Social media use can have a great impact on professionals, both positive and negative. Here are some strategies for using it wisely and making the most of the opportunities it offers.
Working with Social Media Data: Ethics & good practice around collecting, usi...Nicola Osborne
Slides from a workshop delivered for the University of Edinburgh Digital Scholarship programme, on 18th October 2017. For further information on the programme see: http://www.digital.cahss.ed.ac.uk/ or #DigScholEd. If you are interested in hosting a similar workshop, or adapting these slides please contact me: nicola.osborne@ed.ac.uk.
Don’t fear the data: Statistics in Information Literacy InstructionLynda Kellam
For The Innovative Library Classroom Conference 2014. Thanks to Katharin Peter for her collaboration on the original article that shaped the content of this presentation!
Working with Social Media Data: Ethics & good practice around collecting, usi...Nicola Osborne
Slides from a workshop delivered for the University of Edinburgh Digital Scholarship programme, on 18th October 2017. For further information on the programme see: http://www.digital.cahss.ed.ac.uk/ or #DigScholEd. If you are interested in hosting a similar workshop, or adapting these slides please contact me: nicola.osborne@ed.ac.uk.
Don’t fear the data: Statistics in Information Literacy InstructionLynda Kellam
For The Innovative Library Classroom Conference 2014. Thanks to Katharin Peter for her collaboration on the original article that shaped the content of this presentation!
A quick-and-fun 5-minute madness presentation at the 2016 International Data and Information Management Conference (IDIMC) at Loughborough University.
**Winning presentation!**
Discusses the concept of information seeking and 3 approaches to understanding it: Belkin's ASK hypothesis, Kuhlthau's Information Search Process and Dervin's Sense-Making.
Using What They Know to Teach Them What They Need to KnowLucinda Rush
Conference Presentation
Georgia International Conference on Information Literacy
Lucinda Rush
Old Dominion University
Expropriation of social networking site consumer skills to aid students in mastering the ACRL Information Literacy Threshold Concepts.
Ethics, Openness and the Future of LearningRobert Farrow
What difference does openness make to ethics' This session will examine this question both from the perspective of research into OER and the use of open resources in teaching and learning. An outline of the nature and importance of ethics will be provided before the basic principles of research ethics are outlined through an examination of the guidance provided by National Institutes of Health (2014) and BERA (2014). The importance and foundation of institutional approval for OER research activities is reiterated with a focus on underlying principles that can also be applied openly.
I argue that with a shift to informal (or extra-institutional) learning there is a risk that we lose some clarity over the nature and extent of our moral obligations when working outside institutional frameworks – what Weller (2013) has termed "guerilla" research activity. Innovations of this kind could be free of licensing permissions; they could be funded by kickstarter or public-private enterprise; or they could reflect individuals working as data journalists. But we might also speak of "guerilla" education for innovations taking place on the fringes of institutional activity – from using social media to going full-blown "edupunk" (Groom, 2008). These innovations which employ variants of opennesss can also bring out morally complex situations.
I show how the principles underlying traditional research ethics can be applied openly while noting that, whether working within or outside institutions, there is almost no existing guidance that explains the ethical implications of working openly. Similar issues are raised with MOOC, which operate outside institutions but while drawing on institutional reputations and values. With this in mind I sketch out scenarios we are likely to encounter in the future of education:
- Issues around privacy, security and big data
- Intellectual property conflicts
- Ensuring fair treatment of class students and equivalent online students
- Meeting obligations to content creators
- The ethical status of MOOCs and their obligations to their students
- Moral dimensions of open licenses
- The ethics of learning analytics and the data it produces
I argue that, while models for ethical analysis have been proposed (e.g. Farrow, 2011) more attention should be paid to the ethics of being open. I conclude with an examination of the idea that we have a moral obligation to be open, contrasting prudential and ethical approaches to open education. At the heart of the OER movement, I argue, is a strong moral impulse that should be recognized and celebrated rather than considered the preserve of the ideologue: openness is not reducible to lowering the marginal cost of educational resources. Openness is a diverse spectrum and to leverage its true potential we need to reflect deeply on how technology has the power to challenge the normative assumptions we make about education.
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Editor IJCATR
Bayesian theory and association rule mining methods are artificial intelligence techniques that have been used in various computing fields, especially in machine learning. Internet has been considered as an easy ground for vices like radicalization because of its diverse nature and ease of information access. These vices could be managed using recommender systems methods which are used to deliver users’ preference data based on their previous interests and in relation with the community around the user. The recommender systems are divided into two broad categories, i.e. collaborative systems which considers users which share the same preferences as the user in question and content-based recommender systems tends to recommend websites similar to those already liked by the user. Recent research and information from security organs indicate that, online radicalization has been growing at an alarming rate. The paper reviews in depth what has been carried out in recommender systems and looks at how these methods could be combined to from a strong system to monitor and manage online menace as a result of radicalization. The relationship between different websites and the trend from continuous access of these websites forms the basis for probabilistic reasoning in understanding the users’ behavior. Association rule mining method has been widely used in recommender systems in profiling and generating users’ preferences. To add probabilistic reasoning considering internet magnitude and more so in social media, Bayesian theory is incorporated. Combination of this two techniques provides better analysis of the results thereby adding reliability and knowledge to the results.
This presentation describes how indicators for Connected Learning are present in the extra-mural presences that two University of Cape Town students created.
A quick-and-fun 5-minute madness presentation at the 2016 International Data and Information Management Conference (IDIMC) at Loughborough University.
**Winning presentation!**
Discusses the concept of information seeking and 3 approaches to understanding it: Belkin's ASK hypothesis, Kuhlthau's Information Search Process and Dervin's Sense-Making.
Using What They Know to Teach Them What They Need to KnowLucinda Rush
Conference Presentation
Georgia International Conference on Information Literacy
Lucinda Rush
Old Dominion University
Expropriation of social networking site consumer skills to aid students in mastering the ACRL Information Literacy Threshold Concepts.
Ethics, Openness and the Future of LearningRobert Farrow
What difference does openness make to ethics' This session will examine this question both from the perspective of research into OER and the use of open resources in teaching and learning. An outline of the nature and importance of ethics will be provided before the basic principles of research ethics are outlined through an examination of the guidance provided by National Institutes of Health (2014) and BERA (2014). The importance and foundation of institutional approval for OER research activities is reiterated with a focus on underlying principles that can also be applied openly.
I argue that with a shift to informal (or extra-institutional) learning there is a risk that we lose some clarity over the nature and extent of our moral obligations when working outside institutional frameworks – what Weller (2013) has termed "guerilla" research activity. Innovations of this kind could be free of licensing permissions; they could be funded by kickstarter or public-private enterprise; or they could reflect individuals working as data journalists. But we might also speak of "guerilla" education for innovations taking place on the fringes of institutional activity – from using social media to going full-blown "edupunk" (Groom, 2008). These innovations which employ variants of opennesss can also bring out morally complex situations.
I show how the principles underlying traditional research ethics can be applied openly while noting that, whether working within or outside institutions, there is almost no existing guidance that explains the ethical implications of working openly. Similar issues are raised with MOOC, which operate outside institutions but while drawing on institutional reputations and values. With this in mind I sketch out scenarios we are likely to encounter in the future of education:
- Issues around privacy, security and big data
- Intellectual property conflicts
- Ensuring fair treatment of class students and equivalent online students
- Meeting obligations to content creators
- The ethical status of MOOCs and their obligations to their students
- Moral dimensions of open licenses
- The ethics of learning analytics and the data it produces
I argue that, while models for ethical analysis have been proposed (e.g. Farrow, 2011) more attention should be paid to the ethics of being open. I conclude with an examination of the idea that we have a moral obligation to be open, contrasting prudential and ethical approaches to open education. At the heart of the OER movement, I argue, is a strong moral impulse that should be recognized and celebrated rather than considered the preserve of the ideologue: openness is not reducible to lowering the marginal cost of educational resources. Openness is a diverse spectrum and to leverage its true potential we need to reflect deeply on how technology has the power to challenge the normative assumptions we make about education.
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Editor IJCATR
Bayesian theory and association rule mining methods are artificial intelligence techniques that have been used in various computing fields, especially in machine learning. Internet has been considered as an easy ground for vices like radicalization because of its diverse nature and ease of information access. These vices could be managed using recommender systems methods which are used to deliver users’ preference data based on their previous interests and in relation with the community around the user. The recommender systems are divided into two broad categories, i.e. collaborative systems which considers users which share the same preferences as the user in question and content-based recommender systems tends to recommend websites similar to those already liked by the user. Recent research and information from security organs indicate that, online radicalization has been growing at an alarming rate. The paper reviews in depth what has been carried out in recommender systems and looks at how these methods could be combined to from a strong system to monitor and manage online menace as a result of radicalization. The relationship between different websites and the trend from continuous access of these websites forms the basis for probabilistic reasoning in understanding the users’ behavior. Association rule mining method has been widely used in recommender systems in profiling and generating users’ preferences. To add probabilistic reasoning considering internet magnitude and more so in social media, Bayesian theory is incorporated. Combination of this two techniques provides better analysis of the results thereby adding reliability and knowledge to the results.
This presentation describes how indicators for Connected Learning are present in the extra-mural presences that two University of Cape Town students created.
The increasing role of social media has been recognized as an increasingly effective marketing tool for a broad section of enterprises. This paper highlights the first stage of the engagement strategy using social media for an academic laboratory, and provides an insight for others wishing to take advantage of the various social networking tools that are available. The lab engages with different constituencies such as students, faculty, and alumni, industrial and governmental agencies. As these constituents online presence is fragmented over a number of different social websites (Twitter™, LinkedIn™ for example), there is no longer an effective single point of contact to engage them. With that in mind, researchers in the lab created accounts on, and started using Twitter™, LinkedIn™ and SlideShare™. Data about site referrals to the BSPA Laboratory’s homepage was gathered using Google Analytics™, in order to analyze the effects (if any) that social networks might have in promotional activities and increased interaction with the BSPA Laboratory home page (http://www.bspalabs.org/). Although this paper is a preliminary report on a short term progress, the data shows the differences in unique visitors before and after becoming active in social networks and will show data linking specific social network with an effect.
Using social media to support learning in higher educationSue Beckingham
My keynote presentation considers how social media and digital technologies can be utilised effectively to enhance both informal and formal learning. Drawing upon the 5C Framework (Nerantzi and Beckingham 2014) I will share examples of how social media is used to connect, communicate, curate, collaborate and create; and through a student-staff partnership called ‘SMASH’ (Social Media for Academic Studies at Hallam) how with my students we have explored how social media can be used for ‘learning activities’ within and beyond the classroom, to ‘organise learning’ using relevant social media tools to curate and organise information, and the importance of ‘showcasing learning’ to enable students to openly share outcomes and projects.
The New Symbiosis Of Professional Networks Research StudyLeader Networks
The article focuses on the impact of social media and social networks to Social Media Peer Groups (SMPG) and professional decision-makers. It mentions that customers and prospects have an instant platform of discussions for their ideas, experiences and knowledge through the use of social media, wherein their important role is utilizing the tools and mediums before engaging to decision-making processes. It states that social media increase the impressive strength of decision-making and change the dynamics of customer relationship management, marketing, and communications. It also recommends being part in a peer network or online community for sharing ideas that were often formed in office settings.
Social Networking, Online Communities & Research - WCHRI RoundsColleen Young
This presentation explores how researchers can leverage the social web throughout all stages of research from study design, recruitment and through to knowledge dissemination and integrated KT. Colleen Young discusses the synergies of online communities and research, the people who lead and manage the communities and researchers. The presenter encourages discussion throughout the presentation and will tailor its flow to the attendees' knowledge and participation.
The findings of this research study (purchase on Amazon.com) examines the impact social media has on consumers and decision-makers around the world and characterizes the impact of social influence models. The Social Mind research explores the best practices of using social business as a platform to strengthen sustainable methods for working and living in new, interactive and collaborative business world. It identifies key characteristics and insights into the engagement behaviors of influencers and individuals, and how organizations can maximize reach and influence to execute on what we call the new Principals of Engagement in the Millennium.
Social business is dynamically changing the face of human interaction and communications globally. The emergence of new social behaviors and interrelationships between individuals, organizations, thought leaders and influencers are evolving in new and previously unforeseen ways primarily because of social media networks and peer groups.
A disruption is in the making, but this time, human behavior is the driver, not technology. People want and need to get the information they need at the time they desire it, especially from those they consider to be experts. We are returning to the “apple cart” of yesteryear. However, this time around we are armed with digital devices to extend our global ability to talk with the companies and people who inform our decisions.
This paradigm shift is a major communications innovation in all markets, which is radically changing the way people and organizations engage and behave online. There is also a strong link between social networking and what might be called “a new global anthropology” that is developing because of these new behaviors, interactions and interrelationships between cultures enabled through social business.
Over the past three years Vanessa DiMauro, Peter Auditore and myself, all Society for New Communications Research fellows, have embarked on a series of research studies to understand this new and evolving business platform and its impact on social communications and influence.
Leveraging Apps, Social Media, and Your Digital Reputation for Professional S...Paul Brown
Originally presented as a webinar to the membership of OSA-The Optical Society in November of 2015. This presentation provides an overview of how to leverage social media and online tools to enhance networking and one's own visibility and brand.
More presentations from the NCVO Annual conference: http://www.ncvo-vol.org.uk/networking-discussions/blogs/20591
Social media is much more than an opportunity for you to share your messages and reach new audiences. It is a gold mine of experts and peers you can learn from in real time. This session will explore how social media channels bring new opportunities for learning and collaboration to your desktop or smart phone. You will hear how to use social media for your own professional development as well as find new ways to work together and share information more effectively.
From September 2017, there will be some changes to the Templeman Library's layout, collections, borrowing rules and more. Here's what you need to know.
InfoFest Kent 2017: Ideas Café - encouraging wider student reading, Andy PrueUKC Library and IT
The Ideas Café was established by Library staff and teaching staff in the Kent Business School, to tackle the problem of students not reading around topics. It provides a safe space for any student or member of staff to discuss a wide range of topics and give research-based presentations of a subject of their choice.
InfoFest Kent 2017: Accessibility is good for you, Ben WatsonUKC Library and IT
Inclusive design benefits everyone, including those with disabilities. Introducing Jisc's OPERA project, which promotes an inclusive environment and the wider adoption of assistive technology. Examples of assistive technology and software and how we're encouraging inclusivity at the University of Kent.
Open Access refers to unrestricted access to peer-reviewed research outputs via the Internet, free of charge and free of most copyright and licensing restrictions.
Open Access is also often referred to as Gold or Green.
“To be integrated is to feel secure, to feel connected.” The views and experi...AJHSSR Journal
ABSTRACT: Although a significant amount of literature exists on Morocco's migration policies and their
successes and failures since their implementation in 2014, there is limited research on the integration of subSaharan African children into schools. This paperis part of a Ph.D. research project that aims to fill this gap. It
reports the main findings of a study conducted with migrant children enrolled in two public schools in Rabat,
Morocco, exploring how integration is defined by the children themselves and identifying the obstacles that they
have encountered thus far. The following paper uses an inductive approach and primarily focuses on the
relationships of children with their teachers and peers as a key aspect of integration for students with a migration
background. The study has led to several crucial findings. It emphasizes the significance of speaking Colloquial
Moroccan Arabic (Darija) and being part of a community for effective integration. Moreover, it reveals that the
use of Modern Standard Arabic as the language of instruction in schools is a source of frustration for students,
indicating the need for language policy reform. The study underlines the importanceof considering the
children‟s agency when being integrated into mainstream public schools.
.
KEYWORDS: migration, education, integration, sub-Saharan African children, public school
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...SocioCosmos
Get more Pinterest followers, reactions, and repins with Sociocosmos, the leading platform to buy all kinds of Pinterest presence. Boost your profile and reach a wider audience.
https://www.sociocosmos.com/product-category/pinterest/
Enhance your social media strategy with the best digital marketing agency in Kolkata. This PPT covers 7 essential tips for effective social media marketing, offering practical advice and actionable insights to help you boost engagement, reach your target audience, and grow your online presence.
Multilingual SEO Services | Multilingual Keyword Research | Filosemadisonsmith478075
Multilingual SEO services are essential for businesses aiming to expand their global presence. They involve optimizing a website for search engines in multiple languages, enhancing visibility, and reaching diverse audiences. Filose offers comprehensive multilingual SEO services designed to help businesses optimize their websites for search engines in various languages, enhancing their global reach and market presence. These services ensure that your content is not only translated but also culturally and contextually adapted to resonate with local audiences.
Visit us at -https://www.filose.com/
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...AJHSSR Journal
ABSTRACT: In the Malaysian context, small and medium enterprises (SMEs) experience a significant
burden of workplace accidents. A consensus among scholars attributes a substantial portion of these incidents to
human factors, particularly unsafe behaviors. This study, conducted in Malaysia's northern region, specifically
targeted Safety and Health/Human Resource professionals within the manufacturing sector of SMEs. We
gathered a robust dataset comprising 107 responses through a meticulously designed self-administered
questionnaire. Employing advanced partial least squares-structural equation modeling (PLS-SEM) techniques
with SmartPLS 3.2.9, we rigorously analyzed the data to scrutinize the intricate relationship between safety
behavior and safety performance. The research findings unequivocally underscore the palpable and
consequential impact of safety behavior variables, namely safety compliance and safety participation, on
improving safety performance indicators such as accidents, injuries, and property damages. These results
strongly validate research hypotheses. Consequently, this study highlights the pivotal significance of cultivating
safety behavior among employees, particularly in resource-constrained SME settings, as an essential step toward
enhancing workplace safety performance.
KEYWORDS :Safety compliance, safety participation, safety performance, SME
Unlock TikTok Success with Sociocosmos..SocioCosmos
Discover how Sociocosmos can boost your TikTok presence with real followers and engagement. Achieve your social media goals today!
https://www.sociocosmos.com/product-category/tiktok/
Surat Digital Marketing School is created to offer a complete course that is specifically designed as per the current industry trends. Years of experience has helped us identify and understand the graduate-employee skills gap in the industry. At our school, we keep up with the pace of the industry and impart a holistic education that encompasses all the latest concepts of the Digital world so that our graduates can effortlessly integrate into the assigned roles.
This is the place where you become a Digital Marketing Expert.
Your Path to YouTube Stardom Starts HereSocioCosmos
Skyrocket your YouTube presence with Sociocosmos' proven methods. Gain real engagement and build a loyal audience. Join us now.
https://www.sociocosmos.com/product-category/youtube/
Grow Your Reddit Community Fast.........SocioCosmos
Sociocosmos helps you gain Reddit followers quickly and easily. Build your community and expand your influence.
https://www.sociocosmos.com/product-category/reddit/
InfoFest Kent 2017: Your Digital Footprint and Managing an Appropriate Online Identity, Dr Fragkiskos Filippaios
1. The UK’s European university
YourDigitalFootprintandManaging
anAppropriateOnlineIdentity
Dr Fragkiskos Filippaios
Associate Dean (Graduate Studies)
Faculty of SocialSciences
2. Outline
• Popularity of online social networks
• Social capital and career success
• Digital Footprint
• Strategies for building the brand
• Effective online social network strategies
Dr Fragkiskos Filippaios
3. Online social networks are very popular
• LinkedIn dominates the professional social networking
sector with over 400 million registered members
(LinkedIn About Us, 2015)
• Facebook is reportedly one of the top visited websites,
attracting over a billion daily active users world-wide
(Facebook, 2015)
• Twitter rapidly gained worldwide social networking and
microblogging recognition with over 320 million daily
active users (Twitter, 2012)
• The increased popularity of social networking is largely
due to the proliferation of smart/mobile devices and the
intuitive nature of social technologies (Croitoru, Crooks,
Radzikowski, & Stefanidis, 2013; Salehan & Negahban,
2013).
Dr Fragkiskos Filippaios
4. Social Capital and Career Success
• Social capital theory and career success have
been linked by Seibert, Kraimer and Liden
(2001) who connected three competing
theories of social capital:
• Weak tie theory (Granovetter, 1973)
• Structural hole theory (Burt, 1992)
• Social resource theory (Lin, 1999).
• Connections or ties between individuals in a
network help provide the basis for analysis of
social networks.
Dr Fragkiskos Filippaios
5. Online Social Networking – The positive side
• Online social networking seamlessly enables real-life
relationships through information technology (Calabrese
& Borchert, 1996), facilitating the building of new
relationships, maintaining existing ones and exploiting
online social capital to its full extent.
• The idea that social capital, including interpersonal
relationships, assets embedded in relationships and
processes, contribute to career success has surfaced in
multiple studies of social capital theory (Adler & Kwon,
2002; Coleman, 1990; Seibert et al., 2001).
• Research by Lin (1999) shows the contribution of social
capital to career success through priority access to
information on a job opening which an individual can
obtain through connections, or other nodes in a network
can favourably influence a promotion decision.
Dr Fragkiskos Filippaios
6. Online Social Networking – The negative side
• A growing number of publications (e.g. Barnes & Barnes,
2009, Lange 2007, Livingstone 2008, Lewis & West
2009) continuously draw attention to issues of privacy of
individual information available as a result of social
networking use.
• Some researchers (e.g. Weintraub & Kumar, 1997) argue
that technology may be significantly changing boundaries
between 'publicity' and 'privacy’.
• Ryan and Xenos (2011) argue that lonely and unsociable
individuals tend to spend more time on social media and
passively exploit associations and social capital, while
users with higher leadership scores tend to provide more
active social contributions and use the network for self-
promotion.
Dr Fragkiskos Filippaios
7. Online Social Networks and Business
Connections
• Knowledge sharing opportunities through social networks have been
explored by Chow and Chan (2008). It was found that employees
receive satisfaction from content and knowledge sharing in trusted
environment in professional settings.
• Recent studies on human resource competencies show that
organisational requirements for the exploitation of human resource
capital require collative competencies for knowledge dissemination and
sharing in the work place to promote organisational performance
(Lytras & Ordóñez de Pablos, 2008)
• Employers make use of the information on social networks to make
decisions on potential applicants and these do provide a good basis for
future recruitment of employees (Clark & Roberts, 2010; McLaughlin,
2009).
• Companies that use campus based recruitment practices often use
them to explore social behaviour of applicants such as drinking, use of
recreational drugs or sexually explicit behaviour (Roberts & Roach,
2009).
Dr Fragkiskos Filippaios
8. Digital Footprint
Individuals
• The old saying ‘Choose your
friends wisely’ cannot be more
relevant as in the context of
online social networking
• Increasingly, there are
warnings that individuals
should be careful of their use
of networks generally as
employers are more and more
using information gleaned from
social networks to assess
future employees (Peluchette
& Karl, 2010)
Businesses
• An increasing level of
concern from the
businesses themselves,
regarding legal
challenges and the risks
involved in using social
networks for building
business, leading to
policy developments
(Wilson, 2009)
Dr Fragkiskos Filippaios
9. Typology of Digital Footprint (Benson &
Filippaios, 2014)
Dr Fragkiskos Filippaios
Type of Use
Social Business
MatureYoung
Age
Social Links
Builder
Young
Entrepreneur
Mature Friend Business Links
Builder
10. Implications of online behaviour
• The significance of digital footprint is important
for successful career management,
professional networking and developing
business opportunities online
• To develop strong social presence and
reputation, professionals need to be aware of
the potential of their participation in networking
events, interactions with peers and media
content accumulation
Dr Fragkiskos Filippaios
11. Online identity screening
• The statistics of social media screening by
prospective employers is brutal
• 69% of organisations stated that they rejected
candidates because of their social networking
contents (Reppler.com, 2013)
• Facebook, checked by 76% employers, Twitter
53% and LinkedIn 48% respectively
(Reppler.com, 2013)
Dr Fragkiskos Filippaios
12. Our findings come from…
• A survey of over 600 business school
graduates from AMBA accredited UK
universities
• We are able to identify the level of awareness
and degree of application of professional usage
of online social networks
Dr Fragkiskos Filippaios
13. Strategies
• Building your own online brand through setting
up a LinkedIn/Facebook/Twitter profile showing
skills, expertise and media to external visitors
• Follow group discussions to maintain
professional currency
• Become a thought leader, start (and actively
maintain) topical blogs
• Join companies for career planning research
Dr Fragkiskos Filippaios
14. Effective social media strategies
Dr Fragkiskos Filippaios
•Check online reputation
•Remove damaging content
•Identify opportunities for building
personal brand
•Change online behaviour to reflect
your brand aims
• Develop reputation attributes
up to 1 year
• Build positive profile, including
accolades
•Join professional networks of your
preference and be an active participant
•Develop/Become a thought leader
•Plan/Do/Check your personal brand
1-3 years • Build networks with like minded
people
•Identify new opportunities
•Take part and lead events
•Exploit social capital in networks
•Offer mentoring
•Review/maintain online reputation
•Plan for the next career phase/
future
5 years
V1.0
To change the footer on every slide:
1. On the menu go to Insert > Header and Footer…
2. Select the Footer checkbox and enter the footer text in the accompanying text box
3. Click “Apply to All”
Both the weak tie theory and the structural holes theory deal with the structure of social networks and the advantages that network topology offers.
The weak tie theory considers the strengths of ties between individuals and proves that weak ties are indispensible to individuals’ opportunities. In particular (Granovetter, 1973) shows that ties between members of a given network can be intense or weak. For instance, in a network with intense/strong ties information dissipates quickly and loses its value to members, e.g. friends, co-workers, members of local community, whereas infrequent and emotionally uninvolved relationships or weak ties commonly link networks with networks with unique information and resources. Granovetter (1973) argues that weak ties were more useful than strong ties as a source of information about job openings helping individuals with connections to external networks to gain access to better job opportunities.
Another view on social capital is provided by the structural hole theory Burt (1992, 1997) the structural hole argument is that “social capital is created by a network in which people can broker connections between otherwise disconnected segments” (Burt, 2001, p. 202). Social networks rich in structural holes provide an individual with better access to information, bargaining power and therefore exercising greater control over resources
and opening career opportunities throughout the social system.
Finally, the social resource theory focuses on the content rather than the structure or strength of ties in a network. According to Lin (1999) social capital is formed via the capability to use ties between individuals in a network to reach a particular resource embedded in it to fulfil individual’s instrumental objectives.