Retaining and Exploring Digital Traces

Author(s):  
Demosthenes Akoumianakis ◽  
Giannis Milolidakis ◽  
George Vlachakis ◽  
Nikolas Karadimitriou ◽  
Giorgos Ktistakis

The present work rests and elaborates on the assumption that social technologies are increasingly turned into computer-mediated virtual settlements, thereby allowing the excavation of a variety of enacted cyber-phenomena such as ad hoc online ensembles, informal social networks and virtual communities, on the grounds of “digital” traces or remains. In this vein, the authors motivate and present a method for virtual excavations that is tightly coupled to a transformational technology such as knowledge visualization. The analytical and explanatory value of the method is assessed using two case studies addressing representative genres of social technologies, namely web sites augmented with social plug-ins and social networking services. Analysis reveals intrinsic aspects of “digital” traces and remains, the form they take in today’s social web and the means through which they can be excavated and transformed to useful information. It turns out that such virtual excavations, when organized and conducted carefully, can be of benefit to enterprises, service organizations and public sector institutions. In addition, their tight coupling with knowledge visualization eliminates extensive data analysis as much of this work can be done using the visualization. On the other hand, and depending on the size of digital trace data, the choice of visualizations and the underlying toolkit are of paramount importance.

Author(s):  
Demosthenes Akoumianakis ◽  
Giannis Milolidakis ◽  
George Vlachakis ◽  
Nikolas Karadimitriou ◽  
Giorgos Ktistakis

The present work rests and elaborates on the assumption that social technologies are increasingly turned into computer-mediated virtual settlements, thereby allowing the excavation of a variety of enacted cyber-phenomena such as ad hoc online ensembles, informal social networks and virtual communities, on the grounds of ‘digital’ traces or remains. In this vein, the authors motivate and present a method for virtual excavations that is tightly coupled to a transformational technology such as knowledge visualization. The analytical and explanatory value of the method is assessed using two case studies addressing representative genres of social technologies, namely web sites augmented with social plug-ins and social networking services. Analysis reveals intrinsic aspects of ‘digital’ traces and remains, the form they take in today’s social web and the means through which they can be excavated and transformed to useful information. It turns out that such virtual excavations, when organized and conducted carefully, can be of benefit to enterprises, service organizations and public sector institutions. In addition, their tight coupling with knowledge visualization eliminates extensive data analysis as much of this work can be done using the visualization. On the other hand, and depending on the size of digital trace data, the choice of visualizations and the underlying toolkit are of paramount importance.


Author(s):  
Lionel Mew

Online Social Networking Web sites are Internet sites that facilitate building of personal social networks online. Young people throughout the United States (U.S.) and around the world are flocking to these sites in droves. Venture capitalists are funding social networking companies at rates not seen since the great technology bust of the late 1990s. Anecdotal evidence suggests that social networking software is one of the next big trends in information technology. Leonard (2004) notes that, “like e-mail, like using a search engine, social networking is a part of the Internet way of life. And [sic] it’s barely getting started.” There are many potential opportunities for research into these virtual communities.


2009 ◽  
Vol 13 (1) ◽  
pp. 2156759X0901300
Author(s):  
Sheri Bauman ◽  
Tanisha Tatum

Traffic on Web sites for young children (ages 3-12) has increased exponentially in recent years. Advocates proclaim that they are safe introductions to the Internet and online social networking and teach essential 21st-century skills. Critics note developmental concerns. In this article, we provide basic information about Web sites for young children, discuss developmental issues, and make recommendations for school counselors to be proactive and aware of the advantages and dangers inherent in these sites.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Jestine Philip

Purpose Emerging technologies are capable of enhancing organizational- and individual-level outcomes. The organizational behavior (OB) field is beginning to pursue opportunities for researching emerging technologies. This study aims to describe a framework consisting of white, black and grey boxes to demonstrate the tight coupling of phenomena and paradigms in the field and discusses deconstructing OB’s white box to encourage data-driven phenomena to coexist in the spatial framework. Design/methodology/approach A scoping literature review was conducted to offer a preliminary assessment of technology-oriented research currently occurring in OB. Findings The literature search revealed two findings. First, the number of published papers on emerging technologies in top management journals has been increasing at a steady pace. Second, various theoretical perspectives at the micro- and macro- organizational level have been used so far for conducting technology-oriented research. Originality/value By conducting a scoping review of emerging technologies research in OB literature, this paper reveals a conceptual black box relating to technology-oriented research. The essay advocates for loosening OB’s tightly coupled white box to incorporate emerging technologies both as a phenomenon and as data analytical techniques.


2021 ◽  
Author(s):  
Shahin Talaei

This thesis examines the performance for multimedia distribution and information sharing of social-networking web sites, with a focus on user networks in Facebook. We used real user network data from Facebook together with a synthetic Facebook network in the performance-testing experiments. We tested performance for multimedia distribution and information sharing using three different types of overlay networks: Facebook; structured peer-to-peer (ring topology); and unstructured peer-to-peer (mesh topology). The experiments used Network Simulator 2 (Ns-2) to simulate the network topologies. The results show that structured Peer-to-Peer has the best performance in terms of information transfer, and Facebook has the best performance in regards to average throughput. This thesis shows the strengths and weaknesses of online social networking while sharing information and multimedia content.


Author(s):  
Philip N. Ndubueze

Digital and Computer Mediated Communication (CMC) technologies have altered traditional forms of social relationships across modern societies and have raised critical concerns about social order in the cyberspace. The amorphous and borderless nature of virtual communities have allowed various deviants, criminals and terrorists elements to permeate them. The resultant criminogenic atmosphere has created a new research agenda for the discipline of criminology. This paper examines the emergence of cyber criminology as a twenty-first century field of criminology and argues that its growth is a fall-out of concerns about the increasing rate of crime and disorder in the cyberspace. Cyber criminology seeks to offer explanation to the causation of deviance, crime and terrorism in the cyberspace. The paper which is anchored on Jaishankar’s Space Transition Theory and Cohen and Felson’s Routine Activity Theory highlights the challenges, prospects and future direction of the evolving field of cyber criminology and its relevance to the quest for order in the Nigerian cyberspace.


2021 ◽  
Vol 12 ◽  
Author(s):  
Simona Sciara ◽  
Daniela Villani ◽  
Anna Flavia Di Natale ◽  
Camillo Regalia

Facebook and other social networking sites allow observation of others’ interactions that in normal, offline life would simply be undetectable (e.g., a two-voice conversation viewable on the Facebook wall, from the perspective of a real, silent witness). Drawing on this specific property, the theory of social learning, and the most direct implications of emotional contagion, our pilot experiment (N = 49) aimed to test whether the exposure to others’ grateful interactions on Facebook enhances (a) users’ felt gratitude, (b) expressed gratitude, and (c) their subjective well-being. For the threefold purpose, we created ad hoc Facebook groups in which the exposure to some accomplices’ exchange of grateful messages for 2 weeks was experimentally manipulated and users’ felt/expressed gratitude and well-being were consequently assessed. Results partially supported both hypotheses. Observing others’ exchange of grateful posts/comments on Facebook appeared to enhance participants’ in-person expression of gratitude (i.e., self-reported gratitude expression within face-to-face interactions), but not their direct and subjective experiences of gratitude. Similarly, exposure to others’ grateful messages improved some components of subjective well-being, such as satisfaction with life, but not negative and positive affect. Taken together, however, our preliminary findings suggest for the first time that social networking sites may actually amplify the spreading of gratitude and its benefits. Implications of our results for professionals and future research in the field of health, education, and social media communication are discussed.


Self-organized networks based on mobile devices (e.g., Mobile Ad Hoc Networks [MANET]) are becoming a practical platform for pervasive social networking. People, either familiar or strangers, communicate with each other via such a network for instant social activities. How to help mobile users to build up trust in pervasive social networking is becoming an important and interesting issue. Trust concerns not only security, but also privacy, as well as quality of social networking experiences. It relates to many properties that are essential for establishing a trust relationship in ephemeral and dynamically changed pervasive social environments. This chapter reviews the literature with regard to how to build up trust in pervasive social networking. The authors explore whether pervasive social networking is demanded, considering many existing popular Internet social networking services. Based on a need assessment survey, they propose a trust management framework that supports context-aware trust/reputation generation, trustworthy content recommendations, secure communications, unwanted traffic control, user privacy recommendations, and secure face-to-face pervasive social communications. Simulations, prototype implementation, and user experiments further prove the effectiveness of the proposed solutions.


Sign in / Sign up

Export Citation Format

Share Document