首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 734 毫秒
1.
Abstract

How are new media, such as electronic mail, voice mail, and fax, used when people have access to several of them simultaneously? This paper reports findings from a field study of media use in four sizable subunits within two large organizations where most employees had access to email, vmail, and fax. Respondents tended to use multiple electronic media rather than relying on one. However, they also showed a tendency to prefer one medium for asynchronous communication and to use the others for occasional, specialized purposes. Further, there were considerable differences across subunits in typical media use patterns. Although respondents expressed strong desires for multimedia integration, this study suggests that technological integration may not necessarily result in seamless, collaborative work.  相似文献   

2.

Communities with high levels of social capital are likely to have a higher quality of life than communities with low social capital. This is due to the greater ability of such communities to organize and mobilize effectively for collective action because they have high levels of social trust, dense social networks, and well-established norms of mutuality (the major features of social capital). Communities with “bridging” social capital (weak ties across groups) as well as “bonding” social capital (strong ties within groups) are the most effective in organizing for collective action. People who belong to multiple groups act as bridging ties. When people with bridging ties use communication media, such as the Internet, they enhance their capability to educate community members and to organize, as needed, for collective action. This article summarizes evidence from stratified household survey data in Blacksburg, VA, showing that people with weak (bridging) ties across groups have higher levels of community involvement, civic interest, and collective efficacy than people without bridging ties among groups. Moreover, heavy Internet users with bridging ties have higher social engagement, use the Internet for social purposes, and have been attending more local meetings and events since going online than heavy Internet users with no bridging ties. These findings may suggest that the Internet—in the hands of bridging individuals–is a tool for enhancing social relations and information exchange, and for increasing face-to-face interaction, all of which help to build both bonding and bridging social capital in communities.  相似文献   

3.
Social networks have grown into a widespread form of communication that allows a large number of users to participate in conversations and consume information at any time. The casual nature of social media allows for nonstandard terminology, some of which may be considered rude and derogatory. As a result, a significant portion of social media users is found to express disrespectful language. This problem may intensify in certain developing countries where young children are granted unsupervised access to social media platforms. Furthermore, the sheer amount of social media data generated daily by millions of users makes it impractical for humans to monitor and regulate inappropriate content. If adolescents are exposed to these harmful language patterns without adequate supervision, they may feel obliged to adopt them. In addition, unrestricted aggression in online forums may result in cyberbullying and other dreadful occurrences. While computational linguistics research has addressed the difficulty of detecting abusive dialogues, issues remain unanswered for low-resource languages with little annotated data, leading the majority of supervised techniques to perform poorly. In addition, social media content is often presented in complex, context-rich formats that encourage creative user involvement. Therefore, we propose to improve the performance of abusive language detection and classification in a low-resource setting, using both the abundant unlabeled data and the context features via the co-training protocol that enables two machine learning models, each learning from an orthogonal set of features, to teach each other, resulting in an overall performance improvement. Empirical results reveal that our proposed framework achieves F1 values of 0.922 and 0.827, surpassing the state-of-the-art baselines by 3.32% and 45.85% for binary and fine-grained classification tasks, respectively. In addition to proving the efficacy of co-training in a low-resource situation for abusive language detection and classification tasks, the findings shed light on several opportunities to use unlabeled data and contextual characteristics of social networks in a variety of social computing applications.  相似文献   

4.
With rising numbers of Facebook, Twitter and MXit users, Africa is increasingly gaining prominence in the sphere of social networking. Social media is increasingly becoming main stream; serving as important tools for facilitating interpersonal communication, business and educational activities. Qualitative analyses of relevant secondary data show that children and youths aged between 13 and 30 constitute Africa’s heaviest users of social media. Media reports have revealed cases of abuse on social media by youths. Social networks have severally been used as tools for perpetuating crimes such as; cyberbullying and violence against girls and women. This study proposes a ‘Culture-centered Approach’ to the use of social media in a bid to minimize these cybercrimes and encourage the responsible use of social media amongst African youths. The Culture-centered Approach, which incorporates the tenets of Information Ethics, stresses the need for the respect of the dignity and rights of other online users as well the application of good cultural values and ethical behavior while on social media platforms.  相似文献   

5.
Because of the increasing significance of social communication technologies within an organization, they have become a new form of information processing, resulting in business process transitions and increased benefits. By applying media richness theory and social theories, this study investigated how social communication technologies (SCTs) can be used by an employee to fit his/her task characteristics. Additionally, it also examined how the employee's social relationships moderated media usage in the current job environment and how this usage influenced the task performance. Five media were selected in this study (telephone, video conferencing, email, instant messaging, and blog). Using a hierarchical regression approach, we found that task characteristics were related to media usage, whereas social factors (social influence and social affinity) moderated the degree of the relationships. A few particular media and technologies seemed to perform well, however these are influenced by the social aspects. Moreover, the usage of social technologies results in positive task performance. The performance of a few specific technologies demonstrated binding effects (email performance was associated with instant messenger performance). In summary, we found that the usage of SCTs is instrumentally determined by the interaction between the task and social relationships.  相似文献   

6.
Achieving the anticipated business benefits of a social medium is important as organizations diligently invest in different social media platforms. While much previous research assumes that social media helps organizations to communicate with customers, less is known about whether customers embrace using social media to interact with organizations. It is important to understand the role of social media for business communication from the customers’ perspective, as this may significantly deviate from the organizations’ own communicative intentions. In this exploratory case study of the Moon Struck hotel in China, we investigate both how customers interpret the hotel’s use of WeChat official account for business communication and how customers respond to messages received from Moon Struck’s WeChat account. Adopting a symbolic interactionism perspective, we surprisingly find that WeChat personal accounts and Moon Struck’s official account offer radically different meanings to followers. Specifically, WeChat personal account symbolizes a sociality-oriented meaning (e.g., relationship and image building), while Moon Struck’s WeChat official account symbolizes information broadcasting-related meaning (e.g., selling, advertising, and branding). Both technological features and the distance of relationships among users contribute to the constructed symbolic meaning of technology, subsequently affecting users’ WeChat use patterns. The theoretical implications of this study are discussed and recommendations are made for future research and practice.  相似文献   

7.
The legal regulatory regimes for communication technologies evolve with technological, economic, and social change. This article asserts that, in the United States, the evolution of the legal regulatory regimes for the communications sector is following a trajectory breathtakingly similar to that already traversed by the transportation sector. As both sectors provide infrastructures essential to the nation and share similar economic attributes of networks, technological evolution within each has generated many of the same core issues. By recognizing this historical reality, we can tap valuable experience in transportation policy to better inform prospective policy change in communications. In this way, future communications policy need not be radical—whether intentionally or unintentionally—nor totally untested, thereby enhancing its potential for sustainability.  相似文献   

8.
Rapid communication during extreme events is one of the critical aspects of successful disaster management strategies. Due to their ubiquitous nature, social media platforms are expected to offer a unique opportunity for crisis communication. In this study, about 52.5 million tweets related to hurricane Sandy posted by 13.75 million users are analyzed to assess the effectiveness of social media communication during disasters and identify the contributing factors leading to effective crisis communication strategies. Efficiency of a social media user is defined as the ratio of attention gained over the number of tweets posted. A model is developed to identify more efficient users based on several relevant features. Results indicate that during a disaster event, only few social media users become highly efficient in gaining attention. In addition, efficiency does not depend on the frequency of tweeting activity only; instead it depends on the number of followers and friends, user category, bot score (controlled by a human or a machine), and activity patterns (predictability of activity frequency). Since the proposed efficiency metric is easy to evaluate, it can potentially detect effective social media users in real time to communicate information and awareness to vulnerable communities during a disaster.  相似文献   

9.
【目的/意义】社会化媒体已经成为企业和组织工作中的一种新兴趋势,但少有研究在工作情境下探讨社会化媒体采纳的具体行为和其影响机制。【方法/过程】将工作情境下的社会化媒体使用行为分为强化使用和多样使用两类,以S-O-R理论为基础框架,结合技术接受模型和动机理论,构建工作中使用社会化媒体的两类动机及其对使用行为影响的研究模型,同时还讨论了惯性对意图与两类使用行为影响的调节作用。【结果/结论】通过实际工作中的问卷数据进行实证分析,研究结果表明:个人层面和任务层面的动机在使用者采纳社会化媒体中扮演着积极的角色;使用者的惯性确实能够调节意图与行为之间的关系。  相似文献   

10.
[目的/意义] 探索社交媒体用户健康信息传播行为的影响因素,剖析其认知-动机-传播行为之间的关系,对于理解用户的健康传播行为,提供优质的健康信息服务具有重要意义。[方法/过程] 基于风险认知与问题解决情境理论,构建社交媒体用户的健康信息传播的影响机理模型,通过问卷调查和结构方程进行实证。[结果/结论] 结果表明,风险认知、问题认知和涉入认知通过情境动机正向影响信息传播行为;同时,社交媒体用户的文化程度影响其健康问题认知。  相似文献   

11.
大数据环境下信息与通讯技术的发展, 使越来越多的用户进入了社交媒介建构的虚拟网络空间之中, 社交媒体的影响力也在不断增强。本文从信息内容和网络结构两个层面综述了国外计算机科学等相关领域的社交媒体研究, 指出了基于内容的主题提取, 信息传播的流行度分析, 社交媒体中的网络结构分析以及社区发掘等重要的研究领域;具体阐释了一部分具有基础性或典型性的模型、算法、以及相应的研究成果比较, 同时也提出了未来的研究领域和研究方法的可能发展方向。最后, 本文讨论了国外社交媒体影响力研究对基于国内语境之研究的启示。  相似文献   

12.
唐雪梅  朱利丽 《现代情报》2019,39(3):115-121
[目的]不同于官方信息传播相对理性,用户在社会化媒体上信息传播具有较强的情绪化特征。情绪化信息传播具有独特的传播机制和影响力,国内外文献已经开始对此进行关注并成为社会化媒体信息传播研究的重点之一。[方法]以社会化媒体和情绪等关键词组合在国内外文献资料库内进行搜索,对搜集的相关文献进行梳理。[结论]从社会化媒体情绪化信息特征、情感分析、情绪化传播行为及情绪化信息的影响四个方面述评现有成果,最后分析了现有研究不足并指出未来可能的研究方向。  相似文献   

13.

In the reconciliation of rational-choice and social-influence approaches to media choice offered here, the choice process is decomposed into two subprocesses. In the first subprocess—that of rational choice—decisional ambiguity frustrates complete optimization. Optimization is partial, yielding a set of effectively interchangeable media alternatives over which the user is indecisive. In the second subprocess—that of social influence—imitation, deference, and other cues act on the set of interchangeables, yielding a single ultimate choice. If in the social-influence subprocess there are benefits to coordinating with others, group choice crystallizes around a single media alternative. If these benefits are absent, individual choice remains idiosyncratic, with each decision maker making random choices within the set of interchangeables. In organizational life, media choice transpires sequentially, with each choice conditioning a succeeding one. In its dynamic form, the present model explicitly incorporates such sequential environments: The twofold choice process transpires iteratively within individual decision sites (in the multiple purchasing decisions of a committee, for example) and sequentially across decision sites (from committee to individual, for example). The model generates considerable empirical implications. As decisional ambiguity grows, the rational-choice component of the choice process shrinks, implying upper-bound conditions for the explanatory power of rational-choice statistical models.  相似文献   

14.
探究社交媒体用户分享辟谣信息意愿的影响因素,为辟谣信息的传播及抑制社交媒体谣言提供参考。以社交媒体用户辟谣信息分享意愿为研究对象,选取辟谣主体、辟谣信息内容、辟谣信息传播方式三个维度,通过问卷调查获取数据,采用相关性分析及回归分析的方法对辟谣信息分享意愿的影响因素进行研究。影响社交媒体用户分享辟谣信息意愿的因素重要性依次为:真相陈述、图片、视频、专业人士、定位、政府账号、链接、同步传播影响,据此提出建议。  相似文献   

15.
This article argues that a mutual shaping lens enables a more encompassing account of the joint processes of technological and social change in new media than the diffusion of innovations and social shaping of technology perspectives. Drawing from recent work in sociology and history of technology, organization studies, social informatics, and computer-supported cooperative work, this article suggests that the shaping and diffusion of media artifacts are so intimately tied that they should be seen as the two sides of the same innovation coin. Using examples from the history of videotex newspapers in the United States, the analysis shows that actors simultaneously pursued interdependent technological and social transformations, that this was an ongoing process in which partial outcomes in the technological domain influenced social events at a later phase—and vice versa—and that such process was influenced by historical developments.  相似文献   

16.
Users’ ability to retweet information has made Twitter one of the most prominent social media platforms for disseminating emergency information during disasters. However, few studies have examined how Twitter’s features can support the different communication patterns that occur during different phases of disaster events. Based on the literature of disaster communication and Media Synchronicity Theory, we identify distinct disaster phases and the two communication types—crisis communication and risk communication—that occur during those phases. We investigate how Twitter’s representational features, including words, URLs, hashtags, and hashtag importance, influence the average retweet time—that is, the average time it takes for retweet to occur—as well as how such effects differ depending on the type of disaster communication. Our analysis of tweets from the 2013 Colorado floods found that adding more URLs to tweets increases the average retweet time more in risk-related tweets than it does in crisis-related tweets. Further, including key disaster-related hashtags in tweets contributed to faster retweets in crisis-related tweets than in risk-related tweets. Our findings suggest that the influence of Twitter’s media capabilities on rapid tweet propagation during disasters may differ based on the communication processes.  相似文献   

17.
基于新浪微博,采用社会网络分析等方法对"X银行信用卡"负面网络口碑信息进行研究。结果表明:负面口碑传播者间的交互,不仅对口碑当事者带来负面影响,还会波及其所在行业与其他机构;中间中心性高的用户在负面口碑传播中具有"控制力";发表的微博数、关注的用户数、粉丝数越多,其在负面口碑传播中的控制能力越强,所起到的桥梁作用越大。基于实证结果提出应对措施,如关注具有"粉丝数量多"等特点的重点微博用户等,为企业处理负面网络口碑提供借鉴参考。  相似文献   

18.
Abuse of information entrusted to organizations can result in a variety of privacy violations and trust concerns for consumers. In the event of violations, a social media brand or organization renders an apology – a form of social account – to alleviate users’ concerns and maintain user membership and engagement with the platform. To explore the link between apology offered by a social media brand or organization and the users’ trust dynamics in the brand’s services, we study how organizational integrity can contribute to reducing individuals’ privacy concerns whiles increasing or repairing their trust. Drawing on organizational behavioral integrity literature, our proposed research model suggests that the persuasiveness of an apology following a data breach affects users’ trust or spillover trust through their perceptions of the degree of alignment between the words in the apology and the actions of the violating entity. Based on a survey of Facebook users, our findings show that persuasiveness of an apology has a significant impact on users’ perceptions of the alignment between the social media brand’s (i.e. Facebook) words and subsequent actions. These perceptions impact social media brand trust (i.e. users’ trust in Facebook and allied services such as Instagram). We also find that, post data breach incidence, while integrity of the social media organization partially mediates the relationship between persuasive apology and users’ trust, it fully mediates the relationship between the persuasive apology and the privacy concerns expressed by the users. However, users’ privacy concerns do not contribute much to the repair of trust needed to maintain their membership.  相似文献   

19.
Abstract

The research on online news comments has been dominated by a normative approach and has centered on media engagement. Normativity and media dominance have also featured big in the theoretical discussions on the public sphere. This article presents a case study of online news comments, combining a novel methodological testing of social network hypotheses to examine user–user interactions in online comments with a conceptual discussion of the potential connections between social network research and theories of the public. The social network analysis in this study indicated that users (online commentators) do not constitute highly dense networks, although their relations can be studied as social networks. However, this analysis can only explore limited features of this online phenomenon and requires complementary methods. From a conceptual perspective, this article confirms the role of shared issue for a potential public and also emphasizes the importance of context, actors, and meanings for understanding the public.  相似文献   

20.
Social media have been adopted by many businesses. More and more companies are using social media tools such as Facebook and Twitter to provide various services and interact with customers. As a result, a large amount of user-generated content is freely available on social media sites. To increase competitive advantage and effectively assess the competitive environment of businesses, companies need to monitor and analyze not only the customer-generated content on their own social media sites, but also the textual information on their competitors’ social media sites. In an effort to help companies understand how to perform a social media competitive analysis and transform social media data into knowledge for decision makers and e-marketers, this paper describes an in-depth case study which applies text mining to analyze unstructured text content on Facebook and Twitter sites of the three largest pizza chains: Pizza Hut, Domino's Pizza and Papa John's Pizza. The results reveal the value of social media competitive analysis and the power of text mining as an effective technique to extract business value from the vast amount of available social media data. Recommendations are also provided to help companies develop their social media competitive analysis strategy.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号