• Title/Summary/Keyword: Social Information

Search Result 10,883, Processing Time 0.041 seconds

Cyber Social Interactions: Information Behavior in Between Social and Parasocial Interactions

  • Stock, Wolfgang G.;Fietkiewicz, Kaja J.;Scheibe, Katrin;Zimmer, Franziska
    • Journal of Information Science Theory and Practice
    • /
    • v.10 no.3
    • /
    • pp.15-23
    • /
    • 2022
  • Participants in real-time online sessions, be it (business) meetings, virtual school lessons, or social live streams, all engage in cyber social interactions. Unlike parasocial interactions, cyber social interactions are characterized by reciprocity and temporal proximity. In contrast to social interactions, they lack spatial proximity and bodily contact. This is a fairly new concept in information science that rose from technological advances and unprecedented circumstances (e.g., the rise of digital economy and knowledge workers being able to work remotely or, more recently, global lockdowns and contact restrictions). As a result, the past ways of working and socializing were transformed by making them, in some cases predominantly, virtual. Regarding the example of social live streaming we exhibit the importance of cyber social interactions for information behavior research. This conceptual article is a plea for information science to engage more in human-human online relations and interactions.

Information-Sharing Patterns of A Directed Social Network: The Case of Imhonet

  • Lee, Danielle
    • Journal of Internet Computing and Services
    • /
    • v.18 no.4
    • /
    • pp.7-17
    • /
    • 2017
  • Despite various types of online social networks having different topological and functional characteristics, the kinds of online social networks considered in social recommendations are highly restricted. The pervasiveness of social networks has brought scholarly attention to expanding the scope of social recommendations into more diverse and less explored types of online social networks. As a preliminary attempt, this study examined the information-sharing patterns of a new type of online social network - unilateral (directed) network - and assessed the feasibility of the network as a useful information source. Specifically, this study mainly focused on the presence of shared interests in unilateral networks, because the shared information is the inevitable condition for utilizing the networks as a feasible source of personalized recommendations. As the results, we discovered that user pairs with direct and distant links shared significantly more similar information than the other non-connected pairs. Individual users' social properties were also significantly correlated with the degree of their information similarity with social connections. We also found the substitutability of online social networks for the top cohorts anonymously chosen by the collaborative filtering algorithm.

Social Engineering Attack Graph for Security Risk Assessment: Social Engineering Attack Graph framework(SEAG)

  • Kim, Jun Seok;Kang, Hyunjae;Kim, Jinsoo;Kim, Huy Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.75-84
    • /
    • 2018
  • Social engineering attack means to get information of Social engineering attack means to get information of opponent without technical attack or to induce opponent to provide information directly. In particular, social engineering does not approach opponents through technical attacks, so it is difficult to prevent all attacks with high-tech security equipment. Each company plans employee education and social training as a countermeasure to prevent social engineering. However, it is difficult for a security officer to obtain a practical education(training) effect, and it is also difficult to measure it visually. Therefore, to measure the social engineering threat, we use the results of social engineering training result to calculate the risk by system asset and propose a attack graph based probability. The security officer uses the results of social engineering training to analyze the security threats by asset and suggests a framework for quick security response. Through the framework presented in this paper, we measure the qualitative social engineering threats, collect system asset information, and calculate the asset risk to generate probability based attack graphs. As a result, the security officer can graphically monitor the degree of vulnerability of the asset's authority system, asset information and preferences along with social engineering training results. It aims to make it practical for companies to utilize as a key indicator for establishing a systematic security strategy in the enterprise.

Smart Divide and the Paradigm Shift of Social Capital

  • Lee, Seungmin
    • Journal of Information Science Theory and Practice
    • /
    • v.9 no.3
    • /
    • pp.1-13
    • /
    • 2021
  • In the current smart device-based information environment, information utilization is closely related to social capital. Additionally, the smart divide that occurs owing to the differences in use of smart devices has a significant influence on social capital. In this respect, this research empirically analyzed how the smart divide affects social capital construction. The study found that the level of and proficiency in using smart devices and diversity of the information formats used through smart devices affect social capital construction. Further, people who fully utilize smart devices can enhance their participation in social activities, social networks, and reciprocal activities, leading people to construct social capital in a wider range. Contrarily, those who are unable to use smart devices adequately may be disadvantaged in terms of the opportunity to construct social capital and share public interests. Thus, to maximize the intrinsic value of social capital, it is necessary to consider the factors of the smart divide as a complicated and multi-faceted digital divide and the ways to utilize social capital as a driving force for integrating society, and not as a mechanism for dividing members of society.

Performance analysis of information propagation in DTN-like scale-free mobile social network

  • Wang, Zhifei;Deng, Su;Huang, Hongbin;Wu, Yahui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.3984-3996
    • /
    • 2014
  • Mobile social network can be seen as a specific application of the DTN (Delay Tolerant Network), in which the information propagation can be impacted by many social behaviors of the nodes. For a specific node, its social behaviors are various. For example, the node may not be interested in the information before receiving it and may also discard the information after getting it. On the other hand, people are more willing to forward the message to his friends. These interactive behaviors between nodes can be seen as social behaviors. It is easy to see that the impact of the social behaviors is related to the social ties, which can be manifested by the structure of the social network. State of the art works often simply assumes that the social networks can be divided into some communities. At present, some works find that the structure of some social networks is scale-free. To overcome this problem, this paper proposes a theoretical model to evaluate the impact of above social behaviors in the DTN-like scale-free network. Simulation shows the accuracy of the model. Numerical results show that both social behaviors and scale-free character have significant impact on information propagation. Moreover, the impact of social behaviors is related to the scale-free character of the networks.

Leveling Up the Information Culture of Social Work Bachelors

  • Bartosh, Olena;Povidaichyk, Oksana;Kozubovska, Iryna;Shandor, Fedir;Afanasiev, Dmytro;Bodnar, Olesia;Katsora, Oleksandr;Oros, Oleksandra
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.222-230
    • /
    • 2021
  • The article reviews the issue of formation of information culture of social work bachelors in the process of their professional training. The main internal / external factors that determine the need for the information culture formation of social workers-to-be have been identified. To determine the levels of information culture formed in bachelors of social work criteria and their indicators have been substantiated. The model of information culture formation in BSW has been developed and implemented in Ukrainian universities under the following pedagogic conditions: organized informational environment; interconnection between general and professionally-directed courses; curriculum includes course directed on IC formation. The model contained interconnected components: aim - to achieve higher level of information culture formed; specific principles; content, interactive methods and forms of organization of educational process, methods of control and correction; components of information culture. The implemented mastered learning procedure has contributed to the leveling up of information culture formed in social work bachelors.

The Relationship among Fashion Social Media, Information Usage Behavior, and Purchase Intention (패션 소셜미디어 품질, 정보 이용행동, 구매의도 간 관계 연구)

  • Kim, Naeeun;Kim, Mi-Sook
    • The Journal of Industrial Distribution & Business
    • /
    • v.9 no.11
    • /
    • pp.25-38
    • /
    • 2018
  • Purpose - This study aimed to identify the sub-dimensions of fashion social media quality (information quality, social quality, service quality, system quality) and investigate how they affect purchase intention through fashion information use behavior (information acceptance, information diffusion). Research design, data, and methodology - Data collection was carried out twice for systematic verification of the research model. In the first data collection, the reliability and validity of research variables were verified through 238 respondents and questionnaires were revised and supplemented based on their responses. In March 2018, the final survey was conducted from 755 respondents the age of 20 to 49. Using SPSS 23.0, descriptive statistics, exploratory factor analysis, correlation analysis were performed. In order to test hypotheses, structural equational modeling technique was employed using AMOS 23.0. Results - First of all, fashion Social media quality consists of four factors including information quality, social quality, service quality and system quality. Second, fashion Social media information quality, social quality, and system quality were shown to have a positive(+) effect on information acceptance behavior, and social quality, service quality and system quality were shown to have a positive(+) effect on information diffusion behavior. It was also determined that the acceptance and diffusion behaviors of fashion information through fashion Social media had positive(+) influence on purchase intention. Conclusions - This study holds academic significance in its identification of the components of fashion Social media quality and for conducting an empirical analysis on the causal relationship between fashion information acceptance and diffusion behaviors, and purchase intention. The results of this study indicate that fashion involvement is the key factors in determining the quality of Social media, the acceptance of information through Social media, and, by extension, the purchase of fashion products. Practitioners in the fashion industry may use the findings of this study in order to build more effective Social media strategy.

Why do We Share Information? Explaining Information Sharing Behavior through a New Conceptual Model between Sharer to Receiver within SNS

  • Seok Noh
    • Asia pacific journal of information systems
    • /
    • v.31 no.3
    • /
    • pp.392-414
    • /
    • 2021
  • Social networking services (SNS) is an indispensable method in order to obtain information of the Internet participants. The study identified three variables of social media communication, sharing culture, and online trust in terms of social capital theory (SCT) and reviewed intention& behavior variables in terms of theory of planned behavior (TPB). The data were collected from 330 samples of SNS user, and were involved, and the research model uses AMOS to make confirmatory factor analysis. The findings confirmed our hypothesis that social media communication, sharing culture, and online trust affect individuals' behaviors to sharing information. This study emphasizes that not only social media communication but also sharing culture to SNS can stimulate information sharing. while previous research has predominately focused on personal cognition or social network, the study examines the integrated influence of communication, culture and trust on information sharing in SNS. In sum, by explicating the unique role of social capital, this paper aims at contributing to the continued development and success of SNS in general.

A Study on Information Graphics in the Middle School Social Studies Textbooks

  • Lee, Sang-Bock
    • Journal of the Korean Data and Information Science Society
    • /
    • v.16 no.3
    • /
    • pp.603-608
    • /
    • 2005
  • The purpose of this qualitative case study is to understand how the idea of data view and information graphics is used in the social studios middle school textbooks. Data were collected through national curriculum documents and social studies middle textbooks for 7-9 grades. We set up three questions for this studies; what kinds of information graphics are used in the textbooks, how the graphics are organized in the social studies middle school, and how the 7th social studies curriculum is related with the 7th national mathematics curriculum. Through the data analysis, we found that 1) Photographs, illustrations, information maps, etc., are used and frequencies of their usages are in descending order, 2) double lines graphs, circle graphs, and stripe graphs nip often adopted for the comparison of populations, 3) the relation of the two subjects curricula is not so good, especially in the curriculum steps of information mads scatter diagrams, and comparison of populations. Finally we suggest that new web site of data view or information graphics be provided for two curricula, workshop of information graphics are needed for social studies teachers.

  • PDF

Levelized Data Processing Method for Social Search in Ubiquitous Environment (유비쿼터스 환경에서 소셜 검색을 위한 레벨화된 데이터 처리 기법)

  • Kim, Sung Rim;Kwon, Joon Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.1
    • /
    • pp.61-71
    • /
    • 2014
  • Social networking services have changed the way people communicate. Rapid growth of information generated by social networking services requires effective search methods to give useful results. Over the last decade, social search methods have rapidly evolved. Traditional techniques become unqualified because they ignore social relation data. Existing social recommendation approaches consider social network structure, but social context has not been fully considered. Especially, the friend recommendation is an important feature of SNSs. People tend to trust the opinions of friends they know rather than the opinions of strangers. In this paper, we propose a levelized data processing method for social search in ubiquitous environment. We study previous researches about social search methods in ubiquitous environment. Our method is a new paradigm of levelelized data processing method which can utilize information in social networks, using location and friendship weight. Several experiments are performed and the results verify that the proposed method's performance is better than other existing method.