Open Access. Powered by Scholars. Published by Universities.®
Communication Technology and New Media Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- Coalitions (1)
- Communications (1)
- Content analysis (1)
- Digital media (1)
- Gaming theory (1)
-
- Human intelligence (1)
- Information society (1)
- Named entity recognition (1)
- Online social networks (1)
- SQL (1)
- Sentiment Analysis (1)
- Social groups--Mathematical models (1)
- Social influence (1)
- Social networks--Computer network resources--Evaluation (1)
- Social networks--Research--Methodology (1)
- Social sciences--Network analysis (1)
- Technological innovations (1)
- Text Mining (1)
- Topic Modeling (1)
- Web sites--Evaluation (1)
Articles 1 - 7 of 7
Full-Text Articles in Communication Technology and New Media
Text Analysis Of Air Force References In Twitter, Seth A. Kline
Text Analysis Of Air Force References In Twitter, Seth A. Kline
Theses and Dissertations
Social media has grown to become a rich source for opinions, authored by individuals who volunteer them, unedited and in real-time. Armed with this information, an organization like the Air Force can understand the perceptions of consumers and learn to better serve the American taxpayer. To accomplish this goal, this research takes a qualitative approach, utilizing social media analytics in combination with various Text Mining methodologies (word frequency, word relationships, sentiment analysis, topic modeling) to provide insight on Air Force related content shared on Twitter. To provide a well-rounded analysis of the overall perception of the Air Force enterprise, the …
Social Network Threat Detection, Nathanael R. Beveridge
Social Network Threat Detection, Nathanael R. Beveridge
Theses and Dissertations
Various government agencies have a stake in knowing when bad actors cross the United States' borders, or how bad actors may be involved in the ow of people across borders. Interviews conducted at border checkpoints with individuals who intend to cross the border can contain valuable information. The quantity of interviews is such that intelligence analysts could benefit greatly from an automation system that extracts the information they are looking for from within the interviews. This would allow them to focus more of their time on analyzing what is extracted as opposed to inspecting all interviews themselves. The information extracted …
The Emergence Of A Content Acceptance Model (Cam): New Thoughts Regarding The Trial, Adoption, And Usage Of New Media, Ryan G. Walinski
The Emergence Of A Content Acceptance Model (Cam): New Thoughts Regarding The Trial, Adoption, And Usage Of New Media, Ryan G. Walinski
Theses and Dissertations
New Media is defined not by the technology that it is based on but rather on individual level attributes that contribute to the development of new artifacts, practices and social arrangements. However, existing technology adoption models tend to stress technology and organizational level attributes over such individual level characteristics. This suggests that new models are required in order to fully capture how the New Media adoption process works. We are moving away from organizational and technology adoption focus and towards an individual and content adoption focus. A review of existing technology acceptance models reveals that the content provided by these …
Characterizing And Detecting Unrevealed Elements Of Network Systems, James A. Leinart
Characterizing And Detecting Unrevealed Elements Of Network Systems, James A. Leinart
Theses and Dissertations
This dissertation addresses the problem of discovering and characterizing unknown elements in network systems. Klir (1985) provides a general definition of a system as “... a set of some things and a relation among the things" (p. 4). A system, where the `things', i.e. nodes, are related through links is a network system (Klir, 1985). The nodes can represent a range of entities such as machines or people (Pearl, 2001; Wasserman & Faust, 1994). Likewise, links can represent abstract relationships such as causal influence or more visible ties such as roads (Pearl, 1988, pp. 50-51; Wasserman & Faust, 1994; Winston, …
The Social Influence Qualities Of Social Network Sites: A Qualitative And Experimental Investigation, J. Paul Conner
The Social Influence Qualities Of Social Network Sites: A Qualitative And Experimental Investigation, J. Paul Conner
Theses and Dissertations
While social network sites (SNS) are a popular form of new media, the literature has not investigated the social influence of these internet sites. Using a mixed method approach of qualitative interviews and a laboratory experiment, this study tests a process model predicting the effects of communication processes and technology on social influence. This model suggested that SNSs may be more effective at social influence than face-to-face communication. A qualitative study was performed to determine whether the hypotheses were plausible whereby it was suggested that SNSs may influence other individuals and SNSs might be a more effective at influencing individuals …
An Exploratory Examination Of Social Website Quality, Joseph B. Werling
An Exploratory Examination Of Social Website Quality, Joseph B. Werling
Theses and Dissertations
With websites becoming the frontend for numerous systems, the system's benefits require customers to have a favorable evaluation of the site and an intention to re-use it. It must be considered to be of high quality. With websites increasing adding collaborative technologies (such as tools for social networking, forums, and blogging) a new instrument to evaluate the quality of these types of sites is needed. Before such an instrument is developed, an understanding of the applicable theories is needed. This study offers that background. First the potential benefits of this research and its guiding questions are presented. Next is a …
An Incentive Model For International Telecommunications, Jeffrey R. Del Vecchio
An Incentive Model For International Telecommunications, Jeffrey R. Del Vecchio
Theses and Dissertations
This study developed a new defensive model for global voice communications. It uses a n-person, zero-sum, cooperative and non-cooperative game to optimize the coalitions revenue after the possibility of a network service provider being tampered by an adversary. This research optimized two measures of effectiveness (coalition revenue and network provider revenue) of international telecommunications coalitions by hardening network service providers and improving their respective revenue with incentives. A multi-criteria optimization problem was developed to establish the strategic competition between the coalition defender and attacker. Irrespective of the amount of incentives, a applicable hardening and tampering strategy can be obtained. All …