• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 272
  • 87
  • 48
  • 27
  • 17
  • 17
  • 14
  • 10
  • 8
  • 8
  • 6
  • 4
  • 3
  • 3
  • 2
  • Tagged with
  • 609
  • 609
  • 212
  • 153
  • 151
  • 118
  • 111
  • 76
  • 75
  • 65
  • 61
  • 59
  • 56
  • 52
  • 48
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

Textuality, Performativity and Archive: Examining the Virtual Body in Socially Networked Space

Ladd, Kelly 11 December 2009 (has links)
This thesis argues that contemporary theorizations of online identities on social-networking sites (SNS) require more robust accounts of the relationship between language, perfomativity, and the tensions of the material/virtual binary. In her analysis of subject formation on multi-user domains, Internet sociologist Jenny Sundén uses poststructuralist philosophy to theorize identity as a process of “textual performativity”. Citing Sundén, many contemporary sociologists theorizing subjectivity on SNS use the terms “writing the self” and “performing the self” and overlook the poststructuralist philosophy that informs them. To explore the lack of philosophical analyses within sociological accounts of subject formation on SNS, and to rethink “writing” and “performing” the self, I draw on the work of J.L. Austin, Judith Butler and Jacques Derrida. I argue that creating a self on SNS is a ”sedimentation” process whereby different discursive identity performances are reiterated over time, and I investigate the implications of archiving and externalizing the self.
72

Textuality, Performativity and Archive: Examining the Virtual Body in Socially Networked Space

Ladd, Kelly 11 December 2009 (has links)
This thesis argues that contemporary theorizations of online identities on social-networking sites (SNS) require more robust accounts of the relationship between language, perfomativity, and the tensions of the material/virtual binary. In her analysis of subject formation on multi-user domains, Internet sociologist Jenny Sundén uses poststructuralist philosophy to theorize identity as a process of “textual performativity”. Citing Sundén, many contemporary sociologists theorizing subjectivity on SNS use the terms “writing the self” and “performing the self” and overlook the poststructuralist philosophy that informs them. To explore the lack of philosophical analyses within sociological accounts of subject formation on SNS, and to rethink “writing” and “performing” the self, I draw on the work of J.L. Austin, Judith Butler and Jacques Derrida. I argue that creating a self on SNS is a ”sedimentation” process whereby different discursive identity performances are reiterated over time, and I investigate the implications of archiving and externalizing the self.
73

Anonymous Location Based Messaging: The Yakkit Approach

Lach, Przemyslaw 13 April 2015 (has links)
The proliferation of mobile devices has resulted in the creation of an unprecedented amount of context about their users. Furthermore, the era of the Internet of Things (IoT) has begun and it will bring with it even more context and the ability for users to effect their environment through digital means. Applications that exist in the IoT ecosystem must treat context as a first class citizen and use it to simplify what would otherwise be an unmanageable amount of information. This thesis proposes the use of context to build a new class of applications that are focused on enhancing normal human behaviour and moving complexity away from the user. We present Yakkit—a location based messaging application that allows users to communicate with others nearby. The use of context allows Yakkit to be used without the creation of a login or a profile and enhances the normal way one would interact in public. To make Yakkit work we explore different ways of modelling location context and application deployment through experimentation. We model location in an attempt to predict a user’s final destination based on their current position and the trajectories of past users. Finally, we experiment deploying the Yakkit service on different servers to observe the effect of distance on the message transit time of Yakkit messages. / Graduate / przemek@uvic.ca
74

Virtual Subjectivity on Social Networking Sites: Transforming the Politics of Self-Surveillance

Koit, Naomi 30 April 2014 (has links)
Social networking sites (SNSs) are designed to cure loneliness and fill a void left by the lack of face-to-face communication in this digital age. Given the rapid growth rate and extensive popularity of social networking sites, my research aims to investigate the validity of widespread claims indicating that members of the millennial generation who have grown up on SNSs are increasingly narcissistic and self-obsessed because of their involvement on these sites. To address these claims, I turn to key insights borrowed from computer sciences and social psychology, inspired by the exemplary work of Sherry Turkle and ideas from Michel Foucault. I find that the digital subject is caught in a vicious circle of narcissistic attachment and panic insecurity, driven to constant self-surveillance and examination in a digital form of the modern panopticon where cybercitizens can be left feeling alienated and alone despite continuous connection to others online. / Graduate / 0723 / 0451 / 0615 / naomikoit@gmail.com
75

Mediating Social Media: Examining User Risk Perception on Facebook

Borbey, Daniel 10 December 2010 (has links)
This thesis explores how social networking sites are changing the way individuals socialize in everyday life, and how users mediate this social media. The hypothesis explored is that Facebook user’s perception of risk, when using the site, is related to how they frame the technology. Drawing on conceptual and theoretical tools from science studies and the sociologies of friendship, risk and surveillance, interview data is collected and analysed in order to identify the dynamics that structure Facebook use. It is concluded not only that, as hypothesized, participant’s awareness and perception of risk is based upon their framing of the social networking technology, but also that the framing processes arise from the technosocial hybrid nature of Facebook. That is to say, it is not exclusively based on technological possibility or on existing social practices but instead by a constant balance between the two.
76

Virtual Subjectivity on Social Networking Sites: Transforming the Politics of Self-Surveillance

Koit, Naomi 30 April 2014 (has links)
Social networking sites (SNSs) are designed to cure loneliness and fill a void left by the lack of face-to-face communication in this digital age. Given the rapid growth rate and extensive popularity of social networking sites, my research aims to investigate the validity of widespread claims indicating that members of the millennial generation who have grown up on SNSs are increasingly narcissistic and self-obsessed because of their involvement on these sites. To address these claims, I turn to key insights borrowed from computer sciences and social psychology, inspired by the exemplary work of Sherry Turkle and ideas from Michel Foucault. I find that the digital subject is caught in a vicious circle of narcissistic attachment and panic insecurity, driven to constant self-surveillance and examination in a digital form of the modern panopticon where cybercitizens can be left feeling alienated and alone despite continuous connection to others online. / Graduate / 0723 / 0451 / 0615 / naomikoit@gmail.com
77

On Message Fragmentation, Coding and Social Networking in Intermittently Connected Networks

Altamimi, Ahmed B. 23 October 2014 (has links)
An intermittently connected network (ICN) is defined as a mobile network that uses cooperation between nodes to facilitate communication. This cooperation consists of nodes carrying messages from other nodes to help deliver them to their destinations. An ICN does not require an infrastructure and routing information is not retained by the nodes. While this may be a useful environment for message dissemination, it creates routing challenges. In particular, providing satisfactory delivery performance while keeping the overhead low is difficult with no network infrastructure or routing information. This dissertation explores solutions that lead to a high delivery probability while maintaining a low overhead ratio. The efficiency of message fragmentation in ICNs is first examined. Next, the performance of the routing is investigated when erasure coding and network coding are employed in ICNs. Finally, the use of social networking in ICNs to achieve high routing performance is considered. The aim of this work is to improve the better delivery probability while maintaining a low overhead ratio. Message fragmentation is shown to improve the CDF of the message delivery probability compared to existing methods. The use of erasure coding in an ICN further improve this CDF. Finally, the use of network coding was examined. The advantage of network coding over message replication is quantified in terms of the message delivery probability. Results are presented which show that network coding can improve the delivery probability compared to using just message replication. / Graduate / 0544 / 0984 / ahmedbdr@engr.uvic.ca
78

Social Networking Sites Usage Behavior: Trust and Risk Perceptions

Mekala, Nithin Kumar Reddy 05 1900 (has links)
This dissertation addresses research questions related to defining user's trust and risk perceptions associated with social networking usage behavior in relation to the repeated privacy and security breaches. The general research question is explored in the dissertation via the conduct of three related studies. The finding from these three investigations are presented in the results section as 3 essays that collectively examine the social networking sites usage behavior. Essay 1 proposes a conceptual model based on the review of multiple breaches. The review provides a conceptual model which is further analyzed using a quantitative survey in the second essay. Essay 2 measures the trust and risk perceptions associated with different sources of information when presented with multiple breaches. This portion of the research used a quantitative method that included surveying of college students from University of North Texas (UNT) to understand the relation between user's trust and risk perceptions. Essay 3 examines the social networking usage behavior on account of repeated privacy and security breaches. This essay uses the insights from the other two essays to identify the usage behavior and how it is affected. The proposed model was tested using a survey questionnaire method. Results show a significant relationship between the positives, negatives, technology usage, repeated breaches that impacts usage behavior. The dissertation concludes with a summary of how the three essays make a cumulative contribution to the literature as well as providing practical guidance that identifies social networking usage behavior.
79

Teenagers' perceptions of advertising in the online social networking environment : an exploratory study

Kelly, Louise January 2008 (has links)
This study explores teenager perceptions towards advertising in the online social networking environment. The future of online social networking sites is dependant upon the continued support of advertisers in this new medium, which is linked to the acceptance of advertising on these sites by their targeted audience. This exploratory study used the qualitative research methods of focus groups and in-depth personal interviews to gain insights from the teenager participants. The literature review in Chapter Two examined the previous research into advertising theories, consumer attitudes and issues such as advertising avoidance, advertising as a service and trust and privacy in the online social networking environment. The teenage consumer was also examined as were the influences of social identity theory. From this literature review eleven propositions were formed which provided a structure to the analysis of the research. Chapter Three outlined the multi-method research approach of using focus groups and in-depth interviews. The key findings were outlined in Chapter Four and Chapter Five provides discussion regarding these findings and the implications for theory and advertising practice. The main findings from this study suggest that teenagers have very high levels of advertising avoidance and are sceptical towards advertising on their online social networking sites. They have an inherent distrust of commercial messages in the online social networking environment; however they are extremely trusting with the information that they disclose online. They believe that if their site is classified as private, then the information disclosed on this site is not accessible to anyone. The study explores the reasons behind these views. This research has resulted in the identification of seven motivations behind online social networking use. A new model of advertising avoidance in the online social networking environment is also presented and discussed. This model makes a contribution towards filling the gap in available research on online social networking sites and advertising perception. The findings of this study have also resulted in the identification of the characteristics of online social networking sites as an advertising medium. The newness of online social networking sites coupled with the enthusiastic adoption of online social networking by the teenage demographic means that this exploratory study will be of interest to both academics and practitioners alike.
80

Palestinian facebook groups their uses and gratifications /

Jarad, Lina. January 2009 (has links)
Title from first page of PDF document. Includes bibliographical references (p. 36-40).

Page generated in 0.0477 seconds