6,811 research outputs found

    Social network market: Storytelling on a web 2.0 original literature site

    Get PDF
    This article looks at a Chinese Web 2.0 original literature site, Qidian, in order to show the coevolution of market and non-market initiatives. The analytic framework of social network markets (Potts et al., 2008) is employed to analyse the motivations of publishing original literature works online and to understand the support mechanisms of the site, which encourage readers’ willingness to pay for user-generated content. The co-existence of socio-cultural and commercial economies and their impact on the successful business model of the site are illustrated in this case. This article extends the concept of social network markets by proposing the existence of a ripple effect of social network markets through convergence between PC and mobile internet, traditional and internet publishing, and between publishing and other cultural industries. It also examines the side effects of social network markets, and the role of market and non-market strategies in addressing the issues

    Virtual Geodemographics: Repositioning Area Classification for Online and Offline Spaces

    Get PDF
    Computer mediated communication and the Internet has fundamentally changed how consumers and producers connect and interact across both real space, and has also opened up new opportunities in virtual spaces. This paper describes how technologies capable of locating and sorting networked communities of geographically disparate individuals within virtual communities present a sea change in the conception, representation and analysis of socioeconomic distributions through geodemographic analysis. We argue that through virtual communities, social networks between individuals may subsume the role of neighbourhood areas as the most appropriate units of analysis, and as such, geodemographics needs to be repositioned in order to accommodate social similarities in virtual, as well as geographical, space. We end the paper by proposing a new model for geodemographics which spans both real and virtual geographies

    Implementation of E-Voting System for Student Union Government Elections

    Get PDF
    Several records of violence during student body elections in higher institutions of learning can be found dating back to the 1988 Abu crisis. The causal factors are multifaceted, involving both internal factors within the institution and external factors, and interest parties like main stream politicians. Suspicion of the possibility of rigging during a planned election can trigger pre-election violence, while alleged rigging during the election or the vote counting process is the major cause of election unrest during student government elections. The voting process is typically manual, and it is done through the use of ballot boxes and papers. This is error prone, inefficient and susceptible to rigging. Preventing mistrust-induced election violence requires the deployment of a trustworthy alternative to the paper ballot system. In this study, an electronic voting system is developed using Visual Basic and Microsoft Access Database. The application performs voter authentication by verifying a pre-issued pin which is unique for each voter. The system is accurate and engages the participation and login of agents who are representatives of the candidates’ contesting for various offices thereby building trust in the process

    iTrace: An Implicit Trust Inference Method for Trust-aware Collaborative Filtering

    Full text link
    The growth of Internet commerce has stimulated the use of collaborative filtering (CF) algorithms as recommender systems. A collaborative filtering (CF) algorithm recommends items of interest to the target user by leveraging the votes given by other similar users. In a standard CF framework, it is assumed that the credibility of every voting user is exactly the same with respect to the target user. This assumption is not satisfied and thus may lead to misleading recommendations in many practical applications. A natural countermeasure is to design a trust-aware CF (TaCF) algorithm, which can take account of the difference in the credibilities of the voting users when performing CF. To this end, this paper presents a trust inference approach, which can predict the implicit trust of the target user on every voting user from a sparse explicit trust matrix. Then an improved CF algorithm termed iTrace is proposed, which takes advantage of both the explicit and the predicted implicit trust to provide recommendations with the CF framework. An empirical evaluation on a public dataset demonstrates that the proposed algorithm provides a significant improvement in recommendation quality in terms of mean absolute error (MAE).Comment: 6 pages, 4 figures, 1 tabl

    Tuning the Diversity of Open-Ended Responses from the Crowd

    Full text link
    Crowdsourcing can solve problems that current fully automated systems cannot. Its effectiveness depends on the reliability, accuracy, and speed of the crowd workers that drive it. These objectives are frequently at odds with one another. For instance, how much time should workers be given to discover and propose new solutions versus deliberate over those currently proposed? How do we determine if discovering a new answer is appropriate at all? And how do we manage workers who lack the expertise or attention needed to provide useful input to a given task? We present a mechanism that uses distinct payoffs for three possible worker actions---propose,vote, or abstain---to provide workers with the necessary incentives to guarantee an effective (or even optimal) balance between searching for new answers, assessing those currently available, and, when they have insufficient expertise or insight for the task at hand, abstaining. We provide a novel game theoretic analysis for this mechanism and test it experimentally on an image---labeling problem and show that it allows a system to reliably control the balance betweendiscovering new answers and converging to existing ones

    Interacting and representing: can Web 2.0 enhance the roles of an MP?

    Get PDF
    Several UK Members of Parliament (MPs) have a foothold within a Web 2.0 environment. Some write blogs, such as Labour’s Tom Watson or Conservative John Redwood. Equally, some have joined virtual communities such as the social networking sites (SNS) MySpace or Facebook. Cumulatively this indicates they are exploring new means of promoting themselves, their politics as well as news means for interacting with their constituents or those who share their political interests. The key aspect of Web 2.0 technology that offers potential for MPs is that an architecture of participation is in place where those with Internet access can interact with one another. Apart from the Webmasters, there is no automatic hierarchy within communities and so each page within a community site is produced by its members. In sharp contrast to the ‘we will build it and they will come’ philosophy associated with Web 1.0 and the static website; Web 2.0 users work on a ‘we will come and build it philosophy’. MPs, in using this technology, must relinquish some control over their public representation in order to engage with community members; this papers asks to what extent this is occurring, what functions of an MPs role are enhanced through the use of Web 2.0, and concludes by focusing on the advantages and disadvantages for MPs of pursuing a Web 2.0 strategy. Our research analysed the content of the 42 weblogs and 37 SNS of MPs who advertise these on the personal websites. Our first set of questions related to the extent to which public conversations could take place; so assessing the extent of interactivity between the MPs and the visitors to these weblogs and SNS profiles. Secondly we focused on the extent to which interactivity was potentiated, either through site functions or the language used, such as asking questions; so assessing whether interaction could take place. Thirdly we assessed which of the MPs roles, the policy scrutiny trusteeship role, the party member role, or constituency representative role was being enhanced through Web 2.0 technologies and what relationship this had to interaction gained. Our data suggests that interactivity is taking place. But this can be in a fairly limited form with many visitors being more likely to comment without returning rather than being part of any reciprocal exchange with the MP. In our assessment, this was due to the fact that many blogs and SNS profiles are laden with too much information and insufficient opportunities to enter into conversations on matters of importance to visitors. When focusing on the functions of the MP, it was clear that many used Web 2.0 as a space to promote the party and communicate their thoughts on issues of the day however these tended to gain little interaction. However, those MPs who use Web 2.0 tools to enhance their constituency representative role did find visitors would interact with them. Within Web 2.0 we can also find a further purpose for MPs, offering insights into their background and personal life to offer a more three-dimensional perspective to visitors. Many MPs use SNS particularly in the same way as any other user, as an individual as opposed to as a professional within any particular career. Here we find MPs also benefiting from interaction with visitors and not only those that are within their offline circle of friends and colleagues. Thus we conclude that there is potential for MPs to use Web 2.0 to support their representative function and gain interaction with a broader public than they would normally. Weblogs can be used to build a community of interest around policy areas to some extent, though this is currently limited to a minority. However SNS can be used to enhance the link between constituents and the MP, if only a minority of the constituency, and can widen the MPs circle of contacts. However, the control aspect is clearly a worry for MPs. While outside of an election campaign it may not matter what is said on an MPs’ weblog or SNS profile there are dangers that during an election they can be hi-jacked by opponents. Therefore the calculation will remain one of benefit versus risk and an assessment of whether sufficient constituents can be reached, or significant numbers of contacts be made, to indicate whether Web 2.0 offers huge promise or huge dangers
    • …
    corecore