111,785 research outputs found

    Implications of social media use on instruction and student learning: An exploratory study

    Get PDF
    Despite being a norm in contemporary organizations including in academia, there is limited understanding how multimedia technology use might impact learning. We have also seen a rise in the use of social media applications such as Facebook, tweeter, Instagram, skype, flickr, and blogging among students, but it is unclear the extent to which the academe embraces these applications. In this study, we examine the potential role of multimedia technology and social media use in the learning process. We explore the potential implications for instruction and on student learning of the marriage between multimedia technology and social media use. Focusing on the content delivery component of instruction, we explore potential relationship between the rich multimedia content in Multimedia Information Networks (MINets)-- the structured media collections such as documents, images and videos that are linked by nodes, and the ongoing developments in social media to the learning process. We propose a framework that links instructor to students through social media-- supposing that learning impacts of social media depend upon the interface of the content, particular medium adopted, instructor and student demographics including learning style, teaching style and instructor skills. That is, social media becomes a channel through which learning occurs. Classifying multimedia technology as tools and social media as interactive Web 2.0 Internet-based applications, we employ case studies in developing the framework and we follow up with a discussion of potential implications of social media applications in academia

    An evaluation of social learning networks: a qualitative perspective

    Get PDF
    Affordances offered through ubiquitous nature of Web 2.0 technologies and social media have progressively become universal constituents of our lives. Presently our students have seen the escalation in use of multimedia in their studies. With technological advances in telecommunication technologies, students have become accustomed to instant, global communications modes. Educational institutions have progressively adapted more innovative pedagogical approaches in their provision. Web 2.0 has fundamentally altered communication methods between people around the world. Access to information, dissemination, sharing and creation of new digitised content are powerful tools that ease social media adaptation in everyone’s life. Over the last decade multimedia authoring tools have become more useful for content generation. The price and expertise to use these authoring tools has decreased, therefore offering opportunity for educators to broaden their experimental horizons with these technologies. With the advent of Web 2.0, access to information, dissemination, sharing and creation of new digitised content are powerful tools that ease social media adaptation in student’s life. Universities have reported reforms in the use of Education 2.0, while Web 2.0 is finding its momentums in further education and schools. Since the advent of Web 2.0 many educational institutions have reported remarkable positive influences in students learning behaviours. Research studies have illustrated association between students improved communication and collaboration linked to improved motivation hence more on going academic performance. Social learning networks represent a more diverse mechanism than a content delivery platform. The potential to release both students and instructors creative talents, ease of content creation and collaboratively sharing teaching and learning resources has enabled educational institutions to explore the strategic benefits of social learning networks. Recent studies indicate that these digital elements when aligned with the best practices of multimedia design become powerful learning agents. This study is aimed at highlighting the importance of social learning networks in education from a qualitative perspective. A series of recent studies at higher and further education has provided guidelines for the improved use of social media in e-learning. This paper’s findings will introduce qualitative verdicts for a framework adaptation of social learning networks in e-learning

    Preserving Trustworthiness and Confidentiality for Online Multimedia

    Get PDF
    Technology advancements in areas of mobile computing, social networks, and cloud computing have rapidly changed the way we communicate and interact. The wide adoption of media-oriented mobile devices such as smartphones and tablets enables people to capture information in various media formats, and offers them a rich platform for media consumption. The proliferation of online services and social networks makes it possible to store personal multimedia collection online and share them with family and friends anytime anywhere. Considering the increasing impact of digital multimedia and the trend of cloud computing, this dissertation explores the problem of how to evaluate trustworthiness and preserve confidentiality of online multimedia data. The dissertation consists of two parts. The first part examines the problem of evaluating trustworthiness of multimedia data distributed online. Given the digital nature of multimedia data, editing and tampering of the multimedia content becomes very easy. Therefore, it is important to analyze and reveal the processing history of a multimedia document in order to evaluate its trustworthiness. We propose a new forensic technique called ``Forensic Hash", which draws synergy between two related research areas of image hashing and non-reference multimedia forensics. A forensic hash is a compact signature capturing important information from the original multimedia document to assist forensic analysis and reveal processing history of a multimedia document under question. Our proposed technique is shown to have the advantage of being compact and offering efficient and accurate analysis to forensic questions that cannot be easily answered by convention forensic techniques. The answers that we obtain from the forensic hash provide valuable information on the trustworthiness of online multimedia data. The second part of this dissertation addresses the confidentiality issue of multimedia data stored with online services. The emerging cloud computing paradigm makes it attractive to store private multimedia data online for easy access and sharing. However, the potential of cloud services cannot be fully reached unless the issue of how to preserve confidentiality of sensitive data stored in the cloud is addressed. In this dissertation, we explore techniques that enable confidentiality-preserving search of encrypted multimedia, which can play a critical role in secure online multimedia services. Techniques from image processing, information retrieval, and cryptography are jointly and strategically applied to allow efficient rank-ordered search over encrypted multimedia database and at the same time preserve data confidentiality against malicious intruders and service providers. We demonstrate high efficiency and accuracy of the proposed techniques and provide a quantitative comparative study with conventional techniques based on heavy-weight cryptography primitives

    Behavior Modeling and Forensics for Multimedia Social Networks

    Get PDF
    Within the past decades, the explosive combination of multimedia signal processing, communications and networking technologies has facilitated the sharing of digital multimedia data and enabled pervasive digital media distribution over all kinds of networks. People involved in the sharing and distribution of multimedia contents form \emph{multimedia social networks} in which users share and exchange multimedia content, as well as other resources. Users in a multimedia social network have different objectives and influence each other's decision and performance. It is of ample importance to understand how users interact with and respond to each other and analyze the impact of human factors on multimedia systems. This thesis illustrates various aspects of issues and problems in multimedia social networks via two case studies of human behavior in multimedia fingerprinting and peer-to-peer live streaming. Since media security and content protection is a major issue in current multimedia systems, this thesis first studies the user dynamics of multimedia fingerprinting social networks. We investigate the side information which improves the traitor-tracing performance and provide the optimal strategies for both users (fingerprint detector and the colluders) in the multimedia fingerprinting social network. Furthermore, before a collusion being successfully mounted, the colluders must be stimulated to cooperate with each other and all colluders have to agree on the attack strategy. Therefore, not all types of collusion are possible. We reduce the possible collusion set by analyzing the incentives and bargaining behavior among colluders. We show that the optimal strategies designed based on human behavior can provide more information to the fingerprint detector and effectively improve the collusion resistance. The second part of this thesis focuses on understanding modelling and analyzing user dynamics for users in various types of peer-to-peer live streaming social networks. We stimulate user cooperation by designing the optimal, cheat-proof, and attack-resistant strategies for peer-to-peer live streaming social networks over Internet as well as wireless networks. Also, as more and more smart-phone users subscribe to the live-streaming service, a reasonable market price has to be set to prevent the users from reselling the live video. We start from analyzing the equilibrium between the users who want to resell the video and the potential buyers to provide the optimal price for the content owner

    Digitalization and new media landscape

    Get PDF
    The article presents the phenomena of new communication technologies. It exposes the role of social media (Web 2.0) and sketches some global trends within the field of new media. It further outlines basic characteristics of traditional mass communication and consumption of media products, and as a counter-part presents interactive nature of a new media and the phenomena of user-generated media contents. The main focus of the article is the process of digitalization and its influence on important social system: media industry and production. Digitalization and growth of social media have challenged the news industry, so the latter has to adjust its media production to the rising power of independent publishers on social media platforms, as well as to users, which became publishers themselves, the so-called prosumers. The process of multimedia production is described through various types of inclusion promised in the technological formats. This article also highlights the transformed “intimacy” of new media cultures, which presents further evidence of new, unstable, and to some respect blurring divisions between the public and private spheres of communication. Several positive and negative consequences of digitalization on media landscape are enumerated. There are problems concerning transparency, accountability and professionalism of media production. Digital media has speed up the process of media production, journalists are faced with lack of time. Journalists as multitasking professionals are becaming the norm. The article exposes social activities manifested on social media (networks). Social networks, such as Facebook and Twitter, are becoming news platforms for spreading information and news among users. Moreover, social media has become a powerful tool for publishers and journalists, as it enables them to augment or to keep their audience. Since social networks are usually used to accomplish interpersonal rather than professional goals, there is a risk of misperception of communication acts performed by journalists via social networks. Interaction via social networks is usually more personal, interactive, collaborative, but these characteristics are quite different from normative ideals, attributed to quality journalism.The article concludes with the question about possible solutions concerning further development of normative conceptions of journalism

    Digital Storytelling and History Lines: Community Engagement in a Master-Planned Development

    Get PDF
    The introduction of new media and information and communication technology enables a greater variety of formats and content beyond conventional texts in the application and discourse of public history projects. Multimedia and personalised content requires public historians and cultural community developers to grasp new skills and methods to make representations of and contributions to a collective community memory visible. This paper explores the challenge of broadening and reinvigorating the traditional role of the public historian working with communities via the facilitation, curation and mediation of digital content in order to foster creative expression in a residential urban development. It seeks to better understand the role of locally produced and locally relevant content, such as personal and community images and narratives, in the establishment of meaningful social networks of urban residents. The paper discusses the use of digital storytelling and outlines the development of a new community engagement application we call History Lines

    Cyber Security Concerns in Social Networking Service

    Get PDF
    Today’s world is unimaginable without online social networks. Nowadays, millions of people connect with their friends and families by sharing their personal information with the help of different forms of social media. Sometimes, individuals face different types of issues while maintaining the multimedia contents like, audios, videos, photos because it is difficult to maintain the security and privacy of these multimedia contents uploaded on a daily basis. In fact, sometimes personal or sensitive information could get viral if that leaks out even unintentionally. Any leaked out content can be shared and made a topic of popular talk all over the world within few seconds with the help of the social networking sites. In the setting of Internet of Things (IoT) that would connect millions of devices, such contents could be shared from anywhere anytime. Considering such a setting, in this work, we investigate the key security and privacy concerns faced by individuals who use different social networking sites differently for different reasons. We also discuss the current state-of-the-art defense mechanisms that can bring somewhat long-term solutions to tackling these threats
    • …
    corecore