This document discusses two methods for clustering and grouping networks: 1) Purely network structure-based clustering that uses computer algorithms to identify clusters based on how vertices are connected; and 2) Grouping based on known attribute information where users manually group vertices based on attributes like gender or location. It also provides acknowledgement information for the source material.
The document discusses how networked work and teleworking are changing organizations. It notes that networked organizations are less hierarchical, more geographically distributed, and rely on informal and ad-hoc teams connected through information and communication technologies. While dispersed collaboration enabled by teleworking provides flexibility, it can blur the lines between work and personal life if workers feel they must always be connected. There are also legal questions around overtime pay if employees work outside of traditional work hours via technologies. Achieving a proper work-life balance is a challenge with the always-on culture of networked organizations.
The document discusses hypertext and surveillance. It notes that hypertext allows for the "social life" of information as it can be networked and linked online. It then instructs students to compare a print newspaper article to the same article online on the New York Times website, noting the different information and content available on each platform, such as headlines, reporter names, photos, and additional context available online.
The document discusses how families use different information and communication technologies (ICTs) like social media to stay connected with each other in both positive and negative ways. It explores how teens in particular integrate various media into their lives and relationships with parents. While media multiplexity allows families to communicate through different modes, it can also potentially be abused and contradict theories about the social construction of technologies.
This document discusses two methods for clustering and grouping networks: 1) Purely network structure-based clustering that uses computer algorithms to identify clusters based on how vertices are connected; and 2) Grouping based on known attribute information where users manually group vertices based on attributes like gender or location. It also provides acknowledgement information for the source material.
The document discusses how networked work and teleworking are changing organizations. It notes that networked organizations are less hierarchical, more geographically distributed, and rely on informal and ad-hoc teams connected through information and communication technologies. While dispersed collaboration enabled by teleworking provides flexibility, it can blur the lines between work and personal life if workers feel they must always be connected. There are also legal questions around overtime pay if employees work outside of traditional work hours via technologies. Achieving a proper work-life balance is a challenge with the always-on culture of networked organizations.
The document discusses hypertext and surveillance. It notes that hypertext allows for the "social life" of information as it can be networked and linked online. It then instructs students to compare a print newspaper article to the same article online on the New York Times website, noting the different information and content available on each platform, such as headlines, reporter names, photos, and additional context available online.
The document discusses how families use different information and communication technologies (ICTs) like social media to stay connected with each other in both positive and negative ways. It explores how teens in particular integrate various media into their lives and relationships with parents. While media multiplexity allows families to communicate through different modes, it can also potentially be abused and contradict theories about the social construction of technologies.
This document discusses strategies for dealing with large social network data, including cleaning redundant data, filtering vertices or edges, and analyzing one-mode and two-mode networks. It also introduces ego-centric networks and varying the degree of separation to analyze an ego's extended network.
This document discusses key concepts and measures for social network analysis:
1) It defines a social network as a collection of people and their relationships to one another, focusing on how people are located in relation to others rather than individual attributes.
2) It describes vertices as nodes in the network and edges as the links or relationships between vertices, which can be directed or undirected.
3) It provides an example of how social network data can be represented using an adjacency matrix or edge list format.
Strategic Thinking
- Sales managers complain that their products are commodities competing based on price with no differentiation, needing to sell large quantities to cover costs. The industry is losing money.
- Strategic thinking is defined as generating and applying business insights continuously for competitive advantage, while strategic planning is channeling insights into action plans to achieve goals.
- Smart strategists sometimes choose bad strategies because they think the strategies are good, lacking data, tools, or understanding of factors like customers, competition, and profit calculation.
SharePoint is being rapidly adopted by enterprises large and small as a platform for collaboration. One of the reasons for this rapid adoption is it's ability to be customized through the development of custom Web Parts. This session will take ASP.Net programmers through all of the steps needed to create a custom Web Part from scratch and make it available to Site creators in their SharePoint environment.
This chapter discusses developing a leadership system template to clearly define a vision, values, and strategies. It provides a list of constructs that leaders can use to structure their template, including leadership style, organizational culture, communication, and employee performance. The template then guides leaders to apply relevant theories to each construct, determine how progress will be evaluated, and establish appropriate timeframes. Conducting this exercise helps leaders envision their goals and monitor progress in achieving an effective leadership system.
The document discusses various marketing strategies and frameworks for achieving growth, including exploring new opportunities through innovation and diversification. It emphasizes understanding customer value and aligning finance and marketing functions. Various models are presented for assessing growth opportunities, such as the Ansoff Matrix for evaluating product/market expansion and the concept of addressing "growth gaps" in areas like customer acquisition, loyalty, and margins. Overall, the key message is on developing integrated strategies to generate future sales and profits through innovative approaches to meeting customer needs.
(1) This study analyzed how information about the 2009 Gaza conflict was shared on Twitter. It found that traditional large media organizations like the BBC and New York Times were most prominent initially but their role increased over time.
(2) Alternative sources like citizen journalists and NGOs were well integrated with traditional media in the co-tweet network, indicating they supplemented understanding of the issue.
(3) The study concludes Twitter shows a symbiosis between mainstream and alternative sources, with traditional media maintaining influence but new sources also making important contributions.
Protest Communication in Twitter: An Emergent Norm PerspectiveKyounghee Hazel Kwon
This document discusses the application of emergent norm theory to understand communication on Twitter during the January 25th Egypt protests. It presents emergent norm theory, which focuses on improvised social interactions during crises to collectively define situations and develop shared understandings. The author refines the theory for operationalization and applies it to analyze protest communication on Twitter. Three stages of communication are identified: improvisation, verification, and keynoting. Geographic patterns are also found between Egypt, Pan-Arab, and Non-Arab regions. The analysis provides insights into the emergence of collective identity and roles during crises through social media communication.
This document discusses how user-generated content and participation on the internet, known as Web 2.0, allows for collective knowledge production through contributions from both users and producers. It provides examples of how Wikipedia articles are created through collaboration between casual and dedicated editors. It also examines how ordinary users remix and create content, as seen on YouTube, and how political protests can organize through social media, as happened during the Egyptian revolution in 2011.
This study analyzes Twitter communications during the 2011 Egyptian revolution and January 25th demonstration. The researchers trace how Twitter communications developed over time and suggest a sequential crisis communication model of improvisation, verification, and solidification (IVS). An analysis of over 4,000 tweets from Egypt, other Arab nations, and non-Arab nations during the demonstration found that tweets from Egypt focused more on improvising information, tweets from non-Arab nations focused more on verification, and tweets discussing solidification of collective identity were evenly distributed. The IVS process showed how Twitter served as a global collective sense-making system through personal participation during the political crisis.
This document summarizes a presentation about working with data in SharePoint. It discusses how SharePoint stores data in lists rather than tables, and how the object model differs from a traditional database. It also explains that SharePoint hides some data that developers need to access, and that CAML queries must be used instead of SQL to retrieve list items based on criteria. The presentation demonstrates web parts built to help uncover hidden lists and fields, and to more easily construct CAML queries.
This document discusses personal networks and how they are larger and more complex than typically thought. It summarizes some key studies that found personal networks are on average larger than what was found in earlier research. Personal networks are also fragmented across different aspects of social life and include both strong and weak ties that provide diverse information and resources. While tools like Facebook have increased contact with weaker ties, personal networks are underestimated in size due to limitations in self-reporting and how networks are defined in terms of closeness beyond just discussing important matters.
This document discusses strategies for dealing with large social network data, including cleaning redundant data, filtering vertices or edges, and analyzing one-mode and two-mode networks. It also introduces ego-centric networks and varying the degree of separation to analyze an ego's extended network.
This document discusses key concepts and measures for social network analysis:
1) It defines a social network as a collection of people and their relationships to one another, focusing on how people are located in relation to others rather than individual attributes.
2) It describes vertices as nodes in the network and edges as the links or relationships between vertices, which can be directed or undirected.
3) It provides an example of how social network data can be represented using an adjacency matrix or edge list format.
Strategic Thinking
- Sales managers complain that their products are commodities competing based on price with no differentiation, needing to sell large quantities to cover costs. The industry is losing money.
- Strategic thinking is defined as generating and applying business insights continuously for competitive advantage, while strategic planning is channeling insights into action plans to achieve goals.
- Smart strategists sometimes choose bad strategies because they think the strategies are good, lacking data, tools, or understanding of factors like customers, competition, and profit calculation.
SharePoint is being rapidly adopted by enterprises large and small as a platform for collaboration. One of the reasons for this rapid adoption is it's ability to be customized through the development of custom Web Parts. This session will take ASP.Net programmers through all of the steps needed to create a custom Web Part from scratch and make it available to Site creators in their SharePoint environment.
This chapter discusses developing a leadership system template to clearly define a vision, values, and strategies. It provides a list of constructs that leaders can use to structure their template, including leadership style, organizational culture, communication, and employee performance. The template then guides leaders to apply relevant theories to each construct, determine how progress will be evaluated, and establish appropriate timeframes. Conducting this exercise helps leaders envision their goals and monitor progress in achieving an effective leadership system.
The document discusses various marketing strategies and frameworks for achieving growth, including exploring new opportunities through innovation and diversification. It emphasizes understanding customer value and aligning finance and marketing functions. Various models are presented for assessing growth opportunities, such as the Ansoff Matrix for evaluating product/market expansion and the concept of addressing "growth gaps" in areas like customer acquisition, loyalty, and margins. Overall, the key message is on developing integrated strategies to generate future sales and profits through innovative approaches to meeting customer needs.
(1) This study analyzed how information about the 2009 Gaza conflict was shared on Twitter. It found that traditional large media organizations like the BBC and New York Times were most prominent initially but their role increased over time.
(2) Alternative sources like citizen journalists and NGOs were well integrated with traditional media in the co-tweet network, indicating they supplemented understanding of the issue.
(3) The study concludes Twitter shows a symbiosis between mainstream and alternative sources, with traditional media maintaining influence but new sources also making important contributions.
Protest Communication in Twitter: An Emergent Norm PerspectiveKyounghee Hazel Kwon
This document discusses the application of emergent norm theory to understand communication on Twitter during the January 25th Egypt protests. It presents emergent norm theory, which focuses on improvised social interactions during crises to collectively define situations and develop shared understandings. The author refines the theory for operationalization and applies it to analyze protest communication on Twitter. Three stages of communication are identified: improvisation, verification, and keynoting. Geographic patterns are also found between Egypt, Pan-Arab, and Non-Arab regions. The analysis provides insights into the emergence of collective identity and roles during crises through social media communication.
This document discusses how user-generated content and participation on the internet, known as Web 2.0, allows for collective knowledge production through contributions from both users and producers. It provides examples of how Wikipedia articles are created through collaboration between casual and dedicated editors. It also examines how ordinary users remix and create content, as seen on YouTube, and how political protests can organize through social media, as happened during the Egyptian revolution in 2011.
This study analyzes Twitter communications during the 2011 Egyptian revolution and January 25th demonstration. The researchers trace how Twitter communications developed over time and suggest a sequential crisis communication model of improvisation, verification, and solidification (IVS). An analysis of over 4,000 tweets from Egypt, other Arab nations, and non-Arab nations during the demonstration found that tweets from Egypt focused more on improvising information, tweets from non-Arab nations focused more on verification, and tweets discussing solidification of collective identity were evenly distributed. The IVS process showed how Twitter served as a global collective sense-making system through personal participation during the political crisis.
This document summarizes a presentation about working with data in SharePoint. It discusses how SharePoint stores data in lists rather than tables, and how the object model differs from a traditional database. It also explains that SharePoint hides some data that developers need to access, and that CAML queries must be used instead of SQL to retrieve list items based on criteria. The presentation demonstrates web parts built to help uncover hidden lists and fields, and to more easily construct CAML queries.
This document discusses personal networks and how they are larger and more complex than typically thought. It summarizes some key studies that found personal networks are on average larger than what was found in earlier research. Personal networks are also fragmented across different aspects of social life and include both strong and weak ties that provide diverse information and resources. While tools like Facebook have increased contact with weaker ties, personal networks are underestimated in size due to limitations in self-reporting and how networks are defined in terms of closeness beyond just discussing important matters.
2. Aurkibidea 1.- Zer da errealitate areagotua? 2.- Nola funtzionatzen du? 3.- Zertarako balio du? 4.- Zer onura ekarriko dizkigu? Zertarako erabil dezakegu? 5.- Zer eragozpen edo kalte eragin diezaguke? 6.- Nola lor dezakegu?
3. 1.- Zer da errealitate areagotua? Errealitate areagotua teknologia bat da, errealitatea elementu birtualekin konbinatzeko aukera ematen duena erabiltzaileari informazio aberatsagoa emateko. Horrela, ingurune bat sortzen du, eta, bertan, informazio birtuala gehitzen zaie, lehendik existitzen diren elementu fisikoei.
4. 2.- Nola funtzionatzen du? Errealitate areagotua sortzeko, elementu erreal baten irudiak hartu behar dira, gehienetan bideoan, eta datu-base batetik ateratako informazioa gaininprimatzen da irudi horietan. Honako prozesu hau jarraitu behar da errealitate areagotua sortzeko: 1.- Kameraren parean jarri behar da objektu erreala, irudia hartu dezan eta interpretazioa egingo duen gailura igor dezan. 2.- Kamerak objektua filmatuko du, eta objektu birtuala sortuko duen softwarera igorriko ditu irudiak denbora errealean. 3.- Softwarea programatuta dago objektu birtual jakin bat sortzeko kamerak filmatutako objektu errealaren arabera. 4.- Irteera-gailua ordenagailuaren edo mugikorraren pantaila izan daiteke adibidez. Bertan agertuko da objektu birtuala, objektu errealari gainjarrita, biak gauza bera izango balira bezala.
5. 3.- Zertarako balio du? -Hezkuntza: errealitate areagotua erabili da museoetan, parke tematikoetan, erakusketetan eta abarretan, erabiltzaileei ematen zaien informazioa osatzeko. Testu-liburuekin ere erabili da, horien edukien gainean multimedia informazioa eskaintzeko aukera ematen baitu. -Aisialdia eta denbora-pasa: gailuekin jolasteko eta elkarri eragiteko aukera berriak eskaintzen ditu.
6. (...) -Turismoa eta arkitektura: saltokiei, jatetxeei edo turismo- eta zerbitzu-informazioei buruzko informazioa emateko, hala nola, garraio-lineei buruzkoa. Gainera, toki jakin batek duela mende batzuk zer itxura zuen ikus dezakegu, edo orain hutsik dagoen orube batean laster eraikiko duten eraikin batek zer itxura izango duen. -Medikuntza: adibidez, kirurgia-operazioetan, errealitate areagotuari esker, zirujauak datu bisualak ikus ditzake kamera baten bidez hartutako irudia erakusten duen pantaila batean, hala nola termografiak, tumore baten muga garbiak, etab.
7. 4.- Zer onura ekarriko dizkigu? Onura asko ditu, adibidez: Galduta bazaude edo denda edo jatetxe bat aurkitu nahi baduzu aplikazio espezifikoa erabili dezakezu. Jatetxe baten web gunera bidaltzen dizu eta hortara joateko biderik motzena ematen dizu.
8.
9. 6.- Nola lor dezakegu? Saioaren errealitate areagotuko aplikazioa Layar nabigatzailearen bitartez egongo da eskuragarri. Horretarako, lehenik eta behin Layar aplikazioa deskargatu behar duzu zure “smartphone”an edo htc magican. Nola deskargatu Layar aplikazioa?: Layar deskargatzeko Maeketetik sartu eta deskargatu behar da. Mobil berri guztiek dute Marketa aplikazio) Eta listo!!!!!