Building Online Social Networks to Engage Female Students in Information Systems

Author(s):  
Jaymeen R. Shah ◽  
Hsun-Ming Lee

During the next decade, enrollment growth in Information Systems (IS) related majors is unlikely to meet the predicted demand for qualified IS graduates. Gender imbalance in the IS related program makes the situation worse as enrollment and retention of women in the IS major has been proportionately low compared to male. In recent years, majority of high school and college students have integrated social networking sites in their daily life and habitually use these sites. Providing female students access to role models via an online social network may enhance their motivation to continue as an IS major and pursue a career in IS field. For this study, the authors follow the action research process – exploration of information systems development. In particular, a Facebook application was developed to build the social network connecting role models and students. Using the application, a basic framework is tested based on the gender of participants. The results suggest that it is necessary to have adequate number of role models accessible to students as female role-models tend to select fewer students to develop relationships with a preference for female students. Female students likely prefer composite role models from a variety of sources. This pilot study yields valuable lessons to provide informal learning fostered by role modeling via online social networks. The Facebook application may be further expanded to enhance female students' interests in IS related careers.

Author(s):  
George Veletsianos ◽  
Cesar Navarrete

<p>While the potential of social networking sites to contribute to educational endeavors is highlighted by researchers and practitioners alike, empirical evidence on the use of such sites for formal online learning is scant. To fill this gap in the literature, we present a case study of learners’ perspectives and experiences in an online course taught using the Elgg online social network. Findings from this study indicate that learners enjoyed and appreciated both the social learning experience afforded by the online social network and supported one another in their learning, enhancing their own and other students’ experiences. Conversely, results also indicate that students limited their participation to course-related and graded activities, exhibiting little use of social networking and sharing. Additionally, learners needed support in managing the expanded amount of information available to them and devised strategies and “workarounds” to manage their time and participation.<br /><strong></strong></p>


Computers ◽  
2018 ◽  
Vol 7 (3) ◽  
pp. 42 ◽  
Author(s):  
Erfan Aghasian ◽  
Saurabh Garg ◽  
James Montgomery

Online social network users share their information in different social sites to establish connections with individuals with whom they want to be a friend. While users share all their information to connect to other individuals, they need to hide the information that can bring about privacy risks for them. As user participation in social networking sites rises, the possibility of sharing information with unknown users increases, and the probability of privacy breaches for the user mounts. This work addresses the challenges of sharing information in a safe manner with unknown individuals. Currently, there are a number of available methods for preserving privacy in order to friending (the act of adding someone as a friend), but they only consider a single source of data and are more focused on users’ security rather than privacy. Consequently, a privacy-preserving friending mechanism should be considered for information shared in multiple online social network sites. In this paper, we propose a new privacy-preserving friending method that helps users decide what to share with other individuals with the reduced risk of being exploited or re-identified. In this regard, the first step is to calculate the sensitivity score for individuals using Bernstein’s polynomial theorem to understand what sort of information can influence a user’s privacy. Next, a new model is applied to anonymise the data of users who participate in multiple social networks. Anonymisation helps to understand to what extent a piece of information can be shared, which allows information sharing with reduced risks in privacy. Evaluation indicates that measuring the sensitivity of information besides anonymisation provides a more accurate outcome for the purpose of friending, in a computationally efficient manner.


2020 ◽  
pp. 193896552097357
Author(s):  
Kawon Kim ◽  
Melissa A. Baker

Despite evidence of people posting their consumption experiences to online social networks to fulfill the needs of social support, an understanding of how online social support affects post-consumption spending behaviors remains elusive. This research aims to examine how online social support from online social network friends and the firm influence perceptions of self-deservingness and spending pleasure. Across two studies, this research provides evidence that social support gained through online social networks influences consumers’ spending pleasure through perceptions of their own deservingness. Notably, this study reveals that people obtain social support in online social networks from two sources: social networks friends and firms through receiving “Likes” and “Comments” on their post. This study also explores boundary conditions for when online social support is more effective on spending pleasure. The findings not only broaden the social support literature but also address the benefit to the service industry by understanding how social support can enhance spending pleasure.


2021 ◽  
Vol 9 (1) ◽  
Author(s):  
Sunyoung Park ◽  
Lasse Gerrits

AbstractAlthough migration has long been an imperative topic in social sciences, there are still needs of study on migrants’ unique and dynamic transnational identity, which heavily influences the social integration in the host society. In Online Social Network (OSN), where the contemporary migrants actively communicate and share their stories the most, different challenges against migrants’ belonging and identity and how they cope or reconcile may evidently exist. This paper aims to scrutinise how migrants are manifesting their belonging and identity via different technological types of online social networks, to understand the relations between online social networks and migrants’ multi-faceted transnational identity. The research introduces a comparative case study on an online social movement led by Koreans in Germany via their online communities, triggered by a German TV advertisement considered as stereotyping East Asians given by white supremacy’s point of view. Starting with virtual ethnography on three OSNs representing each of internet generations (Web 1.0 ~ Web 3.0), two-step Qualitative Data Analysis is carried out to examine how Korean migrants manifest their belonging and identity via their views on “who we are” and “who are others”. The analysis reveals how Korean migrants’ transnational identities differ by their expectation on the audience and the members in each online social network, which indicates that the distinctive features of the online platform may encourage or discourage them in shaping transnational identity as a group identity. The paper concludes with the two main emphases: first, current OSNs comprising different generational technologies play a significant role in understanding the migrants’ dynamic social values, and particularly, transnational identities. Second, the dynamics of migrants’ transnational identity engages diverse social and situational contexts. (keywords: transnational identity, migrants’ online social networks, stereotyping migrants, technological evolution of online social network).


Author(s):  
Abhishek Vaish ◽  
Rajiv Krishna G. ◽  
Akshay Saxena ◽  
Dharmaprakash M. ◽  
Utkarsh Goel

The aim of this research is to propose a model through which the viral nature of an information item in an online social network can be quantified. Further, the authors propose an alternate technique for information asset valuation by accommodating virality in it which not only complements the existing valuation system, but also improves the accuracy of the results. They use a popularly available YouTube dataset to collect attributes and measure critical factors such as share-count, appreciation, user rating, controversiality, and comment rate. These variables are used with a proposed formula to obtain viral index of each video on a given date. The authors then identify a conventional and a hybrid asset valuation technique to demonstrate how virality can fit in to provide accurate results.The research demonstrates the dependency of virality on critical social network factors. With the help of a second dataset acquired, the authors determine the pattern virality of an information item takes over time.


2019 ◽  
Vol 10 ◽  
pp. 35
Author(s):  
Andrey  Rodrigues ◽  
Natasha  M. C. Valentim ◽  
Eduardo  Feitosa

In the last few years, Online Social Networks (OSN) have experienced growth in the number of users, becoming an increasingly embedded part of people’s daily lives. Privacy expectations of OSNs are higher as more members start realizing potential privacy problems they face by interacting with these systems. Inspection methods can be an effective alternative for addressing privacy problems because they detect possible defects that could be causing the system to behave in an undesirable way. Therefore, we proposed a set of privacy inspection techniques called PIT-OSN (Privacy Inspection Techniques for Online Social Network). This paper presents the description and evolution of PIT-OSN through the results of a preliminary empirical study. We discuss the quantitative and qualitative results and their impact on improving the techniques. Results indicate that our techniques assist non-expert inspectors uncover privacy problems effectively, and are considered easy to use and useful by the study participants. Finally, the qualitative analysis helped us improve some technique steps that might be unclear.


2020 ◽  
Vol 10 (2) ◽  
pp. 427-464
Author(s):  
Esra Barut Tuğtekin ◽  
Özcan Özgür Dursun

In the present study, a measurement tool was developed to determine the virtual identities of social network users, and the virtual identities of these social network users were examined with respect to gender, time spent on social networks, number of their social network profiles and visibility using the relational survey model. The study was carried out with a total of 671 social network users, 252 females and 419 males. The research data were collected using the Social Network Identity Management Scale developed within the scope of the study. The five-point Likert-type scale made up of four factors and 23 items was found to explain 55.29 % of the total variance (Cronbach Alpha =.93). At the end of the research process, a 23-item Social Network Identity Management Scale’s validity and reliability were confirmed. The finding obtained in the study demonstrated that the virtual identities of the users with more than one profile differed within the context of such sub-dimensions of the scale as liking and privacy. In addition, it was found that the changes in the virtual identities increased depending on the time spent on social networks.


Author(s):  
Mohana Shanmugam ◽  
Yusmadi Yah Jusoh ◽  
Rozi Nor Haizan Nor ◽  
Marzanah A. Jabar

The social network surge has become a mainstream subject of academic study in a myriad of disciplines. This chapter posits the social network literature by highlighting the terminologies of social networks and details the types of tools and methodologies used in prior studies. The list is supplemented by identifying the research gaps for future research of interest to both academics and practitioners. Additionally, the case of Facebook is used to study the elements of a social network analysis. This chapter also highlights past validated models with regards to social networks which are deemed significant for online social network studies. Furthermore, this chapter seeks to enlighten our knowledge on social network analysis and tap into the social network capabilities.


Author(s):  
Carson K.-S. Leung ◽  
Irish J. M. Medina ◽  
Syed K. Tanbeer

The emergence of Web-based communities and social networking sites has led to a vast volume of social media data, embedded in which are rich sets of meaningful knowledge about the social networks. Social media mining and social network analysis help to find a systematic method or process for examining social networks and for identifying, extracting, representing, and exploiting meaningful knowledge—such as interdependency relationships among social entities in the networks—from the social media. This chapter presents a system for analyzing the social networks to mine important groups of friends in the networks. Such a system uses a tree-based mining approach to discover important friend groups of each social entity and to discover friend groups that are important to social entities in the entire social network.


2013 ◽  
Vol 5 (4) ◽  
pp. 34-54 ◽  
Author(s):  
Panagiotis Andriotis ◽  
Zacharias Tzermias ◽  
Anthi Mparmpaki ◽  
Sotiris Ioannidis ◽  
George Oikonomou

While technology matures and becomes more productive, mobile devices can be affordable and, consequently, fully integrated in people's lives. After their unexpected bloom and acceptance, Online Social Networks are now sources of valuable information. The authors therefore use them for tasks varying from direct marketing to forensic analysis. The authors have already seen Social Network Forensics techniques focused on particular networks implementing methods that collect data from user accounts. During the forensic analysis it is common to aggregate information from different sources but, usually, this procedure causes correlation problems. Here, the authors present their method to correlate data gathered from various social networks in combination with smartphones creating a new form of social map of the user under investigation. In addition, the authors introduce a multi level graph that utilises the correlated information from the smartphone and the social networks and demonstrates in three dimensions the relevance of each contact with the suspect.


Sign in / Sign up

Export Citation Format

Share Document