首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
The rapid diffusion of information is critical to combat the extreme levels of uncertainty and complexity that surround disaster relief operations. As a means of gathering and sharing information, humanitarian organizations are becoming increasingly reliant on social media platforms based on the Internet. In this paper, we present a field study that examines how effectively information diffuses through social media networks embedded in these platforms. Using a large dataset from Twitter during Hurricane Sandy, we first applied Information Diffusion Theory to characterize diffusion rates. Then, we empirically examined the impact of key elements on information propagation rates on social media. Our results revealed that internal diffusion through social media networks advances at a significantly higher speed than information in these networks coming from external sources. This finding is important because it suggests that social media networks are effective at passing information along during humanitarian crises that require urgent information diffusion. Our results also indicate that dissemination rates depend on the influence of those who originate the information. Moreover, they suggest that information posted earlier during a disaster exhibits a significantly higher speed of diffusion than information that is introduced later during more eventful stages in the disaster. This is because, over time, participation in the diffusion of information declines as more and more communications compete for attention among users.  相似文献   

2.
Online social networking services (SNS) have been regarded as one of the most powerful online communication channels to propagate information to other users. It means that the online social networking services are providing users with efficient features (e.g., searching, managing and visualizing new information). It is important for many online collaborative applications to understand how the information can be propagated via such social media. Thus, we want to focus on a social tagging system (e.g., Flickr) where users can easily exchange resources as well as their tags. In this paper, given a certain tag, a social pulse can be established by counting (i) the number of users and (ii) the number of resources over time. More importantly, we assume that information can be propagated by (iii) inducibility from other tags by comparing social pulses. To conduct experimentation, a tag-based searching system (called Tagoole) has been implemented to collect a dataset from Flickr.  相似文献   

3.
Social networking sites (SNSs), which satisfy the primary demands of making friends, learning, and shopping, and are inseparable from human life, have been booming in recent years that domestic or international websites have endeavored to have users access to their websites. This study proposed relational model to examine the intention to use SNSs, and also applied a questionnaire survey to examine differences in this intention among various user groups. The findings indicated that that, in order to promote the intention to use social networking sites, managers should work to enhance interactivity and information sharing, and should also consider the feelings and attitudes of users. Different user groups lead to different outcomes with regard to the intention to use model developed in this work. However, the intention to use of most users in the sample groups was enhanced by the SNSs characteristics of information sharing and perceived playfulness.  相似文献   

4.
This article presents a hybrid wireless network integration scheme in cloud services-based enterprise information systems (EISs). With the emerging hybrid wireless networks and cloud computing technologies, it is necessary to develop a scheme that can seamlessly integrate these new technologies into existing EISs. By combining the hybrid wireless networks and computing in EIS, a new framework is proposed, which includes frontend layer, middle layer and backend layers connected to IP EISs. Based on a collaborative architecture, cloud services management framework and process diagram are presented. As a key feature, the proposed approach integrates access control functionalities within the hybrid framework that provide users with filtered views on available cloud services based on cloud service access requirements and user security credentials. In future work, we will implement the proposed framework over SwanMesh platform by integrating the UPnP standard into an enterprise information system.  相似文献   

5.
One of the most significant differences of M5 over previous forecasting competitions is that it was held on Kaggle, an online platform for data scientists and machine learning practitioners. Kaggle provides a gathering place, or virtual community, for web users who are interested in the M5 competition. Users can share code, models, features, and loss functions through online notebooks and discussion forums. Here, we study the social influence of this virtual community on user behavior in the M5 competition. We first research the content of the M5 virtual community by topic modeling and trend analysis. Further, we perform social media analysis to identify the potential relationship network of the virtual community. We study the roles and characteristics of some key participants who promoted the diffusion of information within the M5 virtual community. Overall, this study provides in-depth insights into the mechanism of the virtual community’s influence on the participants and has potential implications for future online competitions.  相似文献   

6.
In recent years, information systems in telecommunication enterprises have been characterised by boundary expansion and increase of departmental-level applications. These changes increase the complexity of security evaluation and pose new challenges to enterprises' information security. Taking into account the behaviour characters of system users, we put forward a system security evaluation approach based on access paths. This approach can help evaluators and users find out potential security risks without figuring out the boundary of systems explicitly. It has no special requirements for system scale and can be used in the evaluation of enterprise-level and departmental-level systems. This paper also presents the formal definition of access path and related evaluation rules.  相似文献   

7.
Abstract

The operations of internationally active organisations continue to encroach on hostile locations that are vulnerable to the negative consequences of crises such as political upheaval, terrorist attacks or natural disasters. Yet research into how firms ensure the physical and psychological safety and security of international staff in these locations is limited. This article reports an empirical study exploring the expatriate safety and security practices of 28 internationally active organisations from three industries that commonly operate in hostile environments. We unveil starkly different approaches across the three industries, and label these approaches ‘regulatory’ (mining and resources), ‘informal mentoring’ (news media) and ‘empowering’ (international aid and development). We use institutional theory to propose that these configurations reflect legitimacy-seeking choices that these organisations make in response to the various institutional environments that affect each sector. Our results provide a platform for initial theory building into the interrelated elements of organisations’ safety and security practices, and the institutional factors that shape the design of these.  相似文献   

8.
Based on a coproduction concept highlighted by service‐dominant logic, this study attempts to understand the antecedents and consequences of user coproduction in information system development projects. As a key contribution, we posit that user coproduction is influenced by social capital between users and developers; we then postulate that user coproduction determines the project outcomes. Paired data collected from both user representatives and developers by using a survey approach was used to test proposed hypotheses. The results showed that user coproduction has a positively significant influence on project outcomes, and social capital between user representatives and developers is also associated with user coproduction.  相似文献   

9.
Nowadays social network services have been popularly used in electronic commerce systems. Users on the social network can develop different relationships based on their common interests and activities. In order to promote the business, it is interesting to explore hidden relationships among users developed on the social network. Such knowledge can be used to locate target users for different advertisements and to provide effective product recommendations. In this paper, we define and study a novel community detection problem that is to discover the hidden community structure in large social networks based on their common interests. We observe that the users typically pay more attention to those users who share similar interests, which enable a way to partition the users into different communities according to their common interests. We propose two algorithms to detect influential communities using common interests in large social networks efficiently and effectively. We conduct our experimental evaluation using a data set from Epinions, which demonstrates that our method achieves 4–11.8% accuracy improvement over the state-of-the-art method.  相似文献   

10.
Our opinions and ideas are shaped by what our friends said and what we read or watched on mass media. In this paper, we propose a concise and analyzable model to study the effects of mass media modeled as an applied external field, and social networks on public opinions based on the multi-state voter model, and a tuned parameter can control the relative intensity of the effects of mass media and social networks. We consider a generalized scenario where there exist committed or stubborn agents in the networks whose opinions are not affected by their friends or mass media. We find that the fraction of each opinion will converge to a value which only relates to the fractions and degrees of stubborn agents, and the relative intensity between media and network effects. The final agents with media opinion, except the stubborn agents, also include the increment produced by the internal impact of social networks and that caused by the external impact of media. Interestingly the second increment is composed of two parts, one is from the media effect when there are no interactions between agents and the other is from the influence of media on agent opinions caused by social network structure. That is the interactions among agents within social networks can amplify media influence. Finally we also discuss several extensions to the dynamics model which consider more realistic scenarios.  相似文献   

11.
ABSTRACT

This study explored whether a smart information system can motivate users to conserve energy in the home environment. Three kinds of feedback information based on user decisions were discussed: emotion feedback with a happy mood, average feedback of a comparison group and ranking feedback within a comparison group. An experiment validated that all the feedbacks had a positive influence on users’ energy conservation performance. Users’ positive attitude toward the social group that they lived in and compared with would increased users’ environmentally friendly behaviours. Finally, several suggestions on the design of energy feedback are provided.  相似文献   

12.
In collaborative filtering (CF) recommender systems, existing techniques frequently focus on determining similarities among users’ historical interests. This generally refers to situations in which each user normally plays a single role and his/her taste remains consistent over the long term. However, we note that existing techniques have not been significantly employed in a role-oriented context. This is especially so in situations where users may change their roles over time or play multiple roles simultaneously, while still expecting to access relevant information resources accordingly. Such systems include enterprise architecture management systems, e-commerce sites or journal management systems. In scenarios involving existing techniques, each user needs to build up very different profiles (preferences and interests) based on multiple roles which change over time. Should this not occur to a satisfactory degree, their previous information will either be lost or not utilised at all. To limit the occurrence of such issues, we propose a ROle-Oriented Filtering (ROOF) approach focusing on the manner in which multiple user profiles are obtained and maintained over time. We conducted a number of experiments using an enterprise architecture management scenario. In so doing, we observed that the ROOF approach performs better in comparison with other existing collaborative filtering-based techniques.  相似文献   

13.
ABSTRACT

The emergence of online social network invokes social actors to share their personal information digitally. Moreover, it provides the facility to maintain their links with people of same interest globally. Take advantage of these services; it has become a fascinating testbed to invite various threats like a spammer. Detection of spammer in OSN is one of the most critical tasks. Spammer not only spreads unwanted or bad advertisement but does certain malicious activity in others' profiles. By clearly understanding the activities of different threats, some incremental and accurate approaches are needed for detecting spammer content and profiles involved in these activities by using social network services. Therefore, the focus of this article is to detect spammer content and account, specifically on the leading microblogging platform called Twitter. We propose a hybrid approach which leverages the capabilities of various machine learning algorithms to separate spammer and nonspammer contents and account. Initially, the optimisation algorithm called genetic algorithm analyses the various features and selects the best suitable features that influence the behaviour of user account, and these features are then used to train classifiers. Our framework achieved to severalise spammer and nonspammer content in an effective way. Finally, to prove the efficiency of our proposed framework, a comparative analysis is conducted with some existing state-of-art techniques. The experimental analysis shows that our approach achieves a high detection rate of 99.6%, which is better than other state-of-art techniques.  相似文献   

14.
张静  王希军 《价值工程》2012,31(4):146-147
要实现P2P网络的健康发展,必须要有有效的安全保障。本文先对P2P进行浅述,将其与Internet进行简单的比较,进而分析了P2P网络的安全问题,并提出了一些相应的防御对策。  相似文献   

15.
网站管理中若干安全问题的研究   总被引:1,自引:0,他引:1  
文章从当今主流的加密技术、防火墙管理、常见攻击的类型和预防等方面,寻求解决网站安全度量的行之有效的办法,对近年来因特网用户数呈爆炸性增长,黑客攻击、病毒和信用卡欺诈等安全威胁因为存在更多潜在途径的进入而进一步加剧的情况进行探讨。  相似文献   

16.
While researchers have focused on the nature of interpersonal communication on social media, few have investigated the patterns and structures of interactions among stakeholders engaged in an unexpected event. On September 18, 2015, the United States Environmental Protection Agency issued a notice of violation of the U.S. Clean Air Act to Volkswagen Group of America, Inc., citing Volkswagen’s inappropriate software that circumvented the United States’ emission standards. This research is systemically designed to examine the evolutionary structures of interpersonal issue networks on social media by focusing on the 2015 Volkswagen scandal on social media. The interpersonal network emerged and evolved to build a discourse on issues by stakeholders after the event. By using longitudinal data collected from the Volkswagen USA’s Facebook page between September 17 and 20, 2015, this research tests four hypothesized network structures, which are reciprocity, transitivity, popularity, and activity, which assess the evolution of interpersonal issue networks. The results of exponential random graph models, analyzing 4131 stakeholders, show that interpersonal issue networks on social media have evolved overtime into a set of reciprocal relations and stakeholders transmitting critical information to bystanders. The findings imply that stakeholders who have Volkswagen’s cars and stocks play a critical role in placating the scandal by mutually interacting with diverse bystanders on social media.  相似文献   

17.
关于Oracle数据库应用中的安全管理策略   总被引:1,自引:0,他引:1  
张力 《价值工程》2011,30(15):190-191
随着计算机技术的快速发展,企业和公司都建立了企业网,系统的保密性与安全性就显得极为重要。本文主要针对Oracle数据库系统、数据管理、用户管理等方面,讨论基于0racle的数据库的安全策略,以便对本企业整个MIS(信息管理系统)进行更安全、更可靠地管理。  相似文献   

18.
The criminal nature of narcotics complicates the direct assessment of a drug community, while having a good understanding of the type of people drawn or currently using drugs is vital for finding effective intervening strategies. Especially for the Russian Federation this is of immediate concern given the dramatic increase it has seen in drug abuse since the fall of the Soviet Union in the early nineties. Using unique data from the Russian social network ‘LiveJournal’ with over 39 million registered users worldwide, we were able for the first time to identify the on-line drug community by context sensitive text mining of the users’ blogs using a dictionary of known drug-related official and ‘slang’ terminology. By comparing the interests of the users that most actively spread information on narcotics over the network with the interests of the individuals outside the on-line drug community, we found that the ‘average’ drug user in the Russian Federation is generally mostly interested in topics such as Russian rock, non-traditional medicine, UFOs, Buddhism, yoga and the occult. We identify three distinct scale-free sub-networks of users which can be uniquely classified as being either ‘infectious’, ‘susceptible’ or ‘immune’.  相似文献   

19.
In recent years many cross-national comparative surveys, such as Gender and Generation Programme, International Social Survey Programme, European Quality of Life Survey, or General Social Survey, have included assessment of social support networks. Generally, two approaches were used; the name generator approach and the role relation approach. As more cross-country surveys are conducted every year, it may seem reasonable to use such data sets, since they provide high quality comparisons across countries. However, one should pay close attention to the measurement instruments, as these may cause unintentional but systematic variability in the observed data. While the data from each survey can be of high quality ??per se??, we claim that results from these surveys are not comparable, owing to their different measurement approaches and survey instruments. In this paper we present data from several experiments which show that scientific findings from these surveys depend significantly on questionnaire design.  相似文献   

20.
The aim of this research is to investigate the role of strong organizational cultures in setting information‐systems security goals. In doing so, we explore and discuss the concept of culture within three financial organizations with different social and organizational structures, and seek to demonstrate the importance of having a cohesive culture in efficiently setting information‐security goals. The relationship between goal setting, culture strength, and performance is also discussed, as there have been studies that indirectly indicate that such a relationship may exist. The contribution of this work to interpretive information‐systems research consists of its study of culture and goal setting in a security‐management context, and its grounding within an interpretive epistemology. In addition, this research promotes an interdisciplinary and interorganizational theory to foster dialogue that transcends industry‐specific contexts and explores different organizational practices that can improve leadership's role in human life.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号