scholarly journals The Citizen Science Landscape: From Volunteers to Citizen Sensors and Beyond

2012 ◽  
Vol 2012 ◽  
pp. 1-14 ◽  
Author(s):  
Christina L. Catlin-Groves

Within conservation and ecology, volunteer participation has always been an important component of research. Within the past two decades, this use of volunteers in research has proliferated and evolved into “citizen science.” Technologies are evolving rapidly. Mobile phone technologies and the emergence and uptake of high-speed Web-capable smart phones with GPS and data upload capabilities can allow instant collection and transmission of data. This is frequently used within everyday life particularly on social networking sites. Embedded sensors allow researchers to validate GPS and image data and are now affordable and regularly used by citizens. With the “perfect storm” of technology, data upload, and social networks, citizen science represents a powerful tool. This paper establishes the current state of citizen science within scientific literature, examines underlying themes, explores further possibilities for utilising citizen science within ecology, biodiversity, and biology, and identifies possible directions for further research. The paper highlights (1) lack of trust in the scientific community about the reliability of citizen science data, (2) the move from standardised data collection methods to data mining available datasets, and (3) the blurring of the line between citizen science and citizen sensors and the need to further explore online social networks for data collection.

Author(s):  
Vladlena Benson

Based on the literature review of the theory of trust, this chapter aims to provide an insight into trust formation on social networking sites (SNS). An overview of the current state of cybercrime and known ways of threat mitigation helps shed some light on the reasons why social networks became easy targets for Internet criminals. Increasingly, personalisation is seen as a method for counteracting attacks perpetrated via phishing messages. This chapter aims to look specifically at trust in online social networks and how it influences vulnerability of users towards cybercrime. The chapter poses a question whether personalisation is the silver bullet to combat cyber threats on social networks. Further research directions are discussed.


2016 ◽  
Vol 20 (1) ◽  
pp. 50-67 ◽  
Author(s):  
Mary Helen Millham ◽  
David Atkin

Online social networks are designed to encourage disclosure while also having the ability to disrupt existing privacy boundaries. This study assesses those individuals who are the most active online: “Digital Natives.” The specific focus includes participants’ privacy beliefs; how valuable they believe their personal, private information to be; and what risks they perceive in terms of disclosing this information in a fairly anonymous online setting. A model incorporating these concepts was tested in the context of communication privacy management theory. Study findings suggest that attitudinal measures were stronger predictors of privacy behaviors than were social locators. In particular, support was found for a model positing that if an individual placed a higher premium on their personal, private information, they would then be less inclined to disclose such information while visiting online social networking sites.


2015 ◽  
Vol 162 (4) ◽  
pp. 365-373 ◽  
Author(s):  
Fabrizio Buldrini ◽  
Antinisca Simoncelli ◽  
Stefania Accordi ◽  
Giovanna Pezzi ◽  
Daniele Dallai

Author(s):  
Jaymeen R. Shah ◽  
Hsun-Ming Lee

During the next decade, enrollment growth in Information Systems (IS) related majors is unlikely to meet the predicted demand for qualified IS graduates. Gender imbalance in the IS related program makes the situation worse as enrollment and retention of women in the IS major has been proportionately low compared to male. In recent years, majority of high school and college students have integrated social networking sites in their daily life and habitually use these sites. Providing female students access to role models via an online social network may enhance their motivation to continue as an IS major and pursue a career in IS field. For this study, the authors follow the action research process – exploration of information systems development. In particular, a Facebook application was developed to build the social network connecting role models and students. Using the application, a basic framework is tested based on the gender of participants. The results suggest that it is necessary to have adequate number of role models accessible to students as female role-models tend to select fewer students to develop relationships with a preference for female students. Female students likely prefer composite role models from a variety of sources. This pilot study yields valuable lessons to provide informal learning fostered by role modeling via online social networks. The Facebook application may be further expanded to enhance female students' interests in IS related careers.


2021 ◽  
Vol 18 (184) ◽  
Author(s):  
Tam Tran ◽  
W. Tanner Porter ◽  
Daniel J. Salkeld ◽  
Melissa A. Prusinski ◽  
Shane T. Jensen ◽  
...  

Citizen science projects have the potential to address hypotheses requiring extremely large datasets that cannot be collected with the financial and labour constraints of most scientific projects. Data collection by the general public could expand the scope of scientific enquiry if these data accurately capture the system under study. However, data collection inconsistencies by the untrained public may result in biased datasets that do not accurately represent the natural world. In this paper, we harness the availability of scientific and public datasets of the Lyme disease tick vector to identify and account for biases in citizen science tick collections. Estimates of tick abundance from the citizen science dataset correspond moderately with estimates from direct surveillance but exhibit consistent biases. These biases can be mitigated by including factors that may impact collector participation or effort in statistical models, which, in turn, result in more accurate estimates of tick population sizes. Accounting for collection biases within large-scale, public participation datasets could update species abundance maps and facilitate using the wealth of citizen science data to answer scientific questions at scales that are not feasible with traditional datasets.


Kybernetes ◽  
2019 ◽  
Vol 49 (11) ◽  
pp. 2615-2632
Author(s):  
Bo Yang ◽  
Lulu Wang ◽  
Bayan Omar Mohammed

Purpose Social technologies can offer a strong means for organizations to manage their information flows and thus make changes on the organizational knowledge sharing, which may then be linked to employees’ productivity and performance enhancements. The purpose of this paper is to predict the impact of using the online social network on employee motivation and employee motivation effects on organizational knowledge sharing. Design/methodology/approach From employees of tax affairs organization, data are collected. For evaluating the model’s elements, a questionnaire was designed. It was revised by experts with significant experiences. For statistical analysis, SMART-PLS 3.2 is used. Findings Findings have confirmed the validity of the proposed model. The results also have indicated that online social networks, social trust and social goals have a positive and important impact on employee motivation. Furthermore, obtained results have revealed that organizational knowledge sharing is significantly influenced by employee motivation and organizational commitment. Research limitations/implications The study contributes to the literature on organizational knowledge sharing and employee motivation in online social networking sites. Organizations could benefit from this knowledge by accepting that social networking sites must be considered as a critical component of the knowledge sharing, and precise targeting efforts could be directed for those users. Also, it could be exciting to study further factors affecting the development of organizational knowledge sharing in larger organizations. Originality/value The paper rises the understanding of what online social networking encompasses and how it can be utilized for the organization. The ideas and discussion are similarly applicable to libraries and may give them new visions into the delivery of social networking applications as part of their facilities to users.


Author(s):  
Nisha P. Shetty ◽  
Balachandra Muniyal ◽  
Arshia Anand ◽  
Sushant Kumar

Sybil accounts are swelling in popular social networking sites such as Twitter, Facebook etc. owing to cheap subscription and easy access to large masses. A malicious person creates multiple fake identities to outreach and outgrow his network. People blindly trust their online connections and fall into trap set up by these fake perpetrators. Sybil nodes exploit OSN’s ready-made connectivity to spread fake news, spamming, influencing polls, recommendations and advertisements, masquerading to get critical information, launching phishing attacks etc. Such accounts are surging in wide scale and so it has become very vital to effectively detect such nodes. In this research a new classifier (combination of Sybil Guard, Twitter engagement rate and Profile statistics analyser) is developed to combat such Sybil nodes. The proposed classifier overcomes the limitations of structure based, machine learning based and behaviour-based classifiers and is proven to be more accurate and robust than the base Sybil guard algorithm.


Sign in / Sign up

Export Citation Format

Share Document