scholarly journals As Manifestações no Brasil e a formação de redes sociais móveis no contexto da sociedade atual │ The protests in Brazil and the formation of mobile social networks in the context of today's society

2014 ◽  
Vol 10 (1) ◽  
Author(s):  
Sandra Henriques

RESUMO Este artigo propõe-se a compreender como as manifestações sociais no Brasil, ocorridas em junho de 2013, foram difundidas por meio das redes sociais na internet e como as tecnologias móveis de comunicação e informação tiveram papel chave na ampliação e potencialização dessas informações na sociedade brasileira durante os eventos, transformando-os em redes sociais conectadas por aparatos móveis. O artigo utiliza o método fenomenológico-hermenêutico (GAMBOA, 2002) como suporte para o questionamento acerca de como as redes sociais móveis podem ser observadas nas manifestações sociais ocorridas no Brasil em junho de 2013. O referencial teórico traz como aporte os estudos relacionados às redes sociais na internet (RECUERO, 2009), às tecnologias móveis de comunicação e informação (MANOVICH, 2005; SANTAELLA, 2013) e às manifestações sociais (CASTELLS, 2013), dentre outros. Durante o processo, foi possível observar que a utilização das tecnologias móveis de comunicação e informação foi fundamental para a ampliação e disseminação das manifestações sociais no Brasil e para a formação de redes sociais móveis.Palavras-chave: Redes sociais na internet; Tecnologias móveis de comunicação e informação; Redes sociais móveis; Manifestações sociais no Brasil.             ABSTRACT This paper tries to comprehend how the social protests that happened in June 2013 in Brazil radiated through social networks in the web and how mobile communication and information technologies had a key role in amplifying and empowering this information in Brazilian society during those events, turning them into social networks connected through mobile devices. This paper uses the phenomenological-hermeneutics method (GAMBOA, 2002) to support the question as to how mobile social networks can be observed in the 2013 social demonstrations in the country. The theoretical references stand on studies about online social networks (RECUERO, 2009), mobile information and communications technologies (MANOVICH, 2005; SANTAELLA, 2013) and social protests (CASTELLS, 2013), among others. During this process, it was possible to observe that the use of mobile information and communications technologies was essential to amplify and spread the social demonstrations in Brazil and to form mobile social networks. Keywords: Social networks on the Internet; Mobile communication and information technologies; Mobile social networks; Social manifestations in Brazil.

Author(s):  
Timo Ali-Vehmas

Standardization is a crucial enabler of global business of information and communications technologies. Convergence of the underlying networking paradigms of licensed mobile communication and license-exempted internet has made progress, but full integration is still far from being complete. For standardization professionals, the unpredictable convergence makes decision making and participation in standardization complicated. This chapter examines collaboration in five closely related standardization organizations working in this field during the years from 2003 to 2008. The results show similarities and differences in collaboration structures and behaviours reflecting the specific scope and context of each standardization organization. Furthermore, this chapter extends the use of social network analysis as a tool to the field of empirical standardization research. The results pave the way towards better collaboration in standardization communities of converging mobile internet and beyond by providing better visibility and new insights to standardization leaders, policy makers, and users.


Author(s):  
Vladimir Proshkin ◽  
Oksana Glushak ◽  
Nataliia Mazur

The analysis of competences that should be formed in the future foreign language teachers by the tools of modern information and communications technologies is presented by the authors. It is been determined that generic (core) competences include: informatics, informational, organizational and methodological competences; profile (specific) competences include the abilities of information and communications technologies usage for such pupils` skills forming as: listening, speaking, reading and writing. The program of electronic study course to support the realization of above-mentioned task is presented. The purpose of the program is to create a modern level of informational and computer culture, acquiring practical skills of application information technologies by teachers and philologists in order to increase the efficiency of the educational process; students of philological specialties and their preparation for the pedagogically effective use of information technology training in further professional activities. The content of the program modules has been given. Module 1. Network technologies in foreign languages, module 2. Office technologies in foreign languages, module 3. Multimedia technologies. The stages of using ICT in education have been identified, they are search, analysis and research of information, software, methodological resources for a lesson preparation with the further discussion; planning of organizational and methodological measures aimed at achieving goals and objectives of a certain lesson type; developing information materials according to the topic and type of lesson using ICT tools; assessment of future foreign language teachers readiness for the introduction of informational materials on the basis of software resources into the learning process. The usage of ICT for listening, speaking, reading and writing skills forming is demonstrated on the examples of software, on-line services and various podcasts.


2018 ◽  
pp. 978-1003
Author(s):  
Asmae El Kassiri ◽  
Fatima-Zahra Belouadha

The Online Social Networks (OSN) have a positive evolution due to the diversity of social media and the increase in the number of users. The revenue of the social media organizations is generated from the analysis of users' profiles and behaviors, knowing that surfers maintain several accounts on different OSNs. To satisfy its users, the social media organizations have initiated projects for ensuring interoperability to allow for users creating other accounts on other OSN using an initial account, and sharing content from one media to others. Believing that the future generations of Internet will be based on the semantic web technologies, multiple academic and industrial projects have emerged with the objective of modeling semantically the OSNs to ensure interoperability or data aggregation and analysis. In this chapter, we present related works and argue the necessity of a unified semantic model (USM) for OSNs; we introduce a kernel of a USM using standard social ontologies to support the principal social media and it can be extended to support other future social media.


Author(s):  
Agostino Poggi ◽  
Michele Tomaiuolo

Social web sites are used daily by many millions of users. They have attracted users with very weak interest in technology, including absolute neophytes of computers in general. Common users of social web sites often have a carefree attitude in sharing information. Moreover, some system operators offer sub-par security measures, which are not adequate for the high value of the published information. For all these reasons, online social networks suffer more and more attacks by sophisticated crackers and scammers. To make things worse, the information gathered from social web sites can trigger attacks to even more sensible targets. This work reviews some typical social attacks that are conducted on social networking systems, describing real-world examples of such violations and analyzing in particular the weakness of password mechanisms. It then presents some solutions that could improve the overall security of the systems.


Author(s):  
Dmitry Zinoviev

The issue of information diffusion in small-world social networks was first systematically brought to light by Mark Granovetter in his seminal paper “The Strength of Weak Ties” in 1973 and has been an area of active academic studies in the past three decades. This chapter discusses information proliferation mechanisms in massive online social networks (MOSN). In particular, the following aspects of information diffusion processes are addressed: the role and the strategic position of influential spreaders of information; the pathways in the social networks that serve as conduits for communication and information flow; mathematical models describing proliferation processes; short-term and long-term dynamics of information diffusion, and secrecy of information diffusion.


2011 ◽  
pp. 2301-2313
Author(s):  
Amy Scott Metcalfe

In this chapter, I discuss the economic and political implications of knowledge management in higher education. First, I examine the linkages between KM and capitalism, with the help of theoretical frameworks that connect increasing managerialism in higher education with the promises of profit-making in the New (Knowledge) Economy. Next, I discuss the politics of information and the ways in which knowledge is stratified in postsecondary institutions. Third, the social dynamics of information and communications technologies (ICT) are explored in the context of higher education institutions. These perspectives provide a counter-balance to the decidedly functionalist views of much of the knowledge managementliterature. The intent of the chapter is to provide a foundation for the rest of the volume and the more specific studies of KM in higher education to follow.


2013 ◽  
Vol 5 (4) ◽  
pp. 34-54 ◽  
Author(s):  
Panagiotis Andriotis ◽  
Zacharias Tzermias ◽  
Anthi Mparmpaki ◽  
Sotiris Ioannidis ◽  
George Oikonomou

While technology matures and becomes more productive, mobile devices can be affordable and, consequently, fully integrated in people's lives. After their unexpected bloom and acceptance, Online Social Networks are now sources of valuable information. The authors therefore use them for tasks varying from direct marketing to forensic analysis. The authors have already seen Social Network Forensics techniques focused on particular networks implementing methods that collect data from user accounts. During the forensic analysis it is common to aggregate information from different sources but, usually, this procedure causes correlation problems. Here, the authors present their method to correlate data gathered from various social networks in combination with smartphones creating a new form of social map of the user under investigation. In addition, the authors introduce a multi level graph that utilises the correlated information from the smartphone and the social networks and demonstrates in three dimensions the relevance of each contact with the suspect.


Author(s):  
Jaymeen R. Shah ◽  
Hsun-Ming Lee

During the next decade, enrollment growth in Information Systems (IS) related majors is unlikely to meet the predicted demand for qualified IS graduates. Gender imbalance in the IS related program makes the situation worse as enrollment and retention of women in the IS major has been proportionately low compared to male. In recent years, majority of high school and college students have integrated social networking sites in their daily life and habitually use these sites. Providing female students access to role models via an online social network may enhance their motivation to continue as an IS major and pursue a career in IS field. For this study, the authors follow the action research process – exploration of information systems development. In particular, a Facebook application was developed to build the social network connecting role models and students. Using the application, a basic framework is tested based on the gender of participants. The results suggest that it is necessary to have adequate number of role models accessible to students as female role-models tend to select fewer students to develop relationships with a preference for female students. Female students likely prefer composite role models from a variety of sources. This pilot study yields valuable lessons to provide informal learning fostered by role modeling via online social networks. The Facebook application may be further expanded to enhance female students' interests in IS related careers.


Electronics ◽  
2020 ◽  
Vol 9 (6) ◽  
pp. 918 ◽  
Author(s):  
Ateeq Ur Rehman ◽  
Rizwan Ali Naqvi ◽  
Abdul Rehman ◽  
Anand Paul ◽  
Muhammad Tariq Sadiq ◽  
...  

In the recent era, new information technologies have a significant impact on social networks. Initial integration of information and communication technologies (ICT) into city operations has promoted information city, ease of communication and principles of smart communities. Subsequently, the idea of the Internet of Things (IoT) with the specific focus of social IoT (SIoT) has contributed towards the smart cities (SC), which support the city operations with minimal human interaction. The user-generated data obtained by SIoT can be exploited to produce new useful information for creating citizen-centered smart services for SC. The aim of this research is twofold. Firstly, we used the concept of local and global trust to provide new services in SC based on popular online social networks (OSN) data used by the citizens. Secondly, the sustainability of the three different OSN is assessed. This paper investigates the social network domain with regard to the SC. Although in SC, OSN are increasing day by day, there is still an unresolved issue of trust among their users and also OSN are not much sustainable. In this research, we are analyzing the sustainability of different OSN for the SC. We employ datasets of three different social networks for our analyses. A local trust model is used to identify the central user within the local cluster while the global trust-based framework is used to identify the opinion leaders. Our analysis based on the datasets of Facebook, Twitter, and Slashdot unveil that filtration of these central-local users and opinion leaders result in the dispersion and significant reduction in a network. A novel model is being developed that outlines the relationship between local and global trust for the protection of OSN users in SC. Furthermore, the proposed mechanism uses the data posted by citizens on OSN to propose new services by mitigating the effect of untrusted users.


Sign in / Sign up

Export Citation Format

Share Document