89,448 research outputs found
Peer Influence in Network Markets: An Empirical Investigation
We analyze the effect of peer influence on the diffusion of an innovative network good. We argue that the adopters of a network good have an incentive to convince others to purchase the same product because their utility depends on the number of other users. This peer-effect influences individuals’ adoption decisions alongside the more familiar installed-base-effect, based on the individual’s own insight that a larger number of installed units increases his/her benefit of adopting. We test empirically which effect dominates with Instant Messaging, an innovative network good. We arrive at surprising results with far-reaching implications for research and management. The diffusion of Instant Messaging was to a large extent driven by the peer-effect, but the installed-base-effect seemed to play no role. We perform our estimation with a discrete time hazard rate model that controls for unobserved heterogeneity.Hazard Rate Model;Innovation Diffusion;Instant Messaging;Network Markets;Peer Influence
Server Component of a Web Application for Instant Messaging with AJAX
Tato práce se zabývá vytvořením serverové části webové aplikace pro instant messaging. V teoretické části jsou popsány běžné služby pro instant messaging a obvyklé webové technologie tvorby webových aplikací. V praktické části je navržena architektura aplikace, popsána její implementace a propojení jednotlivých částí skrze API. Závěrem práce je zhodnocení výsledné aplikace.The subject of this thesis is to create a server component to an instant messaging web application. The theoretical part of the thesis describes common instant messaging services and technologies used for building web applications. The practical part of the thesis focuses on the design of the application architecture, the implementation and the connections between the components of the application via the API. The conclusion of the thesis covers evaluation of the application.
How Americans Use Instant Messaging
Presents findings from a survey conducted in February and March 2004. Looks at the frequency of instant message use compared with email, and the growth of its use in the U.S. workplace
Synchronicity, Instant Messaging and Performance among Financial Traders
Successful animal systems often manage risk through synchronous behavior that
spontaneously arises without leadership. In critical human systems facing risk,
such as financial markets or military operations, our understanding of the
benefits associated to synchronicity is nascent but promising. Building on
previous work illuminating commonalities between ecological and human systems,
we compare the activity patterns of individual financial traders with the
simultaneous activity of other traders---an individual and spontaneous
characteristic we call synchronous trading. Additionally, we examine the
association of synchronous trading with individual performance and
communication patterns. Analyzing empirical data on day traders'
second-to-second trading and instant messaging, we find that the higher the
traders' synchronous trading, the less likely they lose money at the end of the
day. We also find that the daily instant messaging patterns of traders are
closely associated with their level of synchronous trading. This suggests that
synchronicity and vanguard technology may help cope with risky decisions in
complex systems and furnish new prospects for achieving collective and
individual goals
Investigating America online instant messaging application: data remnants on windows 8.1 client machine
Instant messaging applications (apps) are one potential source of evidence in a criminal investigation or a civil litigation. To ensure the most effective collection of evidence, it is vital for forensic practitioners to possess up-to-date knowledge about artifacts of forensic interest from various instant messaging apps. Hence, in this chapter we study America Online Instant Messenger (version 7.14.5.8) with the aims of contributing to an in-depth understanding of the types of terrestrial artifacts that are likely to remain after the use of instant messaging services and apps on Windows 8.1 devices. Potential artifacts identified during the research include data relating to the installation or uninstallation, log-in and log-off information, contact lists, conversations, and transferred files
Instant Message Transfer between Two Smart Phones Using Wi-Fi
Instant messaging has been widely used with the power of internet; people can use a message& talk to family, friends and co-workers. In the company, colleagues can send and reply instant message in real time without face to face; meanwhile the work report can be shared during the instant chat session. People can message to multiple people in the virtual share ideas and get conclusions. What's more, the staff can talk to customers or vendors online as well, in other word, now people can do business through the instant messenger direct rather than use the traditional method like make phone calls. The use of instant messaging nowadays is more than the calling function itself. The main objective of this paper is to introduce a methodology to provide instant Messaging Service over the android based smart phone users connected over via Wi-Fi. The proposed method is based on sending/receiving messages via Wi-Fi connection with the support of client –server programming without taking any service from mobile service provider and without the use of internet connection
IMPLEMENTASI ALGORITMA KRIPTOGRAFI RSA-CRT PADA APLIKASI INSTANT MESSAGING
Kemajuan teknologi komputer dan telekomunikasi membantu dalam menyelesaikan
banyak pekerjaan dengan cepat, akurat, dan efisien. Salah satu kemajuan teknologi
komunikasi yaitu menghasilkan aplikasi instant messaging, namun seiring dengan
kemajuan teknologi dengan semakin banyaknya pengguna yang menggunakan aplikasi
instant messaging terdapat dampak negatif berupa penyadapan data khususnya saat terjadi
komunikasi yang bersifat rahasia dan penting. Untuk menjaga kerahasiaan, integritas data,
otentikasi entitas, dan otentikasi asal data diterapkan kriptografi. Salah satu algoritma
kriptografi yang tidak membutuhkan saluran yang aman untuk distribusi kunci adalah
algoritma RSA. Algoritma RSA dapat dimodifikasi dengan algoritma CRT (Chinese
Remainder Theorem) untuk mempercepat proses dekripsi dan disebut dengan algoritma
RSA-CRT. Penelitian ini mengimplementasikan algoritma kriptografi RSA-CRT pada
aplikasi instant messaging. Metode untuk mempercepat proses pemangkatan menggunakan
algoritma fast modular exponentiation. Penelitian ini menggunakan model proses waterfall
yang diimplementasikan dengan menggunakan bahasa pemrograman vb.net dan bersifat
client-server. Berdasarkan hasil pengujian dapat diimplentasikan algoritma RSA-CRT
pada aplikasi instant messaging serta pengujian untuk bit n mulai dari 56 bit sampai 88 bit
dapat disimpulkan proses dekripsi RSA-CRT dua kali lebih cepat dibandingkan proses
dekripsi RSA
- …
