Tapping the Wisdom of Crowd Phenomenon in Healthcare Social Networks

Author(s):  
Alaa Al-Kadi ◽  
Samir Chatterjee

Online social networks are increasing in popularity. Among teens, they are fast becoming synonymous with being online, i.e., using the Internet (Lenhart et al., 2011). As online social networks became widespread, it is found that people are using it for various purposes including work, leisure, entertainment, as well as healthcare. In this paper, the authors share their viewpoint and insights on the use of online social networks for healthcare related purposes which are sometimes also referred to as Health 2.0, or as Health Social Networks (HSNs). The authors examine the potential of HSNs in empowering patients and health information seekers towards wellbeing and healthy living. They also discuss the various potential uses of HSNs by healthcare providers and healthcare organizations. A three-dimensional framework is developed by analyzing 37 best-known commercial HSN sites to help categorize HSNs that can aide in their design process. More importantly, we provide an in-depth discussion on the future role of social networks within Healthcare.

2021 ◽  
pp. 60-94
Author(s):  
Goran B. Milašin

This paper analyses new words and expressions used in the Serbian language. The main aims of the paper are to register and describe typical language units in young people’s speech today, then to examine the impact of technology, the Internet and new types of communication on the structure of the Serbian lexicon, and to try to identify some tendencies and processes in the contemporary Serbian language. The corpus on which the research was conducted was collected in 2019 and 2020, and it consists of 1500 utterances excerpted from online social networks, primarily Twitter, Instagram, and YouTube. Based on the analysis of selected new words and expressions, it was determined that young people’s speech today is changing rapidly under the influence of globalisation and the English language, especially at the lexical level. It has also been established that in latest metaphors and comparisons, new technology and the Internet are appearing more and more often in the role of source domains, as an integral part of modern culture.


Author(s):  
Afrand Agah ◽  
Mehran Asadi

This article introduces a new method to discover the role of influential people in online social networks and presents an algorithm that recognizes influential users to reach a target in the network, in order to provide a strategic advantage for organizations to direct the scope of their digital marketing strategies. Social links among friends play an important role in dictating their behavior in online social networks, these social links determine the flow of information in form of wall posts via shares, likes, re-tweets, mentions, etc., which determines the influence of a node. This article initially identities the correlated nodes in large data sets using customized divide-and-conquer algorithm and then measures the influence of each of these nodes using a linear function. Furthermore, the empirical results show that users who have the highest influence are those whose total number of friends are closer to the total number of friends of each node divided by the total number of nodes in the network.


2020 ◽  
Vol 20 (2) ◽  
pp. 82-94
Author(s):  
Reza Abedi ◽  
Fatemeh Daneshvar Muhammadzadegan ◽  
Roqayyeh Sadat Hosseini Kerman ◽  
Fatemeh Miri Kolah Kaj

With an ever-increasing development of internet communications, human reactions have interred a new phase. The results of these communications are a most significant matter considered by the sociologists. Using the internet is developing and forms a significant part of individuals` lives. The advantages and disadvantages of this easiness in communicating and traveling through boundaries should be considered. Breaking the norms happened in the light of these reactions should be discussed, also increasing in awareness and availability to information, joining to global information networks and communication is another face of this placeless and timelessness. This contrasting face challenges the position of cyber space in the social communications, a challenge of which there is no escape by the society. In this research it is an attempt to criticize this challenge through criticizing the position of internet and to consider the role of social networks. We suppose that it is not possible to neglect the advantages of virtual space in developing a new level of human occasions but via this method lack of proper awareness in principle using of it results in some problems which should be covered by a proper training and comprehensive informing. Online spaces penetrate in human`s life in an extended way and it is a good opportunity to have good use from social networks as the basic condition. The results of this presence form reaction in individuals which will be considered in the present study.


Author(s):  
Encarnación Soriano-Ayala ◽  
Adán Hermosilla-Rivera ◽  
Verónica C. Cala ◽  
Rachida Dalouh

ABSTRACT This work addresses the risk that adolescents face when they misuse the Internet. The results of an investigation carried out with 206 adolescents about the use of Internet, cyberbullying and sexting are presented. The results showed that parents of adolescents are unaware of their children's use of social networks, girls practice sexting more than boys, and there are more boys who practice cyberbullying in the role of executioner, while girls star in it as the victim.RESUMENEste trabajo aborda el riesgo que corren los adolescentes cuando hacen un mal uso de Internet. Se exponen los resultados de una investigación llevada a cabo con 206 adolescentes en los que se analiza el uso de Internet, el ciber acoso (ciberbullying) y el sexting. En los resultados señalamos que los padres de los chicos y las chicas adolescentes desconocen el uso que hacen sus hijos de las redes sociales, las chicas practican más el sexting que los chicos en la adolescencia, siendo el sexting una nueva forma de sexismo impulsado por las tecnologías, y son más los chicos que practican el ciberbullying en el rol de verdugo, mientras que las chicas lo protagonizan desde el papel de víctima.


Author(s):  
Muhammad Elsayeh ◽  
Kadry Ali Ezzat ◽  
Hany El-Nashar ◽  
Lamia Nabil Omran

The internet of medical things (IoMT) has a great role in improving the health around the world. IoMT is having a great impact in our life in which the clinical data of the patient is observed and checked and then can be transferred to the third party for using in the future such as the cloud. IoMT is a huge data system with a continuous developing rate, which implies that we should keep a lot of data secure. We propose a combined security architecture that fuses the standard architecture and new blockchain technology. Blockchain is a temper digital ledger which gives peer-to-peer communication and provides communication between non-trust individuals. Using standard in-depth strategy and blockchain, we are able to develop a method to collect vital signs data from IoMT and connected devices and use blockchain to store and retrieve the collected data in a secure and decentralized fashion within a closed system, suitable for healthcare providers such as private clinics, hospitals, and healthcare organizations were sharing data with each other is required. Right now initially examine the innovation behind Blockchain then propose IoMT-based security architecture utilizing Blockchain to guarantee the security of information transmission between associated nodes. Experimental analysis shows that the proposed scheme presents a non-significant overhead; yet it brings major advantages to meet the standard security and privacy requirements in IoMT.


Author(s):  
Afrand Agah ◽  
Mehran Asadi

This article introduces a new method to discover the role of influential people in online social networks and presents an algorithm that recognizes influential users to reach a target in the network, in order to provide a strategic advantage for organizations to direct the scope of their digital marketing strategies. Social links among friends play an important role in dictating their behavior in online social networks, these social links determine the flow of information in form of wall posts via shares, likes, re-tweets, mentions, etc., which determines the influence of a node. This article initially identities the correlated nodes in large data sets using customized divide-and-conquer algorithm and then measures the influence of each of these nodes using a linear function. Furthermore, the empirical results show that users who have the highest influence are those whose total number of friends are closer to the total number of friends of each node divided by the total number of nodes in the network.


Author(s):  
Sylvaine Castellano ◽  
Insaf Khelladi

New opportunities and challenges are emerging thanks to the growing Internet importance and social media usage. Although practitioners have already recognized the strategic dimension of e-reputation and the power of social media, academic research is still in its infancy when it comes to e-reputation determinants in a social networks context. A study was conducted in the sports setting to explore the impact of social networks on the sportspeople's e-reputation. Whereas the study emphasized (1) the influence of social networks' perception on the sportspeople's e-reputation, and the neutral roles of (2) the motives for following sportspeople online, and (3) the negative content on the Internet, additional insights are formulated on maintaining, restoring and managing e-reputation on social networks. Finally, future research directions are suggested on the role of image to control e-reputation.


2022 ◽  
pp. 255-263
Author(s):  
Chirag Visani ◽  
Vishal Sorathiya ◽  
Sunil Lavadiya

The popularity of the internet has increased the use of e-commerce websites and news channels. Fake news has been around for many years, and with the arrival of social media and modern-day news at its peak, easy access to e-platform and exponential growth of the knowledge available on social media networks has made it intricate to differentiate between right and wrong information, which has caused large effects on the offline society already. A crucial goal in improving the trustworthiness of data in online social networks is to spot fake news so the detection of spam news becomes important. For sentiment mining, the authors specialise in leveraging Facebook, Twitter, and Whatsapp, the most prominent microblogging platforms. They illustrate how to assemble a corpus automatically for sentiment analysis and opinion mining. They create a sentiment classifier using the corpus that can classify between fake, real, and neutral opinions in a document.


2019 ◽  
Vol 27 (3) ◽  
pp. 415-435
Author(s):  
Hannah Bayfield ◽  
Laura Colebrooke ◽  
Hannah Pitt ◽  
Rhiannon Pugh ◽  
Natalia Stutter

In her book, ‘Bad Feminist’, Roxane Gay claims this label shamelessly, embracing the contradictory aspects of enacting feminist practice while fundamentally being ‘flawed human[s]’. This article tells a story inspired by and enacting Roxane Gay’s approach in academia, written by five cis-gendered women geographers. It is the story of a proactive, everyday feminist initiative to survive as women in an academic precariat fuelled by globalised, neoliberalised higher education. We reflect on what it means to be (bad) feminists in that context, and how we respond as academics. We share experiences of an online space used to support one another through post-doctoral life, a simple message thread, which has established an important role in our development as academics and feminists. This article, written through online collaboration, mirrors and enacts processes fundamental to our online network, demonstrating the significance and potential of safe digital spaces for peer support. Excerpts from the chat reflect critically on struggles and solutions we have co-developed. Through this, we celebrate and validate a strategy we know that we and others like us find invaluable for our wellbeing and survival. Finally, we reflect on the inherent limitations of exclusive online networks as tools for feminist resistance.


Sign in / Sign up

Export Citation Format

Share Document