...Online Social Networking Paper Name SOC/100 Date Instructor Name Online Social Networking Paper Social websites have become a large part of everyday life for many, and none looms larger than Facebook. A social network with 1.11 billion monthly users, and 655 million daily active users ("Iamwire", 2013), Facebook, at its very basic core offers the ability to communicate with others from all over the world. What is communicated, and to whom is entirely up to the user. Some choose to update friends and family on happenings in their lives, while others take a more passive approach and use the site to simply stay in touch with loved ones. Videos, pictures, and music can be shared on Facebook, and as a result has been a key promotional tool for companies looking to sell their products. Official pages have been created for films, artists, food chains, and various other services as a way to spread word of new promotions, as well as communicate directly to consumers. Some of the team’s experiences were initially consumed by Facebook. The ability to find old friends, update others with our own happenings, and catch up with former classmates and co-workers was hard to resist. However, that rush faded and their participation went from active to passive rather quickly. One observation of the website contends with an image of astonishing happiness than to really form deep relationships. A revelation that sees little middle ground between those who share too much, and others who do not...
Words: 1642 - Pages: 7
...Facebook”: The text is written by Elizabeth Cohen. The text is about how people use more time on Facebook than on social activities. Newton has a daughter on 12 years old. Newton cannot help her daughter with the homework, because she spends too much time on Facebook. Another example is Paula Pile, who is a therapist. Paula has three clients with different Facebook issues. That conclude that Facebook leads people from the real world into the network world, because people enjoy more time on Facebook than in real life. Newton checks her Facebook-site many times in a day, for social updates about her friends, she checks Facebook everywhere at work and home. Facebook can give people a wrong understanding of what identity means. Joanna Lipari is psychologist and expert in social network, sees Facebook a kind like the movie “The Truman Show”. Joanna thinks Facebook is like a world without boundaries. 2. An outline of the positive and negative sides of social networking presented in the three texts: In the first text “What is social networking?”, we hear about how social networks has an effect to make it easier to get new online friends over social networks, examples as Facebook, Skype and Twitter. Now a day, we can have difference friends among the world from Denmark to USA and easy learn each other’s traditions, religion, culture and language. Negatives sites of social networks are, that it is easy for hackers and bad people to get into your computer system and give you virus or malware...
Words: 766 - Pages: 4
...Content Quality Assessment Related Frameworks for Social Media Kevin Chai, Vidyasagar Potdar, and Tharam Dillon Digital Ecosystems and Business Intelligence Institute, Curtin University of Technology, Perth, Australia kevin.chai@postgrad.curtin.edu.au, {v.potdar,t.dillon}@curtin.edu.au Abstract. The assessment of content quality (CQ) in social media adds a layer of complexity over traditional information quality assessment frameworks. Challenges arise in accurately evaluating the quality of content that has been created by users from different backgrounds, for different domains and consumed by users with different requirements. This paper presents a comprehensive review of 19 existing CQ assessment related frameworks for social media in addition to proposing directions for framework improvements. Keywords: content quality assessment, social media, discussion forums, wikis, weblogs. 1 Introduction Information quality (IQ) has been widely defined in literature by its fitness for use. Existing research in the field of assessing IQ within traditional information systems is relatively mature and has led to the discovery and validation of numerous quality dimensions and metrics [2, 15, 17, 29, 35]. Knight & Burn (2005) have presented a comprehensive review of literature in the realm of assessing IQ frameworks. Common IQ dimensions that were identified from their review are presented in Table 1. The definitions of these dimensions have been included from Wang & Strong (1996)...
Words: 6799 - Pages: 28
...ESL 263 No. 4 WA 3 Final Draft Better Life through Social Networking Social networking is beneficial for people because they will have more opportunities to develop their interests. It is very difficult to improve your interest within a small circle in your own community, unless you get more ideas from people outside of your community. To make it happen, people invented social media networks. People can go on websites and find like-minded people who have the same interests as their peers. People can share opinions and experiences with each other in the field of same interest; furthermore, social networking gives people an opportunity to engage with people from different countries, and they can inspire each other. In the article “Social Networking Benefits Validated,” Jennifer Park states that people’s interests can be successfully expanded by social media. For instance, people use “Pinterest” to pin their ideas about various topics on a pin board. Last time, I used this website to search about paper flowers. A lot of related images and videos came on the screen, of which I followed the steps and made a bunch of beautiful paper flowers. Additionally, I kept in touch with the people who I met on this website who also love to make paper crafts. I kept making paper crafts with them for many times, and they have taught me how to make paper animals and paper cards. We also mix some of the cultural elements into our creations when we make the crafts, like new colors and geometric patterns...
Words: 564 - Pages: 3
...Cultural Analysis Within the past decade, social media has gained worldwide popularity and has become a platform for every day communication. Users are beginning to use social media to fulfil many basic psychological needs in terms of making connections with others and finding a personal identity. The question is: How is social media affecting the way we communicate? How have critics and academics in our culture responded to the upsurge in social media? As social media continues to grow, so does the amount of research on the topic. A study on communication in social networks was conducted in 2013 by Megan Sponcil and Priscilla Gitimu in which 96 Midwestern university students answered a questionnaire inquiring about their social media usage. Questions in the “survey included the following areas: demographics, extent of usage of social media, effect on communication, and attitudes of self” (Journal of Technology 13). Studies show that those who use social media communicate with family and friends more often than those who do not (Journal of Technology 13). Social networking sites provide a channel for easy communication with all networks of friends within one medium. The authors make an unstated claim that although the communication may not be meaningful, social media allows users to stay connected to those they care about. Users of these sites have also been discovered to have a stronger sense of self concept with a .651 Pearson correlation between media use and sense of...
Words: 1510 - Pages: 7
...CATHOLIC UNIVERSITY OF EICHSTÄTT-INGOLSTADT INGOLSTADT SCHOOL OF MANAGEMENT Team Case Analysis DOVE: EVOLUTION OF A BRAND (2008) Zuzana Husarova Sayantan Jana Papitha Mohan Arianna Parmigiani Subject: Brand Management Summer Term 2015 Date of submission: 2015-05-28 Dove: Evolution of a brand The aim of this team case analysis is to describe and analyse the evolution of the brand Dove with respect to its current strong position in American, European and increasingly even in the Asian market. What enables the brand to be so successful? Why is Dove today synonymous with care and beauty? We believe that the answers to these questions can be found in changes that took place almost a decade ago and shaped perspectives, values, corporate culture and point of view of the brand and, consequently, also of Dove´s customers and the public in general. 2 Brand Management in Unilever Because of global decentralization and the lack of transparency in all operations Unilever decided to change its organization structure with the aim to create a unified global identity. Thus, in February 2000 they launched an initiative “Path to Growth” that would clearly define their goals in order to strengthen the brand under a changing marketplace scenario. The most important changes are described in a table below. BRAND MANAGEMENT CHANGES pre 2000 after 2000 Leadership Style Laissez-faire Decentralization Centralization Product Category Multiple...
Words: 2374 - Pages: 10
...26) 1PT10MBA28 1. Give three examples of explicit-explicit communication of knowledge in an organization. Explicit-explicit communication is one transformation phase that is best supported by technology. Explicit knowledge can be easily captured and transmitted to a worldwide audience. * Financial reports * Reports which are used for analysis . * websites 2. How does knowledge creation and transfer in organizational teams take place? Knowledge transfer has always been a challenge for organizations. Its importance has grown in recent decades for three related reasons. First, knowledge appears to be an increasing proportion of many organizations total assets. Second, organizations have moved away from hierarchical methods of control toward more decentralized organizational structures and increased employee involvement This has resulted in more creativity by frontline employees and subunits, but fewer obvious organizational paths through which the transfer can occur. The Components of Knowledge Transfer In principle, knowledge transfer can be broken down into distinct stages. The five steps to describe the process: idea creation, sharing, evaluation, dissemination, and adoption. 1) Idea creation: A massive literature exists on how to promote creativity. Robert Sutton has studied creativity in groups and offers the following list of questions to ask when assessing a group's potential for creativity. 2) Idea sharing: For information sharing to...
Words: 1197 - Pages: 5
...the C is associated with “communication studies", the T is linked with “information systems", and the D for “development studies”.[1] It is aimed at bridging the digital divide and aid economic development by fostering equitable access to modern communications technologies. It is a powerful tool for economic and social development.[2] Other terms can also be used for "ICT4D" or "ICT4Dev" ("ICT for development") like ICTD ("ICT and development", which is used in a broader sense[3]) and development informatics. ICT4D can mean as dealing with disadvantaged populations anywhere in the world, but it is more seen with applications in developing countries. It concerns with directly applying information technology approaches to poverty reduction. ICTs can be applied directly, wherein its use directly benefits the disadvantaged population, or indirectly, wherein it can assist aid organisations or non-governmental organizations or governments or businesses to improve socio-economic conditions. The field is an interdisciplinary research area through the growing number of conferences, workshops and publications.[4][5][6] This is partly due to the need for scientifically validated benchmarks and results, that can measure the effectiveness of current projects.[7] This field has also produced an...
Words: 1159 - Pages: 5
...Technical Writing Project Cover Sheet Capstone Proposal Project Name: Upgrading ABC Inc. Internet Edge Student Name: Michael Wakefield Degree Program: Bachelor of Science IT-Security Mentor Name: Signature Block Student’s Signature Mentor’s Signature Table of Contents Capstone Proposal Summary 1 Review of Other Work 8 Rationale and Systems Analysis 16 Goals and Objectives 22 Project Deliverables 26 Project Plan and Timelines 27 References 28 Appendix 1: Competency Matrix 4 Capstone Proposal Summary Internet of Everything (IoE) and “Big Data” equates to competitive advantages to the modern business landscape. Numerous white papers are circulating on the Internet highlighting the business case supporting the IoE initiative. For instance, in a white paper conducted by Cisco Inc. on the Value Index of IoE in 2013 reported the following: In February 2013, Cisco released a study predicting that $14.4 trillion of value (net profit) will be at stake globally over the next decade, driven by connecting the unconnected –people-to-people (P2P), machine-to-people (M2P), and machine-to-machine (M2M) - via the Internet of Everything (IoE). Cisco defines the Internet of Everything as the networked connection of people, process, data, and things. The IoE creates new “capabilities, richer experiences, and unprecedented economic opportunity for businesses, individuals, and countries” (The Internet of Everything, Cisco, Inc. 2014). With such a...
Words: 5523 - Pages: 23
...Milestone 1 Reducing IT costs at The Learning Tree Tiffany Davis Managerial Applications of Information Technology Professor Beacom The business problem to be solved is how to reduce IT costs, and improve the data management department of The Learning Tree. Company Background The Learning Tree, Inc. is a non-profit organization that exists to provide a warm and loving environment with individualized, empirically validated services and supports to persons with significant educational, medical, and behavioral challenges; helping them develop and maintain a quality of life enjoyed by non-disabled members of their family and community. Three parents of children with multiple disabilities approached Pat Murphy and Jerre Brimer, two educators who had worked with their children as team teachers in the public school setting, and asked them to help establish a school environment that would nurture, challenge, and provide individualized instruction. They sought a school that could not only provide educational services, but also 24-hour care on a year-round basis so that consistency could be established and systematic data based programming could be more adequately implemented. As a result, The Learning Tree, Inc. was incorporated in 1983. The organization maintains three residential schools in Alabama - Mobile, Jacksonville, and Tallassee - for children with autism spectrum disorders and other intellectual disabilities. In addition, it operates The Little Tree Preschools in...
Words: 725 - Pages: 3
...Chapter 1 THE PROBLEM AND ITS SETTING Background of the Study Today’s teenagers generation are more curious especially on things that are new to them, that’s why some of them are joining peer groups that offers sense of brotherhood and acceptance. It enables young people to express their selves without fear of rejection or exclusion. Friends and barkadas serves as the avenue where you can initiate your first steps towards adulthood. In teenagers perception the word “new” is adventurous, exciting, and enjoyable. Fraternity is an ongoing group of people that have a common name or common identifying sign or symbol, form an allegiance for a common purpose and engage in unlawful or criminal activity (Hess 2010). In the United States there are large number of Filipino gang membership around the Southern California region (SoCal) and generally the entire West Coast region. Due to their Hispanic culture they are more assimilated with other Latino gangs. There are thousands of Filipino gang members which mostly center around the California region, Chicago, New York, and Miami. They represent a diverse array of backgrounds and affiliations with some being with the Bloods, Crips, Sureños, Norteños, Peoples, and Folks. A number of gangs in the Philippines are known to be active around the nation, the majority being centered in Manila with locations in and around the general Metro Manila region. One of the most infamous areas in the City is Tondo, Manila. Tondo is known to be the...
Words: 2546 - Pages: 11
...chb.2015.02.057 Highlights • Possible links between FoMO, social media engagement, and three motivational constructs were examined. • A new scale was designed to measure the extent to which students used social media tools in the classroom. • The links between social media engagement and motivational factors were mediated by FoMO. Abstract The concerns about the consequences of mental problems related to use of social media among university students have recently raised consciousness about a relatively new phenomenon termed Fear of Missing Out (FoMO). Drawing on the selfdetermination theory and on the assumption that low levels of basic need satisfaction may relate to FoMO and social media engagement, the aim of the present research was to examine for the first time possible links between FoMO, social media engagement, and three motivational constructs: Intrinsic, extrinsic and amotivation for learning. Data were gathered from 296 undergraduate students by using the following scales: Social Media Engagement (SME), Fear of Missing Out (FoMOs) and Academic Motivation. The SME is a new scale, specifically designed for this study to measure the extent to which students used social media in the classroom. This scale includes three categories: Social engagement, news information engagement and commercial information engagement. Path analysis results indicated that the positive links between social media...
Words: 3171 - Pages: 13
...Week 10: Term Paper: Mobile Computing & Social Networks Week 10: Mobile Computing & Social Networks Professor Gregory Hart Information System Decision-Making CIS500 September 9, 2012 Abstract In my paper I will talk about Mobile Computing and Social Networks and how they all work. I will assess the effectiveness and efficiency mobile-based applications provide to capture geolocation data and customer data, and quickly upload to a processing server without users having to use a desktop system. I will evaluate benefits realized by consumers because of the ability to gain access to their own data via mobile applications. Examine the challenges of developing applications that run on mobile devices because of the small screen size. Describe the methods that can be used to decide which platform to support, i. e., iPhone, iPad, Windows Phone, or Android. I will also talk about Mobile applications require high availability because end users need to have continuous access to IT and IS systems. I will discuss ways of providing high availability. Finally I will discuss mobile devices are subjected to hacking at a higher rate that non-mobile devices and discuss methods of making mobile devices more secure. Table of Contents Abstract ………………………………………………………………………………....... 2 Contents ………………………………………………………………………………….. 3 Effectiveness & Efficiency mobile-based applications to capture Geolocation data ……. 4 Benefits realized by consumers to access their own data...
Words: 2905 - Pages: 12
...BP 2012 Issue 2/3 The 9/11 Decade Issue Comprehension Answers 1 How does the author illustrate the emergence of 'a generation with a fundamental commonality' (line 3)? Lifted: Suggested Response: transcending borders (½) with [1] He describes how the youth rise above physical boundaries and limitations (½) their unequivocal expression (½) of a to state in unison (½) their desire for connection. yearning/want for connectedness. 2 What is the author showing by using the phrase 'apparently intrinsic' to describe the importance of technology to this generation's youths (lines 11-12)? Lifted: [1] Suggested Response: shows how apparently (½) intrinsic He is implying that the youths consider (½) it has become to the youth technology to be clearly/obviously (½) and inextricably linked to / part of (½) their lives. 3 When the author writes that youths use technology in an 'utterly malleable and instinctive way', (line 16), what is he implying about the perception of older generations towards the use of technology? Use your own words as far as possible. Lifted: Suggested Response: Indeed, the youth today see technology as Play-Doh: something they use in an utterly (½) malleable (½) and instinctive (1) way. [3] By stating that youths today see technology as something which they can utilise in a completely/totally/ absolutely (½) adaptable/tractable (½) and natural/spontaneous (1) way, Older generations start with...
Words: 1962 - Pages: 8
...Security Management and Control (Date) (Institution Affiliation) Introduction The internet has continued to grow exponentially over time which has led to multiplication of individual, business, and government applications on the internet, with immediate benefits to the end users. These network-based services and applications, however, pose security risks to the information and individual resources of governments and companies. Information that belong to a particular company or individual is an asset that must be protected, therefore, there should adequate security measures to avoid the risk of losing that asset. Network security is a way of protecting the digital information assets of a company. This paper describes the various goals of network security which are: Maintaining information integrity, protecting the information confidentiality and ensuring that the information is available. It is therefore very important that all the networks be protected from all the threats and vulnerabilities for the company to achieve its full potential and goals. Potential malicious attacks and threats A threat is defined as any event or circumstance that has the potential to adversely affect the organizational assets, or operations which includes image, functions, mission, or reputation of the company through unauthorized access, disclosure, destruction, modification of information or denial of service. An attack is an exploit or intrusion, which is an assault to a system that makes...
Words: 1440 - Pages: 6