共查询到20条相似文献,搜索用时 15 毫秒
1.
Organizations that respond to disasters hold unreasonable standards for data arising from technology-enabled citizen contributions. This has strong negative potential for the ability of these responding organizations to incorporate these data into appropriate decision points. We argue that the landscape of the use of social media data in crisis response is varied, with pockets of use and acceptance among organizations. In this paper we present findings from interviews conducted with representatives from large international disaster response organizations concerning their use of social media data in crisis response. We found that emergency responders already operate with less than reliable, or “good enough,” information in offline practice, and that social media data are useful to responders, but only in specific crisis situations. Also, responders do use social media, but only within their known community and extended network. This shows that trust first begins with people and not data. Lastly, we demonstrate the barriers used by responding organizations have gone beyond discussions of trustworthiness and data quality to that of more operational issues. 相似文献
2.
Rabindra A. Ratan Jae Eun Chung Cuihua Shen Dmitri Williams Marshall Scott Poole 《Journal of Computer-Mediated Communication》2010,16(1):93-114
This study examines how trust is related to online social institutions, self‐disclosure, mode of communication, and message privacy in a popular MMOG, Everquest II. The findings, based on survey and behavioral data from over 3,500 players, illustrate how MMOGs may support trust development. Trust was higher within closer social circles: trust was highest in teammates, followed by other players across the game, followed by others online. Self‐disclosure was positively related to trust of teammates and others in the game, while voice chat was only related to teammate trust. These findings indicate that social structures and communication processes contribute to trust development in MMOGs, supporting the claim that these online spaces provide social support that is unavailable in other societal realms. 相似文献
3.
The motivation to share members’ knowledge is critical to an online community’s survival and success. Previous research has established that knowledge sharing intentions are based on group cohesion. Several studies also suggested that social loafing behavior will seriously corrode group cohesion. Therefore, social loafing is a key obstacle to fostering online community development. Although substantial studies have been performed on the critical factors that affect social loafing in the learning group, those on online communities are still lacking. By integrating two perspectives, social capital and perceived risk, a richer understanding of social loafing behavior can be gained. In the research model, social ties and perceived risk have been driven by anonymity, offline activities, knowledge quality, and media richness. Social ties and perceived risk are hypothesized to affect social loafing in the online community, which, in turn, is hypothesized as negatively affecting group cohesion. Data collected from 323 online users in online communities provide support for the proposed model. The study shows that social loafing is a significant negative predictor of the users’ group cohesion. The study also shows that social ties and perceived risk are important components of social loafing. Anonymity, offline activities, knowledge quality, and media richness all have strong effects on social ties and perceived risk in the online community. Implications for theory and practice and suggestions for future research are discussed. 相似文献
4.
5.
Misook Lee 《International journal of human-computer interaction》2019,35(7):535-547
This article examines the responses of users to home Internet of Things (IoT) services in South Korea, which is taking progressive steps in the field of IoT. It is important to investigate the user’s response because home IoT users are the core users of the IoT business. To this end, the research model includes two trust constructs — “trust in the service provider” and “institutional trust”; two risk constructs — “perceived security risk” and “perceived privacy risk”; and “perceived benefit” construct. This study has two main objectives: (1) to establish the functional relationship among the five constructs listed above; (2) to examine the moderating role of home IoT usage experience in these relationships. The study first reviews the literature on home IoT services and describes the Korean situation. Data were collected from residents living in a smart apartment complex. They were made aware of not only the benefits of home IoT but also the security and privacy risks before they moved into their new homes. The research model was empirically analyzed with structural equation modeling (SEM) using Amos 22.0. The results show that (1) “trust in the service provider” negatively influences “perceived security risk” and “perceived privacy risk” while “institutional trust” does not have a significant influence on them, (2) “perceived security risk” and “perceived privacy risk” negatively influence “perceived benefit,” and (3) “trust in service provider” does not directly influence “perceived benefit” while “institutional trust” has a positive and direct influence on it. In addition, there is a significant moderating effect of home IoT usage experience on some paths. Finally, the study’s findings and limitations are discussed, and potential avenues for future research are suggested. 相似文献
6.
Ellen Rusman Jan van Bruggen Peter Sloep Martin Valcke Rob Koper 《Computer Supported Cooperative Work (CSCW)》2013,22(2-3):159-179
Collaboration in virtual project teams heavily relies on interpersonal trust, for which perceived professional trustworthiness is an important determinant. In face to face teams colleagues form a first impression of each others trustworthiness based on signs and signals that are ‘naturally’ available. However, virtual project team members do not have the same opportunities to assess trustworthiness. This study provides insight in the information elements that virtual project team members value to assess professional trustworthiness in the initial phase of collaboration. The trustworthiness formed initially is highly influential on interpersonal trust formed during latter collaboration. We expect trustors in virtual teams to especially value information elements (= small containers for personal data stimulating the availability of specific information) that provide them with relevant cues of trust warranting properties of a trustee. We identified a list with fifteen information elements that were highly valued across trustors (n?=?226) to inform their trustworthiness assessments. We then analyzed explanations for preferences with the help of a theory-grounded coding scheme for perceived trustworthiness. Results show that respondents value those particular information elements that provide them with multiple cues (signaling multiple trust warranting properties) to assess the trustworthiness of a trustee. Information elements that provide unique cues (signaling for a specific trust warranting property) could not be identified. Insight in these information preferences can inform the design of artefacts, such as personal profile templates, to support acquaintanceships and social awareness especially in the initial phase of a virtual project team. 相似文献
7.
Jeffrey G. Proudfoot Joseph S. Valacich Michael D. Byrd 《Behaviour & Information Technology》2018,37(1):16-37
The nearly ubiquitous use of online social networks generally entails substantial personal disclosure and elicits significant privacy concerns. This research uses Social Exchange Theory and the impression management (IM) literature to examine how privacy concerns can be counterbalanced by the perceived social benefits afforded by a social network’s ability to support IM. We frame social network use as an attempt to engage in IM, and we highlight the importance of a social network’s IM affordances in predicting social benefits from, and disclosure through, a social network. We test our model with a sample of 244 Facebook users, finding support for the proposed relationships and yielding the following contributions. First, this research provides a novel positioning of perceived IM affordances as a primary driver of both perceived social benefits and IM disclosure propensity. Second, this research illuminates that trust in both the social network provider and social network peers influences privacy concerns, social benefits, and perceived IM affordances. Our theory has important implications for researchers and practitioners interested in privacy issues within social networks. 相似文献
8.
《Electronic Commerce Research and Applications》2010,9(4):346-360
In China, major C2C websites are focusing on increasing their customer bases by converting members of their virtual communities (VCs) into C2C buyers and sellers. This phenomenon is called e-commerce based on social networks (ENS). The current research analyzes what factors affect trust building among VC members and how this trust influences the trust in the C2C website or vendor. We propose and empirically test a model of trust in VCs based on the trust formation mechanism. Using data collected from Taobao Virtual Community, we show that familiarity, perceived similarity, structural assurance, and trust propensity are important antecedents to trust in members in VCs. Analyses of the two kinds of trust show that trust in members’ ability significantly affects three dimensions of trust in the vendor/website in terms of ability, integrity, and benevolence. In addition, trust in members’ integrity and benevolence stimulates the purchase intention and trust in the vendor/website’s ability positively affects the intention to get information and the purchase intention. 相似文献
9.
10.
The Gezi Protests, an environmental sit‐in that turned into a social movement in Turkey, is often compared to the Arab Spring and the Occupy movement with regard to the importance attributed to social media. This paper examines the role that social media played during the protests, with an emphasis on how trust was built and maintained among the protestors. In‐depth interviews with 21 active Gezi protestors revealed that social trust and system trust were intertwined in actual practices. On one side, technological affordances worked as an interface that facilitated social identification, which helped in trusting the person behind the information. On the other side, technological affordances themselves invited different levels of trust, subject to both physical constraints and technological barriers. 相似文献
11.
《Information & Management》2020,57(8):103370
When do social media users click on sponsored content or intend to visit the website at a later time? A qualitative comparative analysis (QCA) using arguments based on herd theory, strength of ties, and social distance shows that only “likes” from socially close and knowledgeable users can consistently generate click-through or view-through intentions. Considering social tie strength in a herd behavior context, the analysis of sufficient configurations for click- and view-through intentions provides a nuanced perspective on social media user behavior and social influence. For instance, click-through intention requires observing a “like” from a close person, while view-through intentions can also develop after observing “likes” from less close acquaintances, yet in the last case only if the user assumes the acquaintance is better informed regarding the sponsored content. In addition, a “like” from a close friend deemed better informed can even make a user click on a sponsored content that was not considered valuable before. 相似文献
12.
《Information & Management》2020,57(7):103249
Social media greatly facilitate online social interaction among friends, and user behavior in social interaction may be influenced by interpersonal relationships. While individuals sometimes do enjoy the content shared by friends, they may also feel that they have a moral obligation to like what their friends share. Drawing on the stimulus-organism-response model, this paper examines whether the characteristics of interpersonal relationships are associated with moral obligation as well as whether moral obligation is associated with “like” intention. By using data from 348 users of WeChat Moments, we provide empirical evidence that the stimuli of interpersonal relationships (perceived authority, perceived closeness, and peer referent) are positively associated with the sense of moral obligation, which in turn, is positively associated with user intention to click the Like button on their friends’ postings on social media. Theoretical and practical implications of the findings are discussed. 相似文献
13.
Little is known about internet and social media use among homeless youth. Consistent with typologies prevalent among housed youth, we found that homeless youth were using internet and social media for entertainment, sociability, and instrumental purposes. Using Haythornwaite's (2001) premise that it is important to look at the types of ties accessed in understanding the impact of new media, we found that homeless youth were predominantly using e‐mail to reach out to their parents, caseworkers, and potential employers, while, using social media to communicate with their peers. Using the “Social Capital” perspective, we found that youth who were connecting to maintained or bridging social ties were more likely to look for jobs and housing online than youth who did not. 相似文献
14.
15.
16.
This paper applies the social capital theory to construct a model for investigating the factors that influence online civic engagement behaviour on Facebook. While there is promising evidence that people are making concerted efforts to adopt Facebook to address social issues, research on their civic behaviour from a social capital viewpoint in the social media context remains limited. This study introduces new insights into how Facebook is shaping the landscape of civic engagement by examining three dimensions of social capital – social interaction ties (structural), trust (relational), and shared languages and vision (cognitive). The study contends that these dimensions will influence individuals’ online civic engagement behaviour on Facebook. We also argue that social interaction ties can engender trust, and shared languages and vision among its members, and that shared languages and vision can increase trust among Facebook members. Empirical data collected from 1233 Facebook users provide support for the proposed model. The results help in identifying the motivation underlying the online civic engagement behaviour of individuals in a public virtual community. The implications for theory and practice and future research directions are discussed. 相似文献
17.
Boris Škorić Sebastiaan J. A. de Hoogh Nicola Zannone 《International Journal of Information Security》2016,15(4):381-402
The concept of reputation is widely used as a measure of trustworthiness based on ratings from members in a community. The adoption of reputation systems, however, relies on their ability to capture the actual trustworthiness of a target. Several reputation models for aggregating trust information have been proposed in the literature. The choice of model has an impact on the reliability of the aggregated trust information as well as on the procedure used to compute reputations. Two prominent models are flow-based reputation (e.g., EigenTrust, PageRank) and subjective logic-based reputation. Flow-based models provide an automated method to aggregate trust information, but they are not able to express the level of uncertainty in the information. In contrast, subjective logic extends probabilistic models with an explicit notion of uncertainty, but the calculation of reputation depends on the structure of the trust network and often requires information to be discarded. These are severe drawbacks. In this work, we observe that the ‘opinion discounting’ operation in subjective logic has a number of basic problems. We resolve these problems by providing a new discounting operator that describes the flow of evidence from one party to another. The adoption of our discounting rule results in a consistent subjective logic algebra that is entirely based on the handling of evidence. We show that the new algebra enables the construction of an automated reputation assessment procedure for arbitrary trust networks, where the calculation no longer depends on the structure of the network, and does not need to throw away any information. Thus, we obtain the best of both worlds: flow-based reputation and consistent handling of uncertainties. 相似文献
18.
Alina Oxendine Eugene Borgida John L. Sullivan Melinda S. Jackson 《International journal of human-computer studies》2003,58(6):671
Focusing on two rural cities in Minnesota, this paper analyses ways in which these communities have gone about providing information technology to their citizens. This paper will explain why one city has chosen to take an entrepreneurial approach to networking and the other city has chosen a more collaborative approach, promoting equal access for its citizens. Based on interviews, focus groups, and surveys in the two cities, we find that these divergent approaches are related to fundamental cultural differences in the two communities. One city seems to have a more pronounced reservoir of social capital, meaning that people in this community tend to be more trusting, have more cohesive social ties and are prone toward collaboration. Cooperation and social trust, particularly among community leaders, seem to have played large roles in triggering the development of a community electronic network. Moreover, we discover that political engagement and interpersonal trust among the citizenry in this city seem to be pivotal in sustaining and perpetuating the community endeavor. 相似文献
19.
Frank Edward Walter Stefano Battiston Frank Schweitzer 《Autonomous Agents and Multi-Agent Systems》2008,16(1):57-74
In this paper, we present a model of a trust-based recommendation system on a social network. The idea of the model is that
agents use their social network to reach information and their trust relationships to filter it. We investigate how the dynamics
of trust among agents affect the performance of the system by comparing it to a frequency-based recommendation system. Furthermore,
we identify the impact of network density, preference heterogeneity among agents, and knowledge sparseness to be crucial factors
for the performance of the system. The system self-organises in a state with performance near to the optimum; the performance
on the global level is an emergent property of the system, achieved without explicit coordination from the local interactions
of agents. 相似文献
20.
Judith Donath 《Journal of Computer-Mediated Communication》2007,13(1):231-251
Social network sites (SNSs) provide a new way to organize and navigate an egocentric social network. Are they a fad, briefly popular but ultimately useless? Or are they the harbingers of a new and more powerful social world, where the ability to maintain an immense network—a social “supernet”—fundamentally changes the scale of human society? This article presents signaling theory as a conceptual framework with which to assess the transformative potential of SNSs and to guide their design to make them into more effective social tools. It shows how the costs associated with adding friends and evaluating profiles affect the reliability of users’ self‐presentation; examines strategies such as information fashion and risk‐taking; and shows how these costs and strategies affect how the publicly‐displayed social network aids the establishment of trust, identity, and cooperation—the essential foundations for an expanded social world. 相似文献