Adult attachment and profile images on Chinese social networking sites: A comparative analysis of Sina Weibo and WeChat

2017 ◽  
Vol 77 ◽  
pp. 266-273 ◽  
Author(s):  
Cong Shu ◽  
Na Hu ◽  
Xing Zhang ◽  
Yuanxiao Ma ◽  
Xu Chen
Author(s):  
Ayan Chatterjee ◽  
Mahendra Rong

The communication through wireless medium is very popular to the developed society. More specifically, the use of the internet as well as the use of social networking sites is increasing. Therefore, information security is an important factor during wireless communication. Three major components of it are confidentiality, integrity, and availability of information among authorized users. Integrity level is maintained through various digital authentication schemes. Fuzzy logic is an important soft computing tool that increases the digital watermarking system in various ways. In this chapter, different popular and high secured watermarking schemes using fuzzy logic are analyzed with their mathematical and experimental efficiency. A comparative analysis is developed here with corresponding different parameters.


2020 ◽  
Vol 12 (2) ◽  
pp. 21-41
Author(s):  
Atia Bano Memon ◽  
Kyrill Meyer

This paper initially undertakes a comparative analysis of business page architecture of different SNSs by employing a desktop-based research approach consisting of surveying existing business pages, creating sample business pages, and reviewing official documentations of included SNSs. The observations indicate that the existing SNSs exhibit vast diversity and impose platform-specific boundaries that result in the fragmentation and dispersion of business information across multiple sites. Accordingly, the next part of the paper explores the potential of SNS APIs as an opportunity for the aggregation and centralization of SNS business information and successively proposes a conceptual model of business page integration. The proposed model is validated and evaluated through a web-based application for the integrated business page search and interaction over multiple SNSs. The discussion taken herein should assist the businesses in choosing an appropriate SNS for their web representation and establishes the grounds and guidelines for next generation of integrated data applications.


E-Marketing ◽  
2012 ◽  
pp. 803-813 ◽  
Author(s):  
T. Andrew Yang ◽  
Dan J. Kim

In the world of e-marketing, new business models are introduced to accommodate changes caused by various factors, including the markets, the services, the customers, among others. One latest trend of e-marketing is social networking Web sites, many of which have attracted not only large number of users and visitors, but also business companies to place their online ads on the sites. As an important example of Web 2.0 applications, online social networks deserve comprehensive studying and analysis; they are not only employed as an effective vehicle of e-marketing, but may impact how future Web-based applications would be developed. In this chapter, we explore online social networking as a new trend of e-marketing, by conducting a comparative analysis of online social networking sites. We first discuss the various types of online social networks, based on the classification by Laudon & Traver (2008), and then analyze online social networks from a business strategy point of view, by discussing the primary revenue models for online social networking sites. The primary contribution of this chapter is a comparative analysis and discussions of representative online social networking sites and their respective revenue model(s). This chapter aims to provide the reader with a basic understanding of the emerging online social networking Web sites and their primary revenue models.


Author(s):  
T. Andrew Yang ◽  
Dan J. Kim

In the world of e-marketing, new business models are introduced to accommodate changes caused by various factors, including the markets, the services, the customers, among others. One latest trend of e-marketing is social networking Web sites, many of which have attracted not only large number of users and visitors, but also business companies to place their online ads on the sites. As an important example of Web 2.0 applications, online social networks deserve comprehensive studying and analysis; they are not only employed as an effective vehicle of e-marketing, but may impact how future Web-based applications would be developed. In this chapter, we explore online social networking as a new trend of e-marketing, by conducting a comparative analysis of online social networking sites. We first discuss the various types of online social networks, based on the classification by Laudon & Traver (2008), and then analyze online social networks from a business strategy point of view, by discussing the primary revenue models for online social networking sites. The primary contribution of this chapter is a comparative analysis and discussions of representative online social networking sites and their respective revenue model(s). This chapter aims to provide the reader with a basic understanding of the emerging online social networking Web sites and their primary revenue models.


2019 ◽  
Vol 13 (4) ◽  
pp. 425-447
Author(s):  
Mikhail Myagkov ◽  
Evgeniy V Shchekotin ◽  
Sergey I Chudinov ◽  
Vyacheslav L Goiko

This article presents a comparative analysis of online communities of right-wing radicals and Islamists, who are considered to be numerous and dangerous extremist groups in Russian society. The online communities were selected based on the content posted on the largest Russian social networking site VKontakte. The goal of this article is to determine the strategy and tactics employed by extremist online communities for survival on social networking sites. The authors discovered that both right-wing radical and Islamist groups employ similar behavioural techniques, with the mimicry of ideologically neutral content as the most common. In addition, every extremist community also applies some unique methods. For example, if there is a risk of being blocked, right-wing radicals tend to shift their activity and communication to the other internet-based platforms that are not under state control; however, Islamists prefer to suddenly change the content of their communities (i.e. by using secondary mimicry).


Sign in / Sign up

Export Citation Format

Share Document