Deconstructing the Social Network

Author(s):  
Pam Jarvis

This chapter outlines the results of an original pilot which investigated young British people's usage and opinions of social networking. The underpinning literature outlines psychological and neurological evidence that suggests young people's personalities are both fledgling and fragile, and that consequently, the online environment may be an inappropriate environment in which to engage in social processes that input to identity development due to the persistence, visibility, and spreadability of information that users commit to their profiles. The data gathered largely supported this thesis and additionally indicated that there may be a gender difference in orientation to online activity in early adolescence.

Author(s):  
Serhii Puhach

The intensive development of new information and communication technologies (ICT) has led to major changes in society. The widespread use of smartphones and mobile communications has allowed today to create new programs and services to improve human life. This development changes the established habits of human communication, the relationship between society and the environment. A social networking service (SNS) is a service (on a website or through a mobile application) that allows users to share a personal profile and establish contacts with other users. Social networking services affect the territorial organization of society and can be used for the development of both settlements and entire territories to make their development more sustainable and balanced. The study of social networking services is currently on the rise. The joint efforts of many sciences (sociology, psychology, geography, mathematics, statistics, computer science, etc.) are needed to understand the subject essence of the phenomenon and to analyze data. Approaches to the study of social networking services can be divided into three large groups: 1) in terms of human relations and relationships; 2) in terms of content distributed on the network; 3) in terms of spatial aspects of the functioning of the social network. In Ukraine, there are no detailed studies of the spatial aspects of the spread of social networking services at the local level. In the Ternopil region, there is a pattern of concentration of the majority of Facebook and Instagram users in the largest cities, namely Ternopil, Chortkiv, Berezhany, Kremenets. Buchach, Borshchiv, Zalishchyky, Terebovlya, and Shumsk districts stand out among the districts by the number of users. An important indicator that characterizes the spread of social networking services is the penetration rate of the social network, which is calculated as the ratio of the number of users in a certain territory to the population living in it. Cities of regional subordination differ in terms of the penetration rate of SNS. The highest values were observed in Chortkiv, Ternopil, Kremenets cities. The penetration rate of social networking services in the administrative districts of Ternopil region is much lower. A relatively high rate (over 30%) was recorded in Buchach, Berezhany and Shumsk districts. Extremely low penetration rate (less than 5%) is in Zbarazh, Chortkiv, Zboriv districts which are adjacent to the cities of regional subordination. The social networking service Instagram is inferior to Facebook in level of development, and its main users are mainly young people. However, in the territories where the rate of Facebook penetration is the lowest in the region (Ternopil, Zbarazh, Chortkiv, Zboriv districts), the predominance of Instagram is noted. Thus, the main patterns of spatial distribution of SNS’ Facebook and Instagram in Ternopil region are: concentration of users in the largest cities, especially in the regional center Ternopil City (half of Facebook and Instagram users in the region); the number of users is proportional to the population in the territorial unit; small number of users and low penetration rate of the SNS’ in the administrative districts adjacent to the cities of regional subordination Ternopil and Chortkiv; among administrative districts, higher indicators of social network development are typical for northern and southern districts in comparison with central ones. Key words: social networking service (SNS), penetration rate of the SNS, Facebook, Instagram, Ternopil region.


1999 ◽  
Vol 02 (01) ◽  
pp. 11-36 ◽  
Author(s):  
Gérard Weisbuch ◽  
Gérard Boudjema

We describe a simple model of the dynamics of adoption of agri-environmental measures by farmers in Europe. Farmers choices are based on their evaluation of the economic advantages of taking environmental premiums in exchange for environment friendly practices, plus imitation terms taking into account the information that they get from neighbours which have already made their own choice. We show that under a large set of social network topologies and hypotheses on distribution of farmers characteristics, the outcome of the social processes, namely premium uptake rate, depends upon local characteristics of farmers and their network. It is not directly related to average characteristics. Some conclusions and recommendations about policy implementation can then be driven.


Author(s):  
George Veletsianos ◽  
Cesar Navarrete

<p>While the potential of social networking sites to contribute to educational endeavors is highlighted by researchers and practitioners alike, empirical evidence on the use of such sites for formal online learning is scant. To fill this gap in the literature, we present a case study of learners’ perspectives and experiences in an online course taught using the Elgg online social network. Findings from this study indicate that learners enjoyed and appreciated both the social learning experience afforded by the online social network and supported one another in their learning, enhancing their own and other students’ experiences. Conversely, results also indicate that students limited their participation to course-related and graded activities, exhibiting little use of social networking and sharing. Additionally, learners needed support in managing the expanded amount of information available to them and devised strategies and “workarounds” to manage their time and participation.<br /><strong></strong></p>


2011 ◽  
pp. 1286-1297
Author(s):  
Malcolm Shore

This chapter is about the way in which computer hackers invoke social networking paradigms to support and encourage their activities. It reviews the evolution of hacking as a form of social networking, from its roots in Bulletin Board systems to the current attacks on Second Life, and considers the motivation for hacking. Ajzen’s Theory of Planned Behavior and Beveren’s Flow Theory model are, when considered together, found to explain many of the observed characteristics of early hacker activity. The place of social networks in motivating hacking is explored, and some observations are made in relation to hacking and the Second Life environment. A number of control variables are identified which can be used to reduce the likelihood of people engaging in the hacking activity. Addressing the social network factors which motivate hacking provides an important early step in addressing cybercrime.


2019 ◽  
pp. 097215091986886 ◽  
Author(s):  
Ameeta Jaiswal-Dale ◽  
Fanny Simon-Lee ◽  
Giovanna Zanotti ◽  
Peter Cincinelli

The aim of this research is to apply the tool of social network analysis to situations in capital sourcing, including early stage financing. The study is conducted within the social network of Medical Alley Association of Minnesota (MAA). We investigate the correlation between the main centrality measures: closeness, degree and betweenness, and the amount of funding received by the 163 MAA members during 2009–2012. Companies benefit from their social network to get access to better financing. The empirical results also provide a road map to encourage the sponsored or spontaneous growth of other social networks in related fields. Despite the financial crisis, the empirical results show how competition works when firms have established relations with others. Where an intersection occurs is merely an empirical curiosity and the causation resides in the intersection of relations. The relation that intersects on an organization determines the player’s competitive advantage.


2019 ◽  
Vol 24 (1) ◽  
pp. 67-75 ◽  
Author(s):  
Maria Magdalena Popescu

Abstract It is said that western society is heading toward individuation, towards personalization. This, along with continuous technological progress, triggers the concept of Personal Identity Online (PIO) which highlights and tailors a specific characteristic of an individual’s behavior in an online network of similar ones, benefitting from a single opportunity to shape an individual’s identity differently from the one he has in reality. Looked at from the network of ties existent in a social online environment, identity is tailored by each individual representation in virtual encounters. This representation is provided by the users’ profiles while the posts used are enriched and shared account for the visual representation of alterity. The present paper looks at how impression management and personal branding are developed in the social network environment in a desire to complete personal characteristics that reality did not grant. Analysis on posted content, management of information and social manifestation are involved to this end.


Author(s):  
Nisrine Zammar

This article examines the role of actors in a Social Network Sites and also the triggers and challenges they represent to social networking between today’s communities and businesses. A Social Network Sites is the product of the evolution of social liaisons and the emergence of online communities of people who are interested in exploring the concerns and activities of others. A social network is the assembly of direct or indirect contacts; a network is the product of interactions with the actors (individuals, families, enterprises, etc.) enabled by means of the structural design of web 2.0. Social Network Sites bring people together to interact through chat rooms, and share personal information and ideas around any topics via personal homepage publishing tools. This article is intended to be a trigger to deeply and more intensely explore potential roles of actor-network theory in the Social Network Sites context, in today’s and tomorrow’s world.


Author(s):  
Roberto Marmo

While traditional e-commerce supports the transactional and informational aspects of online shopping, social commerce fulfils the social aspects of shopping. Combining the advantages offered by social networking and e-commerce, it is possible to create a web business platform to generate and increase revenue by turning web visitors into customers. Social commerce involves social media and user contributions to assist in the online buying and selling of products and services to design and deliver better customer experiences with the help of technology. This chapter compares some technologies that can help define social commerce and social networking; it also discusses background, knowledge, challenges, and critical factors necessary for successful social commerce business. Future trends are illustrated.


Author(s):  
Malcolm Shore

This chapter is about the way in which computer hackers invoke social networking paradigms to support and encourage their activities. It reviews the evolution of hacking as a form of social networking, from its roots in Bulletin Board systems to the current attacks on Second Life, and considers the motivation for hacking. Ajzen’s Theory of Planned Behavior and Beveren’s Flow Theory model are, when considered together, found to explain many of the observed characteristics of early hacker activity. The place of social networks in motivating hacking is explored, and some observations are made in relation to hacking and the Second Life environment. A number of control variables are identified which can be used to reduce the likelihood of people engaging in the hacking activity. Addressing the social network factors which motivate hacking provides an important early step in addressing cybercrime.


Sign in / Sign up

Export Citation Format

Share Document