Estimating the crisis information coverage model in the internet communities

Kybernetes ◽  
2018 ◽  
Vol 47 (6) ◽  
pp. 1202-1216 ◽  
Author(s):  
Liangdong Lu ◽  
Jia Xu ◽  
Zhenggang Lu ◽  
Jiuchang Wei

Purpose In this study, the process of crisis information communication is viewed as a systems-based concept. An integrated and systematic three-phase model has been constructed to describe the process of crisis information coverage on the internet. By analyzing factors in the three stages that affect the coverage ratio and speed, this study aims to explore the law of information communication in this process and provide useful evidence for crisis managers to make informed decisions. Design/methodology/approach A complete information communication model has been constructed including the following three stages: crisis information release, crisis information diffusion and crisis information reception. The effects of important factors and variables in the model have been studied, including the crisis information release quantity, crisis information release mode, crisis information diffusion speed and crisis information obsolescence speed. Findings The quantitative analysis shows that crisis information release quantity and diffusion speed are positively correlated with coverage ratio; crisis information obsolescence speed is negatively correlated with coverage ratio; and crisis information release mode affects the speed of coverage but does not affect the final coverage ratio. Originality/value Theoretical value: from the perspective of systems thinking, a detailed, systematic and coupled information coverage model has been constructed. Application value: this study finds the most efficient methods to regulate coverage speed and final rate, knowledge of which may play an important role in guiding the practice of crisis communication management.

2020 ◽  
Vol 72 (6) ◽  
pp. 963-978
Author(s):  
Marianne Martens ◽  
Lala Hajibayova ◽  
Kathleen Campana ◽  
Gretchen Caldwell Rinnert ◽  
Joanne Caniglia ◽  
...  

PurposeThis paper aims to report the initial findings of a project aiming to re-establish basic education in conflict-ravaged states in Northeastern Nigeria and to improve education providers' ability to plan and deliver basic educational services. The authors present a preliminary analysis of Nigerian teachers' access to information communication technology (ICT), their technology skills, as well associated national ICT policies.Design/methodology/approachThis case study uses results from two co-designed tools, administered using KoboToolbox to Education Managers in the first instance, and teachers in the second. The data from the tools form the basis for analysis.FindingsIn the first instance, educational managers reported a lack of access to technology, the internet and to training and professional development. In the second instance, teachers reported issues present in the classroom environment, including poor infrastructure, a lack of resources and over-crowded classrooms. Very few teachers had access to computers or to the internet.Research limitations/implicationsThe 33 educational managers represent a small sample size and may not be fully representative of the region covered. The ICT Capacity Audit tool listed Excel in two different areas – basic Excel skills and using Excel for data analysis – which could have caused confusion for participants. The data collection should be repeated, expanded and compared for consistency. For the team, changes to the proposed (SENSE) box content meant that we were not able to deliver low-tech tools, such as Boogie Boards, or high-tech tools, such as tablets, to schools.Originality/valueDespite seemingly insurmountable challenges, the research team identified low-tech tools as a feasible resource in the classroom. Existing tools, such as teachers' smartphones and use of the WhatsApp application, can be used for sharing educational resources and providing teacher training. This paper argues that Nigeria needs up-to-date national ICT policies to guide in-country efforts to develop implementation of information technology initiatives for education.


Author(s):  
Charles M. Ess

Purpose The purpose of this paper is to introduce a new collaboration between the Association of Internet Researchers (AoIR) and the Journal of Information, Communication and Ethics in Society (JICES). Design/methodology/approach The paper uses historical, comparative and ethics-based approaches. Findings The collaboration is catalyzed by central interests shared between AoIR and JICES, namely, in the ethical and social impacts of the internet. The collaboration accordingly aims to bring research and reflection developed for the AoIR conferences to the JICES’ readership. Originality/value The value of this collaboration is considerable, as it promises extensive new cross-fertilization between the two communities. The viewpoint begins with a brief overview of the collaboration’s initiation by Prof Simon Rogerson and its logistics over the next two years. Following a general review of Information and Computing Ethics and Intercultural Information Ethics, an overview of ethical considerations fostered by AoIR is offered, focusing on the development of internet research ethics (IRE), especially its most recent expression in an IRE 3.0.


Author(s):  
Arkadii V. Sokolov

Interrelations of two types of communication cultures are considered: books and information. A formula of intelligence and intellectuality, allowing to reveal principles of book communication (The Gutenberg Galaxy) and of digitized information communication (The McLuhan Galaxy) is offered. Functioning of the Internet as the main stream of the McLuhan Galaxy is reviewed in detail.


Author(s):  
Arkadiy V. Sokolov

Interrelations of two types of communication cultures are considered: books and information. A formula of intelligence and intellectuality, allowing to reveal principles of book communication (The Gutenberg Galaxy) and of digitized information communication (The McLuhan Galaxy) is offered. Functioning of the Internet as the main stream of the McLuhan Galaxy is reviewed in detail.


2019 ◽  
Vol 41 (4) ◽  
pp. 740-757 ◽  
Author(s):  
Sophie Hennekam ◽  
Subramaniam Ananthram ◽  
Steve McKenna

Purpose The purpose of this paper is to investigate how individuals perceive and react to the involuntary demotion of a co-worker in their organisation. Design/methodology/approach The authors draw on 46 semi-structured in-depth interviews (23 dyads) with co-workers of demoted individuals. Findings The findings suggest that an individual’s observation of the demotion of a co-worker has three stages: their perception of fairness, their emotional reaction and their behavioural reaction. The perception of fairness concerned issues of distributive, procedural, interpersonal and informational justice. The emotional responses identified were feelings of disappointment/disillusion, uncertainty, vulnerability and anger. Finally, the behavioural reactions triggered by their emotional responses included expressions of voice, loyalty, exit and adaptation. Originality/value Perceptions of (in)justice perpetrated on others stimulate emotional and behavioural responses, which impacts organisational functioning. Managers should therefore pay attention to the way a demotion is perceived, not only by those directly concerned, but also by co-workers as observers.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Fabian Maximilian Johannes Teichmann ◽  
Marie-Christin Falker

Purpose This paper aims to illustrate how illegally obtained funds are laundered through raw diamonds in Austria, Germany, Liechtenstein and Switzerland. Design/methodology/approach To identify specific money laundering techniques involving raw diamonds, this study used a qualitative content analysis of data collected from 60 semi-standardized interviews with both criminals and prevention experts and a quantitative survey of 200 compliance officers. Findings Raw diamonds are extraordinarily suitable for money laundering in European German-speaking countries. In particular, they may be used in all three stages of the laundering process, namely, placement, layering and integration. Research limitations/implications Because the qualitative findings are based on semi-standardized interviews, their insights are limited to the perspectives of the 60 interviewees. Practical implications Identifying gaps in existing anti-money laundering mechanisms should provide compliance officers, law enforcement agencies and legislators with valuable insights into how criminals operate. Originality/value While prior studies focus on the methods used by organizations to combat money laundering and how to improve anti-money laundering measures, this paper investigates how money launderers operate to avoid detection, thereby illustrating authentic experiences. Its findings provide valuable insights into the minds of money launderers and combines criminal perspective with that of prevention experts.


2016 ◽  
Vol 25 (4) ◽  
pp. 478-491 ◽  
Author(s):  
Dwie Irmawaty Gultom

Purpose – Trust in disaster communication is significant because a lack of trust will prevent the transformation of information into usable knowledge for an effective disaster response. Therefore, the purpose of this paper is to investigate how the culture and network ties of an affected community can encourage trust and participation in disaster communication. Design/methodology/approach – A qualitative case study of Jalin Merapi (JM) was conducted by interviewing 33 research participants in the Mt Merapi surroundings. Findings – The findings indicate that culture-embedded disaster communication plays important roles in increasing the effectiveness of disaster information and encouraging trust in the authenticity of locally based disaster information at the individual level. The findings also identify that strong ties and weak ties play different roles in disaster communication. The strong ties are more effective in facilitating information diffusion and encourage trust and community participation within the affected community. Furthermore, the weak ties are more effective in disseminating information to wider audiences, and have an indirect influence in encouraging trust by extending the offline social network owned by the affected community. Originality/value – Most literature on disaster communication focusses on the construction of disaster messages to encourage effective disaster response. Less attention has been paid to the information receivers regarding how disaster information is considered to be trustworthy by the affected community and how it can increase collective participation in community-based disaster communication.


2006 ◽  
Vol 40 (3) ◽  
pp. 286-295 ◽  
Author(s):  
Andrew Buxton

PurposeTo review the variety of software solutions available for putting CDS/ISIS databases on the internet. To help anyone considering which route to take.Design/methodology/approachBriefly describes the characteristics, history, origin and availability of each package. Identifies the type of skills required to implement the package and the kind of application it is suited to. Covers CDS/ISIS Unix version, JavaISIS, IsisWWW, WWWISIS Versions 3 and 5, Genisis, IAH, WWW‐ISIS, and OpenIsis.FindingsThere is no obvious single “best” solution. Several are free but may require more investment in acquiring the skills to install and configure them. The choice will depend on the user's experience with CDS/ISIS formatting language, HTML, programming languages, operating systems, open source software, and so on.Originality/valueThere is detailed documentation available for most of these packages, but little previous guidance to help potential users to distinguish and choose between them.


2016 ◽  
Vol 45 (1) ◽  
pp. 29-50 ◽  
Author(s):  
Aristides Isidoro Ferreira ◽  
Joana Diniz Esteves

Purpose – Activities such as making personal phone calls, surfing on the internet, booking personal appointments or chatting with colleagues may or may not deviate attentions from work. With this in mind, the purpose of this paper is to examine gender differences and motivations behind personal activities employees do at work, as well as individuals’ perception of the time they spend doing these activities. Design/methodology/approach – Data were obtained from 35 individuals (M age=37.06 years; SD=7.80) from a Portuguese information technology company through an ethnographic method including a five-day non-participant direct observation (n=175 observations) and a questionnaire with open-ended questions. Findings – Results revealed that during a five-working-day period of eight hours per day, individuals spent around 58 minutes doing personal activities. During this time, individuals engaged mainly in socializing through conversation, internet use, smoking and taking coffee breaks. Results revealed that employees did not perceive the time they spent on non-work realted activities accurately, as the values of these perceptions were lower than the actual time. Moreover, through HLM, the findings showed that the time spent on conversation and internet use was moderated by the relationship between gender and the leisure vs home-related motivations associated with each personal activity developed at work. Originality/value – This study contributes to the literature on human resource management because it reveals how employees often perceive the time they spend on non-work related activities performed at work inaccurately. This study highlights the importance of including individual motivations when studying gender differences and personal activities performed at work. The current research discusses implications for practitioners and outlines suggestions for future studies.


Target ◽  
2017 ◽  
Vol 29 (2) ◽  
pp. 319-338 ◽  
Author(s):  
Teresa Iribarren

This article explores translational literary Web 2.0 practices and user-generated cultural creations on the Internet, focusing on video poetry that re-creates canonical poets’ bodies of work. It will be argued that the use of for-profit platforms like YouTube and Vimeo by indie creators and translators of video poetry favours the emergence of new translational attitudes, practices and objects that have positive but also contentious effects. One the one hand, these online mediators explore new poetic expressions and tend to make the most of the potential for dissemination of poetic heritage, providing visibility to non-hegemonic literatures. On the other hand, however, these translational digitally-born practices and creations by voluntary and subaltern mediators might reinforce the hegemonic position of large American Internet corporations at the risk of commodifying cultural capital, consolidating English as a lingua franca and perhaps, in the long run, even fostering a potentially monocultural and internationally homogeneous aesthetics.


Sign in / Sign up

Export Citation Format

Share Document