5,589 research outputs found

    Academic Performance and Behavioral Patterns

    Get PDF
    Identifying the factors that influence academic performance is an essential part of educational research. Previous studies have documented the importance of personality traits, class attendance, and social network structure. Because most of these analyses were based on a single behavioral aspect and/or small sample sizes, there is currently no quantification of the interplay of these factors. Here, we study the academic performance among a cohort of 538 undergraduate students forming a single, densely connected social network. Our work is based on data collected using smartphones, which the students used as their primary phones for two years. The availability of multi-channel data from a single population allows us to directly compare the explanatory power of individual and social characteristics. We find that the most informative indicators of performance are based on social ties and that network indicators result in better model performance than individual characteristics (including both personality and class attendance). We confirm earlier findings that class attendance is the most important predictor among individual characteristics. Finally, our results suggest the presence of strong homophily and/or peer effects among university students

    INVESTIGATION OF THE NETWORK CONSTRUCTION BEHAVIOR ON SOCIAL NETWORKING SITES

    Get PDF
    By enabling connections between individuals, Social Networking Sites, such as Facebook, promise to create significant individual as well as social value. Encouraging connections between users is also crucial for service providers who increasingly rely on social advertising and viral marketing campaigns as important sources of their revenue. Consequently, understanding user’s network construction behavior becomes critical. However, previous studies offer only few scattered insights into this research question. In order to fill this gap, we employ Grounded Theory methodology to derive a comprehensive model of network construction behavior on social networking sites. In the following step we assess two Structural Equation Models to gain refined insights into the motivation to send and accept friendship requests – two network expansion strategies. Based on our findings, we offer recommendations for social network providers

    DISAGGREGATED EFFECTS OF COMPUTER MEDIATED COMMUNICATION USAGE PATTERNS ON SOCIAL NETWORKS

    Get PDF
    Various studies have reported that computer-mediated communication (CMC) increases, decreases and has no effect on social capital. These conflicting outcomes of CMC on social ties resulted in a rich debate. However, the core question remains unanswered - how does usage of CMC disrupt relationships and make individuals isolated but at the same time function as a channel for creating new and enduring social ties within and across the populations? We measure CMC usage for learning activities, leisure and socializing communications, and entertainment purpose. We find that those who use CMC more for entertainment have less developed social networks irrespective of the contexts we studied. Those who use CMC for leisure and socializing communication have well developed broader social networks and close friendships networks but less developed work networks. Finally, those who use CMC more for learning activities are more central in work networks but less central in broader social networks and close friendship networks

    Online Safety Nets: How Perceived Isolation Motivates Network Closure.

    Full text link
    The feeling of being alone – and drive to vanquish that feeling – represents a common interest among theorists in communication, psychology, and sociology. Despite extensive literatures on isolation, exclusion, rejection, and loneliness, less is known about how these feelings reverberate through personal networks. Concurrently, the ascent of mobile and social technologies has generated a range of communicative possibilities that complicate our understanding of how people respond to moments of social isolation. Indeed, evolving network theories suggest that these media affordances have the potential to steer communication toward certain people and away from others. In this dissertation, I attempt to interlace this dual theoretical backdrop, integrating classic theories on the experience of social isolation with recent theories on the social implications of online affordances. I argue that perceived isolation is likely to drive people toward network closure, or what Kadushin (2012) refers to as “network safety”. I also argue that this thrust is more likely to occur in online networks that are defined by availability and awareness, such as Facebook. In order to substantiate these claims, this dissertation encompasses studies measuring online network outcomes in combination with three different versions of perceived isolation: induced exclusion (Study 1), exclusion reactivity (Study 2), and rejection sensitivity (Study 3). Altogether, the combined results indicate that feelings of isolation can shift social attention and preference toward trusted ties and core circles. Over time, these patterns suggest that people who experience more frequent and intense feelings of isolation may choose to fortify close relationships and closed communities, rather than embrace weak ties and open networks. To conclude, I contextualize the findings within other models of perceived isolation, and propose an extra component for the observed network dynamics. Expanding on this phenomenon, I theorize how certain cognitive states may operate as network switches, changing personal network motivations in a dynamic manner. With the emergence of increased availability and awareness, individuals have increased capacity to choose, and thus shift, their personal network patterns during daily life. Consequently, I call for new research on the cognitive mechanisms that underlie social network motivations, perceptions, and choices.PhDCommunication StudiesUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttp://deepblue.lib.umich.edu/bitstream/2027.42/133276/1/joebayer_1.pd

    Time as a limited resource: Communication Strategy in Mobile Phone Networks

    Full text link
    We used a large database of 9 billion calls from 20 million mobile users to examine the relationships between aggregated time spent on the phone, personal network size, tie strength and the way in which users distributed their limited time across their network (disparity). Compared to those with smaller networks, those with large networks did not devote proportionally more time to communication and had on average weaker ties (as measured by time spent communicating). Further, there were not substantially different levels of disparity between individuals, in that mobile users tend to distribute their time very unevenly across their network, with a large proportion of calls going to a small number of individuals. Together, these results suggest that there are time constraints which limit tie strength in large personal networks, and that even high levels of mobile communication do not fundamentally alter the disparity of time allocation across networks.Comment: 10 pages, 3 figures. Accepted for publication in Social Network

    The role of reciprocation in social network formation, with an application to blogging

    Get PDF
    This paper deals with the role of reciprocation in the formation of individuals' social networks, that is to what extent initiating a relation brings about its reciprocation. Following the activity of a panel of bloggers over more than a year, we seek to establish whether bloggers are mainly involved in social networking or are part of the media industry. We adapt a standard capital investment model to study the effect of reciprocation on the building of social capital. Results of our analysis confirm that activity and reciprocation both play a role in the dynamics of social media.Bloggers, Friendship, LiveJournal, Media, Panel Data, Reciprocation, Reci procity, Social Capital, Social Networks

    Three Essays on Individuals’ Vulnerability to Security Attacks in Online Social Networks: Factors and Behaviors

    Get PDF
    With increasing reliance on the Internet, the use of online social networks (OSNs) for communication has grown rapidly. OSN platforms are used to share information and communicate with friends and family. However, these platforms can pose serious security threats to users. In spite of the extent of such security threats and resulting damages, little is known about factors associated with individuals’ vulnerability to online security attacks. We address this gap in the following three essays. Essay 1 draws on a synthesis of the epidemic theory in infectious disease epidemiology with the social capital theory to conceptualize factors that contribute to an individual’s role in security threat propagation in OSN. To test the model, we collected data and created a network of hacked individuals over three months from Twitter. The final hacked network consists of over 8000 individual users. Using this data set, we derived individual’s factors measuring threat propagation efficacy and threat vulnerability. The dependent variables were defined based on the concept of epidemic theory in disease propagation. The independent variables are measured based on the social capital theory. We use the regression method for data analysis. The results of this study uncover factors that have significant impact on threat propagation efficacy and threat vulnerability. We discuss the novel theoretical and managerial contributions of this work. Essay 2 explores the role of individuals’ interests in their threat vulnerability in OSNs. In OSNs, individuals follow social pages and post contents that can easily reveal their topics of interest. Prior studies show high exposure of individuals to topics of interest can decrease individuals’ ability to evaluate the risks associated with their interests. This gives attackers a chance to target people based on what they are interested in. However, interest-based vulnerability is not just a risk factor for individuals themselves. Research has reported that similar interests lead to friendship and individuals share similar interests with their friends. This similarity can increase trust among friends and makes individuals more vulnerable to security threat coming from their friends’ behaviors. Despite the potential importance of interest in the propagation of online security attacks online, the literature on this topic is scarce. To address this gap, we capture individuals’ interests in OSN and identify the association between individuals’ interests and their vulnerability to online security threats. The theoretical foundation of this work is a synthesis of dual-system theory and the theory of homophily. Communities of interest in OSN were detected using a known algorithm. We test our model using the data set and social network of hacked individuals from Essay 1. We used this network to collect additional data about individuals’ interests in OSN. The results determine communities of interests which were associated with individuals’ online threat vulnerability. Moreover, our findings reveal that similarities of interest among individuals and their friends play a role in individuals’ threat vulnerability in OSN. We discuss the novel theoretical and empirical contributions of this work. Essay 3 examines the role addiction to OSNs plays in individuals’ security perceptions and behaviors. Despite the prevalence of problematic use of OSNs and the possibility of addiction to these platforms, little is known about the functionalities of brain systems of users who suffer from OSN addiction and their online security perception and behaviors. In addressing these gaps, we have developed the Online addiction & security behaviors (OASB) theory by synthesizing dual-system theory and extended protection motivation theory (PMT). We collected data through an online survey. The results indicate that OSN addiction is rooted in the individual’s brain systems. For the OSN addicted, there is a strong cognitive-emotional preoccupation with using OSN. Our findings also reveal the positive and significant impact of OSN addiction on perceived susceptibility to and severity of online security threats. Moreover, our results show the negative association between OSN addiction and perceived self-efficacy. We discuss the theoretical and practical implications of this work

    Similarities and differences in self-disclosure and friendship development between fact-to-face communication and Facebook

    Get PDF
    This research identified the patterns of self-disclosure between face-to-face and Facebook friends’ interactions. A survey of 317 participants was conducted to compare the hypothesized relationships among social attraction, self-disclosure, predictability and trust in three types of relationships: recently added Facebook friend, exclusive Facebook friend, and an exclusive face-to-face friend. Data was analyzed using structural equation modeling (SEM), multivariate analysis of variance (MANOVA), t-tests and correlations. Results indicated that individuals reporting high levels of social attraction also reported having greater self-disclosure with their latest added Facebook friend, exclusive Facebook friend and an exclusive face-to-face friend. This supports a theorem of Uncertainty Reduction Theory that states that persons disclose intimate information to individuals they like and withhold intimate information from persons whom they do not like. These individuals also reported greater predictability of their Facebook and face-to-face friends’ behavior, which supports axiom of Uncertainty Reduction Theory that as the amount of verbal communication between strangers increases, the level of uncertainty for each interactant in the relationship will decrease. The more friends talked to each other, the less uncertainty they experienced. Additional evidence that the relationship development across different friendship types (latest added Facebook friend, exclusive Facebook friend and exclusive face-to-face friend) is similar was the statistically significant relationship between the variables of self-disclosure and trust. This supports the tenets of Social Penetration Theory and previous studies that found self-disclosure to be important for the facilitation of developing mutual trust. The results of this study showed that the process of relationship development, in terms of the relationship between social attraction, self-disclosure, predictability and trust, were similar in both Facebook and face-to-face relationships. However, significant differences existed in the amount of self-disclosure and trust between Facebook friends and face-to-face friends. Although the average duration of both exclusive face-to-face friendships and exclusive Facebook friendships was six years, participants reported more self-disclosure, more predictability and trust in their face-to-face friends than with their Facebook friends. The findings about offline friendships involving more breadth and depth than online friendships seem to support “cues-filtered-out” approach
    • 

    corecore