social computing
Recently Published Documents


TOTAL DOCUMENTS

626
(FIVE YEARS 91)

H-INDEX

26
(FIVE YEARS 4)

2022 ◽  
Vol 14 (1) ◽  
pp. 72-82
Author(s):  
Ignatius Adrian Mastan ◽  
Yohanes Wendy

E-commerce has changed the buying and selling process and the way people interact via the internet. One company that uses e-commerce is PT Patriot Memory Indonesia. PT Patriot Memory Indonesia sells well-known computer peripherals, including the Solid State Drive (SSD). PT Patriot Memory Indonesia wants to analyze customer feedback regarding SSD products sold in e-commerce, namely Shopee by using Text Network Analysis (TNA) which is one part of social computing. Social computing is a science that focuses on social behavior and social contexts using computing systems. One of the tools of social computing, namely Text Network Analysis (TNA), is a research technique that focuses on identifying and comparing network relationships between words, sentences, and systems to model interactions that generate new knowledge or information. In this study, TextNetwork Analysis will show consumer perceptions through the feedback it provideson buyer reviews. The opinions expressed by consumers in buyer reviews can be analyzed so that they can connect each word and create associations of consumer perceptions of a product. Thus, it can be seen the aspects that must be addressed by the company to improve consumer perceptions. The problem analyzed is the development of social computing in analyzing big data. Can the company take advantage of this information so that they know the perceptions of their consumers through the information in the customer feedback at Shopee. Through Text Network Analysis in social computing, researchers will know the association of each word of consumer perception and can see the perception that has the highest degree of a product and see its relationship with other perceptions. This study looks at consumer perceptions of Patriot SSD products at Shopee. The results of this study can help provide customer feedback information to PT Patriot Memory Indonesia. 


2021 ◽  
Author(s):  
◽  
Brahma Dev Veeramachaneni

<p>Purpose - To explore the various enablers and barriers of collaborative technologies in virtual teams through literature reviews and participant interviews and to develop findings with considerations to organizations embarking on similar initiatives. Design/methodology/approach - A constructivist methodology. One-to-one interviews with participants from researcher's organization: a cross-section of senior managers and team members with either previous or current virtual team experience. Thematic analysis has been used to draw out the themes in the interview transcripts, and to develop interpretations and connections to the literature. Findings - There is a great consensus among participants towards the importance of collaboration in virtual teaming and the need for proper planning and uptake. However caution is necessary for organizations embarking on these ventures as there are various barriers that need consideration. There are many aspects that organizations venturing into virtual team initiatives need to consider. These include various integration aspects of technologies, people & processes, choosing technologies that work together well, various people aspects associated with virtual team collaboration initiatives and establishing the virtual team culture as part of the overarching organization & group culture. Research limitations/implications - Small sample sizes make it hard to generalize. Further research could include larger sample sets, surveys of various types of teams affected, the individual collaboration technologies, social computing interdependencies, specific Enterprise 2.0 technology suites etc. Originality/value - Contributes a small body of research on the experience of managers and team members on collaborative technologies and virtual teaming. Provides the only such research in the banking sector and in the New Zealand marketplace, and contributes a set of findings & considerations to organizations embarking on similar initiatives.</p>


2021 ◽  
Author(s):  
◽  
Brahma Dev Veeramachaneni

<p>Purpose - To explore the various enablers and barriers of collaborative technologies in virtual teams through literature reviews and participant interviews and to develop findings with considerations to organizations embarking on similar initiatives. Design/methodology/approach - A constructivist methodology. One-to-one interviews with participants from researcher's organization: a cross-section of senior managers and team members with either previous or current virtual team experience. Thematic analysis has been used to draw out the themes in the interview transcripts, and to develop interpretations and connections to the literature. Findings - There is a great consensus among participants towards the importance of collaboration in virtual teaming and the need for proper planning and uptake. However caution is necessary for organizations embarking on these ventures as there are various barriers that need consideration. There are many aspects that organizations venturing into virtual team initiatives need to consider. These include various integration aspects of technologies, people & processes, choosing technologies that work together well, various people aspects associated with virtual team collaboration initiatives and establishing the virtual team culture as part of the overarching organization & group culture. Research limitations/implications - Small sample sizes make it hard to generalize. Further research could include larger sample sets, surveys of various types of teams affected, the individual collaboration technologies, social computing interdependencies, specific Enterprise 2.0 technology suites etc. Originality/value - Contributes a small body of research on the experience of managers and team members on collaborative technologies and virtual teaming. Provides the only such research in the banking sector and in the New Zealand marketplace, and contributes a set of findings & considerations to organizations embarking on similar initiatives.</p>


Author(s):  
Zehui Zhang ◽  
Ningxin He ◽  
Donagyu Li ◽  
Hang Gao ◽  
Tiegang Gao ◽  
...  

2021 ◽  
Author(s):  
Paula Munoz ◽  
Alejandro Perez-Vereda ◽  
Nathalie Moreno ◽  
Javier Troya ◽  
Antonio Vallecillo
Keyword(s):  

Author(s):  
Marcus Carter ◽  
Ben Egliston

Head-Mounted Virtual Reality (VR) is generally discussed as a gaming technology, but in this paper we argue for the greater need to take VR seriously as a general computing platform and future site for, and of, work. For Facebook (who hold a dominant 39% share of the VR market) VR is not simply a gaming device but as a new frontier for social media, framed by Zuckerberg as a “new kind of social computing platform”. In this paper we report on our research that is examining the implications of VR as (1) a technology being introduced into workplaces; as (2) a possible site for existing forms of labour, in technologies like Infinite Office; and as (3) a platform for transformed and new kinds of labour, such as remote work via telepresence. We identify concerning issues of algorithmic discrimination, exascberated by a prevailing 'fantasy of perfect data' with VR, with serious consequences in the context of productivity tracking and analytics, and the further expansion of the gig economy into new domains.


2021 ◽  
Vol 9 ◽  
Author(s):  
Zhe Sun ◽  
Junping Wan ◽  
Bin Wang ◽  
Zhiqiang Cao ◽  
Ran Li ◽  
...  

Data-driven deep learning has accelerated the spread of social computing applications. To develop a reliable social application, service providers need massive data on human behavior and interactions. As the data is highly relevant to users’ privacy, researchers have conducted extensive research on how to securely build a collaborative training model. Cryptography methods are an essential component of collaborative training which is used to protect privacy information in gradients. However, the encrypted gradient is semantically invisible, so it is difficult to detect malicious participants forwarding other’s gradient to profit unfairly. In this paper, we propose a data ownership verification mechanism based on Σ-protocol and Pedersen commitment, which can help prevent gradient stealing behavior. We deploy the Paillier algorithm on the encoded gradient to protect privacy information in collaborative training. In addition, we design a united commitment scheme to complete the verification process of commitments in batches, and reduce verification consumption for aggregators in large-scale social computing. The evaluation of the experiments demonstrates the effectiveness and efficiency of our proposed mechanism.


2021 ◽  
Author(s):  
Hao Long ◽  
Chen Xu ◽  
Zhanpeng Zhang ◽  
Zewu Li

Sign in / Sign up

Export Citation Format

Share Document