773,404 research outputs found
A supply side story for a threshold model: Endogenous growth of the free and open source community
The study of social institutions producing and disseminating knowledge has mainly concentrated on two main concepts: Science and Technology. This paper examines a recent institutional form that seems not to resemble either of the other two; that is, knowledge-intensive communities, where individuals freely exchange knowledge through information and communication technology. Using free and open source software as an example, we develop a model where this phenomenon is confronted with Technology with respect to its ability to attract researchers.
Social Media Influencer: Clickbait Dalam Pusaran Etika Jurnalistik
Information technology is increasingly developing. Internet networks provoke media convergence. Social media comes as a new mass media that is more interactive and more practical than the conventional one. Everyone can become a journalist in this era. The rapid progress of information technology not only brings efficiency in the process of reproduction of information, but also carries a variety of new risks. âClickbait Journalismâ is one of many risks that is often done by influencers in the social media. How does Journalistic Law and Ethics study look at the phenomenon? Can influencers called as a journalist so they must obey the applicable ethics? Then, how does regulation respond to this phenomenon
Social Networking and Extending Social Capacity
This paper explores the phenomenon of social networking that is changing social structures and communication practices around the globe. It draws parallels with the social structures that emerged in the industrial revolution (such as the social clubs, unions and cooperative societies) and discusses some of the far reaching impacts the current phenomenon is having on society: The paper presents the concepts of Social Capacity representing the number and quality of how many people it is possible to know. The paper argues that social networking technology can change peopleâs social capacity. This is likely to be an increasingly important research area for the information systems discipline as technology supported social networking activity becomes more ubiquitous
The Roles of Information and Communication Technology on Rural Development
In the present phenomenon of information technology has been able to pass geography borders in different extends and affect on all aspects of the social economic military and education so that the most remote parts of the world injoy the human beings and 21st century named century of information explosion In Iran as well as many developing countries pay attention to study in this field the present written study the status of Information Technology in rural areas based on existing capacities in the region to enterprise facilities and capabilities and use of Management Information Systems in social service
The multi-layered nature of the internet-based democratization of brand management
The evolution of the internet, including developments such as Web 2.0, has led to new relationship realities between organizations and their stakeholders. One manifestation of these complex new realities has been the emergence of an internet-based democratization of brand management. Research about this phenomenon has so far mainly focused on investigating just one or more individual themes and thereby disregarded the inherent multi-layered nature of the internet-based democratization of brand management as a holistic, socio-technological phenomenon. The aim of this paper is to address this limitation through an investigation of the various socio-technological democratization developments of the phenomenon. To achieve this aim, a balanced and stakeholder-oriented perspective on brand management has been adopted to conduct an integrative literature review. The review reveals three key developments, which together form the essential parts of the phenomenon: (I) the democratization of internet technology, (II) the democratization of information, and (III) the democratization of social capital. The insights gained help to clarify the basic structures of the multi-layered phenomenon. The findings contribute also to the substantiation of a call for a new brand management paradigm: one that takes not only company-initiated but also stakeholder-initiated brand management activities into accoun
Online child sexual exploitation: a new MIS challenge
© 2021, Association for Information Systems. All rights reserved. This paper deals with the difficult yet increasingly important MIS phenomenon of online child sexual exploitation (online CSE). Through the use of secondary and publicly available data from the Federal Bureau of Investigation, as well as primary data from a cybercrime police unit in the United Kingdom, this study takes a grounded theory approach and organizes the role that technologies and social actors play in shaping online CSE. The paper contributes to IS theory by providing a consolidated model for online CSE, which we call the technology and imagery dimensions model. This model combines the staging of the phenomenon and the key dimensions that depict how the use of technology and imagery both fuels and defuses the phenomenon. In informing the construction of the model, the paper extracts, organizes, and generalizes the affordances of technology and discusses the role of information systems in detecting online CSE
The Social Values of Wireless Technology in the Institutional Context
Despite growing attention, social values, compared to economic aspects, of information technology (IT) capture substantially less attention in the mainstream IT literature. In the context of mobile technology, social values might be as critical to help justify technology investment as the predominant economics perspective in the existing IT literature. As wireless networks and relevant mobile technologies continue to penetrate the global society and business world, an emerging social phenomenon rapidly reshapes how organizations interact with the technology and reposition themselves in their specific institutional context where organizations often develop networked alliance to compete against one another. This study thus seeks to shed light on how organizations make sense of the social aspects of wireless network implementation. Preliminary understanding derived from two higher education organizationsâ experiences is summarized. Implications for future research endeavor are suggested
A supply side story for a threshold model: Endogenous growth of the free and open source community
The study of social institutions producing and disseminating knowledge has mainly concentrated
on two main concepts: Science and Technology. This paper examines a recent institutional form
that seems not to resemble either of the other two; that is, knowledge-intensive communities,
where individuals freely exchange knowledge through information and communication
technology. Using free and open source software as an example, we develop a model where this
phenomenon is confronted with Technology with respect to its ability to attract researchers
Recommended from our members
Information Overload: An Overview
For almost as long as there has been recorded information, there has been a perception that humanity has been overloaded by it. Concerns about 'too much to read' have been expressed for many centuries, and made more urgent since the arrival of ubiquitous digital information in the late twentieth century. The historical perspective is a necessary corrective to the often, and wrongly, held view that it is associated solely with the modern digital information environment, and with social media in particular. However, as society fully experiences Floridi's Fourth Revolution, and moves into hyper-history (with society dependent on, and defined by, information and communication technologies) and the infosphere (a information environment distinguished by a seamless blend of online and offline information actvity), individuals and societies are dependent on, and formed by, information in an unprecedented way, information overload needs to be taken more seriously than ever. Overload has been claimed to be both the major issue of our time, and a complete non-issue. It has been cited as an important factor in, inter alia, science, medicine, education, politics, governance, business and marketing, planning for smart cities, access to news, personal data tracking, home life, use of social media, and online shopping, and has even influenced literature The information overload phenomenon has been known by many different names, including: information overabundance, infobesity, infoglut, data smog, information pollution, information fatigue, social media fatigue, social media overload, information anxiety, library anxiety, infostress, infoxication, reading overload, communication overload, cognitive overload, information violence, and information assault. There is no single generally accepted definition, but it can best be understood as that situation which arises when there is so much relevant and potentially useful information available that it becomes a hindrance rather than a help. Its essential nature has not changed with changing technology, though its causes and proposed solutions have changed much. The best ways of avoiding overload, individually and socially, appear to lie in a variety of coping strategies, such as filtering, withdrawing, queuing, and 'satisficing'. Better design of information systems, effective personal information management, and the promotion of digital and media literacies, also have a part to play. Overload may perhaps best be overcome by seeking a mindful balance in consuming information, and in finding understanding
Social Engineering SWOT Analysis in Government-Owned Commercial Banks and National Private Commercial Banks
This research examines the phenomenon of social engineering at government-owned commercial banks and national private commercial banks. The research method used is descriptive qualitative with a literature study. The research results show the bank's strengths, weaknesses, opportunities, and threats. In addition, several strategies are recommended for banks to prevent social engineering attacks, namely building information technology in banking according to the standards and regulations of the Financial Service Authority (Otoritas Jasa Keuangan), utilizing social media as an educational tool, training employees, monitoring and optimizing data security and banking information technology networks, suppressing the circulation of social issues on behalf of banks that can trigger social engineering, increasing financial literacy and awareness of data security personal customers and employees. To prevent social engineering attacks, banks can implement strategies that are considered adequate
- âŠ