Search results for "Social computing"
showing 5 items of 5 documents
Social Computing: A Classification of Existing Paradigms
2012
In less than three decades, several paradigms of social computing have emerged. Among them, groupware, social software and mobile social software (MoSoSo) are the most widely known. Although all significant, it is challenging to recognize the function and unique features of each single paradigm. This situation represents an obstacle for a coherent development of social computing, a research domain that is highly fragmented and with relevant literature spread across several disciplines. In this paper, a classification of existing social computing paradigms is introduced as an initial effort to combine the lines of discourse concerning social computing.
Mobile social networking in theory and practice
2008
Mobile social networks have gained the attention of the media, academy and mobile market. Despite of the robust tradition of network and community studies, mobile social networks are often addressed improperly. This paper presents a theoretical framework to study mobile social networking and examines the design implications of results of an exploratory study conducted with a group of 18 young adults in Finland. The findings of this study indicate that the quality of mobile applications offering social networking could be greatly increased by integrating the knowledge of two traditions that so far developed in parallel, namely the mathematical as well as social approaches to social networks.
Communities of Communication: Making Sense of the “Social” in Social Media
2012
As social media usage permeates people's lives, an increasing portion of their daily behavior leaves digital traces to be used by researchers. Social scientists can hope to gain new insight into the previously hidden but digitally recorded aspects of our digital social lives. Beyond aggregate and individual-level studies of user behavior, the digital traces also enable scientific examination of the structure of social interaction through networks. At the same time, the large scale and networked nature of social media data pose a new set of challenges to be overcome through the development of sound methodologies. We take stock of current methodological promises and challenges in social media…
Revealing Employer’s Name in Social Networks
2017
Abstract The research investigates the question of the importance of mentioning the name of the employer in online and offline social networks. The exchange of information is an important part of social networks and social capital theory. Companies can use the networks of their employees to recruit new hires and to check habits and interests of likely new employees. To do that, the employee has to mention the name of the company in these social networks. The paper compares different real social networks used by family and friends and private and business social network sites (SNSs) as online social networks and compares the differences between men and women. The empirical research has been …
Time Up for Phishing with Effective Anti-Phishing Research Strategies
2015
Public awareness is a significant factor in the battle against online identity theft (phishing). Advancing public readiness can be a strategic protection mechanism for citizens' vulnerability and privacy. Further, an effective research strategy against phishing is the combination of increased social awareness with software quality and social computing. The latter will decrease phishing victims and will improve information systems quality. First, the authors discuss recent research results on software quality criteria used for the design of anti-phishing technologies. Second, it is argued that the dynamics of social surroundings affect citizens' trust and can compromise social security. Thir…