This study analyzed how impressions are formed online depending on the type of social media and the implications that may come from the over-disclosure of information. Using a Qualtrics survey, 97 participants viewed ...This study analyzed how impressions are formed online depending on the type of social media and the implications that may come from the over-disclosure of information. Using a Qualtrics survey, 97 participants viewed the profile of a female teaching assistant on Twitter and Facebook. While there was little difference between the two social media, the use of self-disclosure on Twitter seemed slightly more inappropriate for sharing personal information.展开更多
Although today’s users of mobile phones are afforded increasing control as the popularity and richness of information provided by smartphones increases, how these users make choices and evaluations cannot be explicit...Although today’s users of mobile phones are afforded increasing control as the popularity and richness of information provided by smartphones increases, how these users make choices and evaluations cannot be explicitly expressed. This study uses an acute observation of designers of technology and aesthetics to conduct a mental-model analysis of smartphones with the purpose of explicitly identifying the differences in the schemas of users. This study also modifies the mental model to evaluate the practicability of the mental model. Hence, this study investigates groups of subjects, comparing freshmen and graduating students froma college of design, and adopts a schematized data collection and analysis approach, Interactive Qualitative Analysis (IQA), to ascertain the relationships between factors and establish a complete user mental model. The study results present 11 primary affinity factors: “Pricing,” “Advertisement,” “User Interface,” “Innovation Functions,” “System Maintenance,” “Privacy,” “Utility Functions,” “Personalization,” “Network Performance,” “Customer Service,” and “Multimedia Contents.” The primary driver in evaluating smartphones is found to be “Pricing” for graduating students and “Privacy” for freshmen. The two groups share the same final effect factor, “Multimedia Contents.” This study has successfully identified differences between the different mental models of the two groups, supporting the method that using IQA to perform a quality evaluation of social networking for smartphones is effective. Consequently, platform developers can understand user demand through a mental model and can design good platform functions to effectively improve users’ experience of smartphones.展开更多
In this work we propose a centrality measure for networks, which we refer to as Laplacian centrality, that provides a general framework for the centrality of a vertex based on the idea that the importance (or centrali...In this work we propose a centrality measure for networks, which we refer to as Laplacian centrality, that provides a general framework for the centrality of a vertex based on the idea that the importance (or centrality) of a vertex is related to the ability of the network to respond to the deactivation or removal of that vertex from the network. In particular, the Laplacian centrality of a vertex is defined as the relative drop of Laplacian energy caused by the deactivation of this vertex. The Laplacian energy of network G with?n?vertices is defined as , where ?is the eigenvalue of the Laplacian matrix of G. Other dynamics based measures such as that of Masuda and Kori and PageRank compute the importance of a node by analyzing the way paths pass through a node while our measure captures this information as well as the way these paths are “redistributed” when the node is deleted. The validity and robustness of this new measure are illustrated on two different terrorist social network data sets and 84 networks in James Moody’s Add Health in school friendship nomination data, and is compared with other standard centrality measures.展开更多
Goal of this research is to suggest a typology of verbal aggressiveness, argumentativeness and motivational climate influence, pointing out examples of complementary types (namely containing no identical components) a...Goal of this research is to suggest a typology of verbal aggressiveness, argumentativeness and motivational climate influence, pointing out examples of complementary types (namely containing no identical components) and nested types (containing identical components). Complete network analysis was conducted in a student class at the Dept. of Physical Education and Sport Sciences, University of Thessaly (N = 66). Standardized questionnaires were used. Network analysis and Principal Component Analysis were implemented using Visone software and SPSS, respectively. Main results were: in the typology of targeting, parameters of motivation climate, verbal aggressiveness and argumentativeness were combined in several types (“affable ambitious”, “isolated victim”, “isolated ambitious”, “lightly victimized” and “severely victimized”) which were partially complementary and partially nested into each other. These depict student profiles vary from quite socialized and invulnerable to only isolated and victimized. They also reveal the significance of seeking knowledge acquirement vs. performance. The typology of general involvement (in- and out-degree) contains types tending to be rather nested into each other than complementary which varies from quite integrative to purely deconstructive appearance. This typology depicts the connection of motivation climate (and the subsequently induced familiarity) with verbal aggressiveness without diminishing susceptibility to argumentation. The fact that the typology of targeting is composed of several complementary types while in the typology of general involvement mainly of nested ones, can be attributed to the structural clarity of the former ones (a typology focusing展开更多
Aim of this research is to explore the relation of hunting with aggressiveness. For this purpose, two samples of prison inmates (who were students of the prison secondary school) were collected (class A = 23, class B ...Aim of this research is to explore the relation of hunting with aggressiveness. For this purpose, two samples of prison inmates (who were students of the prison secondary school) were collected (class A = 23, class B = 12). The network indicators for superficial, idiosyncratic and strategic behavior (particularly, aggressiveness), applied in Bekiari and Hasanagas (2016), which were based on the primary network variables (outdegree, indegree, Katz status, pagerank, authority) were used. Non-network variables were also used for the criminal profile of the inmates. The data were sampled with questionnaire. Spearman test was conducted for detecting correlation between aggressiveness and hunting and Principal Component Analysis was used for formulating a typology. The following results were produced: The criminal profile seems hardly to be related with hunting experience or attitude. The relation of hunting experience and attitude with the superficial, idiosyncratic and strategic aggressiveness was examined. These three occasions of aggressiveness are expected to describe the incidental reaction, impulsive and adaptive reaction, respectively. The hunting is quite irrelevant to the incidental reaction. The impulsiveness seems to be more strongly correlated with hunting. In case of adaptiveness, there are many similarities with impulsiveness. The typology which is based on the existence (or not) of hunting experience seems to be more insightful, as it reveals a gradual involvement of aggressiveness dimensions, from incidentality to impulsiveness and further to adaptiveness. The following behavioral patterns of gradually enhanced aggressiveness appear: incidentally just provoking, impulsively being aggressive but without harming, and adaptively being aggressive and harming.展开更多
The current study uses a longitudinal, mixed-method approach to investigate the role that new media, such as social networking sites and video chat, play in cross-cultural adaptation and international student friendsh...The current study uses a longitudinal, mixed-method approach to investigate the role that new media, such as social networking sites and video chat, play in cross-cultural adaptation and international student friendship network development. Results indicate that international students significantly increase and adapt their new media use while abroad to communicate globally with their friends and family, and locally with their newly formed relationships. Furthermore, social networking site host national friends do not necessarily lead to the development of face-to-face host national friends;however, interaction with established face-to-face host national friends and friend groups via new media platforms leads to an increased understanding of host communication patterns. Finally, this study proposes that researchers who apply Kim’s [1] cross-cultural adaptation theory consider incorporating Host New Media Communication as a principal concept.展开更多
There are currently many approaches to identify the community structure of a network, but relatively few specific to detect overlapping community structures. Likewise, there are few networks with ground truth overlapp...There are currently many approaches to identify the community structure of a network, but relatively few specific to detect overlapping community structures. Likewise, there are few networks with ground truth overlapping nodes. For this reason,we introduce a new network, Pilgrim, with known overlapping nodes, and a new genetic algorithm for detecting such nodes. Pilgrim is comprised of a variety of structures including two communities with dense overlap,which is common in real social structures. This study initially explores the potential of the community detection algorithm LabelRank for consistent overlap detection;however, the deterministic nature of this algorithm restricts it to very few candidate solutions. Therefore, we propose a genetic algorithm using a restricted edge-based clustering technique to detect overlapping communities by maximizing an efficient overlapping modularity function. The proposed restriction to the edge-based representation precludes the possibility of disjoint communities, thereby, dramatically reducing the search space and decreasing the number of generations required to produce an optimal solution. A tunable parameterr allows the strictness of the definition of overlap to be adjusted allowing for refinement in the number of identified overlapping nodes. Our method, tested on several real social networks, yields results comparable to the most effective overlapping community detection algorithms to date.展开更多
Aim of this research is the detection of aggressive communication parameters and typology. A network sample of 62 students (male = 32, female = 30) and 4 instructors (male = 2, female = 2) at the physical education an...Aim of this research is the detection of aggressive communication parameters and typology. A network sample of 62 students (male = 32, female = 30) and 4 instructors (male = 2, female = 2) at the physical education and sport sciences dept. at the University of Thessaly has been collected in 2016. A standardized questionnaire consisting of network and non-network part was used. Social network analysis (algebraic analysis) combined with conventional statistics has been used. Basic results are the following ones: Persons dedicated to sport appear to target others and be targeted. Dedication to study content is proved to play a role of a refuge against criticism. High grade and ambition seem to protect against negative comments. Physical qualification (tallness) seems also to discourage rudeness. Spatial-regional discrimination is also revealed. Mockery seems to be even a cause of absence from the courses. A superiority-induced aggressiveness (on economic basis) has been detected. Threat may be regarded as a behavioral extension of mockery (or inversely). In the course of study time, more aggressive persons emerge who even threat others. High grade students are unattractive for arguing. Internet seems to develop communication stimuli. The tendency for professional distinction is connected with arguing. Younger students show an integration deficit in terms of argumentation. Communicational types (three profiles of targets: “depreciated assaulted”, “attractive”, “repellent”, and two profiles of general involvement: “lively”, “controversial”) have emerged. A typology of targets is depicting a sharper fragmentation than a typology of general involvement (targeted and acting).展开更多
Different approaches have been established for applications of social and complex networks involving biological systems, passing through collaborative systems in knowledge networks and organizational systems. In this ...Different approaches have been established for applications of social and complex networks involving biological systems, passing through collaborative systems in knowledge networks and organizational systems. In this latter application, we highlight the studies focused on the diffusion of information and knowledge in networks. However, most of the time, the propagation of information in these networks and the resulting process of creation and diffusion of knowledge, have been studied from static perspectives. Additionally, the very concept of diffusion inevitably implies the inclusion of the temporal dimension, due to that it is an essentially dynamic process. Although static analysis provides an important perspective in structural terms, the behavioral view that reflects the evolution of the relationships of the members of these networks over time is best described by temporal networks. Thus, it is possible to analyze both the information flow and the structural changes that occur over time, which influences the dynamics of the creation and diffusion of knowledge. This article describes the computational modeling used to elucidate the creation and diffusion of knowledge in temporal networks formed to execute software maintenance and construction projects, for the period between 2007 and 2013, in the SERVIÇO FEDERAL DE PROCESSAMENTO DE DADOS (FEDERAL DATA PROCESSING SERVICE-SERPRO)—a public organization that provides information and communication technology services. The methodological approach adopted for the study was based on techniques for analyzing social and complex networks and on the complementary extensions that address temporal modeling of these networks. We present an exploratory longitudinal study that enabled a dynamic and structural analysis of the knowledge networks formed by members of software maintenance and development project teams between 2007 and 2013. The study enabled identification of knowledge categories throughout this period, in addition to the determination that the networks have a structure with small-world and scale-free models. Finally, we concluded that, in general, the topologies of the networks studies had characteristics for facilitating the flow of knowledge within the organization.展开更多
Various networks exist in the world today including biological, social, information, and communication networks with the Internet as the largest network of all. One salient structural feature of these networks is the ...Various networks exist in the world today including biological, social, information, and communication networks with the Internet as the largest network of all. One salient structural feature of these networks is the formation of groups or communities of vertices that tend to be more connected to each other within the same group than to those outside. Therefore, the detection of these communities is a topic of great interest and importance in many applications and different algorithms including label propagation have been developed for such purpose. Speaker-listener label propagation algorithm (SLPA) enjoys almost linear time complexity, so desirable in dealing with large networks. As an extension of SLPA, this study presented a novel weighted label propagation algorithm (WLPA), which was tested on four real world social networks with known community structures including the famous Zachary's karate club network. Wilcoxon tests on the communities found in the karate club network by WLPA demonstrated an improved statistical significance over SLPA. Withthehelp of Wilcoxon tests again, we were able to determine the best possible formation of two communities in this network relative to the ground truth partition, which could be used as a new benchmark for assessing community detection algorithms. Finally WLPA predicted better communities than SLPA in two of the three additional real social networks, when compared to the ground truth.展开更多
Although adults in romantic relationships currently show more openness to online sexual behaviors [1], these behaviors can nevertheless increase couple conflicts and instability [2]. In the current study, we assess th...Although adults in romantic relationships currently show more openness to online sexual behaviors [1], these behaviors can nevertheless increase couple conflicts and instability [2]. In the current study, we assess the mediating role of Internet pornography use and cyber infidelity in the relationship between 1) personality and attachment, and 2) couple and sexual satisfaction. A total of 779 participants in couple relationships (average age = 29.9 years) completed a series of online questionnaires. According to their responses, 65% of participants visited an adult site at least once during the six months preceding the study, while 16.3% did so multiple times per week. Path model results showed that Internet pornography use and cyber infidelity were sequential mediators between, on the one hand, personality and attachment, and on the other hand, couple and sexual satisfaction. The discussion highlights the importance of properly documenting the correlates of online sexual behavior to better understand new couple realities and dynamics.展开更多
The rapid growth of social networks has produced an unprecedented amount of user-generated data, which provides an excellent opportunity for text mining. Sentiment analysis, an important part of text mining, attempts ...The rapid growth of social networks has produced an unprecedented amount of user-generated data, which provides an excellent opportunity for text mining. Sentiment analysis, an important part of text mining, attempts to learn about the authors’ opinion on a text through its content and structure. Such information is particularly valuable for determining the overall opinion of a large number of people. Examples of the usefulness of this are predicting box office sales or stock prices. One of the most accessible sources of user-generated data is Twitter, which makes the majority of its user data freely available through its data access API. In this study we seek to predict a sentiment value for stock related tweets on Twitter, and demonstrate a correlation between this sentiment and the movement of a company’s stock price in a real time streaming environment. Both n-gram and “word2vec” textual representation techniques are used alongside a random forest classification algorithm to predict the sentiment of tweets. These values are then evaluated for correlation between stock prices and Twitter sentiment for that each company. There are significant correlations between price and sentiment for several individual companies. Some companies such as Microsoft and Walmart show strong positive correlation, while others such as Goldman Sachs and Cisco Systems show strong negative correlation. This suggests that consumer facing companies are affected differently than other companies. Overall this appears to be a promising field for future research.展开更多
The growing update of computer and global technology provides the raw energy for college English teaching to start a revolution and development. How to deal with the teaching methods by using computer network to build...The growing update of computer and global technology provides the raw energy for college English teaching to start a revolution and development. How to deal with the teaching methods by using computer network to build a pluralistic system of interactive teaching for college English curriculum is a serious problem. This paper combines the characteristics of college English teaching, exploring the teaching ways of teaching mode and multi-interaction network of college English. Besides, it also reviews the evidence which is based on independent learning theory and several learning models, analyses the relationship between the advantages of computer network teaching and learning ability of students and enhances the benefits between teaching in practice and computer networks teaching. According to the research and survey of the College English Teaching Model of a University, it validated the role in promoting new teaching model to improve students’ self-learning ability.展开更多
In many cases randomness in community detection algorithms has been avoided due to issues with stability. Indeed replacing random ordering with centrality rankings has improved the performance of some techniques such ...In many cases randomness in community detection algorithms has been avoided due to issues with stability. Indeed replacing random ordering with centrality rankings has improved the performance of some techniques such as Label Propagation Algorithms. This study evaluates the effects of such orderings on the Speaker-listener Label Propagation Algorithm or SLPA, a modification of LPA which has already been stabilized through alternate means. This study demonstrates that in cases where stability has been achieved without eliminating randomness, the result of removing random ordering is over fitting and bias. The results of testing seven various measures of centrality in conjunction with SLPA across five social network graphs indicate that while certain measures outperform random orderings on certain graphs, random orderings have the highest overall accuracy. This is particularly true when strict orderings are used in each run. These results indicate that the more evenly distributed solution space which results from complete random ordering is more valuable than the more targeted search that results from centrality orderings.展开更多
Based on the social network analysis methods and human network, this paper randomly selected 44 students (31 males and 13 females) as the research objects, and it used the UCINET software to analyze the friendship bet...Based on the social network analysis methods and human network, this paper randomly selected 44 students (31 males and 13 females) as the research objects, and it used the UCINET software to analyze the friendship between them of which 43 used WeChat and 44 used QQ, and it also used the tool Netdraw to visualize the network sociogram. By mining the four aspects of density, accessibility, centrality, block model, the results demonstrated that QQ social network and WeChat social network existed the phenomenon of small world, leaders and subgroups, and the key nodes of QQ human network were more than WeChat network. Through using the key nodes, it can push the precise and efficient information and improve the accuracy of information transmission and impact among network members.展开更多
Among mobile users, ad-hoc social network (ASN) is becoming a popular platform to connect and share their interests anytime anywhere. Many researchers and computer scientists investigated ASN architecture, implementat...Among mobile users, ad-hoc social network (ASN) is becoming a popular platform to connect and share their interests anytime anywhere. Many researchers and computer scientists investigated ASN architecture, implementation, user experience, and different profile matching algorithms to provide better user experience in ad-hoc social network. We emphasize that strength of an ad-hoc social network depends on a good profile-matching algorithm that provides meaningful friend suggestions in proximity. Keeping browsing history is a good way to determine user’s interest, however, interests change with location. This paper presents a novel profile-matching algorithm for automatically building a user profile based on dynamic GPS (Global Positing System) location and browsing history of users. Building user profile based on GPS location of a user provides benefits to ASN users as this profile represents user’s dynamic interests that keep changing with location e.g. office, home, or some other location. Proposed profile-matching algorithm maintains multiple local profiles based on location of mobile device.展开更多
Supply chain management is an integrated management method for solving these effective problems which were integrated in existing resources with the overall competitiveness and theirs effects. The supply chain integra...Supply chain management is an integrated management method for solving these effective problems which were integrated in existing resources with the overall competitiveness and theirs effects. The supply chain integration and innovation models are proposed with the development and current situation for these global Chinese businessmen. The supply chain integration is given in order to optimize for the culture of Chinese business management. It is established that these practice network platform for supply chain management are presented service for Chinese businessmen. And they are realized these integration innovation in the logistics system, financial system, Chinese business culture system, production manufacturing system, and customer service system. These suggestions are provided for the development of Chinese business culture in supply chain theory. These further forward Chinese culture are given some fruitful reference for con- structing a new development for the world Chinese businessmen’s culture management.展开更多
Goal of this research is to detect possible relations between animal-related attitudes and verbal aggressiveness as well as types combining such parameters. The sample collected in 2015 contains two adult education cl...Goal of this research is to detect possible relations between animal-related attitudes and verbal aggressiveness as well as types combining such parameters. The sample collected in 2015 contains two adult education classes equivalent to secondary school level (class A = 23 inmates and B = 12 inmates, all male) at a correctional facility. Questionnaires were used. Network analysis software (Visone) and conventional statistics (SPSS) are used for calculating network variables (indegree, outdegree, katz, pageranketc) and implementing Spearman test and Principal Component Analysis. Inmates who have adopted an animal-friendly value system and are too coward to react against torture of animals, maintain a repressed emotion. If they do not intervene and provoke, then they are also not targeted by others. No reaction against torture is also connected with a deep-rooted aggressiveness. Concerning superficial aggressiveness, a profile, whose characterize is multiple verbal aggressiveness, can be attributed to repressed emotions. A type is torturing and indifferently restricts his aggressiveness, as he can satisfy his need of dominance by being aggressive towards animals. A type of inmate who loves animals and reacts against their torture, presents the most restricted and relatively smooth aggressiveness, as he discharges his repressed emotions to this reaction. Under condition of indifference, keeping pets is not evidence of loving but of a need of companionship. As for the deep-rooted aggressiveness (over-extroversion), it does not seem to be triggered by any repression.展开更多
The objective of this research is to present a systematic analysis, in which we seek to identify the concepts of intelligent city, with the intention of recognizing the nature of this intelligence before the participa...The objective of this research is to present a systematic analysis, in which we seek to identify the concepts of intelligent city, with the intention of recognizing the nature of this intelligence before the participation of the population. Therefore, the research associates concepts as smart cities, citizen participation and social web, identifying publications between 2012 and the first quarter of 2018 and questioning what the intelligent city is and how this concept is able to (re)organize the learning processes of the territory from the informal dynamics of the contemporary city. The qualitative analysis of the documents revealed an innumerable of definitions and related terms: smart, intelligent, ubiquitous, digital, knowledge, sustainable, crowd sourcing, innovative;structured in three types of approaches: technological focus, focus on human resources and focus on citizen-related governance from the following domains: media convergence, public and regulatory information policies, infrastructure management, real-time data mining and extraction, geographic information system, crowd computing, smart cities education, and social monitoring and control. In spite of the access to a great amount of data, we verify that the concept of intelligent city is referenced by a significant number of researches, but, in smaller number, works that present models of construction of a collective intelligence for the city. From this perspective, we identified the need to recognize technological education interventions for communication between individuals and the city. Because we believe that only through the implementation and management of techno-educommunication ecosystems will be able to promote a culture of participation.展开更多
After the occurrence of unexpected group events of network, the relevant opinion information will spread rapidly through micro-blog, and the negative public opinion information will aggravate the unexpected the group ...After the occurrence of unexpected group events of network, the relevant opinion information will spread rapidly through micro-blog, and the negative public opinion information will aggravate the unexpected the group events to upgrade and expand the scope of harm. It is difficult to deal. So public opinion control is very important. In this paper, we establish an influence model for spreading of public opinion based on SIR model. Through the political analysis, this paper finds that the network group events will subside, but the influence scope, time and ability of event cannot be ignored. As a result of this study, the corresponding strategies are put forward in this paper.展开更多
文摘This study analyzed how impressions are formed online depending on the type of social media and the implications that may come from the over-disclosure of information. Using a Qualtrics survey, 97 participants viewed the profile of a female teaching assistant on Twitter and Facebook. While there was little difference between the two social media, the use of self-disclosure on Twitter seemed slightly more inappropriate for sharing personal information.
文摘Although today’s users of mobile phones are afforded increasing control as the popularity and richness of information provided by smartphones increases, how these users make choices and evaluations cannot be explicitly expressed. This study uses an acute observation of designers of technology and aesthetics to conduct a mental-model analysis of smartphones with the purpose of explicitly identifying the differences in the schemas of users. This study also modifies the mental model to evaluate the practicability of the mental model. Hence, this study investigates groups of subjects, comparing freshmen and graduating students froma college of design, and adopts a schematized data collection and analysis approach, Interactive Qualitative Analysis (IQA), to ascertain the relationships between factors and establish a complete user mental model. The study results present 11 primary affinity factors: “Pricing,” “Advertisement,” “User Interface,” “Innovation Functions,” “System Maintenance,” “Privacy,” “Utility Functions,” “Personalization,” “Network Performance,” “Customer Service,” and “Multimedia Contents.” The primary driver in evaluating smartphones is found to be “Pricing” for graduating students and “Privacy” for freshmen. The two groups share the same final effect factor, “Multimedia Contents.” This study has successfully identified differences between the different mental models of the two groups, supporting the method that using IQA to perform a quality evaluation of social networking for smartphones is effective. Consequently, platform developers can understand user demand through a mental model and can design good platform functions to effectively improve users’ experience of smartphones.
文摘In this work we propose a centrality measure for networks, which we refer to as Laplacian centrality, that provides a general framework for the centrality of a vertex based on the idea that the importance (or centrality) of a vertex is related to the ability of the network to respond to the deactivation or removal of that vertex from the network. In particular, the Laplacian centrality of a vertex is defined as the relative drop of Laplacian energy caused by the deactivation of this vertex. The Laplacian energy of network G with?n?vertices is defined as , where ?is the eigenvalue of the Laplacian matrix of G. Other dynamics based measures such as that of Masuda and Kori and PageRank compute the importance of a node by analyzing the way paths pass through a node while our measure captures this information as well as the way these paths are “redistributed” when the node is deleted. The validity and robustness of this new measure are illustrated on two different terrorist social network data sets and 84 networks in James Moody’s Add Health in school friendship nomination data, and is compared with other standard centrality measures.
文摘Goal of this research is to suggest a typology of verbal aggressiveness, argumentativeness and motivational climate influence, pointing out examples of complementary types (namely containing no identical components) and nested types (containing identical components). Complete network analysis was conducted in a student class at the Dept. of Physical Education and Sport Sciences, University of Thessaly (N = 66). Standardized questionnaires were used. Network analysis and Principal Component Analysis were implemented using Visone software and SPSS, respectively. Main results were: in the typology of targeting, parameters of motivation climate, verbal aggressiveness and argumentativeness were combined in several types (“affable ambitious”, “isolated victim”, “isolated ambitious”, “lightly victimized” and “severely victimized”) which were partially complementary and partially nested into each other. These depict student profiles vary from quite socialized and invulnerable to only isolated and victimized. They also reveal the significance of seeking knowledge acquirement vs. performance. The typology of general involvement (in- and out-degree) contains types tending to be rather nested into each other than complementary which varies from quite integrative to purely deconstructive appearance. This typology depicts the connection of motivation climate (and the subsequently induced familiarity) with verbal aggressiveness without diminishing susceptibility to argumentation. The fact that the typology of targeting is composed of several complementary types while in the typology of general involvement mainly of nested ones, can be attributed to the structural clarity of the former ones (a typology focusing
文摘Aim of this research is to explore the relation of hunting with aggressiveness. For this purpose, two samples of prison inmates (who were students of the prison secondary school) were collected (class A = 23, class B = 12). The network indicators for superficial, idiosyncratic and strategic behavior (particularly, aggressiveness), applied in Bekiari and Hasanagas (2016), which were based on the primary network variables (outdegree, indegree, Katz status, pagerank, authority) were used. Non-network variables were also used for the criminal profile of the inmates. The data were sampled with questionnaire. Spearman test was conducted for detecting correlation between aggressiveness and hunting and Principal Component Analysis was used for formulating a typology. The following results were produced: The criminal profile seems hardly to be related with hunting experience or attitude. The relation of hunting experience and attitude with the superficial, idiosyncratic and strategic aggressiveness was examined. These three occasions of aggressiveness are expected to describe the incidental reaction, impulsive and adaptive reaction, respectively. The hunting is quite irrelevant to the incidental reaction. The impulsiveness seems to be more strongly correlated with hunting. In case of adaptiveness, there are many similarities with impulsiveness. The typology which is based on the existence (or not) of hunting experience seems to be more insightful, as it reveals a gradual involvement of aggressiveness dimensions, from incidentality to impulsiveness and further to adaptiveness. The following behavioral patterns of gradually enhanced aggressiveness appear: incidentally just provoking, impulsively being aggressive but without harming, and adaptively being aggressive and harming.
文摘The current study uses a longitudinal, mixed-method approach to investigate the role that new media, such as social networking sites and video chat, play in cross-cultural adaptation and international student friendship network development. Results indicate that international students significantly increase and adapt their new media use while abroad to communicate globally with their friends and family, and locally with their newly formed relationships. Furthermore, social networking site host national friends do not necessarily lead to the development of face-to-face host national friends;however, interaction with established face-to-face host national friends and friend groups via new media platforms leads to an increased understanding of host communication patterns. Finally, this study proposes that researchers who apply Kim’s [1] cross-cultural adaptation theory consider incorporating Host New Media Communication as a principal concept.
文摘There are currently many approaches to identify the community structure of a network, but relatively few specific to detect overlapping community structures. Likewise, there are few networks with ground truth overlapping nodes. For this reason,we introduce a new network, Pilgrim, with known overlapping nodes, and a new genetic algorithm for detecting such nodes. Pilgrim is comprised of a variety of structures including two communities with dense overlap,which is common in real social structures. This study initially explores the potential of the community detection algorithm LabelRank for consistent overlap detection;however, the deterministic nature of this algorithm restricts it to very few candidate solutions. Therefore, we propose a genetic algorithm using a restricted edge-based clustering technique to detect overlapping communities by maximizing an efficient overlapping modularity function. The proposed restriction to the edge-based representation precludes the possibility of disjoint communities, thereby, dramatically reducing the search space and decreasing the number of generations required to produce an optimal solution. A tunable parameterr allows the strictness of the definition of overlap to be adjusted allowing for refinement in the number of identified overlapping nodes. Our method, tested on several real social networks, yields results comparable to the most effective overlapping community detection algorithms to date.
文摘Aim of this research is the detection of aggressive communication parameters and typology. A network sample of 62 students (male = 32, female = 30) and 4 instructors (male = 2, female = 2) at the physical education and sport sciences dept. at the University of Thessaly has been collected in 2016. A standardized questionnaire consisting of network and non-network part was used. Social network analysis (algebraic analysis) combined with conventional statistics has been used. Basic results are the following ones: Persons dedicated to sport appear to target others and be targeted. Dedication to study content is proved to play a role of a refuge against criticism. High grade and ambition seem to protect against negative comments. Physical qualification (tallness) seems also to discourage rudeness. Spatial-regional discrimination is also revealed. Mockery seems to be even a cause of absence from the courses. A superiority-induced aggressiveness (on economic basis) has been detected. Threat may be regarded as a behavioral extension of mockery (or inversely). In the course of study time, more aggressive persons emerge who even threat others. High grade students are unattractive for arguing. Internet seems to develop communication stimuli. The tendency for professional distinction is connected with arguing. Younger students show an integration deficit in terms of argumentation. Communicational types (three profiles of targets: “depreciated assaulted”, “attractive”, “repellent”, and two profiles of general involvement: “lively”, “controversial”) have emerged. A typology of targets is depicting a sharper fragmentation than a typology of general involvement (targeted and acting).
文摘Different approaches have been established for applications of social and complex networks involving biological systems, passing through collaborative systems in knowledge networks and organizational systems. In this latter application, we highlight the studies focused on the diffusion of information and knowledge in networks. However, most of the time, the propagation of information in these networks and the resulting process of creation and diffusion of knowledge, have been studied from static perspectives. Additionally, the very concept of diffusion inevitably implies the inclusion of the temporal dimension, due to that it is an essentially dynamic process. Although static analysis provides an important perspective in structural terms, the behavioral view that reflects the evolution of the relationships of the members of these networks over time is best described by temporal networks. Thus, it is possible to analyze both the information flow and the structural changes that occur over time, which influences the dynamics of the creation and diffusion of knowledge. This article describes the computational modeling used to elucidate the creation and diffusion of knowledge in temporal networks formed to execute software maintenance and construction projects, for the period between 2007 and 2013, in the SERVIÇO FEDERAL DE PROCESSAMENTO DE DADOS (FEDERAL DATA PROCESSING SERVICE-SERPRO)—a public organization that provides information and communication technology services. The methodological approach adopted for the study was based on techniques for analyzing social and complex networks and on the complementary extensions that address temporal modeling of these networks. We present an exploratory longitudinal study that enabled a dynamic and structural analysis of the knowledge networks formed by members of software maintenance and development project teams between 2007 and 2013. The study enabled identification of knowledge categories throughout this period, in addition to the determination that the networks have a structure with small-world and scale-free models. Finally, we concluded that, in general, the topologies of the networks studies had characteristics for facilitating the flow of knowledge within the organization.
文摘Various networks exist in the world today including biological, social, information, and communication networks with the Internet as the largest network of all. One salient structural feature of these networks is the formation of groups or communities of vertices that tend to be more connected to each other within the same group than to those outside. Therefore, the detection of these communities is a topic of great interest and importance in many applications and different algorithms including label propagation have been developed for such purpose. Speaker-listener label propagation algorithm (SLPA) enjoys almost linear time complexity, so desirable in dealing with large networks. As an extension of SLPA, this study presented a novel weighted label propagation algorithm (WLPA), which was tested on four real world social networks with known community structures including the famous Zachary's karate club network. Wilcoxon tests on the communities found in the karate club network by WLPA demonstrated an improved statistical significance over SLPA. Withthehelp of Wilcoxon tests again, we were able to determine the best possible formation of two communities in this network relative to the ground truth partition, which could be used as a new benchmark for assessing community detection algorithms. Finally WLPA predicted better communities than SLPA in two of the three additional real social networks, when compared to the ground truth.
文摘Although adults in romantic relationships currently show more openness to online sexual behaviors [1], these behaviors can nevertheless increase couple conflicts and instability [2]. In the current study, we assess the mediating role of Internet pornography use and cyber infidelity in the relationship between 1) personality and attachment, and 2) couple and sexual satisfaction. A total of 779 participants in couple relationships (average age = 29.9 years) completed a series of online questionnaires. According to their responses, 65% of participants visited an adult site at least once during the six months preceding the study, while 16.3% did so multiple times per week. Path model results showed that Internet pornography use and cyber infidelity were sequential mediators between, on the one hand, personality and attachment, and on the other hand, couple and sexual satisfaction. The discussion highlights the importance of properly documenting the correlates of online sexual behavior to better understand new couple realities and dynamics.
文摘The rapid growth of social networks has produced an unprecedented amount of user-generated data, which provides an excellent opportunity for text mining. Sentiment analysis, an important part of text mining, attempts to learn about the authors’ opinion on a text through its content and structure. Such information is particularly valuable for determining the overall opinion of a large number of people. Examples of the usefulness of this are predicting box office sales or stock prices. One of the most accessible sources of user-generated data is Twitter, which makes the majority of its user data freely available through its data access API. In this study we seek to predict a sentiment value for stock related tweets on Twitter, and demonstrate a correlation between this sentiment and the movement of a company’s stock price in a real time streaming environment. Both n-gram and “word2vec” textual representation techniques are used alongside a random forest classification algorithm to predict the sentiment of tweets. These values are then evaluated for correlation between stock prices and Twitter sentiment for that each company. There are significant correlations between price and sentiment for several individual companies. Some companies such as Microsoft and Walmart show strong positive correlation, while others such as Goldman Sachs and Cisco Systems show strong negative correlation. This suggests that consumer facing companies are affected differently than other companies. Overall this appears to be a promising field for future research.
文摘The growing update of computer and global technology provides the raw energy for college English teaching to start a revolution and development. How to deal with the teaching methods by using computer network to build a pluralistic system of interactive teaching for college English curriculum is a serious problem. This paper combines the characteristics of college English teaching, exploring the teaching ways of teaching mode and multi-interaction network of college English. Besides, it also reviews the evidence which is based on independent learning theory and several learning models, analyses the relationship between the advantages of computer network teaching and learning ability of students and enhances the benefits between teaching in practice and computer networks teaching. According to the research and survey of the College English Teaching Model of a University, it validated the role in promoting new teaching model to improve students’ self-learning ability.
文摘In many cases randomness in community detection algorithms has been avoided due to issues with stability. Indeed replacing random ordering with centrality rankings has improved the performance of some techniques such as Label Propagation Algorithms. This study evaluates the effects of such orderings on the Speaker-listener Label Propagation Algorithm or SLPA, a modification of LPA which has already been stabilized through alternate means. This study demonstrates that in cases where stability has been achieved without eliminating randomness, the result of removing random ordering is over fitting and bias. The results of testing seven various measures of centrality in conjunction with SLPA across five social network graphs indicate that while certain measures outperform random orderings on certain graphs, random orderings have the highest overall accuracy. This is particularly true when strict orderings are used in each run. These results indicate that the more evenly distributed solution space which results from complete random ordering is more valuable than the more targeted search that results from centrality orderings.
文摘Based on the social network analysis methods and human network, this paper randomly selected 44 students (31 males and 13 females) as the research objects, and it used the UCINET software to analyze the friendship between them of which 43 used WeChat and 44 used QQ, and it also used the tool Netdraw to visualize the network sociogram. By mining the four aspects of density, accessibility, centrality, block model, the results demonstrated that QQ social network and WeChat social network existed the phenomenon of small world, leaders and subgroups, and the key nodes of QQ human network were more than WeChat network. Through using the key nodes, it can push the precise and efficient information and improve the accuracy of information transmission and impact among network members.
文摘Among mobile users, ad-hoc social network (ASN) is becoming a popular platform to connect and share their interests anytime anywhere. Many researchers and computer scientists investigated ASN architecture, implementation, user experience, and different profile matching algorithms to provide better user experience in ad-hoc social network. We emphasize that strength of an ad-hoc social network depends on a good profile-matching algorithm that provides meaningful friend suggestions in proximity. Keeping browsing history is a good way to determine user’s interest, however, interests change with location. This paper presents a novel profile-matching algorithm for automatically building a user profile based on dynamic GPS (Global Positing System) location and browsing history of users. Building user profile based on GPS location of a user provides benefits to ASN users as this profile represents user’s dynamic interests that keep changing with location e.g. office, home, or some other location. Proposed profile-matching algorithm maintains multiple local profiles based on location of mobile device.
文摘Supply chain management is an integrated management method for solving these effective problems which were integrated in existing resources with the overall competitiveness and theirs effects. The supply chain integration and innovation models are proposed with the development and current situation for these global Chinese businessmen. The supply chain integration is given in order to optimize for the culture of Chinese business management. It is established that these practice network platform for supply chain management are presented service for Chinese businessmen. And they are realized these integration innovation in the logistics system, financial system, Chinese business culture system, production manufacturing system, and customer service system. These suggestions are provided for the development of Chinese business culture in supply chain theory. These further forward Chinese culture are given some fruitful reference for con- structing a new development for the world Chinese businessmen’s culture management.
文摘Goal of this research is to detect possible relations between animal-related attitudes and verbal aggressiveness as well as types combining such parameters. The sample collected in 2015 contains two adult education classes equivalent to secondary school level (class A = 23 inmates and B = 12 inmates, all male) at a correctional facility. Questionnaires were used. Network analysis software (Visone) and conventional statistics (SPSS) are used for calculating network variables (indegree, outdegree, katz, pageranketc) and implementing Spearman test and Principal Component Analysis. Inmates who have adopted an animal-friendly value system and are too coward to react against torture of animals, maintain a repressed emotion. If they do not intervene and provoke, then they are also not targeted by others. No reaction against torture is also connected with a deep-rooted aggressiveness. Concerning superficial aggressiveness, a profile, whose characterize is multiple verbal aggressiveness, can be attributed to repressed emotions. A type is torturing and indifferently restricts his aggressiveness, as he can satisfy his need of dominance by being aggressive towards animals. A type of inmate who loves animals and reacts against their torture, presents the most restricted and relatively smooth aggressiveness, as he discharges his repressed emotions to this reaction. Under condition of indifference, keeping pets is not evidence of loving but of a need of companionship. As for the deep-rooted aggressiveness (over-extroversion), it does not seem to be triggered by any repression.
文摘The objective of this research is to present a systematic analysis, in which we seek to identify the concepts of intelligent city, with the intention of recognizing the nature of this intelligence before the participation of the population. Therefore, the research associates concepts as smart cities, citizen participation and social web, identifying publications between 2012 and the first quarter of 2018 and questioning what the intelligent city is and how this concept is able to (re)organize the learning processes of the territory from the informal dynamics of the contemporary city. The qualitative analysis of the documents revealed an innumerable of definitions and related terms: smart, intelligent, ubiquitous, digital, knowledge, sustainable, crowd sourcing, innovative;structured in three types of approaches: technological focus, focus on human resources and focus on citizen-related governance from the following domains: media convergence, public and regulatory information policies, infrastructure management, real-time data mining and extraction, geographic information system, crowd computing, smart cities education, and social monitoring and control. In spite of the access to a great amount of data, we verify that the concept of intelligent city is referenced by a significant number of researches, but, in smaller number, works that present models of construction of a collective intelligence for the city. From this perspective, we identified the need to recognize technological education interventions for communication between individuals and the city. Because we believe that only through the implementation and management of techno-educommunication ecosystems will be able to promote a culture of participation.
文摘After the occurrence of unexpected group events of network, the relevant opinion information will spread rapidly through micro-blog, and the negative public opinion information will aggravate the unexpected the group events to upgrade and expand the scope of harm. It is difficult to deal. So public opinion control is very important. In this paper, we establish an influence model for spreading of public opinion based on SIR model. Through the political analysis, this paper finds that the network group events will subside, but the influence scope, time and ability of event cannot be ignored. As a result of this study, the corresponding strategies are put forward in this paper.