Instant Messaging — enabler or threat?
In: Infosecurity Today, Band 2, Heft 1, S. 45
20 Ergebnisse
Sortierung:
In: Infosecurity Today, Band 2, Heft 1, S. 45
In: Computers, Phones, and the InternetDomesticating Information Technology, S. 201-218
In: Mediated youth Vol. 2
In: Internet Research 20
In: Michigan family review, Band 11, Heft 1, S. 21
ISSN: 1558-7258
In: International journal of business data communications and networking: IJBDCN ; an official publication of the Information Resources Management Association, Band 2, Heft 2, S. 1-20
ISSN: 1548-064X
There is no shortage of knowledge waiting to be mined on the Web. But there is a difference between mining to the depths of the Web and examining what is occurring on its surface. In this article, the authors argue that the search for actionable knowledge should start as close as possible to the user, which, in today's technological environment, means tapping into Instant Messages. They present a System for the Analysis of Instant Messages, explain the architectural and operational motivation, and show how instant messages can be mined to produce a new source of Web-based knowledge.
In: Social policy report, Band 18, Heft 4, S. 1-20
ISSN: 2379-3988
In: Young consumers: insight and ideas for responsible marketers, Band 6, Heft 3, S. 8-13
ISSN: 1758-7212
Discusses the relevance of mobile phone technology in marketing to young consumers aged between 18 and 22; these are the millennials who are heavy mobile phone users and often the architects of change in US culture. Shows how permission is vital in connecting with these consumers interactively: they do not hate all advertising, but they hate "spim", which is receiving, and paying for, spam messages over their mobile phone instant messaging systems. Describes some relevant features of this converging technology: podcasting and mobcasting, super‐megapixel camera phones, television on demand, purseless payments using radio frequency identification (RFID), recognition technologies, and mobile teleconferencing. Suggests some strategies for marketing to millennials: develop case‐specific insights, target mindsets, and develop new ways of connecting with consumers. Illustrates this with the story of how Doritos promoted a new snack flavour line by targeting mobile phone‐owning millennials with billboards, instant messaging and websites.
In: The Kluwer International Series on Computer Supported Cooperative Work 4
SMS or Text is one of the most popular forms of messaging. Yet, despite its immense popularity, SMS has remained unexamined by science. Not only that, but the commercial organisations, who have been forced to offer SMS by a demanding public, have had very little idea why it has been successful. Indeed, they have, until very recently, planned to replace SMS with other messaging services such as MMS. This book is the first to bring together scientific studies into the values that - texting - provides, examining both cultural variation in countries as different as the Philippines and Germany, as well as the differences between SMS and other communications channels like Instant Messaging and the traditional letter. It presents usability and design research which explores how SMS will evolve and what is likely to be the pattern of person-to-person messaging in the future. In short, "The Inside Text" is a fundamental resource for anyone interested in mobile communications at the start of the 21st Century.
In: Dissent: a quarterly of politics and culture, Band 54, Heft 4, S. 37-39
ISSN: 1946-0910
Internet and new digital technologies played remarkable, novel roles in the 2007 French presidential campaign. They produced unexpected shifts in daily operations of parties, which had to reverse their tactics as a result of information flows and the need to respond to revelations from unauthorized videos broadcast on the Web. There were forums and interactive debates online (Ségolène Royal's team was the innovator in these), and campaigners were mobilized via instant messaging. In short, political communication departed from beyond the traditional paths of a party apparatus, public relations teams, and mainstream journalism. Activists online helped to create the content of political debates, and this, in turn, fed into the traditional media.
In: New media & society: an international and interdisciplinary forum for the examination of the social dynamics of media and information change, Band 7, Heft 3, S. 383-402
ISSN: 1461-7315
The aim of this article is to investigate how often adolescents engage in internet-based identity experiments, with what motives they engage in such experiments and which self-presentational strategies they use while experimenting with their identity. Six hundred nine to 18-year-olds completed a questionnaire in their classroom. Of the adolescents who used the internet for chat or Instant Messaging, 50 percent indicated that they had engaged in internet-based identity experiments. The most important motive for such experiments was self-exploration (to investigate how others react), followed by social compensation (to overcome shyness) and social facilitation (to facilitate relationship formation). Age, gender and introversion were significant predictors of the frequency with which adolescents engaged in internet-based identity experiments, their motives for such experiments, and their self-presentational strategies.
In: New media & society: an international and interdisciplinary forum for the examination of the social dynamics of media and information change, Band 9, Heft 5, S. 795-810
ISSN: 1461-7315
This study examined the relationship among personal network characteristics, gratification-utilities and the frequency of use of three interactive communication technologies (landline telephone, email and instant messaging). A conceptual framework is presented, providing a rationale for three hypotheses predicting positive relationships between personal network characteristics (size, intimacy and physical proximity), gratification-utilities and frequency of use.The participants were 286 college students, whom research shows are primary users of interactive media. Hypotheses 1 and 2, proposing a link between network characteristics and gratification-utilities with frequency of use, were supported, while Hypothesis 3, predicting a link between the prior two variables, was only partially supported. Frequency of use was associated more strongly with network characteristics than with gratification-utilities across the three technologies. Of the network characteristics, network size was significantly associated with gratification-utilities. Directions for future research are discussed.
Contributors discuss how growing up in a world saturated with digital media affects the development of young people's individual and social identities.As young people today grow up in a world saturated with digital media, how does it affect their sense of self and others? As they define and redefine their identities through engagements with technology, what are the implications for their experiences as learners, citizens, consumers, and family and community members? This addresses the consequences of digital media use for young people's individual and social identities. The contributors explore how young people use digital media to share ideas and creativity and to participate in networks that are small and large, local and global, intimate and anonymous. They look at the emergence of new genres and forms, from SMS and instant messaging to home pages, blogs, and social networking sites. They discuss such topics as "girl power" online, the generational digital divide, young people and mobile communication, and the appeal of the "digital publics" of MySpace, considering whether these media offer young people genuinely new forms of engagement, interaction, and communication.ContributorsAngela Booker, danah boyd, Kirsten Drotner, Shelley Goldman, Susan C. Herring, Meghan McDermott, Claudia Mitchell, Gitte Stald, Susannah Stern, Sandra Weber, Rebekah Willett
Intro -- Contents -- PREFACE -- ACKNOWLEDGMENTS -- Part One: Introduction to Technology and Risks on the Internet -- CHAPTER 1 Welcome to the Internet -- Growing Up -- The Internet: What Is It? -- Recommendations -- CHAPTER 2 Back to School -- Internet Technologies Defined: Education 101 -- Recommendations -- CHAPTER 3 Risks Overview: Are Parents Making the Grade? -- An Overview of Online Risks -- Some Statistics for Kids Going Online -- How Are Parents Doing Protecting Their Kids? -- Protection at School and in Libraries -- Recommendations -- CHAPTER 4 The Risks of Going Online -- A Sampling of Unfortunate Events -- Recommendations -- Part Two: A Road Map to Protect Children While Online -- CHAPTER 5 How to Monitor Your Kids Online -- To Monitor or Not to Monitor -- Tricks Kids Use to Hide What They're Doing -- Nontechnical Parental Monitoring -- Software for Better Monitoring -- Recommendations -- CHAPTER 6 Internet Surfing, Blogs, and Social Networking -- Surfing/Browsing the Internet -- Search Engines: The Good, the Bad, and the Ugly -- Social Networking and Blogging -- Video Cameras Gone Wild -- Firewalls and Wireless -- Recommendations -- CHAPTER 7 Email -- Email Options and Programs -- Email Risks -- Kid-Friendly Email Programs -- Tricks Kids Use to Hide Email Activities -- Blocking Free Email Services -- File Attachment Risk -- Don't Forget about Spam -- Recommendations -- CHAPTER 8 Instant Messaging and Voice-over-IP -- IM Basics and Tools -- IM Lingo Parents Must Know -- Blocking IM: It's Not Easy -- Chat Rooms: A Hangout for Predators -- Making Phone Calls over the Internet -- How Predators Find Their Victims -- Recommendations -- CHAPTER 9 Cell Phones and PDAs -- An Overview of Portable Communication Devices -- Text Messaging: How Teens Communicate -- Monitoring Call Logs and Bills -- Browsing and IM Challenges with PDAs.