namely sharers and downloaders, are influencing each other in their dynamics of evolvement in the community. These dynamics reveal the mechanism through which peer-to-peer communities sustain and thrive in a constant changing environment. / text
|
333 |
Vulnerability in online social network profiles : a framework for measuring consequences of information disclosure in online social networksAlim, Sophia January 2011 (has links)
The increase in online social network (OSN) usage has led to personal details known as attributes being readily displayed in OSN profiles. This can lead to the profile owners being vulnerable to privacy and social engineering attacks which include identity theft, stalking and re identification by linking. Due to a need to address privacy in OSNs, this thesis presents a framework to quantify the vulnerability of a user's OSN profile. Vulnerability is defined as the likelihood that the personal details displayed on an OSN profile will spread due to the actions of the profile owner and their friends in regards to information disclosure. The vulnerability measure consists of three components. The individual vulnerability is calculated by allocating weights to profile attribute values disclosed and neighbourhood features which may contribute towards the personal vulnerability of the profile user. The relative vulnerability is the collective vulnerability of the profiles' friends. The absolute vulnerability is the overall profile vulnerability which considers the individual and relative vulnerabilities. The first part of the framework details a data retrieval approach to extract MySpace profile data to test the vulnerability algorithm using real cases. The profile structure presented significant extraction problems because of the dynamic nature of the OSN. Issues of the usability of a standard dataset including ethical concerns are discussed. Application of the vulnerability measure on extracted data emphasised how so called 'private profiles' are not immune to vulnerability issues. This is because some profile details can still be displayed on private profiles. The second part of the framework presents the normalisation of the measure, in the context of a formal approach which includes the development of axioms and validation of the measure but with a larger dataset of profiles. The axioms highlight that changes in the presented list of profile attributes, and the attributes' weights in making the profile vulnerable, affect the individual vulnerability of a profile. iii Validation of the measure showed that vulnerability involving OSN profiles does occur and this provides a good basis for other researchers to build on the measure further. The novelty of this vulnerability measure is that it takes into account not just the attributes presented on each individual profile but features of the profiles' neighbourhood.
|
334 |
Utilizing Web 2.0 for personalized learning :|ba case of South African higher educationHowe, Emmanuel Lungile. January 2010 (has links)
Thesis (MTech. degree in Business Information Systems.)--Tshwane University of Technology, 2010. / The lack of ubiquitous social presence of instructors, tutors and knowledgeable experts was seen as a research problem, where the above are not always available for consultation should a learner face a learning challenge. With the existence of Web 2.0, there are opportunities to cushion those challenges faced by learners, by incorporating a personal learning environment. The activity and social presence theories were used as lenses, to understand learner interactions (whose outcome is personalized learning) provided by varied Web 2.0 tools. The research argument was, therefore, that Web 2.0 could help learners achieve personalized learning support, in varied learning contexts. The evidence shows that different applications available in a Web 2.0 environment creates a personalized learning environment for learners to interact, share knowledge and collaborate, with those who are not in the same location.
|
335 |
New-media social networks, issue networks, and policy communities : getting and using powerMartin, Terrance F. 16 September 2010 (has links)
This PAR project used applied communications to get and use power to influence public policy. Informed by social and policy network theories, the method used Facebook as an organizing tool to create and position a recreation issue network in tension with an environmental policy community, exploring the concepts of layering, conversion, exhaustion, policy image, and venue change in an effort to influence policy. The introduction of a new-media social network as a competing influence in a policy network was an innovation, and demonstrated that the “strength of weak ties” may have implications for policy-making. The study concluded that a Facebook group was an efficient and effective organizing tool, capable of organizing an issue network and disrupting the status quo; however, the tightly coupled nature of a policy community makes it highly resilient to outside influence and an issue network may not gain sufficient influence to change policy. Keywords: Facebook, new-media social network, policy community, issue network, policy image, venue manipulation, layering, conversion, exhaustion
|
336 |
All Trust Is Local: Empowering Users’ Authentication Decisions on the InternetKim, Tiffany Hyun-Jin 01 October 2012 (has links)
No description available.
|
337 |
Automatic identification and removal of low quality online informationWebb, Steve 17 November 2008 (has links)
The advent of the Internet has generated a proliferation of online information-rich environments, which provide information consumers with an unprecedented amount of freely available information. However, the openness of these environments has also made them vulnerable to a new class of attacks called Denial of Information (DoI) attacks. Attackers launch these attacks by deliberately inserting low quality information into information-rich environments to promote that information or to deny access to high quality information. These attacks directly threaten the usefulness and dependability of online information-rich environments, and as a result, an important research question is how to automatically identify and remove this low quality information from these environments. The first contribution of this thesis research is a set of techniques for automatically recognizing and countering various forms of DoI attacks in email systems. We develop a new DoI attack based on camouflaged messages, and we show that spam producers and information consumers are entrenched in a spam arms race. To break free of this arms race, we propose two solutions. One solution involves refining the statistical learning process by associating disproportionate weights to spam and legitimate features, and the other solution leverages the existence of non-textual email features (e.g., URLs) to make the classification process more resilient against attacks. The second contribution of this thesis is a framework for collecting, analyzing, and classifying examples of DoI attacks in the World Wide Web. We propose a fully automatic Web spam collection technique and use it to create the Webb Spam Corpus -- a first-of-its-kind, large-scale, and publicly available Web spam data set. Then, we perform the first large-scale characterization of Web spam using content and HTTP session analysis. Next, we present a lightweight, predictive approach to Web spam classification that relies exclusively on HTTP session information. The final contribution of this thesis research is a collection of techniques that detect and help prevent DoI attacks within social environments. First, we provide detailed descriptions for each of these attacks. Then, we propose a novel technique for capturing examples of social spam, and we use our collected data to perform the first characterization of social spammers and their behaviors.
|
338 |
We the undersigned: anonymous dissent and the struggle for personal identity in online petitionsRiley, Will 12 February 2009 (has links)
Anonymous signatures pose a significant threat to the legitimacy of the online petition as a persuasive form of political communication. While anonymous signatures address some privacy concerns for online petitioners, they often fail to identify petitioners as numerically distinct and socially relevant persons, Since anonymous signatures often fail to personally identify online petitioners, they often fail to provide sufficient reason for targeted political authorities to review and respond to their grievances. To recover the personal rhetoric of the online petition in a way that strikes a balance between the publicity and privacy concerns of petitioners, we should reformat online petitions as pseudonymous social networks of personal testimony between petitioners and targeted political authorities. To this end, the pseudonymous signatures of online petitions should incorporate social frames, co-authored complaints and demands, multimedia voice, and revisable support.
|
339 |
Tagging, rating, posting : studying forms of user contribution for web-based information management and information retrieval /Heckner, Markus January 2008 (has links)
Zugl.: Regensburg, Univ., Diss., 2008
|
340 |
Searching for community online: how virtual spaces affect student notions of communitySpiro, Emma S. 02 May 2007 (has links)
Social networking sites and virtual spaces have flourished in the past few years. The author explores the impact of such social networking services on the local community at a small liberal arts college. The author investigates modern trends in community theory. Defining community has become more difficult in modern society, where community is no longer easily distinguished by geographical boundaries. From the background of modern community theory the author explores the designation of virtual spaces as “virtual communities.” Literature and research about virtual spaces indicates that they can provide many of the values thought be to inherent to community membership. The strong localized community on campus makes students hesitant in calling Facebook a “virtual community,” despite its strong integration with the face-to-face community itself. Facebook is seen as simply a tool. This thesis incorporates research on one specific case study: through mathematical and ethnographic research of Facebook.com, the author evaluates the opinions of students in considering virtual spaces as communities.
|
Page generated in 0.0872 seconds