41,300 research outputs found
Dimensions of web site credibility and their relation to active trust and behavioural impact
This paper discusses two trends that threaten to undermine the effectiveness of online social marketing interventions: growing mistrust and competition. As a solution, this paper examines the relationships between Web site credibility, target audiencesâ active trust and behaviour. Using structural equation modelling to evaluate two credibility models, this study concludes that Web site credibility is best considered a three-dimensional construct composed of expertise, trustworthiness and visual appeal, and that trust plays a partial mediating role between Web site credibility and behavioural impacts. The paper examines theoretical implications of conceptualizing Web sites according to a human credibility model, and factoring trust into Internet-based behavioural change interventions. Practical guidelines suggest ways to address these findings when planning online social marketing interventions
Message and Medium: The Role of Social and Individual Factors in Using Computer Mediated Communications
The proliferation of computers and technology has resulted in increased use of computer mediated communications. However, the effective use of technology like bulletin boards and e-mail based communications can only be obtained if we understand how to enhance employee usage. Although human-computer interface has been a topic of considerable studies, most research has been done with students and under controlled conditions. In addition, field research has been limited in its inclusion of both social and individual factors that affect usage. In order to expand this research we report the results of a longitudinal study conducted within an entrepreneurial software company that used an innovative bulletin-board communication system. Our study uses employee survey data to measure social and individual factors that encompass attitudes toward the computer system. In addition, we obtained actual employee usage (copies of all postings to the bulletin board system) for the 12-month period of time following our survey. In addition to reporting the results of our study, we discuss implications of this work for other forms of computer mediated communications
Digital Media and Youth: Unparalleled Opportunity and Unprecedented Responsibility
Part of the Volume on Digital Media, Youth, and Credibility This chapter argues that understanding credibility is particularly complex -- and consequential -- in the digital media environment, especially for youth audiences, who have both advantages and disadvantages due to their relationship with contemporary technologies and their life experience. The chapter explains what is, and what is not, new about credibility in the context of digital media, and discusses the major thrusts of current credibility concerns for scholars, educators, and youth
Electronic Resources Communications Management: A Strategy for Success
This paper is based on a presentation
given at the Electronic Resources and
Libraries Conference, Georgia Institute of
Technology, Atlanta, March 23, 2006.Communications in the workflow of electronic resources (e-resources) acquisitions and management are complex and numerous. The work of acquiring and managing e-resources is hampered by the lack of best practices, standards, and adequate personal information management software. The related communications reflect these inadequacies. An e-resource management communications analysis at The Ohio State University Libraries revealed the underlying structure of the communication network and areas that could be improved in terms of efficiency and effectiveness. E-resources management must be responsive to the high expectations of users and other library staff. Efficient management of the related communications network increases the likelihood of a productive and successful operation
A Topic Recommender for Journalists
The way in which people acquire information on events and form their own
opinion on them has changed dramatically with the advent of social media. For many
readers, the news gathered from online sources become an opportunity to share points
of view and information within micro-blogging platforms such as Twitter, mainly
aimed at satisfying their communication needs. Furthermore, the need to deepen the
aspects related to news stimulates a demand for additional information which is often
met through online encyclopedias, such as Wikipedia. This behaviour has also
influenced the way in which journalists write their articles, requiring a careful assessment
of what actually interests the readers. The goal of this paper is to present
a recommender system, What to Write and Why, capable of suggesting to a journalist,
for a given event, the aspects still uncovered in news articles on which the
readers focus their interest. The basic idea is to characterize an event according to
the echo it receives in online news sources and associate it with the corresponding
readersâ communicative and informative patterns, detected through the analysis of
Twitter and Wikipedia, respectively. Our methodology temporally aligns the results
of this analysis and recommends the concepts that emerge as topics of interest from
Twitter and Wikipedia, either not covered or poorly covered in the published news
articles
Report of the workshop on Aviation Safety/Automation Program
As part of NASA's responsibility to encourage and facilitate active exchange of information and ideas among members of the aviation community, an Aviation Safety/Automation workshop was organized and sponsored by the Flight Management Division of NASA Langley Research Center. The one-day workshop was held on October 10, 1989, at the Sheraton Beach Inn and Conference Center in Virginia Beach, Virginia. Participants were invited from industry, government, and universities to discuss critical questions and issues concerning the rapid introduction and utilization of advanced computer-based technology into the flight deck and air traffic controller workstation environments. The workshop was attended by approximately 30 discipline experts, automation and human factors researchers, and research and development managers. The goal of the workshop was to address major issues identified by the NASA Aviation Safety/Automation Program. Here, the results of the workshop are documented. The ideas, thoughts, and concepts were developed by the workshop participants. The findings, however, have been synthesized into a final report primarily by the NASA researchers
Seeing the big PICTURE: A framework for improving the communication of requirements within the Business-IT relationship
The relationship between the business and IT departments in the context of the organisation has been characterised as highly divisive. Contributing problems appear to revolve around the failure to adequately communicate and understand the required information for the alignment of business and IT strategies and infrastructures. This study takes a communication-based view on the concept of alignment, in terms of the relationship between the retail business and IT within a major high street UK bank. A research framework (PICTURE) is used to provide insight into this relationship and guide the analysis of interviews with 29 individuals on mid-high management level for their thematic content. The paper highlights the lessons that can be derived from the study of the BIT relationship and how possible improvements could be made
Recommended from our members
An architecture for certification-aware service discovery
Service-orientation is an emerging paradigm for building complex systems based on loosely coupled components, deployed and consumed over the network. Despite the original intent of the paradigm, its current instantiations are limited to a single trust domain (e.g., a single organization). Also, some of the key promises of service-orientation - such as the dynamic orchestration of externally provided software services, using runtime service discovery and deployment - are still unachieved. One of the main reasons for this is the trust gap that normally arises when software services, offered by previously unknown providers, are to be selected at run-time, without any human intervention. To close this gap, the concept of machine-readable security certificates (called asserts) has been recently introduced, which paves the way to automated processing about security properties of services. Similarly to current security certification schemes, the assessment of the security properties of a service is delegated to an independent third party (certification authority), who issues a corresponding assert, bound to the service. In this paper, we propose an architecture, which exploits the assert concept to realise a certification-aware service discovery framework. The architecture supports the discovery of single services based on certified security properties (in additional to the usual functional properties), as well as the dynamic synthesis of service compositions, that satisfy the given security properties. The architecture is extensible, thus allowing for a range of domain specific matchmaking components, to cover dimensions related to, e.g., performance, cost and other non-functional characteristics
- âŠ