47,873 research outputs found
Communication, collaboration and identity: factor analysis of academicsâ perceptions of online networking
Since the advent of online social networking sites, much has been written about their potential for transforming academia, as communication and collaboration underpin many scholarly activities. However, the extent to which these benefits are being realised in practice is unclear. As the uptake of tools by academics continues to grow, there is a question as to whether differences exist in their use and if any patterns or underlying factors are at play. This article presents the results of an online survey addressing this gap. A disciplinary divide was evident in terms of preferred academic social networking platforms, while perceptions about how academics use online networking for different purposes are linked to job position. Exploratory factor analysis identified four components representing different strategies used by academics in their approaches to online networking, including maintaining a personal learning network, promoting the professional self, seeking and promoting publications, and advancing careers
Social Ranking Techniques for the Web
The proliferation of social media has the potential for changing the
structure and organization of the web. In the past, scientists have looked at
the web as a large connected component to understand how the topology of
hyperlinks correlates with the quality of information contained in the page and
they proposed techniques to rank information contained in web pages. We argue
that information from web pages and network data on social relationships can be
combined to create a personalized and socially connected web. In this paper, we
look at the web as a composition of two networks, one consisting of information
in web pages and the other of personal data shared on social media web sites.
Together, they allow us to analyze how social media tunnels the flow of
information from person to person and how to use the structure of the social
network to rank, deliver, and organize information specifically for each
individual user. We validate our social ranking concepts through a ranking
experiment conducted on web pages that users shared on Google Buzz and Twitter.Comment: 7 pages, ASONAM 201
Applications of Temporal Graph Metrics to Real-World Networks
Real world networks exhibit rich temporal information: friends are added and
removed over time in online social networks; the seasons dictate the
predator-prey relationship in food webs; and the propagation of a virus depends
on the network of human contacts throughout the day. Recent studies have
demonstrated that static network analysis is perhaps unsuitable in the study of
real world network since static paths ignore time order, which, in turn,
results in static shortest paths overestimating available links and
underestimating their true corresponding lengths. Temporal extensions to
centrality and efficiency metrics based on temporal shortest paths have also
been proposed. Firstly, we analyse the roles of key individuals of a corporate
network ranked according to temporal centrality within the context of a
bankruptcy scandal; secondly, we present how such temporal metrics can be used
to study the robustness of temporal networks in presence of random errors and
intelligent attacks; thirdly, we study containment schemes for mobile phone
malware which can spread via short range radio, similar to biological viruses;
finally, we study how the temporal network structure of human interactions can
be exploited to effectively immunise human populations. Through these
applications we demonstrate that temporal metrics provide a more accurate and
effective analysis of real-world networks compared to their static
counterparts.Comment: 25 page
Three applications for mobile epidemic algorithms
This paper presents a framework for the pervasive sharing of data using wireless networks. 'FarCry' uses the mobility of users to carry files between separated networks. Through a mix of ad-hoc and infrastructure-based wireless networking, files are transferred between users without their direct involvement. As users move to different locations, files are then transmitted on to other users, spreading and sharing information. We examine three applications of this framework. Each of these exploits the physically proximate nature of social gatherings. As people group together in, for example, business meetings and cafés, this can be taken as an indication of similar interests, e.g. in the same presentation or in a type of music. MediaNet affords sharing of media files between strangers or friends, MeetingNet shares business documents in meetings, and NewsNet shares RSS feeds between mobile users. NewsNet also develops the use of pre-emptive caching: collecting information from others not for oneself, but for the predicted later sharing with others. We offer observations on developing this system for a mobile, multi-user, multi-device environment
A Faster Method to Estimate Closeness Centrality Ranking
Closeness centrality is one way of measuring how central a node is in the
given network. The closeness centrality measure assigns a centrality value to
each node based on its accessibility to the whole network. In real life
applications, we are mainly interested in ranking nodes based on their
centrality values. The classical method to compute the rank of a node first
computes the closeness centrality of all nodes and then compares them to get
its rank. Its time complexity is , where represents total
number of nodes, and represents total number of edges in the network. In
the present work, we propose a heuristic method to fast estimate the closeness
rank of a node in time complexity, where . We
also propose an extended improved method using uniform sampling technique. This
method better estimates the rank and it has the time complexity , where . This is an excellent improvement over the
classical centrality ranking method. The efficiency of the proposed methods is
verified on real world scale-free social networks using absolute and weighted
error functions
Recommended from our members
Rethinking privacy in social networks: A case study of beacon
Popular online social network sites (SNS) such as Facebook and Bebo are technological platforms that are posing questions about personal privacy. This paper contributes to our understanding of the nature and form of online privacy by critically analysing the issues surrounding the failed launch of Facebookâs advertising tool Beacon. Beacon is an interesting case study because it highlighted the complexity of information ownership in an online social network. Qualitative data was gathered from 29 weblogs (blogs) representing user opinions published between 6th November 2007(when Beacon was launched) and 28th February 2008 (when commentary had dwindled). A thematic analysis of the blogs suggest that concerns such as commercialism, terms of service (TOS), lack of user control, lack of user awareness and data protection are factors that influence user perceptions of information ownership as a subset of online privacy
Recommended from our members
Mapping networks of influence: tracking Twitter conversations through time and space
The increasing use of social media around global news events, such as the London Olympics in 2012, raises questions for international broadcasters about how to engage with users via social media in order to best achieve their individual missions. Twitter is a highly diverse social network whose conversations are multi-directional involving individual users, political and cultural actors, athletes and a range of media professionals. In so doing, users form networks of influence via their interactions affecting the ways that information is shared about specific global events.
This article attempts to understand how networks of influence are formed among Twitter users, and the relative influence of global news media organisations and information providers in the Twittersphere during such global news events. We build an analysis around a set of tweets collected during the 2012 London Olympics. To understand how different users influence the conversations across Twitter, we compare three types of accounts: those belonging to a number of well-known athletes, those belonging to some well-known commentators employed by the BBC, and a number of corporate accounts belonging to the BBC World Service and the official London Twitter account. We look at the data from two perspectives. First, to understand the structure of the social groupings formed among Twitter users, we use a network analysis to model social groupings in the Twittersphere across time and space. Second, to assess the influence of individual tweets, we investigate the ageing factor of tweets, which measures how long users continue to interact with a particular tweet after it is originally posted.
We consider what the profile of particular tweets from corporate and athletesâ accounts can tell us about how networks of influence are forged and maintained. We use these analyses to answer the questions: How do different types of accounts help shape the social networks? and, What determines the level and type of influence of a particular account
- âŠ