首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Organizations that respond to disasters hold unreasonable standards for data arising from technology-enabled citizen contributions. This has strong negative potential for the ability of these responding organizations to incorporate these data into appropriate decision points. We argue that the landscape of the use of social media data in crisis response is varied, with pockets of use and acceptance among organizations. In this paper we present findings from interviews conducted with representatives from large international disaster response organizations concerning their use of social media data in crisis response. We found that emergency responders already operate with less than reliable, or “good enough,” information in offline practice, and that social media data are useful to responders, but only in specific crisis situations. Also, responders do use social media, but only within their known community and extended network. This shows that trust first begins with people and not data. Lastly, we demonstrate the barriers used by responding organizations have gone beyond discussions of trustworthiness and data quality to that of more operational issues.  相似文献   

2.
This study examines how trust is related to online social institutions, self‐disclosure, mode of communication, and message privacy in a popular MMOG, Everquest II. The findings, based on survey and behavioral data from over 3,500 players, illustrate how MMOGs may support trust development. Trust was higher within closer social circles: trust was highest in teammates, followed by other players across the game, followed by others online. Self‐disclosure was positively related to trust of teammates and others in the game, while voice chat was only related to teammate trust. These findings indicate that social structures and communication processes contribute to trust development in MMOGs, supporting the claim that these online spaces provide social support that is unavailable in other societal realms.  相似文献   

3.
The motivation to share members’ knowledge is critical to an online community’s survival and success. Previous research has established that knowledge sharing intentions are based on group cohesion. Several studies also suggested that social loafing behavior will seriously corrode group cohesion. Therefore, social loafing is a key obstacle to fostering online community development. Although substantial studies have been performed on the critical factors that affect social loafing in the learning group, those on online communities are still lacking. By integrating two perspectives, social capital and perceived risk, a richer understanding of social loafing behavior can be gained. In the research model, social ties and perceived risk have been driven by anonymity, offline activities, knowledge quality, and media richness. Social ties and perceived risk are hypothesized to affect social loafing in the online community, which, in turn, is hypothesized as negatively affecting group cohesion. Data collected from 323 online users in online communities provide support for the proposed model. The study shows that social loafing is a significant negative predictor of the users’ group cohesion. The study also shows that social ties and perceived risk are important components of social loafing. Anonymity, offline activities, knowledge quality, and media richness all have strong effects on social ties and perceived risk in the online community. Implications for theory and practice and suggestions for future research are discussed.  相似文献   

4.
5.
This article examines the responses of users to home Internet of Things (IoT) services in South Korea, which is taking progressive steps in the field of IoT. It is important to investigate the user’s response because home IoT users are the core users of the IoT business. To this end, the research model includes two trust constructs — “trust in the service provider” and “institutional trust”; two risk constructs — “perceived security risk” and “perceived privacy risk”; and “perceived benefit” construct. This study has two main objectives: (1) to establish the functional relationship among the five constructs listed above; (2) to examine the moderating role of home IoT usage experience in these relationships. The study first reviews the literature on home IoT services and describes the Korean situation. Data were collected from residents living in a smart apartment complex. They were made aware of not only the benefits of home IoT but also the security and privacy risks before they moved into their new homes. The research model was empirically analyzed with structural equation modeling (SEM) using Amos 22.0. The results show that (1) “trust in the service provider” negatively influences “perceived security risk” and “perceived privacy risk” while “institutional trust” does not have a significant influence on them, (2) “perceived security risk” and “perceived privacy risk” negatively influence “perceived benefit,” and (3) “trust in service provider” does not directly influence “perceived benefit” while “institutional trust” has a positive and direct influence on it. In addition, there is a significant moderating effect of home IoT usage experience on some paths. Finally, the study’s findings and limitations are discussed, and potential avenues for future research are suggested.  相似文献   

6.
Collaboration in virtual project teams heavily relies on interpersonal trust, for which perceived professional trustworthiness is an important determinant. In face to face teams colleagues form a first impression of each others trustworthiness based on signs and signals that are ‘naturally’ available. However, virtual project team members do not have the same opportunities to assess trustworthiness. This study provides insight in the information elements that virtual project team members value to assess professional trustworthiness in the initial phase of collaboration. The trustworthiness formed initially is highly influential on interpersonal trust formed during latter collaboration. We expect trustors in virtual teams to especially value information elements (= small containers for personal data stimulating the availability of specific information) that provide them with relevant cues of trust warranting properties of a trustee. We identified a list with fifteen information elements that were highly valued across trustors (n?=?226) to inform their trustworthiness assessments. We then analyzed explanations for preferences with the help of a theory-grounded coding scheme for perceived trustworthiness. Results show that respondents value those particular information elements that provide them with multiple cues (signaling multiple trust warranting properties) to assess the trustworthiness of a trustee. Information elements that provide unique cues (signaling for a specific trust warranting property) could not be identified. Insight in these information preferences can inform the design of artefacts, such as personal profile templates, to support acquaintanceships and social awareness especially in the initial phase of a virtual project team.  相似文献   

7.
The nearly ubiquitous use of online social networks generally entails substantial personal disclosure and elicits significant privacy concerns. This research uses Social Exchange Theory and the impression management (IM) literature to examine how privacy concerns can be counterbalanced by the perceived social benefits afforded by a social network’s ability to support IM. We frame social network use as an attempt to engage in IM, and we highlight the importance of a social network’s IM affordances in predicting social benefits from, and disclosure through, a social network. We test our model with a sample of 244 Facebook users, finding support for the proposed relationships and yielding the following contributions. First, this research provides a novel positioning of perceived IM affordances as a primary driver of both perceived social benefits and IM disclosure propensity. Second, this research illuminates that trust in both the social network provider and social network peers influences privacy concerns, social benefits, and perceived IM affordances. Our theory has important implications for researchers and practitioners interested in privacy issues within social networks.  相似文献   

8.
In China, major C2C websites are focusing on increasing their customer bases by converting members of their virtual communities (VCs) into C2C buyers and sellers. This phenomenon is called e-commerce based on social networks (ENS). The current research analyzes what factors affect trust building among VC members and how this trust influences the trust in the C2C website or vendor. We propose and empirically test a model of trust in VCs based on the trust formation mechanism. Using data collected from Taobao Virtual Community, we show that familiarity, perceived similarity, structural assurance, and trust propensity are important antecedents to trust in members in VCs. Analyses of the two kinds of trust show that trust in members’ ability significantly affects three dimensions of trust in the vendor/website in terms of ability, integrity, and benevolence. In addition, trust in members’ integrity and benevolence stimulates the purchase intention and trust in the vendor/website’s ability positively affects the intention to get information and the purchase intention.  相似文献   

9.
首先依据新实体能力属性给出了初始信任度计算算法,然后根据实体的直接交互满意度与其他信任实体的推荐信息,设计了直接信任度和推荐信任度计算算法。综合三种信任度,提出了信任度计算模型。该模型为网络实体间信任关系的建立和信任行为的决策提供了有力依据,从而减少实体交互风险,提高网络运行稳定性。  相似文献   

10.
The Gezi Protests, an environmental sit‐in that turned into a social movement in Turkey, is often compared to the Arab Spring and the Occupy movement with regard to the importance attributed to social media. This paper examines the role that social media played during the protests, with an emphasis on how trust was built and maintained among the protestors. In‐depth interviews with 21 active Gezi protestors revealed that social trust and system trust were intertwined in actual practices. On one side, technological affordances worked as an interface that facilitated social identification, which helped in trusting the person behind the information. On the other side, technological affordances themselves invited different levels of trust, subject to both physical constraints and technological barriers.  相似文献   

11.
When do social media users click on sponsored content or intend to visit the website at a later time? A qualitative comparative analysis (QCA) using arguments based on herd theory, strength of ties, and social distance shows that only “likes” from socially close and knowledgeable users can consistently generate click-through or view-through intentions. Considering social tie strength in a herd behavior context, the analysis of sufficient configurations for click- and view-through intentions provides a nuanced perspective on social media user behavior and social influence. For instance, click-through intention requires observing a “like” from a close person, while view-through intentions can also develop after observing “likes” from less close acquaintances, yet in the last case only if the user assumes the acquaintance is better informed regarding the sponsored content. In addition, a “like” from a close friend deemed better informed can even make a user click on a sponsored content that was not considered valuable before.  相似文献   

12.
Social media greatly facilitate online social interaction among friends, and user behavior in social interaction may be influenced by interpersonal relationships. While individuals sometimes do enjoy the content shared by friends, they may also feel that they have a moral obligation to like what their friends share. Drawing on the stimulus-organism-response model, this paper examines whether the characteristics of interpersonal relationships are associated with moral obligation as well as whether moral obligation is associated with “like” intention. By using data from 348 users of WeChat Moments, we provide empirical evidence that the stimuli of interpersonal relationships (perceived authority, perceived closeness, and peer referent) are positively associated with the sense of moral obligation, which in turn, is positively associated with user intention to click the Like button on their friends’ postings on social media. Theoretical and practical implications of the findings are discussed.  相似文献   

13.
Little is known about internet and social media use among homeless youth. Consistent with typologies prevalent among housed youth, we found that homeless youth were using internet and social media for entertainment, sociability, and instrumental purposes. Using Haythornwaite's (2001) premise that it is important to look at the types of ties accessed in understanding the impact of new media, we found that homeless youth were predominantly using e‐mail to reach out to their parents, caseworkers, and potential employers, while, using social media to communicate with their peers. Using the “Social Capital” perspective, we found that youth who were connecting to maintained or bridging social ties were more likely to look for jobs and housing online than youth who did not.  相似文献   

14.
P2P网络下基于推荐的信任模型   总被引:3,自引:3,他引:3       下载免费PDF全文
基于推荐信任机制,引入正态概率密度函数的概念,对信任度进行描述。提出一种对信任度进行概率分析的评估方法,可动态地适应用户的安全需求,减弱在多路径推荐中由于恶意实体推荐所带来的负面影响,提高信任计算结果的稳定性。分析和模拟试验表明该模型的必要性和有效性,可以更好地解决P2P网络带来的安全问题。  相似文献   

15.
16.
This paper applies the social capital theory to construct a model for investigating the factors that influence online civic engagement behaviour on Facebook. While there is promising evidence that people are making concerted efforts to adopt Facebook to address social issues, research on their civic behaviour from a social capital viewpoint in the social media context remains limited. This study introduces new insights into how Facebook is shaping the landscape of civic engagement by examining three dimensions of social capital – social interaction ties (structural), trust (relational), and shared languages and vision (cognitive). The study contends that these dimensions will influence individuals’ online civic engagement behaviour on Facebook. We also argue that social interaction ties can engender trust, and shared languages and vision among its members, and that shared languages and vision can increase trust among Facebook members. Empirical data collected from 1233 Facebook users provide support for the proposed model. The results help in identifying the motivation underlying the online civic engagement behaviour of individuals in a public virtual community. The implications for theory and practice and future research directions are discussed.  相似文献   

17.
The concept of reputation is widely used as a measure of trustworthiness based on ratings from members in a community. The adoption of reputation systems, however, relies on their ability to capture the actual trustworthiness of a target. Several reputation models for aggregating trust information have been proposed in the literature. The choice of model has an impact on the reliability of the aggregated trust information as well as on the procedure used to compute reputations. Two prominent models are flow-based reputation (e.g., EigenTrust, PageRank) and subjective logic-based reputation. Flow-based models provide an automated method to aggregate trust information, but they are not able to express the level of uncertainty in the information. In contrast, subjective logic extends probabilistic models with an explicit notion of uncertainty, but the calculation of reputation depends on the structure of the trust network and often requires information to be discarded. These are severe drawbacks. In this work, we observe that the ‘opinion discounting’ operation in subjective logic has a number of basic problems. We resolve these problems by providing a new discounting operator that describes the flow of evidence from one party to another. The adoption of our discounting rule results in a consistent subjective logic algebra that is entirely based on the handling of evidence. We show that the new algebra enables the construction of an automated reputation assessment procedure for arbitrary trust networks, where the calculation no longer depends on the structure of the network, and does not need to throw away any information. Thus, we obtain the best of both worlds: flow-based reputation and consistent handling of uncertainties.  相似文献   

18.
Focusing on two rural cities in Minnesota, this paper analyses ways in which these communities have gone about providing information technology to their citizens. This paper will explain why one city has chosen to take an entrepreneurial approach to networking and the other city has chosen a more collaborative approach, promoting equal access for its citizens. Based on interviews, focus groups, and surveys in the two cities, we find that these divergent approaches are related to fundamental cultural differences in the two communities. One city seems to have a more pronounced reservoir of social capital, meaning that people in this community tend to be more trusting, have more cohesive social ties and are prone toward collaboration. Cooperation and social trust, particularly among community leaders, seem to have played large roles in triggering the development of a community electronic network. Moreover, we discover that political engagement and interpersonal trust among the citizenry in this city seem to be pivotal in sustaining and perpetuating the community endeavor.  相似文献   

19.
A model of a trust-based recommendation system on a social network   总被引:3,自引:0,他引:3  
In this paper, we present a model of a trust-based recommendation system on a social network. The idea of the model is that agents use their social network to reach information and their trust relationships to filter it. We investigate how the dynamics of trust among agents affect the performance of the system by comparing it to a frequency-based recommendation system. Furthermore, we identify the impact of network density, preference heterogeneity among agents, and knowledge sparseness to be crucial factors for the performance of the system. The system self-organises in a state with performance near to the optimum; the performance on the global level is an emergent property of the system, achieved without explicit coordination from the local interactions of agents.  相似文献   

20.
Social network sites (SNSs) provide a new way to organize and navigate an egocentric social network. Are they a fad, briefly popular but ultimately useless? Or are they the harbingers of a new and more powerful social world, where the ability to maintain an immense network—a social “supernet”—fundamentally changes the scale of human society? This article presents signaling theory as a conceptual framework with which to assess the transformative potential of SNSs and to guide their design to make them into more effective social tools. It shows how the costs associated with adding friends and evaluating profiles affect the reliability of users’ self‐presentation; examines strategies such as information fashion and risk‐taking; and shows how these costs and strategies affect how the publicly‐displayed social network aids the establishment of trust, identity, and cooperation—the essential foundations for an expanded social world.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号