• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1359
  • 677
  • 268
  • 140
  • 114
  • 91
  • 67
  • 39
  • 37
  • 27
  • 25
  • 22
  • 21
  • 20
  • 20
  • Tagged with
  • 3323
  • 3323
  • 783
  • 666
  • 556
  • 386
  • 344
  • 297
  • 281
  • 278
  • 262
  • 245
  • 239
  • 235
  • 220
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1421

Language Consistency and Exchange: Market Reactions to Change in the Distribution of Field-level Information

Watts, Jameson K.M., Watts, Jameson K.M. January 2015 (has links)
Markets are fluid. Over time, the dominant designs, processes and paradigms that define an industry invariably succumb to productive innovation or changes in fashion (Arthur, 2009; Schumpeter, 1942; Simmel, 1957). Take for example the recent upheaval of the cell phone market following Apple's release of the iPhone. When it was introduced in 2007, one could clearly differentiate Apple's product from all others; however, subsequent imitation of the iPhone produced a market in which nearly all cell phones look (and perform) alike. The iPhone was a harbinger of the new dominant design. These cycles of innovation and fashion are not limited to consumer markets. Business markets (often defined by longer term inter-firm relationships) are subject to similar transformations. For example, current practices in the biotechnology industry are quite distinct from those accompanying its emergence from university labs in the second half of the 20th century (Powell et al., 2005). Technologies that were once viewed as radical have undergone a process of legitimation and integration into mainstream healthcare delivery systems. Practices that were dominant in the 1980's gave way to newer business models in the 1990's and feedback from down-stream providers changed the way drugs were delivered to patients (Wolff, 2001).During periods of transition, market actors face great difficulty anticipating reactions to their behavior (practices, products, etc.). How they deal with this uncertainty is an interminable source of academic inquiry in the social sciences (see e.g. Alderson, 1965; Simon, 1957; Thompson, 1967) and, in a broad sense, it is the primary concern of the current work as well. However, I am focused specifically on the turmoil caused by transitions in technology, taste and attention over time--the disagreements which occur as market actors collectively shift their practices from one paradigm to the next (Powell and Colyvas, 2008). If innovations are assumed to arise locally and diffuse gradually (see e.g. Bass, 1969; Rogers, 2002), then transient differences in knowledge are a natural outcome. Those closest to, or most interested in an innovation will have greater knowledge than those furthest away or less involved. Thus, for a period following some shift in technology, taste or attention, market participants will vary in their knowledge and interpretation of the change. In the following chapters, I investigate the ramifications of this sort of knowledge heterogeneity on the exchange behavior and subsequent performance of market participants. It is the central argument of this thesis that this heterogeneity affects exchange by both limiting coordination and increasing quality uncertainty. The details of this argument are fleshed out in Chapters 1, 2 and 3 (summarized below), which build upon each other in a progression from abstract, to descriptive to specific tests of theory. However, each can also stand by itself as an independent examination of the knowledge-exchange relationship. The final chapter synthesizes my findings and highlights some implications for practitioners and further research. In Chapter 1, I review the history and development of Alderson's (1965) 'law of exchange' in the marketing literature and propose an extension based on insights from information theory. A concept called market entropy is introduced to describe the distribution of knowledge in a field and propositions are offered to explain the exchange behavior expected when this distribution changes. Chapter 2 investigates knowledge heterogeneity through its relation with written language. Drawing on social-constructionist theories of classification (Goldberg, 2012) and insights from research on the legitimation process (Powell and Colyvas, 2008), I argue for a measure of field-level consensus based on changes in the frequency distribution of descriptive words over time. This measure is operationalized using eleven years of trade journal articles from the biotech industry and is shown to support the propositions offered in Chapter 1. Chapter 3 builds on the arguments and evidence developed in Chapters 1 and 2 to test theory on the structural advantages of a firm's position in a network of strategic alliances. Prior work has documented returns to network centrality based on the premise that central firms have greater and more timely access to information about industry developments (Powell et al., 1996, 1999). However, other research claims that benefits to centrality accrue based on the signal that such a position provides about an actor's underlying quality (Malter, 2014; Podolny, 1993, 2005). I investigate this tension in the literature and offer new insights based on interactions between network position and the measure developed in Chapter 2.
1422

A framework for the governance of social media in the workplace

Scharneck, Justin William January 2012 (has links)
Social media is fast becoming an ever-increasingly significant part of the world of business and a phenomenon which cannot be evaded. The advent of social media in the workplace compels organisations to acclimatise to the transformation emanating from employees‟ adoption of these technologies (Hanaki & Casella, 2008). Approximately seventy percent of organisations do not have a social media governance framework in place (Fink et al., 2011). Social media governance in organisations is very disjointed; companies have varying stances as to social media strategy, the risks, benefits and business use of social media (Thompson et al., 2011). The growth of social media and its use in the business environment will see a more standardised approach to social media governance (Thompson et al., 2011). Being at the forefront of technology development in Africa, and in certain areas, globally (Government of the Republic of South Africa, 2012), places added emphasis on IT organisations in South Africa to set the standard as it relates to social media governance. The diversity and depth of the human and technology resources within these organisations, creates an environment conducive to establishing and pioneering sound social media governance structures. The treatise consists of a study on the governance of social media and the successive development of two frameworks; an integrated framework for the governance of social media in the workplace, as well as integrated framework for a social media policy within an IT organisation. These frameworks are empirically evaluated amongst employees, within the context of Information Technology (IT) organisations, in South Africa. Several recommendations are proposed by the author in relation to the adoption of the proposed frameworks.
1423

Investigating the relationship between the social phenomenon of Facebook and narcissistic socio-cultural tendencies

Zdanow, Carla January 2011 (has links)
Narcissism is increasingly being regarded as one of the biggest socio-cultural problems of the contemporary era. Indeed, recent studies by Baldwin and Stroman (2007) and Buffardi and Campbell (2008), among others, have advanced that new media technologies – in particular social networking websites – have significantly exacerbated the rise and spread of narcissism in contemporary society. Based on this premise, namely that social media provide the perfect platform for the promotion of self-infatuation, this research project will provide a critical analysis of the potential influence of social media in the development of a widespread narcissistic socio-cultural condition. In this regard, claims that increasingly consumerist, individualist and media-saturated societies are nurturing a culture of extreme narcissism, vanity and entitlement, will be examined in relation to an increase in the use of consumerorientated new media technologies. In particular, by examining the structural components of the popular social networking site, Facebook, this treatise will highlight the connection between the use of this form of new media and the engenderment of an acutely consumerist and narcissistic subjectivity – namely, commodity narcissism. That is, by examining the growth of narcissism from the 1940s through to the new millennium, the role of the media, and most recently new media technologies, in the promotion of commodity narcissism will be examined as factors of particular significance in the formation of contemporary subjectivity. In relation to this, the impact of commodity narcissism on the perpetuation and propagation of capitalist isolation, alienation and insecurity will be investigated with a view to exploring the potential impact of such narcissism on the efficacy of the democratic process. Finally, some remedial measures, which co-opt rather than negate such social media, will be proposed.
1424

The use of social media for marketing and communication purpose in institutions of higher learning

Mangolothi, Brightness January 2012 (has links)
Social media have become a widely used tool to communicate with the orgnisations stakeholders. Institutions of higher learning are also venturing into this new way of marketing and communication. This study intended to determine how South African institutions of higher learning are using social media for marketing and communication purposes. Firstly, a literature study was conducted to gain an understanding on how social media are used. Further an empirical study was conducted, which consisted of two phases. The first phase was a case study on NMMU and Stellenbosch University. Structured-interviews, focus groups and observation were used to collect data from the cases. The collected data were then used to construct a questionnaire that was used for a survey. The survey was distributed to all 23 universities, 50 public FET colleges and the 200 private FET college. 92 institutions responded to the survey. The findings prove that there are various opportuntities and challenges in using social media although it should be stressed that the opportunities outweigh the threats. There is no visible difference between colleges social media implementation in relation to institutions of higher learning. Most institutions use more than one social media tool. Facebook is the most widely used social media followed by Twitter, YouTube and LinkedIn. Flickr, MXit, Google+ and Blog are the least used social media. The observations of the NMMU and Stellenbosch University show that these two institutions are striving to engage with their target audiences. Although the institutions are using social media, some of the concerns are that institutions are not measuring their social media use. For those who are measuring, most depend on the free measurement tools which focus only on the quantitative measure. The governance of the social media use is none existent. Most respondents stated that they do not have a policy or guidelines informing social media management. Most of the respondents felt that they want to use more social media tools in future although some of the challenges alluded to were lack of capacity, human resources and budget.
1425

A guide for using online social media and social networking activities for SMME's

Morley, Charmaine Joan January 2012 (has links)
Social media is playing an increasingly important role in people’s lives and is becoming a part of most organisations’ business models. Businesses cannot ignore this phenomenon due to the increasing influx of Generation Y employees in their businesses and the Generation Y consumers who are going to buy their products and services in the future. Social media is changing the way that marketing is being conducted, in a positive way. It is changing from businesses focusing on selling products or services to customers, to businesses building relationships with customers and adding value to their lives through their products and services. This phenomenon was the base for this study. The research problem was identified as follows: SMME business owners do not understand the importance and impact of social media on their businesses. Sub-problems were identified as: defining social media and networking, describing the importance of this, which strategies are currently being used in business, how it compares to traditional networking, how this is used in recruitment strategies and what are the disadvantages of social media and networking. The research problem and sub-problems were addressed in a literature study and an empirical study. The literature study included information on SMME businesses, their importance in our economy and how social media can help them. The empirical study was done using SMME’s registered with the George Business Chamber. A questionnaire was designed and distributed to the owners of the businesses by email. The answers were analysed and collated on a spreadsheet which were presented in graph and diagram format. Social media and networking are becoming an integral part of businesses especially small businesses. They specifically have an important role to play in creating economic wealth and creating employment. SMME’s are faced with a lot of challenges which make it difficult for them to become successful and sustainable. Social media can play a role in overcoming a lot of these challenges by helping SMME’s with marketing, customer engagement, relationship building, recruitment, and finding valuable information, experience and partners. Social media also has disadvantages which include: virus attacks, risk of confidential information leaking and so forth, but these can easily be managed by social media polices and rules. A bigger risk lies in the fact that if a business owner ignores the existence of social media, this can lead to conversations by consumers about this business being ignored and not responded to. Another big risk for SMME’s is the fact they are at a competitive disadvantage by ignoring this new technology. This was clear from the empirical results in this study which stated that 53 percent of the businesses surveyed, were aware their competitors are using social media. The empirical results indicated a very low use of social media activities among the SMME’s surveyed but showed potential as the SMME’s understood the importance of social media and were eager to implement strategies in their businesses. The reasons offered for not using social media included the fact that it was difficult to measure its worth in time and money, advice is needed from experts and so forth. Social media and networking are not quick or cheap methods for businesses to advertise and sell their products or services. They are tools to be used over time, in order to engage with customers and build relationships. Consumers and customers expect value for their money and if they find this from a business, they will gladly share it with others. On the other hand, if they do not find value for money it could have a negative impact on the business. SMME’s must not try to replace their current marketing strategy with social networking activities. They should integrate it slowly into their current business models and search for unique ways in which it could improve the relationship with their current customers and find new customers. It should help them to either showcase their existing value added products or services, or improve it if it is not worth selling. Small businesses now have the platform to compete.
1426

A framework to mitigate phishing threats

Frauenstein, Edwin Donald January 2013 (has links)
We live today in the information age with users being able to access and share information freely by using both personal computers and their handheld devices. This, in turn, has been made possible by the Internet. However, this poses security risks as attempts are made to use this same environment in order to compromise the confidentiality, integrity and availability of information. Accordingly, there is an urgent need for users and organisations to protect their information resources from agents posing a security threat. Organisations typically spend large amounts of money as well as dedicating resources to improve their technological defences against general security threats. However, the agents posing these threats are adopting social engineering techniques in order to bypass the technical measures which organisations are putting in place. These social engineering techniques are often effective because they target human behaviour, something which the majority of researchers believe is a far easier alternative than hacking information systems. As such, phishing effectively makes use of a combination of social engineering techniques which involve crafty technical emails and website designs which gain the trust of their victims. Within an organisational context, there are a number of areas which phishers exploit. These areas include human factors, organisational aspects and technological controls. Ironically, these same areas serve simultaneously as security measures against phishing attacks. However, each of these three areas mentioned above are characterised by gaps which arise as a result of human involvement. As a result, the current approach to mitigating phishing threats comprises a single-layer defence model only. However, this study proposes a holistic model which integrates each of these three areas by strengthening the human element in each of these areas by means of a security awareness, training and education programme.
1427

Facebook as a tool for social customer relationship marketing

Puffett, Lauren January 2012 (has links)
This study aimed to provide public relations professions with insight into the use of Social Customer Relationship Marketing as a marketing 2.0 tool which delivers the potential to elicit the opportunity for organisations to monitor, engage and manage conversations and relationships through Facebook. Drawing on literature from the fields such as new media, public relations, social customer relationship marketing, and public relations, a qualitative content analysis of case studies of selected organisations was conducted including 10 South African organisations that have incorporated Facebook into their Social Customer Relationship Marketing strategies. The content analysis was conducted to determine the amount of communications taking place on each fan page in order to support the data and provide additional insight into the research question, primary data was collected through two survey questionnaires of, firstly, social media users who subscribe to an organisation‘s Facebook page and, secondly, a survey conducted among the social organisations. Surveys were conducted to firstly determine the social organisations interactions with Facebook as secondly, to determine the social media users‘ interactions with the Facebook. The study found that the majority of the organisations under study in the content analysis successfully elicited user generated conversations about the brand, through content that was advocated by the organisations Facebook administrator. It is also evident as seen in the minority of organisations that these platforms are only likely to elicit consumer- driven dialogue on Facebook if the platform is managed effectively through initiated daily conversations about the brand. The continuous involvement by the administrator in encouraging conversations was necessary, as well as response to all wall posts by the social customer, participation in all conversations by providing accurate information to customers and potential customers about the brand. Conclusions from the survey questionnaires among the social identified the social customers need to be communicated with pro-actively by an organisations who can provide, through collaborative conversations, information pertaining to the brand in real time conversation, while the survey among the social organisation concluded the need for an organisation to not only create a social media footprint, but to allow for a space in which through conversation with the social customer, conversations can turn into relationships.
1428

Identity-related decision-making among multicultural adolescents

Siwundla, Lundi January 2011 (has links)
This present study investigated South African Afrikaans-, English- and Xhosa-speaking male and female urban secondary school adolescents‟ (N = 1301) perception of the relative importance of identity-related domains by investigating the choices that they carried out in relation to meaningful identity-related areas of their lives. Consequently a structured questionnaire consisting of 14 domain particular areas was used. In Eriksonian terms, one could say that the South African society is in a psychosocial crisis. Almost all the domain-specific items were regarded as relevant “Very important” or “Fairly important” by a notable or significant majority of participants. All fourteen of the domains were regarded as “Very important” by at least 35 percent of the participants from two cultural groups, namely African and Coloured sub cultural groups; while twelve of the domains were regarded as “Very important” by at least 50 percent of the African subgroup and thirteen domains were regarded as “Very important” by 40 percent of the Coloured subgroup. “Leisure and recreational activities”, “Friendships with members of the same sex peer group”, “My political views and convictions” and “Friendships with members of the opposite sex peer group” were however, still regarded as “Fairly important” by 56 percent, 53 percent, 58 percent and 52 percent of the total research group respectively. It should also be noted that generally females in the sample were more inclined to evaluate domains that had a bearing on interpersonal relationships as significantly more important than the males namely: Friendship with members of the same-sex peer group, What kind of person I want a permanent relationship with, What kind of person I want to marry, and How I should act as husband or wife. The males tended to evaluate the domains, Sexual matters and Friendship with members of the opposite sex more significantly important than the females did.
1429

Human Interactions on Online Social Media : Collecting and Analyzing Social Interaction Networks

Erlandsson, Fredrik January 2018 (has links)
Online social media, such as Facebook, Twitter, and LinkedIn, provides users with services that enable them to interact both globally and instantly. The nature of social media interactions follows a constantly growing pattern that requires selection mechanisms to find and analyze interesting data. These interactions on social media can then be modeled into interaction networks, which enable network-based and graph-based methods to model and understand users’ behaviors on social media. These methods could also benefit the field of complex networks in terms of finding initial seeds in the information cascade model. This thesis aims to investigate how to efficiently collect user-generated content and interactions from online social media sites. A novel method for data collection that is using an exploratory research, which includes prototyping, is presented, as part of the research results in this thesis.   Analysis of social data requires data that covers all the interactions in a given domain, which has shown to be difficult to handle in previous work. An additional contribution from the research conducted is that a novel method of crawling that extracts all social interactions from Facebook is presented. Over the period of the last few years, we have collected 280 million posts from public pages on Facebook using this crawling method. The collected posts include 35 billion likes and 5 billion comments from 700 million users. The data collection is the largest research dataset of social interactions on Facebook, enabling further and more accurate research in the area of social network analysis.   With the extracted data, it is possible to illustrate interactions between different users that do not necessarily have to be connected. Methods using the same data to identify and cluster different opinions in online communities have also been developed and evaluated. Furthermore, a proposed method is used and validated for finding appropriate seeds for information cascade analyses, and identification of influential users. Based upon the conducted research, it appears that the data mining approach, association rule learning, can be used successfully in identifying influential users with high accuracy. In addition, the same method can also be used for identifying seeds in an information cascade setting, with no significant difference than other network-based methods. Finally, privacy-related consequences of posting online is an important area for users to consider. Therefore, mitigating privacy risks contributes to a secure environment and methods to protect user privacy are presented.
1430

Privacy engineering for social networks

Anderson, Jonathan January 2013 (has links)
In this dissertation, I enumerate several privacy problems in online social networks (OSNs) and describe a system called Footlights that addresses them. Footlights is a platform for distributed social applications that allows users to control the sharing of private information. It is designed to compete with the performance of today's centralised OSNs, but it does not trust centralised infrastructure to enforce security properties. Based on several socio-technical scenarios, I extract concrete technical problems to be solved and show how the existing research literature does not solve them. Addressing these problems fully would fundamentally change users' interactions with OSNs, providing real control over online sharing. I also demonstrate that today's OSNs do not provide this control: both user data and the social graph are vulnerable to practical privacy attacks. Footlights' storage substrate provides private, scalable, sharable storage using untrusted servers. Under realistic assumptions, the direct cost of operating this storage system is less than one US dollar per user-year. It is the foundation for a practical shared filesystem, a perfectly unobservable communications channel and a distributed application platform. The Footlights application platform allows third-party developers to write social applications without direct access to users' private data. Applications run in a confined environment with a private-by-default security model: applications can only access user information with explicit user consent. I demonstrate that practical applications can be written on this platform. The security of Footlights user data is based on public-key cryptography, but users are able to log in to the system without carrying a private key on a hardware token. Instead, users authenticate to a set of authentication agents using a weak secret such as a user-chosen password or randomly-assigned 4-digit number. The protocol is designed to be secure even in the face of malicious authentication agents.

Page generated in 0.058 seconds