The Sources of Information of the Genealogical Tourist: The Influence of Social Networks and Genealogical Associations

2021 ◽  
Author(s):  
Ricardo Urrestarazu-Capellán ◽  
Jose Correa Fernandez
Author(s):  
Tetyana Andreyeva

The article discusses word-formation processes taking place in Internet communication (particularly, in Facebook comments), where onym denoting a public person is used in diverse modifications. It is alleged that Internet usage transformed people into participants of communication processes that have neither time nor spatial restrictions. The ability to use information technologies became not only the key of physical existence but also the assuarance of spiritual life for most people, as the World Wide Web is the main interactive environment where active mass communication takes place. The fact of conversion of social networks to sources of information is substantiated. It is determined that the language of Internet communication has a specific ability to adapt means of conversational speech to writing style specific to network communication. Communication in social networks, where there is an opportunity to speak practically uncensored, is characterized by looseness. Hence, limitless possibilities open up before its participants for the embodiment of their informative and expressional intensions. It is stated that Internet commenting allows its participants to demonstrate creative component of their personalities, represent their civil position, life views, evaluate any event etc. It is established that modern Ukrainian information space is characterized with a large number of onyms denoting public persons that are used as derivational materials in the processes of creating neologisms. To a large extent, this was facilitated by pre-election political technological moves, which consisted of creating a logo from the first syllable of the candidate's surname together with an exclamation mark – "Ze!" (Zelenskiy). The types of modifications of last name are found (reduction into one syllable, up to two syllables, cutting to the non-suffixed part), derivational methods and word making models are identified (morphological, semantic, analytical derivation). The processes associated with derivational acts have been clarified. The use of a language game involving multiple variations of the surname is stated. The range of perspectives of language of Internet communication research is outlined, which is constantly gaining momentum.


Author(s):  
Viktoriia Volynets

The purpose of the article is to reveal the features of constructing a personal identity in a virtual environment. Methodology. The choice of research methods is determined by the purpose of the article and the subject of research, in particular, general scientific and empirical techniques are used, based on a systematic approach to the analysis of works on the problems of interpretation of virtual identity. The scientific novelty of the obtained research results lies in the correlation of the essence of the concepts "real identity" and "virtual identity", identifying the features and risks of the formation of the latter. The article highlights the factors of human construction of a "virtual" identity, which often occurs due to dissatisfaction of the individual with his real identity. It is emphasized that virtual reality provides ample opportunities for self-expression and disclosure of personal potential, but the desire to always "be online" affects the physical health of the user, thereby increasing his anxiety, leads to fatigue and irritability, exacerbation of hyperdynamic. The problem of excessive immersion in cyberspace has been identified: by abusing being in it, an unformed personality can lose life landmarks, assimilate programmed solutions and ready-made mental stamps. Conclusions. In social networks, a person can easily create an ideal image of himself, which is less authentic than the real one, because it reflects the individual's idea of an invented, ideal set of their own qualities, which are completed with ready visual, textual and audio network tools. Social "slowing down" in the Internet environment significantly reduces the moral level of communication in social networks and messengers. Even today, the level of trust among young people in semi-anonymous messages on the Internet is higher than in traditional sources of information. At the same time, the unsystematic acquisition of knowledge in this way does not allow young people to form an established picture of the world, leaving it largely fragmented.


Author(s):  
Joan Francesc Fondevila Gascón ◽  
Marta Carreras Alcalde ◽  
Josep Lluís Del Olmo Arriaga

Internet y las redes sociales comienzan a condicionar la obtención de información por parte de los estudiantes a la hora de elegir Universidad. Mediante una encuesta a una muestra representativa de alumnos de la Universitat Abat Oliba CEU (UAO), analizamos el peso de Internet y las redes sociales (que se revela significativo) comparativamente con otras fuentes de información. Ello ayuda a establecer mejores estrategias de comunicación y de marketing por parte de las universidades.Impact of the information and communication de las technologies in the election of university: the case of the internet and the social networksAbstractInternet and social networks begin to condition the obtaining of information by students when they choose a university. By surveying a representative sample of students from the University Abat Oliba CEU (UAO), we analyze the weight of the Internet and social networks (which is significant) compared with other sources of information. This helps to ensure better communication and marketing by universities.


Information ◽  
2020 ◽  
Vol 11 (12) ◽  
pp. 578
Author(s):  
María N. Moreno-García

The large amount of digital content available through web sites, social networks, streaming services, and other distribution media, allows more and more people to access virtually unlimited sources of information, products, and services [...]


2016 ◽  
Vol 4 (2) ◽  
pp. 44-58 ◽  
Author(s):  
Ruti Gafni ◽  
Osnat Tal Golan

The social networking revolution allows people to share their opinions with their surrounding society, enabling the ability to influence others. Large amounts of consumer reviews are posted on social networks, expressing experiences, either positive or negative, regarding products/services. These reviews are instantly distributed within a huge network of consumers, challenging the firms' managers who need to cope with that. This research study examines the phenomenon of consumers' reviews posted on social networks to measure the influence of negative reviews on the reader's buying decisions and on the firms' attitudes. This research study examines if there are differences between active users, who post and share reviews, and passive users who only read what others posted. This research study was performed merging three sources of information: (1) monitoring consumer posts on three Facebook pages during six months; (2) performing a relevant questionnaire among 201 respondents, and (3) checking the related firms' reaction to those posts. The findings revealed that potential consumers base their decisions on posted reviews; they are exposed to negative reviews that affect their purchase decisions, incoherently to the manner they use the social network (active or passive users), while the firms mostly react, in order to diminish their influence.


Information ◽  
2021 ◽  
Vol 12 (10) ◽  
pp. 416
Author(s):  
Lidia Vitkova ◽  
Igor Kotenko ◽  
Andrey Chechulin

The problem of countering the spread of destructive content in social networks is currently relevant for most countries of the world. Basically, automatic monitoring systems are used to detect the sources of the spread of malicious information, and automated systems, operators, and counteraction scenarios are used to counteract it. The paper suggests an approach to ranking the sources of the distribution of messages with destructive content. In the process of ranking objects by priority, the number of messages created by the source and the integral indicator of the involvement of its audience are considered. The approach realizes the identification of the most popular and active sources of dissemination of destructive content. The approach does not require the analysis of graphs of relationships and provides an increase in the efficiency of the operator. The proposed solution is applicable both to brand reputation monitoring systems and for countering cyberbullying and the dissemination of destructive information in social networks.


Author(s):  
Frank Meyer ◽  
Damien Poirier ◽  
Isabelle Tellier ◽  
Françoise Fessant

In this chapter, the authors describe Reperio, a flexible and generic industrial recommender system able to deal with several kinds of data sources (content-based, collaborative, social network) in the same framework and to work on multi-platforms (Web service in a multi-user mode and mobile device in a mono-user mode). The item-item matrix is the keystone of the architecture for its efficiency and flexibility properties. In the first part, the authors present core functionalities and requirements of recommendation in an industrial context. In the second part, they present the architecture of the system and the main issues involved in its development. In the last part, the authors report experimental results obtained using Reperio on benchmarks extracted from the Netflix Prize with different filtering strategies. To illustrate the interest and flexibility of the architecture, they also explain how it is possible to take into account, for recommendations, external sources of information. In particular, the authors show how to exploit user generated contents posted on social networks to fill the item-item matrix. The process proposed includes a step of opinion classification.


2021 ◽  
Vol 8 (4) ◽  
Author(s):  
Arthur Claessens ◽  
Olivia Keita-Perse ◽  
Frédéric Berthier ◽  
Jocelyn Raude ◽  
Gilles Chironi ◽  
...  

Abstract The Dunning-Kruger premise assumes that unqualified people are unaware of their limited skills. We tested this hypothesis in the context of the coronavirus disease 2019 (COVID-19) pandemic. In this cross-sectional study, 2487 participants had to self-estimate their knowledge about COVID-19 in a questionnaire on the topic. Poor performers were more likely to use mass media and social networks as sources of information and had lower levels of education. The mean self-assessment (SD) was 6.88 (2.06) and was not linked to actual level of knowledge. This observation should prompt regulatory agencies and media to apply rules that limit dissemination of “infodemics” during global health crises.


2020 ◽  
Vol 10 (13) ◽  
pp. 4525
Author(s):  
Zhifang Liao ◽  
Lite Gu ◽  
Xiaoping Fan ◽  
Yan Zhang ◽  
Chuanqi Tang

It has been shown that identifying the structural holes in social networks may help people analyze complex networks, which is crucial in community detection, diffusion control, viral marketing, and academic activities. Structural holes bridge different communities and gain access to multiple sources of information flow. In this paper, we devised a structural hole detection algorithm, known as the Conductance–Degree structural hole detection algorithm (CD-SHA), which computes the conductance and degree score of a vertex to identify the structural hole spanners in social networks. Next, we proposed an improved label propagation algorithm based on conductance (C-LPA) to filter the jamming nodes, which have a high conductance and degree score but are not structural holes. Finally, we evaluated the performance of the algorithm on different real-world networks, and we calculated several metrics for both structural holes and communities. The experimental results show that the algorithm can detect the structural holes and communities accurately and efficiently.


Sign in / Sign up

Export Citation Format

Share Document