Factors driving social network site usage
And Conclusions7.1 Summary; 7.2 Conclusions; Bibliography; Bibliography.
2045959 Ergebnisse
Sortierung:
And Conclusions7.1 Summary; 7.2 Conclusions; Bibliography; Bibliography.
Online communities are used across several fields of human activities, as environments for large-scale collaboration. Most successful ones employ professionals, sometimes called "community managers" or "moderators", for tasks including onboarding new participants, mediating conflict, and policing unwanted behaviour. Network scientists routinely model interaction across participants in online communities as social networks. We interpret the activity of community managers as (social) network design: they take action oriented at shaping the network of interactions in a way conducive to their community's goals. It follows that, if such action is successful, we should be able to detect its signature in the network itself. Growing networks where links are allocated by a preferential attachment mechanism are known to converge to networks displaying a power law degree distribution. Growth and preferential attachment are both reasonable first-approximation assumptions to describe interaction networks in online communities. Our main hypothesis is that managed online communities are characterised by in-degree distributions that deviate from the power law form; such deviation constitutes the signature of successful community management. Our secondary hypothesis is that said deviation happens in a predictable way, once community management practices are accounted for. If true, these hypotheses would give us a simple test for the effectiveness of community management practices. We investigate the issue using (1) empirical data on three small online communities and (2) a computer model that simulates a widely used community management activity called onboarding. We find that onboarding produces in-degree distributions that systematically deviate from power law behaviour for low-values of the in-degree; we then explore the implications and possible applications of the finding. ; This paper has received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No 688670
BASE
In: Development in practice, Band 16, Heft 6
ISSN: 0961-4524
In: EBL-Schweitzer
Vorwort; Inhalt; 1Einleitung; 2Alles, was du für den Erfolg auf YouTube brauchst; 2.1Fast erfolgreich gescheitert; 2.2Der erfolgreichste Start eines Partnerkanals; 3YouTube - Das unbekannte Wesen; 3.1Was ist YouTube?; 3.2Was gibts auf YouTube? Der Fremdenführer; Die großen deutschen YouTube-Kanäle: Coldmirror; 4In 10 Minuten zum YouTuber; 4.1Anmelden bei YouTube; 4.2Kanal einrichten; 4.3Video drehen/schneiden/komprimieren; 4.4Eigene Videos hochladen; 4.5Fremde Videos verlinken; Die großen deutschen YouTube-Kanäle: Alberto; 5Videos machen; 5.1Das Wichtigste: der Ton!
Cover; Contents; Acknowledgements; Introduction: Not sure if this book is for you?; 01 Leading a business in a socially connected world; How digital is transforming business; Why does being social as a leader matter for you?; Fake social; Getting social really means getting social; Barometer, microphone and scout; The age of the co-creating, belief-driven all-important customer; Reconnecting the disconnect; Belief-driven buyers; Beyond broadcast media; Seeing around corners; Leading from the front; Focus on the human experience; References; 02 The social landscape
"This book explores the current research based on selfies (self-portraiture through on-the-fly imagery and video) and the explicit and implicit messaging from selfies about individuals, groups, and societies. Social media content is interpreted for profiling, for sociocultural analysis, and other angles. This book explores social media and exploiting these information sources for research purposes"--
In: Collana MediaCultura 5
Online Social Networks (OSNs) have become an integral part of today's Web. Politicians, celebrities, revolutionists, and others use OSNs as a podium to deliver their message to millions of active web users. Unfortunately, in the wrong hands, OSNs can be used to run astroturf campaigns to spread misinformation and propaganda. Such campaigns usually start off by infiltrating a targeted OSN on a large scale. In this paper, we evaluate how vulnerable OSNs are to a large-scale infiltration by socialbots: computer programs that control OSN accounts and mimic real users. We adopt a traditional web-based botnet design and built a Socialbot Network (SbN): a group of adaptive socialbots that are orchestrated in a command-and-control fashion. We operated such an SbN on Facebook—a 750 million user OSN—for about 8 weeks. We collected data related to users' behavior in response to a large-scale infiltration where socialbots were used to connect to a large number of Facebook users. Our results show that (1) OSNs, such as Facebook, can be infiltrated with a success rate of up to 80%, (2) depending on users' privacy settings, a successful infiltration can result in privacy breaches where even more users' data are exposed when compared to a purely public access, and (3) in practice, OSN security defenses, such as the Facebook Immune System, are not effective enough in detecting or stopping a large-scale infiltration as it occurs.
BASE
Online Social Networks (OSNs) have become an integral part of today's Web. Politicians, celebrities, revolutionists, and others use OSNs as a podium to deliver their message to millions of active web users. Unfortunately, in the wrong hands, OSNs can be used to run astroturf campaigns to spread misinformation and propaganda. Such campaigns usually start off by infiltrating a targeted OSN on a large scale. In this paper, we evaluate how vulnerable OSNs are to a large-scale infiltration by socialbots: computer programs that control OSN accounts and mimic real users. We adopt a traditional web-based botnet design and built a Socialbot Network (SbN): a group of adaptive socialbots that are orchestrated in a command-and-control fashion. We operated such an SbN on Facebook—a 750 million user OSN—for about 8 weeks. We collected data related to users' behavior in response to a large-scale infiltration where socialbots were used to connect to a large number of Facebook users. Our results show that (1) OSNs, such as Facebook, can be infiltrated with a success rate of up to 80%, (2) depending on users' privacy settings, a successful infiltration can result in privacy breaches where even more users' data are exposed when compared to a purely public access, and (3) in practice, OSN security defenses, such as the Facebook Immune System, are not effective enough in detecting or stopping a large-scale infiltration as it occurs.
BASE
In: Electronic Mediations
In: Electronic Mediations Ser. v.41
Off the Network is a fresh and authoritative examination of how the hidden logic of the Internet, social media, and the digital network is changing users' understanding of the world-and why that should worry us. Ulises Ali Mejias suggests how we might begin to rethink the logic of the network and question its ascendancy
In: Wisconsin studies in autobiography
Includes bibliographical references and index
In: Online social networks and media: OSNEM, Band 3-4, S. 22-31
ISSN: 2468-6964
This brief textbook explains the principles of social network analysis. The book goes beyond theoretical concepts and gives the reader complete knowledge about how to apply analytical techniques using Pajek to perform a large-scale network analysis. The book covers the topic in 2 sections - the first detailing fundamentals of research design and the next one about methods and applications
In: Journal of consumer behaviour, Band 10, Heft 6, S. 332-337
ISSN: 1479-1838
ABSTRACTSocial networks have become an increasingly common way for people to share information and seek emotional support for issues surrounding weight loss. This study aims to explore how users of a commercial social networking site who are focussed on weight loss give and/or receive social support to/from other users. The authors use quantitative data from 145 members of the Weight Watchers Facebook page to explore how social support is both given and received, and the communication style by which this is achieved. This study reveals three groups—Passive Recipients, Active Supporters and Casual Browsers. Passive Recipients receive a high level of informational and emotional support but do so by being passive communicators. Active Supporters also receive a high level of both informational and emotional support yet are more active in their communication style. Casual Browsers receive little social support and exhibit a passive communication style. Thus, the authors find evidence that even though members of a social network may share a common interest, the way members choose to participate and interact, and the benefits they accrue by doing so differ substantially. Copyright © 2011 John Wiley & Sons, Ltd.