Working Adults' Buying Intention Through Online Social Network

2021 ◽  
Vol 17 (4) ◽  
pp. 92-116
Author(s):  
Syed Shah Alam ◽  
Chieh-Yu Lin ◽  
Mohd Helmi Ali ◽  
Nor Asiah Omar ◽  
Mohammad Masukujjaman

Most businesses have online social media presence; therefore, understanding of working adult's perception on buying through online social networks is vital. The aim of this study is to examine the effect of perceived value, sociability, usability, perceived risk, trust, and e-word-of-mouth on buying intention through online social network sites. The research model for this study was developed based on the literature on information system research. This study adopted convenient sampling of non-probability sampling procedure. Data were collected through self-administered questionnaire, and PLS-based path analysis was used to analyse responses. The findings of the study shows that perceived value, sociability, usability, e-word-of-mouth, attitude, and subjective norm are significant constructs of buying intention through online social networks. This research can serve as a starting point for online shopping research through online social media while encouraging further exploration and integration addition adoption constructs.

Author(s):  
Courtney Page-Tan

AbstractHurricane Harvey was social media's first real stress test as a disaster response and recovery mechanism. A confluence of conditions makes it an ideal case study of social media's role in disaster recovery: the lack of a government-issued evacuation order, a call from government leadership for willing and able volunteers with a boat or high-water vehicle to perform life-saving rescues, and wide-spread adoption of social media platforms in the Houston area. While research on online social networks and disasters continues to grow, social scientists know little about how these online networks transform during a crisis and, further, how they drive disaster outcomes. With two original datasets, this study investigates how Houston's online social network transformed during Hurricane Harvey (2017), and the relationship between social media activity and post-Harvey recovery. The findings of a social network analysis (N= 2,387,610) and subsequent statistical analyses reveal the Houston-area online social network grew denser, clustered, and more efficient during the disaster. A spatial analysis and three separate regression models of activity before, during, and after Hurricane Harvey reveal that among 333 Nextdoor Neighborhoods, hyperlocal social media activity was a statistically significant predictor of the rate of rebuilding in these geographically based online communities. These findings suggest that policy and decision-makers should invest into online and offline hyperlocal social networks well before a disaster strikes, and leverage resources and legislation to maintain and strengthen the telecommunications and energy infrastructure that supports access to social media and telecommunications infrastructure during a time of crisis.


2021 ◽  
Vol 9 (1) ◽  
Author(s):  
Sunyoung Park ◽  
Lasse Gerrits

AbstractAlthough migration has long been an imperative topic in social sciences, there are still needs of study on migrants’ unique and dynamic transnational identity, which heavily influences the social integration in the host society. In Online Social Network (OSN), where the contemporary migrants actively communicate and share their stories the most, different challenges against migrants’ belonging and identity and how they cope or reconcile may evidently exist. This paper aims to scrutinise how migrants are manifesting their belonging and identity via different technological types of online social networks, to understand the relations between online social networks and migrants’ multi-faceted transnational identity. The research introduces a comparative case study on an online social movement led by Koreans in Germany via their online communities, triggered by a German TV advertisement considered as stereotyping East Asians given by white supremacy’s point of view. Starting with virtual ethnography on three OSNs representing each of internet generations (Web 1.0 ~ Web 3.0), two-step Qualitative Data Analysis is carried out to examine how Korean migrants manifest their belonging and identity via their views on “who we are” and “who are others”. The analysis reveals how Korean migrants’ transnational identities differ by their expectation on the audience and the members in each online social network, which indicates that the distinctive features of the online platform may encourage or discourage them in shaping transnational identity as a group identity. The paper concludes with the two main emphases: first, current OSNs comprising different generational technologies play a significant role in understanding the migrants’ dynamic social values, and particularly, transnational identities. Second, the dynamics of migrants’ transnational identity engages diverse social and situational contexts. (keywords: transnational identity, migrants’ online social networks, stereotyping migrants, technological evolution of online social network).


Author(s):  
Abhishek Vaish ◽  
Rajiv Krishna G. ◽  
Akshay Saxena ◽  
Dharmaprakash M. ◽  
Utkarsh Goel

The aim of this research is to propose a model through which the viral nature of an information item in an online social network can be quantified. Further, the authors propose an alternate technique for information asset valuation by accommodating virality in it which not only complements the existing valuation system, but also improves the accuracy of the results. They use a popularly available YouTube dataset to collect attributes and measure critical factors such as share-count, appreciation, user rating, controversiality, and comment rate. These variables are used with a proposed formula to obtain viral index of each video on a given date. The authors then identify a conventional and a hybrid asset valuation technique to demonstrate how virality can fit in to provide accurate results.The research demonstrates the dependency of virality on critical social network factors. With the help of a second dataset acquired, the authors determine the pattern virality of an information item takes over time.


2019 ◽  
Vol 10 ◽  
pp. 35
Author(s):  
Andrey  Rodrigues ◽  
Natasha  M. C. Valentim ◽  
Eduardo  Feitosa

In the last few years, Online Social Networks (OSN) have experienced growth in the number of users, becoming an increasingly embedded part of people’s daily lives. Privacy expectations of OSNs are higher as more members start realizing potential privacy problems they face by interacting with these systems. Inspection methods can be an effective alternative for addressing privacy problems because they detect possible defects that could be causing the system to behave in an undesirable way. Therefore, we proposed a set of privacy inspection techniques called PIT-OSN (Privacy Inspection Techniques for Online Social Network). This paper presents the description and evolution of PIT-OSN through the results of a preliminary empirical study. We discuss the quantitative and qualitative results and their impact on improving the techniques. Results indicate that our techniques assist non-expert inspectors uncover privacy problems effectively, and are considered easy to use and useful by the study participants. Finally, the qualitative analysis helped us improve some technique steps that might be unclear.


Author(s):  
Mina Seraj ◽  
Aysegul Toker

This chapter describes and discusses the specificities of membership commitment to online social networks. While delineating these specificities, we introduce the concept of social network citizenship (SNC) to define the characteristics of committed network members. A conceptual model involving commencement, creation, change, and commitment is developed in order to establish the antecedents of this new concept. In addition, the implications for marketing practice are discussed to reveal how companies can acquire social network citizens to retain their social media marketing strategies successful.


Author(s):  
Jaymeen R. Shah ◽  
Hsun-Ming Lee

During the next decade, enrollment growth in Information Systems (IS) related majors is unlikely to meet the predicted demand for qualified IS graduates. Gender imbalance in the IS related program makes the situation worse as enrollment and retention of women in the IS major has been proportionately low compared to male. In recent years, majority of high school and college students have integrated social networking sites in their daily life and habitually use these sites. Providing female students access to role models via an online social network may enhance their motivation to continue as an IS major and pursue a career in IS field. For this study, the authors follow the action research process – exploration of information systems development. In particular, a Facebook application was developed to build the social network connecting role models and students. Using the application, a basic framework is tested based on the gender of participants. The results suggest that it is necessary to have adequate number of role models accessible to students as female role-models tend to select fewer students to develop relationships with a preference for female students. Female students likely prefer composite role models from a variety of sources. This pilot study yields valuable lessons to provide informal learning fostered by role modeling via online social networks. The Facebook application may be further expanded to enhance female students' interests in IS related careers.


2018 ◽  
Vol 2018 ◽  
pp. 1-12 ◽  
Author(s):  
Tao Jing ◽  
Qiancheng Chen ◽  
Yingkun Wen

An online social network (OSN) is a platform that makes people communicate with friends, share messages, accelerate business, and enhance teamwork. In the OSN, privacy issues are increasingly concerned, especially in private message leaks in word-of-mouth. A user’s privacy may be leaked out by acquaintances without user’s consent. In this paper, an integrated system is designed to prevent this illegal privacy leak. In particular, we only use the method of space vector model to determine whether the user’s private message is really leaked. Canary traps techniques are used to detect leakers. Then, we define a trust degree mechanism to evaluate trustworthiness of a communicator dynamically. Finally, we set up a new message publishing system to determine who can obtain the message of publisher. Secrecy performance analysis is provided to verify the effectiveness of the proposed message publishing system. Accordingly, a user in social networks can check whether other users are trustworthy before sending their private messages.


2020 ◽  
Author(s):  
Kumaran P ◽  
Rajeswari Sridhar

Abstract Online social networks (OSNs) is a platform that plays an essential role in identifying misinformation like false rumors, insults, pranks, hoaxes, spear phishing and computational propaganda in a better way. Detection of misinformation finds its applications in areas such as law enforcement to pinpoint culprits who spread rumors to harm the society, targeted marketing in e-commerce to identify the user who originates dissatisfaction messages about products or services that harm an organizations reputation. The process of identifying and detecting misinformation is very crucial in complex social networks. As misinformation in social network is identified by designing and placing the monitors, computing the minimum number of monitors for detecting misinformation is a very trivial work in the complex social network. The proposed approach determines the top suspected sources of misinformation using a tweet polarity-based ranking system in tandem with sarcasm detection (both implicit and explicit sarcasm) with optimization approaches on large-scale incomplete network. The algorithm subsequently uses this determined feature to place the minimum set of monitors in the network for detecting misinformation. The proposed work focuses on the timely detection of misinformation by limiting the distance between the suspected sources and the monitors. The proposed work also determines the root cause of misinformation (provenance) by using a combination of network-based and content-based approaches. The proposed work is compared with the state-of-art work and has observed that the proposed algorithm produces better results than existing methods.


Sign in / Sign up

Export Citation Format

Share Document