2,659 research outputs found

    Social media: a guide for researchers

    Get PDF
    This guide has been produced by the International Centre for Guidance Studies, and aims to provide the information needed to make an informed decision about using social media and select from the vast range of tools that are available. One of the most important things that researchers do is to find, use and disseminate information, and social media offers a range of tools which can facilitate this. The guide discusses the use of social media for research and academic purposes and will not be examining the many other uses that social media is put to across society. Social media can change the way in which you undertake research, and can also open up new forms of communication and dissemination. It has the power to enable researchers to engage in a wide range of dissemination in a highly efficient way.Research Information Networ

    Of course we share! Testing Assumptions about Social Tagging Systems

    Full text link
    Social tagging systems have established themselves as an important part in today's web and have attracted the interest from our research community in a variety of investigations. The overall vision of our community is that simply through interactions with the system, i.e., through tagging and sharing of resources, users would contribute to building useful semantic structures as well as resource indexes using uncontrolled vocabulary not only due to the easy-to-use mechanics. Henceforth, a variety of assumptions about social tagging systems have emerged, yet testing them has been difficult due to the absence of suitable data. In this work we thoroughly investigate three available assumptions - e.g., is a tagging system really social? - by examining live log data gathered from the real-world public social tagging system BibSonomy. Our empirical results indicate that while some of these assumptions hold to a certain extent, other assumptions need to be reflected and viewed in a very critical light. Our observations have implications for the design of future search and other algorithms to better reflect the actual user behavior

    Exploring the Use of Social Bookmarking Technology in Education: An Analysis of Students’ Experiences using a Course-specific Delicious.com Account

    Get PDF
    With more than 4.6 million people, mostly undergraduates, enrolling in at least one online course in fall of 2008, students are showing that they are comfortable with the concept of technology in education. Many students in online classes, however still have to deal with the high cost of textbooks and supplemental materials. Online technologies, however, can provide other alternatives to costly coursepacks and textbooks. Faculty and students may be able to replace or supplement coursepacks and textbooks with social bookmarking sites. This study shows how social bookmarking, specifically Delicious.com, can be used in a course to provide an inexpensive answer to the question of rising course materials costs. Through a series of online focus groups, 53 students enrolled in a “Social Media and Public Relations” course revealed their apprehension toward using an unknown technology and discussed their positive and negative experiences with using the course-specific Delicious.com account. Implications for how social bookmarking can impact online and offline learning are discussed

    Web 2.0 technologies for learning: the current landscape – opportunities, challenges and tensions

    Get PDF
    This is the first report from research commissioned by Becta into Web 2.0 technologies for learning at Key Stages 3 and 4. This report describes findings from an additional literature review of the then current landscape concerning learner use of Web 2.0 technologies and the implications for teachers, schools, local authorities and policy makers

    Cultivating Lifelong Donors: Stewardship and the Fundraising Pyramid

    Get PDF
    This handbook helps nonprofits build long-term giving programs that span the entire supporter lifecycle, from engagement through the end of life. It highlights strategies for engaging new supporters online, investigates the characteristics of loyal donors, examines the importance of developing personal relationships with transitional giving prospects, and discusses donor cultivation

    New Access Structures to Scientific Information : The Case of Science 2.0

    Get PDF
    Since the early 1980s, the scholarly community has been witnessing a considerable increase in the use of information and communication technologies (ICT). Specifically the use the Web has led to qualitative changes in the research community. With the advent of the Web 2.0 a new level of possible functionalities for science has been reached, leading to the concept of Science 2.0. Will the new research technology 2.0 change the way research is done and what aspects are already visible in current structures of scientific communication are questions this paper tries to answer. Several clusters of expectation emerge from the prospect of applying the principles of Web 2.0 to scientific communication, like the opening of science communities towards public and the acceleration of dissemination of scientific research through new communication and collaboration tools. In the first part the authors will comment how the Web 2.0 challenges some traditional and known structures of scientific communication and explore possibilities of applying Web 2.0 principles (collaboration, collective validation, access and generation of information) to scientific work. In the second part the authors will present results gathered through analysis of Web 2.0 services that have been integrated into academic databases and vice versa, the analysis of scientific information spaces that have been created within the Web 2.0

    How Do Tor Users Interact With Onion Services?

    Full text link
    Onion services are anonymous network services that are exposed over the Tor network. In contrast to conventional Internet services, onion services are private, generally not indexed by search engines, and use self-certifying domain names that are long and difficult for humans to read. In this paper, we study how people perceive, understand, and use onion services based on data from 17 semi-structured interviews and an online survey of 517 users. We find that users have an incomplete mental model of onion services, use these services for anonymity and have varying trust in onion services in general. Users also have difficulty discovering and tracking onion sites and authenticating them. Finally, users want technical improvements to onion services and better information on how to use them. Our findings suggest various improvements for the security and usability of Tor onion services, including ways to automatically detect phishing of onion services, more clear security indicators, and ways to manage onion domain names that are difficult to remember.Comment: Appeared in USENIX Security Symposium 201

    Changing Higher Education Learning with Web 2.0 and Open Education Citation, Annotation, and Thematic Coding Appendices

    Get PDF
    Appendices of citations, annotations and themes for research conducted on four websites: Delicious, Wikipedia, YouTube, and Facebook
    corecore