773,404 research outputs found

    A supply side story for a threshold model: Endogenous growth of the free and open source community

    Get PDF
    The study of social institutions producing and disseminating knowledge has mainly concentrated on two main concepts: Science and Technology. This paper examines a recent institutional form that seems not to resemble either of the other two; that is, knowledge-intensive communities, where individuals freely exchange knowledge through information and communication technology. Using free and open source software as an example, we develop a model where this phenomenon is confronted with Technology with respect to its ability to attract researchers.

    Social Media Influencer: Clickbait Dalam Pusaran Etika Jurnalistik

    Get PDF
    Information technology is increasingly developing. Internet networks provoke media convergence. Social media comes as a new mass media that is more interactive and more practical than the conventional one. Everyone can become a journalist in this era. The rapid progress of information technology not only brings efficiency in the process of reproduction of information, but also carries a variety of new risks. ‘Clickbait Journalism’ is one of many risks that is often done by influencers in the social media. How does Journalistic Law and Ethics study look at the phenomenon? Can influencers called as a journalist so they must obey the applicable ethics? Then, how does regulation respond to this phenomenon

    Social Networking and Extending Social Capacity

    Get PDF
    This paper explores the phenomenon of social networking that is changing social structures and communication practices around the globe. It draws parallels with the social structures that emerged in the industrial revolution (such as the social clubs, unions and cooperative societies) and discusses some of the far reaching impacts the current phenomenon is having on society: The paper presents the concepts of Social Capacity representing the number and quality of how many people it is possible to know. The paper argues that social networking technology can change people’s social capacity. This is likely to be an increasingly important research area for the information systems discipline as technology supported social networking activity becomes more ubiquitous

    The Roles of Information and Communication Technology on Rural Development

    Get PDF
    In the present phenomenon of information technology has been able to pass geography borders in different extends and affect on all aspects of the social economic military and education so that the most remote parts of the world injoy the human beings and 21st century named century of information explosion In Iran as well as many developing countries pay attention to study in this field the present written study the status of Information Technology in rural areas based on existing capacities in the region to enterprise facilities and capabilities and use of Management Information Systems in social service

    The multi-layered nature of the internet-based democratization of brand management

    Get PDF
    The evolution of the internet, including developments such as Web 2.0, has led to new relationship realities between organizations and their stakeholders. One manifestation of these complex new realities has been the emergence of an internet-based democratization of brand management. Research about this phenomenon has so far mainly focused on investigating just one or more individual themes and thereby disregarded the inherent multi-layered nature of the internet-based democratization of brand management as a holistic, socio-technological phenomenon. The aim of this paper is to address this limitation through an investigation of the various socio-technological democratization developments of the phenomenon. To achieve this aim, a balanced and stakeholder-oriented perspective on brand management has been adopted to conduct an integrative literature review. The review reveals three key developments, which together form the essential parts of the phenomenon: (I) the democratization of internet technology, (II) the democratization of information, and (III) the democratization of social capital. The insights gained help to clarify the basic structures of the multi-layered phenomenon. The findings contribute also to the substantiation of a call for a new brand management paradigm: one that takes not only company-initiated but also stakeholder-initiated brand management activities into accoun

    Online child sexual exploitation: a new MIS challenge

    Get PDF
    © 2021, Association for Information Systems. All rights reserved. This paper deals with the difficult yet increasingly important MIS phenomenon of online child sexual exploitation (online CSE). Through the use of secondary and publicly available data from the Federal Bureau of Investigation, as well as primary data from a cybercrime police unit in the United Kingdom, this study takes a grounded theory approach and organizes the role that technologies and social actors play in shaping online CSE. The paper contributes to IS theory by providing a consolidated model for online CSE, which we call the technology and imagery dimensions model. This model combines the staging of the phenomenon and the key dimensions that depict how the use of technology and imagery both fuels and defuses the phenomenon. In informing the construction of the model, the paper extracts, organizes, and generalizes the affordances of technology and discusses the role of information systems in detecting online CSE

    The Social Values of Wireless Technology in the Institutional Context

    Get PDF
    Despite growing attention, social values, compared to economic aspects, of information technology (IT) capture substantially less attention in the mainstream IT literature. In the context of mobile technology, social values might be as critical to help justify technology investment as the predominant economics perspective in the existing IT literature. As wireless networks and relevant mobile technologies continue to penetrate the global society and business world, an emerging social phenomenon rapidly reshapes how organizations interact with the technology and reposition themselves in their specific institutional context where organizations often develop networked alliance to compete against one another. This study thus seeks to shed light on how organizations make sense of the social aspects of wireless network implementation. Preliminary understanding derived from two higher education organizations’ experiences is summarized. Implications for future research endeavor are suggested

    A supply side story for a threshold model: Endogenous growth of the free and open source community

    Get PDF
    The study of social institutions producing and disseminating knowledge has mainly concentrated on two main concepts: Science and Technology. This paper examines a recent institutional form that seems not to resemble either of the other two; that is, knowledge-intensive communities, where individuals freely exchange knowledge through information and communication technology. Using free and open source software as an example, we develop a model where this phenomenon is confronted with Technology with respect to its ability to attract researchers

    Social Engineering SWOT Analysis in Government-Owned Commercial Banks and National Private Commercial Banks

    Get PDF
    This research examines the phenomenon of social engineering at government-owned commercial banks and national private commercial banks. The research method used is descriptive qualitative with a literature study. The research results show the bank's strengths, weaknesses, opportunities, and threats. In addition, several strategies are recommended for banks to prevent social engineering attacks, namely building information technology in banking according to the standards and regulations of the Financial Service Authority (Otoritas Jasa Keuangan), utilizing social media as an educational tool, training employees, monitoring and optimizing data security and banking information technology networks, suppressing the circulation of social issues on behalf of banks that can trigger social engineering, increasing financial literacy and awareness of data security personal customers and employees. To prevent social engineering attacks, banks can implement strategies that are considered adequate
    • 

    corecore